mirror of
https://github.com/crowdsecurity/crowdsec.git
synced 2025-05-10 20:05:55 +02:00
* custom duration type for "cscli decisions list", "cscli alerts list" * custom duration type for "cscli allowlist add" * custom duration type for "cscli machines prune" * custom duration type for "cscli bouncers prune" * replace old function ParseDuration * use custom duration type in expr helpers * update dependency * lint * test fix * support days in 'metrics_max_age' * DurationWithDays for 'max_age'
237 lines
7.5 KiB
Go
237 lines
7.5 KiB
Go
package csconfig
|
|
|
|
import (
|
|
"crypto/tls"
|
|
"crypto/x509"
|
|
"errors"
|
|
"fmt"
|
|
"net/url"
|
|
"os"
|
|
"path/filepath"
|
|
"time"
|
|
|
|
"entgo.io/ent/dialect"
|
|
"github.com/go-sql-driver/mysql"
|
|
log "github.com/sirupsen/logrus"
|
|
|
|
"github.com/crowdsecurity/go-cs-lib/cstime"
|
|
"github.com/crowdsecurity/go-cs-lib/ptr"
|
|
|
|
"github.com/crowdsecurity/crowdsec/pkg/types"
|
|
)
|
|
|
|
const (
|
|
DEFAULT_MAX_OPEN_CONNS = 100
|
|
defaultDecisionBulkSize = 1000
|
|
// we need an upper bound due to the sqlite limit of 32k variables in a query
|
|
// we have 15 variables per decision, so 32768/15 = 2184.5333
|
|
maxDecisionBulkSize = 2000
|
|
)
|
|
|
|
type DatabaseCfg struct {
|
|
User string `yaml:"user"`
|
|
Password string `yaml:"password"`
|
|
DbName string `yaml:"db_name"`
|
|
SSLMode string `yaml:"sslmode"`
|
|
SSLCACert string `yaml:"ssl_ca_cert"`
|
|
SSLClientCert string `yaml:"ssl_client_cert"`
|
|
SSLClientKey string `yaml:"ssl_client_key"`
|
|
Host string `yaml:"host"`
|
|
Port int `yaml:"port"`
|
|
DbPath string `yaml:"db_path"`
|
|
Type string `yaml:"type"`
|
|
Flush *FlushDBCfg `yaml:"flush"`
|
|
LogLevel *log.Level `yaml:"log_level"`
|
|
MaxOpenConns int `yaml:"max_open_conns,omitempty"`
|
|
UseWal *bool `yaml:"use_wal,omitempty"`
|
|
DecisionBulkSize int `yaml:"decision_bulk_size,omitempty"`
|
|
}
|
|
|
|
type AuthGCCfg struct {
|
|
Cert *string `yaml:"cert,omitempty"`
|
|
CertDuration *time.Duration
|
|
Api *string `yaml:"api_key,omitempty"`
|
|
ApiDuration *time.Duration
|
|
LoginPassword *string `yaml:"login_password,omitempty"`
|
|
LoginPasswordDuration *time.Duration
|
|
}
|
|
|
|
type FlushDBCfg struct {
|
|
MaxItems *int `yaml:"max_items,omitempty"`
|
|
// We could unmarshal as time.Duration, but alert filters right now are a map of strings
|
|
MaxAge cstime.DurationWithDays `yaml:"max_age,omitempty"`
|
|
BouncersGC *AuthGCCfg `yaml:"bouncers_autodelete,omitempty"`
|
|
AgentsGC *AuthGCCfg `yaml:"agents_autodelete,omitempty"`
|
|
MetricsMaxAge cstime.DurationWithDays `yaml:"metrics_max_age,omitempty"`
|
|
}
|
|
|
|
func (c *Config) LoadDBConfig(inCli bool) error {
|
|
if c.DbConfig == nil {
|
|
return errors.New("no database configuration provided")
|
|
}
|
|
|
|
if c.Cscli != nil {
|
|
c.Cscli.DbConfig = c.DbConfig
|
|
}
|
|
|
|
if c.API != nil && c.API.Server != nil {
|
|
c.API.Server.DbConfig = c.DbConfig
|
|
}
|
|
|
|
if c.DbConfig.MaxOpenConns == 0 {
|
|
c.DbConfig.MaxOpenConns = DEFAULT_MAX_OPEN_CONNS
|
|
}
|
|
|
|
if !inCli && c.DbConfig.Type == "sqlite" {
|
|
if c.DbConfig.UseWal == nil {
|
|
dbDir := filepath.Dir(c.DbConfig.DbPath)
|
|
isNetwork, fsType, err := types.IsNetworkFS(dbDir)
|
|
switch {
|
|
case err != nil:
|
|
log.Warnf("unable to determine if database is on network filesystem: %s", err)
|
|
log.Warning(
|
|
"You are using sqlite without WAL, this can have a performance impact. " +
|
|
"If you do not store the database in a network share, set db_config.use_wal to true. " +
|
|
"Set explicitly to false to disable this warning.")
