* refactor(report): LocalFileWriter * refactor -format-json * refacotr: -format-one-email * refactor: -format-csv * refactor: -gzip * refactor: -format-full-text * refactor: -format-one-line-text * refactor: -format-list * refacotr: remove -to-* from config * refactor: IgnoreGitHubDismissed * refactor: GitHub * refactor: IgnoreUnsocred * refactor: diff * refacotr: lang * refacotr: cacheDBPath * refactor: Remove config references * refactor: ScanResults * refacotr: constant pkg * chore: comment * refactor: scanner * refactor: scanner * refactor: serverapi.go * refactor: serverapi * refactor: change pkg structure * refactor: serverapi.go * chore: remove emtpy file * fix(scan): remove -ssh-native-insecure option * fix(scan): remove the deprecated option `keypassword`
158 lines
3.6 KiB
Go
158 lines
3.6 KiB
Go
package reporter
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/json"
|
|
"fmt"
|
|
"path"
|
|
"time"
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
"github.com/aws/aws-sdk-go/aws/credentials"
|
|
"github.com/aws/aws-sdk-go/aws/credentials/ec2rolecreds"
|
|
"github.com/aws/aws-sdk-go/aws/ec2metadata"
|
|
"github.com/aws/aws-sdk-go/aws/session"
|
|
"github.com/aws/aws-sdk-go/service/s3"
|
|
"golang.org/x/xerrors"
|
|
|
|
c "github.com/future-architect/vuls/config"
|
|
"github.com/future-architect/vuls/models"
|
|
)
|
|
|
|
// S3Writer writes results to S3
|
|
type S3Writer struct {
|
|
FormatJSON bool
|
|
FormatFullText bool
|
|
FormatOneLineText bool
|
|
FormatList bool
|
|
Gzip bool
|
|
}
|
|
|
|
func getS3() (*s3.S3, error) {
|
|
ses, err := session.NewSession()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
config := &aws.Config{
|
|
Region: aws.String(c.Conf.AWS.Region),
|
|
Credentials: credentials.NewChainCredentials([]credentials.Provider{
|
|
&credentials.EnvProvider{},
|
|
&credentials.SharedCredentialsProvider{Filename: "", Profile: c.Conf.AWS.Profile},
|
|
&ec2rolecreds.EC2RoleProvider{Client: ec2metadata.New(ses)},
|
|
}),
|
|
}
|
|
s, err := session.NewSession(config)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return s3.New(s), nil
|
|
}
|
|
|
|
// Write results to S3
|
|
// http://docs.aws.amazon.com/sdk-for-go/latest/v1/developerguide/common-examples.title.html
|
|
func (w S3Writer) Write(rs ...models.ScanResult) (err error) {
|
|
if len(rs) == 0 {
|
|
return nil
|
|
}
|
|
|
|
svc, err := getS3()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if w.FormatOneLineText {
|
|
timestr := rs[0].ScannedAt.Format(time.RFC3339)
|
|
k := fmt.Sprintf(timestr + "/summary.txt")
|
|
text := formatOneLineSummary(rs...)
|
|
if err := putObject(svc, k, []byte(text), w.Gzip); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
for _, r := range rs {
|
|
key := r.ReportKeyName()
|
|
if w.FormatJSON {
|
|
k := key + ".json"
|
|
var b []byte
|
|
if b, err = json.Marshal(r); err != nil {
|
|
return xerrors.Errorf("Failed to Marshal to JSON: %w", err)
|
|
}
|
|
if err := putObject(svc, k, b, w.Gzip); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if w.FormatList {
|
|
k := key + "_short.txt"
|
|
text := formatList(r)
|
|
if err := putObject(svc, k, []byte(text), w.Gzip); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if w.FormatFullText {
|
|
k := key + "_full.txt"
|
|
text := formatFullPlainText(r)
|
|
if err := putObject(svc, k, []byte(text), w.Gzip); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CheckIfBucketExists check the existence of S3 bucket
|
|
func CheckIfBucketExists() error {
|
|
svc, err := getS3()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
result, err := svc.ListBuckets(&s3.ListBucketsInput{})
|
|
if err != nil {
|
|
return xerrors.Errorf(
|
|
"Failed to list buckets. err: %w, profile: %s, region: %s",
|
|
err, c.Conf.AWS.Profile, c.Conf.AWS.Region)
|
|
}
|
|
|
|
found := false
|
|
for _, bucket := range result.Buckets {
|
|
if *bucket.Name == c.Conf.AWS.S3Bucket {
|
|
found = true
|
|
break
|
|
}
|
|
}
|
|
if !found {
|
|
return xerrors.Errorf(
|
|
"Failed to find the buckets. profile: %s, region: %s, bucket: %s",
|
|
c.Conf.AWS.Profile, c.Conf.AWS.Region, c.Conf.AWS.S3Bucket)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func putObject(svc *s3.S3, k string, b []byte, gzip bool) error {
|
|
var err error
|
|
if gzip {
|
|
if b, err = gz(b); err != nil {
|
|
return err
|
|
}
|
|
k += ".gz"
|
|
}
|
|
|
|
putObjectInput := &s3.PutObjectInput{
|
|
Bucket: aws.String(c.Conf.AWS.S3Bucket),
|
|
Key: aws.String(path.Join(c.Conf.AWS.S3ResultsDir, k)),
|
|
Body: bytes.NewReader(b),
|
|
}
|
|
|
|
if c.Conf.AWS.S3ServerSideEncryption != "" {
|
|
putObjectInput.ServerSideEncryption = aws.String(c.Conf.AWS.S3ServerSideEncryption)
|
|
}
|
|
|
|
if _, err := svc.PutObject(putObjectInput); err != nil {
|
|
return xerrors.Errorf("Failed to upload data to %s/%s, err: %w",
|
|
c.Conf.AWS.S3Bucket, k, err)
|
|
}
|
|
return nil
|
|
}
|