greenbone /
gvm-tools
| 1 | # -*- coding: utf-8 -*- |
||
| 2 | # Copyright (C) 2017-2021 Greenbone Networks GmbH |
||
| 3 | # |
||
| 4 | # SPDX-License-Identifier: GPL-3.0-or-later |
||
| 5 | # |
||
| 6 | # This program is free software: you can redistribute it and/or modify |
||
| 7 | # it under the terms of the GNU General Public License as published by |
||
| 8 | # the Free Software Foundation, either version 3 of the License, or |
||
| 9 | # (at your option) any later version. |
||
| 10 | # |
||
| 11 | # This program is distributed in the hope that it will be useful, |
||
| 12 | # but WITHOUT ANY WARRANTY; without even the implied warranty of |
||
| 13 | # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
||
| 14 | # GNU General Public License for more details. |
||
| 15 | # |
||
| 16 | # You should have received a copy of the GNU General Public License |
||
| 17 | # along with this program. If not, see <http://www.gnu.org/licenses/>. |
||
| 18 | |||
| 19 | # pylint: disable=too-many-lines |
||
| 20 | |||
| 21 | import logging |
||
| 22 | import os |
||
| 23 | import re |
||
| 24 | import signal |
||
| 25 | import sqlite3 |
||
| 26 | import sys |
||
| 27 | import tempfile |
||
| 28 | |||
| 29 | from argparse import ArgumentParser, RawTextHelpFormatter |
||
| 30 | from datetime import datetime, timedelta, tzinfo |
||
| 31 | from decimal import Decimal |
||
| 32 | from pathlib import Path |
||
| 33 | |||
| 34 | from lxml import etree |
||
| 35 | |||
| 36 | __version__ = "2.0.0" |
||
| 37 | |||
| 38 | logger = logging.getLogger(__name__) |
||
| 39 | |||
| 40 | HELP_TEXT = """ |
||
| 41 | Check-GMP Nagios Command Plugin {version} (C) 2017-2021 Greenbone Networks GmbH |
||
| 42 | |||
| 43 | This program is free software: you can redistribute it and/or modify |
||
| 44 | it under the terms of the GNU General Public License as published by |
||
| 45 | the Free Software Foundation, either version 3 of the License, or |
||
| 46 | (at your option) any later version. |
||
| 47 | |||
| 48 | This program is distributed in the hope that it will be useful, |
||
| 49 | but WITHOUT ANY WARRANTY; without even the implied warranty of |
||
| 50 | MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
||
| 51 | GNU General Public License for more details. |
||
| 52 | |||
| 53 | You should have received a copy of the GNU General Public License |
||
| 54 | along with this program. If not, see <http://www.gnu.org/licenses/>. |
||
| 55 | """.format( |
||
| 56 | version=__version__ |
||
| 57 | ) |
||
| 58 | |||
| 59 | NAGIOS_OK = 0 |
||
| 60 | NAGIOS_WARNING = 1 |
||
| 61 | NAGIOS_CRITICAL = 2 |
||
| 62 | NAGIOS_UNKNOWN = 3 |
||
| 63 | |||
| 64 | NAGIOS_MSG = ["OK", "WARNING", "CRITICAL", "UNKNOWN"] |
||
| 65 | |||
| 66 | MAX_RUNNING_INSTANCES = 10 |
||
| 67 | |||
| 68 | |||
| 69 | class InstanceManager: |
||
| 70 | """Class for managing instances of this plugin |
||
| 71 | |||
| 72 | All new reports will be cached in a sqlite database. |
||
| 73 | The first call with a unknown host takes longer, |
||
| 74 | because the remote gvmd/openvasmd has to generate the report. |
||
| 75 | The second call will retrieve the data from the database if the scan |
||
| 76 | duration does not differ. |
||
| 77 | |||
| 78 | Additionally this class handles all instances of check-gmp. No more than |
||
| 79 | MAX_RUNNING_INSTANCES can run simultaneously. Other instances are stopped |
||
| 80 | and wait for continuation. |
||
| 81 | """ |
||
| 82 | |||
| 83 | def __init__(self, path, parser): |
||
| 84 | """Initialise the sqlite database. |
||
| 85 | |||
| 86 | Create it if it does not exist else connect to it. |
||
| 87 | |||
| 88 | Arguments: |
||
| 89 | path (string): Path to the database. |
||
| 90 | """ |
||
| 91 | self.cursor = None |
||
| 92 | self.con_db = None |
||
| 93 | self.db = Path(path) |
||
| 94 | self.pid = os.getpid() |
||
| 95 | |||
| 96 | # Try to read file with information about cached reports |
||
| 97 | # First check whether the file exist or not |
||
| 98 | try: |
||
| 99 | exist = self.db.is_file() |
||
| 100 | logger.debug("DB file exist?: %s ", exist) |
||
| 101 | |||
| 102 | if not exist: |
||
| 103 | if not self.db.parent.is_dir(): |
||
| 104 | self.db.parent.mkdir(parents=True, exist_ok=True) |
||
| 105 | else: |
||
| 106 | self.db.touch() |
||
| 107 | # Connect to db |
||
| 108 | self.connect_db() |
||
| 109 | |||
| 110 | # Create the tables |
||
| 111 | self.cursor.execute( |
||
| 112 | """CREATE TABLE Report( |
||
| 113 | host text, |
||
| 114 | scan_end text, |
||
| 115 | params_used text, |
||
| 116 | report text |
||
| 117 | )""" |
||
| 118 | ) |
||
| 119 | |||
| 120 | self.cursor.execute( |
||
| 121 | """CREATE TABLE Instance( |
||
| 122 | created_at text, |
||
| 123 | pid integer, |
||
| 124 | pending integer default 0 |
||
| 125 | )""" |
||
| 126 | ) |
||
| 127 | |||
| 128 | logger.debug("Tables created") |
||
| 129 | else: |
||
| 130 | self.connect_db() |
||
| 131 | |||
| 132 | except PermissionError: |
||
| 133 | parser.error( |
||
| 134 | "The selected temporary database file {} or the parent dir has" |
||
| 135 | " not the correct permissions.".format(self.db) |
||
| 136 | ) |
||
| 137 | |||
| 138 | @staticmethod |
||
| 139 | def _to_sql_bool(pending): |
||
| 140 | """Replace True/False with 1/0.""" |
||
| 141 | return '1' if pending else '0' |
||
| 142 | |||
| 143 | def connect_db(self): |
||
| 144 | """Connect to the database |
||
| 145 | |||
| 146 | Simply connect to the database at location <path> |
||
| 147 | """ |
||
| 148 | try: |
||
| 149 | logger.debug("connect db: %s", self.db) |
||
| 150 | self.con_db = sqlite3.connect(str(self.db)) |
||
| 151 | self.cursor = self.con_db.cursor() |
||
| 152 | logger.debug(sqlite3.sqlite_version) |
||
| 153 | except Exception as e: # pylint: disable=broad-except |
||
| 154 | logger.debug(e) |
||
| 155 | |||
| 156 | def close_db(self): |
||
| 157 | """Close database""" |
||
| 158 | self.con_db.close() |
||
| 159 | |||
| 160 | def set_host(self, host): |
||
| 161 | """Sets the host variable |
||
| 162 | |||
| 163 | Arguments: |
||
| 164 | host (string): Given ip or hostname of target. |
||
| 165 | """ |
||
| 166 | self.host = host |
||
| 167 | |||
| 168 | def is_old_report(self, last_scan_end, params_used): |
||
| 169 | """Decide whether the current report is old or not |
||
| 170 | |||
| 171 | At first the last scanend and the params that were used are fetched |
