Compare commits
108 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
d9df055765 | ||
|
|
6897ea8753 | ||
|
|
d534fc79d7 | ||
|
|
9ad0a3eb12 | ||
|
|
d8712037f4 | ||
|
|
aef2647a82 | ||
|
|
c3b6708a98 | ||
|
|
3acd0b899c | ||
|
|
3ac1250bfc | ||
|
|
7bba444522 | ||
|
|
97eb626237 | ||
|
|
b7a1ac06d4 | ||
|
|
49f0acb777 | ||
|
|
a602207369 | ||
|
|
8c0cfcdbe7 | ||
|
|
35a1a89baf | ||
|
|
f3387b169a | ||
|
|
5782072f91 | ||
|
|
7918b3efe6 | ||
|
|
f628e24f58 | ||
|
|
7f54db0cd4 | ||
|
|
2e9b307194 | ||
|
|
726594a712 | ||
|
|
b27038a59c | ||
|
|
72025dab7d | ||
|
|
dd131477e2 | ||
|
|
670aec449a | ||
|
|
fc37e641be | ||
|
|
361de03208 | ||
|
|
a2268fda5d | ||
|
|
9dc0b6002e | ||
|
|
4953be3ef6 | ||
|
|
c386a2d6bc | ||
|
|
dea03a6f70 | ||
|
|
11f755c03c | ||
|
|
1c7a1c1778 | ||
|
|
411574cabe | ||
|
|
820c9410a1 | ||
|
|
6f261803a7 | ||
|
|
aacc98668f | ||
|
|
9519eedf4f | ||
|
|
b8b9b227a9 | ||
|
|
08d3214f22 | ||
|
|
6ebda76738 | ||
|
|
b9754f605b | ||
|
|
be6b19426b | ||
|
|
3ebffda2c7 | ||
|
|
cadbbc9080 | ||
|
|
e907fb0b1a | ||
|
|
b0fc0646d2 | ||
|
|
c2eb02afc7 | ||
|
|
262f3daee4 | ||
|
|
fb32886d4a | ||
|
|
fb624a9147 | ||
|
|
7741e08ebc | ||
|
|
5f607d0be0 | ||
|
|
9a7e5a4796 | ||
|
|
95bc7683ea | ||
|
|
dca0241f17 | ||
|
|
791d64ae4d | ||
|
|
7df9925f94 | ||
|
|
211e019c68 | ||
|
|
de000ab5b6 | ||
|
|
0fe34d1537 | ||
|
|
341f49c4b4 | ||
|
|
7522071a03 | ||
|
|
4e8dc51ac8 | ||
|
|
11453bd0d9 | ||
|
|
f03ec114b1 | ||
|
|
26f4f17760 | ||
|
|
3001282d88 | ||
|
|
9198f19805 | ||
|
|
b6e92a2a57 | ||
|
|
16a174cf56 | ||
|
|
e275a73460 | ||
|
|
2dcc3eaa7b | ||
|
|
322f5161cb | ||
|
|
4e80b5148d | ||
|
|
1d74c6142b | ||
|
|
9c3c0dbeaa | ||
|
|
46dc54f5a7 | ||
|
|
a1321300cb | ||
|
|
9eb1fa36c4 | ||
|
|
c954e929c8 | ||
|
|
1225c9323a | ||
|
|
847002129d | ||
|
|
6f24088069 | ||
|
|
03305a06f6 | ||
|
|
31184e009b | ||
|
|
914168f80f | ||
|
|
3a61371e58 | ||
|
|
d7d49ec0ed | ||
|
|
59e4393e82 | ||
|
|
bd73ba24e8 | ||
|
|
28d1410d62 | ||
|
|
680973df3d | ||
|
|
1603fbee35 | ||
|
|
bbb152dfb8 | ||
|
|
a7b79d0e27 | ||
|
|
eaf276bd3f | ||
|
|
14c6c64989 | ||
|
|
623bd87b4c | ||
|
|
7d9645b3e3 | ||
|
|
bf6ff50da8 | ||
|
|
85f6919bda | ||
|
|
7a7f57f5ae | ||
|
|
36508201ad | ||
|
|
3cb9bcbcf3 |
@@ -13,55 +13,33 @@ jobs:
|
|||||||
release:
|
release:
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- uses: actions/checkout@v6
|
- name: Install syft
|
||||||
- name: Create Release
|
run: curl -sSfL https://get.anchore.io/syft | sudo sh -s -- -b /usr/local/bin
|
||||||
env:
|
- name: Checkout
|
||||||
TOKEN: ${{ secrets.TOKEN }}
|
uses: actions/checkout@v6
|
||||||
run: |
|
- name: Go setup
|
||||||
TAG="${{ gitea.ref_name }}"
|
uses: actions/setup-go@v6
|
||||||
REPO="${{ gitea.repository }}"
|
|
||||||
SERVER="${{ gitea.server_url }}"
|
|
||||||
curl -X POST \
|
|
||||||
-H "Authorization: token $TOKEN" \
|
|
||||||
-H "Content-Type: application/json" \
|
|
||||||
-d '{
|
|
||||||
"tag_name": "'$TAG'",
|
|
||||||
"name": "Release '$TAG'",
|
|
||||||
"body": "# BanForge '$TAG'\n\nIntrusion Prevention System",
|
|
||||||
"draft": false,
|
|
||||||
"prerelease": false
|
|
||||||
}' \
|
|
||||||
"$SERVER/api/v1/repos/$REPO/releases"
|
|
||||||
|
|
||||||
build:
|
|
||||||
needs: release
|
|
||||||
strategy:
|
|
||||||
matrix:
|
|
||||||
include:
|
|
||||||
- goos: linux
|
|
||||||
arch: amd64
|
|
||||||
- goos: linux
|
|
||||||
arch: arm64
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v6
|
|
||||||
- uses: actions/setup-go@v6
|
|
||||||
with:
|
with:
|
||||||
go-version: '1.25'
|
go-version: '1.25'
|
||||||
cache: false
|
cache: false
|
||||||
- run: go mod tidy
|
- name: Install deps
|
||||||
- run: go test ./...
|
run: go mod tidy
|
||||||
- name: Build ${{ matrix.goos }}-${{ matrix.arch }}
|
- name: Golangci-lint
|
||||||
|
uses: golangci/golangci-lint-action@v9.2.0
|
||||||
|
with:
|
||||||
|
args: --timeout=5m
|
||||||
|
skip-cache: true
|
||||||
|
- name: Run tests
|
||||||
|
run: go test ./...
|
||||||
|
- name: GoReleaser
|
||||||
|
uses: goreleaser/goreleaser-action@v6
|
||||||
|
with:
|
||||||
|
distribution: goreleaser
|
||||||
|
version: latest
|
||||||
|
args: release --clean
|
||||||
env:
|
env:
|
||||||
GOOS: ${{ matrix.goos }}
|
GPG_FINGERPRINT: ${{ secrets.GPG_FINGERPRINT }}
|
||||||
GOARCH: ${{ matrix.arch }}
|
GPG_PASSPHRASE: ${{ secrets.GPG_PASSPHRASE }}
|
||||||
run: go build -o banforge-${{ matrix.goos }}-${{ matrix.arch }} ./cmd/banforge
|
GITEA_TOKEN: ${{ secrets.TOKEN }}
|
||||||
- name: Upload ${{ matrix.goos }}-${{ matrix.arch }}
|
|
||||||
env:
|
|
||||||
TOKEN: ${{ secrets.TOKEN }}
|
|
||||||
run: |
|
|
||||||
TAG="${{ gitea.ref_name }}"
|
|
||||||
FILE="banforge-${{ matrix.goos }}-${{ matrix.arch }}"
|
|
||||||
curl --user d3m0k1d:$TOKEN \
|
|
||||||
--upload-file $FILE \
|
|
||||||
https://gitea.d3m0k1d.ru/api/packages/d3m0k1d/generic/banforge/$TAG/$FILE
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
name: CI.yml
|
name: build
|
||||||
|
|
||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
|
|||||||
1
.gitignore
vendored
1
.gitignore
vendored
@@ -1 +1,2 @@
|
|||||||
bin/
|
bin/
|
||||||
|
dist/
|
||||||
|
|||||||
@@ -12,10 +12,12 @@ linters:
|
|||||||
- govet
|
- govet
|
||||||
- staticcheck
|
- staticcheck
|
||||||
- gosec
|
- gosec
|
||||||
|
- nilerr
|
||||||
|
|
||||||
formatters:
|
formatters:
|
||||||
enable:
|
enable:
|
||||||
- gofmt
|
- gofmt
|
||||||
- goimports
|
- goimports
|
||||||
|
- golines
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
74
.goreleaser.yml
Normal file
74
.goreleaser.yml
Normal file
@@ -0,0 +1,74 @@
|
|||||||
|
# yaml-language-server: $schema=https://goreleaser.com/static/schema.json
|
||||||
|
version: 2
|
||||||
|
project_name: BanForge
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
gitea_urls:
|
||||||
|
api: https://gitea.d3m0k1d.ru/api/v1
|
||||||
|
download: https://gitea.d3m0k1d.ru/d3m0k1d/BanForge/releases/download
|
||||||
|
skip_tls_verify: false
|
||||||
|
|
||||||
|
|
||||||
|
builds:
|
||||||
|
- id: banforge
|
||||||
|
main: ./cmd/banforge/main.go
|
||||||
|
binary: banforge
|
||||||
|
ignore:
|
||||||
|
- goos: windows
|
||||||
|
- goos: darwin
|
||||||
|
- goos: freebsd
|
||||||
|
goos:
|
||||||
|
- linux
|
||||||
|
goarch:
|
||||||
|
- amd64
|
||||||
|
- arm64
|
||||||
|
ldflags:
|
||||||
|
- "-s -w"
|
||||||
|
env:
|
||||||
|
- CGO_ENABLED=0
|
||||||
|
archives:
|
||||||
|
- format: tar.gz
|
||||||
|
name_template: "{{ .ProjectName }}_{{ .Version }}_{{ .Os }}_{{ .Arch }}"
|
||||||
|
|
||||||
|
nfpms:
|
||||||
|
- id: banforge
|
||||||
|
package_name: banforge
|
||||||
|
file_name_template: "{{ .PackageName }}_{{ .Version }}_{{ .Os }}_{{ .Arch }}"
|
||||||
|
homepage: https://gitea.d3m0k1d.ru/d3m0k1d/BanForge
|
||||||
|
description: BanForge IPS log-based system
|
||||||
|
maintainer: d3m0k1d <contact@d3m0k1d.ru>
|
||||||
|
license: GPLv3.0
|
||||||
|
formats:
|
||||||
|
- apk
|
||||||
|
- deb
|
||||||
|
- rpm
|
||||||
|
- archlinux
|
||||||
|
bindir: /usr/bin
|
||||||
|
scripts:
|
||||||
|
postinstall: build/postinstall.sh
|
||||||
|
postremove: build/postremove.sh
|
||||||
|
release:
|
||||||
|
gitea:
|
||||||
|
owner: d3m0k1d
|
||||||
|
name: BanForge
|
||||||
|
mode: keep-existing
|
||||||
|
|
||||||
|
changelog:
|
||||||
|
sort: asc
|
||||||
|
filters:
|
||||||
|
exclude:
|
||||||
|
- "^docs:"
|
||||||
|
- "^test:"
|
||||||
|
|
||||||
|
checksum:
|
||||||
|
name_template: "{{ .ProjectName }}_{{ .Version }}_checksums.txt"
|
||||||
|
algorithm: sha256
|
||||||
|
|
||||||
|
sboms:
|
||||||
|
- artifacts: archive
|
||||||
|
documents:
|
||||||
|
- "{{ .ArtifactName }}.spdx.json"
|
||||||
|
cmd: syft
|
||||||
|
args: ["$artifact", "--output", "spdx-json=$document"]
|
||||||
|
|
||||||
6
Makefile
6
Makefile
@@ -25,3 +25,9 @@ clean:
|
|||||||
|
|
||||||
test:
|
test:
|
||||||
go test ./...
|
go test ./...
|
||||||
|
|
||||||
|
test-cover:
|
||||||
|
go test -cover ./...
|
||||||
|
|
||||||
|
lint:
|
||||||
|
golangci-lint run --fix
|
||||||
|
|||||||
101
README.md
101
README.md
@@ -1,7 +1,11 @@
|
|||||||
# BanForge
|
# BanForge
|
||||||
|
|
||||||
Log-based IPS system written in Go for Linux based system.
|
Log-based IPS system written in Go for Linux-based system.
|
||||||
|
|
||||||
|
[](https://pkg.go.dev/github.com/d3m0k1d/BanForge)
|
||||||
|
[](https://github.com/d3m0k1d/BanForge/blob/master/LICENSE)
|
||||||
|
[](https://gitea.d3m0k1d.ru/d3m0k1d/BanForge/actions)
|
||||||
|

|
||||||
# Table of contents
|
# Table of contents
|
||||||
1. [Overview](#overview)
|
1. [Overview](#overview)
|
||||||
2. [Requirements](#requirements)
|
2. [Requirements](#requirements)
|
||||||
@@ -11,25 +15,106 @@ Log-based IPS system written in Go for Linux based system.
|
|||||||
|
|
||||||
# Overview
|
# Overview
|
||||||
BanForge is a simple IPS for replacement fail2ban in Linux system.
|
BanForge is a simple IPS for replacement fail2ban in Linux system.
|
||||||
The project is currently in its early stages of development.
|
All release are available on my self-hosted [Gitea](https://gitea.d3m0k1d.ru/d3m0k1d/BanForge) after release v1.0.0 are available on Github release page.
|
||||||
All release are available on my self-hosted [Gitea](https://gitea.d3m0k1d.ru/d3m0k1d/BanForge) because Github have limit for Actions.
|
|
||||||
If you have any questions or suggestions, create issue on [Github](https://github.com/d3m0k1d/BanForge/issues).
|
If you have any questions or suggestions, create issue on [Github](https://github.com/d3m0k1d/BanForge/issues).
|
||||||
|
|
||||||
## Roadmap
|
## Roadmap
|
||||||
- [ ] Real-time Nginx log monitoring
|
- [x] Rule system
|
||||||
- [ ] Add support for other service
|
- [x] Nginx and Sshd support
|
||||||
- [ ] Add support for user service with regular expressions
|
- [x] Working with ufw/iptables/nftables/firewalld
|
||||||
|
- [ ] Add support for most popular web-service
|
||||||
|
- [ ] User regexp for custom services
|
||||||
- [ ] TUI interface
|
- [ ] TUI interface
|
||||||
|
|
||||||
# Requirements
|
# Requirements
|
||||||
|
|
||||||
- Go 1.21+
|
- Go 1.25+
|
||||||
- ufw/iptables/nftables/firewalld
|
- ufw/iptables/nftables/firewalld
|
||||||
|
|
||||||
# Installation
|
# Installation
|
||||||
currently no binary file if you wanna build the project yourself, you can use [Makefile](https://github.com/d3m0k1d/BanForge/blob/master/Makefile)
|
Search for a release on the [Gitea](https://gitea.d3m0k1d.ru/d3m0k1d/BanForge/releases) releases page and download it.
|
||||||
|
In release page you can find rpm, deb, apk packages, for amd or arm architecture.
|
||||||
|
|
||||||
|
## Installation guide for packages
|
||||||
|
|
||||||
|
### Debian/Ubuntu(.deb)
|
||||||
|
```bash
|
||||||
|
# Download the latest DEB package
|
||||||
|
wget https://gitea.d3m0k1d.ru/d3m0k1d/BanForge/releases/download/v0.4.0/banforge_0.4.0_linux_amd64.deb
|
||||||
|
|
||||||
|
# Install
|
||||||
|
sudo dpkg -i banforge_0.4.0_linux_amd64.deb
|
||||||
|
|
||||||
|
# Verify installation
|
||||||
|
sudo systemctl status banforge
|
||||||
|
```
|
||||||
|
|
||||||
|
### RHEL-based(.rpm)
|
||||||
|
```bash
|
||||||
|
|
||||||
|
# Download
|
||||||
|
wget https://gitea.d3m0k1d.ru/d3m0k1d/BanForge/releases/download/v0.4.0/banforge_0.4.0_linux_amd64.rpm
|
||||||
|
|
||||||
|
# Install
|
||||||
|
sudo rpm -i banforge_0.4.0_linux_amd64.rpm
|
||||||
|
|
||||||
|
# Or with dnf (CentOS 8+, AlmaLinux)
|
||||||
|
sudo dnf install banforge_0.4.0_linux_amd64.rpm
|
||||||
|
|
||||||
|
# Verify
|
||||||
|
sudo systemctl status banforge
|
||||||
|
```
|
||||||
|
|
||||||
|
### Alpine(.apk)
|
||||||
|
```bash
|
||||||
|
|
||||||
|
# Download
|
||||||
|
wget https://gitea.d3m0k1d.ru/d3m0k1d/BanForge/releases/download/v0.4.0/banforge_0.4.0_linux_amd64.apk
|
||||||
|
|
||||||
|
# Install
|
||||||
|
sudo apk add --allow-untrusted banforge_0.4.0_linux_amd64.apk
|
||||||
|
|
||||||
|
# Verify
|
||||||
|
sudo rc-service banforge status
|
||||||
|
```
|
||||||
|
|
||||||
|
### Arch Linux(.pkg.tar.zst)
|
||||||
|
```bash
|
||||||
|
|
||||||
|
# Download
|
||||||
|
wget https://gitea.d3m0k1d.ru/d3m0k1d/BanForge/releases/download/v0.4.0/banforge_0.4.0_linux_amd64.pkg.tar.zst
|
||||||
|
|
||||||
|
# Install
|
||||||
|
sudo pacman -U banforge_0.4.0_linux_amd64.pkg.tar.zst
|
||||||
|
|
||||||
|
# Verify
|
||||||
|
sudo systemctl status banforge
|
||||||
|
```
|
||||||
|
This is examples for other versions with different architecture or new versions check release page on [Gitea](https://gitea.d3m0k1d.ru/d3m0k1d/BanForge/releases).
|
||||||
|
|
||||||
|
## Installation guide for source code
|
||||||
|
```bash
|
||||||
|
# Download
|
||||||
|
git clone https://github.com/d3m0k1d/BanForge.git
|
||||||
|
cd BanForge
|
||||||
|
make build-daemon
|
||||||
|
cd bin
|
||||||
|
mv banforge /usr/bin/banforge
|
||||||
|
cd ..
|
||||||
|
# Add init script and uses banforge init
|
||||||
|
cd build
|
||||||
|
./postinstall.sh
|
||||||
|
```
|
||||||
# Usage
|
# Usage
|
||||||
|
For first steps use this commands
|
||||||
|
```bash
|
||||||
|
banforge init # Create config files and database
|
||||||
|
banforge daemon # Start BanForge daemon (use systemd or another init system to create a service)
|
||||||
|
```
|
||||||
|
You can edit the config file with examples in
|
||||||
|
- `/etc/banforge/config.toml` main config file
|
||||||
|
- `/etc/banforge/rules.toml` ban rules
|
||||||
|
For more information see the [docs](https://github.com/d3m0k1d/BanForge/docs).
|
||||||
|
|
||||||
# License
|
# License
|
||||||
The project is licensed under the [GPL-3.0](https://github.com/d3m0k1d/BanForge/blob/master/LICENSE)
|
The project is licensed under the [GPL-3.0](https://github.com/d3m0k1d/BanForge/blob/master/LICENSE)
|
||||||
|
|||||||
21
build/banforge
Normal file
21
build/banforge
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
#!/sbin/openrc-run
|
||||||
|
|
||||||
|
description="BanForge - IPS log based system"
|
||||||
|
command="/usr/bin/banforge"
|
||||||
|
command_args="daemon"
|
||||||
|
|
||||||
|
pidfile="/run/${RC_SVCNAME}.pid"
|
||||||
|
command_background="yes"
|
||||||
|
|
||||||
|
depend() {
|
||||||
|
need net
|
||||||
|
after network
|
||||||
|
}
|
||||||
|
|
||||||
|
start_post() {
|
||||||
|
einfo "BanForge is now running"
|
||||||
|
}
|
||||||
|
|
||||||
|
stop_post() {
|
||||||
|
einfo "BanForge is now stopped"
|
||||||
|
}
|
||||||
@@ -13,5 +13,9 @@ Restart=always
|
|||||||
StandardOutput=journal
|
StandardOutput=journal
|
||||||
StandardError=journal
|
StandardError=journal
|
||||||
SyslogIdentifier=banforge
|
SyslogIdentifier=banforge
|
||||||
|
|
||||||
|
TimeoutStopSec=90
|
||||||
|
KillSignal=SIGTERM
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=multi-user.target
|
WantedBy=multi-user.target
|
||||||
|
|||||||
61
build/postinstall.sh
Normal file
61
build/postinstall.sh
Normal file
@@ -0,0 +1,61 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
|
||||||
|
if command -v systemctl >/dev/null 2>&1; then
|
||||||
|
# for systemd based systems
|
||||||
|
banforge init
|
||||||
|
cat > /etc/systemd/system/banforge.service << 'EOF'
|
||||||
|
[Unit]
|
||||||
|
Description=BanForge - IPS log based system
|
||||||
|
After=network-online.target
|
||||||
|
Wants=network-online.target
|
||||||
|
Documentation=https://github.com/d3m0k1d/BanForge
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=simple
|
||||||
|
ExecStart=/usr/local/bin/banforge daemon
|
||||||
|
User=root
|
||||||
|
Group=root
|
||||||
|
Restart=always
|
||||||
|
StandardOutput=journal
|
||||||
|
StandardError=journal
|
||||||
|
SyslogIdentifier=banforge
|
||||||
|
TimeoutStopSec=90
|
||||||
|
KillSignal=SIGTERM
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
||||||
|
EOF
|
||||||
|
chmod 644 /etc/systemd/system/banforge.service
|
||||||
|
systemctl daemon-reload
|
||||||
|
systemctl enable banforge
|
||||||
|
fi
|
||||||
|
|
||||||
|
if command -v rc-service >/dev/null 2>&1; then
|
||||||
|
# for openrc based systems
|
||||||
|
banforge init
|
||||||
|
cat > /etc/init.d/banforge << 'EOF'
|
||||||
|
#!/sbin/openrc-run
|
||||||
|
|
||||||
|
description="BanForge - IPS log based system"
|
||||||
|
command="/usr/bin/banforge"
|
||||||
|
command_args="daemon"
|
||||||
|
|
||||||
|
pidfile="/run/${RC_SVCNAME}.pid"
|
||||||
|
command_background="yes"
|
||||||
|
|
||||||
|
depend() {
|
||||||
|
need net
|
||||||
|
after network
|
||||||
|
}
|
||||||
|
|
||||||
|
start_post() {
|
||||||
|
einfo "BanForge is now running"
|
||||||
|
}
|
||||||
|
|
||||||
|
stop_post() {
|
||||||
|
einfo "BanForge is now stopped"
|
||||||
|
}
|
||||||
|
EOF
|
||||||
|
chmod 755 /etc/init.d/banforge
|
||||||
|
rc-update add banforge
|
||||||
|
fi
|
||||||
20
build/postremove.sh
Normal file
20
build/postremove.sh
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
#!/bin/sh
|
||||||
|
|
||||||
|
if command -v systemctl >/dev/null 2>&1; then
|
||||||
|
# for systemd based systems
|
||||||
|
systemctl stop banforge 2>/dev/null || true
|
||||||
|
systemctl disable banforge 2>/dev/null || true
|
||||||
|
rm -f /etc/systemd/system/banforge.service
|
||||||
|
systemctl daemon-reload
|
||||||
|
fi
|
||||||
|
|
||||||
|
if command -v rc-service >/dev/null 2>&1; then
|
||||||
|
# for openrc based systems
|
||||||
|
rc-service banforge stop 2>/dev/null || true
|
||||||
|
rc-update del banforge 2>/dev/null || true
|
||||||
|
rm -f /etc/init.d/banforge
|
||||||
|
fi
|
||||||
|
|
||||||
|
rm -rf /etc/banforge/
|
||||||
|
rm -rf /var/lib/banforge/
|
||||||
|
rm -rf /var/log/banforge/
|
||||||
179
cmd/banforge/command/daemon.go
Normal file
179
cmd/banforge/command/daemon.go
Normal file
@@ -0,0 +1,179 @@
|
|||||||
|
package command
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"os"
|
||||||
|
"os/signal"
|
||||||
|
"syscall"
|
||||||
|
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/blocker"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/config"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/judge"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/metrics"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/parser"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/storage"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
var DaemonCmd = &cobra.Command{
|
||||||
|
Use: "daemon",
|
||||||
|
Short: "Run BanForge daemon process",
|
||||||
|
Run: func(cmd *cobra.Command, args []string) {
|
||||||
|
entryCh := make(chan *storage.LogEntry, 1000)
|
||||||
|
resultCh := make(chan *storage.LogEntry, 100)
|
||||||
|
ctx, stop := signal.NotifyContext(context.Background(), syscall.SIGTERM, syscall.SIGINT)
|
||||||
|
defer stop()
|
||||||
|
log := logger.New(false)
|
||||||
|
log.Info("Starting BanForge daemon")
|
||||||
|
reqDb_w, err := storage.NewRequestsWr()
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Failed to create request writer", "error", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
reqDb_r, err := storage.NewRequestsRd()
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Failed to create request reader", "error", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
banDb_r, err := storage.NewBanReader()
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Failed to create ban reader", "error", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
banDb_w, err := storage.NewBanWriter()
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Failed to create ban writter", "error", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
err = banDb_r.Close()
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Failed to close database connection", "error", err)
|
||||||
|
}
|
||||||
|
err = banDb_w.Close()
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Failed to close database connection", "error", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
cfg, err := config.LoadConfig()
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Failed to load config", "error", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
if cfg.Metrics.Enabled {
|
||||||
|
go func() {
|
||||||
|
if err := metrics.StartMetricsServer(cfg.Metrics.Port); err != nil {
|
||||||
|
log.Error("Failed to start metrics server", "error", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
var b blocker.BlockerEngine
|
||||||
|
fw := cfg.Firewall.Name
|
||||||
|
b = blocker.GetBlocker(fw, cfg.Firewall.Config)
|
||||||
|
r, err := config.LoadRuleConfig()
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Failed to load rules", "error", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
j := judge.New(banDb_r, banDb_w, reqDb_r, b, resultCh, entryCh)
|
||||||
|
j.LoadRules(r)
|
||||||
|
go j.UnbanChecker()
|
||||||
|
go j.Tribunal()
|
||||||
|
go storage.WriteReq(reqDb_w, resultCh)
|
||||||
|
var scanners []*parser.Scanner
|
||||||
|
|
||||||
|
for _, svc := range cfg.Service {
|
||||||
|
log.Info(
|
||||||
|
"Processing service",
|
||||||
|
"name", svc.Name,
|
||||||
|
"enabled", svc.Enabled,
|
||||||
|
"path", svc.LogPath,
|
||||||
|
)
|
||||||
|
|
||||||
|
if !svc.Enabled {
|
||||||
|
log.Info("Service disabled, skipping", "name", svc.Name)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Info("Starting parser for service", "name", svc.Name, "path", svc.LogPath)
|
||||||
|
if svc.Logging != "file" && svc.Logging != "journald" {
|
||||||
|
log.Error("Invalid logging type", "type", svc.Logging)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if svc.Logging == "file" {
|
||||||
|
log.Info("Logging to file", "path", svc.LogPath)
|
||||||
|
pars, err := parser.NewScannerTail(svc.LogPath)
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Failed to create scanner", "service", svc.Name, "error", err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
scanners = append(scanners, pars)
|
||||||
|
|
||||||
|
go pars.Start()
|
||||||
|
|
||||||
|
go func(p *parser.Scanner, serviceName string) {
|
||||||
|
if svc.Name == "nginx" {
|
||||||
|
log.Info("Starting nginx parser", "service", serviceName)
|
||||||
|
ng := parser.NewNginxParser()
|
||||||
|
ng.Parse(p.Events(), entryCh)
|
||||||
|
}
|
||||||
|
if svc.Name == "ssh" {
|
||||||
|
log.Info("Starting ssh parser", "service", serviceName)
|
||||||
|
ssh := parser.NewSshdParser()
|
||||||
|
ssh.Parse(p.Events(), entryCh)
|
||||||
|
}
|
||||||
|
if svc.Name == "apache" {
|
||||||
|
log.Info("Starting apache parser", "service", serviceName)
|
||||||
|
ap := parser.NewApacheParser()
|
||||||
|
ap.Parse(p.Events(), entryCh)
|
||||||
|
}
|
||||||
|
}(pars, svc.Name)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if svc.Logging == "journald" {
|
||||||
|
log.Info("Logging to journald", "path", svc.LogPath)
|
||||||
|
pars, err := parser.NewScannerJournald(svc.LogPath)
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Failed to create scanner", "service", svc.Name, "error", err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
scanners = append(scanners, pars)
|
||||||
|
|
||||||
|
go pars.Start()
|
||||||
|
go func(p *parser.Scanner, serviceName string) {
|
||||||
|
if svc.Name == "nginx" {
|
||||||
|
log.Info("Starting nginx parser", "service", serviceName)
|
||||||
|
ng := parser.NewNginxParser()
|
||||||
|
ng.Parse(p.Events(), entryCh)
|
||||||
|
|
||||||
|
}
|
||||||
|
if svc.Name == "ssh" {
|
||||||
|
log.Info("Starting ssh parser", "service", serviceName)
|
||||||
|
ssh := parser.NewSshdParser()
|
||||||
|
ssh.Parse(p.Events(), entryCh)
|
||||||
|
}
|
||||||
|
if svc.Name == "apache" {
|
||||||
|
log.Info("Starting apache parser", "service", serviceName)
|
||||||
|
ap := parser.NewApacheParser()
|
||||||
|
ap.Parse(p.Events(), entryCh)
|
||||||
|
}
|
||||||
|
|
||||||
|
}(pars, svc.Name)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
<-ctx.Done()
|
||||||
|
log.Info("Shutdown signal received")
|
||||||
|
|
||||||
|
for _, s := range scanners {
|
||||||
|
s.Stop()
|
||||||
|
}
|
||||||
|
},
|
||||||
|
}
|
||||||
179
cmd/banforge/command/fw.go
Normal file
179
cmd/banforge/command/fw.go
Normal file
@@ -0,0 +1,179 @@
|
|||||||
|
package command
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"net"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/blocker"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/config"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/storage"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
ttl_fw string
|
||||||
|
port int
|
||||||
|
protocol string
|
||||||
|
)
|
||||||
|
|
||||||
|
var UnbanCmd = &cobra.Command{
|
||||||
|
Use: "unban",
|
||||||
|
Short: "Unban IP",
|
||||||
|
Run: func(cmd *cobra.Command, args []string) {
|
||||||
|
err := func() error {
|
||||||
|
if len(args) == 0 {
|
||||||
|
return fmt.Errorf("IP can't be empty")
|
||||||
|
}
|
||||||
|
if ttl_fw == "" {
|
||||||
|
ttl_fw = "1y"
|
||||||
|
}
|
||||||
|
ip := args[0]
|
||||||
|
db, err := storage.NewBanWriter()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
cfg, err := config.LoadConfig()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
fw := cfg.Firewall.Name
|
||||||
|
b := blocker.GetBlocker(fw, cfg.Firewall.Config)
|
||||||
|
if ip == "" {
|
||||||
|
return fmt.Errorf("IP can't be empty")
|
||||||
|
}
|
||||||
|
if net.ParseIP(ip) == nil {
|
||||||
|
return fmt.Errorf("invalid IP")
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
err = b.Unban(ip)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
err = db.RemoveBan(ip)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
fmt.Println("IP unblocked successfully!")
