1 | # -*- coding: utf-8 -*- |
||
2 | # Copyright (C) 2017-2021 Greenbone Networks GmbH |
||
3 | # |
||
4 | # SPDX-License-Identifier: GPL-3.0-or-later |
||
5 | # |
||
6 | # This program is free software: you can redistribute it and/or modify |
||
7 | # it under the terms of the GNU General Public License as published by |
||
8 | # the Free Software Foundation, either version 3 of the License, or |
||
9 | # (at your option) any later version. |
||
10 | # |
||
11 | # This program is distributed in the hope that it will be useful, |
||
12 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
||
13 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
||
14 | # GNU General Public License for more details. |
||
15 | # |
||
16 | # You should have received a copy of the GNU General Public License |
||
17 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
||
18 | |||
19 | # pylint: disable=too-many-lines |
||
20 | |||
21 | import logging |
||
22 | import os |
||
23 | import re |
||
24 | import signal |
||
25 | import sqlite3 |
||
26 | import sys |
||
27 | import tempfile |
||
28 | |||
29 | from argparse import ArgumentParser, RawTextHelpFormatter |
||
30 | from datetime import datetime, timedelta, tzinfo |
||
31 | from decimal import Decimal |
||
32 | from pathlib import Path |
||
33 | |||
34 | from lxml import etree |
||
35 | |||
36 | __version__ = "2.0.0" |
||
37 | |||
38 | logger = logging.getLogger(__name__) |
||
39 | |||
40 | HELP_TEXT = """ |
||
41 | Check-GMP Nagios Command Plugin {version} (C) 2017-2021 Greenbone Networks GmbH |
||
42 | |||
43 | This program is free software: you can redistribute it and/or modify |
||
44 | it under the terms of the GNU General Public License as published by |
||
45 | the Free Software Foundation, either version 3 of the License, or |
||
46 | (at your option) any later version. |
||
47 | |||
48 | This program is distributed in the hope that it will be useful, |
||
49 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
||
50 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
||
51 | GNU General Public License for more details. |
||
52 | |||
53 | You should have received a copy of the GNU General Public License |
||
54 | along with this program. If not, see <http://www.gnu.org/licenses/>. |
||
55 | """.format( |
||
56 | version=__version__ |
||
57 | ) |
||
58 | |||
59 | NAGIOS_OK = 0 |
||
60 | NAGIOS_WARNING = 1 |
||
61 | NAGIOS_CRITICAL = 2 |
||
62 | NAGIOS_UNKNOWN = 3 |
||
63 | |||
64 | NAGIOS_MSG = ["OK", "WARNING", "CRITICAL", "UNKNOWN"] |
||
65 | |||
66 | MAX_RUNNING_INSTANCES = 10 |
||
67 | |||
68 | |||
69 | class InstanceManager: |
||
70 | """Class for managing instances of this plugin |
||
71 | |||
72 | All new reports will be cached in a sqlite database. |
||
73 | The first call with a unknown host takes longer, |
||
74 | because the remote gvmd/openvasmd has to generate the report. |
||
75 | The second call will retrieve the data from the database if the scan |
||
76 | duration does not differ. |
||
77 | |||
78 | Additionally this class handles all instances of check-gmp. No more than |
||
79 | MAX_RUNNING_INSTANCES can run simultaneously. Other instances are stopped |
||
80 | and wait for continuation. |
||
81 | """ |
||
82 | |||
83 | def __init__(self, path, parser): |
||
84 | """Initialise the sqlite database. |
||
85 | |||
86 | Create it if it does not exist else connect to it. |
||
87 | |||
88 | Arguments: |
||
89 | path (string): Path to the database. |
||
90 | """ |
||
91 | self.cursor = None |
||
92 | self.con_db = None |
||
93 | self.db = Path(path) |
||
94 | self.pid = os.getpid() |
||
95 | |||
96 | # Try to read file with information about cached reports |
||
97 | # First check whether the file exist or not |
||
98 | try: |
||
99 | exist = self.db.is_file() |
||
100 | logger.debug("DB file exist?: %s ", exist) |
||
101 | |||
102 | if not exist: |
||
103 | if not self.db.parent.is_dir(): |
||
104 | self.db.parent.mkdir(parents=True, exist_ok=True) |
||
105 | else: |
||
106 | self.db.touch() |
||
107 | # Connect to db |
||
108 | self.connect_db() |
||
109 | |||
110 | # Create the tables |
||
111 | self.cursor.execute( |
||
112 | """CREATE TABLE Report( |
||
113 | host text, |
||
114 | scan_end text, |
||
115 | params_used text, |
||
116 | report text |
||
117 | )""" |
||
118 | ) |
||
119 | |||
120 | self.cursor.execute( |
||
121 | """CREATE TABLE Instance( |
||
122 | created_at text, |
||
123 | pid integer, |
||
124 | pending integer default 0 |
||
125 | )""" |
||
126 | ) |
||
127 | |||
128 | logger.debug("Tables created") |
||
129 | else: |
||
130 | self.connect_db() |
||
131 | |||
132 | except PermissionError: |
||
133 | parser.error( |
||
134 | "The selected temporary database file {} or the parent dir has" |
||
135 | " not the correct permissions.".format(self.db) |
||
136 | ) |
||
137 | |||
138 | @staticmethod |
||
139 | def _to_sql_bool(pending): |
||
140 | """Replace True/False with 1/0.""" |
||
141 | return '1' if pending else '0' |
||
142 | |||
143 | def connect_db(self): |
||
144 | """Connect to the database |
||
145 | |||
146 | Simply connect to the database at location <path> |
||
147 | """ |
||
148 | try: |
||
149 | logger.debug("connect db: %s", self.db) |
||
150 | self.con_db = sqlite3.connect(str(self.db)) |
||
151 | self.cursor = self.con_db.cursor() |
||
152 | logger.debug(sqlite3.sqlite_version) |
||
153 | except Exception as e: # pylint: disable=broad-except |
||
154 | logger.debug(e) |
||
155 | |||
156 | def close_db(self): |
||
157 | """Close database""" |
||
158 | self.con_db.close() |
||
159 | |||
160 | def set_host(self, host): |
||
161 | """Sets the host variable |
||
162 | |||
163 | Arguments: |
||
164 | host (string): Given ip or hostname of target. |
||
165 | """ |
||
166 | self.host = host |
||
167 | |||
168 | def is_old_report(self, last_scan_end, params_used): |
||
169 | """Decide whether the current report is old or not |
||
170 | |||
171 | At first the last scanend and the params that were used are fetched |
||
