mirror of
https://github.com/valitydev/osquery-1.git
synced 2024-11-07 18:08:53 +00:00
ecbc65cf39
Summary: Pull Request resolved: https://github.com/facebook/osquery/pull/5487 I got tired of Lint telling me to update the calls to the Status class, so I wrote some codemods to update the vast majority of them: $ cd ~/fbsource $ codemod -d xplat/osquery/oss/osquery --extensions cpp,h "return Status\(0\, \".*\"\);" "return Status::success();" **Blindly accepted all changes**. FWIW, I tried to do something similar with the failure return values, but the unit tests were failing afterward. Reviewed By: guliashvili Differential Revision: D14278739 fbshipit-source-id: b023f6e969be697eeb67d66ea3ad10d16c69ff0c
522 lines
17 KiB
C++
522 lines
17 KiB
C++
/**
|
|
* Copyright (c) 2014-present, Facebook, Inc.
|
|
* All rights reserved.
|
|
*
|
|
* This source code is licensed in accordance with the terms specified in
|
|
* the LICENSE file found in the root directory of this source tree.
|
|
*/
|
|
|
|
// clang-format off
|
|
// Keep it on top of all other includes to fix double include WinSock.h header file
|
|
// which is windows specific boost build problem
|
|
#include <osquery/remote/http_client.h>
|
|
#include <osquery/remote/transports/tls.h>
|
|
// clang-format on
|
|
|
|
#include <fstream>
|
|
#include <mutex>
|
|
#include <sstream>
|
|
#include <string>
|
|
|
|
#include <boost/property_tree/ini_parser.hpp>
|
|
#include <boost/property_tree/json_parser.hpp>
|
|
#include <boost/property_tree/ptree.hpp>
|
|
|
|
#include <aws/core/Aws.h>
|
|
#include <aws/core/Region.h>
|
|
#include <aws/core/client/AWSClient.h>
|
|
#include <aws/core/client/ClientConfiguration.h>
|
|
#include <aws/core/http/standard/StandardHttpRequest.h>
|
|
#include <aws/core/http/standard/StandardHttpResponse.h>
|
|
|
|
#include <aws/sts/model/AssumeRoleRequest.h>
|
|
#include <aws/sts/model/Credentials.h>
|
|
|
|
#include <osquery/flags.h>
|
|
#include <osquery/logger.h>
|
|
#include <osquery/utils/json/json.h>
|
|
#include <osquery/utils/system/time.h>
|
|
#include <osquery/utils/aws/aws_util.h>
|
|
|
|
namespace pt = boost::property_tree;
|
|
|
|
namespace Standard = Aws::Http::Standard;
|
|
namespace Model = Aws::STS::Model;
|
|
|
|
namespace osquery {
|
|
|
|
FLAG(string, aws_access_key_id, "", "AWS access key ID");
|
|
FLAG(string, aws_secret_access_key, "", "AWS secret access key");
|
|
FLAG(string,
|
|
aws_profile_name,
|
|
"",
|
|
"AWS profile for authentication and region configuration");
|
|
FLAG(string, aws_region, "", "AWS region");
|
|
FLAG(string, aws_sts_arn_role, "", "AWS STS ARN role");
|
|
FLAG(string, aws_sts_region, "", "AWS STS region");
|
|
FLAG(string, aws_sts_session_name, "default", "AWS STS session name");
|
|
FLAG(uint64,
|
|
aws_sts_timeout,
|
|
3600,
|
|
"AWS STS assume role credential validity in seconds (default 3600)");
|
|
FLAG(bool,
|
|
aws_enable_proxy,
|
|
false,
|
|
"Enable proxying of HTTP/HTTPS requests in AWS client config");
|
|
FLAG(string,
|
|
aws_proxy_scheme,
|
|
"https",
|
|
"Proxy HTTP scheme for use in AWS client config (http or https, default "
|
|
"https)");
|
|
FLAG(string, aws_proxy_host, "", "Proxy host for use in AWS client config");
|
|
FLAG(uint32, aws_proxy_port, 0, "Proxy port for use in AWS client config");
|
|
FLAG(string,
|
|
aws_proxy_username,
|
|
"",
|
|
"Proxy username for use in AWS client config");
|
|
FLAG(string,
|
|
aws_proxy_password,
|
|
"",
|
|
"Proxy password for use in AWS client config");
|
|
|
|
/// Map of AWS region name to AWS::Region enum.