|
||||||
|
return nil
|
||||||
|
}()
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
var BanCmd = &cobra.Command{
|
||||||
|
Use: "ban",
|
||||||
|
Short: "Ban IP",
|
||||||
|
Run: func(cmd *cobra.Command, args []string) {
|
||||||
|
err := func() error {
|
||||||
|
if len(args) == 0 {
|
||||||
|
return fmt.Errorf("IP can't be empty")
|
||||||
|
}
|
||||||
|
if ttl_fw == "" {
|
||||||
|
ttl_fw = "1y"
|
||||||
|
}
|
||||||
|
ip := args[0]
|
||||||
|
db, err := storage.NewBanWriter()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
cfg, err := config.LoadConfig()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
fw := cfg.Firewall.Name
|
||||||
|
b := blocker.GetBlocker(fw, cfg.Firewall.Config)
|
||||||
|
if ip == "" {
|
||||||
|
return fmt.Errorf("IP can't be empty")
|
||||||
|
}
|
||||||
|
if net.ParseIP(ip) == nil {
|
||||||
|
return fmt.Errorf("invalid IP")
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
err = b.Ban(ip)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
err = db.AddBan(ip, ttl_fw, "manual ban")
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
fmt.Println("IP blocked successfully!")
|
||||||
|
return nil
|
||||||
|
}()
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
var PortCmd = &cobra.Command{
|
||||||
|
Use: "port",
|
||||||
|
Short: "Ports commands",
|
||||||
|
}
|
||||||
|
|
||||||
|
var PortOpenCmd = &cobra.Command{
|
||||||
|
Use: "open",
|
||||||
|
Short: "Open ports on firewall",
|
||||||
|
Run: func(cmd *cobra.Command, args []string) {
|
||||||
|
if protocol == "" {
|
||||||
|
fmt.Println("Protocol can't be empty")
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
cfg, err := config.LoadConfig()
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
fw := cfg.Firewall.Name
|
||||||
|
b := blocker.GetBlocker(fw, cfg.Firewall.Config)
|
||||||
|
err = b.PortOpen(port, protocol)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
fmt.Println("Port opened successfully!")
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
var PortCloseCmd = &cobra.Command{
|
||||||
|
Use: "close",
|
||||||
|
Short: "Close ports on firewall",
|
||||||
|
Run: func(cmd *cobra.Command, args []string) {
|
||||||
|
if protocol == "" {
|
||||||
|
fmt.Println("Protocol can't be empty")
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
cfg, err := config.LoadConfig()
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
fw := cfg.Firewall.Name
|
||||||
|
b := blocker.GetBlocker(fw, cfg.Firewall.Config)
|
||||||
|
err = b.PortClose(port, protocol)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
fmt.Println("Port closed successfully!")
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
func FwRegister() {
|
||||||
|
BanCmd.Flags().StringVarP(&ttl_fw, "ttl", "t", "", "ban time")
|
||||||
|
PortCmd.AddCommand(PortOpenCmd)
|
||||||
|
PortCmd.AddCommand(PortCloseCmd)
|
||||||
|
PortOpenCmd.Flags().IntVarP(&port, "port", "p", 0, "port number")
|
||||||
|
PortOpenCmd.Flags().StringVarP(&protocol, "protocol", "c", "", "protocol")
|
||||||
|
PortCloseCmd.Flags().IntVarP(&port, "port", "p", 0, "port number")
|
||||||
|
PortCloseCmd.Flags().StringVarP(&protocol, "protocol", "c", "", "protocol")
|
||||||
|
}
|
||||||
52
cmd/banforge/command/init.go
Normal file
52
cmd/banforge/command/init.go
Normal file
@@ -0,0 +1,52 @@
|
|||||||
|
package command
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/blocker"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/config"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/storage"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
var InitCmd = &cobra.Command{
|
||||||
|
Use: "init",
|
||||||
|
Short: "Initialize BanForge",
|
||||||
|
Run: func(cmd *cobra.Command, args []string) {
|
||||||
|
fmt.Println("Initializing BanForge...")
|
||||||
|
|
||||||
|
err := config.CreateConf()
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = config.FindFirewall()
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
cfg, err := config.LoadConfig()
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
b := blocker.GetBlocker(cfg.Firewall.Name, cfg.Firewall.Config)
|
||||||
|
err = b.Setup(cfg.Firewall.Config)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
fmt.Println("Firewall configured")
|
||||||
|
|
||||||
|
err = storage.CreateTables()
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
fmt.Println("Firewall detected and configured")
|
||||||
|
|
||||||
|
fmt.Println("BanForge initialized successfully!")
|
||||||
|
},
|
||||||
|
}
|
||||||
27
cmd/banforge/command/list.go
Normal file
27
cmd/banforge/command/list.go
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
package command
|
||||||
|
|
||||||
|
import (
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/storage"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
var BanListCmd = &cobra.Command{
|
||||||
|
Use: "list",
|
||||||
|
Short: "List banned IP adresses",
|
||||||
|
Run: func(cmd *cobra.Command, args []string) {
|
||||||
|
var log = logger.New(false)
|
||||||
|
d, err := storage.NewBanReader()
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Failed to create database", "error", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
err = d.BanList()
|
||||||
|
if err != nil {
|
||||||
|
log.Error("Failed to get ban list", "error", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
},
|
||||||
|
}
|
||||||
157
cmd/banforge/command/rule.go
Normal file
157
cmd/banforge/command/rule.go
Normal file
@@ -0,0 +1,157 @@
|
|||||||
|
package command
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/config"
|
||||||
|
"github.com/jedib0t/go-pretty/v6/table"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
name string
|
||||||
|
service string
|
||||||
|
path string
|
||||||
|
status string
|
||||||
|
method string
|
||||||
|
ttl string
|
||||||
|
maxRetry int
|
||||||
|
editName string
|
||||||
|
)
|
||||||
|
|
||||||
|
var RuleCmd = &cobra.Command{
|
||||||
|
Use: "rule",
|
||||||
|
Short: "Manage rules",
|
||||||
|
}
|
||||||
|
|
||||||
|
var AddCmd = &cobra.Command{
|
||||||
|
Use: "add",
|
||||||
|
Short: "Add a new rule to /etc/banforge/rules.d/",
|
||||||
|
Long: "Creates a new rule file in /etc/banforge/rules.d/<name>.toml",
|
||||||
|
Run: func(cmd *cobra.Command, args []string) {
|
||||||
|
if name == "" {
|
||||||
|
fmt.Println("Rule name can't be empty (use -n flag)")
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
if service == "" {
|
||||||
|
fmt.Println("Service name can't be empty (use -s flag)")
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
if path == "" && status == "" && method == "" {
|
||||||
|
fmt.Println("At least one rule field must be filled: path, status, or method")
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
if ttl == "" {
|
||||||
|
ttl = "1y"
|
||||||
|
}
|
||||||
|
err := config.NewRule(name, service, path, status, method, ttl, maxRetry)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
fmt.Println("Rule added successfully!")
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
var EditCmd = &cobra.Command{
|
||||||
|
Use: "edit",
|
||||||
|
Short: "Edit an existing rule",
|
||||||
|
Long: "Edit rule fields by name. Only specified fields will be updated.",
|
||||||
|
Run: func(cmd *cobra.Command, args []string) {
|
||||||
|
if editName == "" {
|
||||||
|
fmt.Println("Rule name is required (use -n flag)")
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
if service == "" && path == "" && status == "" && method == "" {
|
||||||
|
fmt.Println("At least one field must be specified to edit: -s, -p, -c, or -m")
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
err := config.EditRule(editName, service, path, status, method)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
fmt.Println("Rule updated successfully!")
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
var RemoveCmd = &cobra.Command{
|
||||||
|
Use: "remove <name>",
|
||||||
|
Short: "Remove a rule by name",
|
||||||
|
Args: cobra.ExactArgs(1),
|
||||||
|
Run: func(cmd *cobra.Command, args []string) {
|
||||||
|
ruleName := args[0]
|
||||||
|
fileName := config.SanitizeRuleFilename(ruleName) + ".toml"
|
||||||
|
filePath := filepath.Join("/etc/banforge/rules.d", fileName)
|
||||||
|
|
||||||
|
if _, err := os.Stat(filePath); os.IsNotExist(err) {
|
||||||
|
fmt.Printf("Rule '%s' not found\n", ruleName)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := os.Remove(filePath); err != nil {
|
||||||
|
fmt.Printf("Failed to remove rule: %v\n", err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
fmt.Printf("Rule '%s' removed successfully\n", ruleName)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
var ListCmd = &cobra.Command{
|
||||||
|
Use: "list",
|
||||||
|
Short: "List all rules",
|
||||||
|
Run: func(cmd *cobra.Command, args []string) {
|
||||||
|
rules, err := config.LoadRuleConfig()
|
||||||
|
if err != nil {
|
||||||
|
fmt.Println(err)
|
||||||
|
os.Exit(1)
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(rules) == 0 {
|
||||||
|
fmt.Println("No rules found")
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
t := table.NewWriter()
|
||||||
|
t.SetOutputMirror(os.Stdout)
|
||||||
|
t.AppendHeader(table.Row{
|
||||||
|
"Name", "Service", "Path", "Status", "Method", "MaxRetry", "BanTime",
|
||||||
|
})
|
||||||
|
|
||||||
|
for _, rule := range rules {
|
||||||
|
t.AppendRow(table.Row{
|
||||||
|
rule.Name,
|
||||||
|
rule.ServiceName,
|
||||||
|
rule.Path,
|
||||||
|
rule.Status,
|
||||||
|
rule.Method,
|
||||||
|
rule.MaxRetry,
|
||||||
|
rule.BanTime,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
t.Render()
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
func RuleRegister() {
|
||||||
|
RuleCmd.AddCommand(AddCmd)
|
||||||
|
RuleCmd.AddCommand(EditCmd)
|
||||||
|
RuleCmd.AddCommand(RemoveCmd)
|
||||||
|
RuleCmd.AddCommand(ListCmd)
|
||||||
|
|
||||||
|
AddCmd.Flags().StringVarP(&name, "name", "n", "", "rule name (required)")
|
||||||
|
AddCmd.Flags().StringVarP(&service, "service", "s", "", "service name (required)")
|
||||||
|
AddCmd.Flags().StringVarP(&path, "path", "p", "", "request path")
|
||||||
|
AddCmd.Flags().StringVarP(&status, "status", "c", "", "status code")
|
||||||
|
AddCmd.Flags().StringVarP(&method, "method", "m", "", "HTTP method")
|
||||||
|
AddCmd.Flags().StringVarP(&ttl, "ttl", "t", "", "ban time (e.g., 1h, 1d, 1y)")
|
||||||
|
AddCmd.Flags().IntVarP(&maxRetry, "max_retry", "r", 0, "max retry before ban")
|
||||||
|
|
||||||
|
EditCmd.Flags().StringVarP(&editName, "name", "n", "", "rule name to edit (required)")
|
||||||
|
EditCmd.Flags().StringVarP(&service, "service", "s", "", "new service name")
|
||||||
|
EditCmd.Flags().StringVarP(&path, "path", "p", "", "new path")
|
||||||
|
EditCmd.Flags().StringVarP(&status, "status", "c", "", "new status code")
|
||||||
|
EditCmd.Flags().StringVarP(&method, "method", "m", "", "new HTTP method")
|
||||||
|
}
|
||||||
17
cmd/banforge/command/version.go
Normal file
17
cmd/banforge/command/version.go
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
package command
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
var version = "0.5.2"
|
||||||
|
|
||||||
|
var VersionCmd = &cobra.Command{
|
||||||
|
Use: "version",
|
||||||
|
Short: "BanForge version",
|
||||||
|
Run: func(cmd *cobra.Command, args []string) {
|
||||||
|
fmt.Println("BanForge version:", version)
|
||||||
|
},
|
||||||
|
}
|
||||||
@@ -3,14 +3,9 @@ package main
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
"time"
|
|
||||||
|
|
||||||
"github.com/d3m0k1d/BanForge/internal/blocker"
|
"github.com/d3m0k1d/BanForge/cmd/banforge/command"
|
||||||
"github.com/d3m0k1d/BanForge/internal/config"
|
|
||||||
"github.com/d3m0k1d/BanForge/internal/judge"
|
|
||||||
"github.com/d3m0k1d/BanForge/internal/logger"
|
|
||||||
"github.com/d3m0k1d/BanForge/internal/parser"
|
|
||||||
"github.com/d3m0k1d/BanForge/internal/storage"
|
|
||||||
"github.com/spf13/cobra"
|
"github.com/spf13/cobra"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -18,178 +13,6 @@ var rootCmd = &cobra.Command{
|
|||||||
Use: "banforge",
|
Use: "banforge",
|
||||||
Short: "IPS log-based written on Golang",
|
Short: "IPS log-based written on Golang",
|
||||||
Run: func(cmd *cobra.Command, args []string) {
|
Run: func(cmd *cobra.Command, args []string) {
|
||||||
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
var initCmd = &cobra.Command{
|
|
||||||
Use: "init",
|
|
||||||
Short: "Initialize BanForge",
|
|
||||||
Run: func(cmd *cobra.Command, args []string) {
|
|
||||||
fmt.Println("Initializing BanForge...")
|
|
||||||
|
|
||||||
if _, err := os.Stat("/var/log/banforge"); err == nil {
|
|
||||||
fmt.Println("/var/log/banforge already exists, skipping...")
|
|
||||||
} else if os.IsNotExist(err) {
|
|
||||||
err := os.Mkdir("/var/log/banforge", 0750)
|
|
||||||
if err != nil {
|
|
||||||
fmt.Println(err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
fmt.Println("Created /var/log/banforge")
|
|
||||||
} else {
|
|
||||||
fmt.Println(err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
if _, err := os.Stat("/var/lib/banforge"); err == nil {
|
|
||||||
fmt.Println("/var/lib/banforge already exists, skipping...")
|
|
||||||
} else if os.IsNotExist(err) {
|
|
||||||
err := os.Mkdir("/var/lib/banforge", 0750)
|
|
||||||
if err != nil {
|
|
||||||
fmt.Println(err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
fmt.Println("Created /var/lib/banforge")
|
|
||||||
} else {
|
|
||||||
fmt.Println(err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
|
|
||||||
if _, err := os.Stat("/etc/banforge"); err == nil {
|
|
||||||
fmt.Println("/etc/banforge already exists, skipping...")
|
|
||||||
} else if os.IsNotExist(err) {
|
|
||||||
err := os.Mkdir("/etc/banforge", 0750)
|
|
||||||
if err != nil {
|
|
||||||
fmt.Println(err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
fmt.Println("Created /etc/banforge")
|
|
||||||
} else {
|
|
||||||
fmt.Println(err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
|
|
||||||
err := config.CreateConf()
|
|
||||||
if err != nil {
|
|
||||||
fmt.Println(err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
fmt.Println("Config created")
|
|
||||||
|
|
||||||
err = config.FindFirewall()
|
|
||||||
if err != nil {
|
|
||||||
fmt.Println(err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
db, err := storage.NewDB()
|
|
||||||
if err != nil {
|
|
||||||
fmt.Println(err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
err = db.CreateTable()
|
|
||||||
if err != nil {
|
|
||||||
fmt.Println(err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
defer func() {
|
|
||||||
err = db.Close()
|
|
||||||
if err != nil {
|
|
||||||
fmt.Println(err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
fmt.Println("Firewall detected and configured")
|
|
||||||
|
|
||||||
fmt.Println("BanForge initialized successfully!")
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
var daemonCmd = &cobra.Command{
|
|
||||||
Use: "daemon",
|
|
||||||
Short: "Run BanForge daemon process",
|
|
||||||
Run: func(cmd *cobra.Command, args []string) {
|
|
||||||
log := logger.New(false)
|
|
||||||
log.Info("Starting BanForge daemon")
|
|
||||||
db, err := storage.NewDB()
|
|
||||||
if err != nil {
|
|
||||||
log.Error("Failed to create database", "error", err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
defer func() {
|
|
||||||
err = db.Close()
|
|
||||||
if err != nil {
|
|
||||||
log.Error("Failed to close database connection", "error", err)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
cfg, err := config.LoadConfig()
|
|
||||||
if err != nil {
|
|
||||||
log.Error("Failed to load config", "error", err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
var b blocker.BlockerEngine
|
|
||||||
fw := cfg.Firewall.Name
|
|
||||||
switch fw {
|
|
||||||
case "ufw":
|
|
||||||
b = blocker.NewUfw(log)
|
|
||||||
case "iptables":
|
|
||||||
b = blocker.NewIptables(log, cfg.Firewall.Config)
|
|
||||||
case "nftables":
|
|
||||||
b = blocker.NewNftables(log, cfg.Firewall.Config)
|
|
||||||
case "firewalld":
|
|
||||||
b = blocker.NewFirewalld(log)
|
|
||||||
default:
|
|
||||||
log.Error("Unknown firewall", "firewall", fw)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
r, err := config.LoadRuleConfig()
|
|
||||||
if err != nil {
|
|
||||||
log.Error("Failed to load rules", "error", err)
|
|
||||||
os.Exit(1)
|
|
||||||
}
|
|
||||||
j := judge.New(db, b)
|
|
||||||
j.LoadRules(r)
|
|
||||||
go func() {
|
|
||||||
ticker := time.NewTicker(5 * time.Second)
|
|
||||||
defer ticker.Stop()
|
|
||||||
for range ticker.C {
|
|
||||||
if err := j.ProcessUnviewed(); err != nil {
|
|
||||||
log.Error("Failed to process unviewed", "error", err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
for _, svc := range cfg.Service {
|
|
||||||
log.Info("Processing service", "name", svc.Name, "enabled", svc.Enabled, "path", svc.LogPath)
|
|
||||||
|
|
||||||
if !svc.Enabled {
|
|
||||||
log.Info("Service disabled, skipping", "name", svc.Name)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
if svc.Name != "nginx" {
|
|
||||||
log.Info("Only nginx supported, skipping", "name", svc.Name)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
log.Info("Starting parser for service", "name", svc.Name, "path", svc.LogPath)
|
|
||||||
|
|
||||||
pars, err := parser.NewScanner(svc.LogPath)
|
|
||||||
if err != nil {
|
|
||||||
log.Error("Failed to create scanner", "service", svc.Name, "error", err)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
go pars.Start()
|
|
||||||
go func(p *parser.Scanner, serviceName string) {
|
|
||||||
log.Info("Starting nginx parser", "service", serviceName)
|
|
||||||
ng := parser.NewNginxParser()
|
|
||||||
resultCh := make(chan *storage.LogEntry, 100)
|
|
||||||
ng.Parse(p.Events(), resultCh)
|
|
||||||
go storage.Write(db, resultCh)
|
|
||||||
}(pars, svc.Name)
|
|
||||||
}
|
|
||||||
|
|
||||||
select {}
|
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -198,8 +21,16 @@ func Init() {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func Execute() {
|
func Execute() {
|
||||||
rootCmd.AddCommand(daemonCmd)
|
rootCmd.AddCommand(command.DaemonCmd)
|
||||||
rootCmd.AddCommand(initCmd)
|
rootCmd.AddCommand(command.InitCmd)
|
||||||
|
rootCmd.AddCommand(command.RuleCmd)
|
||||||
|
rootCmd.AddCommand(command.BanCmd)
|
||||||
|
rootCmd.AddCommand(command.UnbanCmd)
|
||||||
|
rootCmd.AddCommand(command.BanListCmd)
|
||||||
|
rootCmd.AddCommand(command.VersionCmd)
|
||||||
|
rootCmd.AddCommand(command.PortCmd)
|
||||||
|
command.RuleRegister()
|
||||||
|
command.FwRegister()
|
||||||
if err := rootCmd.Execute(); err != nil {
|
if err := rootCmd.Execute(); err != nil {
|
||||||
fmt.Println(err)
|
fmt.Println(err)
|
||||||
os.Exit(1)
|
os.Exit(1)
|
||||||
|
|||||||
226
docs/cli.md
Normal file
226
docs/cli.md
Normal file
@@ -0,0 +1,226 @@
|
|||||||
|
# CLI commands BanForge
|
||||||
|
|
||||||
|
BanForge provides a command-line interface (CLI) to manage IP blocking,
|
||||||
|
configure detection rules, and control the daemon process.
|
||||||
|
|
||||||
|
## Commands
|
||||||
|
|
||||||
|
### init - Create configuration files
|
||||||
|
|
||||||
|
```shell
|
||||||
|
banforge init
|
||||||
|
```
|
||||||
|
|
||||||
|
**Description**
|
||||||
|
This command creates the necessary directories and base configuration files
|
||||||
|
required for the daemon to operate:
|
||||||
|
- `/etc/banforge/config.toml` — main configuration
|
||||||
|
- `/etc/banforge/rules.toml` — default rules file
|
||||||
|
- `/etc/banforge/rules.d/` — directory for individual rule files
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### version - Display BanForge version
|
||||||
|
|
||||||
|
```shell
|
||||||
|
banforge version
|
||||||
|
```
|
||||||
|
|
||||||
|
**Description**
|
||||||
|
This command displays the current version of the BanForge software.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### daemon - Starts the BanForge daemon process
|
||||||
|
|
||||||
|
```shell
|
||||||
|
banforge daemon
|
||||||
|
```
|
||||||
|
|
||||||
|
**Description**
|
||||||
|
This command starts the BanForge daemon process in the background.