172 | from the database. If no report is fetched, then True will be returned. |
||
173 | The next step is to compare the old and the new scanend. |
||
174 | If the scanends matches, then return False, because it is the same |
||
175 | report. Else the old report will be deleted. |
||
176 | |||
177 | Arguments: |
||
178 | last_scan_end (string): Last scan end of report |
||
179 | params_used (string): Params used for this check |
||
180 | |||
181 | Returns: |
||
182 | True if it is an old report or empty. False if it is the same |
||
183 | report. |
||
184 | """ |
||
185 | |||
186 | # Before we do anything here, check existing instance |
||
187 | |||
188 | # Retrieve the scan_end value |
||
189 | self.cursor.execute( |
||
190 | "SELECT scan_end, params_used FROM Report WHERE" " host=?", |
||
191 | (self.host,), |
||
192 | ) |
||
193 | db_entry = self.cursor.fetchone() |
||
194 | |||
195 | logger.debug("%s %s", db_entry, last_scan_end) |
||
196 | |||
197 | if not db_entry: |
||
198 | return True |
||
199 | else: |
||
200 | old = parse_date(db_entry[0]) |
||
201 | new = parse_date(last_scan_end) |
||
202 | |||
203 | logger.debug( |
||
204 | "Old time (from db): %s\n" "New time (from rp): %s", old, new |
||
205 | ) |
||
206 | |||
207 | if new <= old and params_used == db_entry[1]: |
||
208 | return False |
||
209 | else: |
||
210 | # Report is newer. Delete old entry. |
||
211 | logger.debug("Delete old report for host %s", self.host) |
||
212 | self.delete_report() |
||
213 | return True |
||
214 | |||
215 | def load_local_report(self): |
||
216 | """Load report from local database |
||
217 | |||
218 | Select the report from the database according due the hostname or ip. |
||
219 | |||
220 | Returns: |
||
221 | An lxml ElementTree |
||
222 | """ |
||
223 | self.cursor.execute( |
||
224 | "SELECT report FROM Report WHERE host=?", (self.host,) |
||
225 | ) |
||
226 | db_entry = self.cursor.fetchone() |
||
227 | |||
228 | if db_entry: |
||
229 | return etree.fromstring(db_entry[0]) |
||
230 | else: |
||
231 | logger.debug("Report from host %s is not in the db", self.host) |
||
232 | |||
233 | def add_report(self, scan_end, params_used, report): |
||
234 | """Create new entry with the lxml report |
||
235 | |||
236 | Create a string from the lxml object and add it to the database. |
||
237 | Additional data is the scanend and the params used. |
||
238 | |||
239 | Arguments: |
||
240 | scan_end (string): Scan end of the report |
||
241 | params_used (string): Params used for this check |
||
242 | report (obj): An lxml ElementTree |
||
243 | """ |
||
244 | |||
245 | data = etree.tostring(report) |
||
246 | |||
247 | logger.debug("add_report: %s, %s, %s", self.host, scan_end, params_used) |
||
248 | |||
249 | # Insert values |
||
250 | self.cursor.execute( |
||
251 | "INSERT INTO Report VALUES (?, ?, ?, ?)", |
||
252 | (self.host, scan_end, params_used, data), |
||
253 | ) |
||
254 | |||
255 | # Save the changes |
||
256 | self.con_db.commit() |
||
257 | |||
258 | def delete_report(self): |
||
259 | """Delete report from database""" |
||
260 | self.cursor.execute("DELETE FROM Report WHERE host=?", (self.host,)) |
||
261 | |||
262 | # Save the changes |
||
263 | self.con_db.commit() |
||
264 | |||
265 | def delete_entry_with_ip(self, ip): |
||
266 | """Delete report from database with given ip |
||
267 | |||
268 | Arguments: |
||
269 | ip (string): IP-Adress |
||
270 | """ |
||
271 | logger.debug("Delete entry with ip: %s", ip) |
||
272 | self.cursor.execute("DELETE FROM Report WHERE host=?", (ip,)) |
||
273 | self.con_db.isolation_level = None |
||
274 | self.cursor.execute("VACUUM") |
||
275 | self.con_db.isolation_level = '' # see: https://github.com/CxAalto/gtfspy/commit/8d05c3c94a6d4ca3ed675d88af93def7d5053bfe # pylint: disable=line-too-long |
||
276 | # Save the changes |
||
277 | self.con_db.commit() |
||
278 | |||
279 | def delete_older_entries(self, days): |
||
280 | """Delete reports from database older than given days |
||
281 | |||
282 | Arguments: |
||
283 | days (int): Number of days in past |
||
284 | """ |
||
285 | logger.debug("Delete entries older than: %s days", days) |
||
286 | self.cursor.execute( |
||
287 | "DELETE FROM Report WHERE scan_end <= " |
||
288 | 'date("now", "-%s day")' % days |
||
289 | ) |
||
290 | self.cursor.execute("VACUUM") |
||
291 | |||
292 | # Save the changes |
||
293 | self.con_db.commit() |
||
294 | |||
295 | def has_entries(self, pending): |
||
296 | """Return number of instance entries |
||
297 | Arguments: |
||
298 | pending (bool): True for pending instances. False for running |
||
299 | instances. |
||
300 | |||
301 | Returns: |
||
302 | The number of pending or non pending instances entries. |
||
303 | """ |
||
304 | self.cursor.execute( |
||
305 | "SELECT count(*) FROM Instance WHERE pending=?", |
||
306 | (self._to_sql_bool(pending),), |
||
307 | ) |
||
308 | |||
309 | res = self.cursor.fetchone() |
||
310 | |||
311 | return res[0] |
||
312 | |||
313 | def check_instances(self): |
||
314 | """This method checks the status of check-gmp instances. |
||
315 | |||
316 | Checks whether instances are pending or not and start instances |
||
317 | according to the number saved in the MAX_RUNNING_INSTANCES variable. |
||
318 | """ |
||
319 | |||
320 | # Need to check whether any instances are in the database that were |
||
321 | # killed f.e. because a restart of nagios |
||
322 | self.clean_orphaned_instances() |
||
323 | |||
324 | # How many processes are currently running? |
||
325 | number_instances = self.has_entries(pending=False) |
||
326 | |||
327 | # How many pending entries are waiting? |
||
328 | number_pending_instances = self.has_entries(pending=True) |
||
329 | |||
330 | logger.debug( |
||
331 | "check_instances: %i %i", number_instances, number_pending_instances |
||
332 | ) |
||
333 | |||
334 | if ( |
||
335 | number_instances < MAX_RUNNING_INSTANCES |
||
336 | and number_pending_instances == 0 |
||
337 | ): |
||
338 | # Add entry for running process and go on |
||
339 | logger.debug("Fall 1") |
||
