2020-05-15 09:39:16 +00:00
|
|
|
package types
|
|
|
|
|
|
|
|
import (
|
2023-10-16 09:08:57 +00:00
|
|
|
"net"
|
2020-05-15 09:39:16 +00:00
|
|
|
"time"
|
2020-11-30 09:37:17 +00:00
|
|
|
|
2020-12-02 16:15:48 +00:00
|
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
|
2020-11-30 09:37:17 +00:00
|
|
|
"github.com/antonmedv/expr/vm"
|
|
|
|
"github.com/crowdsecurity/crowdsec/pkg/models"
|
2020-05-15 09:39:16 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
LOG = iota
|
|
|
|
OVFLW
|
2023-12-07 11:21:04 +00:00
|
|
|
APPSEC
|
2020-05-15 09:39:16 +00:00
|
|
|
)
|
|
|
|
|
2023-03-16 15:25:50 +00:00
|
|
|
// Event is the structure representing a runtime event (log or overflow)
|
2020-05-15 09:39:16 +00:00
|
|
|
type Event struct {
|
|
|
|
/* is it a log or an overflow */
|
2020-11-30 09:37:17 +00:00
|
|
|
Type int `yaml:"Type,omitempty" json:"Type,omitempty"` //Can be types.LOG (0) or types.OVFLOW (1)
|
2023-03-16 15:25:50 +00:00
|
|
|
ExpectMode int `yaml:"ExpectMode,omitempty" json:"ExpectMode,omitempty"` //how to buckets should handle event : types.TIMEMACHINE or types.LIVE
|
2020-11-30 09:37:17 +00:00
|
|
|
Whitelisted bool `yaml:"Whitelisted,omitempty" json:"Whitelisted,omitempty"`
|
2021-10-04 15:14:52 +00:00
|
|
|
WhitelistReason string `yaml:"WhitelistReason,omitempty" json:"whitelist_reason,omitempty"`
|
2020-05-15 09:39:16 +00:00
|
|
|
//should add whitelist reason ?
|
|
|
|
/* the current stage of the line being parsed */
|
2020-11-30 09:37:17 +00:00
|
|
|
Stage string `yaml:"Stage,omitempty" json:"Stage,omitempty"`
|
2020-05-15 09:39:16 +00:00
|
|
|
/* original line (produced by acquisition) */
|
2020-11-30 09:37:17 +00:00
|
|
|
Line Line `yaml:"Line,omitempty" json:"Line,omitempty"`
|
2020-05-15 09:39:16 +00:00
|
|
|
/* output of groks */
|
2020-11-30 09:37:17 +00:00
|
|
|
Parsed map[string]string `yaml:"Parsed,omitempty" json:"Parsed,omitempty"`
|
2020-05-15 09:39:16 +00:00
|
|
|
/* output of enrichment */
|
2020-11-30 09:37:17 +00:00
|
|
|
Enriched map[string]string `yaml:"Enriched,omitempty" json:"Enriched,omitempty"`
|
2022-12-06 12:47:29 +00:00
|
|
|
/* output of Unmarshal */
|
|
|
|
Unmarshaled map[string]interface{} `yaml:"Unmarshaled,omitempty" json:"Unmarshaled,omitempty"`
|
2020-05-15 09:39:16 +00:00
|
|
|
/* Overflow */
|
2021-10-04 15:14:52 +00:00
|
|
|
Overflow RuntimeAlert `yaml:"Overflow,omitempty" json:"Alert,omitempty"`
|
2020-11-30 09:37:17 +00:00
|
|
|
Time time.Time `yaml:"Time,omitempty" json:"Time,omitempty"` //parsed time `json:"-"` ``
|
|
|
|
StrTime string `yaml:"StrTime,omitempty" json:"StrTime,omitempty"`
|
2022-07-28 14:41:41 +00:00
|
|
|
StrTimeFormat string `yaml:"StrTimeFormat,omitempty" json:"StrTimeFormat,omitempty"`
|
2020-11-30 09:37:17 +00:00
|
|
|
MarshaledTime string `yaml:"MarshaledTime,omitempty" json:"MarshaledTime,omitempty"`
|
|
|
|
Process bool `yaml:"Process,omitempty" json:"Process,omitempty"` //can be set to false to avoid processing line
|
2023-12-07 11:21:04 +00:00
|
|
|
Appsec AppsecEvent `yaml:"Appsec,omitempty" json:"Appsec,omitempty"`
|
2020-05-15 09:39:16 +00:00
|
|
|
