2023-12-01 09:56:06 +01:00
|
|
|
package logic
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2023-12-01 11:24:22 +01:00
|
|
|
"errors"
|
|
|
|
"fmt"
|
2023-12-01 09:56:06 +01:00
|
|
|
"github.com/cakturk/go-netstat/netstat"
|
|
|
|
"github.com/rs/zerolog/log"
|
2023-12-02 01:01:16 +01:00
|
|
|
"github.com/shirou/gopsutil/v3/process"
|
2023-12-01 09:56:06 +01:00
|
|
|
"gogs.mikescher.com/BlackForestBytes/goext/ginext"
|
2023-12-01 11:24:22 +01:00
|
|
|
"gogs.mikescher.com/BlackForestBytes/goext/langext"
|
2023-12-02 01:01:16 +01:00
|
|
|
"gogs.mikescher.com/BlackForestBytes/goext/rext"
|
2023-12-01 09:56:06 +01:00
|
|
|
"gogs.mikescher.com/BlackForestBytes/goext/syncext"
|
2023-12-01 11:24:22 +01:00
|
|
|
"io"
|
2023-12-01 09:56:06 +01:00
|
|
|
bunny "locbunny"
|
|
|
|
"locbunny/models"
|
2023-12-01 13:44:58 +01:00
|
|
|
"locbunny/webassets"
|
2023-12-01 09:56:06 +01:00
|
|
|
"net"
|
2023-12-01 11:24:22 +01:00
|
|
|
"net/http"
|
2023-12-01 09:56:06 +01:00
|
|
|
"os"
|
|
|
|
"os/signal"
|
2023-12-02 01:01:16 +01:00
|
|
|
"regexp"
|
2023-12-01 11:24:22 +01:00
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
2023-12-01 09:56:06 +01:00
|
|
|
"syscall"
|
|
|
|
"time"
|
|
|
|
)
|
|
|
|
|
2023-12-02 01:01:16 +01:00
|
|
|
var regexTitle = rext.W(regexp.MustCompile(`(?i)<title>(?P<v>[^>]+)</title>`))
|
|
|
|
|
2023-12-01 09:56:06 +01:00
|
|
|
type Application struct {
|
|
|
|
Config bunny.Config
|
|
|
|
|
|
|
|
stopChan chan bool
|
|
|
|
Port string
|
|
|
|
IsRunning *syncext.AtomicBool
|
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
Gin *ginext.GinWrapper
|
|
|
|
Assets *webassets.Assets
|
|
|
|
Jobs []Job
|
|
|
|
|
|
|
|
cacheLock sync.Mutex
|
|
|
|
serverCacheValue []models.Server
|
|
|
|
serverCacheTime *time.Time
|
2023-12-01 09:56:06 +01:00
|
|
|
}
|
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
func NewApp(ass *webassets.Assets) *Application {
|
|
|
|
//nolint:exhaustruct
|
2023-12-01 09:56:06 +01:00
|
|
|
return &Application{
|
2023-12-01 13:44:58 +01:00
|
|
|
Assets: ass,
|
2023-12-01 09:56:06 +01:00
|
|
|
stopChan: make(chan bool),
|
|
|
|
IsRunning: syncext.NewAtomicBool(false),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (app *Application) Init(cfg bunny.Config, g *ginext.GinWrapper, jobs []Job) {
|
|
|
|
app.Config = cfg
|
|
|
|
app.Gin = g
|
|
|
|
app.Jobs = jobs
|
|
|
|
}
|
|
|
|
|
|
|
|
func (app *Application) Stop() {
|
|
|
|
syncext.WriteNonBlocking(app.stopChan, true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (app *Application) Run() {
|
|
|
|
|
2023-12-01 11:24:22 +01:00
|
|
|
addr := net.JoinHostPort(app.Config.ServerIP, strconv.Itoa(app.Config.ServerPort))
|
2023-12-01 09:56:06 +01:00
|
|
|
|
|
|
|
errChan, httpserver := app.Gin.ListenAndServeHTTP(addr, func(port string) {
|
|
|
|
app.Port = port
|
|
|
|
app.IsRunning.Set(true)
|
|
|
|
})
|
|
|
|
|
|
|
|
sigstop := make(chan os.Signal, 1)
|
|
|
|
signal.Notify(sigstop, os.Interrupt, syscall.SIGTERM)
|
|
|
|
|
|
|
|
for _, job := range app.Jobs {
|
|
|
|
err := job.Start()
|
|
|
|
if err != nil {
|
|
|
|
log.Fatal().Err(err).Msg("Failed to start job")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-sigstop:
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
log.Info().Msg("Stopping HTTP-Server")
|
|
|
|
|
|
|
|
err := httpserver.Shutdown(ctx)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
log.Info().Err(err).Msg("Error while stopping the http-server")
|
|
|
|
} else {
|
|
|
|
log.Info().Msg("Stopped HTTP-Server")
|
|
|
|
}
|
|
|
|
|
|
|
|
case err := <-errChan:
|
|
|
|
log.Error().Err(err).Msg("HTTP-Server failed")
|
|
|
|
|
|
|
|
case _ = <-app.stopChan:
|
