2020-11-30 09:37:17 +00:00
package apiserver
import (
"context"
2024-01-15 10:44:38 +00:00
"errors"
2020-11-30 09:37:17 +00:00
"fmt"
2022-10-28 11:55:59 +00:00
"math/rand"
2023-03-21 10:50:10 +00:00
"net"
2023-02-06 13:06:14 +00:00
"net/http"
2020-11-30 09:37:17 +00:00
"net/url"
2024-01-15 10:44:38 +00:00
"slices"
2021-08-25 09:45:29 +00:00
"strconv"
2020-11-30 09:37:17 +00:00
"strings"
"sync"
"time"
2022-10-28 11:55:59 +00:00
"github.com/go-openapi/strfmt"
log "github.com/sirupsen/logrus"
"gopkg.in/tomb.v2"
2023-07-28 14:35:08 +00:00
"github.com/crowdsecurity/go-cs-lib/ptr"
"github.com/crowdsecurity/go-cs-lib/trace"
"github.com/crowdsecurity/go-cs-lib/version"
2023-05-23 08:52:47 +00:00
2020-11-30 09:37:17 +00:00
"github.com/crowdsecurity/crowdsec/pkg/apiclient"
"github.com/crowdsecurity/crowdsec/pkg/csconfig"
"github.com/crowdsecurity/crowdsec/pkg/database"
2023-02-13 14:06:14 +00:00
"github.com/crowdsecurity/crowdsec/pkg/database/ent"
2021-08-25 09:45:29 +00:00
"github.com/crowdsecurity/crowdsec/pkg/database/ent/alert"
"github.com/crowdsecurity/crowdsec/pkg/database/ent/decision"
2020-11-30 09:37:17 +00:00
"github.com/crowdsecurity/crowdsec/pkg/models"
2023-02-06 13:06:14 +00:00
"github.com/crowdsecurity/crowdsec/pkg/modelscapi"
2020-11-30 09:37:17 +00:00
"github.com/crowdsecurity/crowdsec/pkg/types"
)
2023-06-23 12:06:04 +00:00
const (
// delta values must be smaller than the interval
2022-10-28 11:55:59 +00:00
pullIntervalDefault = time . Hour * 2
pullIntervalDelta = 5 * time . Minute
2023-01-31 13:47:44 +00:00
pushIntervalDefault = time . Second * 10
pushIntervalDelta = time . Second * 7
2022-10-28 11:55:59 +00:00
metricsIntervalDefault = time . Minute * 30
metricsIntervalDelta = time . Minute * 15
2020-11-30 09:37:17 +00:00
)
type apic struct {
2022-10-28 11:55:59 +00:00
// when changing the intervals in tests, always set *First too
// or they can be negative
pullInterval time . Duration
pullIntervalFirst time . Duration
pushInterval time . Duration
pushIntervalFirst time . Duration
metricsInterval time . Duration
metricsIntervalFirst time . Duration
dbClient * database . Client
apiClient * apiclient . ApiClient
2023-01-31 13:47:44 +00:00
AlertsAddChan chan [ ] * models . Alert
mu sync . Mutex
pushTomb tomb . Tomb
pullTomb tomb . Tomb
metricsTomb tomb . Tomb
startup bool
credentials * csconfig . ApiCredentialsCfg
scenarioList [ ] string
consoleConfig * csconfig . ConsoleConfig
2023-03-21 13:06:19 +00:00
isPulling chan bool
2023-03-21 10:50:10 +00:00
whitelists * csconfig . CapiWhitelist
2022-10-28 11:55:59 +00:00
}
// randomDuration returns a duration value between d-delta and d+delta
func randomDuration ( d time . Duration , delta time . Duration ) time . Duration {
2023-06-23 12:06:04 +00:00
ret := d + time . Duration ( rand . Int63n ( int64 ( 2 * delta ) ) ) - delta
// ticker interval must be > 0 (nanoseconds)
if ret <= 0 {
return 1
}
2023-12-14 13:54:11 +00:00
2023-06-23 12:06:04 +00:00
return ret
2020-11-30 09:37:17 +00:00
}
func ( a * apic ) FetchScenariosListFromDB ( ) ( [ ] string , error ) {
scenarios := make ( [ ] string , 0 )
machines , err := a . dbClient . ListMachines ( )
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
if err != nil {
2023-07-06 08:14:45 +00:00
return nil , fmt . Errorf ( "while listing machines: %w" , err )
2020-11-30 09:37:17 +00:00
}
//merge all scenarios together
for _ , v := range machines {
machineScenarios := strings . Split ( v . Scenarios , "," )
log . Debugf ( "%d scenarios for machine %d" , len ( machineScenarios ) , v . ID )
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
for _ , sv := range machineScenarios {
2023-05-31 10:39:22 +00:00
if ! slices . Contains ( scenarios , sv ) && sv != "" {
2020-11-30 09:37:17 +00:00
scenarios = append ( scenarios , sv )
}
}
}
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
log . Debugf ( "Returning list of scenarios : %+v" , scenarios )
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
return scenarios , nil
}
2023-01-31 13:47:44 +00:00
func decisionsToApiDecisions ( decisions [ ] * models . Decision ) models . AddSignalsRequestItemDecisions {
apiDecisions := models . AddSignalsRequestItemDecisions { }
2023-12-14 13:54:11 +00:00
2023-01-31 13:47:44 +00:00
for _ , decision := range decisions {
x := & models . AddSignalsRequestItemDecisionsItem {
2023-05-25 13:43:39 +00:00
Duration : ptr . Of ( * decision . Duration ) ,
2023-01-31 13:47:44 +00:00
ID : new ( int64 ) ,
2023-05-25 13:43:39 +00:00
Origin : ptr . Of ( * decision . Origin ) ,
Scenario : ptr . Of ( * decision . Scenario ) ,
Scope : ptr . Of ( * decision . Scope ) ,
2023-01-31 13:47:44 +00:00
//Simulated: *decision.Simulated,
2023-05-25 13:43:39 +00:00
Type : ptr . Of ( * decision . Type ) ,
2023-01-31 13:47:44 +00:00
Until : decision . Until ,
2023-05-25 13:43:39 +00:00
Value : ptr . Of ( * decision . Value ) ,
2023-01-31 13:47:44 +00:00
UUID : decision . UUID ,
}
* x . ID = decision . ID
2023-12-14 13:54:11 +00:00
2023-01-31 13:47:44 +00:00
if decision . Simulated != nil {
x . Simulated = * decision . Simulated
}
2023-12-14 13:54:11 +00:00
2023-01-31 13:47:44 +00:00
apiDecisions = append ( apiDecisions , x )
}
2023-12-14 13:54:11 +00:00
2023-01-31 13:47:44 +00:00
return apiDecisions
}
2023-01-04 15:50:02 +00:00
func alertToSignal ( alert * models . Alert , scenarioTrust string , shareContext bool ) * models . AddSignalsRequestItem {
signal := & models . AddSignalsRequestItem {
2020-11-30 09:37:17 +00:00
Message : alert . Message ,
