202 lines
6.1 KiB
Go
202 lines
6.1 KiB
Go
package cwhub
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
"path/filepath"
|
|
|
|
"github.com/pkg/errors"
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
"github.com/crowdsecurity/crowdsec/pkg/csconfig"
|
|
)
|
|
|
|
func purgeItem(hub *csconfig.Hub, target Item) (Item, error) {
|
|
var hdir = hub.HubDir
|
|
hubpath := hdir + "/" + target.RemotePath
|
|
|
|
// disable hub file
|
|
if err := os.Remove(hubpath); err != nil {
|
|
return target, errors.Wrap(err, "while removing file")
|
|
}
|
|
|
|
target.Downloaded = false
|
|
log.Infof("Removed source file [%s] : %s", target.Name, hubpath)
|
|
hubIdx[target.Type][target.Name] = target
|
|
return target, nil
|
|
}
|
|
|
|
//DisableItem to disable an item managed by the hub, removes the symlink if purge is true
|
|
func DisableItem(hub *csconfig.Hub, target Item, purge bool, force bool) (Item, error) {
|
|
var tdir = hub.ConfigDir
|
|
var hdir = hub.HubDir
|
|
var err error
|
|
|
|
if !target.Installed {
|
|
if purge {
|
|
target, err = purgeItem(hub, target)
|
|
if err != nil {
|
|
return target, err
|
|
}
|
|
}
|
|
return target, nil
|
|
}
|
|
|
|
syml, err := filepath.Abs(tdir + "/" + target.Type + "/" + target.Stage + "/" + target.FileName)
|
|
if err != nil {
|
|
return Item{}, err
|
|
}
|
|
|
|
if target.Local {
|
|
return target, fmt.Errorf("%s isn't managed by hub. Please delete manually", target.Name)
|
|
}
|
|
|
|
if target.Tainted && !force {
|
|
return target, fmt.Errorf("%s is tainted, use '--force' to overwrite", target.Name)
|
|
}
|
|
|
|
/*for a COLLECTIONS, disable sub-items*/
|
|
if target.Type == COLLECTIONS {
|
|
var tmp = [][]string{target.Parsers, target.PostOverflows, target.Scenarios, target.Collections}
|
|
for idx, ptr := range tmp {
|
|
ptrtype := ItemTypes[idx]
|
|
for _, p := range ptr {
|
|
if val, ok := hubIdx[ptrtype][p]; ok {
|
|
// check if the item doesn't belong to another collection before removing it
|
|
toRemove := true
|
|
for _, collection := range val.BelongsToCollections {
|
|
if collection != target.Name {
|
|
toRemove = false
|
|
break
|
|
}
|
|
}
|
|
if toRemove {
|
|
hubIdx[ptrtype][p], err = DisableItem(hub, val, purge, force)
|
|
if err != nil {
|
|
return target, errors.Wrap(err, fmt.Sprintf("while disabling %s", p))
|
|
}
|
|
} else {
|
|
log.Infof("%s was not removed because it belongs to another collection", val.Name)
|
|
}
|
|
} else {
|
|
log.Errorf("Referred %s %s in collection %s doesn't exist.", ptrtype, p, target.Name)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
stat, err := os.Lstat(syml)
|
|
if os.IsNotExist(err) {
|
|
if !purge && !force { //we only accept to "delete" non existing items if it's a purge
|
|
return target, fmt.Errorf("can't delete %s : %s doesn't exist", target.Name, syml)
|
|
}
|
|
} else {
|
|
//if it's managed by hub, it's a symlink to csconfig.GConfig.hub.HubDir / ...
