* refactor(report): LocalFileWriter * refactor -format-json * refacotr: -format-one-email * refactor: -format-csv * refactor: -gzip * refactor: -format-full-text * refactor: -format-one-line-text * refactor: -format-list * refacotr: remove -to-* from config * refactor: IgnoreGitHubDismissed * refactor: GitHub * refactor: IgnoreUnsocred * refactor: diff * refacotr: lang * refacotr: cacheDBPath * refactor: Remove config references * refactor: ScanResults * refacotr: constant pkg * chore: comment * refactor: scanner * refactor: scanner * refactor: serverapi.go * refactor: serverapi * refactor: change pkg structure * refactor: serverapi.go * chore: remove emtpy file * fix(scan): remove -ssh-native-insecure option * fix(scan): remove the deprecated option `keypassword`
215 lines
5.8 KiB
Go
215 lines
5.8 KiB
Go
package scanner
|
|
|
|
import (
|
|
"bufio"
|
|
"fmt"
|
|
"regexp"
|
|
"strings"
|
|
|
|
"github.com/future-architect/vuls/config"
|
|
"github.com/future-architect/vuls/constant"
|
|
"github.com/future-architect/vuls/models"
|
|
"github.com/future-architect/vuls/util"
|
|
"golang.org/x/xerrors"
|
|
)
|
|
|
|
// inherit OsTypeInterface
|
|
type suse struct {
|
|
redhatBase
|
|
}
|
|
|
|
// NewRedhat is constructor
|
|
func newSUSE(c config.ServerInfo) *suse {
|
|
r := &suse{
|
|
redhatBase: redhatBase{
|
|
base: base{
|
|
osPackages: osPackages{
|
|
Packages: models.Packages{},
|
|
VulnInfos: models.VulnInfos{},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
r.log = util.NewCustomLogger(c)
|
|
r.setServerInfo(c)
|
|
return r
|
|
}
|
|
|
|
// https://github.com/mizzy/specinfra/blob/master/lib/specinfra/helper/detect_os/suse.rb
|
|
func detectSUSE(c config.ServerInfo) (bool, osTypeInterface) {
|
|
if r := exec(c, "ls /etc/os-release", noSudo); r.isSuccess() {
|
|
if r := exec(c, "zypper -V", noSudo); r.isSuccess() {
|
|
if r := exec(c, "cat /etc/os-release", noSudo); r.isSuccess() {
|
|
s := newSUSE(c)
|
|
name, ver := s.parseOSRelease(r.Stdout)
|
|
s.setDistro(name, ver)
|
|
return true, s
|
|
}
|
|
}
|
|
} else if r := exec(c, "ls /etc/SuSE-release", noSudo); r.isSuccess() {
|
|
if r := exec(c, "zypper -V", noSudo); r.isSuccess() {
|
|
if r := exec(c, "cat /etc/SuSE-release", noSudo); r.isSuccess() {
|
|
re := regexp.MustCompile(`openSUSE (\d+\.\d+|\d+)`)
|
|
result := re.FindStringSubmatch(strings.TrimSpace(r.Stdout))
|
|
if len(result) == 2 {
|
|
//TODO check opensuse or opensuse.leap
|
|
s := newSUSE(c)
|
|
s.setDistro(constant.OpenSUSE, result[1])
|
|
return true, s
|
|
}
|
|
|
|
re = regexp.MustCompile(`VERSION = (\d+)`)
|
|
result = re.FindStringSubmatch(strings.TrimSpace(r.Stdout))
|
|
if len(result) == 2 {
|
|
version := result[1]
|
|
re = regexp.MustCompile(`PATCHLEVEL = (\d+)`)
|
|
result = re.FindStringSubmatch(strings.TrimSpace(r.Stdout))
|
|
if len(result) == 2 {
|
|
s := newSUSE(c)
|
|
s.setDistro(constant.SUSEEnterpriseServer,
|
|
fmt.Sprintf("%s.%s", version, result[1]))
|
|
return true, s
|
|
}
|
|
}
|
|
util.Log.Warnf("Failed to parse SUSE Linux version: %s", r)
|
|
return true, newSUSE(c)
|
|
}
|
|
}
|
|
}
|
|
util.Log.Debugf("Not SUSE Linux. servername: %s", c.ServerName)
|
|
return false, nil
|
|
}
|
|
|
|
func (o *suse) parseOSRelease(content string) (name string, ver string) {
|
|
if strings.Contains(content, "ID=opensuse") {
|
|
//TODO check opensuse or opensuse.leap
|
|
name = constant.OpenSUSE
|
|
} else if strings.Contains(content, `NAME="SLES"`) {
|
|
name = constant.SUSEEnterpriseServer
|
|
} else if strings.Contains(content, `NAME="SLES_SAP"`) {
|
|
name = constant.SUSEEnterpriseServer
|
|
} else {
|
|