Scenario : alert . Scenario ,
ScenarioHash : alert . ScenarioHash ,
ScenarioVersion : alert . ScenarioVersion ,
2023-01-31 13:47:44 +00:00
Source : & models . AddSignalsRequestItemSource {
AsName : alert . Source . AsName ,
AsNumber : alert . Source . AsNumber ,
Cn : alert . Source . Cn ,
IP : alert . Source . IP ,
Latitude : alert . Source . Latitude ,
Longitude : alert . Source . Longitude ,
Range : alert . Source . Range ,
Scope : alert . Source . Scope ,
Value : alert . Source . Value ,
} ,
StartAt : alert . StartAt ,
StopAt : alert . StopAt ,
CreatedAt : alert . CreatedAt ,
MachineID : alert . MachineID ,
ScenarioTrust : scenarioTrust ,
Decisions : decisionsToApiDecisions ( alert . Decisions ) ,
UUID : alert . UUID ,
2020-11-30 09:37:17 +00:00
}
2023-01-04 15:50:02 +00:00
if shareContext {
signal . Context = make ( [ ] * models . AddSignalsRequestItemContextItems0 , 0 )
2023-12-14 13:54:11 +00:00
2023-01-04 15:50:02 +00:00
for _ , meta := range alert . Meta {
contextItem := models . AddSignalsRequestItemContextItems0 {
Key : meta . Key ,
Value : meta . Value ,
}
signal . Context = append ( signal . Context , & contextItem )
}
}
2023-12-14 13:54:11 +00:00
2023-01-04 15:50:02 +00:00
return signal
2020-11-30 09:37:17 +00:00
}
2023-03-21 10:50:10 +00:00
func NewAPIC ( config * csconfig . OnlineApiClientCfg , dbClient * database . Client , consoleConfig * csconfig . ConsoleConfig , apicWhitelist * csconfig . CapiWhitelist ) ( * apic , error ) {
2020-11-30 09:37:17 +00:00
var err error
2023-01-31 13:47:44 +00:00
2023-12-14 13:54:11 +00:00
ret := & apic {
2023-01-31 13:47:44 +00:00
AlertsAddChan : make ( chan [ ] * models . Alert ) ,
2022-10-28 11:55:59 +00:00
dbClient : dbClient ,
mu : sync . Mutex { } ,
startup : true ,
credentials : config . Credentials ,
pullTomb : tomb . Tomb { } ,
pushTomb : tomb . Tomb { } ,
metricsTomb : tomb . Tomb { } ,
scenarioList : make ( [ ] string , 0 ) ,
consoleConfig : consoleConfig ,
pullInterval : pullIntervalDefault ,
pullIntervalFirst : randomDuration ( pullIntervalDefault , pullIntervalDelta ) ,
pushInterval : pushIntervalDefault ,
pushIntervalFirst : randomDuration ( pushIntervalDefault , pushIntervalDelta ) ,
metricsInterval : metricsIntervalDefault ,
metricsIntervalFirst : randomDuration ( metricsIntervalDefault , metricsIntervalDelta ) ,
2023-03-21 13:06:19 +00:00
isPulling : make ( chan bool , 1 ) ,
2023-03-21 10:50:10 +00:00
whitelists : apicWhitelist ,
2020-11-30 09:37:17 +00:00
}
password := strfmt . Password ( config . Credentials . Password )
apiURL , err := url . Parse ( config . Credentials . URL )
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
if err != nil {
2023-07-06 08:14:45 +00:00
return nil , fmt . Errorf ( "while parsing '%s': %w" , config . Credentials . URL , err )
2020-11-30 09:37:17 +00:00
}
2023-12-14 13:54:11 +00:00
2023-01-31 13:47:44 +00:00
papiURL , err := url . Parse ( config . Credentials . PapiURL )
if err != nil {
2023-07-06 08:14:45 +00:00
return nil , fmt . Errorf ( "while parsing '%s': %w" , config . Credentials . PapiURL , err )
2023-01-31 13:47:44 +00:00
}
2020-11-30 09:37:17 +00:00
ret . scenarioList , err = ret . FetchScenariosListFromDB ( )
if err != nil {
2023-07-06 08:14:45 +00:00
return nil , fmt . Errorf ( "while fetching scenarios from db: %w" , err )
2020-11-30 09:37:17 +00:00
}
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
ret . apiClient , err = apiclient . NewClient ( & apiclient . Config {
MachineID : config . Credentials . Login ,
Password : password ,
2023-05-23 08:52:47 +00:00
UserAgent : fmt . Sprintf ( "crowdsec/%s" , version . String ( ) ) ,
2020-11-30 09:37:17 +00:00
URL : apiURL ,
2023-01-31 13:47:44 +00:00
PapiURL : papiURL ,
2023-02-06 13:06:14 +00:00
VersionPrefix : "v3" ,
2020-11-30 09:37:17 +00:00
Scenarios : ret . scenarioList ,
UpdateScenario : ret . FetchScenariosListFromDB ,
} )
2023-01-31 13:47:44 +00:00
if err != nil {
2023-07-06 08:14:45 +00:00
return nil , fmt . Errorf ( "while creating api client: %w" , err )
2023-01-31 13:47:44 +00:00
}
2023-02-13 14:05:58 +00:00
// The watcher will be authenticated by the RoundTripper the first time it will call CAPI
2023-11-07 14:07:36 +00:00
// Explicit authentication will provoke a useless supplementary call to CAPI
2023-02-16 15:16:26 +00:00
scenarios , err := ret . FetchScenariosListFromDB ( )
if err != nil {
2023-07-06 08:14:45 +00:00
return ret , fmt . Errorf ( "get scenario in db: %w" , err )
2023-02-16 15:16:26 +00:00
}
authResp , _ , err := ret . apiClient . Auth . AuthenticateWatcher ( context . Background ( ) , models . WatcherAuthRequest {
MachineID : & config . Credentials . Login ,
Password : & password ,
Scenarios : scenarios ,
} )
if err != nil {
2023-07-06 08:14:45 +00:00
return ret , fmt . Errorf ( "authenticate watcher (%s): %w" , config . Credentials . Login , err )
2023-02-16 15:16:26 +00:00
}
2023-12-14 13:54:11 +00:00
if err = ret . apiClient . GetClient ( ) . Transport . ( * apiclient . JWTTransport ) . Expiration . UnmarshalText ( [ ] byte ( authResp . Expire ) ) ; err != nil {
2023-07-06 08:14:45 +00:00
return ret , fmt . Errorf ( "unable to parse jwt expiration: %w" , err )
2023-02-16 15:16:26 +00:00
}
ret . apiClient . GetClient ( ) . Transport . ( * apiclient . JWTTransport ) . Token = authResp . Token
2023-01-31 13:47:44 +00:00
2021-04-07 12:51:00 +00:00
return ret , err
2020-11-30 09:37:17 +00:00
}
2022-03-29 12:20:26 +00:00
// keep track of all alerts in cache and push it to CAPI every PushInterval.
