def get(self, urlQuery): self.set_header("Server", "API Server v" + version) json_data = "{}" # Force the api ip_restrict to check. passed = ip_restrict(self.request.remote_ip, api=True) if not passed: #if config.logging: # log("%s\t%s%s%s://%s%s\tForbidden\tIP Restricted: %s" % (config.http_response_codes["forbidden"], config.ip["log_prefix"], config.log_message_formats["requested_prefix"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip), "WARNING") raise tornado.web.HTTPError(config.http_response_codes["forbidden"]) # The exception will catch this so force it again self.set_header("Content-Type", "application/json") try: if urlQuery == "port": json_data = value_to_json("port", config.port) elif urlQuery == "log_when": json_data = value_to_json("log_when", config.log_when) elif urlQuery == "log_utc": json_data = value_to_json("log_utc", config.log_utc) elif urlQuery == "log_rotation": json_data = value_to_json("log_rotation", config.log_rotation) elif urlQuery == "log_backups": json_data = value_to_json("log_backups", config.log_backups) elif urlQuery == "http_response_codes": json_data = list_to_json_array(config.http_response_codes, "http_response_codes") elif urlQuery == "alert_email": json_data = list_to_json_array(config.alert_email, "alert_email") elif urlQuery == "keys": json_data = list_to_json_array(config.keys, "keys") elif urlQuery == "version": json_data = value_to_json("version", version) elif len(urlQuery) == 0: # All json_data = value_to_json("port", config.port, stop=False) json_data += value_to_json("log_when", config.log_when, start=False, stop=False) json_data += value_to_json("log_utc", config.log_utc, start=False, stop=False) json_data += value_to_json("log_rotation", config.log_rotation, start=False, stop=False) json_data += value_to_json("log_backups", config.log_backups, start=False, stop=False) json_data += list_to_json_array(config.http_response_codes, "http_response_codes", start=False, stop=False) json_data += list_to_json_array(config.alert_email, "alert_email", start=False, stop=False) json_data += list_to_json_array(config.api_ip_allow_range, "api_ip_allow_range", start=False, stop=False) json_data += list_to_json_array(config.keys, "keys", start=False, stop=False) json_data += value_to_json("version", version, start=False) if config.logging: log("GET %s\t%s://%s%s\t%s\t%s" % ( config.http_response_codes["found"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip, self.request.headers["User-Agent"])) except BaseException, e: log("GET %s\t%s://%s%s\t%s\t%s\t%s" % ( config.http_response_codes["found"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip, self.request.headers["User-Agent"], e), "CRITICAL")
def get(self, urlQuery): self.set_header("Server", "API Server v" + version.version) json_data = "{}" # Force the api ip_restrict to check. passed = ip_restrict(self.request.remote_ip, api=True) if not passed: if config.logging: log("%s\t%s://%s%s\tForbidden\tIP Restricted: %s" % (config.http_response_codes["forbidden"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip), "WARNING") raise tornado.web.HTTPError(config.http_response_codes["forbidden"]) # The exception will catch this so force it again self.set_header("Content-Type", "application/json") tcs_config_stream = None try: # temp for now tcs_config_stream = file('%s%s' % (config.servers_server_config.get('path'), config.servers_server_config.get('file')), 'r') tcs_config = yaml.load(tcs_config_stream) if urlQuery == 'services': json_data = list_to_json_array(tcs_config['services'], "services") elif len(urlQuery) == 0: # All json_data = json.dumps(tcs_config) #json_data = value_to_json('version', tcs_config['version'], stop=False) #json_data += value_to_json('modeofoperation', tcs_config['modeofoperation'], start=False, stop=False) #json_data += value_to_json('monitoringinterface', tcs_config['monitoringinterface'], start=False,stop=False) #json_data += value_to_json('outgoinginterface', tcs_config['outgoinginterface'], start=False,stop=False) #json_data += value_to_json('redirectaddress', tcs_config['redirectaddress'], start=False,stop=False) #json_data += value_to_json('pcap-filter', tcs_config['pcap-filter'], start=False,stop=False) #json_data += list_to_json_array(tcs_config['services'], "services", start=False, stop=True) #if config.logging: # log("GET %s\t%s://%s%s\t%s\t%s" % ( # config.http_response_codes["found"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip, self.request.headers["User-Agent"])) except BaseException, e: log("GET %s\t%s://%s%s\t%s\t%s\t%s" % ( config.http_response_codes["general_error"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip, self.request.headers["User-Agent"], e), "CRITICAL")
def get(self, urlQuery): self.set_header("Server", "API Server v" + version.version) json_data = "{}" # Force the api ip_restrict to check. passed = ip_restrict(self.request.remote_ip, api=True) if not passed: #if config.logging: # log("%s\t%s%s%s://%s%s\tForbidden\tIP Restricted: %s" % (config.http_response_codes["forbidden"], config.ip["log_prefix"], config.log_message_formats["requested_prefix"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip), "WARNING") raise tornado.web.HTTPError( config.http_response_codes["forbidden"] ) # The exception will catch this so force it again self.set_header("Content-Type", "application/json") try: if urlQuery == "servers": json_data = list_to_json_array(config.servers_with_weights, "servers") elif urlQuery == "server_defaults": json_data = list_to_json_array(config.server_defaults, "server_defaults") elif urlQuery == "server_ports": json_data = list_to_json_array(config.server_ports, "server_ports") elif urlQuery == "servers_interface_ip": json_data = list_to_json_array(config.servers_interface_ip, "servers_interface_ip") elif urlQuery == "server_config": json_data = list_to_json_array(config.servers_server_config, "server_config") elif urlQuery == "purge": json_data = list_to_json_array(config.servers_purge, "purge") elif