From 6ae69306c23058a386b3d8d360fe5e666e42e499 Mon Sep 17 00:00:00 2001 From: Pavel Loginov <aidaho@roxy-wi.org> Date: Sun, 24 Jul 2022 22:36:05 +0300 Subject: [PATCH] v6.1.2.0 Change log: https://roxy-wi.org/changelog.py#6_1_2 --- .github/workflows/fortify.yml | 98 ------------------- .github/workflows/pysa.yml | 50 ---------- app/funct.py | 30 ++++-- .../haproxy/templates/haproxy_rsyslog.conf.j2 | 2 + .../roles/keepalived/tasks/install.yml | 2 - .../keepalived/templates/keepalived.conf.j2 | 2 +- .../keepalived/templates/rsyslog.conf.j2 | 1 + app/templates/ajax/show_configs_files.html | 11 ++- 8 files changed, 34 insertions(+), 162 deletions(-) delete mode 100644 .github/workflows/fortify.yml delete mode 100644 .github/workflows/pysa.yml diff --git a/.github/workflows/fortify.yml b/.github/workflows/fortify.yml deleted file mode 100644 index 4b59b5e6..00000000 --- a/.github/workflows/fortify.yml +++ /dev/null @@ -1,98 +0,0 @@ -# This workflow uses actions that are not certified by GitHub. -# They are provided by a third-party and are governed by -# separate terms of service, privacy policy, and support -# documentation. - -################################################################################################################################################ -# Fortify lets you build secure software fast with an appsec platform that automates testing throughout the DevSecOps pipeline. Fortify static,# -# dynamic, interactive, and runtime security testing is available on premises or as a service. To learn more about Fortify, start a free trial # -# or contact our sales team, visit microfocus.com/appsecurity. # -# # -# Use this workflow template as a basis for integrating Fortify on Demand Static Application Security Testing(SAST) into your GitHub workflows.# -# This template demonstrates the steps to prepare the code+dependencies, initiate a scan, download results once complete and import into # -# GitHub Security Code Scanning Alerts. Existing customers should review inputs and environment variables below to configure scanning against # -# an existing application in your Fortify on Demand tenant. Additional information is available in the comments throughout the workflow, the # -# documentation for the Fortify actions used, and the Fortify on Demand / ScanCentral Client product documentation. If you need additional # -# assistance with configuration, feel free to create a help ticket in the Fortify on Demand portal. # -################################################################################################################################################ - -name: Fortify on Demand Scan - -# TODO: Customize trigger events based on your DevSecOps processes and typical FoD SAST scan time -on: - workflow_dispatch: - push: - branches: [ "master" ] - schedule: - - cron: '43 17 * * 5' - -jobs: - FoD-SAST-Scan: - # Use the appropriate runner for building your source code. - # TODO: Use a Windows runner for .NET projects that use msbuild. Additional changes to RUN commands will be required to switch to Windows syntax. - runs-on: ubuntu-latest - permissions: - actions: read - contents: read - security-events: write - - steps: - # Check out source code - - name: Check Out Source Code - uses: actions/checkout@v3 - - # Java is required to run the various Fortify utilities. - # When scanning a Java application, please use the appropriate Java version for building your application. - - name: Setup Java - uses: actions/setup-java@v3 - with: - java-version: 8 - distribution: 'temurin' - - # Prepare source+dependencies for upload. The default example is for a Maven project that uses pom.xml. - # TODO: Update PACKAGE_OPTS based on the ScanCentral Client documentation for your project's included tech stack(s). Helpful hints: - # ScanCentral Client will download dependencies for maven (-bt mvn) and gradle (-bt gradle). - # ScanCentral Client can download dependencies for msbuild projects (-bt msbuild); however, you must convert the workflow to use a Windows runner. - # ScanCentral has additional options that should be set for PHP and Python projects - # For other build tools, add your build commands to download necessary dependencies and prepare according to Fortify on Demand Packaging documentation. - # ScanCentral Client documentation is located at https://www.microfocus.com/documentation/fortify-software-security-center/ - - name: Download Fortify ScanCentral Client - uses: fortify/gha-setup-scancentral-client@5b7382f8234fb9840958c49d5f32ae854115f9f3 - - name: Package Code + Dependencies - run: scancentral package $PACKAGE_OPTS -o package.zip - env: - PACKAGE_OPTS: "-bt