line |
stmt |
bran |
cond |
sub |
pod |
time |
code |
1
|
|
|
|
|
|
|
#!/usr/bin/perl |
2
|
|
|
|
|
|
|
|
3
|
|
|
|
|
|
|
# Helper package in order to provide credentials |
4
|
|
|
|
|
|
|
# in the request |
5
|
|
|
|
|
|
|
package JMX::Jmx4Perl::Agent::UserAgent; |
6
|
2
|
|
|
2
|
|
9
|
use base qw(LWP::UserAgent); |
|
2
|
|
|
|
|
4
|
|
|
2
|
|
|
|
|
1882
|
|
7
|
|
|
|
|
|
|
|
8
|
2
|
|
|
2
|
|
44992
|
use Sys::SigAction; |
|
2
|
|
|
|
|
28786
|
|
|
2
|
|
|
|
|
114
|
|
9
|
|
|
|
|
|
|
|
10
|
2
|
|
|
2
|
|
17
|
use vars qw($HAS_BLOWFISH_PP $BF); |
|
2
|
|
|
|
|
4
|
|
|
2
|
|
|
|
|
112
|
|
11
|
2
|
|
|
2
|
|
10
|
use strict; |
|
2
|
|
|
|
|
3
|
|
|
2
|
|
|
|
|
131
|
|
12
|
|
|
|
|
|
|
|
13
|
|
|
|
|
|
|
BEGIN { |
14
|
2
|
|
|
2
|
|
136
|
$HAS_BLOWFISH_PP = eval "require Crypt::Blowfish_PP; 1"; |
15
|
2
|
50
|
|
|
|
16
|
if ($HAS_BLOWFISH_PP) { |
16
|
2
|
|
|
|
|
13
|
$BF = new Crypt::Blowfish_PP(pack("C10",0x16,0x51,0xAE,0x13,0xF2,0xFA,0x11,0x20,0x6E,0x6A)); |
17
|
|
|
|
|
|
|
} |
18
|
|
|
|
|
|
|
} |
19
|
|
|
|
|
|
|
|
20
|
|
|
|
|
|
|
|
21
|
|
|
|
|
|
|
=head1 NAME |
22
|
|
|
|
|
|
|
|
23
|
|
|
|
|
|
|
JMX::Jmx4Perl::Agent::UserAgent - Specialized L adding |
24
|
|
|
|
|
|
|
authentication support |
25
|
|
|
|
|
|
|
|
26
|
|
|
|
|
|
|
=head1 DESCRIPTION |
27
|
|
|
|
|
|
|
|
28
|
|
|
|
|
|
|
Simple subclass implementing an own C method for support |
29
|
|
|
|
|
|
|
of basic and proxy authentication. This is an internal class used by |
30
|
|
|
|
|
|
|
L. |
31
|
|
|
|
|
|
|
|
32
|
|
|
|
|
|
|
=cut |
33
|
|
|
|
|
|
|
|
34
|
|
|
|
|
|
|
|
35
|
|
|
|
|
|
|
# Constructor setting the proper SSL options (if possible) |
36
|
|
|
|
|
|
|
sub new { |
37
|
4
|
|
|
4
|
1
|
11
|
my $class = shift; |
38
|
4
|
|
33
|
|
|
22
|
my @opts = @_ || (); |
39
|
4
|
50
|
|
|
|
72
|
if (LWP::UserAgent->VERSION >= 6.00) { |
40
|
|
|
|
|
|
|
# We don't verify Hostnames by default, since the information we are |
41
|
|
|
|
|
|
|
# sending is typically not critical. Also, we don't have yet a way to |
42
|
|
|
|
|
|
|
# configure a keystore, so this is the only chance for now. Ask me to add |
43
|
|
|
|
|
|
|
# host certificate verification if wanted. It disabled only for LWP >= 6.00 |
44
|
4
|
|
|
|
|
14
|
push @opts,(ssl_opts => { verify_hostname => 0 }); |
45
|
|
|
|
|
|
|
}; |
46
|
4
|
|
|
|
|
37
|
return $class->SUPER::new(@opts); |
47
|
|
|
|
|
|
|
} |
48
|
|
|
|
|
|
|
|
49
|
|
|
|
|
|
|
# Request using a more robust timeout See |
50
|
|
|
|
|
|
|
# http://stackoverflow.com/questions/73308/true-timeout-on-lwpuseragent-request-method |
51
|
|
|
|
|
|
|
# for details. |
52
|
|
