123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443 |
- package main
- import (
- "context"
- "encoding/json"
- "fmt"
- "net/url"
- "os"
- "strconv"
- "strings"
- "time"
- "github.com/crowdsecurity/crowdsec/pkg/apiclient"
- "github.com/crowdsecurity/crowdsec/pkg/cwversion"
- "github.com/crowdsecurity/crowdsec/pkg/database"
- "github.com/crowdsecurity/crowdsec/pkg/models"
- "github.com/crowdsecurity/crowdsec/pkg/types"
- "github.com/go-openapi/strfmt"
- "github.com/olekukonko/tablewriter"
- log "github.com/sirupsen/logrus"
- "github.com/spf13/cobra"
- )
- var Client *apiclient.ApiClient
- func DecisionsToTable(alerts *models.GetAlertsResponse) error {
- /*here we cheat a bit : to make it more readable for the user, we dedup some entries*/
- var spamLimit map[string]bool = make(map[string]bool)
- /*process in reverse order to keep the latest item only*/
- for aIdx := len(*alerts) - 1; aIdx >= 0; aIdx-- {
- alertItem := (*alerts)[aIdx]
- newDecisions := make([]*models.Decision, 0)
- for _, decisionItem := range alertItem.Decisions {
- spamKey := fmt.Sprintf("%t:%s:%s:%s", *decisionItem.Simulated, *decisionItem.Type, *decisionItem.Scope, *decisionItem.Value)
- if _, ok := spamLimit[spamKey]; ok {
- continue
- }
- spamLimit[spamKey] = true
- newDecisions = append(newDecisions, decisionItem)
- }
- alertItem.Decisions = newDecisions
- }
- if csConfig.Cscli.Output == "raw" {
- fmt.Printf("id,source,ip,reason,action,country,as,events_count,expiration,simulated,alert_id\n")
- for _, alertItem := range *alerts {
- for _, decisionItem := range alertItem.Decisions {
- fmt.Printf("%v,%v,%v,%v,%v,%v,%v,%v,%v,%v,%v\n",
- decisionItem.ID,
- *decisionItem.Origin,
- *decisionItem.Scope+":"+*decisionItem.Value,
- *decisionItem.Scenario,
- *decisionItem.Type,
- alertItem.Source.Cn,
- alertItem.Source.AsNumber+" "+alertItem.Source.AsName,
- *alertItem.EventsCount,
- *decisionItem.Duration,
- *decisionItem.Simulated,
- alertItem.ID)
- }
- }
- } else if csConfig.Cscli.Output == "json" {
- x, _ := json.MarshalIndent(alerts, "", " ")
- fmt.Printf("%s", string(x))
- } else if csConfig.Cscli.Output == "human" {
- table := tablewriter.NewWriter(os.Stdout)
- table.SetHeader([]string{"ID", "Source", "Scope:Value", "Reason", "Action", "Country", "AS", "Events", "expiration", "Alert ID"})
- if len(*alerts) == 0 {
- fmt.Println("No active decisions")
- return nil
- }
- for _, alertItem := range *alerts {
- for _, decisionItem := range alertItem.Decisions {
- if *alertItem.Simulated {
- *decisionItem.Type = fmt.Sprintf("(simul)%s", *decisionItem.Type)
- }
- table.Append([]string{
- strconv.Itoa(int(decisionItem.ID)),
- *decisionItem.Origin,
- *decisionItem.Scope + ":" + *decisionItem.Value,
- *decisionItem.Scenario,
- *decisionItem.Type,
- alertItem.Source.Cn,
- alertItem.Source.AsNumber + " " + alertItem.Source.AsName,
- strconv.Itoa(int(*alertItem.EventsCount)),
- *decisionItem.Duration,
- strconv.Itoa(int(alertItem.ID)),
- })
- }
- }
- table.Render() // Send output
- }
- return nil
- }
- func NewDecisionsCmd() *cobra.Command {
- /* ---- DECISIONS COMMAND */
- var cmdDecisions = &cobra.Command{
- Use: "decisions [action]",
- Short: "Manage decisions",
- Long: `Add/List/Delete decisions from LAPI`,
- Example: `cscli decisions [action] [filter]`,
- /*TBD example*/
- Args: cobra.MinimumNArgs(1),
- PersistentPreRun: func(cmd *cobra.Command, args []string) {
- if csConfig.API.Client == nil {
- log.Fatalln("There is no configuration on 'api_client:'")
- }
- if csConfig.API.Client.Credentials == nil {
- log.Fatalf("Please provide credentials for the API in '%s'", csConfig.API.Client.CredentialsFilePath)
- }
- password := strfmt.Password(csConfig.API.Client.Credentials.Password)