340 | self.add_instance(pending=False) |
||
341 | |||
342 | elif ( |
||
343 | number_instances < MAX_RUNNING_INSTANCES |
||
344 | and number_pending_instances > 0 |
||
345 | ): |
||
346 | # Change pending entries and wake them up until enough instances |
||
347 | # are running |
||
348 | logger.debug("Fall 2") |
||
349 | |||
350 | while ( |
||
351 | number_instances < MAX_RUNNING_INSTANCES |
||
352 | and number_pending_instances > 0 |
||
353 | ): |
||
354 | pending_entries = self.get_oldest_pending_entries( |
||
355 | MAX_RUNNING_INSTANCES - number_instances |
||
356 | ) |
||
357 | |||
358 | logger.debug("Oldest pending pids: %s", pending_entries) |
||
359 | |||
360 | for entry in pending_entries: |
||
361 | created_at = entry[0] |
||
362 | pid = entry[1] |
||
363 | |||
364 | # Change status to not pending and continue the process |
||
365 | self.update_pending_status(created_at, False) |
||
366 | self.start_process(pid) |
||
367 | |||
368 | # Refresh number of instances for next while loop |
||
369 | number_instances = self.has_entries(pending=False) |
||
370 | number_pending_instances = self.has_entries(pending=True) |
||
371 | |||
372 | # TODO: Check if this is really necessary |
||
373 | # self.add_instance(pending=False) |
||
374 | # if number_instances >= MAX_RUNNING_INSTANCES: |
||
375 | # self.stop_process(self.pid) |
||
376 | |||
377 | elif ( |
||
378 | number_instances >= MAX_RUNNING_INSTANCES |
||
379 | and number_pending_instances == 0 |
||
380 | ): |
||
381 | # There are running enough instances and no pending instances |
||
382 | # Add new entry with pending status true and stop this instance |
||
383 | logger.debug("Fall 3") |
||
384 | self.add_instance(pending=True) |
||
385 | self.stop_process(self.pid) |
||
386 | |||
387 | elif ( |
||
388 | number_instances >= MAX_RUNNING_INSTANCES |
||
389 | and number_pending_instances > 0 |
||
390 | ): |
||
391 | # There are running enough instances and there are min one |
||
392 | # pending instance |
||
393 | # Add new entry with pending true and stop this instance |
||
394 | logger.debug("Fall 4") |
||
395 | self.add_instance(pending=True) |
||
396 | self.stop_process(self.pid) |
||
397 | |||
398 | # If an entry is pending and the same params at another process is |
||
399 | # starting, then exit with gmp pending since data |
||
400 | # if self.has_pending_entries(): |
||
401 | # Check if an pending entry is the same as this process |
||
402 | # If hostname |
||
403 | # date = datetime.now() |
||
404 | # end_session('GMP PENDING: since %s' % date, NAGIOS_OK) |
||
405 | # end_session('GMP RUNNING: since', NAGIOS_OK) |
||
406 | |||
407 | def add_instance(self, pending): |
||
408 | """Add new instance entry to database |
||
409 | |||
410 | Retrieve the current time in ISO 8601 format. Create a new entry with |
||
411 | pending status and the dedicated pid |
||
412 | |||
413 | Arguments: |
||
414 | pending (bool): State of instance |
||
415 | """ |
||
416 | current_time = datetime.now().isoformat() |
||
417 | |||
418 | # Insert values |
||
419 | self.cursor.execute( |
||
420 | "INSERT INTO Instance VALUES (?, ?, ?)", |
||
421 | (current_time, self.pid, self._to_sql_bool(pending)), |
||
422 | ) |
||
423 | |||
424 | # Save the changes |
||
425 | self.con_db.commit() |
||
426 | |||
427 | def get_oldest_pending_entries(self, number): |
||
428 | """Return the oldest last entries of pending entries from database |
||
429 | |||
430 | Return: |
||
431 | the oldest instances with status pending limited by the variable |
||
432 | <number> |
||
433 | """ |
||
434 | self.cursor.execute( |
||
435 | "SELECT * FROM Instance WHERE pending=1 ORDER BY " |
||
436 | "created_at LIMIT ? ", |
||
437 | (number,), |
||
438 | ) |
||
439 | return self.cursor.fetchall() |
||
440 | |||
441 | def update_pending_status(self, date, pending): |
||
442 | """Update pending status of instance |
||
443 | |||
444 | The date variable works as a primary key for the instance table. |
||
445 | The entry with date get his pending status updated. |
||
446 | |||
447 | Arguments: |
||
448 | date (string): Date of creation for entry |
||
449 | pending (bool): Status of instance |
||
450 | """ |
||
451 | self.cursor.execute( |
||
452 | "UPDATE Instance SET pending=? WHERE created_at=?", |
||
453 | (self._to_sql_bool(pending), date), |
||
454 | ) |
||
455 | |||
456 | # Save the changes |
||
457 | self.con_db.commit() |
||
458 | |||
459 | def delete_instance(self, pid=None): |
||
460 | """Delete instance from database |
||
461 | |||
462 | If a pid different from zero is given, then delete the entry with |
||
463 | given pid. Else delete the entry with the pid stored in this class |
||
464 | instance. |
||
465 | |||
466 | Keyword Arguments: |
||
467 | pid (number): Process Indentificattion Number (default: {0}) |
||
468 | """ |
||
469 | if not pid: |
||
470 | pid = self.pid |
||
471 | |||
472 | logger.debug("Delete entry with pid: %i", pid) |
||
473 | self.cursor.execute("DELETE FROM Instance WHERE pid=?", (pid,)) |
||
474 | |||
475 | # Save the changes |
||
476 | self.con_db.commit() |
||
477 | |||
478 | def clean_orphaned_instances(self): |
||
479 | """Delete non existing instance entries |
||
480 | |||
481 | This method check whether a pid exist on the os and if not then delete |
||
482 | the orphaned entry from database. |
||
483 | """ |
||
484 | self.cursor.execute("SELECT pid FROM Instance") |
||
485 | |||
486 | pids = self.cursor.fetchall() |
||
487 | |||
488 | for pid in pids: |
||
489 | if not self.check_pid(pid[0]): |
||
490 | self.delete_instance(pid[0]) |
||
491 | |||
492 | def wake_instance(self): |
||
493 | """Wake up a pending instance |
||
494 | |||
495 | This method is called at the end of any session from check_gmp. |
||
496 | Get the oldest pending entries and wake them up. |
||
497 | """ |
||
498 | # How many processes are currently running? |
||
499 | number_instances = self.has_entries(pending=False) |
||
500 | |||
501 | # How many pending entries are waiting? |
||
502 | number_pending_instances = self.has_entries(pending=True) |
