2025-01-29 19:49:51 +01:00
|
|
|
|
// Fail2ban UI - A Swiss made, management interface for Fail2ban.
|
|
|
|
|
|
//
|
|
|
|
|
|
// Copyright (C) 2025 Swissmakers GmbH (https://swissmakers.ch)
|
|
|
|
|
|
//
|
|
|
|
|
|
// Licensed under the GNU General Public License, Version 3 (GPL-3.0)
|
|
|
|
|
|
// You may not use this file except in compliance with the License.
|
|
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
|
|
//
|
|
|
|
|
|
// https://www.gnu.org/licenses/gpl-3.0.en.html
|
|
|
|
|
|
//
|
|
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
2025-01-25 16:21:14 +01:00
|
|
|
|
package web
|
|
|
|
|
|
|
|
|
|
|
|
import (
|
2025-01-30 12:35:16 +01:00
|
|
|
|
"bytes"
|
2025-11-12 15:52:34 +01:00
|
|
|
|
"context"
|
2025-01-30 11:00:14 +01:00
|
|
|
|
"crypto/tls"
|
2025-11-22 13:09:54 +01:00
|
|
|
|
"encoding/json"
|
2025-01-30 11:00:14 +01:00
|
|
|
|
"errors"
|
2025-01-26 20:05:07 +01:00
|
|
|
|
"fmt"
|
2025-11-22 13:09:54 +01:00
|
|
|
|
"html"
|
2025-01-30 12:35:16 +01:00
|
|
|
|
"io"
|
2025-01-29 23:48:06 +01:00
|
|
|
|
"log"
|
|
|
|
|
|
"net"
|
2025-01-25 16:21:14 +01:00
|
|
|
|
"net/http"
|
2025-01-30 11:00:14 +01:00
|
|
|
|
"net/smtp"
|
2025-01-26 20:05:07 +01:00
|
|
|
|
"os"
|
2025-11-12 15:52:34 +01:00
|
|
|
|
"path/filepath"
|
2025-11-22 13:09:54 +01:00
|
|
|
|
"regexp"
|
2025-11-17 13:29:50 +01:00
|
|
|
|
"sort"
|
2025-11-12 15:52:34 +01:00
|
|
|
|
"strconv"
|
2025-01-25 21:43:50 +01:00
|
|
|
|
"strings"
|
2025-11-22 13:09:54 +01:00
|
|
|
|
"sync"
|
2025-01-25 16:21:14 +01:00
|
|
|
|
"time"
|
|
|
|
|
|
|
|
|
|
|
|
"github.com/gin-gonic/gin"
|
2025-07-16 15:47:33 +02:00
|
|
|
|
"github.com/go-playground/validator/v10"
|
2025-01-29 23:48:06 +01:00
|
|
|
|
"github.com/oschwald/maxminddb-golang"
|
2025-01-25 21:43:50 +01:00
|
|
|
|
"github.com/swissmakers/fail2ban-ui/internal/config"
|
2025-01-25 16:21:14 +01:00
|
|
|
|
"github.com/swissmakers/fail2ban-ui/internal/fail2ban"
|
2025-11-12 15:52:34 +01:00
|
|
|
|
"github.com/swissmakers/fail2ban-ui/internal/storage"
|
2025-01-25 16:21:14 +01:00
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
// SummaryResponse is what we return from /api/summary
|
|
|
|
|
|
type SummaryResponse struct {
|
2025-11-12 21:43:09 +01:00
|
|
|
|
Jails []fail2ban.JailInfo `json:"jails"`
|
2025-01-25 16:21:14 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-22 13:09:54 +01:00
|
|
|
|
type emailDetail struct {
|
|
|
|
|
|
Label string
|
|
|
|
|
|
Value string
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
var (
|
|
|
|
|
|
httpQuotedStatusPattern = regexp.MustCompile(`"[^"]*"\s+(\d{3})\b`)
|
|
|
|
|
|
httpPlainStatusPattern = regexp.MustCompile(`\s(\d{3})\s+(?:\d+|-)`)
|
|
|
|
|
|
suspiciousLogIndicators = []string{
|
|
|
|
|
|
"select ",
|
|
|
|
|
|
"union ",
|
|
|
|
|
|
"/etc/passwd",
|
|
|
|
|
|
"/xmlrpc.php",
|
|
|
|
|
|
"/wp-admin",
|
|
|
|
|
|
"/cgi-bin",
|
|
|
|
|
|
"cmd=",
|
|
|
|
|
|
"wget",
|
|
|
|
|
|
"curl ",
|
|
|
|
|
|
"nslookup",
|
|
|
|
|
|
"content-length: 0",
|
|
|
|
|
|
"${",
|
|
|
|
|
|
}
|
|
|
|
|
|
localeCache = make(map[string]map[string]string)
|
|
|
|
|
|
localeCacheLock sync.RWMutex
|
|
|
|
|
|
)
|
|
|
|
|
|
|
2025-11-12 15:52:34 +01:00
|
|
|
|
func resolveConnector(c *gin.Context) (fail2ban.Connector, error) {
|
|
|
|
|
|
serverID := c.Query("serverId")
|
|
|
|
|
|
if serverID == "" {
|
|
|
|
|
|
serverID = c.GetHeader("X-F2B-Server")
|
|
|
|
|
|
}
|
|
|
|
|
|
manager := fail2ban.GetManager()
|
|
|
|
|
|
if serverID != "" {
|
|
|
|
|
|
return manager.Connector(serverID)
|
|
|
|
|
|
}
|
|
|
|
|
|
return manager.DefaultConnector()
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func resolveServerForNotification(serverID, hostname string) (config.Fail2banServer, error) {
|
|
|
|
|
|
if serverID != "" {
|
|
|
|
|
|
if srv, ok := config.GetServerByID(serverID); ok {
|
|
|
|
|
|
if !srv.Enabled {
|
|
|
|
|
|
return config.Fail2banServer{}, fmt.Errorf("server %s is disabled", serverID)
|
|
|
|
|
|
}
|
|
|
|
|
|
return srv, nil
|
|
|
|
|
|
}
|
|
|
|
|
|
return config.Fail2banServer{}, fmt.Errorf("serverId %s not found", serverID)
|
|
|
|
|
|
}
|
|
|
|
|
|
if hostname != "" {
|
|
|
|
|
|
if srv, ok := config.GetServerByHostname(hostname); ok {
|
|
|
|
|
|
if !srv.Enabled {
|
|
|
|
|
|
return config.Fail2banServer{}, fmt.Errorf("server for hostname %s is disabled", hostname)
|
|
|
|
|
|
}
|
|
|
|
|
|
return srv, nil
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
srv := config.GetDefaultServer()
|
|
|
|
|
|
if srv.ID == "" {
|
|
|
|
|
|
return config.Fail2banServer{}, fmt.Errorf("no default fail2ban server configured")
|
|
|
|
|
|
}
|
|
|
|
|
|
if !srv.Enabled {
|
|
|
|
|
|
return config.Fail2banServer{}, fmt.Errorf("default fail2ban server is disabled")
|
|
|
|
|
|
}
|
|
|
|
|
|
return srv, nil
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-01-25 16:21:14 +01:00
|
|
|
|
// SummaryHandler returns a JSON summary of all jails, including
|
|
|
|
|
|
// number of banned IPs, how many are new in the last hour, etc.
