mirror of https://github.com/Aidaho12/haproxy-wi
parent
8275b1f1f8
commit
6ae69306c2
|
@ -1,98 +0,0 @@
|
||||||
# This workflow uses actions that are not certified by GitHub.
|
|
||||||
# They are provided by a third-party and are governed by
|
|
||||||
# separate terms of service, privacy policy, and support
|
|
||||||
# documentation.
|
|
||||||
|
|
||||||
################################################################################################################################################
|
|
||||||
# Fortify lets you build secure software fast with an appsec platform that automates testing throughout the DevSecOps pipeline. Fortify static,#
|
|
||||||
# dynamic, interactive, and runtime security testing is available on premises or as a service. To learn more about Fortify, start a free trial #
|
|
||||||
# or contact our sales team, visit microfocus.com/appsecurity. #
|
|
||||||
# #
|
|
||||||
# Use this workflow template as a basis for integrating Fortify on Demand Static Application Security Testing(SAST) into your GitHub workflows.#
|
|
||||||
# This template demonstrates the steps to prepare the code+dependencies, initiate a scan, download results once complete and import into #
|
|
||||||
# GitHub Security Code Scanning Alerts. Existing customers should review inputs and environment variables below to configure scanning against #
|
|
||||||
# an existing application in your Fortify on Demand tenant. Additional information is available in the comments throughout the workflow, the #
|
|
||||||
# documentation for the Fortify actions used, and the Fortify on Demand / ScanCentral Client product documentation. If you need additional #
|
|
||||||
# assistance with configuration, feel free to create a help ticket in the Fortify on Demand portal. #
|
|
||||||
################################################################################################################################################
|
|
||||||
|
|
||||||
name: Fortify on Demand Scan
|
|
||||||
|
|
||||||
# TODO: Customize trigger events based on your DevSecOps processes and typical FoD SAST scan time
|
|
||||||
on:
|
|
||||||
workflow_dispatch:
|
|
||||||
push:
|
|
||||||
branches: [ "master" ]
|
|
||||||
schedule:
|
|
||||||
- cron: '43 17 * * 5'
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
FoD-SAST-Scan:
|
|
||||||
# Use the appropriate runner for building your source code.
|
|
||||||
# TODO: Use a Windows runner for .NET projects that use msbuild. Additional changes to RUN commands will be required to switch to Windows syntax.
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
permissions:
|
|
||||||
actions: read
|
|
||||||
contents: read
|
|
||||||
security-events: write
|
|
||||||
|
|
||||||
steps:
|
|
||||||
# Check out source code
|
|
||||||
- name: Check Out Source Code
|
|
||||||
uses: actions/checkout@v3
|
|
||||||
|
|
||||||
# Java is required to run the various Fortify utilities.
|
|
||||||
# When scanning a Java application, please use the appropriate Java version for building your application.
|
|
||||||
- name: Setup Java
|
|
||||||
uses: actions/setup-java@v3
|
|
||||||
with:
|
|
||||||
java-version: 8
|
|
||||||
distribution: 'temurin'
|
|
||||||
|
|
||||||
# Prepare source+dependencies for upload. The default example is for a Maven project that uses pom.xml.
|
|
||||||
# TODO: Update PACKAGE_OPTS based on the ScanCentral Client documentation for your project's included tech stack(s). Helpful hints:
|
|
||||||
# ScanCentral Client will download dependencies for maven (-bt mvn) and gradle (-bt gradle).
|
|
||||||
# ScanCentral Client can download dependencies for msbuild projects (-bt msbuild); however, you must convert the workflow to use a Windows runner.
|
|
||||||
# ScanCentral has additional options that should be set for PHP and Python projects
|
|
||||||
# For other build tools, add your build commands to download necessary dependencies and prepare according to Fortify on Demand Packaging documentation.
|
|
||||||
# ScanCentral Client documentation is located at https://www.microfocus.com/documentation/fortify-software-security-center/
|
|
||||||
- name: Download Fortify ScanCentral Client
|
|
||||||
uses: fortify/gha-setup-scancentral-client@5b7382f8234fb9840958c49d5f32ae854115f9f3
|
|
||||||
- name: Package Code + Dependencies
|
|
||||||
run: scancentral package $PACKAGE_OPTS -o package.zip
|
|
||||||
env:
|
|
||||||
PACKAGE_OPTS: "-bt mvn"
|
|
||||||
|
|
||||||
# Start Fortify on Demand SAST scan and wait until results complete. For more information on FoDUploader commands, see https://github.com/fod-dev/fod-uploader-java
|
|
||||||
# TODO: Update ENV variables for your application and create the necessary GitHub Secrets. Helpful hints:
|
|
||||||
# Credentials and release ID should be obtained from your FoD tenant (either Personal Access Token or API Key can be used).