|
|
static const std::set<std::string> kAwsRegions = {"us-east-1",
|
|
"us-west-1",
|
|
"us-west-2",
|
|
"eu-west-1",
|
|
"eu-central-1",
|
|
"ap-southeast-1",
|
|
"ap-southeast-2",
|
|
"ap-northeast-1",
|
|
"ap-northeast-2",
|
|
"sa-east-1",
|
|
"ap-south-1",
|
|
"us-east-2",
|
|
"ca-central-1",
|
|
"eu-west-2"};
|
|
|
|
// Default AWS region to use when no region set in flags or profile
|
|
static RegionName kDefaultAWSRegion = Aws::Region::US_EAST_1;
|
|
|
|
std::shared_ptr<Aws::Http::HttpClient>
|
|
OsqueryHttpClientFactory::CreateHttpClient(
|
|
const Aws::Client::ClientConfiguration& clientConfiguration) const {
|
|
return std::make_shared<OsqueryHttpClient>();
|
|
}
|
|
|
|
std::shared_ptr<Aws::Http::HttpRequest>
|
|
OsqueryHttpClientFactory::CreateHttpRequest(
|
|
const Aws::String& uri,
|
|
Aws::Http::HttpMethod method,
|
|
const Aws::IOStreamFactory& streamFactory) const {
|
|
return CreateHttpRequest(Aws::Http::URI(uri), method, streamFactory);
|
|
}
|
|
|
|
std::shared_ptr<Aws::Http::HttpRequest>
|
|
OsqueryHttpClientFactory::CreateHttpRequest(
|
|
const Aws::Http::URI& uri,
|
|
Aws::Http::HttpMethod method,
|
|
const Aws::IOStreamFactory& streamFactory) const {
|
|
auto request = std::make_shared<Standard::StandardHttpRequest>(uri, method);
|
|
request->SetResponseStreamFactory(streamFactory);
|
|
|
|
return request;
|
|
}
|
|
|
|
std::shared_ptr<Aws::Http::HttpResponse> OsqueryHttpClient::MakeRequest(
|
|
Aws::Http::HttpRequest& request,
|
|
Aws::Utils::RateLimits::RateLimiterInterface* readLimiter,
|
|
Aws::Utils::RateLimits::RateLimiterInterface* writeLimiter) const {
|
|
// AWS allows rate limiters to be passed around, but we are doing rate
|
|
// limiting on the logger plugin side and so don't implement this.
