Files
SecGen/lib/readers/module_reader.rb
2016-06-09 00:03:04 +01:00

120 lines
3.8 KiB
Ruby

require 'nokogiri'
require_relative '../helpers/constants.rb'
require_relative '../objects/module'
class ModuleReader
# reads in all bases
def self.read_bases
return read_modules('base', BASES_PATH, BASE_SCHEMA_FILE, false)
end
# reads in all vulnerability modules
def self.read_vulnerabilities
return read_modules('vulnerability', VULNERABILITIES_PATH, VULNERABILITY_SCHEMA_FILE, true)
end
# reads in all services
def self.read_services
return read_modules('service', SERVICES_PATH, SERVICE_SCHEMA_FILE, true)
end
# reads in all networks
def self.read_networks
return read_modules('network', NETWORKS_PATH, NETWORK_SCHEMA_FILE, false)
end
# reads in xml files to create modules
# @param [Object] module_type 'vulnerability', 'base', etc
# @param [Object] modules_dir ROOT_DIR path leading to 'modules/'
# @param [Object] schema_file the xml schema that defines this type of module
# @param [Object] require_puppet whether this kind of SecGen module has puppet code
# @return [Object] the list of modules read
def self.read_modules(module_type, modules_dir, schema_file, require_puppet)
modules = []
Dir.glob("#{modules_dir}**/**/secgen_metadata.xml").each do |file|
module_path, module_filename = nil
match = file.match(/#{ROOT_DIR}\/(.*?([^\/]*))\/secgen_metadata.xml/i)
if match.captures.size == 2
module_path, module_filename = match.captures
else
Print.err "Unexpected error extracting module path from #{file}"
exit
end
Print.verbose "Reading #{module_type}: #{module_path}"
doc, xsd = nil
begin
doc = Nokogiri::XML(File.read(file))
rescue
Print.err "Failed to read #{module_type} metadata file (#{file})"
exit
end
# validate scenario XML against schema
begin
xsd = Nokogiri::XML::Schema(File.read(schema_file))
xsd.validate(doc).each do |error|
Print.err "Error in #{module_type} metadata file (#{file}):"
Print.err ' ' + error.message
exit
end
rescue Exception => e
Print.err "Failed to validate #{module_type} metadata file (#{file}): against schema (#{schema_file})"
Print.err e.message
exit
end
# remove xml namespaces for ease of processing
doc.remove_namespaces!
new_module = Module.new(module_type)
# save module path (and as an attribute for filtering)
new_module.module_path = module_path
new_module.attributes['module_path'] = [module_path]
new_module.puppet_file = "#{ROOT_DIR}/#{module_path}/#{module_filename}.pp"
new_module.puppet_other_path = "#{ROOT_DIR}/#{module_path}/manifests"
# check that the expected puppet files exist
if require_puppet
unless File.file?("#{new_module.puppet_file}")
Print.err "Module #{module_path} missing required puppet init file (#{new_module.puppet_file})"
exit
end
unless File.exists?("#{new_module.puppet_other_path}")
Print.err "Module #{module_path} missing required puppet module manifests folder (#{new_module.puppet_other_path})"
exit
end
end
# for each element in the vulnerability
doc.xpath("/#{module_type}/*").each do |module_doc|
# new_module.attributes[module_doc.name] = module_doc.content
# creates the array if null
(new_module.attributes[module_doc.name] ||= []).push(module_doc.content)
end
# for each conflict in the module
doc.xpath("/#{module_type}/conflict").each do |conflict_doc|
conflict = {}
conflict_doc.elements.each {|node|
(conflict[node.name] ||= []).push(node.content)
}
new_module.conflicts.push(conflict)
end
modules.push(new_module)
end
return modules
end
end