|
|
||||||
# Automated Audit preference should be configured for the release's Static Scan Settings in the Fortify on Demand portal.
|
|
||||||
- name: Download Fortify on Demand Universal CI Tool
|
|
||||||
uses: fortify/gha-setup-fod-uploader@6e6bb8a33cb476e240929fa8ebc739ff110e7433
|
|
||||||
- name: Perform SAST Scan
|
|
||||||
run: java -jar $FOD_UPLOAD_JAR -z package.zip -aurl $FOD_API_URL -purl $FOD_URL -rid "$FOD_RELEASE_ID" -tc "$FOD_TENANT" -uc "$FOD_USER" "$FOD_PAT" $FOD_UPLOADER_OPTS -n "$FOD_UPLOADER_NOTES"
|
|
||||||
env:
|
|
||||||
FOD_URL: "https://ams.fortify.com/"
|
|
||||||
FOD_API_URL: "https://api.ams.fortify.com/"
|
|
||||||
FOD_TENANT: ${{ secrets.FOD_TENANT }}
|
|
||||||
FOD_USER: ${{ secrets.FOD_USER }}
|
|
||||||
FOD_PAT: ${{ secrets.FOD_PAT }}
|
|
||||||
FOD_RELEASE_ID: ${{ secrets.FOD_RELEASE_ID }}
|
|
||||||
FOD_UPLOADER_OPTS: "-ep 2 -pp 0 -I 1 -apf"
|
|
||||||
FOD_UPLOADER_NOTES: 'Triggered by GitHub Actions (${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }})'
|
|
||||||
|
|
||||||
# Once scan completes, pull SAST issues from Fortify on Demand and generate SARIF output.
|
|
||||||
- name: Export results to GitHub-optimized SARIF
|
|
||||||
uses: fortify/gha-export-vulnerabilities@fcb374411cff9809028c911dabb8b57dbdae623b
|
|
||||||
with:
|
|
||||||
fod_base_url: "https://ams.fortify.com/"
|
|
||||||
fod_tenant: ${{ secrets.FOD_TENANT }}
|
|
||||||
fod_user: ${{ secrets.FOD_USER }}
|
|
||||||
fod_password: ${{ secrets.FOD_PAT }}
|
|
||||||
fod_release_id: ${{ secrets.FOD_RELEASE_ID }}
|
|
||||||
|
|
||||||
# Import Fortify on Demand results to GitHub Security Code Scanning
|
|
||||||
- name: Import Results
|
|
||||||
uses: github/codeql-action/upload-sarif@v2
|
|
||||||
with:
|
|
||||||
sarif_file: ./gh-fortify-sast.sarif
|
|
|
@ -1,50 +0,0 @@
|
||||||
# This workflow uses actions that are not certified by GitHub.
|
|
||||||
# They are provided by a third-party and are governed by
|
|
||||||
# separate terms of service, privacy policy, and support
|
|
||||||
# documentation.
|
|
||||||
|
|
||||||
# This workflow integrates Python Static Analyzer (Pysa) with
|
|
||||||
# GitHub's Code Scanning feature.
|
|
||||||
#
|
|
||||||
# Python Static Analyzer (Pysa) is a security-focused static
|
|
||||||
# analysis tool that tracks flows of data from where they
|
|
||||||
# originate to where they terminate in a dangerous location.
|
|
||||||
#
|
|
||||||
# See https://pyre-check.org/docs/pysa-basics/
|
|
||||||
|
|
||||||
name: Pysa
|
|
||||||
|
|
||||||
on:
|
|
||||||
workflow_dispatch:
|
|
||||||
push:
|
|
||||||
branches: [ "master" ]
|
|
||||||
pull_request:
|
|
||||||
branches: [ "master" ]
|
|
||||||
schedule:
|
|
||||||
- cron: '30 23 * * 2'
|
|
||||||
|
|
||||||
permissions:
|
|
||||||
contents: read
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
pysa:
|
|
||||||
permissions:
|
|
||||||
actions: read
|
|
||||||
contents: read
|
|
||||||
security-events: write
|
|
||||||
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v3
|
|
||||||
with:
|
|
||||||
submodules: true
|
|
||||||
|
|
||||||
- name: Run Pysa
|
|
||||||
uses: facebook/pysa-action@f46a63777e59268613bd6e2ff4e29f144ca9e88b
|
|
||||||
with:
|
|
||||||
# To customize these inputs:
|
|
||||||
# See https://github.com/facebook/pysa-action#inputs
|
|
||||||
repo-directory: './'
|
|
||||||
requirements-path: 'requirements.txt'
|
|
||||||
infer-types: true
|
|
||||||
include-default-sapp-filters: true
|
|
30
app/funct.py
30
app/funct.py
|
@ -941,6 +941,10 @@ def upload_and_restart(server_ip, cfg, **kwargs):
|
||||||
service = 'keepalived'
|
service = 'keepalived'
|
||||||
config_path = sql.get_setting('keepalived_config_path')
|
config_path = sql.get_setting('keepalived_config_path')
|
||||||
tmp_file = sql.get_setting('tmp_config_path') + "/" + get_data('config') + ".cfg"
|
tmp_file = sql.get_setting('tmp_config_path') + "/" + get_data('config') + ".cfg"
|
||||||
|
elif kwargs.get('waf'):
|
||||||
|
service = 'waf'
|
||||||
|
config_path = kwargs.get('config_file_name')
|
||||||
|
tmp_file = sql.get_setting('tmp_config_path') + "/" + get_data('config') + ".conf"
|
||||||
else:
|
else:
|
||||||
service = 'haproxy'
|
service = 'haproxy'
|
||||||
config_path = sql.get_setting('haproxy_config_path')
|
config_path = sql.get_setting('haproxy_config_path')
|
||||||
|
@ -1019,6 +1023,12 @@ def upload_and_restart(server_ip, cfg, **kwargs):
|
||||||
commands = [check_and_move + reload_or_restart_command]
|
commands = [check_and_move + reload_or_restart_command]
|
||||||
# if sql.return_firewall(server_ip):
|
# if sql.return_firewall(server_ip):
|
||||||
# commands[0] += open_port_firewalld(cfg, server_ip=server_ip, service='nginx')
|
# commands[0] += open_port_firewalld(cfg, server_ip=server_ip, service='nginx')
|
||||||
|
elif service == 'waf':
|
||||||
|
check_and_move = "sudo mv -f " + tmp_file + " " + config_path
|
||||||
|
if action == "save":
|
||||||
|
commands = [check_and_move]
|
||||||
|
else:
|
||||||
|
commands = [check_and_move + reload_or_restart_command]
|
||||||
else:
|
else:
|
||||||
if is_docker == '1':
|
if is_docker == '1':
|
||||||
check_config = "sudo docker exec -it " + container_name + " haproxy -c -f " + tmp_file
|
check_config = "sudo docker exec -it " + container_name + " haproxy -c -f " + tmp_file
|
||||||
|
@ -1044,7 +1054,7 @@ def upload_and_restart(server_ip, cfg, **kwargs):
|
||||||
logging('localhost', str(e), haproxywi=1)
|
logging('localhost', str(e), haproxywi=1)
|
||||||
|
|
||||||
# If master then save version of config in a new way
|
# If master then save version of config in a new way
|
||||||
if not kwargs.get('slave'):
|
if not kwargs.get('slave') and service != 'waf':
|
||||||
from pathlib import Path
|
from pathlib import Path
|
||||||
|
|
||||||
diff = ''
|
diff = ''
|
||||||
|
@ -1109,14 +1119,15 @@ def master_slave_upload_and_restart(server_ip, cfg, just_save, **kwargs):
|
||||||
for master in masters:
|
for master in masters:
|
||||||
if master[0] is not None:
|
if master[0] is not None:
|
||||||
slv_output = upload_and_restart(
|
slv_output = upload_and_restart(
|
||||||
master[0], cfg, just_save=just_save, nginx=kwargs.get('nginx'),
|
master[0], cfg, just_save=just_save, nginx=kwargs.get('nginx'), waf=kwargs.get('waf'),