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 30*time.Second)
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
log.Info().Msg("Manually stopping HTTP-Server")
|
|
|
|
|
|
|
|
err := httpserver.Shutdown(ctx)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
log.Info().Err(err).Msg("Error while stopping the http-server")
|
|
|
|
} else {
|
|
|
|
log.Info().Msg("Manually stopped HTTP-Server")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, job := range app.Jobs {
|
|
|
|
job.Stop()
|
|
|
|
}
|
|
|
|
|
|
|
|
app.IsRunning.Set(false)
|
|
|
|
}
|
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
func (app *Application) ListServer(ctx context.Context, timeout time.Duration) ([]models.Server, error) {
|
|
|
|
|
|
|
|
app.cacheLock.Lock()
|
|
|
|
if app.serverCacheTime != nil && app.serverCacheTime.After(time.Now().Add(-bunny.Conf.CacheDuration)) {
|
|
|
|
v := langext.ArrCopy(app.serverCacheValue)
|
|
|
|
log.Debug().Msg(fmt.Sprintf("Return cache values (from %s)", app.serverCacheTime.Format(time.RFC3339Nano)))
|
|
|
|
app.cacheLock.Unlock()
|
|
|
|
return v, nil
|
|
|
|
}
|
|
|
|
app.cacheLock.Unlock()
|
2023-12-01 09:56:06 +01:00
|
|
|
|
2023-12-01 11:24:22 +01:00
|
|
|
socks4, err := netstat.TCPSocks(netstat.NoopFilter)
|
2023-12-01 09:56:06 +01:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
if err := ctx.Err(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-12-01 11:24:22 +01:00
|
|
|
socks6, err := netstat.TCP6Socks(netstat.NoopFilter)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
if err := ctx.Err(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-12-01 11:24:22 +01:00
|
|
|
sockCount := len(socks4) + len(socks6)
|
|
|
|
|
|
|
|
wg := sync.WaitGroup{}
|
|
|
|
|
|
|
|
echan := make(chan error, sockCount*3)
|
|
|
|
rchan := make(chan models.Server, sockCount*3)
|
|
|
|
|
|
|
|
for _i := range socks4 {
|
|
|
|
i := _i
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
con1, err := app.verifyHTTPConn(socks4[i], "HTTP", "v4", timeout)
|
2023-12-01 11:24:22 +01:00
|
|
|
if err == nil {
|
|
|
|
rchan <- con1
|
|
|
|
return
|
|
|
|
} else {
|
|
|
|
echan <- err
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
con2, err := app.verifyHTTPConn(socks4[i], "HTTPS", "v4", timeout)
|
2023-12-01 11:24:22 +01:00
|
|
|
if err == nil {
|
|
|
|
rchan <- con2
|
|
|
|
return
|
|
|
|
} else {
|
|
|
|
echan <- err
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
for _i := range socks6 {
|
|
|
|
i := _i
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
con1, err := app.verifyHTTPConn(socks6[i], "HTTP", "v6", timeout)
|
2023-12-01 11:24:22 +01:00
|
|
|
if err == nil {
|
|
|
|
rchan <- con1
|
|
|
|
return
|
|
|
|
} else {
|
|
|
|
echan <- err
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer wg.Done()
|
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
con2, err := app.verifyHTTPConn(socks6[i], "HTTPS", "v6", timeout)
|
2023-12-01 11:24:22 +01:00
|
|
|
if err == nil {
|
|
|
|
rchan <- con2
|
|
|
|
return
|
|
|
|
} else {
|
|
|
|
echan <- err
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
2023-12-01 09:56:06 +01:00
|
|
|
|
2023-12-01 11:24:22 +01:00
|
|
|
wg.Wait()
|
|
|
|
close(echan)
|
|
|
|
close(rchan)
|
2023-12-01 09:56:06 +01:00
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
if err := ctx.Err(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2023-12-01 11:24:22 +01:00
|
|
|
duplicates := make(map[int]bool, sockCount*3)
|
|
|
|
res := make([]models.Server, 0, sockCount*3)
|
|
|
|
for v := range rchan {
|
2023-12-01 09:56:06 +01:00
|
|
|
|
2023-12-01 11:24:22 +01:00
|
|
|
if _, ok := duplicates[v.Port]; !ok {
|
|
|
|
res = append(res, v)
|
|
|
|
duplicates[v.Port] = true
