2021-11-09 23:41:12 +01:00
|
|
|
// aa-log - Review AppArmor generated messages
|
|
|
|
// Copyright (C) 2021 Alexandre Pujol <alexandre@pujol.io>
|
|
|
|
// SPDX-License-Identifier: GPL-2.0-only
|
|
|
|
|
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bufio"
|
2022-05-02 18:14:42 +02:00
|
|
|
"encoding/hex"
|
2022-02-10 22:30:51 +01:00
|
|
|
"flag"
|
2021-11-09 23:41:12 +01:00
|
|
|
"fmt"
|
2022-05-02 18:14:42 +02:00
|
|
|
"io"
|
2021-11-09 23:41:12 +01:00
|
|
|
"os"
|
2021-12-12 13:35:08 +01:00
|
|
|
"path/filepath"
|
2021-11-09 23:41:12 +01:00
|
|
|
"regexp"
|
|
|
|
"strings"
|
|
|
|
)
|
|
|
|
|
2022-02-10 22:30:51 +01:00
|
|
|
// Command line options
|
|
|
|
var (
|
|
|
|
help bool
|
|
|
|
path string
|
|
|
|
)
|
|
|
|
|
|
|
|
// LogFile is the default path to the file to query
|
2021-11-09 23:41:12 +01:00
|
|
|
const LogFile = "/var/log/audit/audit.log"
|
|
|
|
|
|
|
|
// Colors
|
|
|
|
const (
|
2022-03-17 15:03:00 +01:00
|
|
|
Reset = "\033[0m"
|
2022-06-03 20:09:03 +02:00
|
|
|
FgRed = "\033[31m"
|
|
|
|
FgGreen = "\033[32m"
|
2022-03-17 15:03:00 +01:00
|
|
|
FgYellow = "\033[33m"
|
|
|
|
FgBlue = "\033[34m"
|
|
|
|
FgMagenta = "\033[35m"
|
2022-06-03 20:09:03 +02:00
|
|
|
FgCian = "\033[36m"
|
|
|
|
FgWhite = "\033[37m"
|
2022-03-17 15:03:00 +01:00
|
|
|
BoldRed = "\033[1;31m"
|
|
|
|
BoldGreen = "\033[1;32m"
|
|
|
|
BoldYellow = "\033[1;33m"
|
2021-11-09 23:41:12 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// AppArmorLog describes a apparmor log entry
|
2021-11-15 00:54:23 +01:00
|
|
|
type AppArmorLog map[string]string
|
|
|
|
|
|
|
|
// AppArmorLogs describes all apparmor log entries
|
|
|
|
type AppArmorLogs []AppArmorLog
|
2021-11-09 23:41:12 +01:00
|
|
|
|
2022-05-02 14:21:53 +02:00
|
|
|
var (
|
|
|
|
quoted bool
|
|
|
|
isHexa = regexp.MustCompile("^[0-9A-Fa-f]+$")
|
|
|
|
)
|
2021-11-23 21:12:10 +01:00
|
|
|
|
|
|
|
func splitQuoted(r rune) bool {
|
|
|
|
if r == '"' {
|
|
|
|
quoted = !quoted
|
|
|
|
}
|
|
|
|
return !quoted && r == ' '
|
|
|
|
}
|
|
|
|
|
2021-12-05 00:53:05 +01:00
|
|
|
func toQuote(str string) string {
|
|
|
|
if strings.Contains(str, " ") {
|
|
|
|
return `"` + str + `"`
|
|
|
|
}
|
|
|
|
return str
|
|
|
|
}
|
|
|
|
|
2022-05-02 14:21:53 +02:00
|
|
|
func decodeHex(str string) string {
|
|
|
|
if isHexa.MatchString(str) {
|
|
|
|
bs, _ := hex.DecodeString(str)
|
|
|
|
return string(bs)
|
|
|
|
}
|
|
|
|
return str
|
|
|
|
}
|
|
|
|
|
2021-11-09 23:41:12 +01:00
|
|
|
func removeDuplicateLog(logs []string) []string {
|
|
|
|