/* Meta is the only part that will make it to the API - it should be normalized */
|
2020-11-30 09:37:17 +00:00
|
|
|
Meta map[string]string `yaml:"Meta,omitempty" json:"Meta,omitempty"`
|
|
|
|
}
|
|
|
|
|
2020-12-02 16:15:48 +00:00
|
|
|
func (e *Event) GetType() string {
|
|
|
|
if e.Type == OVFLW {
|
|
|
|
return "overflow"
|
|
|
|
} else if e.Type == LOG {
|
|
|
|
return "log"
|
|
|
|
} else {
|
|
|
|
log.Warningf("unknown event type for %+v", e)
|
|
|
|
return "unknown"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-09-07 08:11:39 +00:00
|
|
|
func (e *Event) GetMeta(key string) string {
|
|
|
|
if e.Type == OVFLW {
|
|
|
|
for _, alert := range e.Overflow.APIAlerts {
|
|
|
|
for _, event := range alert.Events {
|
|
|
|
if event.GetMeta(key) != "" {
|
|
|
|
return event.GetMeta(key)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else if e.Type == LOG {
|
|
|
|
for k, v := range e.Meta {
|
|
|
|
if k == key {
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ""
|
|
|
|
}
|
|
|
|
|
2023-10-16 09:08:57 +00:00
|
|
|
func (e *Event) ParseIPSources() []net.IP {
|
|
|
|
var srcs []net.IP
|
|
|
|
switch e.Type {
|
|
|
|
case LOG:
|
|
|
|
if _, ok := e.Meta["source_ip"]; ok {
|
|
|
|
srcs = append(srcs, net.ParseIP(e.Meta["source_ip"]))
|
|
|
|
}
|
|
|
|
case OVFLW:
|
|
|
|
for k := range e.Overflow.Sources {
|
|
|
|
srcs = append(srcs, net.ParseIP(k))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return srcs
|
|
|
|
}
|
|
|
|
|
2023-03-16 15:25:50 +00:00
|
|
|
// Move in leakybuckets
|
2020-11-30 09:37:17 +00:00
|
|
|
const (
|
|
|
|
Undefined = ""
|
|
|
|
Ip = "Ip"
|
|
|
|
Range = "Range"
|
|
|
|
Filter = "Filter"
|
2021-05-31 13:07:09 +00:00
|
|
|
Country = "Country"
|
|
|
|
AS = "AS"
|
2020-11-30 09:37:17 +00:00
|
|
|
)
|
|
|
|
|
2023-03-16 15:25:50 +00:00
|
|
|
// Move in leakybuckets
|
2020-11-30 09:37:17 +00:00
|
|
|
type ScopeType struct {
|
|
|
|
Scope string `yaml:"type"`
|
|
|
|
Filter string `yaml:"expression"`
|
|
|
|
RunTimeFilter *vm.Program
|
|
|
|
}
|
|
|
|
|
|
|
|
type RuntimeAlert struct {
|
|
|
|
Mapkey string `yaml:"MapKey,omitempty" json:"MapKey,omitempty"`
|
|
|
|
BucketId string `yaml:"BucketId,omitempty" json:"BucketId,omitempty"`
|
|
|
|
Whitelisted bool `yaml:"Whitelisted,omitempty" json:"Whitelisted,omitempty"`
|
|
|
|
Reprocess bool `yaml:"Reprocess,omitempty" json:"Reprocess,omitempty"`
|
|
|
|
Sources map[string]models.Source `yaml:"Sources,omitempty" json:"Sources,omitempty"`
|
|
|
|
Alert *models.Alert `yaml:"Alert,omitempty" json:"Alert,omitempty"` //this one is a pointer to APIAlerts[0] for convenience.
|
|
|
|
//APIAlerts will be populated at the end when there is more than one source
|
|
|
|
APIAlerts []models.Alert `yaml:"APIAlerts,omitempty" json:"APIAlerts,omitempty"`
|
2020-05-15 09:39:16 +00:00
|
|
|
}
|
2021-10-04 15:14:52 +00:00
|
|
|
|
|
|
|
func (r RuntimeAlert) GetSources() []string {
|
|
|
|
ret := make([]string, 0)
|
2022-02-01 21:08:06 +00:00
|
|
|
for key := range r.Sources {
|
2021-10-04 15:14:52 +00:00
|
|
|
ret = append(ret, key)
|
|
|
|
}
|
|
|
|
return ret
|
|
|
|
}
|