first commit
This commit is contained in:
commit
fa73c9ea6d
4
.gitignore
vendored
Normal file
4
.gitignore
vendored
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
__pycache__
|
||||||
|
data/
|
||||||
|
instance/
|
||||||
|
venv/
|
135
app.py
Normal file
135
app.py
Normal file
@ -0,0 +1,135 @@
|
|||||||
|
#!/usr/bin/env python3
|
||||||
|
import os
|
||||||
|
import time
|
||||||
|
import logging
|
||||||
|
import difflib
|
||||||
|
from flask import Flask, request, jsonify, abort
|
||||||
|
from flask_sslify import SSLify
|
||||||
|
from datetime import datetime, timezone, timedelta
|
||||||
|
from croniter import croniter
|
||||||
|
import psutil
|
||||||
|
|
||||||
|
app = Flask(__name__)
|
||||||
|
sslify = SSLify(app)
|
||||||
|
|
||||||
|
# Konfiguracja tokenu autoryzacyjnego (przyjmujemy pre-shared secret)
|
||||||
|
API_TOKEN = os.environ.get("HOSTS_DAEMON_API_TOKEN", "changeme")
|
||||||
|
|
||||||
|
# Konfiguracja logowania – logi zapisywane do pliku /opt/hosts_daemon/logs/daemon.log
|
||||||
|
LOG_DIR = "/opt/hosts_daemon/logs"
|
||||||
|
os.makedirs(LOG_DIR, exist_ok=True)
|
||||||
|
LOG_FILE = os.path.join(LOG_DIR, "daemon.log")
|
||||||
|
logging.basicConfig(
|
||||||
|
level=logging.INFO,
|
||||||
|
format="%(asctime)s [%(levelname)s] %(message)s",
|
||||||
|
handlers=[
|
||||||
|
logging.FileHandler(LOG_FILE),
|
||||||
|
logging.StreamHandler()
|
||||||
|
]
|
||||||
|
)
|
||||||
|
logger = logging.getLogger("hosts_daemon")
|
||||||
|
|
||||||
|
# Globalne metryki
|
||||||
|
metrics = {
|
||||||
|
"total_requests": 0,
|
||||||
|
"total_time": 0.0,
|
||||||
|
"endpoints": {},
|
||||||
|
"hosts_get": 0,
|
||||||
|
"hosts_post": 0,
|
||||||
|
}
|
||||||
|
|
||||||
|
# Funkcja sprawdzająca autoryzację
|
||||||
|
def require_auth():
|
||||||
|
token = request.headers.get("Authorization")
|
||||||
|
if token != API_TOKEN:
|
||||||
|
abort(401, description="Unauthorized")
|
||||||
|
|
||||||
|
# Logowanie i zbieranie metryk – logujemy czas rozpoczęcia, adres IP, endpoint i metodę
|
||||||
|
@app.before_request
|
||||||
|
def before_request_logging():
|
||||||
|
request.start_time = time.time()
|
||||||
|
client_ip = request.remote_addr
|
||||||
|
endpoint = request.path
|
||||||
|
logger.info(f"Request from {client_ip} to {endpoint} [{request.method}], Auth: {request.headers.get('Authorization')}")
|
||||||
|
metrics["total_requests"] += 1
|
||||||
|
if endpoint not in metrics["endpoints"]:
|
||||||
|
metrics["endpoints"][endpoint] = {"count": 0, "total_time": 0.0}
|
||||||
|
metrics["endpoints"][endpoint]["count"] += 1
|
||||||
|
|
||||||
|
@app.after_request
|
||||||
|
def after_request_logging(response):
|
||||||
|
elapsed = time.time() - request.start_time
|
||||||
|
metrics["total_time"] += elapsed
|
||||||
|
endpoint = request.path
|
||||||
|
if endpoint in metrics["endpoints"]:
|
||||||
|
metrics["endpoints"][endpoint]["total_time"] += elapsed
|
||||||
|
logger.info(f"Completed {endpoint} in {elapsed:.3f} sec with status {response.status_code}")
|
||||||
|
return response
|
||||||
|
|
||||||
|
# Endpoint GET /hosts – pobiera zawartość /etc/hosts
|
||||||
|
@app.route('/hosts', methods=['GET'])
|
||||||
|
def get_hosts():
|
||||||
|
require_auth()
|
||||||
|
metrics["hosts_get"] += 1
|
||||||
|
try:
|
||||||
|
with open('/etc/hosts', 'r') as f:
|
||||||
|
content = f.read()
|
||||||
|
logger.info(f"/hosts GET successful from {request.remote_addr}")
|
||||||
|
return jsonify({"hosts": content})
|
||||||
|
except Exception as e:
|
||||||
|
logger.error(f"/hosts GET error: {str(e)}")
|
||||||
|
return jsonify({"error": str(e)}), 500
|
||||||
|
|
||||||
|
# Endpoint POST /hosts – aktualizuje plik /etc/hosts
|
||||||
|