- apiurl, err := url.Parse(csConfig.API.Client.Credentials.URL)
- if err != nil {
- log.Fatalf("parsing api url ('%s'): %s", csConfig.API.Client.Credentials.URL, err)
- }
- Client, err = apiclient.NewClient(&apiclient.Config{
- MachineID: csConfig.API.Client.Credentials.Login,
- Password: password,
- UserAgent: fmt.Sprintf("crowdsec/%s", cwversion.VersionStr()),
- URL: apiurl,
- VersionPrefix: "v1",
- })
- if err != nil {
- log.Fatalf("creating api client : %s", err)
- }
- },
- }
- var filter = apiclient.AlertsListOpts{
- ValueEquals: new(string),
- ScopeEquals: new(string),
- ScenarioEquals: new(string),
- IPEquals: new(string),
- RangeEquals: new(string),
- Since: new(string),
- Until: new(string),
- TypeEquals: new(string),
- IncludeCAPI: new(bool),
- }
- NoSimu := new(bool)
- var cmdDecisionsList = &cobra.Command{
- Use: "list [options]",
- Short: "List decisions from LAPI",
- Example: `cscli decisions list -i 1.2.3.4
- cscli decisions list -r 1.2.3.0/24
- cscli decisions list -s crowdsecurity/ssh-bf
- cscli decisions list -t ban
- `,
- Args: cobra.ExactArgs(0),
- Run: func(cmd *cobra.Command, args []string) {
- var err error
- /*take care of shorthand options*/
- if err := manageCliDecisionAlerts(filter.IPEquals, filter.RangeEquals, filter.ScopeEquals, filter.ValueEquals); err != nil {
- log.Fatalf("%s", err)
- }
- filter.ActiveDecisionEquals = new(bool)
- *filter.ActiveDecisionEquals = true
- if NoSimu != nil && *NoSimu {
- *filter.IncludeSimulated = false
- }
- /*nulify the empty entries to avoid bad filter*/
- if *filter.Until == "" {
- filter.Until = nil
- } else {
- /*time.ParseDuration support hours 'h' as bigger unit, let's make the user's life easier*/
- if strings.HasSuffix(*filter.Until, "d") {
- realDuration := strings.TrimSuffix(*filter.Until, "d")
- days, err := strconv.Atoi(realDuration)
- if err != nil {
- cmd.Help()
- log.Fatalf("Can't parse duration %s, valid durations format: 1d, 4h, 4h15m", *filter.Until)
- }
- *filter.Until = fmt.Sprintf("%d%s", days*24, "h")
- }
- }
- if *filter.Since == "" {
- filter.Since = nil
- } else {
- /*time.ParseDuration support hours 'h' as bigger unit, let's make the user's life easier*/
- if strings.HasSuffix(*filter.Since, "d") {
- realDuration := strings.TrimSuffix(*filter.Since, "d")
- days, err := strconv.Atoi(realDuration)
- if err != nil {
- cmd.Help()
- log.Fatalf("Can't parse duration %s, valid durations format: 1d, 4h, 4h15m", *filter.Until)
- }
- *filter.Since = fmt.Sprintf("%d%s", days*24, "h")
- }
- }
- if *filter.TypeEquals == "" {
- filter.TypeEquals = nil
- }
- if *filter.ValueEquals == "" {
- filter.ValueEquals = nil
- }
- if *filter.ScopeEquals == "" {
- filter.ScopeEquals = nil
- }
- if *filter.ScenarioEquals == "" {
- filter.ScenarioEquals = nil
- }
- if *filter.IPEquals == "" {
- filter.IPEquals = nil
- }
- if *filter.RangeEquals == "" {
- filter.RangeEquals = nil
- }
- alerts, _, err := Client.Alerts.List(context.Background(), filter)
- if err != nil {
- log.Fatalf("Unable to list decisions : %v", err.Error())
- }
- err = DecisionsToTable(alerts)
- if err != nil {
- log.Fatalf("unable to list decisions : %v", err.Error())
- }
- },
- }
- cmdDecisionsList.Flags().SortFlags = false
- cmdDecisionsList.Flags().BoolVarP(filter.IncludeCAPI, "all", "a", false, "Include decisions from Central API")
- cmdDecisionsList.Flags().StringVar(filter.Since, "since", "", "restrict to alerts newer than since (ie. 4h, 30d)")
- cmdDecisionsList.Flags().StringVar(filter.Until, "until", "", "restrict to alerts older than until (ie. 4h, 30d)")
- cmdDecisionsList.Flags().StringVarP(filter.TypeEquals, "type", "t", "", "restrict to this decision type (ie. ban,captcha)")
