failUser.py 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. #!/usr/bin/env python3
  2. from json import loads, dumps
  3. from json.decoder import JSONDecodeError
  4. import pendulum
  5. from subprocess import run, PIPE
  6. from os.path import exists, join
  7. from pyinotify import WatchManager, Notifier, ProcessEvent
  8. from pyinotify import IN_MODIFY, IN_DELETE, IN_MOVE_SELF, IN_CREATE
  9. import sys
  10. # Branch off the logging into a seperate file
  11. from config import log
  12. myfile = join("bbs", "logs", "enigma-bbs.log")
  13. TARGET = open(myfile, 'r')
  14. TARGET.seek(0,2)
  15. WM = WatchManager()
  16. dirmask = IN_MODIFY | IN_DELETE | IN_MOVE_SELF | IN_CREATE
  17. def blocker(ip):
  18. # Utility function to block given ip as string
  19. call = run(["iptables", "-I", "DOCKER-USER", "-i", "eth0", "-s", ip, "-j", "DROP"], stdout=PIPE, check=True)
  20. # print("iptables -I DOCKER-USER -i eth0 -s {0} -j DROP".format(ip))
  21. def is_bad(line):
  22. # Given line, attempt to parse... then is there a issue with it
  23. # Returns a python dict with ip and time in log
  24. try:
  25. j = loads(line)
  26. if j["msg"] == "Attempt to login with banned username":
  27. r = {}
  28. r["ip"] = "{0}".format(j["ip"][7:])
  29. r["time"] = j["time"]
  30. return r
  31. except JSONDecodeError:
  32. log.error("Failed to decode line, '{0}'".format(line))
  33. class EventHandler(ProcessEvent):
  34. def process_IN_MODIFY(self, event):
  35. if myfile not in join(event.path, event.name):
  36. return
  37. else:
  38. luser = is_bad(TARGET.readline().rstrip())
  39. if(luser):
  40. blocker(luser["ip"])
  41. now = pendulum.now().to_datetime_string()
  42. log.info("Blocked {0} at {1}".format(luser["ip"], now))
  43. def process_IN_MOVE_SELF(self, event):
  44. log.debug("Log file moved... continuing read on stale log!")
  45. def process_IN_CREATE(self, event):
  46. if myfile in join(event.path, event.name):
  47. TARGET.close()
  48. TARGET = open(myfile, 'r')
  49. log.debug("Log file created... Catching up!")
  50. for line in TARGET.readlines():
  51. luser = is_bad(line.rstrip())
  52. if(luser):
  53. blocker(luser["ip"])
  54. now = pendulum.now().to_datetime_string()
  55. log.info("Blocked {0} at {1}".format(luser["ip"], now))
  56. TARGET.seek(0,2)
  57. return
  58. notifier = Notifier(WM, EventHandler())
  59. index = myfile.rfind("/")
  60. WM.add_watch(myfile[:index], dirmask)
  61. while True:
  62. try:
  63. notifier.process_events()
  64. if notifier.check_events():
  65. notifier.read_events()
  66. except KeyboardInterrupt:
  67. break
  68. notifier.stop()
  69. TARGET.close()
  70. sys.exit(0)
  71. # Collecting banned users
  72. # lusers = {}
  73. # with open(TARGET, "r") as f:
  74. # for l in f:
  75. # user = is_bad(l)
  76. # if user:
  77. # lusers[user["ip"]] = user["time"]
  78. # Itterate over all blocked users
  79. # for u in lusers:
  80. # print("Blocking {0}".format(u))
  81. # blocker(u)
  82. # now = pendulum.now()
  83. # log.info("Blocked {0} at {1}".format(u, now.to_datetime_string()))