||
| 172 | from the database. If no report is fetched, then True will be returned. |
||
| 173 | The next step is to compare the old and the new scanend. |
||
| 174 | If the scanends matches, then return False, because it is the same |
||
| 175 | report. Else the old report will be deleted. |
||
| 176 | |||
| 177 | Arguments: |
||
| 178 | last_scan_end (string): Last scan end of report |
||
| 179 | params_used (string): Params used for this check |
||
| 180 | |||
| 181 | Returns: |
||
| 182 | True if it is an old report or empty. False if it is the same |
||
| 183 | report. |
||
| 184 | """ |
||
| 185 | |||
| 186 | # Before we do anything here, check existing instance |
||
| 187 | |||
| 188 | # Retrieve the scan_end value |
||
| 189 | self.cursor.execute( |
||
| 190 | "SELECT scan_end, params_used FROM Report WHERE" " host=?", |
||
| 191 | (self.host,), |
||
| 192 | ) |
||
| 193 | db_entry = self.cursor.fetchone() |
||
| 194 | |||
| 195 | logger.debug("%s %s", db_entry, last_scan_end) |
||
| 196 | |||
| 197 | if not db_entry: |
||
| 198 | return True |
||
| 199 | else: |
||
| 200 | old = parse_date(db_entry[0]) |
||
| 201 | new = parse_date(last_scan_end) |
||
| 202 | |||
| 203 | logger.debug( |
||
| 204 | "Old time (from db): %s\n" "New time (from rp): %s", old, new |
||
| 205 | ) |
||
| 206 | |||
| 207 | if new <= old and params_used == db_entry[1]: |
||
| 208 | return False |
||
| 209 | else: |
||
| 210 | # Report is newer. Delete old entry. |
||
| 211 | logger.debug("Delete old report for host %s", self.host) |
||
| 212 | self.delete_report() |
||
| 213 | return True |
||
| 214 | |||
| 215 | def load_local_report(self): |
||
| 216 | """Load report from local database |
||
| 217 | |||
| 218 | Select the report from the database according due the hostname or ip. |
||
| 219 | |||
| 220 | Returns: |
||
| 221 | An lxml ElementTree |
||
| 222 | """ |
||
| 223 | self.cursor.execute( |
||
| 224 | "SELECT report FROM Report WHERE host=?", (self.host,) |
||
| 225 | ) |
||
| 226 | db_entry = self.cursor.fetchone() |
||
| 227 | |||
| 228 | if db_entry: |
||
| 229 | return etree.fromstring(db_entry[0]) |
||
| 230 | else: |
||
| 231 | logger.debug("Report from host %s is not in the db", self.host) |
||
| 232 | |||
| 233 | def add_report(self, scan_end, params_used, report): |
||
| 234 | """Create new entry with the lxml report |
||
| 235 | |||
| 236 | Create a string from the lxml object and add it to the database. |
||
| 237 | Additional data is the scanend and the params used. |
||
| 238 | |||
| 239 | Arguments: |
||
| 240 | scan_end (string): Scan end of the report |
||
| 241 | params_used (string): Params used for this check |
||
| 242 | report (obj): An lxml ElementTree |
||
| 243 | """ |
||
| 244 | |||
| 245 | data = etree.tostring(report) |
||
| 246 | |||
| 247 | logger.debug("add_report: %s, %s, %s", self.host, scan_end, params_used) |
||
| 248 | |||
| 249 | # Insert values |
||
| 250 | self.cursor.execute( |
||
| 251 | "INSERT INTO Report VALUES (?, ?, ?, ?)", |
||
| 252 | (self.host, scan_end, params_used, data), |
||
| 253 | ) |
||
| 254 | |||
| 255 | # Save the changes |
||
| 256 | self.con_db.commit() |
||
| 257 | |||
| 258 | def delete_report(self): |
||
| 259 | """Delete report from database""" |
||
| 260 | self.cursor.execute("DELETE FROM Report WHERE host=?", (self.host,)) |
||
| 261 | |||
| 262 | # Save the changes |
||
| 263 | self.con_db.commit() |
||
| 264 | |||
| 265 | def delete_entry_with_ip(self, ip): |
||
| 266 | """Delete report from database with given ip |
||
| 267 | |||
| 268 | Arguments: |
||
| 269 | ip (string): IP-Adress |
||
| 270 | """ |
||
| 271 | logger.debug("Delete entry with ip: %s", ip) |
||
| 272 | self.cursor.execute("DELETE FROM Report WHERE host=?", (ip,)) |
||
| 273 | self.con_db.isolation_level = None |
||
| 274 | self.cursor.execute("VACUUM") |
||
| 275 | self.con_db.isolation_level = '' # see: https://github.com/CxAalto/gtfspy/commit/8d05c3c94a6d4ca3ed675d88af93def7d5053bfe # pylint: disable=line-too-long |
||
| 276 | # Save the changes |
||
| 277 | self.con_db.commit() |
||
| 278 | |||
| 279 | def delete_older_entries(self, days): |
||
| 280 | """Delete reports from database older than given days |
||
| 281 | |||
| 282 | Arguments: |
||
| 283 | days (int): Number of days in past |
||
| 284 | """ |
||
| 285 | logger.debug("Delete entries older than: %s days", days) |
||
| 286 | self.cursor.execute( |
||
| 287 | "DELETE FROM Report WHERE scan_end <= " |
||
| 288 | 'date("now", "-%s day")' % days |
||
| 289 | ) |
||
| 290 | self.cursor.execute("VACUUM") |
||
| 291 | |||
| 292 | # Save the changes |
||
| 293 | self.con_db.commit() |
||
| 294 | |||
| 295 | def has_entries(self, pending): |
||
| 296 | """Return number of instance entries |
||
| 297 | Arguments: |
||
| 298 | pending (bool): True for pending instances. False for running |
||
| 299 | instances. |
||
| 300 | |||
| 301 | Returns: |
||
| 302 | The number of pending or non pending instances entries. |
||
| 303 | """ |
||
| 304 | self.cursor.execute( |
||
| 305 | "SELECT count(*) FROM Instance WHERE pending=?", |
||
| 306 | (self._to_sql_bool(pending),), |
||
| 307 | ) |
||
| 308 | |||
| 309 | res = self.cursor.fetchone() |
||
| 310 | |||
| 311 | return res[0] |
||
| 312 | |||
| 313 | def check_instances(self): |
||
| 314 | """This method checks the status of check-gmp instances. |
||
| 315 | |||
| 316 | Checks whether instances are pending or not and start instances |
||
| 317 | according to the number saved in the MAX_RUNNING_INSTANCES variable. |
||
| 318 | """ |
||
| 319 | |||
| 320 | # Need to check whether any instances are in the database that were |
||
| 321 | # killed f.e. because a restart of nagios |
||
| 322 | self.clean_orphaned_instances() |
||
| 323 | |||
| 324 | # How many processes are currently running? |
||
| 325 | number_instances = self.has_entries(pending=False) |
||
| 326 | |||
| 327 | # How many pending entries are waiting? |
||
| 328 | number_pending_instances = self.has_entries(pending=True) |
||
| 329 | |||
| 330 | logger.debug( |
||
| 331 | "check_instances: %i %i", number_instances, number_pending_instances |
||
| 332 | ) |
||
| 333 | |||
| 334 | if ( |
||
| 335 | number_instances < MAX_RUNNING_INSTANCES |
||
| 336 | and number_pending_instances == 0 |
||
| 337 | ): |
||
| 338 | # Add entry for running process and go on |
||
| 339 | logger.debug("Fall 1") |