|
|
if (readLimiter != nullptr || writeLimiter != nullptr) {
|
|
LOG(WARNING) << "Read/write limiters are unsupported";
|
|
}
|
|
|
|
Aws::Http::URI uri = request.GetUri();
|
|
uri.SetPath(Aws::Http::URI::URLEncodePath(uri.GetPath()));
|
|
Aws::String url = uri.GetURIString();
|
|
|
|
http::Client client(TLSTransport().getOptions());
|
|
http::Request req(url);
|
|
|
|
for (const auto& requestHeader : request.GetHeaders()) {
|
|
req << http::Request::Header(requestHeader.first, requestHeader.second);
|
|
}
|
|
|
|
std::string body;
|
|
if (request.GetContentBody()) {
|
|
std::stringstream ss;
|
|
ss << request.GetContentBody()->rdbuf();
|
|
body = ss.str();
|
|
}
|
|
|
|
auto response = std::make_shared<Standard::StandardHttpResponse>(request);
|
|
try {
|
|
http::Response resp;
|
|
|
|
switch (request.GetMethod()) {
|
|
case Aws::Http::HttpMethod::HTTP_GET:
|
|
resp = client.get(req);
|
|
break;
|
|
case Aws::Http::HttpMethod::HTTP_POST:
|
|
resp = client.post(req, body, request.GetContentType());
|
|
break;
|
|
case Aws::Http::HttpMethod::HTTP_PUT:
|
|
resp = client.put(req, body, request.GetContentType());
|
|
break;
|
|
case Aws::Http::HttpMethod::HTTP_HEAD:
|
|
resp = client.head(req);
|
|
break;
|
|
case Aws::Http::HttpMethod::HTTP_PATCH:
|
|
LOG(ERROR) << "osquery-http_client does not support HTTP PATCH";
|
|
return nullptr;
|
|
break;
|
|
case Aws::Http::HttpMethod::HTTP_DELETE:
|
|
resp = client.delete_(req);
|
|
break;
|
|
default:
|
|
LOG(ERROR) << "Unrecognized HTTP Method used: "
|
|
<< static_cast<int>(request.GetMethod());
|
|
return nullptr;
|
|
break;
|
|
}
|
|
|
|
response->SetResponseCode(
|
|
static_cast<Aws::Http::HttpResponseCode>(resp.status()));
|
|
|
|
for (const auto& header : resp.headers()) {
|
|
if (header.first == "content-type") {
|
|
response->SetContentType(header.second);
|
|
}
|
|
response->AddHeader(header.first, header.second);
|
|
}
|
|
|
|
response->GetResponseBody() << resp.body();
|
|
|
|
} catch (const std::exception& e) {
|
|
/* NOTE: This exception must NOT be passed by reference. */
|
|
LOG(ERROR) << "Exception making HTTP request to URL (" << url
|
|
<< "): " << e.what();
|
|
return nullptr;
|
|
}
|
|
|
|
return response;
|
|
}
|
|
|
|
std::shared_ptr<Aws::Http::HttpResponse> OsqueryHttpClient::MakeRequest(
|
|
const std::shared_ptr<Aws::Http::HttpRequest>& request,
|
|
Aws::Utils::RateLimits::RateLimiterInterface* readLimiter,
|
|
Aws::Utils::RateLimits::RateLimiterInterface* writeLimiter) const {
|
|
return MakeRequest(*request, readLimiter, writeLimiter);
|
|
}
|
|
|
|
Aws::Auth::AWSCredentials
|
|
OsqueryFlagsAWSCredentialsProvider::GetAWSCredentials() {
|
|
// Note that returning empty credentials means the provider chain will just
|
|
// try the next provider.
|
|
if (FLAGS_aws_access_key_id.empty() ^ FLAGS_aws_secret_access_key.empty()) {
|
|
LOG(WARNING) << "Cannot use AWS credentials: ID or secret missing";
|
|
return Aws::Auth::AWSCredentials("", "");
|
|
}
|
|
return Aws::Auth::AWSCredentials(FLAGS_aws_access_key_id,
|
|
FLAGS_aws_secret_access_key);
|
|
}
|
|
|
|
Aws::Auth::AWSCredentials
|
|
OsquerySTSAWSCredentialsProvider::GetAWSCredentials() {
|
|
// Grab system time in seconds-since-epoch for token expiration checks.
|
|
size_t current_time = osquery::getUnixTime();
|
|
|
|
// Pull new STS credentials if not cached from a previous run.
|
|
if (token_expire_time_ <= current_time) {
|
|
// Create and setup a STS client to pull our temporary credentials.
|
|
VLOG(1) << "Generating new AWS STS credentials";
|
|
|
|
// If we have not setup an AWS client yet, we must do so here.