|
||||||
|
The daemon continuously monitors incoming requests, detects anomalies,
|
||||||
|
and applies firewall rules in real-time.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### firewall - Manages firewall rules
|
||||||
|
|
||||||
|
```shell
|
||||||
|
banforge ban <ip>
|
||||||
|
banforge unban <ip>
|
||||||
|
```
|
||||||
|
|
||||||
|
**Description**
|
||||||
|
These commands provide an abstraction over your firewall. If you want to simplify the interface to your firewall, you can use these commands.
|
||||||
|
|
||||||
|
| Flag | Description |
|
||||||
|
| ----------- | ------------------------------ |
|
||||||
|
| `-t`, `-ttl` | Ban duration (default: 1 year) |
|
||||||
|
|
||||||
|
**Examples:**
|
||||||
|
```bash
|
||||||
|
# Ban IP for 1 hour
|
||||||
|
banforge ban 192.168.1.100 -t 1h
|
||||||
|
|
||||||
|
# Unban IP
|
||||||
|
banforge unban 192.168.1.100
|
||||||
|
```
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### ports - Open and close ports on firewall
|
||||||
|
|
||||||
|
```shell
|
||||||
|
banforge open -port <port> -protocol <protocol>
|
||||||
|
banforge close -port <port> -protocol <protocol>
|
||||||
|
```
|
||||||
|
|
||||||
|
**Description**
|
||||||
|
These commands provide an abstraction over your firewall. If you want to simplify the interface to your firewall, you can use these commands.
|
||||||
|
|
||||||
|
| Flag | Required | Description |
|
||||||
|
| ------------- | -------- | ------------------------ |
|
||||||
|
| `-port` | + | Port number (e.g., 80) |
|
||||||
|
| `-protocol` | + | Protocol (tcp/udp) |
|
||||||
|
|
||||||
|
**Examples:**
|
||||||
|
```bash
|
||||||
|
# Open port 80 for TCP
|
||||||
|
banforge open -port 80 -protocol tcp
|
||||||
|
|
||||||
|
# Close port 443
|
||||||
|
banforge close -port 443 -protocol tcp
|
||||||
|
```
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### list - List blocked IP addresses
|
||||||
|
|
||||||
|
```shell
|
||||||
|
banforge list
|
||||||
|
```
|
||||||
|
|
||||||
|
**Description**
|
||||||
|
This command outputs a table of IP addresses that are currently blocked.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
### rule - Manage detection rules
|
||||||
|
|
||||||
|
Rules are stored in `/etc/banforge/rules.d/` as individual `.toml` files.
|
||||||
|
|
||||||
|
#### Add a new rule
|
||||||
|
|
||||||
|
```shell
|
||||||
|
banforge rule add -n <name> -s <service> [options]
|
||||||
|
```
|
||||||
|
|
||||||
|
**Flags:**
|
||||||
|
|
||||||
|
| Flag | Required | Description |
|
||||||
|
| ------------------- | -------- | ---------------------------------------- |
|
||||||
|
| `-n`, `--name` | + | Rule name (used as filename) |
|
||||||
|
| `-s`, `--service` | + | Service name (nginx, apache, ssh, etc.) |
|
||||||
|
| `-p`, `--path` | - | Request path to match |
|
||||||
|
| `-m`, `--method` | - | HTTP method (GET, POST, etc.) |
|
||||||
|
| `-c`, `--status` | - | HTTP status code (403, 404, etc.) |
|
||||||
|
| `-t`, `--ttl` | - | Ban duration (default: 1y) |
|
||||||
|
| `-r`, `--max_retry` | - | Max retries before ban (default: 0) |
|
||||||
|
|
||||||
|
**Note:** At least one of `-p`, `-m`, or `-c` must be specified.
|
||||||
|
|
||||||
|
**Examples:**
|
||||||
|
```bash
|
||||||
|
# Ban on 403 status
|
||||||
|
banforge rule add -n "Forbidden" -s nginx -c 403 -t 30m
|
||||||
|
|
||||||
|
# Ban on path pattern
|
||||||
|
banforge rule add -n "Admin Access" -s nginx -p "/admin/*" -t 2h -r 3
|
||||||
|
|
||||||
|
# SSH brute force protection
|
||||||
|
banforge rule add -n "SSH Bruteforce" -s ssh -c "Failed" -t 1h -r 5
|
||||||
|
```
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
#### List all rules
|
||||||
|
|
||||||
|
```shell
|
||||||
|
banforge rule list
|
||||||
|
```
|
||||||
|
|
||||||
|
**Description**
|
||||||
|
Displays all configured rules in a table format.
|
||||||
|
|
||||||
|
**Example output:**
|
||||||
|
```
|
||||||
|
+------------------+---------+--------+--------+--------+----------+---------+
|
||||||
|
| NAME | SERVICE | PATH | STATUS | METHOD | MAXRETRY | BANTIME |
|
||||||
|
+------------------+---------+--------+--------+--------+----------+---------+
|
||||||
|
| SSH Bruteforce | ssh | | Failed | | 5 | 1h |
|
||||||
|
| Nginx 404 | nginx | | 404 | | 3 | 30m |
|
||||||
|
| Admin Panel | nginx | /admin | | | 2 | 2h |
|
||||||
|
+------------------+---------+--------+--------+--------+----------+---------+
|
||||||
|
```
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
#### Edit an existing rule
|
||||||
|
|
||||||
|
```shell
|
||||||
|
banforge rule edit -n <name> [options]
|
||||||
|
```
|
||||||
|
|
||||||
|
**Description**
|
||||||
|
Edit fields of an existing rule. Only specified fields will be updated.
|
||||||
|
|
||||||
|
| Flag | Required | Description |
|
||||||
|
| ------------------- | -------- | ------------------------------- |
|
||||||
|
| `-n`, `--name` | + | Rule name to edit |
|
||||||
|
| `-s`, `--service` | - | New service name |
|
||||||
|
| `-p`, `--path` | - | New path |
|
||||||
|
| `-m`, `--method` | - | New method |
|
||||||
|
| `-c`, `--status` | - | New status code |
|
||||||
|
|
||||||
|
**Examples:**
|
||||||
|
```bash
|
||||||
|
# Update ban time for existing rule
|
||||||
|
banforge rule edit -n "SSH Bruteforce" -t 2h
|
||||||
|
|
||||||
|
# Change status code
|
||||||
|
banforge rule edit -n "Forbidden" -c 403
|
||||||
|
```
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
#### Remove a rule
|
||||||
|
|
||||||
|
```shell
|
||||||
|
banforge rule remove <name>
|
||||||
|
```
|
||||||
|
|
||||||
|
**Description**
|
||||||
|
Permanently delete a rule by name.
|
||||||
|
|
||||||
|
**Example:**
|
||||||
|
```bash
|
||||||
|
banforge rule remove "Old Rule"
|
||||||
|
```
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
## Ban time format
|
||||||
|
|
||||||
|
Use the following suffixes for ban duration:
|
||||||
|
|
||||||
|
| Suffix | Duration |
|
||||||
|
| ------ | -------- |
|
||||||
|
| `s` | Seconds |
|
||||||
|
| `m` | Minutes |
|
||||||
|
| `h` | Hours |
|
||||||
|
| `d` | Days |
|
||||||
|
| `M` | Months (30 days) |
|
||||||
|
| `y` | Years (365 days) |
|
||||||
|
|
||||||
|
**Examples:** `30s`, `5m`, `2h`, `1d`, `1M`, `1y`
|
||||||
51
docs/config.md
Normal file
51
docs/config.md
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
# Configs
|
||||||
|
|
||||||
|
## config.toml
|
||||||
|
Main configuration file for BanForge.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
```toml
|
||||||
|
[firewall]
|
||||||
|
name = "nftables"
|
||||||
|
config = "/etc/nftables.conf"
|
||||||
|
|
||||||
|
[[service]]
|
||||||
|
name = "nginx"
|
||||||
|
logging = "file"
|
||||||
|
log_path = "/home/d3m0k1d/test.log"
|
||||||
|
enabled = true
|
||||||
|
|
||||||
|
[[service]]
|
||||||
|
name = "nginx"
|
||||||
|
logging = "journald"
|
||||||
|
log_path = "nginx"
|
||||||
|
enabled = false
|
||||||
|
```
|
||||||
|
**Description**
|
||||||
|
The [firewall] section defines firewall parameters. The banforge init command automatically detects your installed firewall (nftables, iptables, ufw, firewalld). For firewalls that require a configuration file, specify the path in the config parameter.
|
||||||
|
|
||||||
|
The [[service]] section is configured manually. Currently, only nginx is supported. To add a service, create a [[service]] block and specify the log_path to the nginx log file you want to monitor.
|
||||||
|
logging require in format "file" or "journald"
|
||||||
|
if you use journald logging, log_path require in format "service_name"
|
||||||
|
|
||||||
|
## rules.toml
|
||||||
|
Rules configuration file for BanForge.
|
||||||
|
|
||||||
|
If you wanna configure rules by cli command see [here](https://github.com/d3m0k1d/BanForge/blob/main/docs/cli.md)
|
||||||
|
|
||||||
|
Example:
|
||||||
|
```toml
|
||||||
|
[[rule]]
|
||||||
|
name = "304 http"
|
||||||
|
service = "nginx"
|
||||||
|
path = ""
|
||||||
|
status = "304"
|
||||||
|
max_retry = 3
|
||||||
|
method = ""
|
||||||
|
ban_time = "1m"
|
||||||
|
```
|
||||||
|
**Description**
|
||||||
|
The [[rule]] section require name and one of the following parameters: service, path, status, method. To add a rule, create a [[rule]] block and specify the parameters.
|
||||||
|
ban_time require in format "1m", "1h", "1d", "1M", "1y".
|
||||||
|
If you want to ban all requests to PHP files (e.g., path = "*.php") or requests to the admin panel (e.g., path = "/admin/*").
|
||||||
|
If max_retry = 0 ban on first request.
|
||||||
17
go.mod
17
go.mod
@@ -4,11 +4,26 @@ go 1.25.5
|
|||||||
|
|
||||||
require (
|
require (
|
||||||
github.com/BurntSushi/toml v1.6.0
|
github.com/BurntSushi/toml v1.6.0
|
||||||
github.com/mattn/go-sqlite3 v1.14.33
|
github.com/jedib0t/go-pretty/v6 v6.7.8
|
||||||
github.com/spf13/cobra v1.10.2
|
github.com/spf13/cobra v1.10.2
|
||||||
|
gopkg.in/natefinch/lumberjack.v2 v2.2.1
|
||||||
|
modernc.org/sqlite v1.46.1
|
||||||
)
|
)
|
||||||
|
|
||||||
require (
|
require (
|
||||||
|
github.com/clipperhouse/uax29/v2 v2.7.0 // indirect
|
||||||
|
github.com/dustin/go-humanize v1.0.1 // indirect
|
||||||
|
github.com/google/uuid v1.6.0 // indirect
|
||||||
github.com/inconshreveable/mousetrap v1.1.0 // indirect
|
github.com/inconshreveable/mousetrap v1.1.0 // indirect
|
||||||
|
github.com/mattn/go-isatty v0.0.20 // indirect
|
||||||
|
github.com/mattn/go-runewidth v0.0.20 // indirect
|
||||||
|
github.com/ncruces/go-strftime v1.0.0 // indirect
|
||||||
|
github.com/remyoudompheng/bigfft v0.0.0-20230129092748-24d4a6f8daec // indirect
|
||||||
github.com/spf13/pflag v1.0.10 // indirect
|
github.com/spf13/pflag v1.0.10 // indirect
|
||||||
|
golang.org/x/exp v0.0.0-20260218203240-3dfff04db8fa // indirect
|
||||||
|
golang.org/x/sys v0.41.0 // indirect
|
||||||
|
golang.org/x/text v0.34.0 // indirect
|
||||||
|
modernc.org/libc v1.68.0 // indirect
|
||||||
|
modernc.org/mathutil v1.7.1 // indirect
|
||||||
|
modernc.org/memory v1.11.0 // indirect
|
||||||
)
|
)
|
||||||
|
|||||||
73
go.sum
73
go.sum
@@ -1,15 +1,84 @@
|
|||||||
github.com/BurntSushi/toml v1.6.0 h1:dRaEfpa2VI55EwlIW72hMRHdWouJeRF7TPYhI+AUQjk=
|
github.com/BurntSushi/toml v1.6.0 h1:dRaEfpa2VI55EwlIW72hMRHdWouJeRF7TPYhI+AUQjk=
|
||||||
github.com/BurntSushi/toml v1.6.0/go.mod h1:ukJfTF/6rtPPRCnwkur4qwRxa8vTRFBF0uk2lLoLwho=
|
github.com/BurntSushi/toml v1.6.0/go.mod h1:ukJfTF/6rtPPRCnwkur4qwRxa8vTRFBF0uk2lLoLwho=
|
||||||
|
github.com/clipperhouse/uax29/v2 v2.7.0 h1:+gs4oBZ2gPfVrKPthwbMzWZDaAFPGYK72F0NJv2v7Vk=
|
||||||
|
github.com/clipperhouse/uax29/v2 v2.7.0/go.mod h1:EFJ2TJMRUaplDxHKj1qAEhCtQPW2tJSwu5BF98AuoVM=
|
||||||
github.com/cpuguy83/go-md2man/v2 v2.0.6/go.mod h1:oOW0eioCTA6cOiMLiUPZOpcVxMig6NIQQ7OS05n1F4g=
|
github.com/cpuguy83/go-md2man/v2 v2.0.6/go.mod h1:oOW0eioCTA6cOiMLiUPZOpcVxMig6NIQQ7OS05n1F4g=
|
||||||
|
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
|
||||||
|
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
|
||||||
|
github.com/dustin/go-humanize v1.0.1 h1:GzkhY7T5VNhEkwH0PVJgjz+fX1rhBrR7pRT3mDkpeCY=
|
||||||
|
github.com/dustin/go-humanize v1.0.1/go.mod h1:Mu1zIs6XwVuF/gI1OepvI0qD18qycQx+mFykh5fBlto=
|
||||||
|
github.com/google/pprof v0.0.0-20250317173921-a4b03ec1a45e h1:ijClszYn+mADRFY17kjQEVQ1XRhq2/JR1M3sGqeJoxs=
|
||||||
|
github.com/google/pprof v0.0.0-20250317173921-a4b03ec1a45e/go.mod h1:boTsfXsheKC2y+lKOCMpSfarhxDeIzfZG1jqGcPl3cA=
|
||||||
|
github.com/google/uuid v1.6.0 h1:NIvaJDMOsjHA8n1jAhLSgzrAzy1Hgr+hNrb57e+94F0=
|
||||||
|
github.com/google/uuid v1.6.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+yHo=
|
||||||
|
github.com/hashicorp/golang-lru/v2 v2.0.7 h1:a+bsQ5rvGLjzHuww6tVxozPZFVghXaHOwFs4luLUK2k=
|
||||||
|
github.com/hashicorp/golang-lru/v2 v2.0.7/go.mod h1:QeFd9opnmA6QUJc5vARoKUSoFhyfM2/ZepoAG6RGpeM=
|
||||||
github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8=
|
github.com/inconshreveable/mousetrap v1.1.0 h1:wN+x4NVGpMsO7ErUn/mUI3vEoE6Jt13X2s0bqwp9tc8=
|
||||||
github.com/inconshreveable/mousetrap v1.1.0/go.mod h1:vpF70FUmC8bwa3OWnCshd2FqLfsEA9PFc4w1p2J65bw=
|
github.com/inconshreveable/mousetrap v1.1.0/go.mod h1:vpF70FUmC8bwa3OWnCshd2FqLfsEA9PFc4w1p2J65bw=
|
||||||
github.com/mattn/go-sqlite3 v1.14.33 h1:A5blZ5ulQo2AtayQ9/limgHEkFreKj1Dv226a1K73s0=
|
github.com/jedib0t/go-pretty/v6 v6.7.8 h1:BVYrDy5DPBA3Qn9ICT+PokP9cvCv1KaHv2i+Hc8sr5o=
|
||||||
github.com/mattn/go-sqlite3 v1.14.33/go.mod h1:Uh1q+B4BYcTPb+yiD3kU8Ct7aC0hY9fxUwlHK0RXw+Y=
|
github.com/jedib0t/go-pretty/v6 v6.7.8/go.mod h1:YwC5CE4fJ1HFUDeivSV1r//AmANFHyqczZk+U6BDALU=
|
||||||
|
github.com/mattn/go-isatty v0.0.20 h1:xfD0iDuEKnDkl03q4limB+vH+GxLEtL/jb4xVJSWWEY=
|
||||||
|
github.com/mattn/go-isatty v0.0.20/go.mod h1:W+V8PltTTMOvKvAeJH7IuucS94S2C6jfK/D7dTCTo3Y=
|
||||||
|
github.com/mattn/go-runewidth v0.0.20 h1:WcT52H91ZUAwy8+HUkdM3THM6gXqXuLJi9O3rjcQQaQ=
|
||||||
|
github.com/mattn/go-runewidth v0.0.20/go.mod h1:XBkDxAl56ILZc9knddidhrOlY5R/pDhgLpndooCuJAs=
|
||||||
|
github.com/ncruces/go-strftime v1.0.0 h1:HMFp8mLCTPp341M/ZnA4qaf7ZlsbTc+miZjCLOFAw7w=
|
||||||
|
github.com/ncruces/go-strftime v1.0.0/go.mod h1:Fwc5htZGVVkseilnfgOVb9mKy6w1naJmn9CehxcKcls=
|
||||||
|
github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM=
|
||||||
|
github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4=
|
||||||
|
github.com/remyoudompheng/bigfft v0.0.0-20230129092748-24d4a6f8daec h1:W09IVJc94icq4NjY3clb7Lk8O1qJ8BdBEF8z0ibU0rE=
|
||||||
|
github.com/remyoudompheng/bigfft v0.0.0-20230129092748-24d4a6f8daec/go.mod h1:qqbHyh8v60DhA7CoWK5oRCqLrMHRGoxYCSS9EjAz6Eo=
|
||||||
github.com/russross/blackfriday/v2 v2.1.0/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM=
|
github.com/russross/blackfriday/v2 v2.1.0/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM=
|
||||||
github.com/spf13/cobra v1.10.2 h1:DMTTonx5m65Ic0GOoRY2c16WCbHxOOw6xxezuLaBpcU=
|
github.com/spf13/cobra v1.10.2 h1:DMTTonx5m65Ic0GOoRY2c16WCbHxOOw6xxezuLaBpcU=
|
||||||
github.com/spf13/cobra v1.10.2/go.mod h1:7C1pvHqHw5A4vrJfjNwvOdzYu0Gml16OCs2GRiTUUS4=
|
github.com/spf13/cobra v1.10.2/go.mod h1:7C1pvHqHw5A4vrJfjNwvOdzYu0Gml16OCs2GRiTUUS4=
|
||||||
github.com/spf13/pflag v1.0.9/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
|
github.com/spf13/pflag v1.0.9/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
|
||||||
github.com/spf13/pflag v1.0.10 h1:4EBh2KAYBwaONj6b2Ye1GiHfwjqyROoF4RwYO+vPwFk=
|
github.com/spf13/pflag v1.0.10 h1:4EBh2KAYBwaONj6b2Ye1GiHfwjqyROoF4RwYO+vPwFk=
|
||||||
github.com/spf13/pflag v1.0.10/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
|
github.com/spf13/pflag v1.0.10/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
|
||||||
|
github.com/stretchr/testify v1.10.0 h1:Xv5erBjTwe/5IxqUQTdXv5kgmIvbHo3QQyRwhJsOfJA=
|
||||||
|
github.com/stretchr/testify v1.10.0/go.mod h1:r2ic/lqez/lEtzL7wO/rwa5dbSLXVDPFyf8C91i36aY=
|
||||||
go.yaml.in/yaml/v3 v3.0.4/go.mod h1:DhzuOOF2ATzADvBadXxruRBLzYTpT36CKvDb3+aBEFg=
|
go.yaml.in/yaml/v3 v3.0.4/go.mod h1:DhzuOOF2ATzADvBadXxruRBLzYTpT36CKvDb3+aBEFg=
|
||||||
|
golang.org/x/exp v0.0.0-20260218203240-3dfff04db8fa h1:Zt3DZoOFFYkKhDT3v7Lm9FDMEV06GpzjG2jrqW+QTE0=
|
||||||
|
golang.org/x/exp v0.0.0-20260218203240-3dfff04db8fa/go.mod h1:K79w1Vqn7PoiZn+TkNpx3BUWUQksGO3JcVX6qIjytmA=
|
||||||
|
golang.org/x/mod v0.33.0 h1:tHFzIWbBifEmbwtGz65eaWyGiGZatSrT9prnU8DbVL8=
|
||||||
|
golang.org/x/mod v0.33.0/go.mod h1:swjeQEj+6r7fODbD2cqrnje9PnziFuw4bmLbBZFrQ5w=
|
||||||
|
golang.org/x/sync v0.19.0 h1:vV+1eWNmZ5geRlYjzm2adRgW2/mcpevXNg50YZtPCE4=
|
||||||
|
golang.org/x/sync v0.19.0/go.mod h1:9KTHXmSnoGruLpwFjVSX0lNNA75CykiMECbovNTZqGI=
|
||||||
|
golang.org/x/sys v0.6.0/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg=
|
||||||
|
golang.org/x/sys v0.41.0 h1:Ivj+2Cp/ylzLiEU89QhWblYnOE9zerudt9Ftecq2C6k=
|
||||||
|
golang.org/x/sys v0.41.0/go.mod h1:OgkHotnGiDImocRcuBABYBEXf8A9a87e/uXjp9XT3ks=
|
||||||
|
golang.org/x/text v0.34.0 h1:oL/Qq0Kdaqxa1KbNeMKwQq0reLCCaFtqu2eNuSeNHbk=
|
||||||
|
golang.org/x/text v0.34.0/go.mod h1:homfLqTYRFyVYemLBFl5GgL/DWEiH5wcsQ5gSh1yziA=
|
||||||
|
golang.org/x/tools v0.42.0 h1:uNgphsn75Tdz5Ji2q36v/nsFSfR/9BRFvqhGBaJGd5k=
|
||||||
|
golang.org/x/tools v0.42.0/go.mod h1:Ma6lCIwGZvHK6XtgbswSoWroEkhugApmsXyrUmBhfr0=
|
||||||
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0=
|
||||||
|
gopkg.in/natefinch/lumberjack.v2 v2.2.1 h1:bBRl1b0OH9s/DuPhuXpNl+VtCaJXFZ5/uEFST95x9zc=
|
||||||
|
gopkg.in/natefinch/lumberjack.v2 v2.2.1/go.mod h1:YD8tP3GAjkrDg1eZH7EGmyESg/lsYskCTPBJVb9jqSc=
|
||||||
|
gopkg.in/yaml.v3 v3.0.1 h1:fxVm/GzAzEWqLHuvctI91KS9hhNmmWOoWu0XTYJS7CA=
|
||||||
|
gopkg.in/yaml.v3 v3.0.1/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM=
|
||||||
|
modernc.org/cc/v4 v4.27.1 h1:9W30zRlYrefrDV2JE2O8VDtJ1yPGownxciz5rrbQZis=
|
||||||
|
modernc.org/cc/v4 v4.27.1/go.mod h1:uVtb5OGqUKpoLWhqwNQo/8LwvoiEBLvZXIQ/SmO6mL0=
|
||||||
|
modernc.org/ccgo/v4 v4.30.2 h1:4yPaaq9dXYXZ2V8s1UgrC3KIj580l2N4ClrLwnbv2so=
|
||||||
|
modernc.org/ccgo/v4 v4.30.2/go.mod h1:yZMnhWEdW0qw3EtCndG1+ldRrVGS+bIwyWmAWzS0XEw=
|
||||||
|
modernc.org/fileutil v1.3.40 h1:ZGMswMNc9JOCrcrakF1HrvmergNLAmxOPjizirpfqBA=
|
||||||
|
modernc.org/fileutil v1.3.40/go.mod h1:HxmghZSZVAz/LXcMNwZPA/DRrQZEVP9VX0V4LQGQFOc=
|
||||||
|
modernc.org/gc/v2 v2.6.5 h1:nyqdV8q46KvTpZlsw66kWqwXRHdjIlJOhG6kxiV/9xI=
|
||||||
|
modernc.org/gc/v2 v2.6.5/go.mod h1:YgIahr1ypgfe7chRuJi2gD7DBQiKSLMPgBQe9oIiito=
|
||||||
|
modernc.org/gc/v3 v3.1.2 h1:ZtDCnhonXSZexk/AYsegNRV1lJGgaNZJuKjJSWKyEqo=
|
||||||
|
modernc.org/gc/v3 v3.1.2/go.mod h1:HFK/6AGESC7Ex+EZJhJ2Gni6cTaYpSMmU/cT9RmlfYY=
|
||||||
|
modernc.org/goabi0 v0.2.0 h1:HvEowk7LxcPd0eq6mVOAEMai46V+i7Jrj13t4AzuNks=
|
||||||
|
modernc.org/goabi0 v0.2.0/go.mod h1:CEFRnnJhKvWT1c1JTI3Avm+tgOWbkOu5oPA8eH8LnMI=
|
||||||
|
modernc.org/libc v1.68.0 h1:PJ5ikFOV5pwpW+VqCK1hKJuEWsonkIJhhIXyuF/91pQ=
|
||||||
|
modernc.org/libc v1.68.0/go.mod h1:NnKCYeoYgsEqnY3PgvNgAeaJnso968ygU8Z0DxjoEc0=
|
||||||
|
modernc.org/mathutil v1.7.1 h1:GCZVGXdaN8gTqB1Mf/usp1Y/hSqgI2vAGGP4jZMCxOU=
|
||||||
|
modernc.org/mathutil v1.7.1/go.mod h1:4p5IwJITfppl0G4sUEDtCr4DthTaT47/N3aT6MhfgJg=
|
||||||
|
modernc.org/memory v1.11.0 h1:o4QC8aMQzmcwCK3t3Ux/ZHmwFPzE6hf2Y5LbkRs+hbI=
|
||||||
|
modernc.org/memory v1.11.0/go.mod h1:/JP4VbVC+K5sU2wZi9bHoq2MAkCnrt2r98UGeSK7Mjw=
|
||||||
|
modernc.org/opt v0.1.4 h1:2kNGMRiUjrp4LcaPuLY2PzUfqM/w9N23quVwhKt5Qm8=
|
||||||
|
modernc.org/opt v0.1.4/go.mod h1:03fq9lsNfvkYSfxrfUhZCWPk1lm4cq4N+Bh//bEtgns=
|
||||||
|
modernc.org/sortutil v1.2.1 h1:+xyoGf15mM3NMlPDnFqrteY07klSFxLElE2PVuWIJ7w=
|
||||||
|
modernc.org/sortutil v1.2.1/go.mod h1:7ZI3a3REbai7gzCLcotuw9AC4VZVpYMjDzETGsSMqJE=
|
||||||
|
modernc.org/sqlite v1.46.1 h1:eFJ2ShBLIEnUWlLy12raN0Z1plqmFX9Qe3rjQTKt6sU=
|
||||||
|
modernc.org/sqlite v1.46.1/go.mod h1:CzbrU2lSB1DKUusvwGz7rqEKIq+NUd8GWuBBZDs9/nA=
|
||||||
|
modernc.org/strutil v1.2.1 h1:UneZBkQA+DX2Rp35KcM69cSsNES9ly8mQWD71HKlOA0=
|
||||||
|
modernc.org/strutil v1.2.1/go.mod h1:EHkiggD70koQxjVdSBM3JKM7k6L0FbGE5eymy9i3B9A=
|
||||||
|
modernc.org/token v1.1.0 h1:Xl7Ap9dKaEs5kLoOQeQmPWevfnk/DM5qcLcYlA8ys6Y=
|
||||||
|
modernc.org/token v1.1.0/go.mod h1:UGzOrNV1mAFSEB63lOFHIpNRUVMvYTc6yu1SMY/XTDM=
|
||||||
|
|||||||
@@ -1,9 +1,12 @@
|
|||||||
package blocker
|
package blocker
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"fmt"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
"github.com/d3m0k1d/BanForge/internal/logger"
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/metrics"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Firewalld struct {
|
type Firewalld struct {
|
||||||
@@ -21,19 +24,24 @@ func (f *Firewalld) Ban(ip string) error {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
cmd := exec.Command("sudo", "firewall-cmd", "--zone=drop", "--add-source", ip, "--permanent")
|
metrics.IncBanAttempt("firewalld")
|
||||||
|
// #nosec G204 - ip is validated
|
||||||
|
cmd := exec.Command("firewall-cmd", "--zone=drop", "--add-source", ip, "--permanent")
|
||||||
output, err := cmd.CombinedOutput()
|
output, err := cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
f.logger.Error(err.Error())
|
f.logger.Error(err.Error())
|
||||||
|
metrics.IncError()
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
f.logger.Info("Add source " + ip + " " + string(output))
|
f.logger.Info("Add source " + ip + " " + string(output))
|
||||||
output, err = exec.Command("sudo", "firewall-cmd", "--reload").CombinedOutput()
|
output, err = exec.Command("firewall-cmd", "--reload").CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
f.logger.Error(err.Error())
|
f.logger.Error(err.Error())
|
||||||
|
metrics.IncError()
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
f.logger.Info("Reload " + string(output))
|
f.logger.Info("Reload " + string(output))
|
||||||
|
metrics.IncBan("firewalld")
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -42,18 +50,90 @@ func (f *Firewalld) Unban(ip string) error {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
cmd := exec.Command("sudo", "firewall-cmd", "--zone=drop", "--remove-source", ip, "--permanent")
|
metrics.IncUnbanAttempt("firewalld")
|
||||||
|
// #nosec G204 - ip is validated
|
||||||
|
cmd := exec.Command("firewall-cmd", "--zone=drop", "--remove-source", ip, "--permanent")
|
||||||
output, err := cmd.CombinedOutput()
|
output, err := cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
f.logger.Error(err.Error())
|
f.logger.Error(err.Error())
|
||||||
|
metrics.IncError()
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
f.logger.Info("Remove source " + ip + " " + string(output))
|
f.logger.Info("Remove source " + ip + " " + string(output))
|
||||||
output, err = exec.Command("sudo", "firewall-cmd", "--reload").CombinedOutput()
|
output, err = exec.Command("firewall-cmd", "--reload").CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
f.logger.Error(err.Error())
|
f.logger.Error(err.Error())
|
||||||
|
metrics.IncError()
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
f.logger.Info("Reload " + string(output))
|
f.logger.Info("Reload " + string(output))
|
||||||
|
metrics.IncUnban("firewalld")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *Firewalld) PortOpen(port int, protocol string) error {
|
||||||
|
// #nosec G204 - handle is extracted from Firewalld output and validated
|
||||||
|
if port >= 0 && port <= 65535 {
|
||||||
|
if protocol != "tcp" && protocol != "udp" {
|
||||||
|
f.logger.Error("invalid protocol")
|
||||||
|
return fmt.Errorf("invalid protocol")
|
||||||
|
}
|
||||||
|
s := strconv.Itoa(port)
|
||||||
|
metrics.IncPortOperation("open", protocol)
|
||||||
|
cmd := exec.Command(
|
||||||
|
"firewall-cmd",
|
||||||
|
"--zone=public",
|
||||||
|
"--add-port="+s+"/"+protocol,
|
||||||
|
"--permanent",
|
||||||
|
)
|
||||||
|
output, err := cmd.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
f.logger.Error(err.Error())
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
f.logger.Info("Add port " + s + " " + string(output))
|
||||||
|
output, err = exec.Command("firewall-cmd", "--reload").CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
f.logger.Error(err.Error())
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
f.logger.Info("Reload " + string(output))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *Firewalld) PortClose(port int, protocol string) error {
|
||||||
|
// #nosec G204 - handle is extracted from nftables output and validated
|
||||||
|
if port >= 0 && port <= 65535 {
|
||||||
|
if protocol != "tcp" && protocol != "udp" {
|
||||||
|
return fmt.Errorf("invalid protocol")
|
||||||
|
}
|
||||||
|
s := strconv.Itoa(port)
|
||||||
|
metrics.IncPortOperation("close", protocol)
|
||||||
|
cmd := exec.Command(
|
||||||
|
"firewall-cmd",
|
||||||
|
"--zone=public",
|
||||||
|
"--remove-port="+s+"/"+protocol,
|
||||||
|
"--permanent",
|
||||||
|
)
|
||||||
|
output, err := cmd.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
f.logger.Info("Remove port " + s + " " + string(output))
|
||||||
|
output, err = exec.Command("firewall-cmd", "--reload").CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
f.logger.Info("Reload " + string(output))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *Firewalld) Setup(config string) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,6 +1,30 @@
|
|||||||
package blocker
|
package blocker
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
)
|
||||||
|
|
||||||
type BlockerEngine interface {
|
type BlockerEngine interface {
|
||||||
Ban(ip string) error
|
Ban(ip string) error
|
||||||
Unban(ip string) error
|
Unban(ip string) error
|
||||||
|
Setup(config string) error
|
||||||
|
PortOpen(port int, protocol string) error
|
||||||
|
PortClose(port int, protocol string) error
|
||||||
|
}
|
||||||
|
|
||||||
|