mvn" - - # Start Fortify on Demand SAST scan and wait until results complete. For more information on FoDUploader commands, see https://github.com/fod-dev/fod-uploader-java - # TODO: Update ENV variables for your application and create the necessary GitHub Secrets. Helpful hints: - # Credentials and release ID should be obtained from your FoD tenant (either Personal Access Token or API Key can be used). - # Automated Audit preference should be configured for the release's Static Scan Settings in the Fortify on Demand portal. - - name: Download Fortify on Demand Universal CI Tool - uses: fortify/gha-setup-fod-uploader@6e6bb8a33cb476e240929fa8ebc739ff110e7433 - - name: Perform SAST Scan - run: java -jar $FOD_UPLOAD_JAR -z package.zip -aurl $FOD_API_URL -purl $FOD_URL -rid "$FOD_RELEASE_ID" -tc "$FOD_TENANT" -uc "$FOD_USER" "$FOD_PAT" $FOD_UPLOADER_OPTS -n "$FOD_UPLOADER_NOTES" - env: - FOD_URL: "https://ams.fortify.com/" - FOD_API_URL: "https://api.ams.fortify.com/" - FOD_TENANT: ${{ secrets.FOD_TENANT }} - FOD_USER: ${{ secrets.FOD_USER }} - FOD_PAT: ${{ secrets.FOD_PAT }} - FOD_RELEASE_ID: ${{ secrets.FOD_RELEASE_ID }} - FOD_UPLOADER_OPTS: "-ep 2 -pp 0 -I 1 -apf" - FOD_UPLOADER_NOTES: 'Triggered by GitHub Actions (${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }})' - - # Once scan completes, pull SAST issues from Fortify on Demand and generate SARIF output. - - name: Export results to GitHub-optimized SARIF - uses: fortify/gha-export-vulnerabilities@fcb374411cff9809028c911dabb8b57dbdae623b - with: - fod_base_url: "https://ams.fortify.com/" - fod_tenant: ${{ secrets.FOD_TENANT }} - fod_user: ${{ secrets.FOD_USER }} - fod_password: ${{ secrets.FOD_PAT }} - fod_release_id: ${{ secrets.FOD_RELEASE_ID }} - - # Import Fortify on Demand results to GitHub Security Code Scanning - - name: Import Results - uses: github/codeql-action/upload-sarif@v2 - with: - sarif_file: ./gh-fortify-sast.sarif diff --git a/.github/workflows/pysa.yml b/.github/workflows/pysa.yml deleted file mode 100644 index d7bde84b..00000000 --- a/.github/workflows/pysa.yml +++ /dev/null @@ -1,50 +0,0 @@ -# This workflow uses actions that are not certified by GitHub. -# They are provided by a third-party and are governed by -# separate terms of service, privacy policy, and support -# documentation. - -# This workflow integrates Python Static Analyzer (Pysa) with -# GitHub's Code Scanning feature. -# -# Python Static Analyzer (Pysa) is a security-focused static -# analysis tool that tracks flows of data from where they -# originate to where they terminate in a dangerous location. -# -# See https://pyre-check.org/docs/pysa-basics/ - -name: Pysa - -on: - workflow_dispatch: - push: - branches: [ "master" ] - pull_request: - branches: [ "master" ] - schedule: - - cron: '30 23 * * 2' - -permissions: - contents: read - -jobs: - pysa: - permissions: - actions: read - contents: read - security-events: write - - runs-on: ubuntu-latest - steps: - - uses: actions/checkout@v3 - with: - submodules: true - - - name: Run Pysa - uses: facebook/pysa-action@f46a63777e59268613bd6e2ff4e29f144ca9e88b - with: - # To customize these inputs: - # See https://github.com/facebook/pysa-action#inputs - repo-directory: './' - requirements-path: 'requirements.txt' - infer-types: true - include-default-sapp-filters: true diff --git a/app/funct.py b/app/funct.py index caac35ae..df102099 100644 --- a/app/funct.py +++ b/app/funct.py @@ -941,6 +941,10 @@ def upload_and_restart(server_ip, cfg, **kwargs): service = 'keepalived' config_path = sql.get_setting('keepalived_config_path') tmp_file = sql.get_setting('tmp_config_path') + "/" + get_data('config') + ".cfg" + elif kwargs.get('waf'): + service = 'waf' + config_path = kwargs.get('config_file_name') + tmp_file = sql.get_setting('tmp_config_path') + "/" + get_data('config') + ".conf" else: service = 'haproxy' config_path = sql.get_setting('haproxy_config_path') @@ -1019,6 +1023,12 @@ def upload_and_restart(server_ip, cfg, **kwargs): commands = [check_and_move + reload_or_restart_command] # if sql.return_firewall(server_ip): # commands[0] += open_port_firewalld(cfg, server_ip=server_ip, service='nginx') + elif service == 'waf': + check_and_move = "sudo mv -f " + tmp_file + " " + config_path + if action == "save": + commands = [check_and_move] + else: + commands = [check_and_move + reload_or_restart_command] else: if is_docker == '1': check_config = "sudo docker exec -it " + container_name + " haproxy -c -f " + tmp_file @@ -1044,7 +1054,7 @@ def upload_and_restart(server_ip, cfg, **kwargs): logging('localhost', str(e), haproxywi=1) # If master then save version of config in a new way - if not