|
|
|
|
|
|
func SummaryHandler(c *gin.Context) {
|
2025-11-12 15:52:34 +01:00
|
|
|
|
conn, err := resolveConnector(c)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
2025-01-25 16:21:14 +01:00
|
|
|
|
|
2025-11-12 15:52:34 +01:00
|
|
|
|
jailInfos, err := conn.GetJailInfos(c.Request.Context())
|
2025-01-25 16:21:14 +01:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
resp := SummaryResponse{
|
2025-11-12 21:43:09 +01:00
|
|
|
|
Jails: jailInfos,
|
2025-01-25 16:21:14 +01:00
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusOK, resp)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// UnbanIPHandler unbans a given IP in a specific jail.
|
|
|
|
|
|
func UnbanIPHandler(c *gin.Context) {
|
2025-01-31 18:25:31 +01:00
|
|
|
|
config.DebugLog("----------------------------")
|
|
|
|
|
|
config.DebugLog("UnbanIPHandler called (handlers.go)") // entry point
|
2025-01-25 16:21:14 +01:00
|
|
|
|
jail := c.Param("jail")
|
|
|
|
|
|
ip := c.Param("ip")
|
|
|
|
|
|
|
2025-11-12 15:52:34 +01:00
|
|
|
|
conn, err := resolveConnector(c)
|
2025-01-25 16:21:14 +01:00
|
|
|
|
if err != nil {
|
2025-11-12 15:52:34 +01:00
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if err := conn.UnbanIP(c.Request.Context(), jail, ip); err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
2025-01-25 16:21:14 +01:00
|
|
|
|
return
|
|
|
|
|
|
}
|
2025-01-31 18:25:31 +01:00
|
|
|
|
fmt.Println(ip + " from jail " + jail + " unbanned successfully.")
|
2025-01-25 16:21:14 +01:00
|
|
|
|
c.JSON(http.StatusOK, gin.H{
|
|
|
|
|
|
"message": "IP unbanned successfully",
|
|
|
|
|
|
})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-01-29 23:48:06 +01:00
|
|
|
|
// BanNotificationHandler processes incoming ban notifications from Fail2Ban.
|
|
|
|
|
|
func BanNotificationHandler(c *gin.Context) {
|
|
|
|
|
|
var request struct {
|
2025-11-12 15:52:34 +01:00
|
|
|
|
ServerID string `json:"serverId"`
|
2025-01-29 23:48:06 +01:00
|
|
|
|
IP string `json:"ip" binding:"required"`
|
|
|
|
|
|
Jail string `json:"jail" binding:"required"`
|
|
|
|
|
|
Hostname string `json:"hostname"`
|
|
|
|
|
|
Failures string `json:"failures"`
|
|
|
|
|
|
Whois string `json:"whois"`
|
|
|
|
|
|
Logs string `json:"logs"`
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-01-30 12:35:16 +01:00
|
|
|
|
// **DEBUGGING: Log Raw JSON Body**
|
|
|
|
|
|
body, _ := io.ReadAll(c.Request.Body)
|
2025-07-16 15:47:33 +02:00
|
|
|
|
log.Printf("----------------------------------------------------")
|
|
|
|
|
|
log.Printf("Request Content-Length: %d", c.Request.ContentLength)
|
|
|
|
|
|
log.Printf("Request Headers: %v", c.Request.Header)
|
|
|
|
|
|
log.Printf("Request Headers: %v", c.Request.Body)
|
|
|
|
|
|
|
|
|
|
|
|
log.Printf("----------------------------------------------------")
|
|
|
|
|
|
|
2025-01-31 18:25:31 +01:00
|
|
|
|
config.DebugLog("📩 Incoming Ban Notification: %s\n", string(body))
|
2025-01-30 12:35:16 +01:00
|
|
|
|
|
|
|
|
|
|
// Rebind body so Gin can parse it again (important!)
|
|
|
|
|
|
c.Request.Body = io.NopCloser(bytes.NewBuffer(body))
|
|
|
|
|
|
|
2025-07-16 15:47:33 +02:00
|
|
|
|
log.Printf("Request Content-Length: %d", c.Request.ContentLength)
|
|
|
|
|
|
log.Printf("Request Headers: %v", c.Request.Header)
|
|
|
|
|
|
log.Printf("Request Headers: %v", c.Request.Body)
|
|
|
|
|
|
|
2025-01-29 23:48:06 +01:00
|
|
|
|
// Parse JSON request body
|
|
|
|
|
|
if err := c.ShouldBindJSON(&request); err != nil {
|
2025-07-16 15:47:33 +02:00
|
|
|
|
var verr validator.ValidationErrors
|
|
|
|
|
|
if errors.As(err, &verr) {
|
|
|
|
|
|
for _, fe := range verr {
|
|
|
|
|
|
log.Printf("❌ Validierungsfehler: Feld '%s' verletzt Regel '%s'", fe.Field(), fe.ActualTag())
|
|
|
|
|
|
}
|
|
|
|
|
|
} else {
|
|
|
|
|
|
log.Printf("❌ JSON-Parsing Fehler: %v", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
log.Printf("Raw JSON: %s", string(body))
|
2025-01-29 23:48:06 +01:00
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid request: " + err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-01-30 12:35:16 +01:00
|
|
|
|
// **DEBUGGING: Log Parsed Request**
|
|
|
|
|
|
log.Printf("✅ Parsed Ban Request - IP: %s, Jail: %s, Hostname: %s, Failures: %s",
|
|
|
|
|
|
request.IP, request.Jail, request.Hostname, request.Failures)
|
|
|
|
|
|
|
2025-11-12 15:52:34 +01:00
|
|
|
|
server, err := resolveServerForNotification(request.ServerID, request.Hostname)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-01-29 23:48:06 +01:00
|
|
|
|
// Handle the Fail2Ban notification
|
2025-11-12 15:52:34 +01:00
|
|
|
|
if err := HandleBanNotification(c.Request.Context(), server, request.IP, request.Jail, request.Hostname, request.Failures, request.Whois, request.Logs); err != nil {
|
2025-01-30 12:35:16 +01:00
|
|
|
|
log.Printf("❌ Failed to process ban notification: %v\n", err)
|
2025-01-29 23:48:06 +01:00
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to process ban notification: " + err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Respond with success
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"message": "Ban notification processed successfully"})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-12 15:52:34 +01:00
|
|
|
|
// ListBanEventsHandler returns stored ban events from the internal database.