|
|
if (access_key_id_.empty()) {
|
|
initAwsSdk();
|
|
}
|
|
|
|
Status s = makeAWSClient<Aws::STS::STSClient>(client_, "", false);
|
|
if (!s.ok()) {
|
|
LOG(WARNING) << "Error creating AWS client: " << s.what();
|
|
return Aws::Auth::AWSCredentials("", "");
|
|
}
|
|
|
|
Model::AssumeRoleRequest sts_r;
|
|
sts_r.SetRoleArn(FLAGS_aws_sts_arn_role);
|
|
sts_r.SetRoleSessionName(FLAGS_aws_sts_session_name);
|
|
sts_r.SetDurationSeconds(static_cast<int>(FLAGS_aws_sts_timeout));
|
|
|
|
// Pull our STS credentials.
|
|
Model::AssumeRoleOutcome sts_outcome = client_->AssumeRole(sts_r);
|
|
if (sts_outcome.IsSuccess()) {
|
|
Model::AssumeRoleResult sts_result = sts_outcome.GetResult();
|
|
// Cache our credentials for later use.
|
|
access_key_id_ = sts_result.GetCredentials().GetAccessKeyId();
|
|
secret_access_key_ = sts_result.GetCredentials().GetSecretAccessKey();
|
|
session_token_ = sts_result.GetCredentials().GetSessionToken();
|
|
// Calculate when our credentials will expire.
|
|
token_expire_time_ = current_time + FLAGS_aws_sts_timeout;
|
|
} else {
|
|
LOG(ERROR) << "Failed to create STS temporary credentials: "
|
|
"No STS policy exists for the AWS user/role";
|
|
}
|
|
}
|
|
return Aws::Auth::AWSCredentials(
|
|
access_key_id_, secret_access_key_, session_token_);
|
|
}
|
|
|
|
OsqueryAWSCredentialsProviderChain::OsqueryAWSCredentialsProviderChain(bool sts)
|
|
: AWSCredentialsProviderChain() {
|
|
// The order of the AddProvider calls determines the order in which the
|
|
// provider chain attempts to retrieve credentials.
|
|
if (sts && !FLAGS_aws_sts_arn_role.empty()) {
|
|
AddProvider(std::make_shared<OsquerySTSAWSCredentialsProvider>());
|
|
}
|
|
|
|
AddProvider(std::make_shared<OsqueryFlagsAWSCredentialsProvider>());
|
|
if (!FLAGS_aws_profile_name.empty()) {
|
|
AddProvider(
|
|
std::make_shared<Aws::Auth::ProfileConfigFileAWSCredentialsProvider>(
|
|
FLAGS_aws_profile_name.c_str()));
|
|
}
|
|
|
|
AddProvider(std::make_shared<Aws::Auth::EnvironmentAWSCredentialsProvider>());
|
|
AddProvider(
|
|
std::make_shared<Aws::Auth::ProfileConfigFileAWSCredentialsProvider>());
|
|
|
|
// This is disabled on Windows because it causes a crash
|
|
#if !defined(WINDOWS)
|
|
AddProvider(
|
|
std::make_shared<Aws::Auth::InstanceProfileCredentialsProvider>());
|
|
#endif
|
|
}
|
|
|
|
Status getAWSRegionFromProfile(std::string& region) {
|
|
pt::ptree tree;
|
|
try {
|
|
auto profile_dir = Aws::Auth::ProfileConfigFileAWSCredentialsProvider::
|
|
GetProfileDirectory();
|
|
pt::ini_parser::read_ini(profile_dir + "/config", tree);
|
|
} catch (const pt::ini_parser::ini_parser_error& e) {
|
|
return Status(1, std::string("Error reading profile file: ") + e.what());
|
|
}
|
|
|
|
// Profile names are prefixed with "profile ", except for "default".