||
503 | |||
504 | if ( |
||
505 | number_instances < MAX_RUNNING_INSTANCES |
||
506 | and number_pending_instances > 0 |
||
507 | ): |
||
508 | |||
509 | pending_entries = self.get_oldest_pending_entries( |
||
510 | MAX_RUNNING_INSTANCES - number_instances |
||
511 | ) |
||
512 | |||
513 | logger.debug( |
||
514 | "wake_instance: %i %i", |
||
515 | number_instances, |
||
516 | number_pending_instances, |
||
517 | ) |
||
518 | |||
519 | for entry in pending_entries: |
||
520 | created_at = entry[0] |
||
521 | pid = entry[1] |
||
522 | # Change status to not pending and continue the process |
||
523 | self.update_pending_status(created_at, False) |
||
524 | self.start_process(pid) |
||
525 | |||
526 | def start_process(self, pid): |
||
527 | """Continue a stopped process |
||
528 | |||
529 | Send a continue signal to the process with given pid |
||
530 | |||
531 | Arguments: |
||
532 | pid (int): Process Identification Number |
||
533 | """ |
||
534 | logger.debug("Continue pid: %i", pid) |
||
535 | os.kill(pid, signal.SIGCONT) |
||
536 | |||
537 | def stop_process(self, pid): |
||
538 | """Stop a running process |
||
539 | |||
540 | Send a stop signal to the process with given pid |
||
541 | |||
542 | Arguments: |
||
543 | pid (int): Process Identification Number |
||
544 | """ |
||
545 | os.kill(pid, signal.SIGSTOP) |
||
546 | |||
547 | def check_pid(self, pid): |
||
548 | """Check for the existence of a process. |
||
549 | |||
550 | Arguments: |
||
551 | pid (int): Process Identification Number |
||
552 | """ |
||
553 | try: |
||
554 | os.kill(pid, 0) |
||
555 | except OSError: |
||
556 | return False |
||
557 | else: |
||
558 | return True |
||
559 | |||
560 | |||
561 | def ping(gmp, im): |
||
562 | """Checks for connectivity |
||
563 | |||
564 | This function sends the get_version command and checks whether the status |
||
565 | is ok or not. |
||
566 | """ |
||
567 | version = gmp.get_version() |
||
568 | version_status = version.xpath("@status") |
||
569 | |||
570 | if "200" in version_status: |
||
571 | end_session(im, "GMP OK: Ping successful", NAGIOS_OK) |
||
572 | else: |
||
573 | end_session(im, "GMP CRITICAL: Machine dead?", NAGIOS_CRITICAL) |
||
574 | |||
575 | |||
576 | def status(gmp, im, script_args): |
||
577 | """Returns the current status of a host |
||
578 | |||
579 | This functions return the current state of a host. |
||
580 | Either directly over the asset management or within a task. |
||
581 | |||
582 | For a task you can explicitly ask for the trend. |
||
583 | Otherwise the last report of the task will be filtered. |
||
584 | |||
585 | In the asset management the report id in the details is taken |
||
586 | as report for the filter. |
||
587 | If the asset information contains any vulnerabilities, then will the |
||
588 | report be filtered too. With additional parameters it is possible to add |
||
589 | more information about the vulnerabilities. |
||
590 | |||
591 | * DFN-Certs |
||
592 | * Logs |
||
593 | * Autofp |
||
594 | * Scanend |
||
595 | * Overrides |
||
596 | """ |
||
597 | params_used = "task=%s autofp=%i overrides=%i apply_overrides=%i" % ( |
||
598 | script_args.task, |
||
599 | script_args.autofp, |
||
600 | int(script_args.overrides), |
||
601 | int(script_args.apply_overrides), |
||
602 | ) |
||
603 | |||
604 | if script_args.task: |
||
605 | task = gmp.get_tasks( |
||
606 | filter="permission=any owner=any rows=1 " |
||
607 | 'name="%s"' % script_args.task |
||
608 | ) |
||
609 | if script_args.trend: |
||
610 | trend = task.xpath("task/trend/text()") |
||
611 | |||
612 | if not trend: |
||
613 | end_session( |
||
614 | im, "GMP UNKNOWN: Trend is not available.", NAGIOS_UNKNOWN |
||
615 | ) |
||
616 | |||
617 | trend = trend[0] |
||
618 | |||
619 | if trend in ["up", "more"]: |
||
620 | end_session( |
||
621 | im, "GMP CRITICAL: Trend is %s." % trend, NAGIOS_CRITICAL |
||
622 | ) |
||
623 | elif trend in ["down", "same", "less"]: |
||
624 | end_session(im, "GMP OK: Trend is %s." % trend, NAGIOS_OK) |
||
625 | else: |
||
626 | end_session( |
||
627 | im, |
||
628 | "GMP UNKNOWN: Trend is unknown: %s" % trend, |
||
629 | NAGIOS_UNKNOWN, |
||
630 | ) |
||
631 | else: |
||
632 | last_report_id = task.xpath("task/last_report/report/@id") |
||
633 | |||
634 | if not last_report_id: |
||
635 | end_session( |
||
636 | im, "GMP UNKNOWN: Report is not available", NAGIOS_UNKNOWN |
||
637 | ) |
||
638 | |||
639 | last_report_id = last_report_id[0] |
||
640 | last_scan_end = task.xpath( |
||
641 | "task/last_report/report/scan_end/text()" |
||
642 | ) |
||
643 | |||
644 | if last_scan_end: |
||
645 | last_scan_end = last_scan_end[0] |
||
646 | else: |
||
647 | last_scan_end = "" |
||
648 | |||
649 | if im.is_old_report(last_scan_end, params_used): |
||
650 | host = script_args.hostaddress |
||
651 | |||
652 | full_report = gmp.get_report( |
||
653 | report_id=last_report_id, |
||
654 | filter="sort-reverse=id result_hosts_only=1 " |
||
655 | "min_cvss_base= min_qod= levels=hmlgd autofp={} " |
||
656 | "notes=0 apply_overrides={} overrides={} first=1 rows=-1 " |
||
657 | "delta_states=cgns host={}".format( |
||
658 | script_args.autofp, |
||
659 | int(script_args.overrides), |
||
660 | int(script_args.apply_overrides), |
||
661 | host, |
||
662 | ), |
||
663 | details=True, |
||
664 | ) |
||
665 | |||
666 | im.add_report(last_scan_end, params_used, full_report) |
||
667 | logger.debug("Report added to db") |
||
668 | else: |
||
669 | full_report = im.load_local_report() |
||
670 | |||
671 | filter_report( |
||
672 | im, full_report.xpath("report/report")[0], script_args |
||
673 | ) |
||
674 | |||
675 | |||
676 | def filter_report(im, report, script_args): |
||
677 | """Filter out the information in a report |
||
678 | |||
679 | This function filters the results of a given report. |
||
680 | |||
681 | Arguments: |
||
682 | report (obj): Report as lxml ElementTree. |
||
683 | """ |
||
684 | report_id = report.xpath("@id") |
||
685 | if report_id: |
||
686 | report_id = report_id[0] |
||