|
|
|
|
|
|
func ListBanEventsHandler(c *gin.Context) {
|
|
|
|
|
|
serverID := c.Query("serverId")
|
|
|
|
|
|
limit := 100
|
|
|
|
|
|
if limitStr := c.DefaultQuery("limit", "100"); limitStr != "" {
|
|
|
|
|
|
if parsed, err := strconv.Atoi(limitStr); err == nil && parsed > 0 {
|
|
|
|
|
|
limit = parsed
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
var since time.Time
|
|
|
|
|
|
if sinceStr := c.Query("since"); sinceStr != "" {
|
|
|
|
|
|
if parsed, err := time.Parse(time.RFC3339, sinceStr); err == nil {
|
|
|
|
|
|
since = parsed
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
events, err := storage.ListBanEvents(c.Request.Context(), serverID, limit, since)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"events": events})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// BanStatisticsHandler returns aggregated ban counts per server.
|
|
|
|
|
|
func BanStatisticsHandler(c *gin.Context) {
|
|
|
|
|
|
var since time.Time
|
|
|
|
|
|
if sinceStr := c.Query("since"); sinceStr != "" {
|
|
|
|
|
|
if parsed, err := time.Parse(time.RFC3339, sinceStr); err == nil {
|
|
|
|
|
|
since = parsed
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
stats, err := storage.CountBanEventsByServer(c.Request.Context(), since)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"counts": stats})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-17 13:29:50 +01:00
|
|
|
|
// BanInsightsHandler returns aggregate stats for countries and recurring IPs.
|
|
|
|
|
|
func BanInsightsHandler(c *gin.Context) {
|
|
|
|
|
|
var since time.Time
|
|
|
|
|
|
if sinceStr := c.Query("since"); sinceStr != "" {
|
|
|
|
|
|
if parsed, err := time.Parse(time.RFC3339, sinceStr); err == nil {
|
|
|
|
|
|
since = parsed
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
2025-11-17 20:24:46 +01:00
|
|
|
|
serverID := c.Query("serverId")
|
2025-11-17 13:29:50 +01:00
|
|
|
|
|
|
|
|
|
|
minCount := 3
|
|
|
|
|
|
if minCountStr := c.DefaultQuery("minCount", "3"); minCountStr != "" {
|
|
|
|
|
|
if parsed, err := strconv.Atoi(minCountStr); err == nil && parsed > 0 {
|
|
|
|
|
|
minCount = parsed
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
limit := 50
|
|
|
|
|
|
if limitStr := c.DefaultQuery("limit", "50"); limitStr != "" {
|
|
|
|
|
|
if parsed, err := strconv.Atoi(limitStr); err == nil && parsed > 0 {
|
|
|
|
|
|
limit = parsed
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
ctx := c.Request.Context()
|
|
|
|
|
|
|
2025-11-17 20:24:46 +01:00
|
|
|
|
countriesMap, err := storage.CountBanEventsByCountry(ctx, since, serverID)
|
2025-11-17 13:29:50 +01:00
|
|
|
|
if err != nil {
|
2025-11-22 14:34:49 +01:00
|
|
|
|
settings := config.GetSettings()
|
|
|
|
|
|
errorMsg := err.Error()
|
|
|
|
|
|
if settings.Debug {
|
|
|
|
|
|
config.DebugLog("BanInsightsHandler: CountBanEventsByCountry error: %v", err)
|
|
|
|
|
|
errorMsg = fmt.Sprintf("CountBanEventsByCountry failed: %v", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": errorMsg})
|
2025-11-17 13:29:50 +01:00
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-17 20:24:46 +01:00
|
|
|
|
recurring, err := storage.ListRecurringIPStats(ctx, since, minCount, limit, serverID)
|
2025-11-17 13:29:50 +01:00
|
|
|
|
if err != nil {
|
2025-11-22 14:34:49 +01:00
|
|
|
|
settings := config.GetSettings()
|
|
|
|
|
|
errorMsg := err.Error()
|
|
|
|
|
|
if settings.Debug {
|
|
|
|
|
|
config.DebugLog("BanInsightsHandler: ListRecurringIPStats error: %v", err)
|
|
|
|
|
|
errorMsg = fmt.Sprintf("ListRecurringIPStats failed: %v", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": errorMsg})
|
2025-11-17 13:29:50 +01:00
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-17 20:24:46 +01:00
|
|
|
|
totalOverall, err := storage.CountBanEvents(ctx, time.Time{}, serverID)
|
2025-11-17 13:29:50 +01:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
now := time.Now().UTC()
|
|
|
|
|
|
|
2025-11-17 20:24:46 +01:00
|
|
|
|
totalToday, err := storage.CountBanEvents(ctx, now.Add(-24*time.Hour), serverID)
|
2025-11-17 13:29:50 +01:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-17 20:24:46 +01:00
|
|
|
|
totalWeek, err := storage.CountBanEvents(ctx, now.Add(-7*24*time.Hour), serverID)
|
2025-11-17 13:29:50 +01:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
type countryStat struct {
|
|
|
|
|
|
Country string `json:"country"`
|
|
|
|
|
|
Count int64 `json:"count"`
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
countries := make([]countryStat, 0, len(countriesMap))
|
|
|
|
|
|
for country, count := range countriesMap {
|
|
|
|
|
|
countries = append(countries, countryStat{
|
|
|
|
|
|
Country: country,
|
|
|
|
|
|
Count: count,
|
|
|
|
|
|
})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sort.Slice(countries, func(i, j int) bool {
|
|
|
|
|
|
if countries[i].Count == countries[j].Count {
|
|
|
|
|
|
return countries[i].Country < countries[j].Country
|
|
|
|
|
|
}
|
|
|
|
|
|
return countries[i].Count > countries[j].Count
|
|
|
|
|
|
})
|
|
|
|
|
|
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{
|
|
|
|
|
|
"countries": countries,
|
|
|
|
|
|
"recurring": recurring,
|
|
|
|
|
|
"totals": gin.H{
|
|
|
|
|
|
"overall": totalOverall,
|
|
|
|
|
|
"today": totalToday,
|
|
|
|
|
|
"week": totalWeek,
|
|
|
|
|
|
},
|
|
|
|
|
|
})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-12 15:52:34 +01:00
|
|
|
|
// ListServersHandler returns configured Fail2ban servers.
|
|
|
|
|
|
func ListServersHandler(c *gin.Context) {
|
|
|
|
|
|
servers := config.ListServers()
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"servers": servers})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// UpsertServerHandler creates or updates a Fail2ban server configuration.