||
| 340 | self.add_instance(pending=False) |
||
| 341 | |||
| 342 | elif ( |
||
| 343 | number_instances < MAX_RUNNING_INSTANCES |
||
| 344 | and number_pending_instances > 0 |
||
| 345 | ): |
||
| 346 | # Change pending entries and wake them up until enough instances |
||
| 347 | # are running |
||
| 348 | logger.debug("Fall 2") |
||
| 349 | |||
| 350 | while ( |
||
| 351 | number_instances < MAX_RUNNING_INSTANCES |
||
| 352 | and number_pending_instances > 0 |
||
| 353 | ): |
||
| 354 | pending_entries = self.get_oldest_pending_entries( |
||
| 355 | MAX_RUNNING_INSTANCES - number_instances |
||
| 356 | ) |
||
| 357 | |||
| 358 | logger.debug("Oldest pending pids: %s", pending_entries) |
||
| 359 | |||
| 360 | for entry in pending_entries: |
||
| 361 | created_at = entry[0] |
||
| 362 | pid = entry[1] |
||
| 363 | |||
| 364 | # Change status to not pending and continue the process |
||
| 365 | self.update_pending_status(created_at, False) |
||
| 366 | self.start_process(pid) |
||
| 367 | |||
| 368 | # Refresh number of instances for next while loop |
||
| 369 | number_instances = self.has_entries(pending=False) |
||
| 370 | number_pending_instances = self.has_entries(pending=True) |
||
| 371 | |||
| 372 | # TODO: Check if this is really necessary |
||
| 373 | # self.add_instance(pending=False) |
||
| 374 | # if number_instances >= MAX_RUNNING_INSTANCES: |
||
| 375 | # self.stop_process(self.pid) |
||
| 376 | |||
| 377 | elif ( |
||
| 378 | number_instances >= MAX_RUNNING_INSTANCES |
||
| 379 | and number_pending_instances == 0 |
||
| 380 | ): |
||
| 381 | # There are running enough instances and no pending instances |
||
| 382 | # Add new entry with pending status true and stop this instance |
||
| 383 | logger.debug("Fall 3") |
||
| 384 | self.add_instance(pending=True) |
||
| 385 | self.stop_process(self.pid) |
||
| 386 | |||
| 387 | elif ( |
||
| 388 | number_instances >= MAX_RUNNING_INSTANCES |
||
| 389 | and number_pending_instances > 0 |
||
| 390 | ): |
||
| 391 | # There are running enough instances and there are min one |
||
| 392 | # pending instance |
||
| 393 | # Add new entry with pending true and stop this instance |
||
| 394 | logger.debug("Fall 4") |
||
| 395 | self.add_instance(pending=True) |
||
| 396 | self.stop_process(self.pid) |
||
| 397 | |||
| 398 | # If an entry is pending and the same params at another process is |
||
| 399 | # starting, then exit with gmp pending since data |
||
| 400 | # if self.has_pending_entries(): |
||
| 401 | # Check if an pending entry is the same as this process |
||
| 402 | # If hostname |
||
| 403 | # date = datetime.now() |
||
| 404 | # end_session('GMP PENDING: since %s' % date, NAGIOS_OK) |
||
| 405 | # end_session('GMP RUNNING: since', NAGIOS_OK) |
||
| 406 | |||
| 407 | def add_instance(self, pending): |
||
| 408 | """Add new instance entry to database |
||
| 409 | |||
| 410 | Retrieve the current time in ISO 8601 format. Create a new entry with |
||
| 411 | pending status and the dedicated pid |
||
| 412 | |||
| 413 | Arguments: |
||
| 414 | pending (bool): State of instance |
||
| 415 | """ |
||
| 416 | current_time = datetime.now().isoformat() |
||
| 417 | |||
| 418 | # Insert values |
||
| 419 | self.cursor.execute( |
||
| 420 | "INSERT INTO Instance VALUES (?, ?, ?)", |
||
| 421 | (current_time, self.pid, self._to_sql_bool(pending)), |
||
| 422 | ) |
||
| 423 | |||
| 424 | # Save the changes |
||
| 425 | self.con_db.commit() |
||
| 426 | |||
| 427 | def get_oldest_pending_entries(self, number): |
||
| 428 | """Return the oldest last entries of pending entries from database |
||
| 429 | |||
| 430 | Return: |
||
| 431 | the oldest instances with status pending limited by the variable |
||
| 432 | <number> |
||
| 433 | """ |
||
| 434 | self.cursor.execute( |
||
| 435 | "SELECT * FROM Instance WHERE pending=1 ORDER BY " |
||
| 436 | "created_at LIMIT ? ", |
||
| 437 | (number,), |
||
| 438 | ) |
||
| 439 | return self.cursor.fetchall() |
||
| 440 | |||
| 441 | def update_pending_status(self, date, pending): |
||
| 442 | """Update pending status of instance |
||
| 443 | |||
| 444 | The date variable works as a primary key for the instance table. |
||
| 445 | The entry with date get his pending status updated. |
||
| 446 | |||
| 447 | Arguments: |
||
| 448 | date (string): Date of creation for entry |
||
| 449 | pending (bool): Status of instance |
||
| 450 | """ |
||
| 451 | self.cursor.execute( |
||
| 452 | "UPDATE Instance SET pending=? WHERE created_at=?", |
||
| 453 | (self._to_sql_bool(pending), date), |
||
| 454 | ) |
||
| 455 | |||
| 456 | # Save the changes |
||
| 457 | self.con_db.commit() |
||
| 458 | |||
| 459 | def delete_instance(self, pid=None): |
||
| 460 | """Delete instance from database |
||
| 461 | |||
| 462 | If a pid different from zero is given, then delete the entry with |
||
| 463 | given pid. Else delete the entry with the pid stored in this class |
||
| 464 | instance. |
||
| 465 | |||
| 466 | Keyword Arguments: |
||
| 467 | pid (number): Process Indentificattion Number (default: {0}) |
||
| 468 | """ |
||
| 469 | if not pid: |
||
| 470 | pid = self.pid |
||
| 471 | |||
| 472 | logger.debug("Delete entry with pid: %i", pid) |
||
| 473 | self.cursor.execute("DELETE FROM Instance WHERE pid=?", (pid,)) |
||
| 474 | |||
| 475 | # Save the changes |
||
| 476 | self.con_db.commit() |
||
| 477 | |||
| 478 | def clean_orphaned_instances(self): |
||
| 479 | """Delete non existing instance entries |
||
| 480 | |||
| 481 | This method check whether a pid exist on the os and if not then delete |
||
| 482 | the orphaned entry from database. |
||
| 483 | """ |
||
| 484 | self.cursor.execute("SELECT pid FROM Instance") |
||
| 485 | |||
| 486 | pids = self.cursor.fetchall() |
||
| 487 | |||
| 488 | for pid in pids: |
||
| 489 | if not self.check_pid(pid[0]): |
||
| 490 | self.delete_instance(pid[0]) |
||
| 491 | |||
| 492 | def wake_instance(self): |
||
| 493 | """Wake up a pending instance |
||
| 494 | |||
| 495 | This method is called at the end of any session from check_gmp. |
||
| 496 | Get the oldest pending entries and wake them up. |
||
| 497 | """ |
||
| 498 | # How many processes are currently running? |
||
| 499 | number_instances = self.has_entries(pending=False) |
||
| 500 | |||
| 501 | # How many pending entries are waiting? |
||
| 502 | number_pending_instances = self.has_entries(pending=True) |
||
| 503 | |||