list := []string{}
|
2021-11-21 22:57:11 +01:00
|
|
|
keys := map[string]interface{}{"": true}
|
2021-11-09 23:41:12 +01:00
|
|
|
for _, log := range logs {
|
|
|
|
if _, v := keys[log]; !v {
|
|
|
|
keys[log] = true
|
|
|
|
list = append(list, log)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return list
|
|
|
|
}
|
|
|
|
|
2021-12-05 00:53:05 +01:00
|
|
|
// NewApparmorLogs return a new ApparmorLogs list of map from a log file
|
2022-05-02 18:14:42 +02:00
|
|
|
func NewApparmorLogs(file io.Reader, profile string) AppArmorLogs {
|
2021-11-09 23:41:12 +01:00
|
|
|
log := ""
|
2022-03-17 15:03:00 +01:00
|
|
|
exp := "apparmor=(\"DENIED\"|\"ALLOWED\"|\"AUDIT\")"
|
2021-11-23 21:12:10 +01:00
|
|
|
if profile != "" {
|
|
|
|
exp = fmt.Sprintf(exp+".* profile=\"%s.*\"", profile)
|
|
|
|
}
|
2021-11-09 23:41:12 +01:00
|
|
|
isAppArmorLog := regexp.MustCompile(exp)
|
|
|
|
|
|
|
|
// Select Apparmor logs
|
|
|
|
scanner := bufio.NewScanner(file)
|
|
|
|
for scanner.Scan() {
|
|
|
|
line := scanner.Text()
|
|
|
|
if isAppArmorLog.MatchString(line) {
|
|
|
|
log += line + "\n"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Clean logs
|
2022-06-03 20:09:03 +02:00
|
|
|
regex := regexp.MustCompile(`type=(USER_|)AVC msg=audit(.*): (pid=.*msg='|)apparmor`)
|
|
|
|
log = regex.ReplaceAllLiteralString(log, "apparmor")
|
2021-11-23 21:12:10 +01:00
|
|
|
regexAppArmorLogs := map[*regexp.Regexp]string{
|
2022-06-03 20:09:03 +02:00
|
|
|
regexp.MustCompile(`(peer_|)pid=[0-9]* `): "",
|
|
|
|
regexp.MustCompile(` fsuid.*`): "",
|
|
|
|
regexp.MustCompile(` exe=.*`): "",
|
2021-11-09 23:41:12 +01:00
|
|
|
}
|
2021-11-23 21:12:10 +01:00
|
|
|
for regex, value := range regexAppArmorLogs {
|
|
|
|
log = regex.ReplaceAllLiteralString(log, value)
|
2021-11-09 23:41:12 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
// Remove doublon in logs
|
|
|
|
logs := strings.Split(log, "\n")
|
|
|
|
logs = removeDuplicateLog(logs)
|
|
|
|
|
|
|
|
// Parse log into ApparmorLog struct
|
2021-11-15 00:54:23 +01:00
|
|
|
aaLogs := make(AppArmorLogs, 0)
|
2021-11-09 23:41:12 +01:00
|
|
|
for _, log := range logs {
|
2021-11-23 21:12:10 +01:00
|
|
|
quoted = false
|
|
|
|
tmp := strings.FieldsFunc(log, splitQuoted)
|
|
|
|
|
2021-11-15 00:54:23 +01:00
|
|
|
aa := make(AppArmorLog)
|
|
|
|
for _, item := range tmp {
|
|
|
|
kv := strings.Split(item, "=")
|
|
|
|
if len(kv) >= 2 {
|
2021-12-05 00:53:05 +01:00
|
|
|
aa[kv[0]] = strings.Trim(kv[1], `"`)
|
2021-11-15 00:54:23 +01:00
|
|
|
}
|
2021-11-09 23:41:12 +01:00
