Local modifications to ClusterLabs/Anvil by Alteeve
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

270 lines
7.6 KiB

#!/usr/bin/perl
#
# Open an SSH tunnel using the Net::OpenSSH module and keep it opened with an infinite loop.
#
use strict;
use warnings;
use Anvil::Tools;
use Net::OpenSSH;
$| = 1;
my $THIS_FILE = ($0 =~ /^.*\/(.*)$/)[0];
my $running_directory = ($0 =~ /^(.*?)\/$THIS_FILE$/)[0];
if (($running_directory =~ /^\./) && ($ENV{PWD}))
{
$running_directory =~ s/^\./$ENV{PWD}/;
}
my $anvil = Anvil::Tools->new({ on_sig_int => \&close_connection, on_sig_term => \&close_connection });
$anvil->Get->switches;
$anvil->Database->connect;
$anvil->Log->entry({ source => $THIS_FILE, line => __LINE__, level => 2, secure => 0, key => "log_0132" });
if (not $anvil->data->{sys}{database}{connections})
{
# No databases, exit.
$anvil->Log->entry({ source => $THIS_FILE, line => __LINE__, level => 0, 'print' => 1, priority => "err", key => "error_0003" });
$anvil->nice_exit({ exit_code => 1 });
}
my $connect_child = $anvil->data->{switches}{'child'};
my $switch_debug = $anvil->data->{switches}{'debug'} || 3;
my $ssh_ctl_cmd = $anvil->data->{switches}{'ctl-cmd'};
my $ssh_ctl_path = $anvil->data->{switches}{'ctl-path'};
my $ssh_forward = $anvil->data->{switches}{'forward'};
my $ssh_forward_lport = $anvil->data->{switches}{'forward-lport'};
my $ssh_forward_rport = $anvil->data->{switches}{'forward-rport'};
my $ssh_port = $anvil->data->{switches}{'port'};
my $ssh_target = $anvil->data->{switches}{'target'};
my $ssh_test_interval = $anvil->data->{switches}{'test-interval'};
my $ssh_user = $anvil->data->{switches}{'user'};
# Global for holding the SSH file handle; needed because it's hard to pass
# params to signal handlers.
my $ssh;
if ($connect_child)
{
(my $open_rcode, $ssh) = open_connection({
ctl_path => $ssh_ctl_path,
debug => $switch_debug,
external_parent => 1,
port => $ssh_port,
target => $ssh_target,
user => $ssh_user,
});
$anvil->nice_exit({ exit_code => $open_rcode }) if ($open_rcode);
my ($manage_rcode) = manage_tunnel({
ctl_cmd => $ssh_ctl_cmd,
debug => $switch_debug,
forward => $ssh_forward,
forward_lport => $ssh_forward_lport,
forward_rport => $ssh_forward_rport,
ssh_fh => $ssh,
});
$anvil->nice_exit({ exit_code => $manage_rcode }) if ($manage_rcode);
}
else
{
$ssh_test_interval = 60 if (not is_int($ssh_test_interval));
(my $open_rcode, $ssh) = open_connection({
ctl_path => $ssh_ctl_path,
debug => $switch_debug,
port => $ssh_port,
target => $ssh_target,
user => $ssh_user,
});
$anvil->nice_exit({ exit_code => $open_rcode }) if ($open_rcode);
if (not defined $ssh_ctl_path)
{
# Not making an external parent connection; forward using
# internal parent connection.
my ($manage_rcode) = manage_tunnel({
ctl_cmd => $ssh_ctl_cmd,
debug => $switch_debug,
forward => $ssh_forward,
forward_lport => $ssh_forward_lport,
forward_rport => $ssh_forward_rport,
ssh_fh => $ssh,
});
$anvil->nice_exit({ exit_code => $manage_rcode }) if ($manage_rcode);
}
my $is_ssh_tunnel_alive = 1;
while ($is_ssh_tunnel_alive)
{
$is_ssh_tunnel_alive = $ssh->test("echo");
sleep($ssh_test_interval);
}
close_connection({ debug => $switch_debug });
}
$anvil->nice_exit({ exit_code => 0 });
#
# Functions
#
sub build_ssh_fh_key
{
my ($user, $target, $port) = @_;
return "${user}\@${target}:${port}";
}
sub close_connection
{
my $parameters = shift;
my $debug = $parameters->{debug} || 3;
my $ssh_fh = $parameters->{ssh_fh} // $ssh;
return (1) if ( (not defined $ssh_fh) || (not $ssh_fh->can("disconnect")) );
my $ctl_path = $ssh_fh->get_ctl_path();
my $pid = $ssh_fh->get_master_pid();
$ssh_fh->disconnect();
$anvil->Log->variables({ source => $THIS_FILE, line => __LINE__, level => $debug, list => {
message => "Parent connection [$pid] using [$ctl_path] disconnected."