| 504 | if ( |
||
| 505 | number_instances < MAX_RUNNING_INSTANCES |
||
| 506 | and number_pending_instances > 0 |
||
| 507 | ): |
||
| 508 | |||
| 509 | pending_entries = self.get_oldest_pending_entries( |
||
| 510 | MAX_RUNNING_INSTANCES - number_instances |
||
| 511 | ) |
||
| 512 | |||
| 513 | logger.debug( |
||
| 514 | "wake_instance: %i %i", |
||
| 515 | number_instances, |
||
| 516 | number_pending_instances, |
||
| 517 | ) |
||
| 518 | |||
| 519 | for entry in pending_entries: |
||
| 520 | created_at = entry[0] |
||
| 521 | pid = entry[1] |
||
| 522 | # Change status to not pending and continue the process |
||
| 523 | self.update_pending_status(created_at, False) |
||
| 524 | self.start_process(pid) |
||
| 525 | |||
| 526 | def start_process(self, pid): |
||
| 527 | """Continue a stopped process |
||
| 528 | |||
| 529 | Send a continue signal to the process with given pid |
||
| 530 | |||
| 531 | Arguments: |
||
| 532 | pid (int): Process Identification Number |
||
| 533 | """ |
||
| 534 | logger.debug("Continue pid: %i", pid) |
||
| 535 | os.kill(pid, signal.SIGCONT) |
||
| 536 | |||
| 537 | def stop_process(self, pid): |
||
| 538 | """Stop a running process |
||
| 539 | |||
| 540 | Send a stop signal to the process with given pid |
||
| 541 | |||
| 542 | Arguments: |
||
| 543 | pid (int): Process Identification Number |
||
| 544 | """ |
||
| 545 | os.kill(pid, signal.SIGSTOP) |
||
| 546 | |||
| 547 | def check_pid(self, pid): |
||
| 548 | """Check for the existence of a process. |
||
| 549 | |||
| 550 | Arguments: |
||
| 551 | pid (int): Process Identification Number |
||
| 552 | """ |
||
| 553 | try: |
||
| 554 | os.kill(pid, 0) |
||
| 555 | except OSError: |
||
| 556 | return False |
||
| 557 | else: |
||
| 558 | return True |
||
| 559 | |||
| 560 | |||
| 561 | def ping(gmp, im): |
||
| 562 | """Checks for connectivity |
||
| 563 | |||
| 564 | This function sends the get_version command and checks whether the status |
||
| 565 | is ok or not. |
||
| 566 | """ |
||
| 567 | version = gmp.get_version() |
||
| 568 | version_status = version.xpath("@status") |
||
| 569 | |||
| 570 | if "200" in version_status: |
||
| 571 | end_session(im, "GMP OK: Ping successful", NAGIOS_OK) |
||
| 572 | else: |
||
| 573 | end_session(im, "GMP CRITICAL: Machine dead?", NAGIOS_CRITICAL) |
||
| 574 | |||
| 575 | |||
| 576 | def status(gmp, im, script_args): |
||
| 577 | """Returns the current status of a host |
||
| 578 | |||
| 579 | This functions return the current state of a host. |
||
| 580 | Either directly over the asset management or within a task. |
||
| 581 | |||
| 582 | For a task you can explicitly ask for the trend. |
||
| 583 | Otherwise the last report of the task will be filtered. |
||
| 584 | |||
| 585 | In the asset management the report id in the details is taken |
||
| 586 | as report for the filter. |
||
| 587 | If the asset information contains any vulnerabilities, then will the |
||
| 588 | report be filtered too. With additional parameters it is possible to add |
||
| 589 | more information about the vulnerabilities. |
||
| 590 | |||
| 591 | * DFN-Certs |
||
| 592 | * Logs |
||
| 593 | * Autofp |
||
| 594 | * Scanend |
||
| 595 | * Overrides |
||
| 596 | """ |
||
| 597 | params_used = "task=%s autofp=%i overrides=%i apply_overrides=%i" % ( |
||
| 598 | script_args.task, |
||
| 599 | script_args.autofp, |
||
| 600 | int(script_args.overrides), |
||
| 601 | int(script_args.apply_overrides), |
||
| 602 | ) |
||
| 603 | |||
| 604 | if script_args.task: |
||
| 605 | task = gmp.get_tasks( |
||
| 606 | filter="permission=any owner=any rows=1 " |
||
| 607 | 'name="%s"' % script_args.task |
||
| 608 | ) |
||
| 609 | if script_args.trend: |
||
| 610 | trend = task.xpath("task/trend/text()") |
||
| 611 | |||
| 612 | if not trend: |
||
| 613 | end_session( |
||
| 614 | im, "GMP UNKNOWN: Trend is not available.", NAGIOS_UNKNOWN |
||
| 615 | ) |
||
| 616 | |||
| 617 | trend = trend[0] |
||
| 618 | |||
| 619 | if trend in ["up", "more"]: |
||
| 620 | end_session( |
||
| 621 | im, "GMP CRITICAL: Trend is %s." % trend, NAGIOS_CRITICAL |
||
| 622 | ) |
||
| 623 | elif trend in ["down", "same", "less"]: |
||
| 624 | end_session(im, "GMP OK: Trend is %s." % trend, NAGIOS_OK) |
||
| 625 | else: |
||
| 626 | end_session( |
||
| 627 | im, |
||
| 628 | "GMP UNKNOWN: Trend is unknown: %s" % trend, |
||
| 629 | NAGIOS_UNKNOWN, |
||
| 630 | ) |
||
| 631 | else: |
||
| 632 | last_report_id = task.xpath("task/last_report/report/@id") |
||
| 633 | |||
| 634 | if not last_report_id: |
||
| 635 | end_session( |
||
| 636 | im, "GMP UNKNOWN: Report is not available", NAGIOS_UNKNOWN |
||
| 637 | ) |
||
| 638 | |||
| 639 | last_report_id = last_report_id[0] |
||
| 640 | last_scan_end = task.xpath( |
||
| 641 | "task/last_report/report/scan_end/text()" |
||
| 642 | ) |
||
| 643 | |||
| 644 | if last_scan_end: |
||
| 645 | last_scan_end = last_scan_end[0] |
||
| 646 | else: |
||
| 647 | last_scan_end = "" |
||
| 648 | |||
| 649 | if im.is_old_report(last_scan_end, params_used): |
||
| 650 | host = script_args.hostaddress |
||
| 651 | |||
| 652 | full_report = gmp.get_report( |
||
| 653 | report_id=last_report_id, |
||
| 654 | filter="sort-reverse=id result_hosts_only=1 " |
||
| 655 | "min_cvss_base= min_qod= levels=hmlgd autofp={} " |
||
| 656 | "notes=0 apply_overrides={} overrides={} first=1 rows=-1 " |
||
| 657 | "delta_states=cgns host={}".format( |
||
| 658 | script_args.autofp, |
||
| 659 | int(script_args.overrides), |
||
| 660 | int(script_args.apply_overrides), |
||
| 661 | host, |
||
| 662 | ), |
||
| 663 | details=True, |
||
| 664 | ) |
||
| 665 | |||
| 666 | im.add_report(last_scan_end, params_used, full_report) |
||
| 667 | logger.debug("Report added to db") |
||
| 668 | else: |
||
| 669 | full_report = im.load_local_report() |
||
| 670 | |||
| 671 | filter_report( |
||
| 672 | im, full_report.xpath("report/report")[0], script_args |
||
| 673 | ) |
||
| 674 | |||
| 675 | |||
| 676 | def filter_report(im, report, script_args): |
||
| 677 | """Filter out the information in a report |
||
| 678 | |||
| 679 | This function filters the results of a given report. |
||
| 680 | |||
| 681 | Arguments: |
||
| 682 | report (obj): Report as lxml ElementTree. |
||
| 683 | """ |
||
| 684 | report_id = report.xpath("@id") |
||
| 685 | if report_id: |
||
| 686 | report_id = report_id[0] |
||
| 687 | results = report.xpath("//results") |