|
|
|
|
|
|
func UpsertServerHandler(c *gin.Context) {
|
|
|
|
|
|
var req config.Fail2banServer
|
|
|
|
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "invalid JSON: " + err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
switch strings.ToLower(req.Type) {
|
|
|
|
|
|
case "", "local":
|
|
|
|
|
|
req.Type = "local"
|
|
|
|
|
|
case "ssh":
|
|
|
|
|
|
if req.Host == "" || req.SSHUser == "" {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "ssh servers require host and sshUser"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
case "agent":
|
|
|
|
|
|
if req.AgentURL == "" || req.AgentSecret == "" {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "agent servers require agentUrl and agentSecret"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
default:
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "unsupported server type"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-14 11:44:23 +01:00
|
|
|
|
// Check if server exists and was previously disabled
|
|
|
|
|
|
oldServer, wasEnabled := config.GetServerByID(req.ID)
|
|
|
|
|
|
wasDisabled := !wasEnabled || !oldServer.Enabled
|
|
|
|
|
|
|
2025-11-12 15:52:34 +01:00
|
|
|
|
server, err := config.UpsertServer(req)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-14 11:44:23 +01:00
|
|
|
|
// Check if server was just enabled (transition from disabled to enabled)
|
|
|
|
|
|
justEnabled := wasDisabled && server.Enabled
|
|
|
|
|
|
|
2025-11-12 15:52:34 +01:00
|
|
|
|
if err := fail2ban.GetManager().ReloadFromSettings(config.GetSettings()); err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-14 11:44:23 +01:00
|
|
|
|
// Only update action files if:
|
|
|
|
|
|
// 1. Server was just enabled (transition from disabled to enabled)
|
|
|
|
|
|
// 2. Server is a remote server (SSH or Agent)
|
|
|
|
|
|
// Note: ReloadFromSettings already calls ensureAction when creating connectors,
|
|
|
|
|
|
// but we need to update if the server was just enabled to ensure it has the latest callback URL
|
|
|
|
|
|
if justEnabled && (server.Type == "ssh" || server.Type == "agent") {
|
|
|
|
|
|
if err := fail2ban.GetManager().UpdateActionFileForServer(c.Request.Context(), server.ID); err != nil {
|
|
|
|
|
|
config.DebugLog("Warning: failed to update action file for server %s: %v", server.Name, err)
|
2025-11-14 11:20:18 +01:00
|
|
|
|
// Don't fail the request, just log the warning
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-12 15:52:34 +01:00
|
|
|
|
c.JSON(http.StatusOK, gin.H{"server": server})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// DeleteServerHandler removes a server configuration.
|
|
|
|
|
|
func DeleteServerHandler(c *gin.Context) {
|
|
|
|
|
|
id := c.Param("id")
|
|
|
|
|
|
if id == "" {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "missing id parameter"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
if err := config.DeleteServer(id); err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
if err := fail2ban.GetManager().ReloadFromSettings(config.GetSettings()); err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"message": "server deleted"})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// SetDefaultServerHandler marks a server as default.
|
|
|
|
|
|
func SetDefaultServerHandler(c *gin.Context) {
|
|
|
|
|
|
id := c.Param("id")
|
|
|
|
|
|
if id == "" {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "missing id parameter"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
server, err := config.SetDefaultServer(id)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
if err := fail2ban.GetManager().ReloadFromSettings(config.GetSettings()); err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"server": server})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// ListSSHKeysHandler returns SSH keys available on the UI host.
|
|
|
|
|
|
func ListSSHKeysHandler(c *gin.Context) {
|
2025-11-13 22:29:13 +01:00
|
|
|
|
var dir string
|
|
|
|
|
|
// Check if running inside a container
|
|
|
|
|
|
if _, container := os.LookupEnv("CONTAINER"); container {
|
|
|
|
|
|
// In container, check /config/.ssh
|
|
|
|
|
|
dir = "/config/.ssh"
|
|
|
|
|
|
} else {
|
|
|
|
|
|
// On host, check ~/.ssh
|
|
|
|
|
|
home, err := os.UserHomeDir()
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
dir = filepath.Join(home, ".ssh")
|
2025-11-12 15:52:34 +01:00
|
|
|
|
}
|
2025-11-13 22:29:13 +01:00
|
|
|
|
|
2025-11-12 15:52:34 +01:00
|
|
|
|
entries, err := os.ReadDir(dir)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
if os.IsNotExist(err) {
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"keys": []string{}, "messageKey": "servers.form.no_keys"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
var keys []string
|
|
|
|
|
|
for _, entry := range entries {
|
|
|
|
|
|
if entry.IsDir() {
|
|
|
|
|
|
continue
|
|
|
|
|
|
}
|
|
|
|
|
|
name := entry.Name()
|
|
|
|
|
|
if strings.HasPrefix(name, "id_") || strings.HasSuffix(name, ".pem") || strings.HasSuffix(name, ".key") {
|
|
|
|
|
|
keys = append(keys, filepath.Join(dir, name))
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
if len(keys) == 0 {
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"keys": []string{}, "messageKey": "servers.form.no_keys"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"keys": keys})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// TestServerHandler verifies connectivity to a configured Fail2ban server.
|
|
|
|
|
|
func TestServerHandler(c *gin.Context) {
|
|
|
|
|
|
id := c.Param("id")
|
|
|
|
|
|
if id == "" {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "missing id parameter"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
server, ok := config.GetServerByID(id)
|
|
|
|
|
|
if !ok {
|
|
|
|
|
|
c.JSON(http.StatusNotFound, gin.H{"error": "server not found"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
ctx, cancel := context.WithTimeout(c.Request.Context(), 15*time.Second)
|
|
|
|
|
|
defer cancel()
|
|
|
|
|
|
|
|
|
|
|
|
var (
|
|
|
|
|
|
conn fail2ban.Connector
|
|
|
|
|
|
err error
|
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
switch server.Type {
|
|
|
|
|
|
case "local":
|
|
|
|
|
|
conn = fail2ban.NewLocalConnector(server)
|
|
|
|
|
|
case "ssh":
|
|
|
|
|
|
conn, err = fail2ban.NewSSHConnector(server)
|
|
|
|
|
|
case "agent":
|
|
|
|
|
|
conn, err = fail2ban.NewAgentConnector(server)
|
|
|
|
|
|
default:
|
|
|
|
|
|
err = fmt.Errorf("unsupported server type %s", server.Type)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error(), "messageKey": "servers.actions.test_failure"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if _, err := conn.GetJailInfos(ctx); err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error(), "messageKey": "servers.actions.test_failure"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"messageKey": "servers.actions.test_success"})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// HandleBanNotification processes Fail2Ban notifications, checks geo-location, stores the event, and sends alerts.
