185 lines
4.9 KiB
Go
185 lines
4.9 KiB
Go
/* Vuls - Vulnerability Scanner
|
|
Copyright (C) 2016 Future Architect, Inc. Japan.
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package commands
|
|
|
|
import (
|
|
"context"
|
|
"flag"
|
|
"os"
|
|
"path/filepath"
|
|
|
|
c "github.com/future-architect/vuls/config"
|
|
"github.com/future-architect/vuls/util"
|
|
"github.com/google/subcommands"
|
|
)
|
|
|
|
// TuiCmd is Subcommand of host discovery mode
|
|
type TuiCmd struct {
|
|
lang string
|
|
debugSQL bool
|
|
debug bool
|
|
configPath string
|
|
logDir string
|
|
|
|
resultsDir string
|
|
refreshCve bool
|
|
cvedbtype string
|
|
cvedbpath string
|
|
cveDictionaryURL string
|
|
|
|
pipe bool
|
|
}
|
|
|
|
// Name return subcommand name
|
|
func (*TuiCmd) Name() string { return "tui" }
|
|
|
|
// Synopsis return synopsis
|
|
func (*TuiCmd) Synopsis() string { return "Run Tui view to anayze vulnerabilites" }
|
|
|
|
// Usage return usage
|
|
func (*TuiCmd) Usage() string {
|
|
return `tui:
|
|
tui
|
|
[-config=/path/to/config.toml]
|
|
[-cvedb-type=sqlite3|mysql|postgres]
|
|
[-cvedb-path=/path/to/cve.sqlite3]
|
|
[-cvedb-url=http://127.0.0.1:1323 or DB connection string]
|
|
[-refresh-cve]
|
|
[-results-dir=/path/to/results]
|
|
[-log-dir=/path/to/log]
|
|
[-debug]
|
|
[-debug-sql]
|
|
[-pipe]
|
|
|
|
`
|
|
}
|
|
|
|
// SetFlags set flag
|
|
func (p *TuiCmd) SetFlags(f *flag.FlagSet) {
|
|
// f.StringVar(&p.lang, "lang", "en", "[en|ja]")
|
|
f.BoolVar(&p.debugSQL, "debug-sql", false, "debug SQL")
|
|
f.BoolVar(&p.debug, "debug", false, "debug mode")
|
|
|
|
defaultLogDir := util.GetDefaultLogDir()
|
|
f.StringVar(&p.logDir, "log-dir", defaultLogDir, "/path/to/log")
|
|
|
|
wd, _ := os.Getwd()
|
|
defaultResultsDir := filepath.Join(wd, "results")
|
|
f.StringVar(&p.resultsDir, "results-dir", defaultResultsDir, "/path/to/results")
|
|
|
|
defaultConfPath := filepath.Join(wd, "config.toml")
|
|
f.StringVar(&p.configPath, "config", defaultConfPath, "/path/to/toml")
|
|
|
|
f.BoolVar(
|
|
&p.refreshCve,
|
|
"refresh-cve",
|
|
false,
|
|
"Refresh CVE information in JSON file under results dir")
|
|
|
|
f.StringVar(
|
|
&p.cvedbtype,
|
|
"cvedb-type",
|
|
"sqlite3",
|
|
"DB type for fetching CVE dictionary (sqlite3, mysql or postgres)")
|
|
|
|
defaultCveDBPath := filepath.Join(wd, "cve.sqlite3")
|
|
f.StringVar(
|
|
&p.cvedbpath,
|
|
"cvedb-path",
|
|
defaultCveDBPath,
|
|
"/path/to/sqlite3 (For get cve detail from cve.sqlite3)")
|
|
|
|
f.StringVar(
|
|
&p.cveDictionaryURL,
|
|
"cvedb-url",
|
|
"",
|
|
"http://cve-dictionary.com:8080 or DB connection string")
|
|
|
|
f.BoolVar(
|
|
&p.pipe,
|
|
"pipe",
|
|
false,
|
|
"Use stdin via PIPE")
|
|
}
|
|
|
|
// Execute execute
|
|
func (p *TuiCmd) Execute(_ context.Context, f *flag.FlagSet, _ ...interface{}) subcommands.ExitStatus {
|
|
c.Conf.Lang = "en"
|
|
|
|
// Setup Logger
|
|
c.Conf.Debug = p.debug
|
|
c.Conf.DebugSQL = p.debugSQL
|
|
c.Conf.LogDir = p.logDir
|
|
util.Log = util.NewCustomLogger(c.ServerInfo{})
|
|
log := util.Log
|
|
|
|
if err := c.Load(p.configPath, ""); err != nil {
|
|
util.Log.Errorf("Error loading %s, %s", p.configPath, err)
|
|
return subcommands.ExitUsageError
|
|
}
|
|
|
|
c.Conf.ResultsDir = p.resultsDir
|
|
c.Conf.CveDBType = p.cvedbtype
|
|
c.Conf.CveDBPath = p.cvedbpath
|
|
c.Conf.CveDBURL = p.cveDictionaryURL
|
|
|
|
log.Info("Validating config...")
|
|
if !c.Conf.ValidateOnTui() {
|
|
return subcommands.ExitUsageError
|
|
}
|
|
|
|
c.Conf.Pipe = p.pipe
|
|
// jsonDir, err := report.JSONDir(f.Args())
|
|
// if err != nil {
|
|
// log.Errorf("Failed to read json dir under results: %s", err)
|
|
// return subcommands.ExitFailure
|
|
// }
|
|
|
|
// results, err := report.LoadScanResults(jsonDir)
|
|
// if err != nil {
|
|
// log.Errorf("Failed to read from JSON: %s", err)
|
|
// return subcommands.ExitFailure
|
|
// }
|
|
|
|
// var filledResults []models.ScanResult
|
|
// for _, r := range results {
|
|
// if p.refreshCve || needToRefreshCve(r) {
|
|
// if c.Conf.CveDBType == "sqlite3" {
|
|
// if _, err := os.Stat(c.Conf.CveDBPath); os.IsNotExist(err) {
|
|
// log.Errorf("SQLite3 DB(CVE-Dictionary) is not exist: %s",
|
|
// c.Conf.CveDBPath)
|
|
// return subcommands.ExitFailure
|
|
// }
|
|
// }
|
|
|
|
// if err := fillCveInfoFromCveDB(&r); err != nil {
|
|
// log.Errorf("Failed to fill CVE information: %s", err)
|
|
// return subcommands.ExitFailure
|
|
// }
|
|
|
|
// if err := overwriteJSONFile(jsonDir, r); err != nil {
|
|
// log.Errorf("Failed to write JSON: %s", err)
|
|
// return subcommands.ExitFailure
|
|
// }
|
|
// }
|
|
// filledResults = append(filledResults, r)
|
|
// }
|
|
// return report.RunTui(filledResults)
|
|
return subcommands.ExitFailure
|
|
}
|