|
|
|
}
|
2022-05-02 14:21:53 +02:00
|
|
|
aa["profile"] = decodeHex(aa["profile"])
|
|
|
|
if name, ok := aa["name"]; ok {
|
|
|
|
aa["name"] = decodeHex(name)
|
|
|
|
}
|
2021-11-15 00:54:23 +01:00
|
|
|
aaLogs = append(aaLogs, aa)
|
2021-11-09 23:41:12 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return aaLogs
|
|
|
|
}
|
|
|
|
|
2021-12-05 00:53:05 +01:00
|
|
|
// String returns a formatted AppArmor logs string
|
2021-11-15 00:54:23 +01:00
|
|
|
func (aaLogs AppArmorLogs) String() string {
|
|
|
|
res := ""
|
2021-11-09 23:41:12 +01:00
|
|
|
state := map[string]string{
|
|
|
|
"DENIED": BoldRed + "DENIED " + Reset,
|
|
|
|
"ALLOWED": BoldGreen + "ALLOWED" + Reset,
|
2022-03-17 15:03:00 +01:00
|
|
|
"AUDIT": BoldYellow + "AUDIT " + Reset,
|
2021-11-09 23:41:12 +01:00
|
|
|
}
|
2021-11-21 22:57:11 +01:00
|
|
|
// Order of impression
|
2021-11-15 00:54:23 +01:00
|
|
|
keys := []string{
|
2022-06-03 20:09:03 +02:00
|
|
|
"profile", "peer_label", // Profile name
|
|
|
|
"operation", "name",
|
|
|
|
"mask", "bus", "path", "interface", "member", // dbus
|
|
|
|
"info", "comm",
|
|
|
|
"laddr", "lport", "faddr", "fport", "family", "sock_type", "protocol",
|
2021-11-21 22:57:11 +01:00
|
|
|
"requested_mask", "denied_mask", "signal", "peer", // "fsuid", "ouid", "FSUID", "OUID",
|
2021-11-15 00:54:23 +01:00
|
|
|
}
|
2021-11-21 22:57:11 +01:00
|
|
|
// Optional colors template to use
|
2021-11-15 00:54:23 +01:00
|
|
|
colors := map[string]string{
|
|
|
|
"profile": FgBlue,
|
2022-06-03 20:09:03 +02:00
|
|
|
"peer_label": FgBlue,
|
2021-11-15 00:54:23 +01:00
|
|
|
"operation": FgYellow,
|
|
|
|
"name": FgMagenta,
|
2022-06-03 20:09:03 +02:00
|
|
|
"mask": BoldRed,
|
|
|
|
"bus": FgCian + "bus=",
|
|
|
|
"path": "path=" + FgWhite,
|
2021-11-15 00:54:23 +01:00
|
|
|
"requested_mask": "requested_mask=" + BoldRed,
|
|
|
|
"denied_mask": "denied_mask=" + BoldRed,
|
2022-06-03 20:09:03 +02:00
|
|
|
"interface": "interface=" + FgWhite,
|
|
|
|
"member": "member=" + FgGreen,
|
2021-11-15 00:54:23 +01:00
|
|
|
}
|
2022-06-03 20:09:03 +02:00
|
|
|
|
2021-11-09 23:41:12 +01:00
|
|
|
for _, log := range aaLogs {
|
2021-11-21 22:57:11 +01:00
|
|
|
seen := map[string]bool{"apparmor": true}
|
2021-11-15 00:54:23 +01:00
|
|
|
res += state[log["apparmor"]]
|
|
|
|
|
|
|
|
for _, key := range keys {
|
|
|
|
if log[key] != "" {
|
|
|
|
if colors[key] != "" {
|
2021-12-05 00:53:05 +01:00
|
|
|
res += " " + colors[key] + toQuote(log[key]) + Reset
|
2021-11-15 00:54:23 +01:00
|
|
|
} else {
|
2021-12-05 00:53:05 +01:00