2020-11-30 09:37:17 +00:00
func ( a * apic ) Push ( ) error {
2023-05-23 08:52:47 +00:00
defer trace . CatchPanic ( "lapi/pushToAPIC" )
2020-11-30 09:37:17 +00:00
var cache models . AddSignalsRequest
2023-12-14 13:54:11 +00:00
2022-10-28 11:55:59 +00:00
ticker := time . NewTicker ( a . pushIntervalFirst )
log . Infof ( "Start push to CrowdSec Central API (interval: %s once, then %s)" , a . pushIntervalFirst . Round ( time . Second ) , a . pushInterval )
2020-11-30 09:37:17 +00:00
for {
select {
case <- a . pushTomb . Dying ( ) : // if one apic routine is dying, do we kill the others?
a . pullTomb . Kill ( nil )
a . metricsTomb . Kill ( nil )
log . Infof ( "push tomb is dying, sending cache (%d elements) before exiting" , len ( cache ) )
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
if len ( cache ) == 0 {
return nil
}
2023-12-14 13:54:11 +00:00
2020-11-30 16:46:02 +00:00
go a . Send ( & cache )
2023-12-14 13:54:11 +00:00
2020-11-30 16:46:02 +00:00
return nil
2020-11-30 09:37:17 +00:00
case <- ticker . C :
2022-10-28 11:55:59 +00:00
ticker . Reset ( a . pushInterval )
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
if len ( cache ) > 0 {
a . mu . Lock ( )
cacheCopy := cache
cache = make ( models . AddSignalsRequest , 0 )
a . mu . Unlock ( )
log . Infof ( "Signal push: %d signals to push" , len ( cacheCopy ) )
2023-12-14 13:54:11 +00:00
2020-11-30 16:46:02 +00:00
go a . Send ( & cacheCopy )
2020-11-30 09:37:17 +00:00
}
2023-01-31 13:47:44 +00:00
case alerts := <- a . AlertsAddChan :
2020-11-30 09:37:17 +00:00
var signals [ ] * models . AddSignalsRequestItem
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
for _ , alert := range alerts {
2022-03-29 12:20:26 +00:00
if ok := shouldShareAlert ( alert , a . consoleConfig ) ; ok {
2023-01-04 15:50:02 +00:00
signals = append ( signals , alertToSignal ( alert , getScenarioTrustOfAlert ( alert ) , * a . consoleConfig . ShareContext ) )
2022-01-13 15:46:16 +00:00
}
2020-11-30 09:37:17 +00:00
}
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
a . mu . Lock ( )
cache = append ( cache , signals ... )
a . mu . Unlock ( )
}
}
}
2022-03-29 12:20:26 +00:00
func getScenarioTrustOfAlert ( alert * models . Alert ) string {
scenarioTrust := "certified"
if alert . ScenarioHash == nil || * alert . ScenarioHash == "" {
scenarioTrust = "custom"
} else if alert . ScenarioVersion == nil || * alert . ScenarioVersion == "" || * alert . ScenarioVersion == "?" {
scenarioTrust = "tainted"
}
2023-12-14 13:54:11 +00:00
2022-03-29 12:20:26 +00:00
if len ( alert . Decisions ) > 0 {
2023-01-31 13:47:44 +00:00
if * alert . Decisions [ 0 ] . Origin == types . CscliOrigin {
2022-03-29 12:20:26 +00:00
scenarioTrust = "manual"
}
}
2023-12-14 13:54:11 +00:00
2022-03-29 12:20:26 +00:00
return scenarioTrust
}
func shouldShareAlert ( alert * models . Alert , consoleConfig * csconfig . ConsoleConfig ) bool {
if * alert . Simulated {
log . Debugf ( "simulation enabled for alert (id:%d), will not be sent to CAPI" , alert . ID )
return false
}
2023-12-14 13:54:11 +00:00
2022-03-29 12:20:26 +00:00
switch scenarioTrust := getScenarioTrustOfAlert ( alert ) ; scenarioTrust {
case "manual" :
if ! * consoleConfig . ShareManualDecisions {
log . Debugf ( "manual decision generated an alert, doesn't send it to CAPI because options is disabled" )
return false
}
case "tainted" :
if ! * consoleConfig . ShareTaintedScenarios {
log . Debugf ( "tainted scenario generated an alert, doesn't send it to CAPI because options is disabled" )
return false
}
case "custom" :
if ! * consoleConfig . ShareCustomScenarios {
log . Debugf ( "custom scenario generated an alert, doesn't send it to CAPI because options is disabled" )
return false
}
}
2023-12-14 13:54:11 +00:00
2022-03-29 12:20:26 +00:00
return true
}
2020-11-30 16:46:02 +00:00
func ( a * apic ) Send ( cacheOrig * models . AddSignalsRequest ) {
2020-11-30 09:37:17 +00:00
/ * we do have a problem with this :
The apic . Push background routine reads from alertToPush chan .
This chan is filled by Controller . CreateAlert
If the chan apic . Send hangs , the alertToPush chan will become full ,
with means that Controller . CreateAlert is going to hang , blocking API worker ( s ) .
So instead , we prefer to cancel write .
I don ' t know enough about gin to tell how much of an issue it can be .