} });
return (0);
}
sub is_valid_tunnel_ctl_command
{
return defined $_[0] && $_[0] =~ /^(?:cancel|forward)$/;
}
sub is_valid_forward
{
return defined $_[0] && $_[0] =~ /^(?:L|R)$/;
}
sub is_int
{
return defined $_[0] && $_[0] =~ /^\d+$/;
}
sub is_ssh_fh_defined
{
return defined $_[0] ? 1 : 0;
}
sub manage_tunnel
{
my $parameters = shift;
my $ctl_cmd = $parameters->{ctl_cmd} // "forward";
my $debug = $parameters->{debug} || 3;
my $forward = $parameters->{forward} // "R";
my $forward_laddr = $parameters->{forward_laddr} // "0.0.0.0";
my $forward_lport = $parameters->{forward_lport};
my $forward_raddr = $parameters->{forward_raddr} // "0.0.0.0";
my $forward_rport = $parameters->{forward_rport};
my $ssh_fh = $parameters->{ssh_fh};
$anvil->Log->variables({ source => $THIS_FILE, line => __LINE__, level => $debug, list => $parameters, prefix => "manage_tunnel" });
return (1) if ( (not is_ssh_fh_defined($ssh_fh))
|| (not is_valid_tunnel_ctl_command($ctl_cmd))
|| (not is_valid_forward($forward))
|| (not is_int($forward_lport))
|| (not is_int($forward_rport)) );
my $addr_a = $forward_laddr;
my $addr_b = $forward_raddr;
my $port_a = $forward_lport;
my $port_b = $forward_rport;
# When remote forward, change the option and reverse the addresses and ports.
if ($forward eq "R")
{
$addr_a = $forward_raddr;
$addr_b = $forward_laddr;
$port_a = $forward_rport;
$port_b = $forward_lport;
}
my $forward_opt = "-${forward}${addr_a}:${port_a}:${addr_b}:${port_b}";
$anvil->Log->variables({ source => $THIS_FILE, line => __LINE__, level => $debug, list => { forward_opt => $forward_opt } });
$ssh_fh->system({ ssh_opts => [ "-O", $ctl_cmd, $forward_opt ] });
return (0);
}
sub open_connection
{
my $parameters = shift;
my $ctl_path = $parameters->{ctl_path};
my $debug = $parameters->{debug} || 3;
my $external_parent = $parameters->{external_parent} ? 1 : 0;
my $port = $parameters->{port} || 22;
my $target = $parameters->{target};
my $user = $parameters->{user} // "root";
$anvil->Log->variables({ source => $THIS_FILE, line => __LINE__, level => $debug, list => $parameters, prefix => "open_connection" });
return (1) if ( (not defined $target) || ($target eq "") );
if (defined $ctl_path)
{
# 1. Control socket path must exist if we want to use an
# external parent connection.
# 2. Control socket path mustn't exist if we want to establish
# a new parent connection.
return (1) if ( ($ctl_path eq "")
|| ( $external_parent && (not -e $ctl_path) )
|| ( (not $external_parent) && (-e $ctl_path) ) );
}
my ($output, $error, $rcode) = $anvil->Remote->call({
# Start new connection; doesn't mean "don't cache the created connection".
no_cache => 1,
ossh_opts => [ ctl_path => $ctl_path, external_master => $external_parent ],
port => $port,
remote_user => $user,
shell_call => $anvil->data->{path}{exe}{echo}." 1",
target => $target,
});
$anvil->Log->variables({ source => $THIS_FILE, line => __LINE__, level => $debug, list => {
error => $error,
output => $output,
rcode => $rcode,
} });
return (1) if ( $rcode || ($output ne "1") );
my $ssh_fh_key = build_ssh_fh_key($user, $target, $port);
$anvil->Log->variables({ source => $THIS_FILE, line => __LINE__, level => $debug, list => { ssh_fh_key => $ssh_fh_key } });
my $ssh_fh = $anvil->data->{cache}{ssh_fh}{$ssh_fh_key};
return (1) if (not is_ssh_fh_defined($ssh_fh));
delete $anvil->data->{cache}{ssh_fh}{$ssh_fh_key};
$anvil->Log->variables({ source => $THIS_FILE, line => __LINE__, level => $debug, list => {
ctl_path => $ssh_fh->get_ctl_path(),
pid => $ssh_fh->get_master_pid(),
} });
return (0, $ssh_fh);
}