|
||||||
apache=kwargs.get('apache'), config_file_name=kwargs.get('config_file_name'), slave=1
|
apache=kwargs.get('apache'), config_file_name=kwargs.get('config_file_name'), slave=1
|
||||||
)
|
)
|
||||||
slave_output += '<br>' + master[1] + ':\n' + slv_output
|
slave_output += '<br>' + master[1] + ':\n' + slv_output
|
||||||
|
|
||||||
output = upload_and_restart(
|
output = upload_and_restart(
|
||||||
server_ip, cfg, just_save=just_save, nginx=kwargs.get('nginx'), apache=kwargs.get('apache'),
|
server_ip, cfg, just_save=just_save, nginx=kwargs.get('nginx'), waf=kwargs.get('waf'),
|
||||||
config_file_name=kwargs.get('config_file_name'), oldcfg=kwargs.get('oldcfg'), login=login
|
apache=kwargs.get('apache'), config_file_name=kwargs.get('config_file_name'),
|
||||||
|
oldcfg=kwargs.get('oldcfg'), login=login
|
||||||
)
|
)
|
||||||
|
|
||||||
output = server_name + ':\n' + output
|
output = server_name + ':\n' + output
|
||||||
|
@ -1253,10 +1264,13 @@ def show_finding_in_config(stdout: str, **kwargs) -> str:
|
||||||
|
|
||||||
def show_haproxy_log(serv, rows=10, waf='0', grep=None, hour='00', minut='00', hour1='24', minut1='00', service='haproxy', **kwargs):
|
def show_haproxy_log(serv, rows=10, waf='0', grep=None, hour='00', minut='00', hour1='24', minut1='00', service='haproxy', **kwargs):
|
||||||
import sql
|
import sql
|
||||||
exgrep = form.getvalue('exgrep')
|
exgrep = checkAjaxInput(form.getvalue('exgrep'))
|
||||||
log_file = form.getvalue('file')
|
log_file = checkAjaxInput(form.getvalue('file'))
|
||||||
date = hour + ':' + minut
|
date = checkAjaxInput(hour) + ':' + checkAjaxInput(minut)
|
||||||
date1 = hour1 + ':' + minut1
|
date1 = checkAjaxInput(hour1) + ':' + checkAjaxInput(minut1)
|
||||||
|
grep = checkAjaxInput(grep)
|
||||||
|
rows = checkAjaxInput(rows)
|
||||||
|
waf = checkAjaxInput(waf)
|
||||||
cmd = ''
|
cmd = ''
|
||||||
|
|
||||||
if grep is not None:
|
if grep is not None:
|
||||||
|
|
|
@ -1,6 +1,8 @@
|
||||||
$ModLoad imudp
|
$ModLoad imudp
|
||||||
$UDPServerAddress 127.0.0.1
|
$UDPServerAddress 127.0.0.1
|
||||||
$UDPServerRun 514
|
$UDPServerRun 514
|
||||||
|
module(load="builtin:omfile")
|
||||||
|
|
||||||
|
|
||||||
if $programname startswith 'haproxy' then {
|
if $programname startswith 'haproxy' then {
|
||||||
if $syslogseverity == 6 then
|
if $syslogseverity == 6 then
|
||||||
|
|
|
@ -61,8 +61,6 @@
|
||||||
src: keepalived.conf.j2
|
src: keepalived.conf.j2
|
||||||
dest: /etc/keepalived/keepalived.conf
|
dest: /etc/keepalived/keepalived.conf
|
||||||
mode: 0644
|
mode: 0644
|
||||||
notify: restart keepalived
|
|
||||||
|
|
||||||
|
|
||||||
- name: test to see if selinux is running
|
- name: test to see if selinux is running
|
||||||
command: getenforce
|
command: getenforce
|
||||||
|
|
|
@ -3,7 +3,7 @@ global_defs {
|
||||||
}
|
}
|
||||||
#health-check for keepalive
|
#health-check for keepalive
|
||||||
vrrp_script chk_haproxy {
|
vrrp_script chk_haproxy {
|
||||||
script "/usr/bin/killall -0 haproxy"
|
script "systemctl is-active --quiet haproxy"
|
||||||
interval 2
|
interval 2
|
||||||
weight 3
|
weight 3
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
$ModLoad imudp
|
$ModLoad imudp
|
||||||
$UDPServerAddress 127.0.0.1
|
$UDPServerAddress 127.0.0.1
|
||||||
$UDPServerRun 514
|
$UDPServerRun 514
|
||||||
|
module(load="builtin:omfile")
|
||||||
|
|
||||||
if $programname startswith 'Keepalived_vrrp' then {
|
if $programname startswith 'Keepalived_vrrp' then {
|
||||||
if $syslogseverity == 6 then
|
if $syslogseverity == 6 then
|
||||||
|
|
|
@ -36,9 +36,14 @@
|
||||||
</div>
|
</div>
|
||||||
|
|
||||||
<div id="add-new-config" style="display: none">
|
<div id="add-new-config" style="display: none">
|
||||||
<div style="padding-top: 15px;">
|
<table class="overview">
|
||||||
Config file name: {{ input('new_config_name', type='text', placeholder='conf.d/config_name', title='Format: sub-directory/config_name') }}
|
{% include 'include/tr_validate_tips.html' %}
|
||||||
{{ input('path_config_name', type='hidden', value=path_dir) }}
|
<tr>
|
||||||
|
<td class="padding20">Config file name:</td>
|
||||||
|
<td>{{ input('new_config_name', type='text', placeholder='conf.d/config_name', title='Format: sub-directory/config_name') }}</td>
|
||||||
|
</tr>
|
||||||
|
{{ input('path_config_name', type='hidden', value=path_dir) }}
|
||||||
|
</table>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
<script>
|
<script>
|
||||||
|
|
Loading…
Reference in New Issue