func GetBlocker(fw string, config string) BlockerEngine {
|
||||||
|
switch fw {
|
||||||
|
case "ufw":
|
||||||
|
return NewUfw(logger.New(false))
|
||||||
|
case "iptables":
|
||||||
|
return NewIptables(logger.New(false), config)
|
||||||
|
case "nftables":
|
||||||
|
return NewNftables(logger.New(false), config)
|
||||||
|
case "firewalld":
|
||||||
|
return NewFirewalld(logger.New(false))
|
||||||
|
default:
|
||||||
|
panic(fmt.Sprintf("Unknown firewall: %s", fw))
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -2,8 +2,10 @@ package blocker
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"os/exec"
|
"os/exec"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
"github.com/d3m0k1d/BanForge/internal/logger"
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/metrics"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Iptables struct {
|
type Iptables struct {
|
||||||
@@ -23,35 +25,40 @@ func (f *Iptables) Ban(ip string) error {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
metrics.IncBanAttempt("iptables")
|
||||||
err = validateConfigPath(f.config)
|
err = validateConfigPath(f.config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
cmd := exec.Command("sudo", "iptables", "-A", "INPUT", "-s", ip, "-j", "DROP")
|
// #nosec G204 - f.config is validated above via validateConfigPath()
|
||||||
|
cmd := exec.Command("iptables", "-A", "INPUT", "-s", ip, "-j", "DROP")
|
||||||
output, err := cmd.CombinedOutput()
|
output, err := cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
f.logger.Error("failed to ban IP",
|
f.logger.Error("failed to ban IP",
|
||||||
"ip", ip,
|
"ip", ip,
|
||||||
"error", err.Error(),
|
"error", err.Error(),
|
||||||
"output", string(output))
|
"output", string(output))
|
||||||
|
metrics.IncError()
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
f.logger.Info("IP banned",
|
f.logger.Info("IP banned",
|
||||||
"ip", ip,
|
"ip", ip,
|
||||||
"output", string(output))
|
"output", string(output))
|
||||||
|
metrics.IncBan("iptables")
|
||||||
|
|
||||||
err = validateConfigPath(f.config)
|
err = validateConfigPath(f.config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
// #nosec G204 - f.config is validated above via validateConfigPath()
|
// #nosec G204 - f.config is validated above via validateConfigPath()
|
||||||
cmd = exec.Command("sudo", "iptables-save", "-f", f.config)
|
cmd = exec.Command("iptables-save", "-f", f.config)
|
||||||
output, err = cmd.CombinedOutput()
|
output, err = cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
f.logger.Error("failed to save config",
|
f.logger.Error("failed to save config",
|
||||||
"config_path", f.config,
|
"config_path", f.config,
|
||||||
"error", err.Error(),
|
"error", err.Error(),
|
||||||
"output", string(output))
|
"output", string(output))
|
||||||
|
metrics.IncError()
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
f.logger.Info("config saved",
|
f.logger.Info("config saved",
|
||||||
@@ -65,35 +72,40 @@ func (f *Iptables) Unban(ip string) error {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
metrics.IncUnbanAttempt("iptables")
|
||||||
err = validateConfigPath(f.config)
|
err = validateConfigPath(f.config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
cmd := exec.Command("sudo", "iptables", "-D", "INPUT", "-s", ip, "-j", "DROP")
|
// #nosec G204 - f.config is validated above via validateConfigPath()
|
||||||
|
cmd := exec.Command("iptables", "-D", "INPUT", "-s", ip, "-j", "DROP")
|
||||||
output, err := cmd.CombinedOutput()
|
output, err := cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
f.logger.Error("failed to unban IP",
|
f.logger.Error("failed to unban IP",
|
||||||
"ip", ip,
|
"ip", ip,
|
||||||
"error", err.Error(),
|
"error", err.Error(),
|
||||||
"output", string(output))
|
"output", string(output))
|
||||||
|
metrics.IncError()
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
f.logger.Info("IP unbanned",
|
f.logger.Info("IP unbanned",
|
||||||
"ip", ip,
|
"ip", ip,
|
||||||
"output", string(output))
|
"output", string(output))
|
||||||
|
metrics.IncUnban("iptables")
|
||||||
|
|
||||||
err = validateConfigPath(f.config)
|
err = validateConfigPath(f.config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
// #nosec G204 - f.config is validated above via validateConfigPath()
|
// #nosec G204 - f.config is validated above via validateConfigPath()
|
||||||
cmd = exec.Command("sudo", "iptables-save", "-f", f.config)
|
cmd = exec.Command("iptables-save", "-f", f.config)
|
||||||
output, err = cmd.CombinedOutput()
|
output, err = cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
f.logger.Error("failed to save config",
|
f.logger.Error("failed to save config",
|
||||||
"config_path", f.config,
|
"config_path", f.config,
|
||||||
"error", err.Error(),
|
"error", err.Error(),
|
||||||
"output", string(output))
|
"output", string(output))
|
||||||
|
metrics.IncError()
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
f.logger.Info("config saved",
|
f.logger.Info("config saved",
|
||||||
@@ -101,3 +113,71 @@ func (f *Iptables) Unban(ip string) error {
|
|||||||
"output", string(output))
|
"output", string(output))
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (f *Iptables) PortOpen(port int, protocol string) error {
|
||||||
|
if port >= 0 && port <= 65535 {
|
||||||
|
if protocol != "tcp" && protocol != "udp" {
|
||||||
|
f.logger.Error("invalid protocol")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
s := strconv.Itoa(port)
|
||||||
|
metrics.IncPortOperation("open", protocol)
|
||||||
|
// #nosec G204 - managed by system adminstartor
|
||||||
|
cmd := exec.Command("iptables", "-A", "INPUT", "-p", protocol, "--dport", s, "-j", "ACCEPT")
|
||||||
|
output, err := cmd.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
f.logger.Error(err.Error())
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
f.logger.Info("Add port " + s + " " + string(output))
|
||||||
|
// #nosec G204 - f.config is validated above via validateConfigPath()
|
||||||
|
cmd = exec.Command("iptables-save", "-f", f.config)
|
||||||
|
output, err = cmd.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
f.logger.Error("failed to save config",
|
||||||
|
"config_path", f.config,
|
||||||
|
"error", err.Error(),
|
||||||
|
"output", string(output))
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *Iptables) PortClose(port int, protocol string) error {
|
||||||
|
if port >= 0 && port <= 65535 {
|
||||||
|
if protocol != "tcp" && protocol != "udp" {
|
||||||
|
f.logger.Error("invalid protocol")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
s := strconv.Itoa(port)
|
||||||
|
metrics.IncPortOperation("close", protocol)
|
||||||
|
// #nosec G204 - managed by system adminstartor
|
||||||
|
cmd := exec.Command("iptables", "-D", "INPUT", "-p", protocol, "--dport", s, "-j", "ACCEPT")
|
||||||
|
output, err := cmd.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
f.logger.Error(err.Error())
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
f.logger.Info("Add port " + s + " " + string(output))
|
||||||
|
// #nosec G204 - f.config is validated above via validateConfigPath()
|
||||||
|
cmd = exec.Command("iptables-save", "-f", f.config)
|
||||||
|
output, err = cmd.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
f.logger.Error("failed to save config",
|
||||||
|
"config_path", f.config,
|
||||||
|
"error", err.Error(),
|
||||||
|
"output", string(output))
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (f *Iptables) Setup(config string) error {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|||||||
@@ -3,9 +3,11 @@ package blocker
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
"github.com/d3m0k1d/BanForge/internal/logger"
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/metrics"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Nftables struct {
|
type Nftables struct {
|
||||||
@@ -25,8 +27,9 @@ func (n *Nftables) Ban(ip string) error {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
metrics.IncBanAttempt("nftables")
|
||||||
cmd := exec.Command("sudo", "nft", "add", "rule", "inet", "banforge", "banned",
|
// #nosec G204 - ip is validated
|
||||||
|
cmd := exec.Command("nft", "add", "rule", "inet", "banforge", "banned",
|
||||||
"ip", "saddr", ip, "drop")
|
"ip", "saddr", ip, "drop")
|
||||||
output, err := cmd.CombinedOutput()
|
output, err := cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -34,16 +37,19 @@ func (n *Nftables) Ban(ip string) error {
|
|||||||
"ip", ip,
|
"ip", ip,
|
||||||
"error", err.Error(),
|
"error", err.Error(),
|
||||||
"output", string(output))
|
"output", string(output))
|
||||||
|
metrics.IncError()
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
n.logger.Info("IP banned", "ip", ip)
|
n.logger.Info("IP banned", "ip", ip)
|
||||||
|
metrics.IncBan("nftables")
|
||||||
|
|
||||||
err = saveNftablesConfig(n.config)
|
err = saveNftablesConfig(n.config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
n.logger.Error("failed to save config",
|
n.logger.Error("failed to save config",
|
||||||
"config_path", n.config,
|
"config_path", n.config,
|
||||||
"error", err.Error())
|
"error", err.Error())
|
||||||
|
metrics.IncError()
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -56,21 +62,24 @@ func (n *Nftables) Unban(ip string) error {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
metrics.IncUnbanAttempt("nftables")
|
||||||
|
|
||||||
handle, err := n.findRuleHandle(ip)
|
handle, err := n.findRuleHandle(ip)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
n.logger.Error("failed to find rule handle",
|
n.logger.Error("failed to find rule handle",
|
||||||
"ip", ip,
|
"ip", ip,
|
||||||
"error", err.Error())
|
"error", err.Error())
|
||||||
|
metrics.IncError()
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
if handle == "" {
|
if handle == "" {
|
||||||
n.logger.Warn("no rule found for IP", "ip", ip)
|
n.logger.Warn("no rule found for IP", "ip", ip)
|
||||||
|
metrics.IncError()
|
||||||
return fmt.Errorf("no rule found for IP %s", ip)
|
return fmt.Errorf("no rule found for IP %s", ip)
|
||||||
}
|
}
|
||||||
// #nosec G204 - handle is extracted from nftables output and validated
|
// #nosec G204 - handle is extracted from nftables output and validated
|
||||||
cmd := exec.Command("sudo", "nft", "delete", "rule", "inet", "banforge", "banned",
|
cmd := exec.Command("nft", "delete", "rule", "inet", "banforge", "banned",
|
||||||
"handle", handle)
|
"handle", handle)
|
||||||
output, err := cmd.CombinedOutput()
|
output, err := cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@@ -79,16 +88,19 @@ func (n *Nftables) Unban(ip string) error {
|
|||||||
"handle", handle,
|
"handle", handle,
|
||||||
"error", err.Error(),
|
"error", err.Error(),
|
||||||
"output", string(output))
|
"output", string(output))
|
||||||
|
metrics.IncError()
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
n.logger.Info("IP unbanned", "ip", ip, "handle", handle)
|
n.logger.Info("IP unbanned", "ip", ip, "handle", handle)
|
||||||
|
metrics.IncUnban("nftables")
|
||||||
|
|
||||||
err = saveNftablesConfig(n.config)
|
err = saveNftablesConfig(n.config)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
n.logger.Error("failed to save config",
|
n.logger.Error("failed to save config",
|
||||||
"config_path", n.config,
|
"config_path", n.config,
|
||||||
"error", err.Error())
|
"error", err.Error())
|
||||||
|
metrics.IncError()
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -104,16 +116,16 @@ func (n *Nftables) Setup(config string) error {
|
|||||||
|
|
||||||
nftConfig := `table inet banforge {
|
nftConfig := `table inet banforge {
|
||||||
chain input {
|
chain input {
|
||||||
type filter hook input priority 0
|
type filter hook input priority filter; policy accept;
|
||||||
policy accept
|
jump banned
|
||||||
}
|
}
|
||||||
|
|
||||||
chain banned {
|
chain banned {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
`
|
`
|
||||||
|
// #nosec G204 - config is managed by adminstartor
|
||||||
cmd := exec.Command("sudo", "tee", config)
|
cmd := exec.Command("tee", config)
|
||||||
stdin, err := cmd.StdinPipe()
|
stdin, err := cmd.StdinPipe()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to create stdin pipe: %w", err)
|
return fmt.Errorf("failed to create stdin pipe: %w", err)
|
||||||
@@ -135,8 +147,8 @@ func (n *Nftables) Setup(config string) error {
|
|||||||
if err = cmd.Wait(); err != nil {
|
if err = cmd.Wait(); err != nil {
|
||||||
return fmt.Errorf("failed to save config: %w", err)
|
return fmt.Errorf("failed to save config: %w", err)
|
||||||
}
|
}
|
||||||
|
// #nosec G204 - config is managed by adminstartor
|
||||||
cmd = exec.Command("sudo", "nft", "-f", config)
|
cmd = exec.Command("nft", "-f", config)
|
||||||
output, err := cmd.CombinedOutput()
|
output, err := cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to load nftables config: %s", string(output))
|
return fmt.Errorf("failed to load nftables config: %s", string(output))
|
||||||
@@ -146,7 +158,7 @@ func (n *Nftables) Setup(config string) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (n *Nftables) findRuleHandle(ip string) (string, error) {
|
func (n *Nftables) findRuleHandle(ip string) (string, error) {
|
||||||
cmd := exec.Command("sudo", "nft", "-a", "list", "chain", "inet", "banforge", "banned")
|
cmd := exec.Command("nft", "-a", "list", "chain", "inet", "banforge", "banned")
|
||||||
output, err := cmd.CombinedOutput()
|
output, err := cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", fmt.Errorf("failed to list chain rules: %w", err)
|
return "", fmt.Errorf("failed to list chain rules: %w", err)
|
||||||
@@ -167,19 +179,102 @@ func (n *Nftables) findRuleHandle(ip string) (string, error) {
|
|||||||
return "", nil
|
return "", nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (n *Nftables) PortOpen(port int, protocol string) error {
|
||||||
|
if port >= 0 && port <= 65535 {
|
||||||
|
if protocol != "tcp" && protocol != "udp" {
|
||||||
|
n.logger.Error("invalid protocol")
|
||||||
|
metrics.IncError()
|
||||||
|
return fmt.Errorf("invalid protocol")
|
||||||
|
}
|
||||||
|
s := strconv.Itoa(port)
|
||||||
|
metrics.IncPortOperation("open", protocol)
|
||||||
|
// #nosec G204 - managed by system adminstartor
|
||||||
|
cmd := exec.Command(
|
||||||
|
"nft",
|
||||||
|
"add",
|
||||||
|
"rule",
|
||||||
|
"inet",
|
||||||
|
"banforge",
|
||||||
|
"input",
|
||||||
|
protocol,
|
||||||
|
"dport",
|
||||||
|
s,
|
||||||
|
"accept",
|
||||||
|
)
|
||||||
|
output, err := cmd.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
n.logger.Error(err.Error())
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
n.logger.Info("Add port " + s + " " + string(output))
|
||||||
|
err = saveNftablesConfig(n.config)
|
||||||
|
if err != nil {
|
||||||
|
n.logger.Error("failed to save config",
|
||||||
|
"config_path", n.config,
|
||||||
|
"error", err.Error())
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (n *Nftables) PortClose(port int, protocol string) error {
|
||||||
|
if port >= 0 && port <= 65535 {
|
||||||
|
if protocol != "tcp" && protocol != "udp" {
|
||||||
|
n.logger.Error("invalid protocol")
|
||||||
|
metrics.IncError()
|
||||||
|
return fmt.Errorf("invalid protocol")
|
||||||
|
}
|
||||||
|
s := strconv.Itoa(port)
|
||||||
|
metrics.IncPortOperation("close", protocol)
|
||||||
|
// #nosec G204 - managed by system adminstartor
|
||||||
|
cmd := exec.Command(
|
||||||
|
"nft",
|
||||||
|
"add",
|
||||||
|
"rule",
|
||||||
|
"inet",
|
||||||
|
"banforge",
|
||||||
|
"input",
|
||||||
|
protocol,
|
||||||
|
"dport",
|
||||||
|
s,
|
||||||
|
"drop",
|
||||||
|
)
|
||||||
|
output, err := cmd.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
n.logger.Error(err.Error())
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
n.logger.Info("Add port " + s + " " + string(output))
|
||||||
|
err = saveNftablesConfig(n.config)
|
||||||
|
if err != nil {
|
||||||
|
n.logger.Error("failed to save config",
|
||||||
|
"config_path", n.config,
|
||||||
|
"error", err.Error())
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
func saveNftablesConfig(configPath string) error {
|
func saveNftablesConfig(configPath string) error {
|
||||||
err := validateConfigPath(configPath)
|
err := validateConfigPath(configPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
cmd := exec.Command("sudo", "nft", "list", "ruleset")
|
cmd := exec.Command("nft", "list", "ruleset")
|
||||||
output, err := cmd.CombinedOutput()
|
output, err := cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to get nftables ruleset: %w", err)
|
return fmt.Errorf("failed to get nftables ruleset: %w", err)
|
||||||
}
|
}
|
||||||
|
// #nosec G204 - managed by system adminstartor
|
||||||
cmd = exec.Command("sudo", "tee", configPath)
|
cmd = exec.Command("tee", configPath)
|
||||||
stdin, err := cmd.StdinPipe()
|
stdin, err := cmd.StdinPipe()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to create stdin pipe: %w", err)
|
return fmt.Errorf("failed to create stdin pipe: %w", err)
|
||||||
|
|||||||
@@ -3,8 +3,10 @@ package blocker
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
|
"strconv"
|
||||||
|
|
||||||
"github.com/d3m0k1d/BanForge/internal/logger"
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/metrics"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Ufw struct {
|
type Ufw struct {
|
||||||
@@ -22,18 +24,21 @@ func (u *Ufw) Ban(ip string) error {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
metrics.IncBanAttempt("ufw")
|
||||||
cmd := exec.Command("sudo", "ufw", "--force", "deny", "from", ip)
|
// #nosec G204 - ip is validated
|
||||||
|
cmd := exec.Command("ufw", "--force", "deny", "from", ip)
|
||||||
output, err := cmd.CombinedOutput()
|
output, err := cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
u.logger.Error("failed to ban IP",
|
u.logger.Error("failed to ban IP",
|
||||||
"ip", ip,
|
"ip", ip,
|
||||||
"error", err.Error(),
|
"error", err.Error(),
|
||||||
"output", string(output))
|
"output", string(output))
|
||||||
|
metrics.IncError()
|
||||||
return fmt.Errorf("failed to ban IP %s: %w", ip, err)
|
return fmt.Errorf("failed to ban IP %s: %w", ip, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
u.logger.Info("IP banned", "ip", ip, "output", string(output))
|
u.logger.Info("IP banned", "ip", ip, "output", string(output))
|
||||||
|
metrics.IncBan("ufw")
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
func (u *Ufw) Unban(ip string) error {
|
func (u *Ufw) Unban(ip string) error {
|
||||||
@@ -41,17 +46,89 @@ func (u *Ufw) Unban(ip string) error {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
metrics.IncUnbanAttempt("ufw")
|
||||||
cmd := exec.Command("sudo", "ufw", "--force", "delete", "deny", "from", ip)
|
// #nosec G204 - ip is validated
|
||||||
|
cmd := exec.Command("ufw", "--force", "delete", "deny", "from", ip)
|
||||||
output, err := cmd.CombinedOutput()
|
output, err := cmd.CombinedOutput()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
u.logger.Error("failed to unban IP",
|
u.logger.Error("failed to unban IP",
|
||||||
"ip", ip,
|
"ip", ip,
|
||||||
"error", err.Error(),
|
"error", err.Error(),
|
||||||
"output", string(output))
|
"output", string(output))
|
||||||
|
metrics.IncError()
|
||||||
return fmt.Errorf("failed to unban IP %s: %w", ip, err)
|
return fmt.Errorf("failed to unban IP %s: %w", ip, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
u.logger.Info("IP unbanned", "ip", ip, "output", string(output))
|
u.logger.Info("IP unbanned", "ip", ip, "output", string(output))
|
||||||
|
metrics.IncUnban("ufw")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u *Ufw) PortOpen(port int, protocol string) error {
|
||||||
|
if port >= 0 && port <= 65535 {
|
||||||
|
if protocol != "tcp" && protocol != "udp" {
|
||||||
|
u.logger.Error("invalid protocol")
|
||||||
|
metrics.IncError()
|
||||||
|
return fmt.Errorf("invalid protocol")
|
||||||
|
}
|
||||||
|
s := strconv.Itoa(port)
|
||||||
|
metrics.IncPortOperation("open", protocol)
|
||||||
|
// #nosec G204 - managed by system adminstartor
|
||||||
|
cmd := exec.Command("ufw", "allow", s+"/"+protocol)
|
||||||
|
output, err := cmd.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
u.logger.Error(err.Error())
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
u.logger.Info("Add port " + s + " " + string(output))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u *Ufw) PortClose(port int, protocol string) error {
|
||||||
|
if port >= 0 && port <= 65535 {
|
||||||
|
if protocol != "tcp" && protocol != "udp" {
|
||||||
|
u.logger.Error("invalid protocol")
|
||||||
|
metrics.IncError()
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
s := strconv.Itoa(port)
|
||||||
|
metrics.IncPortOperation("close", protocol)
|
||||||
|
// #nosec G204 - managed by system adminstartor
|
||||||
|
cmd := exec.Command("ufw", "deny", s+"/"+protocol)
|
||||||
|
output, err := cmd.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
u.logger.Error(err.Error())
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
u.logger.Info("Add port " + s + " " + string(output))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (u *Ufw) Setup(config string) error {
|
||||||
|
if config != "" {
|
||||||
|
fmt.Printf("Ufw dont support config file\n")
|
||||||
|
cmd := exec.Command("ufw", "enable")
|
||||||
|
output, err := cmd.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
u.logger.Error("failed to enable ufw",
|
||||||
|
"error", err.Error(),
|
||||||
|
"output", string(output))
|
||||||
|
return fmt.Errorf("failed to enable ufw: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if config == "" {
|
||||||
|
cmd := exec.Command("ufw", "enable")
|
||||||
|
output, err := cmd.CombinedOutput()
|
||||||
|
if err != nil {
|
||||||
|
u.logger.Error("failed to enable ufw",
|
||||||
|
"error", err.Error(),
|
||||||
|
"output", string(output))
|
||||||
|
return fmt.Errorf("failed to enable ufw: %w", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|||||||
47
internal/blocker/validators_test.go
Normal file
47
internal/blocker/validators_test.go
Normal file
@@ -0,0 +1,47 @@
|
|||||||
|
package blocker
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestValidateConfigPath(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
input string
|
||||||
|
wantErr bool
|
||||||
|
}{
|
||||||
|
{name: "empty", input: "", wantErr: true},
|
||||||
|
{name: "valid path", input: "/path/to/config", wantErr: false},
|
||||||
|
{name: "invalid path", input: "path/to/config", wantErr: true},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
err := validateConfigPath(tt.input)
|
||||||
|
if (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("validateConfigPath(%q) error = %v, wantErr %v", tt.input, err, tt.wantErr)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestValidateIP(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
input string
|
||||||
|
wantErr bool
|
||||||
|
}{
|
||||||
|
{name: "empty", input: "", wantErr: true},
|
||||||
|
{name: "invalid IP", input: "1.1.1", wantErr: true},
|
||||||
|
{name: "valid IP", input: "1.1.1.1", wantErr: false},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
err := validateIP(tt.input)
|
||||||
|
if (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("validateIP(%q) error = %v, wantErr %v", tt.input, err, tt.wantErr)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -2,21 +2,185 @@ package config
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/BurntSushi/toml"
|
"github.com/BurntSushi/toml"
|
||||||
"github.com/d3m0k1d/BanForge/internal/logger"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
func LoadRuleConfig() ([]Rule, error) {
|
func LoadRuleConfig() ([]Rule, error) {
|
||||||
log := logger.New(false)
|
const rulesDir = "/etc/banforge/rules.d"
|
||||||
|
|
||||||
var cfg Rules
|
var cfg Rules
|
||||||
|
|
||||||
_, err := toml.DecodeFile("/etc/banforge/rules.toml", &cfg)
|
files, err := os.ReadDir(rulesDir)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
log.Error(fmt.Sprintf("failed to decode config: %v", err))
|
return nil, fmt.Errorf("failed to read rules directory: %w", err)
|
||||||
return nil, err
|
}
|
||||||
|
|
||||||
|
for _, file := range files {
|
||||||
|
if file.IsDir() || !strings.HasSuffix(file.Name(), ".toml") {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
filePath := filepath.Join(rulesDir, file.Name())
|
||||||
|
var fileCfg Rules
|
||||||
|
|
||||||
|
if _, err := toml.DecodeFile(filePath, &fileCfg); err != nil {
|
||||||
|
return nil, fmt.Errorf("failed to parse rule file %s: %w", filePath, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg.Rules = append(cfg.Rules, fileCfg.Rules...)