687 | results = report.xpath("//results") |
||
688 | if not results: |
||
689 | end_session( |
||
690 | im, "GMP UNKNOWN: Failed to get results list", NAGIOS_UNKNOWN |
||
691 | ) |
||
692 | |||
693 | results = results[0] |
||
694 | # Init variables |
||
695 | any_found = False |
||
696 | high_count = 0 |
||
697 | medium_count = 0 |
||
698 | low_count = 0 |
||
699 | log_count = 0 |
||
700 | error_count = 0 |
||
701 | |||
702 | nvts = {"high": [], "medium": [], "low": [], "log": []} |
||
703 | |||
704 | all_results = results.xpath("result") |
||
705 | |||
706 | for result in all_results: |
||
707 | if script_args.hostaddress: |
||
708 | host = result.xpath("host/text()") |
||
709 | if not host: |
||
710 | end_session( |
||
711 | im, |
||
712 | "GMP UNKNOWN: Failed to parse result host", |
||
713 | NAGIOS_UNKNOWN, |
||
714 | ) |
||
715 | |||
716 | if script_args.hostaddress != host[0]: |
||
717 | continue |
||
718 | any_found = True |
||
719 | |||
720 | threat = result.xpath("threat/text()") |
||
721 | if not threat: |
||
722 | end_session( |
||
723 | im, |
||
724 | "GMP UNKNOWN: Failed to parse result threat.", |
||
725 | NAGIOS_UNKNOWN, |
||
726 | ) |
||
727 | |||
728 | threat = threat[0] |
||
729 | if threat in "High": |
||
730 | high_count += 1 |
||
731 | if script_args.oid: |
||
732 | nvts["high"].append(retrieve_nvt_data(result)) |
||
733 | elif threat in "Medium": |
||
734 | medium_count += 1 |
||
735 | if script_args.oid: |
||
736 | nvts["medium"].append(retrieve_nvt_data(result)) |
||
737 | elif threat in "Low": |
||
738 | low_count += 1 |
||
739 | if script_args.oid: |
||
740 | nvts["low"].append(retrieve_nvt_data(result)) |
||
741 | elif threat in "Log": |
||
742 | log_count += 1 |
||
743 | if script_args.oid: |
||
744 | nvts["log"].append(retrieve_nvt_data(result)) |
||
745 | else: |
||
746 | end_session( |
||
747 | im, |
||
748 | "GMP UNKNOWN: Unknown result threat: %s" % threat, |
||
749 | NAGIOS_UNKNOWN, |
||
750 | ) |
||
751 | |||
752 | errors = report.xpath("errors") |
||
753 | |||
754 | if errors: |
||
755 | errors = errors[0] |
||
756 | if script_args.hostaddress: |
||
757 | for error in errors.xpath("error"): |
||
758 | host = error.xpath("host/text()") |
||
759 | if script_args.hostaddress == host[0]: |
||
760 | error_count += 1 |
||
761 | else: |
||
762 | error_count = errors.xpath("count/text()")[0] |
||
763 | |||
764 | ret = 0 |
||
765 | if high_count > 0: |
||
766 | ret = NAGIOS_CRITICAL |
||
767 | elif medium_count > 0: |
||
768 | ret = NAGIOS_WARNING |
||
769 | |||
770 | if script_args.empty_as_unknown and ( |
||
771 | not all_results or (not any_found and script_args.hostaddress) |
||
772 | ): |
||
773 | ret = NAGIOS_UNKNOWN |
||
774 | |||
775 | print( |
||
776 | "GMP %s: %i vulnerabilities found - High: %i Medium: %i " |
||
777 | "Low: %i" |
||
778 | % ( |
||
779 | NAGIOS_MSG[ret], |
||
780 | (high_count + medium_count + low_count), |
||
781 | high_count, |
||
782 | medium_count, |
||
783 | low_count, |
||
784 | ) |
||
785 | ) |
||
786 | |||
787 | if not all_results: |
||
788 | print("Report did not contain any vulnerabilities") |
||
789 | |||
790 | elif not any_found and script_args.hostaddress: |
||
791 | print( |
||
792 | "Report did not contain vulnerabilities for IP %s" |
||
793 | % script_args.hostaddress |
||
794 | ) |
||
795 | |||
796 | if int(error_count) > 0: |
||
797 | if script_args.hostaddress: |
||
798 | print_without_pipe( |
||
799 | "Report did contain %i errors for IP %s" |
||
800 | % (error_count, script_args.hostaddress) |
||
801 | ) |
||
802 | else: |
||
803 | print_without_pipe( |
||
804 | "Report did contain %i errors" % int(error_count) |
||
805 | ) |
||
806 | |||
807 | if script_args.report_link: |
||
808 | print( |
||
809 | "https://%s/omp?cmd=get_report&report_id=%s" |
||
810 | % (script_args.hostname, report_id) |
||
811 | ) |
||
812 | |||
813 | if script_args.oid: |
||
814 | print_nvt_data( |
||
815 | nvts, |
||
816 | show_log=script_args.showlog, |
||
817 | show_ports=script_args.show_ports, |
||
818 | descr=script_args.descr, |
||
819 | dfn=script_args.dfn, |
||
820 | ) |
||
821 | |||
822 | if script_args.scanend: |
||
823 | end = report.xpath("//end/text()") |
||
824 | end = end[0] if end else "Timestamp of scan end not given" |
||
825 | print("SCAN_END: %s" % end) |
||
826 | |||
827 | if script_args.details: |
||
828 | if script_args.hostname: |
||
829 | print("GSM_Host: %s:%d" % (script_args.hostname, script_args.port)) |
||
830 | if script_args.gmp_username: |
||
831 | print("GMP_User: %s" % script_args.gmp_username) |
||
832 | if script_args.task: |
||
833 | print_without_pipe("Task: %s" % script_args.task) |
||
834 | |||
835 | end_session( |
||
836 | im, |
||
837 | "|High=%i Medium=%i Low=%i" % (high_count, medium_count, low_count), |
||
838 | ret, |
||
839 | ) |
||
840 | |||
841 | |||
842 | def retrieve_nvt_data(result): |
||
843 | """Retrieve the nvt data out of the result object |
||
844 | |||
845 | This function parse the xml tree to find the important nvt data. |
||
846 | |||
847 | Arguments: |
||
848 | result (obj): Result as lxml ElementTree |
||
849 | |||
850 | Returns: |
||
851 | Tuple -- List with oid, name, desc, port and dfn |
||
852 | """ |
||
853 | oid = result.xpath("nvt/@oid") |
||
854 | name = result.xpath("nvt/name/text()") |
||
855 | desc = result.xpath("description/text()") |
||
856 | port = result.xpath("port/text()") |
||
857 | |||
858 | if oid: |
||
859 | oid = oid[0] |
||
860 | |||
861 | if name: |
||
862 | name = name[0] |
||
863 | |||
864 | if desc: |
||
865 | desc = desc[0] |
||
866 | else: |
||
867 | desc = "" |
||
868 | |||
869 | if port: |
||
870 | port = port[0] |
||
871 | else: |
||
872 | port = "" |
||
873 | |||
874 | certs = result.xpath("nvt/cert/cert_ref") |
||
875 | |||
876 | dfn_list = [] |
||
877 | for ref in certs: |
||
878 | ref_type = ref.xpath("@type")[0] |
||
879 | ref_id = ref.xpath("@id")[0] |
||
880 | |||
881 | if ref_type in "DFN-CERT": |
||
882 | dfn_list.append(ref_id) |
||
883 | |||
884 | return (oid, name, desc, port, dfn_list) |
||
885 | |||
