diff options
Diffstat (limited to 'test/security')
-rwxr-xr-x | test/security/check_for_ingress_and_nodeports.py | 81 |
1 files changed, 75 insertions, 6 deletions
diff --git a/test/security/check_for_ingress_and_nodeports.py b/test/security/check_for_ingress_and_nodeports.py index f3dc128ab..7429afce9 100755 --- a/test/security/check_for_ingress_and_nodeports.py +++ b/test/security/check_for_ingress_and_nodeports.py @@ -49,6 +49,7 @@ import socket from enum import Enum import argparse import sys +import colorama from colorama import Fore import urllib.parse from os import path @@ -146,7 +147,7 @@ def scan_portn(port): for mode in ScanMode: retstatus, out = scan_single_port(host,port,mode) if not retstatus: - result = port, mode, out.getcode(), out.getheaders(),mode + result = port, mode, out.getcode(), out.read().decode('utf-8'),mode break else: result = port, retstatus, out, None,mode @@ -157,17 +158,17 @@ def scan_port(host, http, https, mode): if mode==ScanMode.HTTP: retstatus, out = scan_single_port(host,http,ScanMode.HTTP) if not retstatus: - return host, ScanMode.HTTP, out.getcode(), out.getheaders(), mode + return host, ScanMode.HTTP, out.getcode(), out.read().decode('utf-8'), mode else: return host, retstatus, out, None, mode elif mode==ScanMode.HTTPS: retstatus, out = scan_single_port(host,https,ScanMode.HTTPS) if not retstatus: - return host, ScanMode.HTTPS, out.getcode(), out.getheaders(), mode + return host, ScanMode.HTTPS, out.getcode(), out.read().decode('utf-8'), mode else: retstatus, out = scan_single_port(host,https,ScanMode.HTTPU) if not retstatus: - return host, ScanMode.HTTPU, out.getcode(), out.getheaders(), mode + return host, ScanMode.HTTPU, out.getcode(), out.read().decode('utf-8'), mode else: return host, retstatus, out, None, mode @@ -187,6 +188,23 @@ def console_visualisation(cname, name, retstatus, httpcode, out, mode, httpcodes if not out: out = str(retstatus) print( Fore.RED, '[ERROR ' +str(mode) +']', Fore.RESET,'\t', str(out)) +# Visualize compare results +def console_compare_visualisation(cname,d1,d2): + print(Fore.YELLOW,end='') + print(cname, end='\t',sep='\t') + if d1!=d2: + print(Fore.RED + '[ERROR] '+ Fore.RESET) + if d1[0]!=d2[0]: + print('\tCode:',d1[0],'!=',d2[0]) + if d1[1]!=d2[1]: + print('\t******** Response #1 ********\n',d1[1]) + print('\t******** Response #2 ********\n',d2[1]) + else: + print(Fore.GREEN + '[OK ',d1[0],']', Fore.RESET,sep='') + if VERBOSE and d1[1]: + print(d1[1]) + + # Port detector type def check_onap_ports(): print("Scanning onap NodePorts") @@ -224,16 +242,66 @@ def onap_list_all(): for name,hosts in check_list.items(): print(Fore.GREEN, name + Fore.RESET,":", *hosts[0], Fore.RED+':', hosts[1],Fore.RESET) +#Scan and compare nodeports and ingress check for results +def compare_nodeports_and_ingress(): + ihttp,ihttps = find_ingress_ports(v1) + print('Scanning nodeport services ...') + check_list = list_nodeports(v1) + if not check_list: + print(Fore.RED + 'Unable to find any declared node port in the K8S cluster', Fore.RESET) + valid_results = {} + for k,v in check_list.items(): + for port in v: + nodeport_results = scan_portn(port) + if isinstance(nodeport_results[1],ScanMode) and nodeport_results[2] != 404: + valid_results[k] = nodeport_results + if VERBOSE: console_visualisation(k,*nodeport_results) + check_list = list_ingress(v1b) + if not check_list: + print(Fore.RED+ 'Unable to find any declared ingress service in the K8S cluster', Fore.RESET) + print('Scanning ingress services ...') + ing_valid_results = {} + for k,v in check_list.items(): + for host in v[0]: + ingress_results = scan_port(host,ihttp,ihttps,v[1]) + if isinstance(ingress_results[1],ScanMode) and ingress_results[2]!=404: + ing_valid_results[k] = ingress_results + if VERBOSE: console_visualisation(k,*ingress_results,httpcodes=[404]) + ks1 = set(valid_results.keys()) + ks2 = set(ing_valid_results.keys()) + diff_keys = (ks1 - ks2) | (ks2 - ks1) + common_keys = ks1 & ks2 + if VERBOSE and diff_keys: + print(Fore.BLUE + '[WARNING] Non matching nodes and ingress list:') + for key in diff_keys: print(key,sep='\t') + print(Fore.RESET + 'Please check is it correct.') + print('Matching ingress and nodeport host scan results:') + for scan_key in common_keys: + s1 = valid_results[scan_key][2:4] + s2 = ing_valid_results[scan_key][2:4] + num_failures = 0 + if s1!=s2: ++num_failures + console_compare_visualisation(scan_key,s1,s2) + return num_failures + + + if __name__ == "__main__": + colorama.init() parser = argparse.ArgumentParser(formatter_class=argparse.ArgumentDefaultsHelpFormatter) - parser.add_argument("--scan-nodeport", + command_group = parser.add_mutually_exclusive_group() + command_group.add_argument("--scan-nodeport", default=False, action='store_true', help='Scan onap for node services' ) - parser.add_argument("--scan-ingress", + command_group.add_argument("--scan-ingress", default=False, action='store_true', help='Scan onap for ingress services' ) + command_group.add_argument("--scan-and-compare", + default=False, action='store_true', + help='Scan nodeports and ingress and compare results' + ) parser.add_argument( "--namespace", default='onap', action='store', help = 'kubernetes onap namespace' @@ -265,4 +333,5 @@ if __name__ == "__main__": v1c = client.Configuration() if args.scan_nodeport: check_onap_ports() elif args.scan_ingress: check_onap_ingress() + elif args.scan_and_compare: sys.exit(compare_nodeports_and_ingress()) else: onap_list_all() |