||
| 688 | if not results: |
||
| 689 | end_session( |
||
| 690 | im, "GMP UNKNOWN: Failed to get results list", NAGIOS_UNKNOWN |
||
| 691 | ) |
||
| 692 | |||
| 693 | results = results[0] |
||
| 694 | # Init variables |
||
| 695 | any_found = False |
||
| 696 | high_count = 0 |
||
| 697 | medium_count = 0 |
||
| 698 | low_count = 0 |
||
| 699 | log_count = 0 |
||
| 700 | error_count = 0 |
||
| 701 | |||
| 702 | nvts = {"high": [], "medium": [], "low": [], "log": []} |
||
| 703 | |||
| 704 | all_results = results.xpath("result") |
||
| 705 | |||
| 706 | for result in all_results: |
||
| 707 | if script_args.hostaddress: |
||
| 708 | host = result.xpath("host/text()") |
||
| 709 | if not host: |
||
| 710 | end_session( |
||
| 711 | im, |
||
| 712 | "GMP UNKNOWN: Failed to parse result host", |
||
| 713 | NAGIOS_UNKNOWN, |
||
| 714 | ) |
||
| 715 | |||
| 716 | if script_args.hostaddress != host[0]: |
||
| 717 | continue |
||
| 718 | any_found = True |
||
| 719 | |||
| 720 | threat = result.xpath("threat/text()") |
||
| 721 | if not threat: |
||
| 722 | end_session( |
||
| 723 | im, |
||
| 724 | "GMP UNKNOWN: Failed to parse result threat.", |
||
| 725 | NAGIOS_UNKNOWN, |
||
| 726 | ) |
||
| 727 | |||
| 728 | threat = threat[0] |
||
| 729 | if threat in "High": |
||
| 730 | high_count += 1 |
||
| 731 | if script_args.oid: |
||
| 732 | nvts["high"].append(retrieve_nvt_data(result)) |
||
| 733 | elif threat in "Medium": |
||
| 734 | medium_count += 1 |
||
| 735 | if script_args.oid: |
||
| 736 | nvts["medium"].append(retrieve_nvt_data(result)) |
||
| 737 | elif threat in "Low": |
||
| 738 | low_count += 1 |
||
| 739 | if script_args.oid: |
||
| 740 | nvts["low"].append(retrieve_nvt_data(result)) |
||
| 741 | elif threat in "Log": |
||
| 742 | log_count += 1 |
||
| 743 | if script_args.oid: |
||
| 744 | nvts["log"].append(retrieve_nvt_data(result)) |
||
| 745 | else: |
||
| 746 | end_session( |
||
| 747 | im, |
||
| 748 | "GMP UNKNOWN: Unknown result threat: %s" % threat, |
||
| 749 | NAGIOS_UNKNOWN, |
||
| 750 | ) |
||
| 751 | |||
| 752 | errors = report.xpath("errors") |
||
| 753 | |||
| 754 | if errors: |
||
| 755 | errors = errors[0] |
||
| 756 | if script_args.hostaddress: |
||
| 757 | for error in errors.xpath("error"): |
||
| 758 | host = error.xpath("host/text()") |
||
| 759 | if script_args.hostaddress == host[0]: |
||
| 760 | error_count += 1 |
||
| 761 | else: |
||
| 762 | error_count = errors.xpath("count/text()")[0] |
||
| 763 | |||
| 764 | ret = 0 |
||
| 765 | if high_count > 0: |
||
| 766 | ret = NAGIOS_CRITICAL |
||
| 767 | elif medium_count > 0: |
||
| 768 | ret = NAGIOS_WARNING |
||
| 769 | |||
| 770 | if script_args.empty_as_unknown and ( |
||
| 771 | not all_results or (not any_found and script_args.hostaddress) |
||
| 772 | ): |
||
| 773 | ret = NAGIOS_UNKNOWN |
||
| 774 | |||
| 775 | print( |
||
| 776 | "GMP %s: %i vulnerabilities found - High: %i Medium: %i " |
||
| 777 | "Low: %i" |
||
| 778 | % ( |
||
| 779 | NAGIOS_MSG[ret], |
||
| 780 | (high_count + medium_count + low_count), |
||
| 781 | high_count, |
||
| 782 | medium_count, |
||
| 783 | low_count, |
||
| 784 | ) |
||
| 785 | ) |
||
| 786 | |||
| 787 | if not all_results: |
||
| 788 | print("Report did not contain any vulnerabilities") |
||
| 789 | |||
| 790 | elif not any_found and script_args.hostaddress: |
||
| 791 | print( |
||
| 792 | "Report did not contain vulnerabilities for IP %s" |
||
| 793 | % script_args.hostaddress |
||
| 794 | ) |
||
| 795 | |||
| 796 | if int(error_count) > 0: |
||
| 797 | if script_args.hostaddress: |
||
| 798 | print_without_pipe( |
||
| 799 | "Report did contain %i errors for IP %s" |
||
| 800 | % (error_count, script_args.hostaddress) |
||
| 801 | ) |
||
| 802 | else: |
||
| 803 | print_without_pipe( |
||
| 804 | "Report did contain %i errors" % int(error_count) |
||
| 805 | ) |
||
| 806 | |||
| 807 | if script_args.report_link: |
||
| 808 | print( |
||
| 809 | "https://%s/omp?cmd=get_report&report_id=%s" |
||
| 810 | % (script_args.hostname, report_id) |
||
| 811 | ) |
||
| 812 | |||
| 813 | if script_args.oid: |
||
| 814 | print_nvt_data( |
||
| 815 | nvts, |
||
| 816 | show_log=script_args.showlog, |
||
| 817 | show_ports=script_args.show_ports, |
||
| 818 | descr=script_args.descr, |
||
| 819 | dfn=script_args.dfn, |
||
| 820 | ) |
||
| 821 | |||
| 822 | if script_args.scanend: |
||
| 823 | end = report.xpath("//end/text()") |
||
| 824 | end = end[0] if end else "Timestamp of scan end not given" |
||
| 825 | print("SCAN_END: %s" % end) |
||
| 826 | |||
| 827 | if script_args.details: |
||
| 828 | if script_args.hostname: |
||
| 829 | print("GSM_Host: %s:%d" % (script_args.hostname, script_args.port)) |
||
| 830 | if script_args.gmp_username: |
||
| 831 | print("GMP_User: %s" % script_args.gmp_username) |
||
| 832 | if script_args.task: |
||
| 833 | print_without_pipe("Task: %s" % script_args.task) |
||
| 834 | |||
| 835 | end_session( |
||
| 836 | im, |
||
| 837 | "|High=%i Medium=%i Low=%i" % (high_count, medium_count, low_count), |
||
| 838 | ret, |
||
| 839 | ) |
||
| 840 | |||
| 841 | |||
| 842 | def retrieve_nvt_data(result): |
||
| 843 | """Retrieve the nvt data out of the result object |
||
| 844 | |||
| 845 | This function parse the xml tree to find the important nvt data. |
||
| 846 | |||
| 847 | Arguments: |
||
| 848 | result (obj): Result as lxml ElementTree |
||
| 849 | |||
| 850 | Returns: |
||
| 851 | Tuple -- List with oid, name, desc, port and dfn |
||
| 852 | """ |
||
| 853 | oid = result.xpath("nvt/@oid") |
||
| 854 | name = result.xpath("nvt/name/text()") |
||
| 855 | desc = result.xpath("description/text()") |
||
| 856 | port = result.xpath("port/text()") |
||
| 857 | |||
| 858 | if oid: |
||
| 859 | oid = oid[0] |
||
| 860 | |||
| 861 | if name: |
||
| 862 | name = name[0] |
||
| 863 | |||
| 864 | if desc: |
||
| 865 | desc = desc[0] |
||
| 866 | else: |
||
| 867 | desc = "" |
||
| 868 | |||
| 869 | if port: |
||
| 870 | port = port[0] |
||
| 871 | else: |
||
| 872 | port = "" |
||
| 873 | |||
| 874 | certs = result.xpath("nvt/cert/cert_ref") |
||
| 875 | |||
| 876 | dfn_list = [] |
||
| 877 | for ref in certs: |
||
| 878 | ref_type = ref.xpath("@type")[0] |
||
| 879 | ref_id = ref.xpath("@id")[0] |
||
| 880 | |||
| 881 | if ref_type in "DFN-CERT": |
||
| 882 | dfn_list.append(ref_id) |
||
| 883 | |||
| 884 | return (oid, name, desc, port, dfn_list) |