len(urlQuery) == 0: # All json_data = list_to_json_array(config.servers_with_weights, "servers", start=False, stop=False) json_data += list_to_json_array(config.server_defaults, "server_defaults", start=False, stop=False) json_data += list_to_json_array(config.server_ports, "server_ports", start=False, stop=False) json_data += list_to_json_array(config.servers_interface_ip, "servers_interface_ip", start=False) json_data += list_to_json_array(config.servers_server_config, "server_config", start=False, stop=False) json_data += list_to_json_array(config.servers_purge, "purge", start=False) if config.logging: log("GET %s\t%s://%s%s\t%s\t%s" % (config.http_response_codes["found"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip, self.request.headers["User-Agent"])) except BaseException, e: log( "GET %s\t%s://%s%s\t%s\t%s\t%s" % (config.http_response_codes["general_error"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip, self.request.headers["User-Agent"], e), "CRITICAL")
def get(self, urlQuery): self.set_header("Server", "API Server v" + version.version) json_data = "{}" # Force the api ip_restrict to check. passed = ip_restrict(self.request.remote_ip, api=True) if not passed: #if config.logging: # log("%s\t%s%s%s://%s%s\tForbidden\tIP Restricted: %s" % (config.http_response_codes["forbidden"], config.ip["log_prefix"], config.log_message_formats["requested_prefix"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip), "WARNING") raise tornado.web.HTTPError(config.http_response_codes["forbidden"]) # The exception will catch this so force it again self.set_header("Content-Type", "application/json") try: if urlQuery == "servers": json_data = list_to_json_array(config.servers_with_weights, "servers") elif urlQuery == "server_defaults": json_data = list_to_json_array(config.server_defaults, "server_defaults") elif urlQuery == "server_ports": json_data = list_to_json_array(config.server_ports, "server_ports") elif urlQuery == "servers_interface_ip": json_data = list_to_json_array(config.servers_interface_ip, "servers_interface_ip") elif urlQuery == "server_config": json_data = list_to_json_array(config.servers_server_config, "server_config") elif urlQuery == "purge": json_data = list_to_json_array(config.servers_purge, "purge") elif len(urlQuery) == 0: # All json_data = list_to_json_array(config.servers_with_weights, "servers", start=False, stop=False) json_data += list_to_json_array(config.server_defaults, "server_defaults", start=False, stop=False) json_data += list_to_json_array(config.server_ports, "server_ports", start=False, stop=False) json_data += list_to_json_array(config.servers_interface_ip, "servers_interface_ip", start=False) json_data += list_to_json_array(config.servers_server_config, "server_config", start=False, stop=False) json_data += list_to_json_array(config.servers_purge, "purge", start=False) if config.logging: log("GET %s\t%s://%s%s\t%s\t%s" % ( config.http_response_codes["found"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip, self.request.headers["User-Agent"])) except BaseException, e: log("GET %s\t%s://%s%s\t%s\t%s\t%s" % ( config.http_response_codes["general_error"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip, self.request.headers["User-Agent"], e), "CRITICAL")
def get(self, urlQuery): self.set_header("Server", "API Server v" + version) json_data = "{}" # Force the api ip_restrict to check. passed = ip_restrict(self.request.remote_ip, api=True) if not passed: #if config.logging: # log("%s\t%s%s%s://%s%s\tForbidden\tIP Restricted: %s" % (config.http_response_codes["forbidden"], config.ip["log_prefix"], config.log_message_formats["requested_prefix"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip), "WARNING") raise tornado.web.HTTPError( config.http_response_codes["forbidden"] ) # The exception will catch this so force it again self.set_header("Content-Type", "application/json") try: if urlQuery == "port": json_data = value_to_json("port", config.port) elif urlQuery == "log_when": json_data = value_to_json("log_when", config.log_when) elif urlQuery == "log_utc": json_data = value_to_json("log_utc", config.log_utc) elif urlQuery == "log_rotation": json_data = value_to_json("log_rotation", config.log_rotation) elif urlQuery == "log_backups": json_data = value_to_json("log_backups", config.log_backups) elif urlQuery == "http_response_codes": json_data = list_to_json_array(config.http_response_codes, "http_response_codes") elif urlQuery == "alert_email": json_data = list_to_json_array(config.alert_email, "alert_email") elif urlQuery == "keys": json_data = list_to_json_array(config.keys, "keys") elif urlQuery == "version": json_data = value_to_json("version", version) elif len(urlQuery) == 0: # All json_data = value_to_json("port", config.port, stop=False) json_data += value_to_json("log_when", config.log_when, start=False, stop=False) json_data += value_to_json("log_utc", config.log_utc, start=False, stop=False) json_data += value_to_json("log_rotation", config.log_rotation, start=False, stop=False) json_data += value_to_json("log_backups", config.log_backups, start=False, stop=False) json_data += list_to_json_array(config.http_response_codes, "http_response_codes", start=False, stop=False) json_data += list_to_json_array(config.alert_email, "alert_email", start=False, stop=False) json_data += list_to_json_array(config.api_ip_allow_range, "api_ip_allow_range", start=False, stop=False) json_data += list_to_json_array(config.keys, "keys", start=False, stop=False) json_data += value_to_json("version", version, start=False) if config.logging: log("GET %s\t%s://%s%s\t%s\t%s" % (config.http_response_codes["found"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip, self.request.headers["User-Agent"])) except BaseException, e: log( "GET %s\t%s://%s%s\t%s\t%s\t%s" % (config.http_response_codes["found"], self.request.protocol, self.request.host, self.request.uri, self.request.remote_ip, self.request.headers["User-Agent"], e), "CRITICAL")