|
|
|
|
|
|
func HandleBanNotification(ctx context.Context, server config.Fail2banServer, ip, jail, hostname, failures, whois, logs string) error {
|
2025-01-29 23:48:06 +01:00
|
|
|
|
// Load settings to get alert countries
|
|
|
|
|
|
settings := config.GetSettings()
|
|
|
|
|
|
|
|
|
|
|
|
// Lookup the country for the given IP
|
|
|
|
|
|
country, err := lookupCountry(ip)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
log.Printf("⚠️ GeoIP lookup failed for IP %s: %v", ip, err)
|
2025-11-12 15:52:34 +01:00
|
|
|
|
country = ""
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
event := storage.BanEventRecord{
|
|
|
|
|
|
ServerID: server.ID,
|
|
|
|
|
|
ServerName: server.Name,
|
|
|
|
|
|
Jail: jail,
|
|
|
|
|
|
IP: ip,
|
|
|
|
|
|
Country: country,
|
|
|
|
|
|
Hostname: hostname,
|
|
|
|
|
|
Failures: failures,
|
|
|
|
|
|
Whois: whois,
|
|
|
|
|
|
Logs: logs,
|
|
|
|
|
|
OccurredAt: time.Now().UTC(),
|
|
|
|
|
|
}
|
|
|
|
|
|
if err := storage.RecordBanEvent(ctx, event); err != nil {
|
|
|
|
|
|
log.Printf("⚠️ Failed to record ban event: %v", err)
|
2025-01-29 23:48:06 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-18 15:02:50 +01:00
|
|
|
|
evaluateAdvancedActions(ctx, settings, server, ip)
|
|
|
|
|
|
|
2025-01-29 23:48:06 +01:00
|
|
|
|
// Check if country is in alert list
|
2025-11-12 15:52:34 +01:00
|
|
|
|
displayCountry := country
|
|
|
|
|
|
if displayCountry == "" {
|
|
|
|
|
|
displayCountry = "UNKNOWN"
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-01-29 23:48:06 +01:00
|
|
|
|
if !shouldAlertForCountry(country, settings.AlertCountries) {
|
2025-11-12 15:52:34 +01:00
|
|
|
|
log.Printf("❌ IP %s belongs to %s, which is NOT in alert countries (%v). No alert sent.", ip, displayCountry, settings.AlertCountries)
|
2025-01-29 23:48:06 +01:00
|
|
|
|
return nil
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Send email notification
|
|
|
|
|
|
if err := sendBanAlert(ip, jail, hostname, failures, whois, logs, country, settings); err != nil {
|
|
|
|
|
|
log.Printf("❌ Failed to send alert email: %v", err)
|
|
|
|
|
|
return err
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-12 15:52:34 +01:00
|
|
|
|
log.Printf("✅ Email alert sent for banned IP %s (%s)", ip, displayCountry)
|
2025-01-29 23:48:06 +01:00
|
|
|
|
return nil
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// lookupCountry finds the country ISO code for a given IP using MaxMind GeoLite2 database.
|
|
|
|
|
|
func lookupCountry(ip string) (string, error) {
|
|
|
|
|
|
// Convert the IP string to net.IP
|
|
|
|
|
|
parsedIP := net.ParseIP(ip)
|
|
|
|
|
|
if parsedIP == nil {
|
|
|
|
|
|
return "", fmt.Errorf("invalid IP address: %s", ip)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Open the GeoIP database
|
|
|
|
|
|
db, err := maxminddb.Open("/usr/share/GeoIP/GeoLite2-Country.mmdb")
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
return "", fmt.Errorf("failed to open GeoIP database: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
defer db.Close()
|
|
|
|
|
|
|
|
|
|
|
|
// Define the structure to store the lookup result
|
|
|
|
|
|
var record struct {
|
|
|
|
|
|
Country struct {
|
|
|
|
|
|
ISOCode string `maxminddb:"iso_code"`
|
|
|
|
|
|
} `maxminddb:"country"`
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Perform the lookup using net.IP type
|
|
|
|
|
|
if err := db.Lookup(parsedIP, &record); err != nil {
|
|
|
|
|
|
return "", fmt.Errorf("GeoIP lookup error: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Return the country code
|
|
|
|
|
|
return record.Country.ISOCode, nil
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// shouldAlertForCountry checks if an IP’s country is in the allowed alert list.
|
|
|
|
|
|
func shouldAlertForCountry(country string, alertCountries []string) bool {
|
|
|
|
|
|
if len(alertCountries) == 0 || strings.Contains(strings.Join(alertCountries, ","), "ALL") {
|
|
|
|
|
|
return true // If "ALL" is selected, alert for all bans
|
|
|
|
|
|
}
|
|
|
|
|
|
for _, c := range alertCountries {
|
|
|
|
|
|
if strings.EqualFold(country, c) {
|
|
|
|
|
|
return true
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
return false
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-01-25 21:43:50 +01:00
|
|
|
|
// IndexHandler serves the HTML page
|
2025-01-25 16:21:14 +01:00
|
|
|
|
func IndexHandler(c *gin.Context) {
|
|
|
|
|
|
c.HTML(http.StatusOK, "index.html", gin.H{
|
|
|
|
|
|
"timestamp": time.Now().Format(time.RFC1123),
|
|
|
|
|
|
})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-01-25 21:43:50 +01:00
|
|
|
|
// GetJailFilterConfigHandler returns the raw filter config for a given jail
|
|
|
|
|
|
func GetJailFilterConfigHandler(c *gin.Context) {
|
2025-01-31 21:34:15 +01:00
|
|
|
|
config.DebugLog("----------------------------")
|
|
|
|
|
|
config.DebugLog("GetJailFilterConfigHandler called (handlers.go)") // entry point
|
2025-01-25 21:43:50 +01:00
|
|
|
|
jail := c.Param("jail")
|
2025-11-14 10:22:44 +01:00
|
|
|
|
conn, err := resolveConnector(c)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
cfg, err := conn.GetFilterConfig(c.Request.Context(), jail)
|
2025-01-25 21:43:50 +01:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{
|
|
|
|
|
|
"jail": jail,
|
|
|
|
|
|
"config": cfg,
|
|
|
|
|
|
})
|
2025-01-25 16:21:14 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
2025-01-25 21:43:50 +01:00
|
|
|
|
// SetJailFilterConfigHandler overwrites the current filter config with new content
|
|
|
|
|
|
func SetJailFilterConfigHandler(c *gin.Context) {
|
2025-01-31 18:25:31 +01:00
|
|
|
|
config.DebugLog("----------------------------")
|
|
|
|
|
|
config.DebugLog("SetJailFilterConfigHandler called (handlers.go)") // entry point
|
2025-01-25 21:43:50 +01:00
|
|
|
|
jail := c.Param("jail")
|
2025-11-14 10:22:44 +01:00
|
|
|
|
conn, err := resolveConnector(c)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
2025-01-25 16:21:14 +01:00
|
|
|
|
|
2025-01-26 20:05:07 +01:00
|
|
|
|
// Parse JSON body (containing the new filter content)
|
2025-01-25 21:43:50 +01:00
|
|
|
|
var req struct {
|
|
|
|
|
|
Config string `json:"config"`
|
|
|
|
|
|
}
|
|
|
|
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "invalid JSON body"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
2025-01-25 16:21:14 +01:00
|
|
|
|
|
2025-11-14 10:22:44 +01:00
|
|
|
|
if err := conn.SetFilterConfig(c.Request.Context(), jail, req.Config); err != nil {
|
2025-01-25 21:43:50 +01:00
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-14 10:22:44 +01:00
|
|
|
|
if err := conn.Reload(c.Request.Context()); err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "filter saved but reload failed: " + err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
2025-01-26 20:05:07 +01:00
|
|
|
|
|
2025-11-14 10:22:44 +01:00
|
|
|
|
c.JSON(http.StatusOK, gin.H{"message": "Filter updated and fail2ban reloaded"})
|
2025-01-25 21:43:50 +01:00
|
|
|
|
}
|
2025-01-25 16:21:14 +01:00
|
|
|
|
|
2025-02-26 16:55:21 +01:00
|
|
|
|
// ManageJailsHandler returns a list of all jails (from jail.local and jail.d)
|
|
|
|
|
|
// including their enabled status.