|
|
case isNetwork:
|
|
log.Debugf("database is on network filesystem (%s), setting useWal to false", fsType)
|
|
c.DbConfig.UseWal = ptr.Of(false)
|
|
default:
|
|
log.Debugf("database is on local filesystem (%s), setting useWal to true", fsType)
|
|
c.DbConfig.UseWal = ptr.Of(true)
|
|
}
|
|
} else if *c.DbConfig.UseWal {
|
|
dbDir := filepath.Dir(c.DbConfig.DbPath)
|
|
isNetwork, fsType, err := types.IsNetworkFS(dbDir)
|
|
switch {
|
|
case err != nil:
|
|
log.Warnf("unable to determine if database is on network filesystem: %s", err)
|
|
case isNetwork:
|
|
log.Warnf("database seems to be stored on a network share (%s), but useWal is set to true. Proceed at your own risk.", fsType)
|
|
}
|
|
}
|
|
}
|
|
|
|
if c.DbConfig.DecisionBulkSize == 0 {
|
|
log.Tracef("No decision_bulk_size value provided, using default value of %d", defaultDecisionBulkSize)
|
|
c.DbConfig.DecisionBulkSize = defaultDecisionBulkSize
|
|
}
|
|
|
|
if c.DbConfig.DecisionBulkSize > maxDecisionBulkSize {
|
|
log.Warningf("decision_bulk_size too high (%d), setting to the maximum value of %d", c.DbConfig.DecisionBulkSize, maxDecisionBulkSize)
|
|
c.DbConfig.DecisionBulkSize = maxDecisionBulkSize
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (d *DatabaseCfg) ConnectionString() (string, error) {
|
|
connString := ""
|
|
|
|
switch d.Type {
|
|
case "sqlite":
|
|
var sqliteConnectionStringParameters string
|
|
if d.UseWal != nil && *d.UseWal {
|
|
sqliteConnectionStringParameters = "_busy_timeout=100000&_fk=1&_journal_mode=WAL"
|
|
} else {
|
|
sqliteConnectionStringParameters = "_busy_timeout=100000&_fk=1"
|
|
}
|
|
|
|
connString = fmt.Sprintf("file:%s?%s", d.DbPath, sqliteConnectionStringParameters)
|
|
case "mysql":
|
|
params := url.Values{}
|
|
params.Add("parseTime", "True")
|
|
|
|
tlsConfig := &tls.Config{}
|
|
|
|
// This is just to get an initial value, don't care about the error
|
|
systemRootCAs, _ := x509.SystemCertPool()
|
|
if systemRootCAs != nil {
|
|
tlsConfig.RootCAs = systemRootCAs
|
|
}
|
|
|
|
if d.isSocketConfig() {
|
|
connString = fmt.Sprintf("%s:%s@unix(%s)/%s", d.User, d.Password, d.DbPath, d.DbName)
|
|
} else {
|
|
connString = fmt.Sprintf("%s:%s@tcp(%s:%d)/%s", d.User, d.Password, d.Host, d.Port, d.DbName)
|
|
}
|
|
|
|
if d.SSLMode != "" {
|
|
// This will be overridden if a CA or client cert is provided
|
|
params.Set("tls", d.SSLMode)
|
|
}
|
|
|
|
if d.SSLCACert != "" {