kwargs.get('slave'): + if not kwargs.get('slave') and service != 'waf': from pathlib import Path diff = '' @@ -1109,14 +1119,15 @@ def master_slave_upload_and_restart(server_ip, cfg, just_save, **kwargs): for master in masters: if master[0] is not None: slv_output = upload_and_restart( - master[0], cfg, just_save=just_save, nginx=kwargs.get('nginx'), + master[0], cfg, just_save=just_save, nginx=kwargs.get('nginx'), waf=kwargs.get('waf'), apache=kwargs.get('apache'), config_file_name=kwargs.get('config_file_name'), slave=1 ) slave_output += '<br>' + master[1] + ':\n' + slv_output output = upload_and_restart( - server_ip, cfg, just_save=just_save, nginx=kwargs.get('nginx'), apache=kwargs.get('apache'), - config_file_name=kwargs.get('config_file_name'), oldcfg=kwargs.get('oldcfg'), login=login + server_ip, cfg, just_save=just_save, nginx=kwargs.get('nginx'), waf=kwargs.get('waf'), + apache=kwargs.get('apache'), config_file_name=kwargs.get('config_file_name'), + oldcfg=kwargs.get('oldcfg'), login=login ) output = server_name + ':\n' + output @@ -1253,10 +1264,13 @@ def show_finding_in_config(stdout: str, **kwargs) -> str: def show_haproxy_log(serv, rows=10, waf='0', grep=None, hour='00', minut='00', hour1='24', minut1='00', service='haproxy', **kwargs): import sql - exgrep = form.getvalue('exgrep') - log_file = form.getvalue('file') - date = hour + ':' + minut - date1 = hour1 + ':' + minut1 + exgrep = checkAjaxInput(form.getvalue('exgrep')) + log_file = checkAjaxInput(form.getvalue('file')) + date = checkAjaxInput(hour) + ':' + checkAjaxInput(minut) + date1 = checkAjaxInput(hour1) + ':' + checkAjaxInput(minut1) + grep = checkAjaxInput(grep) + rows = checkAjaxInput(rows) + waf = checkAjaxInput(waf) cmd = '' if grep is not None: diff --git a/app/scripts/ansible/roles/haproxy/templates/haproxy_rsyslog.conf.j2 b/app/scripts/ansible/roles/haproxy/templates/haproxy_rsyslog.conf.j2 index 420d98ce..212449d8 100644 --- a/app/scripts/ansible/roles/haproxy/templates/haproxy_rsyslog.conf.j2 +++ b/app/scripts/ansible/roles/haproxy/templates/haproxy_rsyslog.conf.j2 @@ -1,6 +1,8 @@ $ModLoad imudp $UDPServerAddress 127.0.0.1 $UDPServerRun 514 +module(load="builtin:omfile") + if $programname startswith 'haproxy' then { if $syslogseverity == 6 then diff --git a/app/scripts/ansible/roles/keepalived/tasks/install.yml b/app/scripts/ansible/roles/keepalived/tasks/install.yml index 438d5ec8..4fcb380c 100644 --- a/app/scripts/ansible/roles/keepalived/tasks/install.yml +++ b/app/scripts/ansible/roles/keepalived/tasks/install.yml @@ -61,8 +61,6 @@ src: keepalived.conf.j2 dest: /etc/keepalived/keepalived.conf mode: 0644 - notify: restart keepalived - - name: test to see if selinux is running command: getenforce diff --git a/app/scripts/ansible/roles/keepalived/templates/keepalived.conf.j2 b/app/scripts/ansible/roles/keepalived/templates/keepalived.conf.j2 index ab61f73c..18564299 100644 --- a/app/scripts/ansible/roles/keepalived/templates/keepalived.conf.j2 +++ b/app/scripts/ansible/roles/keepalived/templates/keepalived.conf.j2 @@ -3,7 +3,7 @@ global_defs { } #health-check for keepalive vrrp_script chk_haproxy { - script "/usr/bin/killall -0 haproxy" + script "systemctl is-active --quiet haproxy" interval 2 weight 3 } diff --git a/app/scripts/ansible/roles/keepalived/templates/rsyslog.conf.j2 b/app/scripts/ansible/roles/keepalived/templates/rsyslog.conf.j2 index a909505c..d5eeeb43 100644 --- a/app/scripts/ansible/roles/keepalived/templates/rsyslog.conf.j2 +++ b/app/scripts/ansible/roles/keepalived/templates/rsyslog.conf.j2 @@ -1,6 +1,7 @@ $ModLoad imudp $UDPServerAddress 127.0.0.1 $UDPServerRun 514 +module(load="builtin:omfile") if $programname startswith 'Keepalived_vrrp' then { if $syslogseverity == 6 then diff --git a/app/templates/ajax/show_configs_files.html b/app/templates/ajax/show_configs_files.html index 798abc8d..6d70278c 100644 --- a/app/templates/ajax/show_configs_files.html +++ b/app/templates/ajax/show_configs_files.html @@ -36,9 +36,14 @@ </div> <div id="add-new-config" style="display: none"> - <div style="padding-top: 15px;"> - Config file name: {{ input('new_config_name', type='text', placeholder='conf.d/config_name', title='Format: sub-directory/config_name') }} - {{ input('path_config_name', type='hidden', value=path_dir) }} + <table class="overview"> + {% include 'include/tr_validate_tips.html' %} + <tr> + <td class="padding20">Config file name:</td> + <td>{{ input('new_config_name', type='text', placeholder='conf.d/config_name', title='Format: sub-directory/config_name') }}</td> + </tr> + {{ input('path_config_name', type='hidden', value=path_dir) }} + </table> </div> </div> <script>