* /
2023-12-14 13:54:11 +00:00
var (
cache [ ] * models . AddSignalsRequestItem = * cacheOrig
send models . AddSignalsRequest
)
2020-11-30 16:46:02 +00:00
bulkSize := 50
pageStart := 0
pageEnd := bulkSize
for {
if pageEnd >= len ( cache ) {
send = cache [ pageStart : ]
ctx , cancel := context . WithTimeout ( context . Background ( ) , 5 * time . Second )
2023-12-14 13:54:11 +00:00
2020-11-30 16:46:02 +00:00
defer cancel ( )
2023-12-14 13:54:11 +00:00
2020-11-30 16:46:02 +00:00
_ , _ , err := a . apiClient . Signal . Add ( ctx , & send )
2023-12-14 13:54:11 +00:00
2020-11-30 16:46:02 +00:00
if err != nil {
2023-01-31 13:47:44 +00:00
log . Errorf ( "sending signal to central API: %s" , err )
2020-11-30 16:46:02 +00:00
return
}
2023-12-14 13:54:11 +00:00
2020-11-30 16:46:02 +00:00
break
}
2023-12-14 13:54:11 +00:00
2020-11-30 16:46:02 +00:00
send = cache [ pageStart : pageEnd ]
ctx , cancel := context . WithTimeout ( context . Background ( ) , 5 * time . Second )
2023-12-14 13:54:11 +00:00
2020-11-30 16:46:02 +00:00
defer cancel ( )
2023-12-14 13:54:11 +00:00
2020-11-30 16:46:02 +00:00
_ , _ , err := a . apiClient . Signal . Add ( ctx , & send )
2023-12-14 13:54:11 +00:00
2020-11-30 16:46:02 +00:00
if err != nil {
//we log it here as well, because the return value of func might be discarded
2023-01-31 13:47:44 +00:00
log . Errorf ( "sending signal to central API: %s" , err )
2020-11-30 16:46:02 +00:00
}
2023-12-14 13:54:11 +00:00
2020-11-30 16:46:02 +00:00
pageStart += bulkSize
pageEnd += bulkSize
}
2020-11-30 09:37:17 +00:00
}
2022-03-29 12:20:26 +00:00
func ( a * apic ) CAPIPullIsOld ( ) ( bool , error ) {
2021-08-25 09:45:29 +00:00
/*only pull community blocklist if it's older than 1h30 */
alerts := a . dbClient . Ent . Alert . Query ( )
alerts = alerts . Where ( alert . HasDecisionsWith ( decision . OriginEQ ( database . CapiMachineID ) ) )
2022-06-16 12:41:54 +00:00
alerts = alerts . Where ( alert . CreatedAtGTE ( time . Now ( ) . UTC ( ) . Add ( - time . Duration ( 1 * time . Hour + 30 * time . Minute ) ) ) ) //nolint:unconvert
2021-08-25 09:45:29 +00:00
count , err := alerts . Count ( a . dbClient . CTX )
2023-12-14 13:54:11 +00:00
2021-08-25 09:45:29 +00:00
if err != nil {
2023-07-06 08:14:45 +00:00
return false , fmt . Errorf ( "while looking for CAPI alert: %w" , err )
2021-08-25 09:45:29 +00:00
}
2023-12-14 13:54:11 +00:00
2021-08-25 09:45:29 +00:00
if count > 0 {
log . Printf ( "last CAPI pull is newer than 1h30, skip." )
2022-03-29 12:20:26 +00:00
return false , nil
2020-11-30 09:37:17 +00:00
}
2023-12-14 13:54:11 +00:00
2022-03-29 12:20:26 +00:00
return true , nil
}
2022-01-11 13:31:51 +00:00
2023-12-14 13:54:11 +00:00
func ( a * apic ) HandleDeletedDecisions ( deletedDecisions [ ] * models . Decision , deleteCounters map [ string ] map [ string ] int ) ( int , error ) {
2023-11-26 21:30:03 +00:00
nbDeleted := 0
2023-12-14 13:54:11 +00:00
2022-03-29 12:20:26 +00:00
for _ , decision := range deletedDecisions {
2023-11-26 21:30:03 +00:00
filter := map [ string ] [ ] string {
"value" : { * decision . Value } ,
"origin" : { * decision . Origin } ,
}
if strings . ToLower ( * decision . Scope ) != "ip" {
2020-11-30 09:37:17 +00:00
filter [ "type" ] = [ ] string { * decision . Type }
2022-03-29 12:20:26 +00:00
filter [ "scopes" ] = [ ] string { * decision . Scope }
2020-11-30 09:37:17 +00:00
}
2023-01-31 13:47:44 +00:00
dbCliRet , _ , err := a . dbClient . SoftDeleteDecisionsWithFilter ( filter )
2020-11-30 09:37:17 +00:00
if err != nil {
2023-07-06 08:14:45 +00:00
return 0 , fmt . Errorf ( "deleting decisions error: %w" , err )
2020-11-30 09:37:17 +00:00
}
2023-12-14 13:54:11 +00:00
2021-08-25 09:45:29 +00:00
dbCliDel , err := strconv . Atoi ( dbCliRet )
if err != nil {
2023-07-06 08:14:45 +00:00
return 0 , fmt . Errorf ( "converting db ret %d: %w" , dbCliDel , err )
2021-08-25 09:45:29 +00:00
}
2023-12-14 13:54:11 +00:00
updateCounterForDecision ( deleteCounters , decision . Origin , decision . Scenario , dbCliDel )
2021-08-25 09:45:29 +00:00
nbDeleted += dbCliDel
2020-11-30 09:37:17 +00:00
}
2023-12-14 13:54:11 +00:00
2022-03-29 12:20:26 +00:00
return nbDeleted , nil
2023-02-06 13:06:14 +00:00
}
2023-12-14 13:54:11 +00:00
func ( a * apic ) HandleDeletedDecisionsV3 ( deletedDecisions [ ] * modelscapi . GetDecisionsStreamResponseDeletedItem , deleteCounters map [ string ] map [ string ] int ) ( int , error ) {
2023-02-06 13:06:14 +00:00
var nbDeleted int
2023-12-14 13:54:11 +00:00
2023-02-06 13:06:14 +00:00
for _ , decisions := range deletedDecisions {
scope := decisions . Scope
2023-12-14 13:54:11 +00:00
2023-02-06 13:06:14 +00:00
for _ , decision := range decisions . Decisions {
2023-11-26 21:30:03 +00:00
filter := map [ string ] [ ] string {
"value" : { decision } ,
"origin" : { types . CAPIOrigin } ,
}
if strings . ToLower ( * scope ) != "ip" {
2023-02-06 13:06:14 +00:00
filter [ "scopes" ] = [ ] string { * scope }
}
2020-11-30 09:37:17 +00:00
2023-02-06 13:06:14 +00:00
dbCliRet , _ , err := a . dbClient . SoftDeleteDecisionsWithFilter ( filter )
if err != nil {
2023-07-06 08:14:45 +00:00
return 0 , fmt . Errorf ( "deleting decisions error: %w" , err )
2023-02-06 13:06:14 +00:00
}
2023-12-14 13:54:11 +00:00
2023-02-06 13:06:14 +00:00
dbCliDel , err := strconv . Atoi ( dbCliRet )
if err != nil {
2023-07-06 08:14:45 +00:00
return 0 , fmt . Errorf ( "converting db ret %d: %w" , dbCliDel , err )
2023-02-06 13:06:14 +00:00
}
2023-12-14 13:54:11 +00:00
updateCounterForDecision ( deleteCounters , ptr . Of ( types . CAPIOrigin ) , nil , dbCliDel )
2023-02-06 13:06:14 +00:00
nbDeleted += dbCliDel
}
}
2023-12-14 13:54:11 +00:00
2023-02-06 13:06:14 +00:00
return nbDeleted , nil
2022-03-29 12:20:26 +00:00
}