|
|
std::string profile_key = FLAGS_aws_profile_name;
|
|
if (!profile_key.empty() && profile_key != "default") {
|
|
profile_key = "profile " + profile_key;
|
|
} else {
|
|
profile_key = "default";
|
|
}
|
|
|
|
auto section_it = tree.find(profile_key);
|
|
if (section_it == tree.not_found()) {
|
|
return Status(1, "AWS profile not found: " + FLAGS_aws_profile_name);
|
|
}
|
|
|
|
auto key_it = section_it->second.find("region");
|
|
if (key_it == section_it->second.not_found()) {
|
|
return Status(
|
|
1, "AWS region not found for profile: " + FLAGS_aws_profile_name);
|
|
}
|
|
|
|
std::string region_string = key_it->second.data();
|
|
auto index = kAwsRegions.find(region_string);
|
|
if (index != kAwsRegions.end()) {
|
|
region = region_string;
|
|
} else {
|
|
return Status(1, "Invalid aws_region in profile: " + region_string);
|
|
}
|
|
|
|
return Status(0);
|
|
}
|
|
|
|
void initAwsSdk() {
|
|
static std::once_flag once_flag;
|
|
try {
|
|
std::call_once(once_flag, []() {
|
|
Aws::SDKOptions options;
|
|
options.httpOptions.httpClientFactory_create_fn = []() {
|
|
return std::make_shared<OsqueryHttpClientFactory>();
|
|
};
|
|
Aws::InitAPI(options);
|
|
});
|
|
} catch (const std::system_error&) {
|
|
LOG(ERROR) << "call_once was not executed for initAwsSdk";
|
|
}
|
|
}
|
|
|
|
void getInstanceIDAndRegion(std::string& instance_id, std::string& region) {
|
|
static std::atomic<bool> checked(false);
|
|
static std::string cached_id;
|
|
static std::string cached_region;
|
|
if (checked || !isEc2Instance()) {
|
|
// Return if already checked or this is not EC2 instance
|
|
instance_id = cached_id;
|
|
region = cached_region;
|
|
return;
|
|
}
|
|
|
|
static std::once_flag once_flag;
|
|
std::call_once(once_flag, []() {
|
|
if (checked) {
|
|
return;
|
|
}
|
|
|
|
initAwsSdk();
|
|
http::Request req(kEc2MetadataUrl + "dynamic/instance-identity/document");
|
|
http::Client::Options options;
|
|
options.timeout(3);
|
|
http::Client client(options);
|
|
|
|
try {
|
|
http::Response res = client.get(req);
|
|
if (res.status() == 200) {
|
|
pt::ptree tree;
|
|
std::stringstream ss(res.body());
|
|
pt::read_json(ss, tree);
|
|
cached_id = tree.get<std::string>("instanceId", ""),
|
|
cached_region = tree.get<std::string>("region", ""),
|
|
VLOG(1) << "EC2 instance ID: " << cached_id
|
|
<< ". Region: " << cached_region;
|
|
}
|
|
} catch (const std::system_error& e) {
|
|
// Assume that this is not EC2 instance
|
|
VLOG(1) << "Error getting EC2 instance information: " << e.what();
|
|
}
|
|
checked = true;
|
|
});
|
|
|
|
instance_id = cached_id;
|
|
region = cached_region;
|
|
}
|
|
|
|
bool isEc2Instance() {
|
|
static std::atomic<bool> checked(false);
|
|
static std::atomic<bool> is_ec2_instance(false);
|
|
if (checked) {
|
|
return is_ec2_instance; // Return if already checked
|
|
}
|
|
|
|
static std::once_flag once_flag;
|
|
std::call_once(once_flag, []() {
|
|
if (checked) {
|
|
return;
|
|
}
|
|
checked = true;
|
|
|
|
std::ifstream fd(kHypervisorUuid, std::ifstream::in);
|
|
if (fd && !(fd.get() == 'e' && fd.get() == 'c' && fd.get() == '2')) {
|
|
return; // Not EC2 instance
|
|
}
|
|
|
|
http::Request req(kEc2MetadataUrl);
|
|
http::Client::Options options;
|
|
options.timeout(3);
|
|
http::Client client(options);
|
|
|
|
try {
|
|
http::Response res = client.get(req);
|
|
if (res.status() == 200) {
|
|
is_ec2_instance = true;
|
|
}
|
|
} catch (const std::system_error& e) {
|
|
// Assume that this is not EC2 instance
|
|
VLOG(1) << "Error checking if this is EC2 instance: " << e.what();
|
|
} catch (const std::runtime_error& e) {
|
|
VLOG(1) << "Error checking if this is EC2 instance: " << e.what();
|
|
}
|
|
});
|
|
|
|
return is_ec2_instance;
|
|
}
|
|
|
|
Status getAWSRegion(std::string& region, bool sts) {
|
|
// First try using the explicit region flags (STS or otherwise).