886 | |||
887 | def print_nvt_data( |
||
888 | nvts, show_log=False, show_ports=False, descr=False, dfn=False |
||
889 | ): |
||
890 | """Print nvt data |
||
891 | |||
892 | Prints for each nvt found in the array the relevant data |
||
893 | |||
894 | Arguments: |
||
895 | nvts (obj): Object holding all nvts |
||
896 | """ |
||
897 | for key, nvt_data in nvts.items(): |
||
898 | if key == "log" and not show_log: |
||
899 | continue |
||
900 | for nvt in nvt_data: |
||
901 | print_without_pipe("NVT: %s (%s) %s" % (nvt[0], key, nvt[1])) |
||
902 | if show_ports: |
||
903 | print_without_pipe("PORT: %s" % (nvt[3])) |
||
904 | if descr: |
||
905 | print_without_pipe("DESCR: %s" % nvt[2]) |
||
906 | |||
907 | if dfn and nvt[4]: |
||
908 | dfn_list = ", ".join(nvt[4]) |
||
909 | if dfn_list: |
||
910 | print_without_pipe("DFN-CERT: %s" % dfn_list) |
||
911 | |||
912 | |||
913 | def end_session(im, msg, nagios_status): |
||
914 | """End the session |
||
915 | |||
916 | Close the socket if open and print the last msg |
||
917 | |||
918 | Arguments: |
||
919 | msg string): Message to print |
||
920 | nagios_status (int): Exit status |
||
921 | """ |
||
922 | print(msg) |
||
923 | |||
924 | # Delete this instance |
||
925 | im.delete_instance() |
||
926 | |||
927 | # Activate some waiting instances if possible |
||
928 | im.wake_instance() |
||
929 | |||
930 | # Close the connection to database |
||
931 | im.close_db() |
||
932 | |||
933 | sys.exit(nagios_status) |
||
934 | |||
935 | |||
936 | def print_without_pipe(msg): |
||
937 | """Prints the message, but without any pipe symbol |
||
938 | |||
939 | If any pipe symbol is in the msg string, then it will be replaced with |
||
940 | broken pipe symbol. |
||
941 | |||
942 | Arguments: |
||
943 | msg (string): Message to print |
||
944 | """ |
||
945 | if "|" in msg: |
||
946 | msg = msg.replace("|", "¦") |
||
947 | |||
948 | print(msg) |
||
949 | |||
950 | |||
951 | # ISO 8601 date time string parsing |
||
952 | |||
953 | # Copyright (c) 2007 - 2015 Michael Twomey |
||
954 | |||
955 | # Permission is hereby granted, free of charge, to any person obtaining a |
||
956 | # copy of this software and associated documentation files (the |
||
957 | # "Software"), to deal in the Software without restriction, including |
||
958 | # without limitation the rights to use, copy, modify, merge, publish, |
||
959 | # distribute, sublicense, and/or sell copies of the Software, and to |
||
960 | # permit persons to whom the Software is furnished to do so, subject to |
||
961 | # the following conditions: |
||
962 | |||
963 | # The above copyright notice and this permission notice shall be included |
||
964 | # in all copies or substantial portions of the Software. |
||
965 | |||
966 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS |
||
967 | # OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF |
||
968 | # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. |
||
969 | # IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY |
||
970 | # CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, |
||
971 | # TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE |
||
972 | # SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. |
||
973 | |||
974 | __all__ = ["parse_date", "ParseError", "UTC"] |
||
975 | |||
976 | _basestring = str |
||
977 | |||
978 | |||
979 | # Adapted from http://delete.me.uk/2005/03/iso8601.html |
||
980 | ISO8601_REGEX = re.compile( |
||
981 | r""" |
||
982 | (?P<year>[0-9]{4}) |
||
983 | ( |
||
984 | ( |
||
985 | (-(?P<monthdash>[0-9]{1,2})) |
||
986 | | |
||
987 | (?P<month>[0-9]{2}) |
||
988 | (?!$) # Don't allow YYYYMM |
||
989 | ) |
||
990 | ( |
||
991 | ( |
||
992 | (-(?P<daydash>[0-9]{1,2})) |
||
993 | | |
||
994 | (?P<day>[0-9]{2}) |
||
995 | ) |
||
996 | ( |
||
997 | ( |
||
998 | (?P<separator>[ T]) |
||
999 | (?P<hour>[0-9]{2}) |
||
1000 | (:{0,1}(?P<minute>[0-9]{2})){0,1} |
||
1001 | ( |
||
1002 | :{0,1}(?P<second>[0-9]{1,2}) |
||
1003 | ([.,](?P<second_fraction>[0-9]+)){0,1} |
||
1004 | ){0,1} |
||
1005 | (?P<timezone> |
||
1006 | Z |
||
1007 | | |
||
1008 | ( |
||
1009 | (?P<tz_sign>[-+]) |
||
1010 | (?P<tz_hour>[0-9]{2}) |
||
1011 | :{0,1} |
||
1012 | (?P<tz_minute>[0-9]{2}){0,1} |
||
1013 | ) |
||
1014 | ){0,1} |
||
1015 | ){0,1} |
||
1016 | ) |
||
1017 | ){0,1} # YYYY-MM |
||
1018 | ){0,1} # YYYY only |
||
1019 | $ |
||
1020 | """, |
||
1021 | re.VERBOSE, |
||
1022 | ) |
||
1023 | |||
1024 | |||
1025 | class ParseError(Exception): |
||
1026 | """Raised when there is a problem parsing a date string""" |
||
1027 | |||
1028 | |||
1029 | # Yoinked from python docs |
||
1030 | ZERO = timedelta(0) |
||
1031 | |||
1032 | |||
1033 | class Utc(tzinfo): |
||
1034 | """UTC Timezone""" |
||
1035 | |||
1036 | def utcoffset(self, dt): |
||
1037 | return ZERO |
||
1038 | |||
1039 | def tzname(self, dt): |
||
1040 | return "UTC" |
||
1041 | |||
1042 | def dst(self, dt): |
||
1043 | return ZERO |
||
1044 | |||
1045 | def __repr__(self): |
||
1046 | return "<iso8601.Utc>" |
||
1047 | |||
1048 | |||
1049 | UTC = Utc() |
||
1050 | |||
1051 | |||
1052 | class FixedOffset(tzinfo): |
||
1053 | """Fixed offset in hours and minutes from UTC""" |
||
1054 | |||
1055 | def __init__(self, offset_hours, offset_minutes, name): |
||
1056 | self.__offset_hours = offset_hours # Keep for later __getinitargs__ |
||
1057 | # Keep for later __getinitargs__ |
||
1058 | self.__offset_minutes = offset_minutes |
||
1059 | self.__offset = timedelta(hours=offset_hours, minutes=offset_minutes) |
||
1060 | self.__name = name |
||
1061 | |||
1062 | def __eq__(self, other): |
||
1063 | if isinstance(other, FixedOffset): |
||
1064 | # pylint: disable=protected-access |
||
1065 | return (other.__offset == self.__offset) and ( |
||
1066 | other.__name == self.__name |
||
1067 | ) |
||
1068 | if isinstance(other, tzinfo): |
||
1069 | return other == self |
||
1070 | return False |
||
1071 | |||
1072 | def __getinitargs__(self): |
||
1073 | return (self.__offset_hours, self.__offset_minutes, self.__name) |
||