2022-01-11 13:31:51 +00:00
2022-03-29 12:20:26 +00:00
func createAlertsForDecisions ( decisions [ ] * models . Decision ) [ ] * models . Alert {
newAlerts := make ( [ ] * models . Alert , 0 )
2023-12-14 13:54:11 +00:00
2022-03-29 12:20:26 +00:00
for _ , decision := range decisions {
2022-01-11 13:31:51 +00:00
found := false
2023-12-14 13:54:11 +00:00
2022-03-29 12:20:26 +00:00
for _ , sub := range newAlerts {
2022-01-11 13:31:51 +00:00
if sub . Source . Scope == nil {
log . Warningf ( "nil scope in %+v" , sub )
continue
}
2023-12-14 13:54:11 +00:00
2023-01-31 13:47:44 +00:00
if * decision . Origin == types . CAPIOrigin {
if * sub . Source . Scope == types . CAPIOrigin {
2022-01-11 13:31:51 +00:00
found = true
break
}
2023-01-31 13:47:44 +00:00
} else if * decision . Origin == types . ListOrigin {
2022-01-11 13:31:51 +00:00
if * sub . Source . Scope == * decision . Origin {
if sub . Scenario == nil {
log . Warningf ( "nil scenario in %+v" , sub )
}
if * sub . Scenario == * decision . Scenario {
found = true
break
}
}
} else {
log . Warningf ( "unknown origin %s : %+v" , * decision . Origin , decision )
}
}
2023-12-14 13:54:11 +00:00
2022-01-11 13:31:51 +00:00
if ! found {
log . Debugf ( "Create entry for origin:%s scenario:%s" , * decision . Origin , * decision . Scenario )
2022-03-29 12:20:26 +00:00
newAlerts = append ( newAlerts , createAlertForDecision ( decision ) )
2022-01-11 13:31:51 +00:00
}
}
2023-12-14 13:54:11 +00:00
2022-03-29 12:20:26 +00:00
return newAlerts
}
2022-01-11 13:31:51 +00:00
2022-03-29 12:20:26 +00:00
func createAlertForDecision ( decision * models . Decision ) * models . Alert {
2023-11-26 21:30:03 +00:00
var (
scenario string
scope string
)
switch * decision . Origin {
case types . CAPIOrigin :
scenario = types . CAPIOrigin
scope = types . CAPIOrigin
case types . ListOrigin :
scenario = * decision . Scenario
scope = types . ListOrigin
default :
scenario = ""
scope = ""
2023-12-14 13:54:11 +00:00
2022-03-29 12:20:26 +00:00
log . Warningf ( "unknown origin %s" , * decision . Origin )
}
2023-11-26 21:30:03 +00:00
return & models . Alert {
Source : & models . Source {
Scope : ptr . Of ( scope ) ,
Value : ptr . Of ( "" ) ,
} ,
Scenario : ptr . Of ( scenario ) ,
Message : ptr . Of ( "" ) ,
StartAt : ptr . Of ( time . Now ( ) . UTC ( ) . Format ( time . RFC3339 ) ) ,
StopAt : ptr . Of ( time . Now ( ) . UTC ( ) . Format ( time . RFC3339 ) ) ,
Capacity : ptr . Of ( int32 ( 0 ) ) ,
Simulated : ptr . Of ( false ) ,
EventsCount : ptr . Of ( int32 ( 0 ) ) ,
Leakspeed : ptr . Of ( "" ) ,
ScenarioHash : ptr . Of ( "" ) ,
ScenarioVersion : ptr . Of ( "" ) ,
MachineID : database . CapiMachineID ,
}
2022-03-29 12:20:26 +00:00
}
// This function takes in list of parent alerts and decisions and then pairs them up.
2023-12-14 13:54:11 +00:00
func fillAlertsWithDecisions ( alerts [ ] * models . Alert , decisions [ ] * models . Decision , addCounters map [ string ] map [ string ] int ) [ ] * models . Alert {
2022-03-29 12:20:26 +00:00
for _ , decision := range decisions {
2022-01-11 13:31:51 +00:00
//count and create separate alerts for each list
2023-12-14 13:54:11 +00:00
updateCounterForDecision ( addCounters , decision . Origin , decision . Scenario , 1 )
2021-01-14 15:27:45 +00:00
2021-07-02 09:23:46 +00:00
/*CAPI might send lower case scopes, unify it.*/
switch strings . ToLower ( * decision . Scope ) {
case "ip" :
* decision . Scope = types . Ip
case "range" :
* decision . Scope = types . Range
}
2023-12-14 13:54:11 +00:00
2022-01-11 13:31:51 +00:00
found := false
//add the individual decisions to the right list
2022-03-29 12:20:26 +00:00
for idx , alert := range alerts {
2023-01-31 13:47:44 +00:00
if * decision . Origin == types . CAPIOrigin {
if * alert . Source . Scope == types . CAPIOrigin {
2022-03-29 12:20:26 +00:00
alerts [ idx ] . Decisions = append ( alerts [ idx ] . Decisions , decision )
2022-01-11 13:31:51 +00:00
found = true
2023-12-14 13:54:11 +00:00
2022-01-11 13:31:51 +00:00
break
}
2023-01-31 13:47:44 +00:00
} else if * decision . Origin == types . ListOrigin {
if * alert . Source . Scope == types . ListOrigin && * alert . Scenario == * decision . Scenario {
2022-03-29 12:20:26 +00:00
alerts [ idx ] . Decisions = append ( alerts [ idx ] . Decisions , decision )
2022-01-11 13:31:51 +00:00
found = true
break
}
} else {
log . Warningf ( "unknown origin %s" , * decision . Origin )
}
}
2023-12-14 13:54:11 +00:00
2022-01-11 13:31:51 +00:00
if ! found {
log . Warningf ( "Orphaned decision for %s - %s" , * decision . Origin , * decision . Scenario )
}
2020-11-30 09:37:17 +00:00
}
2023-12-14 13:54:11 +00:00
2022-03-29 12:20:26 +00:00
return alerts
}
2023-02-06 13:06:14 +00:00
// we receive a list of decisions and links for blocklist and we need to create a list of alerts :
2022-03-29 12:20:26 +00:00
// one alert for "community blocklist"
// one alert per list we're subscribed to
2023-03-21 13:06:19 +00:00
func ( a * apic ) PullTop ( forcePull bool ) error {
2022-03-29 12:20:26 +00:00
var err error
2023-03-21 13:06:19 +00:00
//A mutex with TryLock would be a bit simpler
//But go does not guarantee that TryLock will be able to acquire the lock even if it is available
select {
case a . isPulling <- true :
defer func ( ) {
<- a . isPulling
} ( )
default :
return errors . New ( "pull already in progress" )
}
if ! forcePull {
if lastPullIsOld , err := a . CAPIPullIsOld ( ) ; err != nil {
return err
} else if ! lastPullIsOld {
return nil
}
2022-03-29 12:20:26 +00:00
}
2024-02-14 11:26:42 +00:00
log . Debug ( "Acquiring lock for pullCAPI" )
err = a . dbClient . AcquirePullCAPILock ( )
if a . dbClient . IsLocked ( err ) {
log . Info ( "PullCAPI is already running, skipping" )
return nil
}