|
|
|
|
}
|
2023-12-01 09:56:06 +01:00
|
|
|
}
|
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
langext.SortBy(res, func(v models.Server) int { return v.Port })
|
|
|
|
|
|
|
|
app.cacheLock.Lock()
|
|
|
|
app.serverCacheValue = langext.ArrCopy(res)
|
|
|
|
app.serverCacheTime = langext.Ptr(time.Now())
|
|
|
|
app.cacheLock.Unlock()
|
|
|
|
|
2023-12-01 09:56:06 +01:00
|
|
|
return res, nil
|
|
|
|
}
|
2023-12-01 11:24:22 +01:00
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
func (app *Application) verifyHTTPConn(sock netstat.SockTabEntry, proto string, ipversion string, timeout time.Duration) (models.Server, error) {
|
2023-12-01 11:24:22 +01:00
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), timeout)
|
2023-12-01 11:24:22 +01:00
|
|
|
defer cancel()
|
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
port := int(sock.LocalAddr.Port)
|
|
|
|
|
|
|
|
if sock.State != netstat.Listen && sock.State != netstat.Established && sock.State != netstat.TimeWait {
|
|
|
|
log.Debug().Msg(fmt.Sprintf("Failed to verify socket [%s|%s|%d] invalid state: %s", strings.ToUpper(proto), ipversion, port, sock.State.String()))
|
2023-12-01 11:24:22 +01:00
|
|
|
return models.Server{}, errors.New("invalid sock-state")
|
|
|
|
}
|
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
if port == bunny.Conf.ServerPort && sock.Process != nil && sock.Process.Pid == bunny.SelfProcessID {
|
|
|
|
log.Debug().Msg(fmt.Sprintf("Skip socket [%s|%s|%d] (this is our own server)", strings.ToUpper(proto), ipversion, port))
|
2023-12-01 11:24:22 +01:00
|
|
|
return models.Server{}, errors.New("skip self")
|
|
|
|
}
|
|
|
|
|
|
|
|
c := http.Client{}
|
2023-12-01 13:44:58 +01:00
|
|
|
url := fmt.Sprintf("%s://localhost:%d", strings.ToLower(proto), port)
|
|
|
|
req, err := http.NewRequestWithContext(ctx, http.MethodGet, url, nil)
|
2023-12-01 11:24:22 +01:00
|
|
|
if err != nil {
|
2023-12-01 13:44:58 +01:00
|
|
|
log.Debug().Msg(fmt.Sprintf("Failed to create [%s|%s|%d] request to %d (-> %s)", strings.ToUpper(proto), ipversion, port, port, err.Error()))
|
2023-12-01 11:24:22 +01:00
|
|
|
return models.Server{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
resp1, err := c.Do(req)
|
|
|
|
if err != nil {
|
2023-12-01 13:44:58 +01:00
|
|
|
log.Debug().Msg(fmt.Sprintf("Failed to send [%s|%s|%d] request to %s (-> %s)", strings.ToUpper(proto), ipversion, port, url, err.Error()))
|
2023-12-01 11:24:22 +01:00
|
|
|
return models.Server{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
defer func() { _ = resp1.Body.Close() }()
|
|
|
|
|
|
|
|
resbody, err := io.ReadAll(resp1.Body)
|
|
|
|
if err != nil {
|
2023-12-01 13:44:58 +01:00
|
|
|
log.Debug().Msg(fmt.Sprintf("Failed to read [%s|%s|%d] response from %s (-> %s)", strings.ToUpper(proto), ipversion, port, url, err.Error()))
|
2023-12-01 11:24:22 +01:00
|
|
|
return models.Server{}, err
|
|
|
|
}
|
|
|
|
|
|
|
|
ct := resp1.Header.Get("Content-Type")
|
|
|
|
if ct != "" {
|
|
|
|
|
|
|
|
var pnm *string = nil
|
|
|
|
var pid *int = nil
|
|
|
|
if sock.Process != nil {
|
|
|
|
pnm = langext.Ptr(sock.Process.Name)
|
|
|
|
pid = langext.Ptr(sock.Process.Pid)
|
|
|
|
}
|
|
|
|
|
2023-12-02 01:01:16 +01:00
|
|
|
name := app.DetectName(sock, ct, string(resbody))
|
|
|
|
|
2023-12-01 11:24:22 +01:00
|
|
|
return models.Server{
|
2023-12-01 13:44:58 +01:00
|
|
|
Port: port,
|
2023-12-01 11:24:22 +01:00
|
|
|
IP: sock.LocalAddr.IP.String(),
|
2023-12-02 01:01:16 +01:00
|
|
|
Name: name,
|
2023-12-01 11:24:22 +01:00
|
|
|
Protocol: proto,
|
|
|
|
StatusCode: resp1.StatusCode,
|
|
|
|
Response: string(resbody),
|
|
|
|
ContentType: ct,
|
|
|
|
Process: pnm,
|
|
|
|