util.Log.Warnf("Failed to parse SUSE edition: %s", content)
|
|
return "unknown", "unknown"
|
|
}
|
|
|
|
re := regexp.MustCompile(`VERSION_ID=\"(.+)\"`)
|
|
result := re.FindStringSubmatch(strings.TrimSpace(content))
|
|
if len(result) != 2 {
|
|
util.Log.Warnf("Failed to parse SUSE Linux version: %s", content)
|
|
return "unknown", "unknown"
|
|
}
|
|
return name, result[1]
|
|
}
|
|
|
|
func (o *suse) checkScanMode() error {
|
|
return nil
|
|
}
|
|
|
|
func (o *suse) checkDeps() error {
|
|
o.log.Infof("Dependencies... No need")
|
|
return nil
|
|
}
|
|
|
|
func (o *suse) checkIfSudoNoPasswd() error {
|
|
// SUSE doesn't need root privilege
|
|
o.log.Infof("sudo ... No need")
|
|
return nil
|
|
}
|
|
|
|
func (o *suse) scanPackages() error {
|
|
o.log.Infof("Scanning OS pkg in %s", o.getServerInfo().Mode)
|
|
installed, err := o.scanInstalledPackages()
|
|
if err != nil {
|
|
o.log.Errorf("Failed to scan installed packages: %s", err)
|
|
return err
|
|
}
|
|
|
|
o.Kernel.RebootRequired, err = o.rebootRequired()
|
|
if err != nil {
|
|
err = xerrors.Errorf("Failed to detect the kernel reboot required: %w", err)
|
|
o.log.Warnf("err: %+v", err)
|
|
o.warns = append(o.warns, err)
|
|
// Only warning this error
|
|
}
|
|
|
|
if o.getServerInfo().Mode.IsOffline() {
|
|
o.Packages = installed
|
|
return nil
|
|
}
|
|
|
|
updatable, err := o.scanUpdatablePackages()
|
|
if err != nil {
|
|
err = xerrors.Errorf("Failed to scan updatable packages: %w", err)
|
|
o.log.Warnf("err: %+v", err)
|
|
o.warns = append(o.warns, err)
|
|
// Only warning this error
|
|
} else {
|
|
installed.MergeNewVersion(updatable)
|
|
}
|
|
|
|
o.Packages = installed
|
|
return nil
|
|
}
|
|
|
|
func (o *suse) rebootRequired() (bool, error) {
|
|
r := o.exec("rpm -q --last kernel-default", noSudo)
|
|
if !r.isSuccess() {
|
|
o.log.Warnf("Failed to detect the last installed kernel : %v", r)
|
|
// continue scanning
|
|
return false, nil
|
|
}
|
|
stdout := strings.Fields(r.Stdout)[0]
|
|
return !strings.Contains(stdout, strings.TrimSuffix(o.Kernel.Release, "-default")), nil
|
|
}
|
|
|
|
func (o *suse) scanUpdatablePackages() (models.Packages, error) {
|
|
cmd := "zypper -q lu"
|
|
if o.hasZypperColorOption() {
|
|
cmd = "zypper -q --no-color lu"
|
|
}
|
|
r := o.exec(cmd, noSudo)
|
|
if !r.isSuccess() {
|
|
return nil, xerrors.Errorf("Failed to scan updatable packages: %v", r)
|
|
}
|
|
return o.parseZypperLULines(r.Stdout)
|
|
}
|
|
|
|
func (o *suse) parseZypperLULines(stdout string) (models.Packages, error) {
|
|
updatables := models.Packages{}
|
|
scanner := bufio.NewScanner(strings.NewReader(stdout))
|
|
for scanner.Scan() {
|
|
line := scanner.Text()
|
|
if strings.Index(line, "S | Repository") != -1 ||
|
|
strings.Index(line, "--+----------------") != -1 {
|
|
continue
|
|
}
|
|
pack, err := o.parseZypperLUOneLine(line)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
updatables[pack.Name] = *pack
|
|
}
|
|
return updatables, nil
|
|
}
|
|
|
|
func (o *suse) parseZypperLUOneLine(line string) (*models.Package, error) {
|
|
ss := strings.Split(line, "|")
|
|
if len(ss) != 6 {
|
|
return nil, xerrors.Errorf("zypper -q lu Unknown format: %s", line)
|
|
}
|
|
available := strings.Split(strings.TrimSpace(ss[4]), "-")
|
|
return &models.Package{
|
|
Name: strings.TrimSpace(ss[2]),
|
|
NewVersion: available[0],
|
|
NewRelease: available[1],
|
|
Arch: strings.TrimSpace(ss[5]),
|
|
}, nil
|
|
}
|
|
|
|
func (o *suse) hasZypperColorOption() bool {
|
|
cmd := "zypper --help | grep color"
|
|
r := o.exec(util.PrependProxyEnv(cmd), noSudo)
|
|
return len(r.Stdout) > 0
|
|
}
|