|
|
|
|
|
|
func ManageJailsHandler(c *gin.Context) {
|
|
|
|
|
|
config.DebugLog("----------------------------")
|
|
|
|
|
|
config.DebugLog("ManageJailsHandler called (handlers.go)") // entry point
|
2025-11-12 16:25:16 +01:00
|
|
|
|
conn, err := resolveConnector(c)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
jails, err := conn.GetAllJails(c.Request.Context())
|
2025-02-26 16:55:21 +01:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to load jails: " + err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"jails": jails})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-18 15:02:50 +01:00
|
|
|
|
// ListPermanentBlocksHandler exposes the permanent block log.
|
|
|
|
|
|
func ListPermanentBlocksHandler(c *gin.Context) {
|
|
|
|
|
|
limit := 100
|
|
|
|
|
|
if limitStr := c.DefaultQuery("limit", "100"); limitStr != "" {
|
|
|
|
|
|
if parsed, err := strconv.Atoi(limitStr); err == nil && parsed > 0 {
|
|
|
|
|
|
limit = parsed
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
records, err := storage.ListPermanentBlocks(c.Request.Context(), limit)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"blocks": records})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// AdvancedActionsTestHandler allows manual block/unblock tests.
|
|
|
|
|
|
func AdvancedActionsTestHandler(c *gin.Context) {
|
|
|
|
|
|
var req struct {
|
|
|
|
|
|
Action string `json:"action"`
|
|
|
|
|
|
IP string `json:"ip"`
|
|
|
|
|
|
ServerID string `json:"serverId"`
|
|
|
|
|
|
}
|
|
|
|
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "invalid payload"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
if req.IP == "" {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "ip is required"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
action := strings.ToLower(req.Action)
|
|
|
|
|
|
if action == "" {
|
|
|
|
|
|
action = "block"
|
|
|
|
|
|
}
|
|
|
|
|
|
if action != "block" && action != "unblock" {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "action must be block or unblock"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
settings := config.GetSettings()
|
|
|
|
|
|
server := config.Fail2banServer{}
|
|
|
|
|
|
if req.ServerID != "" {
|
|
|
|
|
|
if srv, ok := config.GetServerByID(req.ServerID); ok {
|
|
|
|
|
|
server = srv
|
|
|
|
|
|
} else {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "server not found"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-30 13:26:09 +01:00
|
|
|
|
// Check if IP is already blocked before attempting action (for block action only)
|
|
|
|
|
|
skipLoggingIfAlreadyBlocked := false
|
|
|
|
|
|
if action == "block" && settings.AdvancedActions.Integration != "" {
|
|
|
|
|
|
active, checkErr := storage.IsPermanentBlockActive(c.Request.Context(), req.IP, settings.AdvancedActions.Integration)
|
|
|
|
|
|
if checkErr == nil && active {
|
|
|
|
|
|
// IP is already blocked, we'll check the error message after the call
|
|
|
|
|
|
skipLoggingIfAlreadyBlocked = true
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-18 15:02:50 +01:00
|
|
|
|
err := runAdvancedIntegrationAction(
|
|
|
|
|
|
c.Request.Context(),
|
|
|
|
|
|
action,
|
|
|
|
|
|
req.IP,
|
|
|
|
|
|
settings,
|
|
|
|
|
|
server,
|
|
|
|
|
|
map[string]any{"manual": true},
|
2025-11-30 13:26:09 +01:00
|
|
|
|
skipLoggingIfAlreadyBlocked,
|
2025-11-18 15:02:50 +01:00
|
|
|
|
)
|
|
|
|
|
|
if err != nil {
|
2025-11-30 13:26:09 +01:00
|
|
|
|
// Check if error indicates IP is already blocked - show as info instead of error
|
|
|
|
|
|
if skipLoggingIfAlreadyBlocked {
|
|
|
|
|
|
errMsg := strings.ToLower(err.Error())
|
|
|
|
|
|
if strings.Contains(errMsg, "already have such entry") ||
|
|
|
|
|
|
strings.Contains(errMsg, "already exists") ||
|
|
|
|
|
|
strings.Contains(errMsg, "duplicate") {
|
|
|
|
|
|
// IP is already blocked, return info message with original error
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"message": err.Error(), "info": true})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
2025-11-18 15:02:50 +01:00
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"message": fmt.Sprintf("Action %s completed for %s", action, req.IP)})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-02-26 16:55:21 +01:00
|
|
|
|
// UpdateJailManagementHandler updates the enabled state for each jail.
|
|
|
|
|
|
// Expected JSON format: { "JailName1": true, "JailName2": false, ... }
|
|
|
|
|
|
// After updating, the Fail2ban service is restarted.
|
|
|
|
|
|
func UpdateJailManagementHandler(c *gin.Context) {
|
|
|
|
|
|
config.DebugLog("----------------------------")
|
|
|
|
|
|
config.DebugLog("UpdateJailManagementHandler called (handlers.go)") // entry point
|
2025-11-12 16:25:16 +01:00
|
|
|
|
conn, err := resolveConnector(c)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
2025-02-26 16:55:21 +01:00
|
|
|
|
var updates map[string]bool
|
|
|
|
|
|
if err := c.ShouldBindJSON(&updates); err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "Invalid JSON: " + err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
// Update jail configuration file(s) with the new enabled states.