||
| 885 | |||
| 886 | |||
| 887 | def print_nvt_data( |
||
| 888 | nvts, show_log=False, show_ports=False, descr=False, dfn=False |
||
| 889 | ): |
||
| 890 | """Print nvt data |
||
| 891 | |||
| 892 | Prints for each nvt found in the array the relevant data |
||
| 893 | |||
| 894 | Arguments: |
||
| 895 | nvts (obj): Object holding all nvts |
||
| 896 | """ |
||
| 897 | for key, nvt_data in nvts.items(): |
||
| 898 | if key == "log" and not show_log: |
||
| 899 | continue |
||
| 900 | for nvt in nvt_data: |
||
| 901 | print_without_pipe("NVT: %s (%s) %s" % (nvt[0], key, nvt[1])) |
||
| 902 | if show_ports: |
||
| 903 | print_without_pipe("PORT: %s" % (nvt[3])) |
||
| 904 | if descr: |
||
| 905 | print_without_pipe("DESCR: %s" % nvt[2]) |
||
| 906 | |||
| 907 | if dfn and nvt[4]: |
||
| 908 | dfn_list = ", ".join(nvt[4]) |
||
| 909 | if dfn_list: |
||
| 910 | print_without_pipe("DFN-CERT: %s" % dfn_list) |
||
| 911 | |||
| 912 | |||
| 913 | def end_session(im, msg, nagios_status): |
||
| 914 | """End the session |
||
| 915 | |||
| 916 | Close the socket if open and print the last msg |
||
| 917 | |||
| 918 | Arguments: |
||
| 919 | msg string): Message to print |
||
| 920 | nagios_status (int): Exit status |
||
| 921 | """ |
||
| 922 | print(msg) |
||
| 923 | |||
| 924 | # Delete this instance |
||
| 925 | im.delete_instance() |
||
| 926 | |||
| 927 | # Activate some waiting instances if possible |
||
| 928 | im.wake_instance() |
||
| 929 | |||
| 930 | # Close the connection to database |
||
| 931 | im.close_db() |
||
| 932 | |||
| 933 | sys.exit(nagios_status) |
||
| 934 | |||
| 935 | |||
| 936 | def print_without_pipe(msg): |
||
| 937 | """Prints the message, but without any pipe symbol |
||
| 938 | |||
| 939 | If any pipe symbol is in the msg string, then it will be replaced with |
||
| 940 | broken pipe symbol. |
||
| 941 | |||
| 942 | Arguments: |
||
| 943 | msg (string): Message to print |
||
| 944 | """ |
||
| 945 | if "|" in msg: |
||
| 946 | msg = msg.replace("|", "¦") |
||
| 947 | |||
| 948 | print(msg) |
||
| 949 | |||
| 950 | |||
| 951 | # ISO 8601 date time string parsing |
||
| 952 | |||
| 953 | # Copyright (c) 2007 - 2015 Michael Twomey |
||
| 954 | |||
| 955 | # Permission is hereby granted, free of charge, to any person obtaining a |
||
| 956 | # copy of this software and associated documentation files (the |
||
| 957 | # "Software"), to deal in the Software without restriction, including |
||
| 958 | # without limitation the rights to use, copy, modify, merge, publish, |
||
| 959 | # distribute, sublicense, and/or sell copies of the Software, and to |
||
| 960 | # permit persons to whom the Software is furnished to do so, subject to |
||
| 961 | # the following conditions: |
||
| 962 | |||
| 963 | # The above copyright notice and this permission notice shall be included |
||
| 964 | # in all copies or substantial portions of the Software. |
||
| 965 | |||
| 966 | # THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS |
||
| 967 | # OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF |
||
| 968 | # MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. |
||
| 969 | # IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY |
||
| 970 | # CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, |
||
| 971 | # TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE |
||
| 972 | # SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. |
||
| 973 | |||
| 974 | __all__ = ["parse_date", "ParseError", "UTC"] |
||
| 975 | |||
| 976 | _basestring = str |
||
| 977 | |||
| 978 | |||
| 979 | # Adapted from http://delete.me.uk/2005/03/iso8601.html |
||
| 980 | ISO8601_REGEX = re.compile( |
||
| 981 | r""" |
||
| 982 | (?P<year>[0-9]{4}) |
||
| 983 | ( |
||
| 984 | ( |
||
| 985 | (-(?P<monthdash>[0-9]{1,2})) |
||
| 986 | | |
||
| 987 | (?P<month>[0-9]{2}) |
||
| 988 | (?!$) # Don't allow YYYYMM |
||
| 989 | ) |
||
| 990 | ( |
||
| 991 | ( |
||
| 992 | (-(?P<daydash>[0-9]{1,2})) |
||
| 993 | | |
||
| 994 | (?P<day>[0-9]{2}) |
||
| 995 | ) |
||
| 996 | ( |
||
| 997 | ( |
||
| 998 | (?P<separator>[ T]) |
||
| 999 | (?P<hour>[0-9]{2}) |
||
| 1000 | (:{0,1}(?P<minute>[0-9]{2})){0,1} |
||
| 1001 | ( |
||
| 1002 | :{0,1}(?P<second>[0-9]{1,2}) |
||
| 1003 | ([.,](?P<second_fraction>[0-9]+)){0,1} |
||
| 1004 | ){0,1} |
||
| 1005 | (?P<timezone> |
||
| 1006 | Z |
||
| 1007 | | |
||
| 1008 | ( |
||
| 1009 | (?P<tz_sign>[-+]) |
||
| 1010 | (?P<tz_hour>[0-9]{2}) |
||
| 1011 | :{0,1} |
||
| 1012 | (?P<tz_minute>[0-9]{2}){0,1} |
||
| 1013 | ) |
||
| 1014 | ){0,1} |
||
| 1015 | ){0,1} |
||
| 1016 | ) |
||
| 1017 | ){0,1} # YYYY-MM |
||
| 1018 | ){0,1} # YYYY only |
||
| 1019 | $ |
||
| 1020 | """, |
||
| 1021 | re.VERBOSE, |
||
| 1022 | ) |
||
| 1023 | |||
| 1024 | |||
| 1025 | class ParseError(Exception): |
||
| 1026 | """Raised when there is a problem parsing a date string""" |
||
| 1027 | |||
| 1028 | |||
| 1029 | # Yoinked from python docs |
||
| 1030 | ZERO = timedelta(0) |
||
| 1031 | |||
| 1032 | |||
| 1033 | class Utc(tzinfo): |
||
| 1034 | """UTC Timezone""" |
||
| 1035 | |||
| 1036 | def utcoffset(self, dt): |
||
| 1037 | return ZERO |
||
| 1038 | |||
| 1039 | def tzname(self, dt): |
||
| 1040 | return "UTC" |
||
| 1041 | |||
| 1042 | def dst(self, dt): |
||
| 1043 | return ZERO |
||
| 1044 | |||
| 1045 | def __repr__(self): |
||
| 1046 | return "<iso8601.Utc>" |
||
| 1047 | |||
| 1048 | |||
| 1049 | UTC = Utc() |
||
| 1050 | |||
| 1051 | |||
| 1052 | class FixedOffset(tzinfo): |
||
| 1053 | """Fixed offset in hours and minutes from UTC""" |
||
| 1054 | |||
| 1055 | def __init__(self, offset_hours, offset_minutes, name): |
||
| 1056 | self.__offset_hours = offset_hours # Keep for later __getinitargs__ |
||
| 1057 | # Keep for later __getinitargs__ |
||
| 1058 | self.__offset_minutes = offset_minutes |
||
| 1059 | self.__offset = timedelta(hours=offset_hours, minutes=offset_minutes) |
||
| 1060 | self.__name = name |
||
| 1061 | |||
| 1062 | def __eq__(self, other): |
||
| 1063 | if isinstance(other, FixedOffset): |
||
| 1064 | # pylint: disable=protected-access |
||
| 1065 | return (other.__offset == self.__offset) and ( |
||
| 1066 | other.__name == self.__name |
||
| 1067 | ) |
||
| 1068 | if isinstance(other, tzinfo): |
||
| 1069 | return other == self |
||
| 1070 | return False |
||
| 1071 | |||
| 1072 | def __getinitargs__(self): |
||