PID: pid,
|
|
|
|
UID: sock.UID,
|
|
|
|
SockState: sock.State.String(),
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2023-12-01 13:44:58 +01:00
|
|
|
log.Debug().Msg(fmt.Sprintf("Failed to categorize [%s|%s|%d] response from %s (Content-Type: '%s')", strings.ToUpper(proto), ipversion, port, url, ct))
|
2023-12-02 01:01:16 +01:00
|
|
|
|
2023-12-01 11:24:22 +01:00
|
|
|
return models.Server{}, errors.New("invalid response-type")
|
|
|
|
}
|
2023-12-02 01:01:16 +01:00
|
|
|
|
|
|
|
func (app *Application) DetectName(sock netstat.SockTabEntry, ct string, body string) string {
|
|
|
|
|
|
|
|
if strings.Contains(strings.ToLower(ct), "html") {
|
|
|
|
if m, ok := regexTitle.MatchFirst(body); ok {
|
|
|
|
title := m.GroupByName("v").Value()
|
|
|
|
if !app.isInvalidHTMLTitle(title) {
|
|
|
|
return title
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if strings.Contains(strings.ToLower(body), "it looks like you are trying to access mongodb over http on the native driver port.") {
|
|
|
|
return "MongoDB"
|
|
|
|
}
|
|
|
|
|
|
|
|
if sock.Process != nil {
|
|
|
|
|
|
|
|
if sock.Process.Name == "java" {
|
|
|
|
|
|
|
|
proc, err := process.NewProcess(int32(sock.Process.Pid))
|
|
|
|
if err == nil {
|
|
|
|
cmdl, err := proc.CmdlineSlice()
|
|
|
|
|
|
|
|
if err == nil {
|
|
|
|
if v, ok := app.extractNameFromJava(cmdl); ok {
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(sock.Process.Name) > 0 {
|
|
|
|
return sock.Process.Name
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
return "unknown"
|
|
|
|
}
|
|
|
|
|
|
|
|
func (app *Application) isInvalidHTMLTitle(title string) bool {
|
|
|
|
title = strings.ToLower(title)
|
|
|
|
title = strings.TrimSpace(title)
|
|
|
|
title = strings.Trim(title, ".,\r\n\t ;")
|
|
|
|
|
|
|
|
arr := []string{
|
|
|
|
"404",
|
|
|
|
"Not found",
|
|
|
|
"404 Not Found",
|
|
|
|
"404 - Not Found",
|
|
|
|
"Page Not Found",
|
|
|
|
"File Not Found",
|
|
|
|
"Not Found",
|
|
|
|
"Site Not Found",
|
|
|
|
"ISAPI or CGI restriction",
|
|
|
|
"MIME type restriction",
|
|
|
|
"No handler configured",
|
|
|
|
"Denied by request filtering configuration",
|
|
|
|
"Verb denied",
|
|
|
|
"File extension denied",
|
|
|
|
"Hidden namespace",
|
|
|
|
"File attribute hidden",
|
|
|
|
"Request header too long",
|
|
|
|
"Request contains double escape sequence",
|
|
|
|
"Request contains high-bit characters",
|
|
|
|
"Content length too large",
|
|
|
|
"Request URL too long",
|
|
|
|
"Query string too long",
|
|
|
|
"DAV request sent to the static file handler",
|
|
|
|
"Dynamic content mapped to the static file handler via a wildcard MIME mapping",
|
|
|
|
"Query string sequence denied",
|
|
|
|
"Denied by filtering rule",
|
|
|
|
"Too Many URL Segments",
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, v := range arr {
|
|
|
|
if title == strings.ToLower(v) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (app *Application) extractNameFromJava(cmdl []string) (string, bool) {
|
|
|
|
|
|
|
|
for i, v := range cmdl {
|
|
|
|
if strings.ToLower(v) == "-jar" && i+1 < len(cmdl) {
|
|
|
|
return cmdl[i+1], true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, v := range cmdl {
|
|
|
|
if strings.HasPrefix(strings.ToLower(v), "-didea.paths.selector=") {
|
|
|
|
return v[len("-Didea.paths.selector="):], true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, v := range cmdl {
|
|
|
|
if strings.HasPrefix(strings.ToLower(v), "-didea.platform.prefix") {
|
|
|
|
return v[len("-Didea.platform.prefix"):], true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(cmdl) > 0 {
|
|
|
|
return cmdl[len(cmdl)-1], true
|
|
|
|
}
|
|
|
|
|
|
|
|
return "", false
|
|
|
|
}
|