1074 | |||
1075 | def utcoffset(self, dt): |
||
1076 | return self.__offset |
||
1077 | |||
1078 | def tzname(self, dt): |
||
1079 | return self.__name |
||
1080 | |||
1081 | def dst(self, dt): |
||
1082 | return ZERO |
||
1083 | |||
1084 | def __repr__(self): |
||
1085 | return "<FixedOffset %r %r>" % (self.__name, self.__offset) |
||
1086 | |||
1087 | |||
1088 | def to_int( |
||
1089 | source_dict, key, default_to_zero=False, default=None, required=True |
||
1090 | ): |
||
1091 | """Pull a value from the dict and convert to int |
||
1092 | |||
1093 | :param default_to_zero: If the value is None or empty, treat it as zero |
||
1094 | :param default: If the value is missing in the dict use this default |
||
1095 | |||
1096 | """ |
||
1097 | |||
1098 | value = source_dict.get(key) |
||
1099 | if value in [None, ""]: |
||
1100 | value = default |
||
1101 | if (value in ["", None]) and default_to_zero: |
||
1102 | return 0 |
||
1103 | if value is None: |
||
1104 | if required: |
||
1105 | raise ParseError("Unable to read %s from %s" % (key, source_dict)) |
||
1106 | return value |
||
1107 | else: |
||
1108 | return int(value) |
||
1109 | |||
1110 | |||
1111 | def parse_timezone(matches, default_timezone=UTC): |
||
1112 | """Parses ISO 8601 time zone specs into tzinfo offsets""" |
||
1113 | |||
1114 | if matches["timezone"] == "Z": |
||
1115 | return UTC |
||
1116 | # This isn't strictly correct, but it's common to encounter dates without |
||
1117 | # timezones so I'll assume the default (which defaults to UTC). |
||
1118 | # Addresses issue 4. |
||
1119 | if matches["timezone"] is None: |
||
1120 | return default_timezone |
||
1121 | sign = matches["tz_sign"] |
||
1122 | hours = to_int(matches, "tz_hour") |
||
1123 | minutes = to_int(matches, "tz_minute", default_to_zero=True) |
||
1124 | description = "%s%02d:%02d" % (sign, hours, minutes) |
||
1125 | if sign == "-": |
||
1126 | hours = -1 * hours |
||
1127 | minutes = -1 * minutes |
||
1128 | return FixedOffset(hours, minutes, description) |
||
1129 | |||
1130 | |||
1131 | def parse_date(datestring, default_timezone=UTC): |
||
1132 | """Parses ISO 8601 dates into datetime objects |
||
1133 | |||
1134 | The timezone is parsed from the date string. However it is quite common to |
||
1135 | have dates without a timezone (not strictly correct). In this case the |
||
1136 | default timezone specified in default_timezone is used. This is UTC by |
||
1137 | default. |
||
1138 | |||
1139 | Arguments |
||
1140 | datestring: The date to parse as a string |
||
1141 | default_timezone: A datetime tzinfo instance to use when no timezone |
||
1142 | is specified in the datestring. If this is set to |
||
1143 | None then a naive datetime object is returned. |
||
1144 | Returns: |
||
1145 | A datetime.datetime instance |
||
1146 | Raises: |
||
1147 | ParseError when there is a problem parsing the date or |
||
1148 | constructing the datetime instance. |
||
1149 | |||
1150 | """ |
||
1151 | if not isinstance(datestring, _basestring): |
||
1152 | raise ParseError("Expecting a string %r" % datestring) |
||
1153 | |||
1154 | match = ISO8601_REGEX.match(datestring) |
||
1155 | if not match: |
||
1156 | raise ParseError("Unable to parse date string %r" % datestring) |
||
1157 | |||
1158 | groups = match.groupdict() |
||
1159 | |||
1160 | tz = parse_timezone(groups, default_timezone=default_timezone) |
||
1161 | |||
1162 | groups["second_fraction"] = int( |
||
1163 | Decimal("0.%s" % (groups["second_fraction"] or 0)) |
||
1164 | * Decimal("1000000.0") |
||
1165 | ) |
||
1166 | |||
1167 | try: |
||
1168 | return datetime( |
||
1169 | year=to_int(groups, "year"), |
||
1170 | month=to_int( |
||
1171 | groups, |
||
1172 | "month", |
||
1173 | default=to_int(groups, "monthdash", required=False, default=1), |
||
1174 | ), |
||
1175 | day=to_int( |
||
1176 | groups, |
||
1177 | "day", |
||
1178 | default=to_int(groups, "daydash", required=False, default=1), |
||
1179 | ), |
||
1180 | hour=to_int(groups, "hour", default_to_zero=True), |
||
1181 | minute=to_int(groups, "minute", default_to_zero=True), |
||
1182 | second=to_int(groups, "second", default_to_zero=True), |
||
1183 | microsecond=groups["second_fraction"], |
||
1184 | tzinfo=tz, |
||
1185 | ) |
||
1186 | except Exception as e: |
||
1187 | raise ParseError(e) from None |
||
1188 | |||
1189 | |||
1190 | def main(gmp, args): |
||
1191 | tmp_path = "%s/check_gmp/" % tempfile.gettempdir() |
||
1192 | tmp_path_db = tmp_path + "reports.db" |
||
1193 | |||
1194 | parser = ArgumentParser( |
||
1195 | prog="check-gmp", |
||
1196 | prefix_chars="-", |
||
1197 | description=HELP_TEXT, |
||
1198 | formatter_class=RawTextHelpFormatter, |
||
1199 | add_help=False, |
||
1200 | epilog=""" |
||
1201 | usage: gvm-script [connection_type] check-gmp.gmp.py ... |
||
1202 | or: gvm-script [connection_type] check-gmp.gmp.py -H |
||
1203 | or: gvm-script connection_type --help""", |
||
1204 | ) |
||
1205 | |||
1206 | parser.add_argument( |
||
1207 | "-H", action="help", help="Show this help message and exit." |
||
1208 | ) |
||
1209 | |||
1210 | parser.add_argument( |
||
1211 | "-V", |
||
1212 | "--version", |
||
1213 | action="version", |
||
1214 | version="%(prog)s {version}".format(version=__version__), |
||
1215 | help="Show program's version number and exit", |
||
1216 | ) |
||
1217 | |||
1218 | parser.add_argument( |
||
1219 | "--cache", |
||
1220 | nargs="?", |
||
1221 | default=tmp_path_db, |
||
1222 | help="Path to cache file. Default: %s." % tmp_path_db, |
||
1223 | ) |
||
1224 | |||
1225 | parser.add_argument( |
||
1226 | "--clean", action="store_true", help="Activate to clean the database." |
||
1227 | ) |
||
1228 | |||
1229 | parser.add_argument( |
||
1230 | "-u", "--gmp-username", help="GMP username.", required=False |
||
1231 | ) |
||
1232 | |||
1233 | parser.add_argument( |
||
1234 | "-w", "--gmp-password", help="GMP password.", required=False |
||
1235 | ) |
||
1236 | |||
1237 | parser.add_argument( |
||
1238 | "-F", |
||
1239 | "--hostaddress", |
||