| 1073 | return (self.__offset_hours, self.__offset_minutes, self.__name) |
||
| 1074 | |||
| 1075 | def utcoffset(self, dt): |
||
| 1076 | return self.__offset |
||
| 1077 | |||
| 1078 | def tzname(self, dt): |
||
| 1079 | return self.__name |
||
| 1080 | |||
| 1081 | def dst(self, dt): |
||
| 1082 | return ZERO |
||
| 1083 | |||
| 1084 | def __repr__(self): |
||
| 1085 | return "<FixedOffset %r %r>" % (self.__name, self.__offset) |
||
| 1086 | |||
| 1087 | |||
| 1088 | def to_int( |
||
| 1089 | source_dict, key, default_to_zero=False, default=None, required=True |
||
| 1090 | ): |
||
| 1091 | """Pull a value from the dict and convert to int |
||
| 1092 | |||
| 1093 | :param default_to_zero: If the value is None or empty, treat it as zero |
||
| 1094 | :param default: If the value is missing in the dict use this default |
||
| 1095 | |||
| 1096 | """ |
||
| 1097 | |||
| 1098 | value = source_dict.get(key) |
||
| 1099 | if value in [None, ""]: |
||
| 1100 | value = default |
||
| 1101 | if (value in ["", None]) and default_to_zero: |
||
| 1102 | return 0 |
||
| 1103 | if value is None: |
||
| 1104 | if required: |
||
| 1105 | raise ParseError("Unable to read %s from %s" % (key, source_dict)) |
||
| 1106 | return value |
||
| 1107 | else: |
||
| 1108 | return int(value) |
||
| 1109 | |||
| 1110 | |||
| 1111 | def parse_timezone(matches, default_timezone=UTC): |
||
| 1112 | """Parses ISO 8601 time zone specs into tzinfo offsets""" |
||
| 1113 | |||
| 1114 | if matches["timezone"] == "Z": |
||
| 1115 | return UTC |
||
| 1116 | # This isn't strictly correct, but it's common to encounter dates without |
||
| 1117 | # timezones so I'll assume the default (which defaults to UTC). |
||
| 1118 | # Addresses issue 4. |
||
| 1119 | if matches["timezone"] is None: |
||
| 1120 | return default_timezone |
||
| 1121 | sign = matches["tz_sign"] |
||
| 1122 | hours = to_int(matches, "tz_hour") |
||
| 1123 | minutes = to_int(matches, "tz_minute", default_to_zero=True) |
||
| 1124 | description = "%s%02d:%02d" % (sign, hours, minutes) |
||
| 1125 | if sign == "-": |
||
| 1126 | hours = -1 * hours |
||
| 1127 | minutes = -1 * minutes |
||
| 1128 | return FixedOffset(hours, minutes, description) |
||
| 1129 | |||
| 1130 | |||
| 1131 | def parse_date(datestring, default_timezone=UTC): |
||
| 1132 | """Parses ISO 8601 dates into datetime objects |
||
| 1133 | |||
| 1134 | The timezone is parsed from the date string. However it is quite common to |
||
| 1135 | have dates without a timezone (not strictly correct). In this case the |
||
| 1136 | default timezone specified in default_timezone is used. This is UTC by |
||
| 1137 | default. |
||
| 1138 | |||
| 1139 | Arguments |
||
| 1140 | datestring: The date to parse as a string |
||
| 1141 | default_timezone: A datetime tzinfo instance to use when no timezone |
||
| 1142 | is specified in the datestring. If this is set to |
||
| 1143 | None then a naive datetime object is returned. |
||
| 1144 | Returns: |
||
| 1145 | A datetime.datetime instance |
||
| 1146 | Raises: |
||
| 1147 | ParseError when there is a problem parsing the date or |
||
| 1148 | constructing the datetime instance. |
||
| 1149 | |||
| 1150 | """ |
||
| 1151 | if not isinstance(datestring, _basestring): |
||
| 1152 | raise ParseError("Expecting a string %r" % datestring) |
||
| 1153 | |||
| 1154 | match = ISO8601_REGEX.match(datestring) |
||
| 1155 | if not match: |
||
| 1156 | raise ParseError("Unable to parse date string %r" % datestring) |
||
| 1157 | |||
| 1158 | groups = match.groupdict() |
||
| 1159 | |||
| 1160 | tz = parse_timezone(groups, default_timezone=default_timezone) |
||
| 1161 | |||
| 1162 | groups["second_fraction"] = int( |
||
| 1163 | Decimal("0.%s" % (groups["second_fraction"] or 0)) |
||
| 1164 | * Decimal("1000000.0") |
||
| 1165 | ) |
||
| 1166 | |||
| 1167 | try: |
||
| 1168 | return datetime( |
||
| 1169 | year=to_int(groups, "year"), |
||
| 1170 | month=to_int( |
||
| 1171 | groups, |
||
| 1172 | "month", |
||
| 1173 | default=to_int(groups, "monthdash", required=False, default=1), |
||
| 1174 | ), |
||
| 1175 | day=to_int( |
||
| 1176 | groups, |
||
| 1177 | "day", |
||
| 1178 | default=to_int(groups, "daydash", required=False, default=1), |
||
| 1179 | ), |
||
| 1180 | hour=to_int(groups, "hour", default_to_zero=True), |
||
| 1181 | minute=to_int(groups, "minute", default_to_zero=True), |
||
| 1182 | second=to_int(groups, "second", default_to_zero=True), |
||
| 1183 | microsecond=groups["second_fraction"], |
||
| 1184 | tzinfo=tz, |
||
| 1185 | ) |
||
| 1186 | except Exception as e: |
||
| 1187 | raise ParseError(e) from None |
||
| 1188 | |||
| 1189 | |||
| 1190 | def main(gmp, args): |
||
| 1191 | tmp_path = "%s/check_gmp/" % tempfile.gettempdir() |
||
| 1192 | tmp_path_db = tmp_path + "reports.db" |
||
| 1193 | |||
| 1194 | parser = ArgumentParser( |
||
| 1195 | prog="check-gmp", |
||
| 1196 | prefix_chars="-", |
||
| 1197 | description=HELP_TEXT, |
||
| 1198 | formatter_class=RawTextHelpFormatter, |
||
| 1199 | add_help=False, |
||
| 1200 | epilog=""" |
||
| 1201 | usage: gvm-script [connection_type] check-gmp.gmp.py ... |
||
| 1202 | or: gvm-script [connection_type] check-gmp.gmp.py -H |
||
| 1203 | or: gvm-script connection_type --help""", |
||
| 1204 | ) |
||
| 1205 | |||
| 1206 | parser.add_argument( |
||
| 1207 | "-H", action="help", help="Show this help message and exit." |
||
| 1208 | ) |
||
| 1209 | |||
| 1210 | parser.add_argument( |
||
| 1211 | "-V", |
||
| 1212 | "--version", |
||
| 1213 | action="version", |
||
| 1214 | version="%(prog)s {version}".format(version=__version__), |
||
| 1215 | help="Show program's version number and exit", |
||
| 1216 | ) |
||
| 1217 | |||
| 1218 | parser.add_argument( |
||
| 1219 | "--cache", |
||
| 1220 | nargs="?", |
||
| 1221 | default=tmp_path_db, |
||
| 1222 | help="Path to cache file. Default: %s." % tmp_path_db, |
||
| 1223 | ) |
||
| 1224 | |||
| 1225 | parser.add_argument( |
||
| 1226 | "--clean", action="store_true", help="Activate to clean the database." |
||
| 1227 | ) |
||
| 1228 | |||
| 1229 | parser.add_argument( |
||
| 1230 | "-u", "--gmp-username", help="GMP username.", required=False |
||
| 1231 | ) |
||
| 1232 | |||
| 1233 | parser.add_argument( |
||
| 1234 | "-w", "--gmp-password", help="GMP password.", required=False |
||
| 1235 | ) |
||
| 1236 | |||
| 1237 | parser.add_argument( |
||
| 1238 | "-F", |
||
| 1239 | "--hostaddress", |
||