|
|
|
|
|
sub request { |
53
|
0
|
|
|
0
|
1
|
0
|
my $self = shift; |
54
|
0
|
|
|
|
|
0
|
my $req = shift; |
55
|
|
|
|
|
|
|
|
56
|
|
|
|
|
|
|
# Get whatever timeout is set for LWP and use that to |
57
|
|
|
|
|
|
|
# enforce a maximum timeout per request. |
58
|
2
|
|
|
2
|
|
242389
|
use Sys::SigAction qw(timeout_call); |
|
2
|
|
|
|
|
4
|
|
|
2
|
|
|
|
|
1440
|
|
59
|
0
|
|
|
|
|
0
|
our $res = undef; |
60
|
0
|
0
|
|
0
|
|
0
|
if (timeout_call($self->timeout(), sub { $res = $self->SUPER::request($req); })) { |
|
0
|
|
|
|
|
0
|
|
61
|
|
|
|
|
|
|
# 408 == HTTP timeout |
62
|
0
|
|
|
|
|
0
|
my $ret = HTTP::Response->new(408,"Got timeout in " . $self->timeout() . "s "); |
63
|
0
|
|
|
|
|
0
|
$ret->request($req); |
64
|
0
|
|
|
|
|
0
|
return $ret; |
65
|
|
|
|
|
|
|
} else { |
66
|
0
|
|
|
|
|
0
|
return $res; |
67
|
|
|
|
|
|
|
} |
68
|
|
|
|
|
|
|
|
69
|
|
|
|
|
|
|
} |
70
|
|
|
|
|
|
|
|
71
|
|
|
|
|
|
|
sub jjagent_config { |
72
|
4
|
|
|
4
|
0
|
7
|
my $self = shift; |
73
|
4
|
|
|
|
|
14
|
$self->{jjagent_config} = shift; |
74
|
|
|
|
|
|
|
} |
75
|
|
|
|
|
|
|
|
76
|
|
|
|
|
|
|
sub get_basic_credentials { |
77
|
0
|
|
|
0
|
1
|
|
my ($self, $realm, $uri, $isproxy) = @_; |
78
|
|
|
|
|
|
|
|
79
|
0
|
|
0
|
|
|
|
my $cfg = $self->{jjagent_config} || {}; |
80
|
0
|
0
|
|
|
|
|
my $user = $isproxy ? $self->proxy_cfg($cfg,"user") : $cfg->{user}; |
81
|
0
|
0
|
|
|
|
|
my $password = $isproxy ? $self->proxy_cfg($cfg,"password") : $cfg->{password}; |
82
|
0
|
0
|
0
|
|
|
|
if ($user && $password) { |
83
|
0
|
|
|
|
|
|
return ($user,$self->conditionally_decrypt($password)); |
84
|
|
|
|
|
|
|
} else { |
85
|
0
|
|
|
|
|
|
return (undef,undef); |
86
|
|
|
|
|
|
|
} |
87
|
|
|
|
|
|
|
} |
88
|
|
|
|
|
|
|
|
89
|
|
|
|
|
|
|
sub proxy_cfg { |
90
|
0
|
|
|
0
|
0
|
|
my ($self,$cfg,$what) = @_; |
91
|
0
|
|
|
|
|
|
my $proxy = $cfg->{proxy}; |
92
|
0
|
0
|
|
|
|
|
if (ref($proxy) eq "HASH") { |
93
|
0
|
|
|
|
|
|
return $proxy->{$what}; |
94
|
|
|
|
|
|
|
} else { |
95
|
0
|
|
|
|
|
|
return $cfg->{"proxy_" . $what}; |
96
|
|
|
|
|
|
|
} |
97
|
|
|
|
|
|
|
} |
98
|
|
|
|
|
|
|
|
99
|
|
|
|
|
|
|
sub conditionally_decrypt { |
100
|
0
|
|
|
0
|
0
|
|
my $self = shift; |
101
|
0
|
|
|
|
|
|
my $password = shift; |
102
|
0
|
0
|
|
|
|
|
if ($password =~ /^\[\[\s*(.*)\s*\]\]$/) { |
103
|
|
|
|
|
|
|
# It's a encrypted password, lets decrypt it here |
104
|
0
|
|
|
|
|
|
return decrypt($1); |
105
|
|
|
|
|
|
|
} else { |
106
|
0
|
|
|
|
|
|
return $password; |
107
|
|
|
|
|
|
|
} |
108
|
|
|
|
|
|
|
} |
109
|
|
|
|
|
|
|
|
110
|
|
|
|
|
|
|
sub decrypt { |