- cmdDecisionsList.Flags().StringVar(filter.ScopeEquals, "scope", "", "restrict to this scope (ie. ip,range,session)")
- cmdDecisionsList.Flags().StringVarP(filter.ValueEquals, "value", "v", "", "restrict to this value (ie. 1.2.3.4,userName)")
- cmdDecisionsList.Flags().StringVarP(filter.ScenarioEquals, "scenario", "s", "", "restrict to this scenario (ie. crowdsecurity/ssh-bf)")
- cmdDecisionsList.Flags().StringVarP(filter.IPEquals, "ip", "i", "", "restrict to alerts from this source ip (shorthand for --scope ip --value <IP>)")
- cmdDecisionsList.Flags().StringVarP(filter.RangeEquals, "range", "r", "", "restrict to alerts from this source range (shorthand for --scope range --value <RANGE>)")
- cmdDecisionsList.Flags().BoolVar(NoSimu, "no-simu", false, "exclude decisions in simulation mode")
- cmdDecisions.AddCommand(cmdDecisionsList)
- var (
- addIP string
- addRange string
- addDuration string
- addValue string
- addScope string
- addReason string
- addType string
- )
- var cmdDecisionsAdd = &cobra.Command{
- Use: "add [options]",
- Short: "Add decision to LAPI",
- Example: `cscli decisions add --ip 1.2.3.4
- cscli decisions add --range 1.2.3.0/24
- cscli decisions add --ip 1.2.3.4 --duration 24h --type captcha
- cscli decisions add --scope username --value foobar
- `,
- /*TBD : fix long and example*/
- Args: cobra.ExactArgs(0),
- Run: func(cmd *cobra.Command, args []string) {
- var startIP, endIP int64
- var err error
- var ip, ipRange string
- alerts := models.AddAlertsRequest{}
- origin := "cscli"
- capacity := int32(0)
- leakSpeed := "0"
- eventsCount := int32(1)
- empty := ""
- simulated := false
- startAt := time.Now().Format(time.RFC3339)
- stopAt := time.Now().Format(time.RFC3339)
- createdAt := time.Now().Format(time.RFC3339)
- /*take care of shorthand options*/
- if err := manageCliDecisionAlerts(&addIP, &addRange, &addScope, &addValue); err != nil {
- log.Fatalf("%s", err)
- }
- if addIP != "" {
- addValue = addIP
- addScope = types.Ip
- } else if addRange != "" {
- addValue = addRange
- addScope = types.Range
- } else if addValue == "" {
- cmd.Help()
- log.Errorf("Missing arguments, a value is required (--ip, --range or --scope and --value)")
- return
- }
- if addScope == types.Ip {
- startIP, endIP, err = database.GetIpsFromIpRange(addValue + "/32")
- if err != nil {
- log.Fatalf("unable to parse IP : '%s'", addValue)
- }
- }
- if addScope == types.Range {
- startIP, endIP, err = database.GetIpsFromIpRange(addValue)
- if err != nil {
- log.Fatalf("unable to parse Range : '%s'", addValue)
- }
- ipRange = addValue
- }
- if addReason == "" {
- addReason = fmt.Sprintf("manual '%s' from '%s'", addType, csConfig.API.Client.Credentials.Login)
- }
- decision := models.Decision{
- Duration: &addDuration,
- Scope: &addScope,
- Value: &addValue,
- Type: &addType,
- Scenario: &addReason,
- Origin: &origin,
- StartIP: startIP,
- EndIP: endIP,
- }
- alert := models.Alert{
- Capacity: &capacity,
- Decisions: []*models.Decision{&decision},
- Events: []*models.Event{},
- EventsCount: &eventsCount,
- Leakspeed: &leakSpeed,
- Message: &addReason,
- ScenarioHash: &empty,
- Scenario: &addReason,
- ScenarioVersion: &empty,
- Simulated: &simulated,
- Source: &models.Source{
- AsName: empty,
- AsNumber: empty,
- Cn: empty,
- IP: ip,
- Range: ipRange,
- Scope: &addScope,
- Value: &addValue,
- },
- StartAt: &startAt,
- StopAt: &stopAt,
- CreatedAt: createdAt,
- }
- alerts = append(alerts, &alert)
- _, _, err = Client.Alerts.Add(context.Background(), alerts)
- if err != nil {
- log.Fatalf(err.Error())
- }
- log.Info("Decision successfully added")
- },
- }
- cmdDecisionsAdd.Flags().SortFlags = false