| 1240 | required=False, |
||
| 1241 | default="", |
||
| 1242 | help="Report last report status of host <ip>.", |
||
| 1243 | ) |
||
| 1244 | |||
| 1245 | parser.add_argument( |
||
| 1246 | "-T", "--task", required=False, help="Report status of task <task>." |
||
| 1247 | ) |
||
| 1248 | |||
| 1249 | parser.add_argument( |
||
| 1250 | "--apply-overrides", action="store_true", help="Apply overrides." |
||
| 1251 | ) |
||
| 1252 | |||
| 1253 | parser.add_argument( |
||
| 1254 | "--overrides", action="store_true", help="Include overrides." |
||
| 1255 | ) |
||
| 1256 | |||
| 1257 | parser.add_argument( |
||
| 1258 | "-d", |
||
| 1259 | "--details", |
||
| 1260 | action="store_true", |
||
| 1261 | help="Include connection details in output.", |
||
| 1262 | ) |
||
| 1263 | |||
| 1264 | parser.add_argument( |
||
| 1265 | "-l", |
||
| 1266 | "--report-link", |
||
| 1267 | action="store_true", |
||
| 1268 | help="Include URL of report in output.", |
||
| 1269 | ) |
||
| 1270 | |||
| 1271 | parser.add_argument( |
||
| 1272 | "--dfn", |
||
| 1273 | action="store_true", |
||
| 1274 | help="Include DFN-CERT IDs on vulnerabilities in output.", |
||
| 1275 | ) |
||
| 1276 | |||
| 1277 | parser.add_argument( |
||
| 1278 | "--oid", |
||
| 1279 | action="store_true", |
||
| 1280 | help="Include OIDs of NVTs finding vulnerabilities in output.", |
||
| 1281 | ) |
||
| 1282 | |||
| 1283 | parser.add_argument( |
||
| 1284 | "--descr", |
||
| 1285 | action="store_true", |
||
| 1286 | help="Include descriptions of NVTs finding vulnerabilities in output.", |
||
| 1287 | ) |
||
| 1288 | |||
| 1289 | parser.add_argument( |
||
| 1290 | "--showlog", action="store_true", help="Include log messages in output." |
||
| 1291 | ) |
||
| 1292 | |||
| 1293 | parser.add_argument( |
||
| 1294 | "--show-ports", |
||
| 1295 | action="store_true", |
||
| 1296 | help="Include port of given vulnerable nvt in output.", |
||
| 1297 | ) |
||
| 1298 | |||
| 1299 | parser.add_argument( |
||
| 1300 | "--scanend", |
||
| 1301 | action="store_true", |
||
| 1302 | help="Include timestamp of scan end in output.", |
||
| 1303 | ) |
||
| 1304 | |||
| 1305 | parser.add_argument( |
||
| 1306 | "--autofp", |
||
| 1307 | type=int, |
||
| 1308 | choices=[0, 1, 2], |
||
| 1309 | default=0, |
||
| 1310 | help="Trust vendor security updates for automatic false positive" |
||
| 1311 | " filtering (0=No, 1=full match, 2=partial).", |
||
| 1312 | ) |
||
| 1313 | |||
| 1314 | parser.add_argument( |
||
| 1315 | "-e", |
||
| 1316 | "--empty-as-unknown", |
||
| 1317 | action="store_true", |
||
| 1318 | help="Respond with UNKNOWN on empty results.", |
||
| 1319 | ) |
||
| 1320 | |||
| 1321 | parser.add_argument( |
||
| 1322 | "-I", |
||
| 1323 | "--max-running-instances", |
||
| 1324 | default=10, |
||
| 1325 | type=int, |
||
| 1326 | help="Set the maximum simultaneous processes of check-gmp", |
||
| 1327 | ) |
||
| 1328 | |||
| 1329 | parser.add_argument("--hostname", nargs="?", required=False) |
||
| 1330 | |||
| 1331 | group = parser.add_mutually_exclusive_group(required=False) |
||
| 1332 | group.add_argument( |
||
| 1333 | "--ping", action="store_true", help="Ping the gsm appliance." |
||
| 1334 | ) |
||
| 1335 | |||
| 1336 | group.add_argument( |
||
| 1337 | "--status", action="store_true", help="Report status of task." |
||
| 1338 | ) |
||
| 1339 | |||
| 1340 | group = parser.add_mutually_exclusive_group(required=False) |
||
| 1341 | group.add_argument( |
||
| 1342 | "--days", |
||
| 1343 | type=int, |
||
| 1344 | help="Delete database entries that are older than" " given days.", |
||
| 1345 | ) |
||
| 1346 | group.add_argument("--ip", help="Delete database entry for given ip.") |
||
| 1347 | |||
| 1348 | group = parser.add_mutually_exclusive_group(required=False) |
||
| 1349 | group.add_argument( |
||
| 1350 | "--trend", action="store_true", help="Report status by trend." |
||
| 1351 | ) |
||
| 1352 | group.add_argument( |
||
| 1353 | "--last-report", |
||
| 1354 | action="store_true", |
||
| 1355 | help="Report status by last report.", |
||
| 1356 | ) |
||
| 1357 | |||
| 1358 | script_args = parser.parse_args(args.script_args) |
||
| 1359 | |||
| 1360 | aux_parser = ArgumentParser( |
||
| 1361 | prefix_chars="-", formatter_class=RawTextHelpFormatter |
||
| 1362 | ) |
||
| 1363 | aux_parser.add_argument("--hostname", nargs="?", required=False) |
||
| 1364 | gvm_tool_args, _ = aux_parser.parse_known_args(sys.argv) |
||
| 1365 | if "hostname" in gvm_tool_args: |
||
| 1366 | script_args.hostname = gvm_tool_args.hostname |
||
| 1367 | |||
| 1368 | # Set the max running instances variable |
||
| 1369 | if script_args.max_running_instances: |
||
| 1370 | # TODO should be passed as local variable instead of using a global one |
||
| 1371 | # pylint: disable=global-statement |
||
| 1372 | global MAX_RUNNING_INSTANCES |
||
| 1373 | MAX_RUNNING_INSTANCES = script_args.max_running_instances |
||
| 1374 | |||
| 1375 | # Set the report manager |
||
| 1376 | if script_args.cache: |
||
| 1377 | tmp_path_db = script_args.cache |
||
| 1378 | im = InstanceManager(tmp_path_db, parser) |
||
| 1379 | |||
| 1380 | # Check if command holds clean command |
||
| 1381 | if script_args.clean: |
||
| 1382 | if script_args.ip: |
||
| 1383 | logger.info("Delete entry with ip %s", script_args.ip) |
||
| 1384 | im.delete_entry_with_ip(script_args.ip) |
||
| 1385 | elif script_args.days: |
||
| 1386 | logger.info("Delete entries older than %s days", script_args.days) |
||
| 1387 | im.delete_older_entries(script_args.days) |
||
| 1388 | sys.exit(1) |
||
| 1389 | |||
| 1390 | # Set the host |
||
| 1391 | im.set_host(script_args.hostaddress) |
||
| 1392 | |||
| 1393 | # Check if no more than 10 instances of check-gmp runs simultaneously |
||
| 1394 | im.check_instances() |
||
| 1395 | |||
| 1396 | try: |
||
| 1397 | gmp.get_version() |
||
| 1398 | except Exception as e: # pylint: disable=broad-except |
||
| 1399 | end_session(im, "GMP CRITICAL: %s" % str(e), NAGIOS_CRITICAL) |
||
| 1400 | |||
| 1401 | if script_args.ping: |
||
| 1402 | ping(gmp, im) |
||
| 1403 | |||
| 1404 | if "status" in script_args: |
||
| 1405 | status(gmp, im, script_args) |
||
| 1406 | |||
| 1407 | |||
| 1408 | if __name__ == "__gmp__": |
||
| 1409 | main(gmp, args) |
||
|
0 ignored issues
–
show
Comprehensibility
Best Practice
introduced
by
Loading history...
Comprehensibility
Best Practice
introduced
by
|
|||
| 1410 |