|
|
|
res += " " + key + "=" + toQuote(log[key])
|
2021-11-15 00:54:23 +01:00
|
|
|
}
|
2021-11-21 22:57:11 +01:00
|
|
|
seen[key] = true
|
2021-11-15 00:54:23 +01:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for key, value := range log {
|
2022-06-03 20:09:03 +02:00
|
|
|
if !seen[key] && value != "" {
|
2021-12-05 00:53:05 +01:00
|
|
|
res += " " + key + "=" + toQuote(value)
|
2021-11-21 22:57:11 +01:00
|
|
|
}
|
2021-11-15 00:54:23 +01:00
|
|
|
}
|
|
|
|
res += "\n"
|
2021-11-09 23:41:12 +01:00
|
|
|
}
|
2021-11-15 00:54:23 +01:00
|
|
|
return res
|
|
|
|
}
|
2021-11-09 23:41:12 +01:00
|
|
|
|
2022-02-10 22:30:51 +01:00
|
|
|
func aaLog(path string, profile string) error {
|
2021-12-12 13:35:08 +01:00
|
|
|
file, err := os.Open(filepath.Clean(path))
|
2021-11-09 23:41:12 +01:00
|
|
|
if err != nil {
|
2021-12-12 13:35:08 +01:00
|
|
|
return err
|
2021-11-09 23:41:12 +01:00
|
|
|
}
|
2021-12-12 13:35:08 +01:00
|
|
|
/* #nosec G307 */
|
2021-11-09 23:41:12 +01:00
|
|
|
defer func() {
|
|
|
|
if err := file.Close(); err != nil {
|
2021-12-12 13:35:08 +01:00
|
|
|
fmt.Println(err)
|
2021-11-09 23:41:12 +01:00
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
2021-11-15 00:54:23 +01:00
|
|
|
aaLogs := NewApparmorLogs(file, profile)
|
|
|
|
fmt.Print(aaLogs.String())
|
2021-12-12 13:35:08 +01:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2022-02-10 22:30:51 +01:00
|
|
|
func init() {
|
|
|
|
flag.BoolVar(&help, "h", false, "Show this help message and exit.")
|
|
|
|
flag.StringVar(&path, "f", LogFile,
|
2022-05-02 18:14:42 +02:00
|
|
|
"Set a log`file` or a suffix to the default log file.")
|
2022-02-10 22:30:51 +01:00
|
|
|
}
|
|
|
|
|
2021-12-12 13:35:08 +01:00
|
|
|
func main() {
|
2022-02-10 22:30:51 +01:00
|
|
|
flag.Parse()
|
|
|
|
if help {
|
|
|
|
fmt.Printf(`aa-log [-h] [-f file] [profile]
|
|
|
|
|
|
|
|
Review AppArmor generated messages in a colorful way.
|
|
|
|
It can be given an optional profile name to filter the output with.
|
|
|
|
|
|
|
|
`)
|
|
|
|
flag.PrintDefaults()
|
|
|
|
os.Exit(0)
|
|
|
|
}
|
|
|
|
|
|
|
|
profile := ""
|
|
|
|
if len(flag.Args()) >= 1 {
|
|
|
|
profile = flag.Args()[0]
|
|
|
|
}
|
|
|
|
|
|
|
|
logfile := filepath.Clean(LogFile + "." + path)
|
|
|
|
if _, err := os.Stat(logfile); err != nil {
|
|
|
|
logfile = path
|
|
|
|
}
|
|
|
|
|
|
|
|
err := aaLog(logfile, profile)
|
2021-12-12 13:35:08 +01:00
|
|
|
if err != nil {
|
|
|
|
fmt.Println(err)
|
|
|
|
os.Exit(1)
|
|
|
|
}
|
2021-11-09 23:41:12 +01:00
|
|
|
}
|