2024-03-19 09:29:16 +00:00
/*defer lock release*/
defer func ( ) {
log . Debug ( "Releasing lock for pullCAPI" )
if err := a . dbClient . ReleasePullCAPILock ( ) ; err != nil {
log . Errorf ( "while releasing lock: %v" , err )
}
} ( )
2022-11-08 09:44:25 +00:00
log . Infof ( "Starting community-blocklist update" )
2023-02-06 13:06:14 +00:00
data , _ , err := a . apiClient . Decisions . GetStreamV3 ( context . Background ( ) , apiclient . DecisionsStreamOpts { Startup : a . startup } )
2022-03-29 12:20:26 +00:00
if err != nil {
2023-07-06 08:14:45 +00:00
return fmt . Errorf ( "get stream: %w" , err )
2022-03-29 12:20:26 +00:00
}
2023-12-14 13:54:11 +00:00
2022-03-29 12:20:26 +00:00
a . startup = false
2022-04-19 09:25:27 +00:00
/*to count additions/deletions across lists*/
2022-03-29 12:20:26 +00:00
2022-10-26 08:48:17 +00:00
log . Debugf ( "Received %d new decisions" , len ( data . New ) )
log . Debugf ( "Received %d deleted decisions" , len ( data . Deleted ) )
2023-12-14 13:54:11 +00:00
2023-02-06 13:06:14 +00:00
if data . Links != nil {
log . Debugf ( "Received %d blocklists links" , len ( data . Links . Blocklists ) )
}
2022-10-26 08:48:17 +00:00
2023-12-14 13:54:11 +00:00
addCounters , deleteCounters := makeAddAndDeleteCounters ( )
2024-01-15 11:38:31 +00:00
2022-03-29 12:20:26 +00:00
// process deleted decisions
2024-01-15 10:44:38 +00:00
nbDeleted , err := a . HandleDeletedDecisionsV3 ( data . Deleted , deleteCounters )
if err != nil {
2022-03-29 12:20:26 +00:00
return err
}
2024-01-15 10:44:38 +00:00
log . Printf ( "capi/community-blocklist : %d explicit deletions" , nbDeleted )
2022-03-29 12:20:26 +00:00
if len ( data . New ) == 0 {
2022-04-01 13:31:33 +00:00
log . Infof ( "capi/community-blocklist : received 0 new entries (expected if you just installed crowdsec)" )
2022-03-29 12:20:26 +00:00
return nil
}
2023-02-06 13:06:14 +00:00
// create one alert for community blocklist using the first decision
decisions := a . apiClient . Decisions . GetDecisionsFromGroups ( data . New )
2023-03-21 10:50:10 +00:00
//apply APIC specific whitelists
decisions = a . ApplyApicWhitelists ( decisions )
2023-02-06 13:06:14 +00:00
alert := createAlertForDecision ( decisions [ 0 ] )
alertsFromCapi := [ ] * models . Alert { alert }
2023-12-14 13:54:11 +00:00
alertsFromCapi = fillAlertsWithDecisions ( alertsFromCapi , decisions , addCounters )
2023-02-06 13:06:14 +00:00
2023-12-14 13:54:11 +00:00
err = a . SaveAlerts ( alertsFromCapi , addCounters , deleteCounters )
2023-02-06 13:06:14 +00:00
if err != nil {
2023-07-06 08:14:45 +00:00
return fmt . Errorf ( "while saving alerts: %w" , err )
2023-02-06 13:06:14 +00:00
}
// update blocklists
2023-12-14 13:54:11 +00:00
if err := a . UpdateBlocklists ( data . Links , addCounters , forcePull ) ; err != nil {
2023-07-06 08:14:45 +00:00
return fmt . Errorf ( "while updating blocklists: %w" , err )
2023-02-06 13:06:14 +00:00
}
2023-12-14 13:54:11 +00:00
2023-02-06 13:06:14 +00:00
return nil
}
2021-08-25 09:45:29 +00:00
2023-11-29 10:37:46 +00:00
// we receive a link to a blocklist, we pull the content of the blocklist and we create one alert
func ( a * apic ) PullBlocklist ( blocklist * modelscapi . BlocklistLink , forcePull bool ) error {
2023-12-14 13:54:11 +00:00
addCounters , _ := makeAddAndDeleteCounters ( )
2023-11-29 10:37:46 +00:00
if err := a . UpdateBlocklists ( & modelscapi . GetDecisionsStreamResponseLinks {
Blocklists : [ ] * modelscapi . BlocklistLink { blocklist } ,
2023-12-14 13:54:11 +00:00
} , addCounters , forcePull ) ; err != nil {
2023-11-29 10:37:46 +00:00
return fmt . Errorf ( "while pulling blocklist: %w" , err )
}
2023-12-14 13:54:11 +00:00
2023-11-29 10:37:46 +00:00
return nil
}
2023-08-10 11:03:47 +00:00
// if decisions is whitelisted: return representation of the whitelist ip or cidr
// if not whitelisted: empty string
func ( a * apic ) whitelistedBy ( decision * models . Decision ) string {
if decision . Value == nil {
return ""
}
2023-12-14 13:54:11 +00:00
2023-08-10 11:03:47 +00:00
ipval := net . ParseIP ( * decision . Value )
for _ , cidr := range a . whitelists . Cidrs {
if cidr . Contains ( ipval ) {
return cidr . String ( )
}
}
2023-12-14 13:54:11 +00:00
2023-08-10 11:03:47 +00:00
for _ , ip := range a . whitelists . Ips {
if ip != nil && ip . Equal ( ipval ) {
return ip . String ( )
}
}
2023-12-14 13:54:11 +00:00
2023-08-10 11:03:47 +00:00
return ""
}
2023-03-21 10:50:10 +00:00
func ( a * apic ) ApplyApicWhitelists ( decisions [ ] * models . Decision ) [ ] * models . Decision {
2023-08-10 11:03:47 +00:00
if a . whitelists == nil || len ( a . whitelists . Cidrs ) == 0 && len ( a . whitelists . Ips ) == 0 {
2023-03-21 10:50:10 +00:00
return decisions
}
//deal with CAPI whitelists for fire. We want to avoid having a second list, so we shrink in place
outIdx := 0
2023-12-14 13:54:11 +00:00
2023-03-21 10:50:10 +00:00
for _ , decision := range decisions {
2023-08-10 11:03:47 +00:00
whitelister := a . whitelistedBy ( decision )
if whitelister != "" {
log . Infof ( "%s from %s is whitelisted by %s" , * decision . Value , * decision . Scenario , whitelister )
2023-03-21 10:50:10 +00:00
continue
}
2023-12-14 13:54:11 +00:00
2023-08-10 11:03:47 +00:00
decisions [ outIdx ] = decision
outIdx ++
2023-03-21 10:50:10 +00:00
}
//shrink the list, those are deleted items
2023-08-10 11:03:47 +00:00
return decisions [ : outIdx ]
2023-03-21 10:50:10 +00:00
}
2023-12-14 13:54:11 +00:00
func ( a * apic ) SaveAlerts ( alertsFromCapi [ ] * models . Alert , addCounters map [ string ] map [ string ] int , deleteCounters map [ string ] map [ string ] int ) error {
2023-08-10 11:03:47 +00:00
for _ , alert := range alertsFromCapi {
2023-12-14 13:54:11 +00:00
