186 lines
		
	
	
		
			4.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			186 lines
		
	
	
		
			4.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/* Vuls - Vulnerability Scanner
 | 
						|
Copyright (C) 2016  Future Architect, Inc. Japan.
 | 
						|
 | 
						|
This program is free software: you can redistribute it and/or modify
 | 
						|
it under the terms of the GNU General Public License as published by
 | 
						|
the Free Software Foundation, either version 3 of the License, or
 | 
						|
(at your option) any later version.
 | 
						|
 | 
						|
This program is distributed in the hope that it will be useful,
 | 
						|
but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
GNU General Public License for more details.
 | 
						|
 | 
						|
You should have received a copy of the GNU General Public License
 | 
						|
along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
						|
*/
 | 
						|
 | 
						|
package commands
 | 
						|
 | 
						|
import (
 | 
						|
	"context"
 | 
						|
	"flag"
 | 
						|
	"os"
 | 
						|
	"path/filepath"
 | 
						|
 | 
						|
	c "github.com/future-architect/vuls/config"
 | 
						|
	"github.com/future-architect/vuls/models"
 | 
						|
	"github.com/future-architect/vuls/report"
 | 
						|
	"github.com/future-architect/vuls/util"
 | 
						|
	"github.com/google/subcommands"
 | 
						|
)
 | 
						|
 | 
						|
// TuiCmd is Subcommand of host discovery mode
 | 
						|
type TuiCmd struct {
 | 
						|
	lang       string
 | 
						|
	debugSQL   bool
 | 
						|
	debug      bool
 | 
						|
	configPath string
 | 
						|
	logDir     string
 | 
						|
 | 
						|
	resultsDir       string
 | 
						|
	refreshCve       bool
 | 
						|
	cvedbtype        string
 | 
						|
	cvedbpath        string
 | 
						|
	cveDictionaryURL string
 | 
						|
 | 
						|
	pipe bool
 | 
						|
}
 | 
						|
 | 
						|
// Name return subcommand name
 | 
						|
func (*TuiCmd) Name() string { return "tui" }
 | 
						|
 | 
						|
// Synopsis return synopsis
 | 
						|
func (*TuiCmd) Synopsis() string { return "Run Tui view to anayze vulnerabilites" }
 | 
						|
 | 
						|
// Usage return usage
 | 
						|
func (*TuiCmd) Usage() string {
 | 
						|
	return `tui:
 | 
						|
	tui
 | 
						|
		[-config=/path/to/config.toml]
 | 
						|
		[-cvedb-type=sqlite3|mysql|postgres]
 | 
						|
		[-cvedb-path=/path/to/cve.sqlite3]
 | 
						|
		[-cvedb-url=http://127.0.0.1:1323 or DB connection string]
 | 
						|
		[-refresh-cve]
 | 
						|
		[-results-dir=/path/to/results]
 | 
						|
		[-log-dir=/path/to/log]
 | 
						|
		[-debug]
 | 
						|
		[-debug-sql]
 | 
						|
		[-pipe]
 | 
						|
 | 
						|
`
 | 
						|
}
 | 
						|
 | 
						|
// SetFlags set flag
 | 
						|
func (p *TuiCmd) SetFlags(f *flag.FlagSet) {
 | 
						|
	//  f.StringVar(&p.lang, "lang", "en", "[en|ja]")
 | 
						|
	f.BoolVar(&p.debugSQL, "debug-sql", false, "debug SQL")
 | 
						|
	f.BoolVar(&p.debug, "debug", false, "debug mode")
 | 
						|
 | 
						|
	defaultLogDir := util.GetDefaultLogDir()
 | 
						|
	f.StringVar(&p.logDir, "log-dir", defaultLogDir, "/path/to/log")
 | 
						|
 | 
						|
	wd, _ := os.Getwd()
 | 
						|
	defaultResultsDir := filepath.Join(wd, "results")
 | 
						|
	f.StringVar(&p.resultsDir, "results-dir", defaultResultsDir, "/path/to/results")
 | 
						|
 | 
						|
	defaultConfPath := filepath.Join(wd, "config.toml")
 | 
						|
	f.StringVar(&p.configPath, "config", defaultConfPath, "/path/to/toml")