@app.route('/hosts', methods=['POST'])
|
||||||
|
def update_hosts():
|
||||||
|
require_auth()
|
||||||
|
metrics["hosts_post"] += 1
|
||||||
|
data = request.get_json()
|
||||||
|
if not data or "hosts" not in data:
|
||||||
|
logger.warning(f"/hosts POST: missing 'hosts' key from {request.remote_addr}")
|
||||||
|
return jsonify({"error": "Invalid request, missing 'hosts' key"}), 400
|
||||||
|
new_content = data["hosts"]
|
||||||
|
try:
|
||||||
|
with open('/etc/hosts', 'w') as f:
|
||||||
|
f.write(new_content)
|
||||||
|
logger.info(f"/hosts POST updated by {request.remote_addr}")
|
||||||
|
return jsonify({"message": "File updated successfully"})
|
||||||
|
except Exception as e:
|
||||||
|
logger.error(f"/hosts POST error: {str(e)}")
|
||||||
|
return jsonify({"error": str(e)}), 500
|
||||||
|
|
||||||
|
# Endpoint /health – zwraca status usługi
|
||||||
|
@app.route('/health', methods=['GET'])
|
||||||
|
def health():
|
||||||
|
require_auth()
|
||||||
|
uptime = time.time() - psutil.boot_time()
|
||||||
|
now = datetime.now(timezone.utc).isoformat()
|
||||||
|
logger.info(f"/health check from {request.remote_addr}")
|
||||||
|
return jsonify({"status": "ok", "time": now, "uptime": uptime})
|
||||||
|
|
||||||
|
# Endpoint /metrics – zwraca metryki
|
||||||
|
@app.route('/metrics', methods=['GET'])
|
||||||
|
def metrics_endpoint():
|
||||||
|
require_auth()
|
||||||
|
avg_time = metrics["total_time"] / metrics["total_requests"] if metrics["total_requests"] > 0 else 0.0
|
||||||
|
ep_data = {}
|
||||||
|
for ep, data in metrics["endpoints"].items():
|
||||||
|
ep_avg = data["total_time"] / data["count"] if data["count"] > 0 else 0.0
|
||||||
|
ep_data[ep] = {"count": data["count"], "avg_time": ep_avg}
|
||||||
|
response_data = {
|
||||||
|
"total_requests": metrics["total_requests"],
|
||||||
|
"avg_response_time": avg_time,
|
||||||
|
"endpoints": ep_data,
|
||||||
|
"hosts_get": metrics.get("hosts_get", 0),
|
||||||
|
"hosts_post": metrics.get("hosts_post", 0)
|
||||||
|
}
|
||||||
|
logger.info(f"/metrics accessed by {request.remote_addr}")
|
||||||
|
return jsonify(response_data)
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
app.run(
|
||||||
|
host='0.0.0.0',
|
||||||
|
port=8000,
|
||||||
|
ssl_context=('/opt/hosts_daemon/ssl/hosts_daemon.crt', '/opt/hosts_daemon/ssl/hosts_daemon.key')
|
||||||
|
)
|
14
hosts_daemon.service
Normal file
14
hosts_daemon.service
Normal file
@ -0,0 +1,14 @@
|
|||||||
|
[Unit]
|
||||||
|
Description=Hosts Daemon Service
|
||||||
|
After=network.target
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
User=hostsdaemon
|
||||||
|
Group=hostsdaemon
|
||||||
|
WorkingDirectory=/opt/hosts_daemon
|
||||||
|
ExecStart=/opt/hosts_daemon/venv/bin/gunicorn --bind 0.0.0.0:8000 --certfile=/opt/hosts_daemon/ssl/hosts_daemon.crt --keyfile=/opt/hosts_daemon/ssl/hosts_daemon.key app:app
|
||||||
|
Restart=always
|
||||||
|
Environment="PATH=/opt/hosts_daemon/venv/bin"
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
8
requirements.txt
Normal file
8
requirements.txt
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
Flask
|
||||||
|
Flask-SSLify
|
||||||
|
Flask-SQLAlchemy
|
||||||
|
paramiko
|
||||||
|
croniter
|
||||||
|
tzlocal
|
||||||
|
gunicorn
|
||||||
|
psutil
|
5
ssl.txt
Normal file
5
ssl.txt
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
sudo mkdir -p /opt/hosts_daemon/ssl
|
||||||
|
sudo openssl req -x509 -nodes -days 3650-newkey rsa:2048 \
|
||||||
|
-keyout /opt/hosts_daemon/ssl/hosts_daemon.key \
|
||||||
|
-out /opt/hosts_daemon/ssl/hosts_daemon.crt \
|
||||||
|
-subj "/C=PL/ST=WLKP/L=POZ/O=linuxiarz.pl/OU=hostsDaemon/CN=0.0.0.0"
|
Loading…
x
Reference in New Issue
Block a user