setAlertScenario ( alert , addCounters , deleteCounters )
2023-08-10 11:03:47 +00:00
log . Debugf ( "%s has %d decisions" , * alert . Source . Scope , len ( alert . Decisions ) )
2023-12-14 13:54:11 +00:00
2022-10-26 08:48:17 +00:00
if a . dbClient . Type == "sqlite" && ( a . dbClient . WalMode == nil || ! * a . dbClient . WalMode ) {
log . Warningf ( "sqlite is not using WAL mode, LAPI might become unresponsive when inserting the community blocklist" )
}
2023-12-14 13:54:11 +00:00
2023-08-10 11:03:47 +00:00
alertID , inserted , deleted , err := a . dbClient . UpdateCommunityBlocklist ( alert )
2022-01-11 13:31:51 +00:00
if err != nil {
2023-08-10 11:03:47 +00:00
return fmt . Errorf ( "while saving alert from %s: %w" , * alert . Source . Scope , err )
2022-01-11 13:31:51 +00:00
}
2023-12-14 13:54:11 +00:00
2023-08-10 11:03:47 +00:00
log . Printf ( "%s : added %d entries, deleted %d entries (alert:%d)" , * alert . Source . Scope , inserted , deleted , alertID )
2022-01-11 13:31:51 +00:00
}
2023-02-06 13:06:14 +00:00
return nil
}
2023-02-13 14:06:14 +00:00
func ( a * apic ) ShouldForcePullBlocklist ( blocklist * modelscapi . BlocklistLink ) ( bool , error ) {
// we should force pull if the blocklist decisions are about to expire or there's no decision in the db
alertQuery := a . dbClient . Ent . Alert . Query ( )
alertQuery . Where ( alert . SourceScopeEQ ( fmt . Sprintf ( "%s:%s" , types . ListOrigin , * blocklist . Name ) ) )
alertQuery . Order ( ent . Desc ( alert . FieldCreatedAt ) )
alertInstance , err := alertQuery . First ( context . Background ( ) )
2023-12-14 13:54:11 +00:00
2023-02-13 14:06:14 +00:00
if err != nil {
if ent . IsNotFound ( err ) {
log . Debugf ( "no alert found for %s, force refresh" , * blocklist . Name )
return true , nil
}
2023-12-14 13:54:11 +00:00
2023-07-06 08:14:45 +00:00
return false , fmt . Errorf ( "while getting alert: %w" , err )
2023-02-13 14:06:14 +00:00
}
2023-12-14 13:54:11 +00:00
2023-02-13 14:06:14 +00:00
decisionQuery := a . dbClient . Ent . Decision . Query ( )
decisionQuery . Where ( decision . HasOwnerWith ( alert . IDEQ ( alertInstance . ID ) ) )
firstDecision , err := decisionQuery . First ( context . Background ( ) )
2023-12-14 13:54:11 +00:00
2023-02-13 14:06:14 +00:00
if err != nil {
if ent . IsNotFound ( err ) {
log . Debugf ( "no decision found for %s, force refresh" , * blocklist . Name )
return true , nil
}
2023-12-14 13:54:11 +00:00
2023-07-06 08:14:45 +00:00
return false , fmt . Errorf ( "while getting decision: %w" , err )
2023-02-13 14:06:14 +00:00
}
2023-12-14 13:54:11 +00:00
2023-02-13 14:06:14 +00:00
if firstDecision == nil || firstDecision . Until == nil || firstDecision . Until . Sub ( time . Now ( ) . UTC ( ) ) < ( a . pullInterval + 15 * time . Minute ) {
log . Debugf ( "at least one decision found for %s, expire soon, force refresh" , * blocklist . Name )
return true , nil
}
2023-12-14 13:54:11 +00:00
2023-02-13 14:06:14 +00:00
return false , nil
}
2023-12-14 13:54:11 +00:00
func ( a * apic ) updateBlocklist ( client * apiclient . ApiClient , blocklist * modelscapi . BlocklistLink , addCounters map [ string ] map [ string ] int , forcePull bool ) error {
2023-08-10 11:03:47 +00:00
if blocklist . Scope == nil {
log . Warningf ( "blocklist has no scope" )
return nil
}
2023-12-14 13:54:11 +00:00
2023-08-10 11:03:47 +00:00
if blocklist . Duration == nil {
log . Warningf ( "blocklist has no duration" )
return nil
}
2023-12-14 13:54:11 +00:00
2023-11-29 10:37:46 +00:00
if ! forcePull {
_forcePull , err := a . ShouldForcePullBlocklist ( blocklist )
if err != nil {
return fmt . Errorf ( "while checking if we should force pull blocklist %s: %w" , * blocklist . Name , err )
}
2023-12-14 13:54:11 +00:00
2023-11-29 10:37:46 +00:00
forcePull = _forcePull
2023-08-10 11:03:47 +00:00
}
2023-12-14 13:54:11 +00:00
2023-08-10 11:03:47 +00:00
blocklistConfigItemName := fmt . Sprintf ( "blocklist:%s:last_pull" , * blocklist . Name )
2023-12-14 13:54:11 +00:00
var (
lastPullTimestamp * string
err error
)
2023-08-10 11:03:47 +00:00
if ! forcePull {
lastPullTimestamp , err = a . dbClient . GetConfigItem ( blocklistConfigItemName )
if err != nil {
return fmt . Errorf ( "while getting last pull timestamp for blocklist %s: %w" , * blocklist . Name , err )
}
}
2023-12-14 13:54:11 +00:00
2023-08-10 11:03:47 +00:00
decisions , hasChanged , err := client . Decisions . GetDecisionsFromBlocklist ( context . Background ( ) , blocklist , lastPullTimestamp )
if err != nil {
return fmt . Errorf ( "while getting decisions from blocklist %s: %w" , * blocklist . Name , err )
}
2023-12-14 13:54:11 +00:00
2023-08-10 11:03:47 +00:00
if ! hasChanged {
if lastPullTimestamp == nil {
log . Infof ( "blocklist %s hasn't been modified or there was an error reading it, skipping" , * blocklist . Name )
} else {
log . Infof ( "blocklist %s hasn't been modified since %s, skipping" , * blocklist . Name , * lastPullTimestamp )
}
2023-12-14 13:54:11 +00:00
2023-08-10 11:03:47 +00:00
return nil
}
2023-12-14 13:54:11 +00:00
2023-08-10 11:03:47 +00:00
err = a . dbClient . SetConfigItem ( blocklistConfigItemName , time . Now ( ) . UTC ( ) . Format ( http . TimeFormat ) )
if err != nil {
return fmt . Errorf ( "while setting last pull timestamp for blocklist %s: %w" , * blocklist . Name , err )
}
2023-12-14 13:54:11 +00:00
2023-08-10 11:03:47 +00:00
if len ( decisions ) == 0 {
log . Infof ( "blocklist %s has no decisions" , * blocklist . Name )
return nil
}
//apply APIC specific whitelists
decisions = a . ApplyApicWhitelists ( decisions )
alert := createAlertForDecision ( decisions [ 0 ] )
alertsFromCapi := [ ] * models . Alert { alert }
2023-12-14 13:54:11 +00:00
alertsFromCapi = fillAlertsWithDecisions ( alertsFromCapi , decisions , addCounters )