 | 
						|
 | 
						|
	f.BoolVar(
 | 
						|
		&p.refreshCve,
 | 
						|
		"refresh-cve",
 | 
						|
		false,
 | 
						|
		"Refresh CVE information in JSON file under results dir")
 | 
						|
 | 
						|
	f.StringVar(
 | 
						|
		&p.cvedbtype,
 | 
						|
		"cvedb-type",
 | 
						|
		"sqlite3",
 | 
						|
		"DB type for fetching CVE dictionary (sqlite3, mysql or postgres)")
 | 
						|
 | 
						|
	defaultCveDBPath := filepath.Join(wd, "cve.sqlite3")
 | 
						|
	f.StringVar(
 | 
						|
		&p.cvedbpath,
 | 
						|
		"cvedb-path",
 | 
						|
		defaultCveDBPath,
 | 
						|
		"/path/to/sqlite3 (For get cve detail from cve.sqlite3)")
 | 
						|
 | 
						|
	f.StringVar(
 | 
						|
		&p.cveDictionaryURL,
 | 
						|
		"cvedb-url",
 | 
						|
		"",
 | 
						|
		"http://cve-dictionary.com:8080 or DB connection string")
 | 
						|
 | 
						|
	f.BoolVar(
 | 
						|
		&p.pipe,
 | 
						|
		"pipe",
 | 
						|
		false,
 | 
						|
		"Use stdin via PIPE")
 | 
						|
}
 | 
						|
 | 
						|
// Execute execute
 | 
						|
func (p *TuiCmd) Execute(_ context.Context, f *flag.FlagSet, _ ...interface{}) subcommands.ExitStatus {
 | 
						|
	c.Conf.Lang = "en"
 | 
						|
 | 
						|
	// Setup Logger
 | 
						|
	c.Conf.Debug = p.debug
 | 
						|
	c.Conf.DebugSQL = p.debugSQL
 | 
						|
	c.Conf.LogDir = p.logDir
 | 
						|
	util.Log = util.NewCustomLogger(c.ServerInfo{})
 | 
						|
	log := util.Log
 | 
						|
 | 
						|
	if err := c.Load(p.configPath, ""); err != nil {
 | 
						|
		util.Log.Errorf("Error loading %s, %s", p.configPath, err)
 | 
						|
		return subcommands.ExitUsageError
 | 
						|
	}
 | 
						|
 | 
						|
	c.Conf.ResultsDir = p.resultsDir
 | 
						|
	c.Conf.CveDBType = p.cvedbtype
 | 
						|
	c.Conf.CveDBPath = p.cvedbpath
 | 
						|
	c.Conf.CveDBURL = p.cveDictionaryURL
 | 
						|
 | 
						|
	log.Info("Validating config...")
 | 
						|
	if !c.Conf.ValidateOnTui() {
 | 
						|
		return subcommands.ExitUsageError
 | 
						|
	}
 | 
						|
 | 
						|
	c.Conf.Pipe = p.pipe
 | 
						|
	jsonDir, err := jsonDir(f.Args())
 | 
						|
	if err != nil {
 | 
						|
		log.Errorf("Failed to read json dir under results: %s", err)
 | 
						|
		return subcommands.ExitFailure
 | 
						|
	}
 | 
						|
 | 
						|
	results, err := loadScanResults(jsonDir)
 | 
						|
	if err != nil {
 | 
						|
		log.Errorf("Failed to read from JSON: %s", err)
 | 
						|
		return subcommands.ExitFailure
 | 
						|
	}
 | 
						|
 | 
						|
	var filledResults []models.ScanResult
 | 
						|
	for _, r := range results {
 | 
						|
		if p.refreshCve || needToRefreshCve(r) {
 | 
						|
			if c.Conf.CveDBType == "sqlite3" {
 | 
						|
				if _, err := os.Stat(c.Conf.CveDBPath); os.IsNotExist(err) {
 | 
						|
					log.Errorf("SQLite3 DB(CVE-Dictionary) is not exist: %s",
 | 
						|
						c.Conf.CveDBPath)
 | 
						|
					return subcommands.ExitFailure
 | 
						|
				}
 | 
						|
			}
 | 
						|
 | 
						|
			if err := fillCveInfoFromCveDB(&r); err != nil {
 | 
						|
				log.Errorf("Failed to fill CVE information: %s", err)
 | 
						|
				return subcommands.ExitFailure
 | 
						|
			}
 | 
						|
 | 
						|
			if err := overwriteJSONFile(jsonDir, r); err != nil {
 | 
						|
				log.Errorf("Failed to write JSON: %s", err)
 | 
						|
				return subcommands.ExitFailure
 | 
						|
			}
 | 
						|
		}
 | 
						|
		filledResults = append(filledResults, r)
 | 
						|
	}
 | 
						|
	return report.RunTui(filledResults)
 | 
						|
}
 |