|
|
if stat.Mode()&os.ModeSymlink == 0 {
|
|
log.Warningf("%s (%s) isn't a symlink, can't disable", target.Name, syml)
|
|
return target, fmt.Errorf("%s isn't managed by hub", target.Name)
|
|
}
|
|
hubpath, err := os.Readlink(syml)
|
|
if err != nil {
|
|
return target, errors.Wrap(err, "while reading symlink")
|
|
}
|
|
absPath, err := filepath.Abs(hdir + "/" + target.RemotePath)
|
|
if err != nil {
|
|
return target, errors.Wrap(err, "while abs path")
|
|
}
|
|
if hubpath != absPath {
|
|
log.Warningf("%s (%s) isn't a symlink to %s", target.Name, syml, absPath)
|
|
return target, fmt.Errorf("%s isn't managed by hub", target.Name)
|
|
}
|
|
|
|
//remove the symlink
|
|
if err = os.Remove(syml); err != nil {
|
|
return target, errors.Wrap(err, "while removing symlink")
|
|
}
|
|
log.Infof("Removed symlink [%s] : %s", target.Name, syml)
|
|
}
|
|
target.Installed = false
|
|
|
|
if purge {
|
|
target, err = purgeItem(hub, target)
|
|
if err != nil {
|
|
return target, err
|
|
}
|
|
}
|
|
hubIdx[target.Type][target.Name] = target
|
|
return target, nil
|
|
}
|
|
|
|
// creates symlink between actual config file at hub.HubDir and hub.ConfigDir
|
|
// Handles collections recursively
|
|
func EnableItem(hub *csconfig.Hub, target Item) (Item, error) {
|
|
var tdir = hub.ConfigDir
|
|
var hdir = hub.HubDir
|
|
var err error
|
|
parent_dir := filepath.Clean(tdir + "/" + target.Type + "/" + target.Stage + "/")
|
|
/*create directories if needed*/
|
|
if target.Installed {
|
|
if target.Tainted {
|
|
return target, fmt.Errorf("%s is tainted, won't enable unless --force", target.Name)
|
|
}
|
|
if target.Local {
|
|
return target, fmt.Errorf("%s is local, won't enable", target.Name)
|
|
}
|
|
/* if it's a collection, check sub-items even if the collection file itself is up-to-date */
|
|
if target.UpToDate && target.Type != COLLECTIONS {
|
|
log.Tracef("%s is installed and up-to-date, skip.", target.Name)
|
|
return target, nil
|
|
}
|
|
}
|
|
if _, err := os.Stat(parent_dir); os.IsNotExist(err) {
|
|
log.Printf("%s doesn't exist, create", parent_dir)
|
|
if err := os.MkdirAll(parent_dir, os.ModePerm); err != nil {
|
|
return target, errors.Wrap(err, "while creating directory")
|
|
}
|
|
}
|
|
|
|
/*install sub-items if it's a collection*/
|
|
if target.Type == COLLECTIONS {
|
|
var tmp = [][]string{target.Parsers, target.PostOverflows, target.Scenarios, target.Collections}
|
|
for idx, ptr := range tmp {
|
|
ptrtype := ItemTypes[idx]
|
|
for _, p := range ptr {
|
|
val, ok := hubIdx[ptrtype][p]
|
|
if !ok {
|
|
return target, fmt.Errorf("required %s %s of %s doesn't exist, abort.", ptrtype, p, target.Name)
|
|
}
|
|
|
|
hubIdx[ptrtype][p], err = EnableItem(hub, val)
|
|
if err != nil {
|
|
return target, errors.Wrap(err, fmt.Sprintf("while installing %s", p))
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// check if file already exists where it should in configdir (eg /etc/crowdsec/collections/)
|
|
if _, err := os.Lstat(parent_dir + "/" + target.FileName); !os.IsNotExist(err) {
|
|
log.Printf("%s already exists.", parent_dir+"/"+target.FileName)
|
|
return target, nil
|
|
}
|
|
|
|
//tdir+target.RemotePath
|
|
srcPath, err := filepath.Abs(hdir + "/" + target.RemotePath)
|
|
if err != nil {
|
|
return target, errors.Wrap(err, "while getting source path")
|
|
}
|
|
|
|
dstPath, err := filepath.Abs(parent_dir + "/" + target.FileName)
|
|
if err != nil {
|
|
return target, errors.Wrap(err, "while getting destination path")
|
|
}
|
|
|
|
if err = os.Symlink(srcPath, dstPath); err != nil {
|
|
return target, errors.Wrap(err, fmt.Sprintf("while creating symlink from %s to %s", srcPath, dstPath))
|
|
}
|
|
|
|
log.Printf("Enabled %s : %s", target.Type, target.Name)
|
|
target.Installed = true
|
|
hubIdx[target.Type][target.Name] = target
|
|
return target, nil
|
|
}
|