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Info(fmt.Sprintf("loaded %d rules", len(cfg.Rules)))
|
|
||||||
return cfg.Rules, nil
|
return cfg.Rules, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func NewRule(
|
||||||
|
name string,
|
||||||
|
serviceName string,
|
||||||
|
path string,
|
||||||
|
status string,
|
||||||
|
method string,
|
||||||
|
ttl string,
|
||||||
|
maxRetry int,
|
||||||
|
) error {
|
||||||
|
if name == "" {
|
||||||
|
return fmt.Errorf("rule name can't be empty")
|
||||||
|
}
|
||||||
|
|
||||||
|
rule := Rule{
|
||||||
|
Name: name,
|
||||||
|
ServiceName: serviceName,
|
||||||
|
Path: path,
|
||||||
|
Status: status,
|
||||||
|
Method: method,
|
||||||
|
BanTime: ttl,
|
||||||
|
MaxRetry: maxRetry,
|
||||||
|
}
|
||||||
|
|
||||||
|
filePath := filepath.Join("/etc/banforge/rules.d", SanitizeRuleFilename(name)+".toml")
|
||||||
|
|
||||||
|
if _, err := os.Stat(filePath); err == nil {
|
||||||
|
return fmt.Errorf("rule with name '%s' already exists", name)
|
||||||
|
}
|
||||||
|
|
||||||
|
cfg := Rules{Rules: []Rule{rule}}
|
||||||
|
|
||||||
|
// #nosec G304 - validate by sanitizeRuleFilename
|
||||||
|
file, err := os.Create(filePath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create rule file: %w", err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if closeErr := file.Close(); closeErr != nil {
|
||||||
|
fmt.Printf("warning: failed to close rule file: %v\n", closeErr)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
if err := toml.NewEncoder(file).Encode(cfg); err != nil {
|
||||||
|
return fmt.Errorf("failed to encode rule: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func EditRule(name string, serviceName string, path string, status string, method string) error {
|
||||||
|
if name == "" {
|
||||||
|
return fmt.Errorf("rule name can't be empty")
|
||||||
|
}
|
||||||
|
|
||||||
|
rules, err := LoadRuleConfig()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to load rules: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
found := false
|
||||||
|
var updatedRule *Rule
|
||||||
|
for i, rule := range rules {
|
||||||
|
if rule.Name == name {
|
||||||
|
found = true
|
||||||
|
updatedRule = &rules[i]
|
||||||
|
|
||||||
|
if serviceName != "" {
|
||||||
|
updatedRule.ServiceName = serviceName
|
||||||
|
}
|
||||||
|
if path != "" {
|
||||||
|
updatedRule.Path = path
|
||||||
|
}
|
||||||
|
if status != "" {
|
||||||
|
updatedRule.Status = status
|
||||||
|
}
|
||||||
|
if method != "" {
|
||||||
|
updatedRule.Method = method
|
||||||
|
}
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if !found {
|
||||||
|
return fmt.Errorf("rule '%s' not found", name)
|
||||||
|
}
|
||||||
|
|
||||||
|
filePath := filepath.Join("/etc/banforge/rules.d", SanitizeRuleFilename(name)+".toml")
|
||||||
|
cfg := Rules{Rules: []Rule{*updatedRule}}
|
||||||
|
|
||||||
|
// #nosec G304 - validate by sanitizeRuleFilename
|
||||||
|
file, err := os.Create(filePath)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to update rule file: %w", err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if closeErr := file.Close(); closeErr != nil {
|
||||||
|
fmt.Printf("warning: failed to close rule file: %v\n", closeErr)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
if err := toml.NewEncoder(file).Encode(cfg); err != nil {
|
||||||
|
return fmt.Errorf("failed to encode updated rule: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func SanitizeRuleFilename(name string) string {
|
||||||
|
result := strings.Map(func(r rune) rune {
|
||||||
|
if (r >= 'a' && r <= 'z') || (r >= 'A' && r <= 'Z') ||
|
||||||
|
(r >= '0' && r <= '9') || r == '-' || r == '_' {
|
||||||
|
return r
|
||||||
|
}
|
||||||
|
return '_'
|
||||||
|
}, name)
|
||||||
|
return strings.ToLower(result)
|
||||||
|
}
|
||||||
|
|
||||||
|
func ParseDurationWithYears(s string) (time.Duration, error) {
|
||||||
|
if ss, ok := strings.CutSuffix(s, "y"); ok {
|
||||||
|
years, err := strconv.Atoi(ss)
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
return time.Duration(years) * 365 * 24 * time.Hour, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if ss, ok := strings.CutSuffix(s, "M"); ok {
|
||||||
|
months, err := strconv.Atoi(ss)
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
return time.Duration(months) * 30 * 24 * time.Hour, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
if ss, ok := strings.CutSuffix(s, "d"); ok {
|
||||||
|
days, err := strconv.Atoi(ss)
|
||||||
|
if err != nil {
|
||||||
|
return 0, err
|
||||||
|
}
|
||||||
|
return time.Duration(days) * 24 * time.Hour, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return time.ParseDuration(s)
|
||||||
|
}
|
||||||
|
|||||||
@@ -16,6 +16,24 @@ const (
|
|||||||
ConfigFile = "config.toml"
|
ConfigFile = "config.toml"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
func createFileWithPermissions(path string, perm os.FileMode) error {
|
||||||
|
// #nosec G304 - path is controlled by config package not user
|
||||||
|
file, err := os.Create(path)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := os.Chmod(path, perm); err != nil {
|
||||||
|
_ = file.Close()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := file.Close(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
func CreateConf() error {
|
func CreateConf() error {
|
||||||
if os.Geteuid() != 0 {
|
if os.Geteuid() != 0 {
|
||||||
return fmt.Errorf("you must be root to run this command, use sudo/doas")
|
return fmt.Errorf("you must be root to run this command, use sudo/doas")
|
||||||
@@ -28,53 +46,49 @@ func CreateConf() error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
file, err := os.Create("/etc/banforge/config.toml")
|
if err := os.MkdirAll(ConfigDir, 0750); err != nil {
|
||||||
if err != nil {
|
return fmt.Errorf("failed to create config directory: %w", err)
|
||||||
return fmt.Errorf("failed to create config file: %w", err)
|
|
||||||
}
|
}
|
||||||
defer func() {
|
|
||||||
err = file.Close()
|
if err := os.WriteFile(configPath, []byte(Base_config), 0600); err != nil {
|
||||||
if err != nil {
|
|
||||||
fmt.Println(err)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
if err := os.Chmod(configPath, 0600); err != nil {
|
|
||||||
return fmt.Errorf("failed to set permissions: %w", err)
|
|
||||||
}
|
|
||||||
err = os.WriteFile(configPath, []byte(Base_config), 0600)
|
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to write config file: %w", err)
|
return fmt.Errorf("failed to write config file: %w", err)
|
||||||
}
|
}
|
||||||
fmt.Printf("Config file created: %s\n", configPath)
|
fmt.Printf("Config file created: %s\n", configPath)
|
||||||
file, err = os.Create("/etc/banforge/rules.toml")
|
|
||||||
if err != nil {
|
rulesDir := filepath.Join(ConfigDir, "rules.d")
|
||||||
return fmt.Errorf("failed to create rules file: %w", err)
|
if err := os.MkdirAll(rulesDir, 0750); err != nil {
|
||||||
|
return fmt.Errorf("failed to create rules directory: %w", err)
|
||||||
}
|
}
|
||||||
file, err = os.Create("/var/lib/banforge/storage.db")
|
fmt.Printf("Rules directory created: %s\n", rulesDir)
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to create database file: %w", err)
|
bansDBDir := filepath.Dir("/var/lib/banforge/bans.db")
|
||||||
|
if err := os.MkdirAll(bansDBDir, 0750); err != nil {
|
||||||
|
return fmt.Errorf("failed to create bans database directory: %w", err)
|
||||||
}
|
}
|
||||||
err = os.Chmod("/var/lib/banforge/storage.db", 0600)
|
|
||||||
if err != nil {
|
reqDBDir := filepath.Dir("/var/lib/banforge/requests.db")
|
||||||
return fmt.Errorf("failed to set permissions: %w", err)
|
if err := os.MkdirAll(reqDBDir, 0750); err != nil {
|
||||||
|
return fmt.Errorf("failed to create requests database directory: %w", err)
|
||||||
}
|
}
|
||||||
defer func() {
|
|
||||||
err = file.Close()
|
bansDBPath := "/var/lib/banforge/bans.db"
|
||||||
if err != nil {
|
if err := createFileWithPermissions(bansDBPath, 0600); err != nil {
|
||||||
fmt.Println(err)
|
return fmt.Errorf("failed to create bans database file: %w", err)
|
||||||
}
|
}
|
||||||
}()
|
fmt.Printf("Bans database file created: %s\n", bansDBPath)
|
||||||
if err := os.Chmod(configPath, 0600); err != nil {
|
|
||||||
return fmt.Errorf("failed to set permissions: %w", err)
|
reqDBPath := "/var/lib/banforge/requests.db"
|
||||||
|
if err := createFileWithPermissions(reqDBPath, 0600); err != nil {
|
||||||
|
return fmt.Errorf("failed to create requests database file: %w", err)
|
||||||
}
|
}
|
||||||
fmt.Printf(" Rules file created: %s\n", configPath)
|
fmt.Printf("Requests database file created: %s\n", reqDBPath)
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func FindFirewall() error {
|
func FindFirewall() error {
|
||||||
if os.Getegid() != 0 {
|
if os.Geteuid() != 0 {
|
||||||
fmt.Printf("Firewall settings needs sudo privileges\n")
|
return fmt.Errorf("firewall settings needs sudo privileges")
|
||||||
os.Exit(1)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
firewalls := []string{"nft", "firewall-cmd", "iptables", "ufw"}
|
firewalls := []string{"nft", "firewall-cmd", "iptables", "ufw"}
|
||||||
@@ -107,10 +121,7 @@ func FindFirewall() error {
|
|||||||
|
|
||||||
encoder := toml.NewEncoder(file)
|
encoder := toml.NewEncoder(file)
|
||||||
if err := encoder.Encode(cfg); err != nil {
|
if err := encoder.Encode(cfg); err != nil {
|
||||||
err = file.Close()
|
_ = file.Close()
|
||||||
if err != nil {
|
|
||||||
return fmt.Errorf("failed to close file: %w", err)
|
|
||||||
}
|
|
||||||
return fmt.Errorf("failed to encode config: %w", err)
|
return fmt.Errorf("failed to encode config: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -7,18 +7,20 @@ const Base_config = `
|
|||||||
[firewall]
|
[firewall]
|
||||||
name = ""
|
name = ""
|
||||||
config = "/etc/nftables.conf"
|
config = "/etc/nftables.conf"
|
||||||
ban_time = 1200
|
|
||||||
|
[metrics]
|
||||||
|
enabled = false
|
||||||
|
port = 2122
|
||||||
|
|
||||||
[[service]]
|
[[service]]
|
||||||
name = "nginx"
|
name = "nginx"
|
||||||
|
logging = "file"
|
||||||
log_path = "/var/log/nginx/access.log"
|
log_path = "/var/log/nginx/access.log"
|
||||||
enabled = true
|
enabled = true
|
||||||
|
|
||||||
[[service]]
|
[[service]]
|
||||||
name = "nginx"
|
name = "nginx"
|
||||||
|
logging = "journald"
|
||||||
log_path = "/var/log/nginx/access.log"
|
log_path = "/var/log/nginx/access.log"
|
||||||
enabled = false
|
enabled = false
|
||||||
|
|
||||||
`
|
`
|
||||||
|
|
||||||
// TODO: fix types for use 1 or any services"
|
|
||||||
|
|||||||
@@ -3,17 +3,18 @@ package config
|
|||||||
type Firewall struct {
|
type Firewall struct {
|
||||||
Name string `toml:"name"`
|
Name string `toml:"name"`
|
||||||
Config string `toml:"config"`
|
Config string `toml:"config"`
|
||||||
BanTime int `toml:"ban_time"`
|
|
||||||
}
|
}
|
||||||
|
|
||||||
type Service struct {
|
type Service struct {
|
||||||
Name string `toml:"name"`
|
Name string `toml:"name"`
|
||||||
|
Logging string `toml:"logging"`
|
||||||
LogPath string `toml:"log_path"`
|
LogPath string `toml:"log_path"`
|
||||||
Enabled bool `toml:"enabled"`
|
Enabled bool `toml:"enabled"`
|
||||||
}
|
}
|
||||||
|
|
||||||
type Config struct {
|
type Config struct {
|
||||||
Firewall Firewall `toml:"firewall"`
|
Firewall Firewall `toml:"firewall"`
|
||||||
|
Metrics Metrics `toml:"metrics"`
|
||||||
Service []Service `toml:"service"`
|
Service []Service `toml:"service"`
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -28,4 +29,11 @@ type Rule struct {
|
|||||||
Path string `toml:"path"`
|
Path string `toml:"path"`
|
||||||
Status string `toml:"status"`
|
Status string `toml:"status"`
|
||||||
Method string `toml:"method"`
|
Method string `toml:"method"`
|
||||||
|
MaxRetry int `toml:"max_retry"`
|
||||||
|
BanTime string `toml:"ban_time"`
|
||||||
|
}
|
||||||
|
|
||||||
|
type Metrics struct {
|
||||||
|
Enabled bool `toml:"enabled"`
|
||||||
|
Port int `toml:"port"`
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -2,26 +2,44 @@ package judge
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
"github.com/d3m0k1d/BanForge/internal/blocker"
|
"github.com/d3m0k1d/BanForge/internal/blocker"
|
||||||
"github.com/d3m0k1d/BanForge/internal/config"
|
"github.com/d3m0k1d/BanForge/internal/config"
|
||||||
"github.com/d3m0k1d/BanForge/internal/logger"
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/metrics"
|
||||||
"github.com/d3m0k1d/BanForge/internal/storage"
|
"github.com/d3m0k1d/BanForge/internal/storage"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Judge struct {
|
type Judge struct {
|
||||||
db *storage.DB
|
db_r *storage.BanReader
|
||||||
|
db_w *storage.BanWriter
|
||||||
|
db_rq *storage.RequestReader
|
||||||
logger *logger.Logger
|
logger *logger.Logger
|
||||||
Blocker blocker.BlockerEngine
|
Blocker blocker.BlockerEngine
|
||||||
rulesByService map[string][]config.Rule
|
rulesByService map[string][]config.Rule
|
||||||
|
entryCh chan *storage.LogEntry
|
||||||
|
resultCh chan *storage.LogEntry
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(db *storage.DB, b blocker.BlockerEngine) *Judge {
|
func New(
|
||||||
|
db_r *storage.BanReader,
|
||||||
|
db_w *storage.BanWriter,
|
||||||
|
db_rq *storage.RequestReader,
|
||||||
|
b blocker.BlockerEngine,
|
||||||
|
resultCh chan *storage.LogEntry,
|
||||||
|
entryCh chan *storage.LogEntry,
|
||||||
|
) *Judge {
|
||||||
return &Judge{
|
return &Judge{
|
||||||
db: db,
|
db_w: db_w,
|
||||||
|
db_r: db_r,
|
||||||
|
db_rq: db_rq,
|
||||||
logger: logger.New(false),
|
logger: logger.New(false),
|
||||||
rulesByService: make(map[string][]config.Rule),
|
rulesByService: make(map[string][]config.Rule),
|
||||||
Blocker: b,
|
Blocker: b,
|
||||||
|
entryCh: entryCh,
|
||||||
|
resultCh: resultCh,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -36,57 +54,139 @@ func (j *Judge) LoadRules(rules []config.Rule) {
|
|||||||
j.logger.Info("Rules loaded and indexed by service")
|
j.logger.Info("Rules loaded and indexed by service")
|
||||||
}
|
}
|
||||||
|
|
||||||
func (j *Judge) ProcessUnviewed() error {
|
func (j *Judge) Tribunal() {
|
||||||
rows, err := j.db.SearchUnViewed()
|
j.logger.Info("Tribunal started")
|
||||||
if err != nil {
|
|
||||||
j.logger.Error(fmt.Sprintf("Failed to query database: %v", err))
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
defer func() {
|
|
||||||
err = rows.Close()
|
|
||||||
if err != nil {
|
|
||||||
j.logger.Error(fmt.Sprintf("Failed to close database connection: %v", err))
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
for rows.Next() {
|
for entry := range j.entryCh {
|
||||||
var entry storage.LogEntry
|
j.logger.Debug(
|
||||||
err = rows.Scan(&entry.ID, &entry.Service, &entry.IP, &entry.Path, &entry.Status, &entry.Method, &entry.IsViewed, &entry.CreatedAt)
|
"Processing entry",
|
||||||
if err != nil {
|
"ip",
|
||||||
j.logger.Error(fmt.Sprintf("Failed to scan database row: %v", err))
|
entry.IP,
|
||||||
|
"service",
|
||||||
|
entry.Service,
|
||||||
|
"status",
|
||||||
|
entry.Status,
|
||||||
|
)
|
||||||
|
|
||||||
|
rules, serviceExists := j.rulesByService[entry.Service]
|
||||||
|
if !serviceExists {
|
||||||
|
j.logger.Debug("No rules for service", "service", entry.Service)
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
rules, serviceExists := j.rulesByService[entry.Service]
|
ruleMatched := false
|
||||||
if serviceExists {
|
|
||||||
for _, rule := range rules {
|
for _, rule := range rules {
|
||||||
if (rule.Method == "" || entry.Method == rule.Method) &&
|
methodMatch := rule.Method == "" || entry.Method == rule.Method
|
||||||
(rule.Status == "" || entry.Status == rule.Status) &&
|
statusMatch := rule.Status == "" || entry.Status == rule.Status
|
||||||
(rule.Path == "" || entry.Path == rule.Path) {
|
pathMatch := matchPath(entry.Path, rule.Path)
|
||||||
|
if methodMatch && statusMatch && pathMatch {
|
||||||
j.logger.Info(fmt.Sprintf("Rule matched for IP: %s, Service: %s", entry.IP, entry.Service))
|
ruleMatched = true
|
||||||
err = j.Blocker.Ban(entry.IP)
|
j.logger.Info("Rule matched", "rule", rule.Name, "ip", entry.IP)
|
||||||
|
j.resultCh <- entry
|
||||||
|
banned, err := j.db_r.IsBanned(entry.IP)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
j.logger.Error(fmt.Sprintf("Failed to ban IP: %v", err))
|
j.logger.Error("Failed to check ban status", "ip", entry.IP, "error", err)
|
||||||
|
metrics.IncError()
|
||||||
|
break
|
||||||
}
|
}
|
||||||
j.logger.Info(fmt.Sprintf("IP banned: %s", entry.IP))
|
if banned {
|
||||||
|
j.logger.Info("IP already banned", "ip", entry.IP)
|
||||||
|
metrics.IncLogParsed()
|
||||||
|
break
|
||||||
|
}
|
||||||
|
exceeded, err := j.db_rq.IsMaxRetryExceeded(entry.IP, rule.MaxRetry)
|
||||||
|
if err != nil {
|
||||||
|
j.logger.Error("Failed to check retry count", "ip", entry.IP, "error", err)
|
||||||
|
metrics.IncError()
|
||||||
|
break
|
||||||
|
}
|
||||||
|
if !exceeded {
|
||||||
|
j.logger.Info("Max retry not exceeded", "ip", entry.IP)
|
||||||
|
metrics.IncLogParsed()
|
||||||
|
break
|
||||||
|
}
|
||||||
|
err = j.db_w.AddBan(entry.IP, rule.BanTime, rule.Name)
|
||||||
|
if err != nil {
|
||||||
|
j.logger.Error(
|
||||||
|
"Failed to add ban to database",
|
||||||
|
"ip",
|
||||||
|
entry.IP,
|
||||||
|
"ban_time",
|
||||||
|
rule.BanTime,
|
||||||
|
"error",
|
||||||
|
err,
|
||||||
|
)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := j.Blocker.Ban(entry.IP); err != nil {
|
||||||
|
j.logger.Error("Failed to ban IP at firewall", "ip", entry.IP, "error", err)
|
||||||
|
metrics.IncError()
|
||||||
|
break
|
||||||
|
}
|
||||||
|
j.logger.Info(
|
||||||
|
"IP banned successfully",
|
||||||
|
"ip",
|
||||||
|
entry.IP,
|
||||||
|
"rule",
|
||||||
|
rule.Name,
|
||||||
|
"ban_time",
|
||||||
|
rule.BanTime,
|
||||||
|
)
|
||||||
|
metrics.IncBan(rule.ServiceName)
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if !ruleMatched {
|
||||||
|
j.logger.Debug("No rules matched", "ip", entry.IP, "service", entry.Service)
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
err = j.db.MarkAsViewed(entry.ID)
|
j.logger.Info("Tribunal stopped - entryCh closed")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (j *Judge) UnbanChecker() {
|
||||||
|
tick := time.NewTicker(5 * time.Minute)
|
||||||
|
defer tick.Stop()
|
||||||
|
|
||||||
|
for range tick.C {
|
||||||
|
ips, err := j.db_w.RemoveExpiredBans()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
j.logger.Error(fmt.Sprintf("Failed to mark entry as viewed: %v", err))
|
j.logger.Error(fmt.Sprintf("Failed to check expired bans: %v", err))
|
||||||
|
metrics.IncError()
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, ip := range ips {
|
||||||
|
if err := j.Blocker.Unban(ip); err != nil {
|
||||||
|
j.logger.Error(fmt.Sprintf("Failed to unban IP at firewall: %v", err))
|
||||||
|
metrics.IncError()
|
||||||
} else {
|
} else {
|
||||||
j.logger.Info(fmt.Sprintf("Entry marked as viewed: ID=%d", entry.ID))
|
metrics.IncUnban("judge")
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if err = rows.Err(); err != nil {
|
func matchPath(path string, rulePath string) bool {
|
||||||
j.logger.Error(fmt.Sprintf("Error iterating rows: %v", err))
|
if rulePath == "" {
|
||||||
return err
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
if strings.HasPrefix(rulePath, "*") {
|
||||||
|
suffix := strings.TrimPrefix(rulePath, "*")
|
||||||
|
return strings.HasSuffix(path, suffix)
|
||||||
|
}
|
||||||
|
|
||||||
|
if strings.HasPrefix(rulePath, "/*") {
|
||||||
|
suffix := strings.TrimPrefix(rulePath, "/*")
|
||||||
|
return strings.HasSuffix(path, suffix)
|
||||||
|
}
|
||||||
|
|
||||||
|
if strings.HasSuffix(rulePath, "*") {
|
||||||
|
prefix := strings.TrimSuffix(rulePath, "*")
|
||||||
|
return strings.HasPrefix(path, prefix)
|
||||||
|
}
|
||||||
|
return path == rulePath
|
||||||
}
|
}
|
||||||
|
|||||||
60
internal/judge/judge_test.go
Normal file
60
internal/judge/judge_test.go
Normal file
@@ -0,0 +1,60 @@
|
|||||||
|
package judge
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/config"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/storage"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestJudgeLogic(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
inputRule config.Rule
|
||||||
|
inputLog storage.LogEntry
|
||||||
|
wantErr bool
|
||||||
|
wantMatch bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "Empty rule",
|
||||||
|
inputRule: config.Rule{Name: "", ServiceName: "", Path: "", Status: "", Method: ""},
|
||||||
|
inputLog: storage.LogEntry{ID: 0, Service: "nginx", IP: "127.0.0.1", Path: "/api", Status: "200", Method: "GET", CreatedAt: ""},
|
||||||
|
wantErr: true,
|
||||||
|
wantMatch: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Matching rule",
|
||||||
|
inputRule: config.Rule{Name: "test", ServiceName: "nginx", Path: "/api", Status: "200", Method: "GET"},
|
||||||
|
inputLog: storage.LogEntry{ID: 1, Service: "nginx", IP: "127.0.0.1", Path: "/api", Status: "200", Method: "GET", CreatedAt: ""},
|
||||||
|
wantErr: false,
|
||||||
|
wantMatch: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "Non-matching status",
|
||||||
|
inputRule: config.Rule{Name: "test", ServiceName: "nginx", Path: "/api", Status: "404", Method: "GET"},
|
||||||
|
inputLog: storage.LogEntry{ID: 2, Service: "nginx", IP: "127.0.0.1", Path: "/api", Status: "200", Method: "GET", CreatedAt: ""},
|
||||||
|
wantErr: false,
|
||||||
|
wantMatch: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
if tt.inputRule.Name == "" {
|
||||||
|
if !tt.wantErr {
|
||||||
|
t.Errorf("Expected error for empty rule name, but got none")
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
result := (tt.inputRule.Method == "" || tt.inputLog.Method == tt.inputRule.Method) &&
|
||||||
|
(tt.inputRule.Status == "" || tt.inputLog.Status == tt.inputRule.Status) &&
|
||||||
|
(tt.inputRule.Path == "" || tt.inputLog.Path == tt.inputRule.Path) &&
|
||||||
|
(tt.inputRule.ServiceName == "" || tt.inputLog.Service == tt.inputRule.ServiceName)
|
||||||
|
|
||||||
|
if result != tt.wantMatch {
|
||||||
|
t.Errorf("Expected error: %v, but got: %v", tt.wantErr, result)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -1,8 +1,12 @@
|
|||||||
package logger
|
package logger
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"io"
|
||||||
"log/slog"
|
"log/slog"
|
||||||
"os"
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
|
||||||
|
"gopkg.in/natefinch/lumberjack.v2"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Logger struct {
|
type Logger struct {
|
||||||
@@ -10,13 +14,28 @@ type Logger struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func New(debug bool) *Logger {
|
func New(debug bool) *Logger {
|
||||||
|
logDir := "/var/log/banforge"
|
||||||
|
if err := os.MkdirAll(logDir, 0750); err != nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
fileWriter := &lumberjack.Logger{
|
||||||
|
Filename: filepath.Join(logDir, "banforge.log"),
|
||||||
|
MaxSize: 500,
|
||||||
|
MaxBackups: 3,
|
||||||
|
MaxAge: 28,
|
||||||
|
Compress: true,
|
||||||
|
}
|
||||||
|
|
||||||
var level slog.Level
|
var level slog.Level
|
||||||
if debug {
|
if debug {
|
||||||
level = slog.LevelDebug
|
level = slog.LevelDebug
|
||||||
} else {
|
} else {
|
||||||
level = slog.LevelInfo
|
level = slog.LevelInfo
|
||||||
}
|
}
|
||||||
handler := slog.NewJSONHandler(os.Stdout, &slog.HandlerOptions{