- cmdDecisionsAdd.Flags().StringVarP(&addIP, "ip", "i", "", "Source ip (shorthand for --scope ip --value <IP>)")
- cmdDecisionsAdd.Flags().StringVarP(&addRange, "range", "r", "", "Range source ip (shorthand for --scope range --value <RANGE>)")
- cmdDecisionsAdd.Flags().StringVarP(&addDuration, "duration", "d", "4h", "Decision duration (ie. 1h,4h,30m)")
- cmdDecisionsAdd.Flags().StringVarP(&addValue, "value", "v", "", "The value (ie. --scope username --value foobar)")
- cmdDecisionsAdd.Flags().StringVar(&addScope, "scope", types.Ip, "Decision scope (ie. ip,range,username)")
- cmdDecisionsAdd.Flags().StringVarP(&addReason, "reason", "R", "", "Decision reason (ie. scenario-name)")
- cmdDecisionsAdd.Flags().StringVarP(&addType, "type", "t", "ban", "Decision type (ie. ban,captcha,throttle)")
- cmdDecisions.AddCommand(cmdDecisionsAdd)
- var delFilter = apiclient.DecisionsDeleteOpts{
- ScopeEquals: new(string),
- ValueEquals: new(string),
- TypeEquals: new(string),
- IPEquals: new(string),
- RangeEquals: new(string),
- }
- var delDecisionId string
- var delDecisionAll bool
- var cmdDecisionsDelete = &cobra.Command{
- Use: "delete [options]",
- Short: "Delete decisions",
- Example: `cscli decisions delete -r 1.2.3.0/24
- cscli decisions delete -i 1.2.3.4
- cscli decisions delete -s crowdsecurity/ssh-bf
- cscli decisions delete --id 42
- cscli decisions delete --type captcha
- `,
- /*TBD : refaire le Long/Example*/
- PreRun: func(cmd *cobra.Command, args []string) {
- if delDecisionAll {
- return
- }
- if *delFilter.ScopeEquals == "" && *delFilter.ValueEquals == "" &&
- *delFilter.TypeEquals == "" && *delFilter.IPEquals == "" &&
- *delFilter.RangeEquals == "" && delDecisionId == "" {
- cmd.Usage()
- log.Fatalln("At least one filter or --all must be specified")
- }
- },
- Run: func(cmd *cobra.Command, args []string) {
- var err error
- var decisions *models.DeleteDecisionResponse
- /*take care of shorthand options*/
- if err := manageCliDecisionAlerts(delFilter.IPEquals, delFilter.RangeEquals, delFilter.ScopeEquals, delFilter.ValueEquals); err != nil {
- log.Fatalf("%s", err)
- }
- if *delFilter.ScopeEquals == "" {
- delFilter.ScopeEquals = nil
- }
- if *delFilter.ValueEquals == "" {
- delFilter.ValueEquals = nil
- }
- if *delFilter.TypeEquals == "" {
- delFilter.TypeEquals = nil
- }
- if *delFilter.IPEquals == "" {
- delFilter.IPEquals = nil
- }
- if *delFilter.RangeEquals == "" {
- delFilter.RangeEquals = nil
- }
- if delDecisionId == "" {
- decisions, _, err = Client.Decisions.Delete(context.Background(), delFilter)
- if err != nil {
- log.Fatalf("Unable to delete decisions : %v", err.Error())
- }
- } else {
- decisions, _, err = Client.Decisions.DeleteOne(context.Background(), delDecisionId)
- if err != nil {
- log.Fatalf("Unable to delete decision : %v", err.Error())
- }
- }
- log.Infof("%s decision(s) deleted", decisions.NbDeleted)
- },
- }
- cmdDecisionsDelete.Flags().SortFlags = false
- cmdDecisionsDelete.Flags().StringVarP(delFilter.IPEquals, "ip", "i", "", "Source ip (shorthand for --scope ip --value <IP>)")
- cmdDecisionsDelete.Flags().StringVarP(delFilter.RangeEquals, "range", "r", "", "Range source ip (shorthand for --scope range --value <RANGE>)")
- cmdDecisionsDelete.Flags().StringVar(&delDecisionId, "id", "", "decision id")
- cmdDecisionsDelete.Flags().StringVarP(delFilter.TypeEquals, "type", "t", "", "the decision type (ie. ban,captcha)")
- cmdDecisionsDelete.Flags().StringVarP(delFilter.ValueEquals, "value", "v", "", "the value to match for in the specified scope")
- cmdDecisionsDelete.Flags().BoolVar(&delDecisionAll, "all", false, "delete all decisions")
- cmdDecisions.AddCommand(cmdDecisionsDelete)
- return cmdDecisions
- }
|