111
|
0
|
|
|
0
|
0
|
|
my $encrypted = shift; |
112
|
0
|
0
|
|
|
|
|
die "No encryption available. Please install Crypt::Blowfish_PP" unless $HAS_BLOWFISH_PP; |
113
|
0
|
|
|
|
|
|
my $rest = $encrypted; |
114
|
0
|
|
|
|
|
|
my $ret = ""; |
115
|
0
|
|
|
|
|
|
while (length($rest) > 0) { |
116
|
0
|
|
|
|
|
|
my $block = substr($rest,0,16); |
117
|
0
|
|
|
|
|
|
$rest = substr($rest,16); |
118
|
0
|
|
|
|
|
|
$ret .= $BF->decrypt(pack("H*",$block)); |
119
|
|
|
|
|
|
|
} |
120
|
0
|
|
|
|
|
|
$ret =~ s/\s*$//; |
121
|
0
|
|
|
|
|
|
return $ret; |
122
|
|
|
|
|
|
|
} |
123
|
|
|
|
|
|
|
|
124
|
|
|
|
|
|
|
sub encrypt { |
125
|
0
|
|
|
0
|
0
|
|
my $plain = shift; |
126
|
0
|
0
|
|
|
|
|
die "No encryption available. Please install Crypt::Blowfish_PP" unless $HAS_BLOWFISH_PP; |
127
|
0
|
|
|
|
|
|
my $rest = $plain; |
128
|
0
|
|
|
|
|
|
my $ret = ""; |
129
|
0
|
|
|
|
|
|
while (length($rest) > 0) { |
130
|
0
|
|
|
|
|
|
my $block = substr($rest,0,8); |
131
|
0
|
0
|
|
|
|
|
if (length($block) < 8) { |
132
|
0
|
|
|
|
|
|
$block .= " " x (8 - length($block)); |
133
|
|
|
|
|
|
|
} |
134
|
0
|
|
|
|
|
|
$rest = substr($rest,8); |
135
|
0
|
|
|
|
|
|
$ret .= unpack("H*",$BF->encrypt($block)); |
136
|
|
|
|
|
|
|
} |
137
|
0
|
|
|
|
|
|
return $ret; |
138
|
|
|
|
|
|
|
} |
139
|
|
|
|
|
|
|
|
140
|
|
|
|
|
|
|
=head1 LICENSE |
141
|
|
|
|
|
|
|
|
142
|
|
|
|
|
|
|
This file is part of jmx4perl. |
143
|
|
|
|
|
|
|
Jmx4perl is free software: you can redistribute it and/or modify |
144
|
|
|
|
|
|
|
it under the terms of the GNU General Public License as published by |
145
|
|
|
|
|
|
|
The Free Software Foundation, either version 2 of the License, or |
146
|
|
|
|
|
|
|
(at your option) any later version. |
147
|
|
|
|
|
|
|
|
148
|
|
|
|
|
|
|
jmx4perl is distributed in the hope that it will be useful, |
149
|
|
|
|
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of |
150
|
|
|
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
151
|
|
|
|
|
|
|
GNU General Public License for more details. |
152
|
|
|
|
|
|
|
|
153
|
|
|
|
|
|
|
You should have received a copy of the GNU General Public License |
154
|
|
|
|
|
|
|
along with jmx4perl. If not, see . |
155
|
|
|
|
|
|
|
|
156
|
|
|
|
|
|
|
A commercial license is available as well. Please contact roland@cpan.org for |
157
|
|
|
|
|
|
|
further details. |
158
|
|
|
|
|
|
|
|
159
|
|
|
|
|
|
|
=head1 AUTHOR |
160
|
|
|
|
|
|
|
|
161
|
|
|
|
|
|
|
roland@cpan.org |
162
|
|
|
|
|
|
|
|
163
|
|
|
|
|
|
|
=cut |
164
|
|
|
|
|
|
|
|
165
|
|
|
|
|
|
|
1; |
166
|
|
|
|
|
|
|
|
167
|
|
|
|
|
|
|
__DATA__ |