|
|
caCert, err := os.ReadFile(d.SSLCACert)
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed to read CA cert file %s: %w", d.SSLCACert, err)
|
|
}
|
|
if tlsConfig.RootCAs == nil {
|
|
tlsConfig.RootCAs = x509.NewCertPool()
|
|
}
|
|
if !tlsConfig.RootCAs.AppendCertsFromPEM(caCert) {
|
|
return "", fmt.Errorf("failed to append CA cert file %s: %w", d.SSLCACert, err)
|
|
}
|
|
params.Set("tls", "custom")
|
|
}
|
|
|
|
if d.SSLClientCert != "" && d.SSLClientKey != "" {
|
|
cert, err := tls.LoadX509KeyPair(d.SSLClientCert, d.SSLClientKey)
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed to load client cert/key pair: %w", err)
|
|
}
|
|
tlsConfig.Certificates = []tls.Certificate{cert}
|
|
params.Set("tls", "custom")
|
|
}
|
|
|
|
if params.Get("tls") == "custom" {
|
|
// Register the custom TLS config
|
|
err := mysql.RegisterTLSConfig("custom", tlsConfig)
|
|
if err != nil {
|
|
return "", fmt.Errorf("failed to register custom TLS config: %w", err)
|
|
}
|
|
}
|
|
connString = fmt.Sprintf("%s?%s", connString, params.Encode())
|
|
case "postgres", "postgresql", "pgx":
|
|
if d.isSocketConfig() {
|
|
connString = fmt.Sprintf("host=%s user=%s dbname=%s password=%s", d.DbPath, d.User, d.DbName, d.Password)
|
|
} else {
|
|
connString = fmt.Sprintf("host=%s port=%d user=%s dbname=%s password=%s", d.Host, d.Port, d.User, d.DbName, d.Password)
|
|
}
|
|
|
|
if d.SSLMode != "" {
|
|
connString = fmt.Sprintf("%s sslmode=%s", connString, d.SSLMode)
|
|
}
|
|
|
|
if d.SSLCACert != "" {
|
|
connString = fmt.Sprintf("%s sslrootcert=%s", connString, d.SSLCACert)
|
|
}
|
|
|
|
if d.SSLClientCert != "" && d.SSLClientKey != "" {
|
|
connString = fmt.Sprintf("%s sslcert=%s sslkey=%s", connString, d.SSLClientCert, d.SSLClientKey)
|
|
}
|
|
}
|
|
|
|
return connString, nil
|
|
}
|
|
|
|
func (d *DatabaseCfg) ConnectionDialect() (string, string, error) {
|
|
switch d.Type {
|
|
case "sqlite":
|
|
return "sqlite3", dialect.SQLite, nil
|
|
case "mysql":
|
|
return "mysql", dialect.MySQL, nil
|
|
case "pgx", "postgresql", "postgres":
|
|
if d.Type != "pgx" {
|
|
log.Debugf("database type '%s' is deprecated, switching to 'pgx' instead", d.Type)
|
|
}
|
|
|
|
return "pgx", dialect.Postgres, nil
|
|
}
|
|
|
|
return "", "", fmt.Errorf("unknown database type '%s'", d.Type)
|
|
}
|
|
|
|
func (d *DatabaseCfg) isSocketConfig() bool {
|
|
return d.Host == "" && d.Port == 0 && d.DbPath != ""
|
|
}
|