|
multiWriter := io.MultiWriter(fileWriter, os.Stdout)
|
||||||
|
|
||||||
|
handler := slog.NewTextHandler(multiWriter, &slog.HandlerOptions{
|
||||||
Level: level,
|
Level: level,
|
||||||
})
|
})
|
||||||
|
|
||||||
|
|||||||
131
internal/metrics/metrics.go
Normal file
131
internal/metrics/metrics.go
Normal file
@@ -0,0 +1,131 @@
|
|||||||
|
package metrics
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"log"
|
||||||
|
"net/http"
|
||||||
|
"strconv"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
metricsMu sync.RWMutex
|
||||||
|
metrics = make(map[string]int64)
|
||||||
|
)
|
||||||
|
|
||||||
|
func IncBan(service string) {
|
||||||
|
metricsMu.Lock()
|
||||||
|
metrics["ban_count"]++
|
||||||
|
metrics[service+"_bans"]++
|
||||||
|
metricsMu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
func IncUnban(service string) {
|
||||||
|
metricsMu.Lock()
|
||||||
|
metrics["unban_count"]++
|
||||||
|
metrics[service+"_unbans"]++
|
||||||
|
metricsMu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
func IncRuleMatched(rule_name string) {
|
||||||
|
metricsMu.Lock()
|
||||||
|
metrics[rule_name+"_rule_matched"]++
|
||||||
|
metricsMu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
func IncLogParsed() {
|
||||||
|
metricsMu.Lock()
|
||||||
|
metrics["log_parsed"]++
|
||||||
|
metricsMu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
func IncError() {
|
||||||
|
metricsMu.Lock()
|
||||||
|
metrics["error_count"]++
|
||||||
|
metricsMu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
func IncBanAttempt(firewall string) {
|
||||||
|
metricsMu.Lock()
|
||||||
|
metrics["ban_attempt_count"]++
|
||||||
|
metrics[firewall+"_ban_attempts"]++
|
||||||
|
metricsMu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
func IncUnbanAttempt(firewall string) {
|
||||||
|
metricsMu.Lock()
|
||||||
|
metrics["unban_attempt_count"]++
|
||||||
|
metrics[firewall+"_unban_attempts"]++
|
||||||
|
metricsMu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
func IncPortOperation(operation string, protocol string) {
|
||||||
|
metricsMu.Lock()
|
||||||
|
key := "port_" + operation + "_" + protocol
|
||||||
|
metrics[key]++
|
||||||
|
metricsMu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
func IncParserEvent(service string) {
|
||||||
|
metricsMu.Lock()
|
||||||
|
metrics[service+"_parsed_events"]++
|
||||||
|
metricsMu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
func IncScannerEvent(service string) {
|
||||||
|
metricsMu.Lock()
|
||||||
|
metrics[service+"_scanner_events"]++
|
||||||
|
metricsMu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
func IncDBOperation(operation string, table string) {
|
||||||
|
metricsMu.Lock()
|
||||||
|
key := "db_" + operation + "_" + table
|
||||||
|
metrics[key]++
|
||||||
|
metricsMu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
func IncRequestCount(service string) {
|
||||||
|
metricsMu.Lock()
|
||||||
|
metrics[service+"_request_count"]++
|
||||||
|
metricsMu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
func MetricsHandler() http.Handler {
|
||||||
|
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
metricsMu.RLock()
|
||||||
|
snapshot := make(map[string]int64, len(metrics))
|
||||||
|
for k, v := range metrics {
|
||||||
|
snapshot[k] = v
|
||||||
|
}
|
||||||
|
metricsMu.RUnlock()
|
||||||
|
|
||||||
|
w.Header().Set("Content-Type", "text/plain; version=0.0.4")
|
||||||
|
|
||||||
|
for name, value := range snapshot {
|
||||||
|
metricName := name + "_total"
|
||||||
|
_, _ = fmt.Fprintf(w, "# TYPE %s counter\n", metricName)
|
||||||
|
_, _ = fmt.Fprintf(w, "%s %d\n", metricName, value)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
func StartMetricsServer(port int) error {
|
||||||
|
mux := http.NewServeMux()
|
||||||
|
mux.Handle("/metrics", MetricsHandler())
|
||||||
|
|
||||||
|
server := &http.Server{
|
||||||
|
Addr: "localhost:" + strconv.Itoa(port),
|
||||||
|
Handler: mux,
|
||||||
|
ReadTimeout: 5 * time.Second,
|
||||||
|
WriteTimeout: 10 * time.Second,
|
||||||
|
IdleTimeout: 15 * time.Second,
|
||||||
|
}
|
||||||
|
|
||||||
|
log.Printf("Starting metrics server on %s", server.Addr)
|
||||||
|
if err := server.ListenAndServe(); err != nil && err != http.ErrServerClosed {
|
||||||
|
return fmt.Errorf("metrics server failed: %w", err)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
63
internal/parser/ApacheParser.go
Normal file
63
internal/parser/ApacheParser.go
Normal file
@@ -0,0 +1,63 @@
|
|||||||
|
package parser
|
||||||
|
|
||||||
|
import (
|
||||||
|
"regexp"
|
||||||
|
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/metrics"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/storage"
|
||||||
|
)
|
||||||
|
|
||||||
|
type ApacheParser struct {
|
||||||
|
pattern *regexp.Regexp
|
||||||
|
logger *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewApacheParser() *ApacheParser {
|
||||||
|
pattern := regexp.MustCompile(
|
||||||
|
`^(\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})\s+-\s+-\s+\[(.*?)\]\s+"(\w+)\s+(.*?)\s+HTTP/[\d.]+"\s+(\d+)\s+(\d+|-)\s+"(.*?)"\s+"(.*?)"`,
|
||||||
|
)
|
||||||
|
// Groups:
|
||||||
|
// 1: IP
|
||||||
|
// 2: Timestamp
|
||||||
|
// 3: Method (GET, POST, etc.)
|
||||||
|
// 4: Path
|
||||||
|
// 5: Status Code (200, 404, 403...)
|
||||||
|
// 6: Response Size
|
||||||
|
// 7: Referer
|
||||||
|
// 8: User-Agent
|
||||||
|
|
||||||
|
return &ApacheParser{
|
||||||
|
pattern: pattern,
|
||||||
|
logger: logger.New(false),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *ApacheParser) Parse(eventCh <-chan Event, resultCh chan<- *storage.LogEntry) {
|
||||||
|
// Group 1: IP, Group 2: Timestamp, Group 3: Method, Group 4: Path, Group 5: Status
|
||||||
|
for event := range eventCh {
|
||||||
|
matches := p.pattern.FindStringSubmatch(event.Data)
|
||||||
|
if matches == nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
path := matches[4]
|
||||||
|
status := matches[5]
|
||||||
|
method := matches[3]
|
||||||
|
|
||||||
|
resultCh <- &storage.LogEntry{
|
||||||
|
Service: "apache",
|
||||||
|
IP: matches[1],
|
||||||
|
Path: path,
|
||||||
|
Status: status,
|
||||||
|
Method: method,
|
||||||
|
}
|
||||||
|
metrics.IncParserEvent("apache")
|
||||||
|
p.logger.Info(
|
||||||
|
"Parsed apache log entry",
|
||||||
|
"ip", matches[1],
|
||||||
|
"path", path,
|
||||||
|
"status", status,
|
||||||
|
"method", method,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -4,6 +4,7 @@ import (
|
|||||||
"regexp"
|
"regexp"
|
||||||
|
|
||||||
"github.com/d3m0k1d/BanForge/internal/logger"
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/metrics"
|
||||||
"github.com/d3m0k1d/BanForge/internal/storage"
|
"github.com/d3m0k1d/BanForge/internal/storage"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -24,7 +25,6 @@ func NewNginxParser() *NginxParser {
|
|||||||
|
|
||||||
func (p *NginxParser) Parse(eventCh <-chan Event, resultCh chan<- *storage.LogEntry) {
|
func (p *NginxParser) Parse(eventCh <-chan Event, resultCh chan<- *storage.LogEntry) {
|
||||||
// Group 1: IP, Group 2: Timestamp, Group 3: Method, Group 4: Path, Group 5: Status
|
// Group 1: IP, Group 2: Timestamp, Group 3: Method, Group 4: Path, Group 5: Status
|
||||||
go func() {
|
|
||||||
for event := range eventCh {
|
for event := range eventCh {
|
||||||
matches := p.pattern.FindStringSubmatch(event.Data)
|
matches := p.pattern.FindStringSubmatch(event.Data)
|
||||||
if matches == nil {
|
if matches == nil {
|
||||||
@@ -40,9 +40,18 @@ func (p *NginxParser) Parse(eventCh <-chan Event, resultCh chan<- *storage.LogEn
|
|||||||
Path: path,
|
Path: path,
|
||||||
Status: status,
|
Status: status,
|
||||||
Method: method,
|
Method: method,
|
||||||
IsViewed: false,
|
|
||||||
}
|
}
|
||||||
p.logger.Info("Parsed nginx log entry", "ip", matches[1], "path", path, "status", status, "method", method)
|
metrics.IncParserEvent("nginx")
|
||||||
|
p.logger.Info(
|
||||||
|
"Parsed nginx log entry",
|
||||||
|
"ip",
|
||||||
|
matches[1],
|
||||||
|
"path",
|
||||||
|
path,
|
||||||
|
"status",
|
||||||
|
status,
|
||||||
|
"method",
|
||||||
|
method,
|
||||||
|
)
|
||||||
}
|
}
|
||||||
}()
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -2,10 +2,16 @@ package parser
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"bufio"
|
"bufio"
|
||||||
|
"fmt"
|
||||||
"os"
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
"path/filepath"
|
||||||
|
"regexp"
|
||||||
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/d3m0k1d/BanForge/internal/logger"
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/metrics"
|
||||||
)
|
)
|
||||||
|
|
||||||
type Event struct {
|
type Event struct {
|
||||||
@@ -17,22 +23,105 @@ type Scanner struct {
|
|||||||
ch chan Event
|
ch chan Event
|
||||||
stopCh chan struct{}
|
stopCh chan struct{}
|
||||||
logger *logger.Logger
|
logger *logger.Logger
|
||||||
|
cmd *exec.Cmd
|
||||||
file *os.File
|
file *os.File
|
||||||
pollDelay time.Duration
|
pollDelay time.Duration
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewScanner(path string) (*Scanner, error) {
|
func validateLogPath(path string) error {
|
||||||
file, err := os.Open(path) // #nosec G304 -- admin tool, runs as root, path controlled by operator
|
if path == "" {
|
||||||
|
return fmt.Errorf("log path cannot be empty")
|
||||||
|
}
|
||||||
|
|
||||||
|
if !filepath.IsAbs(path) {
|
||||||
|
return fmt.Errorf("log path must be absolute: %s", path)
|
||||||
|
}
|
||||||
|
|
||||||
|
if strings.Contains(path, "..") {
|
||||||
|
return fmt.Errorf("log path contains '..': %s", path)
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := os.Stat(path); os.IsNotExist(err) {
|
||||||
|
return fmt.Errorf("log file does not exist: %s", path)
|
||||||
|
}
|
||||||
|
|
||||||
|
info, err := os.Lstat(path)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to stat log file: %w", err)
|
||||||
|
}
|
||||||
|
if info.Mode()&os.ModeSymlink != 0 {
|
||||||
|
return fmt.Errorf("log path is a symlink: %s", path)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func validateJournaldUnit(unit string) error {
|
||||||
|
if unit == "" {
|
||||||
|
return fmt.Errorf("journald unit cannot be empty")
|
||||||
|
}
|
||||||
|
|
||||||
|
if !regexp.MustCompile(`^[a-zA-Z0-9._-]+$`).MatchString(unit) {
|
||||||
|
return fmt.Errorf("invalid journald unit name: %s", unit)
|
||||||
|
}
|
||||||
|
|
||||||
|
if strings.HasPrefix(unit, "-") {
|
||||||
|
return fmt.Errorf("journald unit cannot start with '-': %s", unit)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewScannerTail(path string) (*Scanner, error) {
|
||||||
|
if err := validateLogPath(path); err != nil {
|
||||||
|
return nil, fmt.Errorf("invalid log path: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// #nosec G204 - path is validated above via validateLogPath()
|
||||||
|
cmd := exec.Command("tail", "-F", "-n", "10", path)
|
||||||
|
stdout, err := cmd.StdoutPipe()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if err := cmd.Start(); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
return &Scanner{
|
return &Scanner{
|
||||||
scanner: bufio.NewScanner(file),
|
scanner: bufio.NewScanner(stdout),
|
||||||
ch: make(chan Event, 100),
|
ch: make(chan Event, 100),
|
||||||
stopCh: make(chan struct{}),
|
stopCh: make(chan struct{}),
|
||||||
logger: logger.New(false),
|
logger: logger.New(false),
|
||||||
file: file,
|
file: nil,
|
||||||
|
cmd: cmd,
|
||||||
|
pollDelay: 100 * time.Millisecond,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewScannerJournald(unit string) (*Scanner, error) {
|
||||||
|
if err := validateJournaldUnit(unit); err != nil {
|
||||||
|
return nil, fmt.Errorf("invalid journald unit: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// #nosec G204 - unit is validated above via validateJournaldUnit()
|
||||||
|
cmd := exec.Command("journalctl", "-u", unit, "-f", "-n", "0", "-o", "short", "--no-pager")
|
||||||
|
stdout, err := cmd.StdoutPipe()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := cmd.Start(); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &Scanner{
|
||||||
|
scanner: bufio.NewScanner(stdout),
|
||||||
|
ch: make(chan Event, 100),
|
||||||
|
stopCh: make(chan struct{}),
|
||||||
|
logger: logger.New(false),
|
||||||
|
cmd: cmd,
|
||||||
|
file: nil,
|
||||||
pollDelay: 100 * time.Millisecond,
|
pollDelay: 100 * time.Millisecond,
|
||||||
}, nil
|
}, nil
|
||||||
}
|
}
|
||||||
@@ -49,6 +138,7 @@ func (s *Scanner) Start() {
|
|||||||
|
|
||||||
default:
|
default:
|
||||||
if s.scanner.Scan() {
|
if s.scanner.Scan() {
|
||||||
|
metrics.IncScannerEvent("scanner")
|
||||||
s.ch <- Event{
|
s.ch <- Event{
|
||||||
Data: s.scanner.Text(),
|
Data: s.scanner.Text(),
|
||||||
}
|
}
|
||||||
@@ -56,9 +146,9 @@ func (s *Scanner) Start() {
|
|||||||
} else {
|
} else {
|
||||||
if err := s.scanner.Err(); err != nil {
|
if err := s.scanner.Err(); err != nil {
|
||||||
s.logger.Error("Scanner error")
|
s.logger.Error("Scanner error")
|
||||||
|
metrics.IncError()
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
time.Sleep(s.pollDelay)
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -67,11 +157,26 @@ func (s *Scanner) Start() {
|
|||||||
|
|
||||||
func (s *Scanner) Stop() {
|
func (s *Scanner) Stop() {
|
||||||
close(s.stopCh)
|
close(s.stopCh)
|
||||||
time.Sleep(150 * time.Millisecond)
|
|
||||||
err := s.file.Close()
|
if s.cmd != nil && s.cmd.Process != nil {
|
||||||
|
s.logger.Info("Stopping process", "pid", s.cmd.Process.Pid)
|
||||||
|
err := s.cmd.Process.Kill()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
s.logger.Error("Failed to close file")
|
s.logger.Error("Failed to kill process", "err", err)
|
||||||
}
|
}
|
||||||
|
err = s.cmd.Wait()
|
||||||
|
if err != nil {
|
||||||
|
s.logger.Error("Failed to wait process", "err", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
if s.file != nil {
|
||||||
|
if err := s.file.Close(); err != nil {
|
||||||
|
s.logger.Error("Failed to close file", "err", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
time.Sleep(150 * time.Millisecond)
|
||||||
close(s.ch)
|
close(s.ch)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -2,52 +2,72 @@ package parser
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"os"
|
"os"
|
||||||
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
"time"
|
"time"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestNewScanner(t *testing.T) {
|
func TestNewScannerTail(t *testing.T) {
|
||||||
file, err := os.CreateTemp("", "test.log")
|
|
||||||
|
file, err := os.CreateTemp("", "test-*.log")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
defer file.Close()
|
|
||||||
defer os.Remove(file.Name())
|
defer os.Remove(file.Name())
|
||||||
s, err := NewScanner(file.Name())
|
file.Close()
|
||||||
|
|
||||||
|
scanner, err := NewScannerTail(file.Name())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatalf("NewScannerTail() error = %v", err)
|
||||||
}
|
|
||||||
if s == nil {
|
|
||||||
t.Fatal("Scanner is nil")
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestScannerStart(t *testing.T) {
|
if scanner == nil {
|
||||||
|
t.Fatal("Scanner is nil")
|
||||||
|
}
|
||||||
|
|
||||||
|
if scanner.cmd == nil {
|
||||||
|
t.Fatal("cmd is nil")
|
||||||
|
}
|
||||||
|
|
||||||
|
if scanner.cmd.Process == nil {
|
||||||
|
t.Fatal("process is nil")
|
||||||
|
}
|
||||||
|
|
||||||
|
scanner.Stop()
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestScannerTailEvents(t *testing.T) {
|
||||||
tests := []struct {
|
tests := []struct {
|
||||||
name string
|
name string
|
||||||
input string
|
lines []string
|
||||||
wantErr bool
|
|
||||||
wantLines int
|
wantLines int
|
||||||
}{
|
}{
|
||||||
{
|
{
|
||||||
name: "correct file",
|
name: "multiple lines",
|
||||||
input: `Failed password for root from 192.168.1.1
|
lines: []string{
|
||||||
Invalid user admin from 192.168.1.1
|
"Failed password for root from 192.168.1.1",
|
||||||
Accepted publickey for user from 192.168.1.2`,
|
"Invalid user admin from 192.168.1.2",
|
||||||
wantErr: false,
|
"Accepted publickey for user from 192.168.1.3",
|
||||||
|
},
|
||||||
wantLines: 3,
|
wantLines: 3,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "empty file",
|
name: "single line",
|
||||||
input: "",
|
lines: []string{
|
||||||
wantErr: false,
|
"Failed password for root",
|
||||||
wantLines: 0,
|
},
|
||||||
|
wantLines: 1,
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
name: "single line",
|
name: "many lines",
|
||||||
input: `Failed password for root`,
|
lines: []string{
|
||||||
wantErr: false,
|
"line 1",
|
||||||
wantLines: 1,
|
"line 2",
|
||||||
|
"line 3",
|
||||||
|
"line 4",
|
||||||
|
"line 5",
|
||||||
|
},
|
||||||
|
wantLines: 5,
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -59,41 +79,404 @@ Accepted publickey for user from 192.168.1.2`,
|
|||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
}
|
}
|
||||||
filePath := file.Name()
|
filePath := file.Name()
|
||||||
|
|
||||||
if _, err := file.WriteString(tt.input); err != nil {
|
|
||||||
t.Fatal(err)
|
|
||||||
}
|
|
||||||
file.Close()
|
file.Close()
|
||||||
defer os.Remove(filePath)
|
defer os.Remove(filePath)
|
||||||
|
|
||||||
scanner, err := NewScanner(filePath)
|
scanner, err := NewScannerTail(filePath)
|
||||||
if (err != nil) != tt.wantErr {
|
if err != nil {
|
||||||
t.Errorf("NewScanner() error = %v, wantErr %v", err, tt.wantErr)
|
t.Fatalf("NewScannerTail() error = %v", err)
|
||||||
return
|
|
||||||
}
|
|
||||||
|
|
||||||
if tt.wantErr {
|
|
||||||
return
|
|
||||||
}
|
}
|
||||||
defer scanner.Stop()
|
defer scanner.Stop()
|
||||||
|
|
||||||
scanner.Start()
|
scanner.Start()
|
||||||
|
|
||||||
timeout := time.After(500 * time.Millisecond)
|
time.Sleep(200 * time.Millisecond)
|
||||||
linesRead := 0
|
|
||||||
|
|
||||||
|
file, err = os.OpenFile(filePath, os.O_APPEND|os.O_WRONLY, 0644)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, line := range tt.lines {
|
||||||
|
if _, err := file.WriteString(line + "\n"); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := file.Sync(); err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
file.Close()
|
||||||
|
|
||||||
|
// 5. Собираем события
|
||||||
|
timeout := time.After(1 * time.Second)
|
||||||
|
var events []Event
|
||||||
|
|
||||||
|
eventLoop:
|
||||||
for {
|
for {
|
||||||
select {
|
select {
|
||||||
case event := <-scanner.Events():
|
case event := <-scanner.Events():
|
||||||
linesRead++
|
events = append(events, event)
|
||||||
t.Logf("Read: %s", event.Data)
|
t.Logf("Read: %s", event.Data)
|
||||||
case <-timeout:
|
|
||||||
if linesRead != tt.wantLines {
|
if len(events) == tt.wantLines {
|
||||||
t.Errorf("got %d lines, want %d", linesRead, tt.wantLines)
|
break eventLoop
|
||||||
}
|
}
|
||||||
return
|
|
||||||
|
case <-timeout:
|
||||||
|
break eventLoop
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(events) != tt.wantLines {
|
||||||
|
t.Errorf("got %d lines, want %d", len(events), tt.wantLines)
|
||||||
|
}
|
||||||
|
|
||||||
|
for i, event := range events {
|
||||||
|
if event.Data != tt.lines[i] {
|
||||||
|
t.Errorf("line %d: got %q, want %q", i, event.Data, tt.lines[i])
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestScannerStop(t *testing.T) {
|
||||||
|
|
||||||
|
file, err := os.CreateTemp("", "test-*.log")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
filePath := file.Name()
|
||||||
|
file.Close()
|
||||||
|
defer os.Remove(filePath)
|
||||||
|
|
||||||
|
scanner, err := NewScannerTail(filePath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
scanner.Start()
|
||||||
|
time.Sleep(100 * time.Millisecond)
|
||||||
|
|
||||||
|
scanner.Stop()
|
||||||
|
|
||||||
|
err = scanner.cmd.Process.Signal(os.Signal(nil))
|
||||||
|
if err == nil {
|
||||||
|
t.Error("Process still alive after Stop()")
|
||||||
|
}
|
||||||
|
|
||||||
|
select {
|
||||||
|
case _, ok := <-scanner.Events():
|
||||||
|
if ok {
|
||||||
|
t.Error("Channel still open after Stop()")
|
||||||
|
}
|
||||||
|
case <-time.After(100 * time.Millisecond):
|
||||||
|
t.Error("Channel not closed after Stop()")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func TestMultipleScanners(t *testing.T) {
|
||||||
|
|
||||||
|
file1, err := os.CreateTemp("", "test1-*.log")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
path1 := file1.Name()
|
||||||
|
file1.Close()
|
||||||
|
defer os.Remove(path1)
|
||||||
|
|
||||||
|
file2, err := os.CreateTemp("", "test2-*.log")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
path2 := file2.Name()
|
||||||
|
file2.Close()
|
||||||
|
defer os.Remove(path2)
|
||||||
|
|
||||||
|
scanner1, err := NewScannerTail(path1)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer scanner1.Stop()
|
||||||
|
|
||||||
|
scanner2, err := NewScannerTail(path2)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
defer scanner2.Stop()
|
||||||
|
|
||||||
|
scanner1.Start()
|
||||||
|
scanner2.Start()
|
||||||
|
|
||||||
|
time.Sleep(200 * time.Millisecond)
|
||||||
|
|
||||||
|
f1, _ := os.OpenFile(path1, os.O_APPEND|os.O_WRONLY, 0644)
|
||||||
|
f1.WriteString("scanner1 line\n")
|
||||||
|
f1.Sync()
|
||||||
|
f1.Close()
|
||||||
|
|
||||||
|
f2, _ := os.OpenFile(path2, os.O_APPEND|os.O_WRONLY, 0644)
|
||||||
|
f2.WriteString("scanner2 line\n")
|
||||||
|
f2.Sync()
|
||||||
|
f2.Close()
|
||||||
|
|
||||||
|
timeout := time.After(1 * time.Second)
|
||||||
|
|
||||||
|
var event1, event2 Event
|
||||||
|
got1, got2 := false, false
|
||||||
|
|
||||||
|
for !got1 || !got2 {
|
||||||
|
select {
|
||||||
|
case event1 = <-scanner1.Events():
|
||||||
|
got1 = true
|
||||||
|
t.Logf("Scanner1: %s", event1.Data)
|
||||||
|
|
||||||
|
case event2 = <-scanner2.Events():
|
||||||
|
got2 = true
|
||||||
|
t.Logf("Scanner2: %s", event2.Data)
|
||||||
|
|
||||||
|
case <-timeout:
|
||||||
|
if !got1 {
|
||||||
|
t.Error("Scanner1 did not receive event")
|
||||||
|
}
|
||||||
|
if !got2 {
|
||||||
|
t.Error("Scanner2 did not receive event")
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if event1.Data != "scanner1 line" {
|
||||||
|
t.Errorf("Scanner1 got wrong data: %q", event1.Data)
|
||||||
|
}
|
||||||
|
|
||||||
|
if event2.Data != "scanner2 line" {
|
||||||
|
t.Errorf("Scanner2 got wrong data: %q", event2.Data)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func BenchmarkScanner(b *testing.B) {
|
||||||
|
file, err := os.CreateTemp("", "bench-*.log")
|
||||||
|
if err != nil {
|
||||||
|
b.Fatal(err)
|
||||||
|
}
|
||||||
|
filePath := file.Name()
|
||||||
|
file.Close()
|
||||||
|
defer os.Remove(filePath)
|
||||||
|
|
||||||
|
scanner, err := NewScannerTail(filePath)
|
||||||
|
if err != nil {
|
||||||
|
b.Fatal(err)
|
||||||
|
}
|
||||||
|
defer scanner.Stop()
|
||||||
|
|
||||||
|
scanner.Start()
|
||||||
|
time.Sleep(200 * time.Millisecond)
|
||||||
|
|
||||||
|
b.ResetTimer()
|
||||||
|
|
||||||
|
for i := 0; i < b.N; i++ {
|
||||||
|
f, _ := os.OpenFile(filePath, os.O_APPEND|os.O_WRONLY, 0644)
|
||||||
|
f.WriteString("benchmark line\n")
|
||||||
|
f.Sync()
|
||||||
|
f.Close()
|
||||||
|
<-scanner.Events()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestValidateLogPath(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
path string
|
||||||
|
setup func() (string, func())
|
||||||
|
wantErr bool
|
||||||
|
errMsg string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "empty path",
|
||||||
|
path: "",
|
||||||
|
wantErr: true,
|