|
2025-11-12 16:25:16 +01:00
|
|
|
|
if err := conn.UpdateJailEnabledStates(c.Request.Context(), updates); err != nil {
|
2025-02-26 16:55:21 +01:00
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to update jail settings: " + err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
2025-11-14 10:22:44 +01:00
|
|
|
|
if err := config.MarkRestartNeeded(conn.Server().ID); err != nil {
|
2025-02-26 16:55:21 +01:00
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"message": "Jail settings updated successfully"})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-01-26 20:05:07 +01:00
|
|
|
|
// GetSettingsHandler returns the entire AppSettings struct as JSON
|
2025-01-25 21:43:50 +01:00
|
|
|
|
func GetSettingsHandler(c *gin.Context) {
|
2025-01-31 18:25:31 +01:00
|
|
|
|
config.DebugLog("----------------------------")
|
|
|
|
|
|
config.DebugLog("GetSettingsHandler called (handlers.go)") // entry point
|
2025-01-25 21:43:50 +01:00
|
|
|
|
s := config.GetSettings()
|
|
|
|
|
|
c.JSON(http.StatusOK, s)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-01-26 20:05:07 +01:00
|
|
|
|
// UpdateSettingsHandler updates the AppSettings from a JSON body
|
2025-01-25 21:43:50 +01:00
|
|
|
|
func UpdateSettingsHandler(c *gin.Context) {
|
2025-01-31 18:25:31 +01:00
|
|
|
|
config.DebugLog("----------------------------")
|
|
|
|
|
|
config.DebugLog("UpdateSettingsHandler called (handlers.go)") // entry point
|
2025-01-26 20:05:07 +01:00
|
|
|
|
var req config.AppSettings
|
|
|
|
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
2025-01-27 11:09:06 +01:00
|
|
|
|
fmt.Println("JSON binding error:", err) // Debug
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{
|
|
|
|
|
|
"error": "invalid JSON",
|
|
|
|
|
|
"details": err.Error(),
|
|
|
|
|
|
})
|
2025-01-26 20:05:07 +01:00
|
|
|
|
return
|
|
|
|
|
|
}
|
2025-01-31 18:25:31 +01:00
|
|
|
|
config.DebugLog("JSON binding successful, updating settings (handlers.go)")
|
2025-01-25 21:43:50 +01:00
|
|
|
|
|
2025-11-14 11:20:18 +01:00
|
|
|
|
oldSettings := config.GetSettings()
|
2025-01-26 20:05:07 +01:00
|
|
|
|
newSettings, err := config.UpdateSettings(req)
|
|
|
|
|
|
if err != nil {
|
2025-01-27 11:09:06 +01:00
|
|
|
|
fmt.Println("Error updating settings:", err)
|
2025-01-26 20:05:07 +01:00
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
2025-01-31 18:25:31 +01:00
|
|
|
|
config.DebugLog("Settings updated successfully (handlers.go)")
|
2025-01-25 21:43:50 +01:00
|
|
|
|
|
2025-11-14 11:20:18 +01:00
|
|
|
|
// Check if callback URL changed - if so, update action files for all active remote servers
|
|
|
|
|
|
callbackURLChanged := oldSettings.CallbackURL != newSettings.CallbackURL
|
|
|
|
|
|
|
2025-11-12 15:52:34 +01:00
|
|
|
|
if err := fail2ban.GetManager().ReloadFromSettings(config.GetSettings()); err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "failed to reload fail2ban connectors: " + err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-14 11:20:18 +01:00
|
|
|
|
// Update action files for remote servers if callback URL changed
|
|
|
|
|
|
if callbackURLChanged {
|
|
|
|
|
|
if err := fail2ban.GetManager().UpdateActionFiles(c.Request.Context()); err != nil {
|
|
|
|
|
|
config.DebugLog("Warning: failed to update some remote action files: %v", err)
|
|
|
|
|
|
// Don't fail the request, just log the warning
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-01-25 21:43:50 +01:00
|
|
|
|
c.JSON(http.StatusOK, gin.H{
|
2025-02-26 17:44:13 +01:00
|
|
|
|
"message": "Settings updated",
|
|
|
|
|
|
"restartNeeded": newSettings.RestartNeeded,
|
2025-01-25 21:43:50 +01:00
|
|
|
|
})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// ListFiltersHandler returns a JSON array of filter names
|
|
|
|
|
|
// found as *.conf in /etc/fail2ban/filter.d
|
|
|
|
|
|
func ListFiltersHandler(c *gin.Context) {
|
2025-01-31 18:25:31 +01:00
|
|
|
|
config.DebugLog("----------------------------")
|
|
|
|
|
|
config.DebugLog("ListFiltersHandler called (handlers.go)") // entry point
|
2025-11-12 15:52:34 +01:00
|
|
|
|
conn, err := resolveConnector(c)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
server := conn.Server()
|
2025-11-12 16:25:16 +01:00
|
|
|
|
if server.Type == "local" {
|
|
|
|
|
|
// For local, check if directory exists first
|
|
|
|
|
|
dir := "/etc/fail2ban/filter.d"
|
|
|
|
|
|
if _, statErr := os.Stat(dir); statErr != nil {
|
|
|
|
|
|
if os.IsNotExist(statErr) {
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"filters": []string{}, "messageKey": "filter_debug.local_missing"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to read filter directory: " + statErr.Error()})
|
2025-11-12 15:52:34 +01:00
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
2025-01-25 21:43:50 +01:00
|
|
|
|
|
2025-11-12 16:25:16 +01:00
|
|
|
|
filters, err := conn.GetFilters(c.Request.Context())
|
2025-01-25 21:43:50 +01:00
|
|
|
|
if err != nil {
|
2025-11-12 16:25:16 +01:00
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to list filters: " + err.Error()})
|
2025-01-25 21:43:50 +01:00
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"filters": filters})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func TestFilterHandler(c *gin.Context) {
|
2025-01-31 18:25:31 +01:00
|
|
|
|
config.DebugLog("----------------------------")
|
|
|
|
|
|
config.DebugLog("TestFilterHandler called (handlers.go)") // entry point
|
2025-11-12 16:25:16 +01:00
|
|
|
|
conn, err := resolveConnector(c)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
2025-01-25 21:43:50 +01:00
|
|
|
|
var req struct {
|
|
|
|
|
|
FilterName string `json:"filterName"`
|
|
|
|
|
|
LogLines []string `json:"logLines"`
|
|
|
|
|
|
}
|
|
|
|
|
|
if err := c.ShouldBindJSON(&req); err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": "invalid JSON"})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-18 09:25:15 +01:00
|
|
|
|
output, err := conn.TestFilter(c.Request.Context(), req.FilterName, req.LogLines)
|
2025-11-12 16:25:16 +01:00
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to test filter: " + err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