|
|
if (sts && !FLAGS_aws_sts_region.empty()) {
|
|
auto index = kAwsRegions.find(FLAGS_aws_sts_region);
|
|
if (index != kAwsRegions.end()) {
|
|
VLOG(1) << "Using AWS STS region from flag: " << FLAGS_aws_sts_region;
|
|
region = FLAGS_aws_sts_region;
|
|
return Status(0);
|
|
} else {
|
|
return Status(1, "Invalid aws_region specified: " + FLAGS_aws_sts_region);
|
|
}
|
|
}
|
|
|
|
if (!FLAGS_aws_region.empty()) {
|
|
auto index = kAwsRegions.find(FLAGS_aws_region);
|
|
if (index != kAwsRegions.end()) {
|
|
VLOG(1) << "Using AWS region from flag: " << FLAGS_aws_region;
|
|
region = FLAGS_aws_region;
|
|
return Status(0);
|
|
} else {
|
|
return Status(1, "Invalid aws_region specified: " + FLAGS_aws_region);
|
|
}
|
|
}
|
|
|
|
// Try finding in profile.
|
|
auto s = getAWSRegionFromProfile(region);
|
|
if (s.ok() || !FLAGS_aws_profile_name.empty()) {
|
|
VLOG(1) << "Using AWS region from profile: " << region;
|
|
return s;
|
|
}
|
|
|
|
// Use the default region.
|
|
region = kDefaultAWSRegion;
|
|
VLOG(1) << "Using default AWS region: " << region;
|
|
return Status(0);
|
|
}
|
|
|
|
Status appendLogTypeToJson(const std::string& log_type, std::string& log) {
|
|
if (log_type.empty()) {
|
|
return Status(1, "log_type is empty");
|
|
}
|
|
|
|
if (log.empty()) {
|
|
return Status(1, "original JSON is empty");
|
|
}
|
|
|
|
pt::ptree params;
|
|
try {
|
|
std::stringstream input;
|
|
input << log;
|
|
pt::read_json(input, params);
|
|
} catch (const pt::json_parser::json_parser_error& e) {
|
|
return Status(1,
|
|
std::string("JSON deserialization exception: ") + e.what());
|
|
}
|
|
|
|
params.put<std::string>("log_type", log_type);
|
|
|
|
std::ostringstream output;
|
|
try {
|
|
pt::write_json(output, params, false);
|
|
} catch (const pt::json_parser::json_parser_error& e) {
|
|
return Status(1, std::string("JSON serialization exception: ") + e.what());
|
|
}
|
|
|
|
log = output.str();
|
|
|
|
// Get rid of newline
|
|
if (!log.empty()) {
|
|
log.pop_back();
|
|
}
|
|
return Status::success();
|
|
}
|
|
|
|
void setAWSProxy(Aws::Client::ClientConfiguration& config) {
|
|
if (FLAGS_aws_enable_proxy) {
|
|
config.proxyScheme =
|
|
Aws::Http::SchemeMapper::FromString(FLAGS_aws_proxy_scheme.c_str());
|
|
config.proxyHost = FLAGS_aws_proxy_host;
|
|
config.proxyPort = FLAGS_aws_proxy_port;
|
|
config.proxyUserName = FLAGS_aws_proxy_username;
|
|
config.proxyPassword = FLAGS_aws_proxy_password;
|
|
}
|
|
}
|
|
}
|