||||||
|
errMsg: "log path cannot be empty",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "relative path",
|
||||||
|
path: "logs/test.log",
|
||||||
|
wantErr: true,
|
||||||
|
errMsg: "log path must be absolute",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "path with traversal",
|
||||||
|
path: "/var/log/../etc/passwd",
|
||||||
|
wantErr: true,
|
||||||
|
errMsg: "log path contains '..'",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "non-existent file",
|
||||||
|
path: "/var/log/nonexistent.log",
|
||||||
|
wantErr: true,
|
||||||
|
errMsg: "log file does not exist",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "valid file",
|
||||||
|
path: "/tmp/test-valid.log",
|
||||||
|
setup: func() (string, func()) {
|
||||||
|
_, _ = os.Create("/tmp/test-valid.log")
|
||||||
|
return "/tmp/test-valid.log", func() { os.Remove("/tmp/test-valid.log") }
|
||||||
|
},
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
var cleanup func()
|
||||||
|
if tt.setup != nil {
|
||||||
|
tt.path, cleanup = tt.setup()
|
||||||
|
defer cleanup()
|
||||||
|
}
|
||||||
|
|
||||||
|
err := validateLogPath(tt.path)
|
||||||
|
if (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("validateLogPath() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
|
}
|
||||||
|
if tt.wantErr && tt.errMsg != "" && err != nil {
|
||||||
|
if !strings.Contains(err.Error(), tt.errMsg) {
|
||||||
|
t.Errorf("validateLogPath() error = %v, want message containing %q", err, tt.errMsg)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestValidateJournaldUnit(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
unit string
|
||||||
|
wantErr bool
|
||||||
|
errMsg string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "empty unit",
|
||||||
|
unit: "",
|
||||||
|
wantErr: true,
|
||||||
|
errMsg: "journald unit cannot be empty",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "unit starting with dash",
|
||||||
|
unit: "-dangerous",
|
||||||
|
wantErr: true,
|
||||||
|
errMsg: "journald unit cannot start with '-'",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "unit with special chars",
|
||||||
|
unit: "test;rm -rf /",
|
||||||
|
wantErr: true,
|
||||||
|
errMsg: "invalid journald unit name",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "unit with spaces",
|
||||||
|
unit: "test unit",
|
||||||
|
wantErr: true,
|
||||||
|
errMsg: "invalid journald unit name",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "valid unit simple",
|
||||||
|
unit: "nginx",
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "valid unit with dash",
|
||||||
|
unit: "ssh-agent",
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "valid unit with dot",
|
||||||
|
unit: "systemd-journald.service",
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "valid unit with underscore",
|
||||||
|
unit: "my_service",
|
||||||
|
wantErr: false,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
err := validateJournaldUnit(tt.unit)
|
||||||
|
if (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("validateJournaldUnit() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
|
}
|
||||||
|
if tt.wantErr && tt.errMsg != "" && err != nil {
|
||||||
|
if !strings.Contains(err.Error(), tt.errMsg) {
|
||||||
|
t.Errorf("validateJournaldUnit() error = %v, want message containing %q", err, tt.errMsg)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestNewScannerTailValidation(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
path string
|
||||||
|
wantErr bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "empty path",
|
||||||
|
path: "",
|
||||||
|
wantErr: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "relative path",
|
||||||
|
path: "test.log",
|
||||||
|
wantErr: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "non-existent path",
|
||||||
|
path: "/nonexistent/path/file.log",
|
||||||
|
wantErr: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
_, err := NewScannerTail(tt.path)
|
||||||
|
if (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("NewScannerTail() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestNewScannerJournaldValidation(t *testing.T) {
|
||||||
|
tests := []struct {
|
||||||
|
name string
|
||||||
|
unit string
|
||||||
|
wantErr bool
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
name: "empty unit",
|
||||||
|
unit: "",
|
||||||
|
wantErr: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "unit with semicolon",
|
||||||
|
unit: "test;rm -rf /",
|
||||||
|
wantErr: true,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
name: "unit starting with dash",
|
||||||
|
unit: "-dangerous",
|
||||||
|
wantErr: true,
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tt := range tests {
|
||||||
|
t.Run(tt.name, func(t *testing.T) {
|
||||||
|
_, err := NewScannerJournald(tt.unit)
|
||||||
|
if (err != nil) != tt.wantErr {
|
||||||
|
t.Errorf("NewScannerJournald() error = %v, wantErr %v", err, tt.wantErr)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|||||||
53
internal/parser/sshd.go
Normal file
53
internal/parser/sshd.go
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
package parser
|
||||||
|
|
||||||
|
import (
|
||||||
|
"regexp"
|
||||||
|
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/metrics"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/storage"
|
||||||
|
)
|
||||||
|
|
||||||
|
type SshdParser struct {
|
||||||
|
pattern *regexp.Regexp
|
||||||
|
logger *logger.Logger
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewSshdParser() *SshdParser {
|
||||||
|
pattern := regexp.MustCompile(
|
||||||
|
`^([A-Za-z]{3}\s+\d{1,2}\s+\d{2}:\d{2}:\d{2})\s+(\S+)\s+sshd(?:-session)?\[(\d+)\]:\s+Failed\s+(\w+)\s+for\s+(?:invalid\s+user\s+)?(\S+)\s+from\s+(\S+)\s+port\s+(\d+)`,
|
||||||
|
)
|
||||||
|
return &SshdParser{
|
||||||
|
pattern: pattern,
|
||||||
|
logger: logger.New(false),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (p *SshdParser) Parse(eventCh <-chan Event, resultCh chan<- *storage.LogEntry) {
|
||||||
|
// Group 1: Timestamp, Group 2: hostame, Group 3: pid, Group 4: Method auth, Group 5: User, Group 6: IP, Group 7: port
|
||||||
|
for event := range eventCh {
|
||||||
|
matches := p.pattern.FindStringSubmatch(event.Data)
|
||||||
|
if matches == nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
resultCh <- &storage.LogEntry{
|
||||||
|
Service: "ssh",
|
||||||
|
IP: matches[6],
|
||||||
|
Path: matches[5], // user
|
||||||
|
Status: "Failed",
|
||||||
|
Method: matches[4], // method auth
|
||||||
|
}
|
||||||
|
metrics.IncParserEvent("ssh")
|
||||||
|
p.logger.Info(
|
||||||
|
"Parsed ssh log entry",
|
||||||
|
"ip",
|
||||||
|
matches[6],
|
||||||
|
"user",
|
||||||
|
matches[5],
|
||||||
|
"method",
|
||||||
|
matches[4],
|
||||||
|
"status",
|
||||||
|
"Failed",
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}
|
||||||
228
internal/storage/ban_db.go
Normal file
228
internal/storage/ban_db.go
Normal file
@@ -0,0 +1,228 @@
|
|||||||
|
package storage
|
||||||
|
|
||||||
|
import (
|
||||||
|
"database/sql"
|
||||||
|
"fmt"
|
||||||
|
"os"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/config"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/metrics"
|
||||||
|
"github.com/jedib0t/go-pretty/v6/table"
|
||||||
|
_ "modernc.org/sqlite"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Writer block
|
||||||
|
type BanWriter struct {
|
||||||
|
logger *logger.Logger
|
||||||
|
db *sql.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewBanWriter() (*BanWriter, error) {
|
||||||
|
db, err := sql.Open(
|
||||||
|
"sqlite",
|
||||||
|
buildSqliteDsn(banDBPath, pragmas),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &BanWriter{
|
||||||
|
logger: logger.New(false),
|
||||||
|
db: db,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *BanWriter) CreateTable() error {
|
||||||
|
_, err := d.db.Exec(CreateBansTable)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
metrics.IncDBOperation("create_table", "bans")
|
||||||
|
d.logger.Info("Created tables")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *BanWriter) AddBan(ip string, ttl string, reason string) error {
|
||||||
|
duration, err := config.ParseDurationWithYears(ttl)
|
||||||
|
if err != nil {
|
||||||
|
d.logger.Error("Invalid duration format", "ttl", ttl, "error", err)
|
||||||
|
metrics.IncError()
|
||||||
|
return fmt.Errorf("invalid duration: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
now := time.Now()
|
||||||
|
expiredAt := now.Add(duration)
|
||||||
|
|
||||||
|
_, err = d.db.Exec(
|
||||||
|
"INSERT INTO bans (ip, reason, banned_at, expired_at) VALUES (?, ?, ?, ?)",
|
||||||
|
ip,
|
||||||
|
reason,
|
||||||
|
now.Format(time.RFC3339),
|
||||||
|
expiredAt.Format(time.RFC3339),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
d.logger.Error("Failed to add ban", "error", err)
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
metrics.IncDBOperation("insert", "bans")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *BanWriter) RemoveBan(ip string) error {
|
||||||
|
_, err := d.db.Exec("DELETE FROM bans WHERE ip = ?", ip)
|
||||||
|
if err != nil {
|
||||||
|
d.logger.Error("Failed to remove ban", "error", err)
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
metrics.IncDBOperation("delete", "bans")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *BanWriter) RemoveExpiredBans() ([]string, error) {
|
||||||
|
var ips []string
|
||||||
|
now := time.Now().Format(time.RFC3339)
|
||||||
|
|
||||||
|
rows, err := w.db.Query(
|
||||||
|
"SELECT ip FROM bans WHERE expired_at < ?",
|
||||||
|
now,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
w.logger.Error("Failed to get expired bans", "error", err)
|
||||||
|
metrics.IncError()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if err := rows.Close(); err != nil {
|
||||||
|
w.logger.Error("Failed to close rows", "error", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
for rows.Next() {
|
||||||
|
var ip string
|
||||||
|
err := rows.Scan(&ip)
|
||||||
|
if err != nil {
|
||||||
|
w.logger.Error("Failed to scan ban", "error", err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
ips = append(ips, ip)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err = rows.Err(); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
result, err := w.db.Exec(
|
||||||
|
"DELETE FROM bans WHERE expired_at < ?",
|
||||||
|
now,
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
w.logger.Error("Failed to remove expired bans", "error", err)
|
||||||
|
metrics.IncError()
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
rowsAffected, err := result.RowsAffected()
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
if rowsAffected > 0 {
|
||||||
|
w.logger.Info("Removed expired bans", "count", rowsAffected, "ips", len(ips))
|
||||||
|
metrics.IncDBOperation("delete_expired", "bans")
|
||||||
|
}
|
||||||
|
|
||||||
|
return ips, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *BanWriter) Close() error {
|
||||||
|
d.logger.Info("Closing database connection")
|
||||||
|
err := d.db.Close()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Reader block
|
||||||
|
|
||||||
|
type BanReader struct {
|
||||||
|
logger *logger.Logger
|
||||||
|
db *sql.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewBanReader() (*BanReader, error) {
|
||||||
|
db, err := sql.Open("sqlite",
|
||||||
|
"/var/lib/banforge/bans.db?"+
|
||||||
|
"mode=ro&"+
|
||||||
|
"_pragma=journal_mode(WAL)&"+
|
||||||
|
"_pragma=mmap_size(268435456)&"+
|
||||||
|
"_pragma=cache_size(-2000)&"+
|
||||||
|
"_pragma=query_only(1)")
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &BanReader{
|
||||||
|
logger: logger.New(false),
|
||||||
|
db: db,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *BanReader) IsBanned(ip string) (bool, error) {
|
||||||
|
var bannedIP string
|
||||||
|
err := d.db.QueryRow("SELECT ip FROM bans WHERE ip = ? ", ip).Scan(&bannedIP)
|
||||||
|
if err == sql.ErrNoRows {
|
||||||
|
return false, nil
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
metrics.IncError()
|
||||||
|
return false, fmt.Errorf("failed to check ban status: %w", err)
|
||||||
|
}
|
||||||
|
metrics.IncDBOperation("select", "bans")
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *BanReader) BanList() error {
|
||||||
|
var count int
|
||||||
|
t := table.NewWriter()
|
||||||
|
t.SetOutputMirror(os.Stdout)
|
||||||
|
t.SetStyle(table.StyleBold)
|
||||||
|
t.AppendHeader(table.Row{"№", "IP", "Banned At", "Reason", "Expires At"})
|
||||||
|
rows, err := d.db.Query("SELECT ip, banned_at, reason, expired_at FROM bans")
|
||||||
|
if err != nil {
|
||||||
|
d.logger.Error("Failed to get ban list", "error", err)
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
for rows.Next() {
|
||||||
|
count++
|
||||||
|
var ip string
|
||||||
|
var bannedAt string
|
||||||
|
var reason string
|
||||||
|
var expiredAt string
|
||||||
|
err := rows.Scan(&ip, &bannedAt, &reason, &expiredAt)
|
||||||
|
if err != nil {
|
||||||
|
d.logger.Error("Failed to get ban list", "error", err)
|
||||||
|
metrics.IncError()
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
t.AppendRow(table.Row{count, ip, bannedAt, reason, expiredAt})
|
||||||
|
|
||||||
|
}
|
||||||
|
t.Render()
|
||||||
|
metrics.IncDBOperation("select", "bans")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (d *BanReader) Close() error {
|
||||||
|
d.logger.Info("Closing database connection")
|
||||||
|
err := d.db.Close()
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
380
internal/storage/ban_db_test.go
Normal file
380
internal/storage/ban_db_test.go
Normal file
@@ -0,0 +1,380 @@
|
|||||||
|
package storage
|
||||||
|
|
||||||
|
import (
|
||||||
|
"database/sql"
|
||||||
|
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
"path/filepath"
|
||||||
|
"testing"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestBanWriter_AddBan(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
dbPath := filepath.Join(tempDir, "bans_test.db")
|
||||||
|
|
||||||
|
writer, err := NewBanWriterWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanWriter: %v", err)
|
||||||
|
}
|
||||||
|
defer writer.Close()
|
||||||
|
|
||||||
|
err = writer.CreateTable()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create table: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
ip := "192.168.1.1"
|
||||||
|
ttl := "1h"
|
||||||
|
|
||||||
|
err = writer.AddBan(ip, ttl, "test")
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("AddBan failed: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
reader, err := NewBanReaderWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanReader: %v", err)
|
||||||
|
}
|
||||||
|
defer reader.Close()
|
||||||
|
|
||||||
|
isBanned, err := reader.IsBanned(ip)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("IsBanned failed: %v", err)
|
||||||
|
}
|
||||||
|
if !isBanned {
|
||||||
|
t.Error("Expected IP to be banned, but it's not")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestBanWriter_RemoveBan(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
dbPath := filepath.Join(tempDir, "bans_test.db")
|
||||||
|
|
||||||
|
writer, err := NewBanWriterWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanWriter: %v", err)
|
||||||
|
}
|
||||||
|
defer writer.Close()
|
||||||
|
|
||||||
|
err = writer.CreateTable()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create table: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
ip := "192.168.1.2"
|
||||||
|
err = writer.AddBan(ip, "1h", "test")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to add ban: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
reader, err := NewBanReaderWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanReader: %v", err)
|
||||||
|
}
|
||||||
|
defer reader.Close()
|
||||||
|
|
||||||
|
isBanned, err := reader.IsBanned(ip)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("IsBanned failed: %v", err)
|
||||||
|
}
|
||||||
|
if !isBanned {
|
||||||
|
t.Fatal("Expected IP to be banned before removal")
|
||||||
|
}
|
||||||
|
|
||||||
|
err = writer.RemoveBan(ip)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("RemoveBan failed: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
isBanned, err = reader.IsBanned(ip)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("IsBanned failed after removal: %v", err)
|
||||||
|
}
|
||||||
|
if isBanned {
|
||||||
|
t.Error("Expected IP to be unbanned after removal, but it's still banned")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestBanWriter_RemoveExpiredBans(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
dbPath := filepath.Join(tempDir, "bans_test.db")
|
||||||
|
|
||||||
|
writer, err := NewBanWriterWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanWriter: %v", err)
|
||||||
|
}
|
||||||
|
defer writer.Close()
|
||||||
|
|
||||||
|
err = writer.CreateTable()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create table: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
expiredIP := "192.168.1.3"
|
||||||
|
err = writer.AddBan(expiredIP, "-1h", "tes")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to add expired ban: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
activeIP := "192.168.1.4"
|
||||||
|
err = writer.AddBan(activeIP, "1h", "test")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to add active ban: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
removedIPs, err := writer.RemoveExpiredBans()
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("RemoveExpiredBans failed: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
found := false
|
||||||
|
for _, ip := range removedIPs {
|
||||||
|
if ip == expiredIP {
|
||||||
|
found = true
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if !found {
|
||||||
|
t.Error("Expected expired IP to be in removed list")
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(removedIPs) != 1 {
|
||||||
|
t.Errorf("Expected 1 removed IP, got %d", len(removedIPs))
|
||||||
|
}
|
||||||
|
|
||||||
|
reader, err := NewBanReaderWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanReader: %v", err)
|
||||||
|
}
|
||||||
|
defer reader.Close()
|
||||||
|
|
||||||
|
isExpiredBanned, err := reader.IsBanned(expiredIP)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("IsBanned failed for expired IP: %v", err)
|
||||||
|
}
|
||||||
|
if isExpiredBanned {
|
||||||
|
t.Error("Expected expired IP to be unbanned, but it's still banned")
|
||||||
|
}
|
||||||
|
|
||||||
|
isActiveBanned, err := reader.IsBanned(activeIP)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("IsBanned failed for active IP: %v", err)
|
||||||
|
}
|
||||||
|
if !isActiveBanned {
|
||||||
|
t.Error("Expected active IP to still be banned, but it's not")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestBanReader_IsBanned(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
dbPath := filepath.Join(tempDir, "bans_test.db")
|
||||||
|
|
||||||
|
writer, err := NewBanWriterWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanWriter: %v", err)
|
||||||
|
}
|
||||||
|
defer writer.Close()
|
||||||
|
|
||||||
|
err = writer.CreateTable()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create table: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
ip := "192.168.1.5"
|
||||||
|
err = writer.AddBan(ip, "1h", "test")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to add ban: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
reader, err := NewBanReaderWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanReader: %v", err)
|
||||||
|
}
|
||||||
|
defer reader.Close()
|
||||||
|
|
||||||
|
isBanned, err := reader.IsBanned(ip)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("IsBanned failed for banned IP: %v", err)
|
||||||
|
}
|
||||||
|
if !isBanned {
|
||||||
|
t.Error("Expected IP to be banned")
|
||||||
|
}
|
||||||
|
|
||||||
|
isBanned, err = reader.IsBanned("192.168.1.6")
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("IsBanned failed for non-banned IP: %v", err)
|
||||||
|
}
|
||||||
|
if isBanned {
|
||||||
|
t.Error("Expected IP to not be banned")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestBanWriter_Close(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
dbPath := filepath.Join(tempDir, "bans_test.db")
|
||||||
|
|
||||||
|
writer, err := NewBanWriterWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanWriter: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = writer.CreateTable()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create table: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = writer.Close()
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("Close failed: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = writer.db.Exec("SELECT 1")
|
||||||
|
if err == nil {
|
||||||
|
t.Error("Expected error when using closed connection")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestBanReader_Close(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
dbPath := filepath.Join(tempDir, "bans_test.db")
|
||||||
|
|
||||||
|
writer, err := NewBanWriterWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanWriter: %v", err)
|
||||||
|
}
|
||||||
|
defer writer.Close()
|
||||||
|
|
||||||
|
err = writer.CreateTable()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create table: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
reader, err := NewBanReaderWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanReader: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = reader.Close()
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("Close failed: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = reader.db.Query("SELECT 1")
|
||||||
|
if err == nil {
|
||||||
|
t.Error("Expected error when using closed connection")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestBanWriter_AddBan_InvalidDuration(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
dbPath := filepath.Join(tempDir, "bans_test.db")
|
||||||
|
|
||||||
|
writer, err := NewBanWriterWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanWriter: %v", err)
|
||||||
|
}
|
||||||
|
defer writer.Close()
|
||||||
|
|
||||||
|
err = writer.CreateTable()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create table: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = writer.AddBan("192.168.1.7", "invalid_duration", "test")
|
||||||
|
if err == nil {
|
||||||
|
t.Error("Expected error for invalid duration")
|
||||||
|
} else if err.Error() == "" || err.Error() == "<nil>" {
|
||||||
|
t.Error("Expected meaningful error message for invalid duration")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestMultipleBans(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
dbPath := filepath.Join(tempDir, "bans_test.db")
|
||||||
|
|
||||||
|
writer, err := NewBanWriterWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanWriter: %v", err)
|
||||||
|
}
|
||||||
|
defer writer.Close()
|
||||||
|
|
||||||
|
err = writer.CreateTable()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create table: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
ips := []string{"192.168.1.8", "192.168.1.9", "192.168.1.10"}
|
||||||
|
|
||||||
|
for _, ip := range ips {
|
||||||
|
err := writer.AddBan(ip, "1h", "test")
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("Failed to add ban for IP %s: %v", ip, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
reader, err := NewBanReaderWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanReader: %v", err)
|