2023-08-10 11:03:47 +00:00
2023-12-14 13:54:11 +00:00
err = a . SaveAlerts ( alertsFromCapi , addCounters , nil )
2023-08-10 11:03:47 +00:00
if err != nil {
return fmt . Errorf ( "while saving alert from blocklist %s: %w" , * blocklist . Name , err )
}
2023-12-14 13:54:11 +00:00
2023-08-10 11:03:47 +00:00
return nil
}
2023-12-14 13:54:11 +00:00
func ( a * apic ) UpdateBlocklists ( links * modelscapi . GetDecisionsStreamResponseLinks , addCounters map [ string ] map [ string ] int , forcePull bool ) error {
2023-02-06 13:06:14 +00:00
if links == nil {
return nil
}
2023-12-14 13:54:11 +00:00
2023-02-06 13:06:14 +00:00
if links . Blocklists == nil {
return nil
}
// we must use a different http client than apiClient's because the transport of apiClient is jwtTransport or here we have signed apis that are incompatibles
// we can use the same baseUrl as the urls are absolute and the parse will take care of it
2023-02-13 14:06:14 +00:00
defaultClient , err := apiclient . NewDefaultClient ( a . apiClient . BaseURL , "" , "" , nil )
2023-02-06 13:06:14 +00:00
if err != nil {
2023-07-06 08:14:45 +00:00
return fmt . Errorf ( "while creating default client: %w" , err )
2023-02-06 13:06:14 +00:00
}
2023-12-14 13:54:11 +00:00
2023-02-06 13:06:14 +00:00
for _ , blocklist := range links . Blocklists {
2023-12-14 13:54:11 +00:00
if err := a . updateBlocklist ( defaultClient , blocklist , addCounters , forcePull ) ; err != nil {
2023-08-10 11:03:47 +00:00
return err
2023-09-20 09:56:00 +00:00
}
2023-02-06 13:06:14 +00:00
}
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
return nil
}
2023-12-14 13:54:11 +00:00
func setAlertScenario ( alert * models . Alert , addCounters map [ string ] map [ string ] int , deleteCounters map [ string ] map [ string ] int ) {
2023-01-31 13:47:44 +00:00
if * alert . Source . Scope == types . CAPIOrigin {
2023-09-20 09:56:00 +00:00
* alert . Source . Scope = types . CommunityBlocklistPullSourceScope
2023-12-14 13:54:11 +00:00
alert . Scenario = ptr . Of ( fmt . Sprintf ( "update : +%d/-%d IPs" , addCounters [ types . CAPIOrigin ] [ "all" ] , deleteCounters [ types . CAPIOrigin ] [ "all" ] ) )
2023-01-31 13:47:44 +00:00
} else if * alert . Source . Scope == types . ListOrigin {
* alert . Source . Scope = fmt . Sprintf ( "%s:%s" , types . ListOrigin , * alert . Scenario )
2023-12-14 13:54:11 +00:00
alert . Scenario = ptr . Of ( fmt . Sprintf ( "update : +%d/-%d IPs" , addCounters [ types . ListOrigin ] [ * alert . Scenario ] , deleteCounters [ types . ListOrigin ] [ * alert . Scenario ] ) )
2022-03-29 12:20:26 +00:00
}
}
2020-11-30 09:37:17 +00:00
func ( a * apic ) Pull ( ) error {
2023-05-23 08:52:47 +00:00
defer trace . CatchPanic ( "lapi/pullFromAPIC" )
2020-11-30 09:37:17 +00:00
2020-12-14 10:54:16 +00:00
toldOnce := false
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
for {
2022-03-29 12:20:26 +00:00
scenario , err := a . FetchScenariosListFromDB ( )
if err != nil {
log . Errorf ( "unable to fetch scenarios from db: %s" , err )
}
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
if len ( scenario ) > 0 {
break
}
2023-12-14 13:54:11 +00:00
2020-12-14 10:54:16 +00:00
if ! toldOnce {
2022-06-22 07:38:23 +00:00
log . Warning ( "scenario list is empty, will not pull yet" )
2023-12-14 13:54:11 +00:00
2020-12-14 10:54:16 +00:00
toldOnce = true
}
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
time . Sleep ( 1 * time . Second )
}
2023-12-14 13:54:11 +00:00
2023-03-21 13:06:19 +00:00
if err := a . PullTop ( false ) ; err != nil {
2020-11-30 09:37:17 +00:00
log . Errorf ( "capi pull top: %s" , err )
}
2022-10-28 11:55:59 +00:00
log . Infof ( "Start pull from CrowdSec Central API (interval: %s once, then %s)" , a . pullIntervalFirst . Round ( time . Second ) , a . pullInterval )
ticker := time . NewTicker ( a . pullIntervalFirst )
2020-11-30 09:37:17 +00:00
for {
select {
case <- ticker . C :
2022-10-28 11:55:59 +00:00
ticker . Reset ( a . pullInterval )
2023-12-14 13:54:11 +00:00
2023-03-21 13:06:19 +00:00
if err := a . PullTop ( false ) ; err != nil {
2020-11-30 09:37:17 +00:00
log . Errorf ( "capi pull top: %s" , err )
continue
}
case <- a . pullTomb . Dying ( ) : // if one apic routine is dying, do we kill the others?
a . metricsTomb . Kill ( nil )
a . pushTomb . Kill ( nil )
2023-12-14 13:54:11 +00:00
2020-11-30 09:37:17 +00:00
return nil
}
}
}
func ( a * apic ) Shutdown ( ) {
a . pushTomb . Kill ( nil )
a . pullTomb . Kill ( nil )
a . metricsTomb . Kill ( nil )
}
2022-03-29 12:20:26 +00:00
func makeAddAndDeleteCounters ( ) ( map [ string ] map [ string ] int , map [ string ] map [ string ] int ) {
2023-12-14 13:54:11 +00:00
addCounters := make ( map [ string ] map [ string ] int )
addCounters [ types . CAPIOrigin ] = make ( map [ string ] int )
addCounters [ types . ListOrigin ] = make ( map [ string ] int )
2022-03-29 12:20:26 +00:00
2023-12-14 13:54:11 +00:00
deleteCounters := make ( map [ string ] map [ string ] int )
deleteCounters [ types . CAPIOrigin ] = make ( map [ string ] int )
deleteCounters [ types . ListOrigin ] = make ( map [ string ] int )
2022-03-29 12:20:26 +00:00
2023-12-14 13:54:11 +00:00
return addCounters , deleteCounters
2022-03-29 12:20:26 +00:00
}
2023-02-06 13:06:14 +00:00
func updateCounterForDecision ( counter map [ string ] map [ string ] int , origin * string , scenario * string , totalDecisions int ) {
if * origin == types . CAPIOrigin {
counter [ * origin ] [ "all" ] += totalDecisions
} else if * origin == types . ListOrigin {
counter [ * origin ] [ * scenario ] += totalDecisions
2022-10-06 09:48:06 +00:00
} else {
2023-02-06 13:06:14 +00:00
log . Warningf ( "Unknown origin %s" , * origin )
2022-03-29 12:20:26 +00:00
}
}