1240 | required=False, |
||
1241 | default="", |
||
1242 | help="Report last report status of host <ip>.", |
||
1243 | ) |
||
1244 | |||
1245 | parser.add_argument( |
||
1246 | "-T", "--task", required=False, help="Report status of task <task>." |
||
1247 | ) |
||
1248 | |||
1249 | parser.add_argument( |
||
1250 | "--apply-overrides", action="store_true", help="Apply overrides." |
||
1251 | ) |
||
1252 | |||
1253 | parser.add_argument( |
||
1254 | "--overrides", action="store_true", help="Include overrides." |
||
1255 | ) |
||
1256 | |||
1257 | parser.add_argument( |
||
1258 | "-d", |
||
1259 | "--details", |
||
1260 | action="store_true", |
||
1261 | help="Include connection details in output.", |
||
1262 | ) |
||
1263 | |||
1264 | parser.add_argument( |
||
1265 | "-l", |
||
1266 | "--report-link", |
||
1267 | action="store_true", |
||
1268 | help="Include URL of report in output.", |
||
1269 | ) |
||
1270 | |||
1271 | parser.add_argument( |
||
1272 | "--dfn", |
||
1273 | action="store_true", |
||
1274 | help="Include DFN-CERT IDs on vulnerabilities in output.", |
||
1275 | ) |
||
1276 | |||
1277 | parser.add_argument( |
||
1278 | "--oid", |
||
1279 | action="store_true", |
||
1280 | help="Include OIDs of NVTs finding vulnerabilities in output.", |
||
1281 | ) |
||
1282 | |||
1283 | parser.add_argument( |
||
1284 | "--descr", |
||
1285 | action="store_true", |
||
1286 | help="Include descriptions of NVTs finding vulnerabilities in output.", |
||
1287 | ) |
||
1288 | |||
1289 | parser.add_argument( |
||
1290 | "--showlog", action="store_true", help="Include log messages in output." |
||
1291 | ) |
||
1292 | |||
1293 | parser.add_argument( |
||
1294 | "--show-ports", |
||
1295 | action="store_true", |
||
1296 | help="Include port of given vulnerable nvt in output.", |
||
1297 | ) |
||
1298 | |||
1299 | parser.add_argument( |
||
1300 | "--scanend", |
||
1301 | action="store_true", |
||
1302 | help="Include timestamp of scan end in output.", |
||
1303 | ) |
||
1304 | |||
1305 | parser.add_argument( |
||
1306 | "--autofp", |
||
1307 | type=int, |
||
1308 | choices=[0, 1, 2], |
||
1309 | default=0, |
||
1310 | help="Trust vendor security updates for automatic false positive" |
||
1311 | " filtering (0=No, 1=full match, 2=partial).", |
||
1312 | ) |
||
1313 | |||
1314 | parser.add_argument( |
||
1315 | "-e", |
||
1316 | "--empty-as-unknown", |
||
1317 | action="store_true", |
||
1318 | help="Respond with UNKNOWN on empty results.", |
||
1319 | ) |
||
1320 | |||
1321 | parser.add_argument( |
||
1322 | "-I", |
||
1323 | "--max-running-instances", |
||
1324 | default=10, |
||
1325 | type=int, |
||
1326 | help="Set the maximum simultaneous processes of check-gmp", |
||
1327 | ) |
||
1328 | |||
1329 | parser.add_argument("--hostname", nargs="?", required=False) |
||
1330 | |||
1331 | group = parser.add_mutually_exclusive_group(required=False) |
||
1332 | group.add_argument( |
||
1333 | "--ping", action="store_true", help="Ping the gsm appliance." |
||
1334 | ) |
||
1335 | |||
1336 | group.add_argument( |
||
1337 | "--status", action="store_true", help="Report status of task." |
||
1338 | ) |
||
1339 | |||
1340 | group = parser.add_mutually_exclusive_group(required=False) |
||
1341 | group.add_argument( |
||
1342 | "--days", |
||
1343 | type=int, |
||
1344 | help="Delete database entries that are older than" " given days.", |
||
1345 | ) |
||
1346 | group.add_argument("--ip", help="Delete database entry for given ip.") |
||
1347 | |||
1348 | group = parser.add_mutually_exclusive_group(required=False) |
||
1349 | group.add_argument( |
||
1350 | "--trend", action="store_true", help="Report status by trend." |
||
1351 | ) |
||
1352 | group.add_argument( |
||
1353 | "--last-report", |
||
1354 | action="store_true", |
||
1355 | help="Report status by last report.", |
||
1356 | ) |
||
1357 | |||
1358 | script_args = parser.parse_args(args.script_args) |
||
1359 | |||
1360 | aux_parser = ArgumentParser( |
||
1361 | prefix_chars="-", formatter_class=RawTextHelpFormatter |
||
1362 | ) |
||
1363 | aux_parser.add_argument("--hostname", nargs="?", required=False) |
||
1364 | gvm_tool_args, _ = aux_parser.parse_known_args(sys.argv) |
||
1365 | if "hostname" in gvm_tool_args: |
||
1366 | script_args.hostname = gvm_tool_args.hostname |
||
1367 | |||
1368 | # Set the max running instances variable |
||
1369 | if script_args.max_running_instances: |
||
1370 | # TODO should be passed as local variable instead of using a global one |
||
1371 | # pylint: disable=global-statement |
||
1372 | global MAX_RUNNING_INSTANCES |
||
1373 | MAX_RUNNING_INSTANCES = script_args.max_running_instances |
||
1374 | |||
1375 | # Set the report manager |
||
1376 | if script_args.cache: |
||
1377 | tmp_path_db = script_args.cache |
||
1378 | im = InstanceManager(tmp_path_db, parser) |
||
1379 | |||
1380 | # Check if command holds clean command |
||
1381 | if script_args.clean: |
||
1382 | if script_args.ip: |
||
1383 | logger.info("Delete entry with ip %s", script_args.ip) |
||
1384 | im.delete_entry_with_ip(script_args.ip) |
||
1385 | elif script_args.days: |
||
1386 | logger.info("Delete entries older than %s days", script_args.days) |
||
1387 | im.delete_older_entries(script_args.days) |
||
1388 | sys.exit(1) |
||
1389 | |||
1390 | # Set the host |
||
1391 | im.set_host(script_args.hostaddress) |
||
1392 | |||
1393 | # Check if no more than 10 instances of check-gmp runs simultaneously |
||
1394 | im.check_instances() |
||
1395 | |||
1396 | try: |
||
1397 | gmp.get_version() |
||
1398 | except Exception as e: # pylint: disable=broad-except |
||
1399 | end_session(im, "GMP CRITICAL: %s" % str(e), NAGIOS_CRITICAL) |
||
1400 | |||
1401 | if script_args.ping: |
||
1402 | ping(gmp, im) |
||
1403 | |||
1404 | if "status" in script_args: |
||
1405 | status(gmp, im, script_args) |
||
1406 | |||
1407 | |||
1408 | if __name__ == "__gmp__": |
||
1409 | main(gmp, args) |
||
0 ignored issues
–
show
Comprehensibility
Best Practice
introduced
by
![]() Comprehensibility
Best Practice
introduced
by
|
|||
1410 |