||||||
|
}
|
||||||
|
defer reader.Close()
|
||||||
|
|
||||||
|
for _, ip := range ips {
|
||||||
|
isBanned, err := reader.IsBanned(ip)
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("IsBanned failed for IP %s: %v", ip, err)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if !isBanned {
|
||||||
|
t.Errorf("Expected IP %s to be banned", ip)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestRemoveNonExistentBan(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
dbPath := filepath.Join(tempDir, "bans_test.db")
|
||||||
|
|
||||||
|
writer, err := NewBanWriterWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create BanWriter: %v", err)
|
||||||
|
}
|
||||||
|
defer writer.Close()
|
||||||
|
|
||||||
|
err = writer.CreateTable()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create table: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
err = writer.RemoveBan("192.168.1.11")
|
||||||
|
if err != nil {
|
||||||
|
t.Errorf("RemoveBan should not return error for non-existent ban: %v", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
func NewBanWriterWithDBPath(dbPath string) (*BanWriter, error) {
|
||||||
|
db, err := sql.Open("sqlite", dbPath+"?_pragma=journal_mode(WAL)&_pragma=busy_timeout(30000)&_pragma=synchronous(NORMAL)")
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
return &BanWriter{
|
||||||
|
logger: logger.New(false),
|
||||||
|
db: db,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewBanReaderWithDBPath(dbPath string) (*BanReader, error) {
|
||||||
|
db, err := sql.Open("sqlite",
|
||||||
|
dbPath+"?"+
|
||||||
|
"mode=ro&"+
|
||||||
|
"_pragma=journal_mode(WAL)&"+
|
||||||
|
"_pragma=mmap_size(268435456)&"+
|
||||||
|
"_pragma=cache_size(-2000)&"+
|
||||||
|
"_pragma=query_only(1)")
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return &BanReader{
|
||||||
|
logger: logger.New(false),
|
||||||
|
db: db,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
@@ -2,59 +2,60 @@ package storage
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"database/sql"
|
"database/sql"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
"github.com/d3m0k1d/BanForge/internal/logger"
|
_ "modernc.org/sqlite"
|
||||||
_ "github.com/mattn/go-sqlite3"
|
|
||||||
)
|
)
|
||||||
|
|
||||||
type DB struct {
|
const (
|
||||||
logger *logger.Logger
|
DBDir = "/var/lib/banforge/"
|
||||||
db *sql.DB
|
ReqDBPath = DBDir + "requests.db"
|
||||||
|
banDBPath = DBDir + "bans.db"
|
||||||
|
)
|
||||||
|
|
||||||
|
var pragmas = map[string]string{
|
||||||
|
`journal_mode`: `wal`,
|
||||||
|
`synchronous`: `normal`,
|
||||||
|
`busy_timeout`: `30000`,
|
||||||
|
// also consider these
|
||||||
|
// `temp_store`: `memory`,
|
||||||
|
// `cache_size`: `1000000000`,
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewDB() (*DB, error) {
|
func buildSqliteDsn(path string, pragmas map[string]string) string {
|
||||||
db, err := sql.Open("sqlite3", "/var/lib/banforge/storage.db")
|
pragmastrs := make([]string, len(pragmas))
|
||||||
if err != nil {
|
i := 0
|
||||||
return nil, err
|
for k, v := range pragmas {
|
||||||
|
pragmastrs[i] = (fmt.Sprintf(`pragma=%s(%s)`, k, v))
|
||||||
|
i++
|
||||||
}
|
}
|
||||||
return &DB{
|
return path + "?" + "mode=rwc&" + strings.Join(pragmastrs, "&")
|
||||||
logger: logger.New(false),
|
|
||||||
db: db,
|
|
||||||
}, nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (d *DB) Close() error {
|
func initDB(dsn, sqlstr string) (err error) {
|
||||||
d.logger.Info("Closing database connection")
|
db, err := sql.Open("sqlite", dsn)
|
||||||
err := d.db.Close()
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to open %q: %w", dsn, err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
closeErr := db.Close()
|
||||||
|
if closeErr != nil {
|
||||||
|
err = errors.Join(err, fmt.Errorf("failed to close %q: %w", dsn, closeErr))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
_, err = db.Exec(sqlstr)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to create table: %w", err)
|
||||||
|
}
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (d *DB) CreateTable() error {
|
func CreateTables() (err error) {
|
||||||
_, err := d.db.Exec(CreateTables)
|
// Requests DB
|
||||||
if err != nil {
|
err1 := initDB(buildSqliteDsn(ReqDBPath, pragmas), CreateRequestsTable)
|
||||||
return err
|
err2 := initDB(buildSqliteDsn(banDBPath, pragmas), CreateBansTable)
|
||||||
}
|
|
||||||
d.logger.Info("Created tables")
|
|
||||||
return nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (d *DB) SearchUnViewed() (*sql.Rows, error) {
|
return errors.Join(err1, err2)
|
||||||
rows, err := d.db.Query("SELECT id, service, ip, path, status, method, viewed, created_at FROM requests WHERE viewed = 0")
|
|
||||||
if err != nil {
|
|
||||||
d.logger.Error("Failed to query database")
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
return rows, nil
|
|
||||||
}
|
|
||||||
|
|
||||||
func (d *DB) MarkAsViewed(id int) error {
|
|
||||||
_, err := d.db.Exec("UPDATE requests SET viewed = 1 WHERE id = ?", id)
|
|
||||||
if err != nil {
|
|
||||||
d.logger.Error("Failed to mark as viewed", "error", err)
|
|
||||||
return err
|
|
||||||
}
|
|
||||||
return nil
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,7 +1,6 @@
|
|||||||
package storage
|
package storage
|
||||||
|
|
||||||
const CreateTables = `
|
const CreateRequestsTable = `
|
||||||
|
|
||||||
CREATE TABLE IF NOT EXISTS requests (
|
CREATE TABLE IF NOT EXISTS requests (
|
||||||
id INTEGER PRIMARY KEY,
|
id INTEGER PRIMARY KEY,
|
||||||
service TEXT NOT NULL,
|
service TEXT NOT NULL,
|
||||||
@@ -9,20 +8,24 @@ CREATE TABLE IF NOT EXISTS requests (
|
|||||||
path TEXT,
|
path TEXT,
|
||||||
method TEXT,
|
method TEXT,
|
||||||
status TEXT,
|
status TEXT,
|
||||||
viewed BOOLEAN DEFAULT FALSE,
|
|
||||||
created_at DATETIME DEFAULT CURRENT_TIMESTAMP
|
created_at DATETIME DEFAULT CURRENT_TIMESTAMP
|
||||||
);
|
);
|
||||||
|
|
||||||
|
CREATE INDEX IF NOT EXISTS idx_requests_service ON requests(service);
|
||||||
|
CREATE INDEX IF NOT EXISTS idx_requests_ip ON requests(ip);
|
||||||
|
CREATE INDEX IF NOT EXISTS idx_requests_status ON requests(status);
|
||||||
|
CREATE INDEX IF NOT EXISTS idx_requests_created_at ON requests(created_at);
|
||||||
|
`
|
||||||
|
|
||||||
|
// Миграция для bans.db
|
||||||
|
const CreateBansTable = `
|
||||||
CREATE TABLE IF NOT EXISTS bans (
|
CREATE TABLE IF NOT EXISTS bans (
|
||||||
id INTEGER PRIMARY KEY,
|
id INTEGER PRIMARY KEY,
|
||||||
ip TEXT UNIQUE NOT NULL,
|
ip TEXT UNIQUE NOT NULL,
|
||||||
reason TEXT,
|
reason TEXT,
|
||||||
banned_at DATETIME DEFAULT CURRENT_TIMESTAMP
|
banned_at DATETIME DEFAULT CURRENT_TIMESTAMP,
|
||||||
|
expired_at DATETIME
|
||||||
);
|
);
|
||||||
|
|
||||||
CREATE INDEX IF NOT EXISTS idx_service ON requests(service);
|
CREATE INDEX IF NOT EXISTS idx_bans_ip ON bans(ip);
|
||||||
CREATE INDEX IF NOT EXISTS idx_ip ON requests(ip);
|
|
||||||
CREATE INDEX IF NOT EXISTS idx_status ON requests(status);
|
|
||||||
CREATE INDEX IF NOT EXISTS idx_created_at ON requests(created_at);
|
|
||||||
CREATE INDEX IF NOT EXISTS idx_ban_ip ON bans(ip);
|
|
||||||
`
|
`
|
||||||
|
|||||||
@@ -7,7 +7,6 @@ type LogEntry struct {
|
|||||||
Path string `db:"path"`
|
Path string `db:"path"`
|
||||||
Status string `db:"status"`
|
Status string `db:"status"`
|
||||||
Method string `db:"method"`
|
Method string `db:"method"`
|
||||||
IsViewed bool `db:"viewed"`
|
|
||||||
CreatedAt string `db:"created_at"`
|
CreatedAt string `db:"created_at"`
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
69
internal/storage/requests_db.go
Normal file
69
internal/storage/requests_db.go
Normal file
@@ -0,0 +1,69 @@
|
|||||||
|
package storage
|
||||||
|
|
||||||
|
import (
|
||||||
|
"database/sql"
|
||||||
|
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/metrics"
|
||||||
|
_ "modernc.org/sqlite"
|
||||||
|
)
|
||||||
|
|
||||||
|
type RequestWriter struct {
|
||||||
|
logger *logger.Logger
|
||||||
|
db *sql.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewRequestsWr() (*RequestWriter, error) {
|
||||||
|
db, err := sql.Open(
|
||||||
|
"sqlite",
|
||||||
|
buildSqliteDsn(ReqDBPath, pragmas),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
db.SetMaxOpenConns(1)
|
||||||
|
db.SetMaxIdleConns(1)
|
||||||
|
db.SetConnMaxLifetime(0)
|
||||||
|
return &RequestWriter{
|
||||||
|
logger: logger.New(false),
|
||||||
|
db: db,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type RequestReader struct {
|
||||||
|
logger *logger.Logger
|
||||||
|
db *sql.DB
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewRequestsRd() (*RequestReader, error) {
|
||||||
|
db, err := sql.Open(
|
||||||
|
"sqlite",
|
||||||
|
buildSqliteDsn(ReqDBPath, pragmas),
|
||||||
|
)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
db.SetMaxOpenConns(1)
|
||||||
|
db.SetMaxIdleConns(1)
|
||||||
|
db.SetConnMaxLifetime(0)
|
||||||
|
return &RequestReader{
|
||||||
|
logger: logger.New(false),
|
||||||
|
db: db,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *RequestReader) IsMaxRetryExceeded(ip string, maxRetry int) (bool, error) {
|
||||||
|
var count int
|
||||||
|
if maxRetry == 0 {
|
||||||
|
return true, nil
|
||||||
|
}
|
||||||
|
err := r.db.QueryRow("SELECT COUNT(*) FROM requests WHERE ip = ?", ip).Scan(&count)
|
||||||
|
if err != nil {
|
||||||
|
r.logger.Error("error query count: " + err.Error())
|
||||||
|
metrics.IncError()
|
||||||
|
return false, err
|
||||||
|
}
|
||||||
|
r.logger.Info("Current request count for IP", "ip", ip, "count", count, "maxRetry", maxRetry)
|
||||||
|
metrics.IncDBOperation("select", "requests")
|
||||||
|
return count >= maxRetry, nil
|
||||||
|
}
|
||||||
@@ -1,22 +1,112 @@
|
|||||||
package storage
|
package storage
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"database/sql"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/metrics"
|
||||||
)
|
)
|
||||||
|
|
||||||
func Write(db *DB, resultCh <-chan *LogEntry) {
|
func WriteReq(db *RequestWriter, resultCh <-chan *LogEntry) {
|
||||||
for result := range resultCh {
|
db.logger.Info("Starting log writer")
|
||||||
_, err := db.db.Exec(
|
const batchSize = 100
|
||||||
|
const flushInterval = 1 * time.Second
|
||||||
|
|
||||||
|
batch := make([]*LogEntry, 0, batchSize)
|
||||||
|
ticker := time.NewTicker(flushInterval)
|
||||||
|
defer ticker.Stop()
|
||||||
|
|
||||||
|
flush := func() {
|
||||||
|
defer db.logger.Debug("Flushed batch", "count", len(batch))
|
||||||
|
err := func() (err error) {
|
||||||
|
if len(batch) == 0 {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
tx, err := db.db.Begin()
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("failed to begin transaction: %w", err)
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if rollbackErr := tx.Rollback(); rollbackErr != nil &&
|
||||||
|
!errors.Is(rollbackErr, sql.ErrTxDone) {
|
||||||
|
err = errors.Join(
|
||||||
|
err,
|
||||||
|
fmt.Errorf("failed to rollback transaction: %w", rollbackErr),
|
||||||
|
)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
stmt, err := tx.Prepare(
|
||||||
"INSERT INTO requests (service, ip, path, method, status, created_at) VALUES (?, ?, ?, ?, ?, ?)",
|
"INSERT INTO requests (service, ip, path, method, status, created_at) VALUES (?, ?, ?, ?, ?, ?)",
|
||||||
result.Service,
|
)
|
||||||
result.IP,
|
if err != nil {
|
||||||
result.Path,
|
err = fmt.Errorf("failed to prepare statement: %w", err)
|
||||||
result.Method,
|
return err
|
||||||
result.Status,
|
}
|
||||||
|
defer func() {
|
||||||
|
if closeErr := stmt.Close(); closeErr != nil {
|
||||||
|
err = errors.Join(err, fmt.Errorf("failed to close statement: %w", closeErr))
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
for _, entry := range batch {
|
||||||
|
_, err := stmt.Exec(
|
||||||
|
entry.Service,
|
||||||
|
entry.IP,
|
||||||
|
entry.Path,
|
||||||
|
entry.Method,
|
||||||
|
entry.Status,
|
||||||
time.Now().Format(time.RFC3339),
|
time.Now().Format(time.RFC3339),
|
||||||
)
|
)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
db.logger.Error("Failed to write to database", "error", err)
|
db.logger.Error(fmt.Errorf("failed to insert entry: %w", err).Error())
|
||||||
|
metrics.IncError()
|
||||||
|
} else {
|
||||||
|
metrics.IncRequestCount(entry.Service)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := tx.Commit(); err != nil {
|
||||||
|
return fmt.Errorf("failed to commit transaction: %w", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
batch = batch[:0]
|
||||||
|
metrics.IncDBOperation("insert", "requests")
|
||||||
|
return err
|
||||||
|
}()
|
||||||
|
if err != nil {
|
||||||
|
db.logger.Error(err.Error())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case result, ok := <-resultCh:
|
||||||
|
if !ok {
|
||||||
|
flush()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
batch = append(batch, result)
|
||||||
|
if len(batch) >= batchSize {
|
||||||
|
flush()
|
||||||
|
}
|
||||||
|
|
||||||
|
case <-ticker.C:
|
||||||
|
flush()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (w *RequestWriter) GetRequestCount() (int, error) {
|
||||||
|
var count int
|
||||||
|
err := w.db.QueryRow("SELECT COUNT(*) FROM requests").Scan(&count)
|
||||||
|
return count, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *RequestWriter) Close() error {
|
||||||
|
return w.db.Close()
|
||||||
|
}
|
||||||
|
|||||||
301
internal/storage/writer_test.go
Normal file
301
internal/storage/writer_test.go
Normal file
@@ -0,0 +1,301 @@
|
|||||||
|
package storage
|
||||||
|
|
||||||
|
import (
|
||||||
|
"database/sql"
|
||||||
|
"github.com/d3m0k1d/BanForge/internal/logger"
|
||||||
|
_ "modernc.org/sqlite"
|
||||||
|
"path/filepath"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestWrite_BatchInsert(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
dbPath := filepath.Join(tempDir, "requests_test.db")
|
||||||
|
|
||||||
|
writer, err := NewRequestWriterWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create RequestWriter: %v", err)
|
||||||
|
}
|
||||||
|
defer writer.Close()
|
||||||
|
|
||||||
|
err = writer.CreateTable()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create table: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
resultCh := make(chan *LogEntry, 100)
|
||||||
|
|
||||||
|
done := make(chan bool)
|
||||||
|
go func() {
|
||||||
|
WriteReq(writer, resultCh)
|
||||||
|
close(done)
|
||||||
|
}()
|
||||||
|
|
||||||
|
entries := []*LogEntry{
|
||||||
|
{Service: "service1", IP: "192.168.1.1", Path: "/path1", Method: "GET", Status: "200"},
|
||||||
|
{Service: "service2", IP: "192.168.1.2", Path: "/path2", Method: "POST", Status: "404"},
|
||||||
|
{Service: "service3", IP: "192.168.1.3", Path: "/path3", Method: "PUT", Status: "500"},
|
||||||
|
{Service: "service4", IP: "192.168.1.4", Path: "/path4", Method: "DELETE", Status: "200"},
|
||||||
|
{Service: "service5", IP: "192.168.1.5", Path: "/path5", Method: "GET", Status: "301"},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, entry := range entries {
|
||||||
|
resultCh <- entry
|
||||||
|
}
|
||||||
|
|
||||||
|
close(resultCh)
|
||||||
|
<-done
|
||||||
|
|
||||||
|
count, err := writer.GetRequestCount()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to get request count: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if count != len(entries) {
|
||||||
|
t.Errorf("Expected %d entries, got %d", len(entries), count)
|
||||||
|
}
|
||||||
|
rows, err := writer.db.Query("SELECT service, ip, path, method, status FROM requests ORDER BY id")
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to query requests: %v", err)
|
||||||
|
}
|
||||||
|
defer rows.Close()
|
||||||
|
|
||||||
|
i := 0
|
||||||
|
for rows.Next() {
|
||||||
|
var service, ip, path, method, status string
|
||||||
|
err := rows.Scan(&service, &ip, &path, &method, &status)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to scan row: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if i >= len(entries) {
|
||||||
|
t.Fatal("More rows returned than expected")
|
||||||
|
}
|
||||||
|
|
||||||
|
expected := entries[i]
|
||||||
|
if service != expected.Service {
|
||||||
|
t.Errorf("Expected service %s, got %s", expected.Service, service)
|
||||||
|
}
|
||||||
|
if ip != expected.IP {
|
||||||
|
t.Errorf("Expected IP %s, got %s", expected.IP, ip)
|
||||||
|
}
|
||||||
|
if path != expected.Path {
|
||||||
|
t.Errorf("Expected path %s, got %s", expected.Path, path)
|
||||||
|
}
|
||||||
|
if method != expected.Method {
|
||||||
|
t.Errorf("Expected method %s, got %s", expected.Method, method)
|
||||||
|
}
|
||||||
|
if status != expected.Status {
|
||||||
|
t.Errorf("Expected status %s, got %s", expected.Status, status)
|
||||||
|
}
|
||||||
|
|
||||||
|
i++
|
||||||
|
}
|
||||||
|
|
||||||
|
if i != len(entries) {
|
||||||
|
t.Errorf("Expected to read %d entries, got %d", len(entries), i)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestWrite_BatchSizeTrigger(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
dbPath := filepath.Join(tempDir, "requests_test.db")
|
||||||
|
|
||||||
|
writer, err := NewRequestWriterWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create RequestWriter: %v", err)
|
||||||
|
}
|
||||||
|
defer writer.Close()
|
||||||
|
|
||||||
|
err = writer.CreateTable()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create table: %v", err)
|
||||||
|
}
|
||||||
|
resultCh := make(chan *LogEntry, 100)
|
||||||
|
done := make(chan bool)
|
||||||
|
go func() {
|
||||||
|
WriteReq(writer, resultCh)
|
||||||
|
close(done)
|
||||||
|
}()
|
||||||
|
|
||||||
|
batchSize := 100
|
||||||
|
entries := make([]*LogEntry, batchSize)
|
||||||
|
for i := 0; i < batchSize; i++ {
|
||||||
|
entries[i] = &LogEntry{
|
||||||
|
Service: "service" + string(rune(i+'0')),
|
||||||
|
IP: "192.168.1." + string(rune(i+'0')),
|
||||||
|
Path: "/path" + string(rune(i+'0')),
|
||||||
|
Method: "GET",
|
||||||
|
Status: "200",
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, entry := range entries {
|
||||||
|
resultCh <- entry
|
||||||
|
}
|
||||||
|
|
||||||
|
close(resultCh)
|
||||||
|
<-done
|
||||||
|
|
||||||
|
count, err := writer.GetRequestCount()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to get request count: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if count != batchSize {
|
||||||
|
t.Errorf("Expected %d entries, got %d", batchSize, count)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestWrite_FlushInterval(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
dbPath := filepath.Join(tempDir, "requests_test.db")
|
||||||
|
|
||||||
|
writer, err := NewRequestWriterWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create RequestWriter: %v", err)
|
||||||
|
}
|
||||||
|
defer writer.Close()
|
||||||
|
|
||||||
|
err = writer.CreateTable()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create table: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
resultCh := make(chan *LogEntry, 100)
|
||||||
|
|
||||||
|
done := make(chan bool)
|
||||||
|
go func() {
|
||||||
|
WriteReq(writer, resultCh)
|
||||||
|
close(done)
|
||||||
|
}()
|
||||||
|
|
||||||
|
entries := []*LogEntry{
|
||||||
|
{Service: "service1", IP: "192.168.1.1", Path: "/path1", Method: "GET", Status: "200"},
|
||||||
|
{Service: "service2", IP: "192.168.1.2", Path: "/path2", Method: "POST", Status: "404"},
|
||||||
|
{Service: "service3", IP: "192.168.1.3", Path: "/path3", Method: "PUT", Status: "500"},
|
||||||
|
{Service: "service4", IP: "192.168.1.4", Path: "/path4", Method: "DELETE", Status: "200"},
|
||||||
|
{Service: "service5", IP: "192.168.1.5", Path: "/path5", Method: "GET", Status: "301"},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, entry := range entries {
|
||||||
|
resultCh <- entry
|
||||||
|
}
|
||||||
|
time.Sleep(1500 * time.Millisecond)
|
||||||
|
|
||||||
|
close(resultCh)
|
||||||
|
<-done
|
||||||
|
|
||||||
|
count, err := writer.GetRequestCount()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to get request count: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if count != len(entries) {
|
||||||
|
t.Errorf("Expected %d entries, got %d", len(entries), count)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestWrite_EmptyBatch(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
dbPath := filepath.Join(tempDir, "requests_test.db")
|
||||||
|
|
||||||
|
writer, err := NewRequestWriterWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create RequestWriter: %v", err)
|
||||||
|
}
|
||||||
|
defer writer.Close()
|
||||||
|
|
||||||
|
err = writer.CreateTable()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create table: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
resultCh := make(chan *LogEntry, 100)
|
||||||
|
|
||||||
|
done := make(chan bool)
|
||||||
|
go func() {
|
||||||
|
WriteReq(writer, resultCh)
|
||||||
|
close(done)
|
||||||
|
}()
|
||||||
|
|
||||||
|
close(resultCh)
|
||||||
|
<-done
|
||||||
|
count, err := writer.GetRequestCount()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to get request count: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if count != 0 {
|
||||||
|
t.Errorf("Expected 0 entries for empty batch, got %d", count)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestWrite_ChannelClosed(t *testing.T) {
|
||||||
|
tempDir := t.TempDir()
|
||||||
|
dbPath := filepath.Join(tempDir, "requests_test.db")
|
||||||
|
|
||||||
|
writer, err := NewRequestWriterWithDBPath(dbPath)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create RequestWriter: %v", err)
|
||||||
|
}
|
||||||
|
defer writer.Close()
|
||||||
|
|
||||||
|
err = writer.CreateTable()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to create table: %v", err)
|
||||||
|
}
|
||||||
|
resultCh := make(chan *LogEntry, 100)
|
||||||
|
|
||||||
|
done := make(chan bool)
|
||||||
|
go func() {
|
||||||
|
WriteReq(writer, resultCh)
|
||||||
|
close(done)
|
||||||
|
}()
|
||||||
|
|
||||||
|
entries := []*LogEntry{
|
||||||
|
{Service: "service1", IP: "192.168.1.1", Path: "/path1", Method: "GET", Status: "200"},
|
||||||
|
{Service: "service2", IP: "192.168.1.2", Path: "/path2", Method: "POST", Status: "404"},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, entry := range entries {
|
||||||
|
resultCh <- entry
|
||||||
|
}
|
||||||
|
|
||||||
|
close(resultCh)
|
||||||
|
|
||||||
|
<-done
|
||||||
|
|
||||||
|
count, err := writer.GetRequestCount()
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("Failed to get request count: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if count != len(entries) {
|
||||||
|
t.Errorf("Expected %d entries, got %d", len(entries), count)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func NewRequestWriterWithDBPath(dbPath string) (*RequestWriter, error) {
|
||||||
|
db, err := sql.Open("sqlite", dbPath+"?_pragma=journal_mode(WAL)&_pragma=busy_timeout(30000)&_pragma=synchronous(NORMAL)")
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
db.SetMaxOpenConns(1)
|
||||||
|
db.SetMaxIdleConns(1)
|
||||||
|
db.SetConnMaxLifetime(0)
|
||||||
|
return &RequestWriter{
|
||||||
|
logger: logger.New(false),
|
||||||
|
db: db,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (w *RequestWriter) CreateTable() error {
|
||||||
|
_, err := w.db.Exec(CreateRequestsTable)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
w.logger.Info("Created requests table")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user