2025-11-18 09:25:15 +01:00
|
|
|
|
c.JSON(http.StatusOK, gin.H{"output": output})
|
2025-01-25 16:21:14 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
2025-01-26 20:05:07 +01:00
|
|
|
|
// ApplyFail2banSettings updates /etc/fail2ban/jail.local [DEFAULT] with our JSON
|
|
|
|
|
|
func ApplyFail2banSettings(jailLocalPath string) error {
|
2025-01-31 18:25:31 +01:00
|
|
|
|
config.DebugLog("----------------------------")
|
|
|
|
|
|
config.DebugLog("ApplyFail2banSettings called (handlers.go)") // entry point
|
2025-01-26 20:05:07 +01:00
|
|
|
|
s := config.GetSettings()
|
|
|
|
|
|
|
|
|
|
|
|
// open /etc/fail2ban/jail.local, parse or do a simplistic approach:
|
|
|
|
|
|
// TODO: -> maybe we store [DEFAULT] block in memory, replace lines
|
|
|
|
|
|
// or do a line-based approach. Example is simplistic:
|
|
|
|
|
|
|
|
|
|
|
|
newLines := []string{
|
|
|
|
|
|
"[DEFAULT]",
|
|
|
|
|
|
fmt.Sprintf("bantime.increment = %t", s.BantimeIncrement),
|
|
|
|
|
|
fmt.Sprintf("ignoreip = %s", s.IgnoreIP),
|
|
|
|
|
|
fmt.Sprintf("bantime = %s", s.Bantime),
|
|
|
|
|
|
fmt.Sprintf("findtime = %s", s.Findtime),
|
|
|
|
|
|
fmt.Sprintf("maxretry = %d", s.Maxretry),
|
|
|
|
|
|
fmt.Sprintf("destemail = %s", s.Destemail),
|
2025-01-30 11:00:14 +01:00
|
|
|
|
//fmt.Sprintf("sender = %s", s.Sender),
|
2025-01-26 20:05:07 +01:00
|
|
|
|
"",
|
|
|
|
|
|
}
|
|
|
|
|
|
content := strings.Join(newLines, "\n")
|
|
|
|
|
|
|
|
|
|
|
|
return os.WriteFile(jailLocalPath, []byte(content), 0644)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-02-26 17:44:13 +01:00
|
|
|
|
// RestartFail2banHandler reloads the Fail2ban service
|
|
|
|
|
|
func RestartFail2banHandler(c *gin.Context) {
|
2025-01-31 18:25:31 +01:00
|
|
|
|
config.DebugLog("----------------------------")
|
|
|
|
|
|
config.DebugLog("ApplyFail2banSettings called (handlers.go)") // entry point
|
2025-01-27 11:09:06 +01:00
|
|
|
|
|
2025-11-14 10:22:44 +01:00
|
|
|
|
conn, err := resolveConnector(c)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
c.JSON(http.StatusBadRequest, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
server := conn.Server()
|
2025-01-26 20:05:07 +01:00
|
|
|
|
|
2025-02-27 14:03:08 +01:00
|
|
|
|
// Attempt to restart the fail2ban service.
|
2025-11-14 10:22:44 +01:00
|
|
|
|
restartErr := fail2ban.RestartFail2ban(server.ID)
|
2025-02-27 14:03:08 +01:00
|
|
|
|
if restartErr != nil {
|
|
|
|
|
|
// Check if running inside a container.
|
2025-11-14 10:22:44 +01:00
|
|
|
|
if _, container := os.LookupEnv("CONTAINER"); container && server.Type == "local" {
|
2025-02-27 14:03:08 +01:00
|
|
|
|
// In a container, the restart command may fail (since fail2ban runs on the host).
|
|
|
|
|
|
// Log the error and continue, so we can mark the restart as done.
|
|
|
|
|
|
log.Printf("Warning: restart failed inside container (expected behavior): %v", restartErr)
|
|
|
|
|
|
} else {
|
|
|
|
|
|
// On the host, a restart error is not acceptable.
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": restartErr.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
2025-01-25 21:43:50 +01:00
|
|
|
|
}
|
2025-01-26 20:05:07 +01:00
|
|
|
|
|
2025-02-27 14:03:08 +01:00
|
|
|
|
// Only call MarkRestartDone if we either successfully restarted the service or we are in a container.
|
2025-11-14 10:22:44 +01:00
|
|
|
|
if err := config.MarkRestartDone(server.ID); err != nil {
|
2025-01-27 11:09:06 +01:00
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
2025-02-26 17:44:13 +01:00
|
|
|
|
c.JSON(http.StatusOK, gin.H{"message": "Fail2ban restarted successfully"})
|
2025-01-25 21:43:50 +01:00
|
|
|
|
}
|
2025-01-30 11:00:14 +01:00
|
|
|
|
|
2025-11-22 13:09:54 +01:00
|
|
|
|
// loadLocale loads a locale JSON file and returns a map of translations
|
|
|
|
|
|
func loadLocale(lang string) (map[string]string, error) {
|
|
|
|
|
|
localeCacheLock.RLock()
|
|
|
|
|
|
if cached, ok := localeCache[lang]; ok {
|
|
|
|
|
|
localeCacheLock.RUnlock()
|
|
|
|
|
|
return cached, nil
|
|
|
|
|
|
}
|
|
|
|
|
|
localeCacheLock.RUnlock()
|
|
|
|
|
|
|
|
|
|
|
|
// Determine locale file path
|
|
|
|
|
|
var localePath string
|
|
|
|
|
|
_, container := os.LookupEnv("CONTAINER")
|
|
|
|
|
|
if container {
|
|
|
|
|
|
localePath = fmt.Sprintf("/app/locales/%s.json", lang)
|
|
|
|
|
|
} else {
|
|
|
|
|
|
localePath = fmt.Sprintf("./internal/locales/%s.json", lang)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Read locale file
|
|
|
|
|
|
data, err := os.ReadFile(localePath)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
// Fallback to English if locale file not found
|
|
|
|
|
|
if lang != "en" {
|
|
|
|
|
|
return loadLocale("en")
|
|
|
|
|
|
}
|
|
|
|
|
|
return nil, fmt.Errorf("failed to read locale file: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
var translations map[string]string
|
|
|
|
|
|
if err := json.Unmarshal(data, &translations); err != nil {
|
|
|
|
|
|
return nil, fmt.Errorf("failed to parse locale file: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Cache the translations
|
|
|
|
|
|
localeCacheLock.Lock()
|
|
|
|
|
|
localeCache[lang] = translations
|
|
|
|
|
|
localeCacheLock.Unlock()
|
|
|
|
|
|
|
|
|
|
|
|
return translations, nil
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// getEmailTranslation gets a translation key from the locale, with fallback to English
|
|
|
|
|
|
func getEmailTranslation(lang, key string) string {
|
|
|
|
|
|
translations, err := loadLocale(lang)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
// Try English as fallback
|
|
|
|
|
|
if lang != "en" {
|
|
|
|
|
|
translations, err = loadLocale("en")
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
return key // Return key if all else fails
|
|
|
|
|
|
}
|
|
|
|
|
|
} else {
|
|
|
|
|
|
return key
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if translation, ok := translations[key]; ok {
|
|
|
|
|
|
return translation
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Fallback to English if key not found
|
|
|
|
|
|
if lang != "en" {
|
|
|
|
|
|
enTranslations, err := loadLocale("en")
|
|
|
|
|
|
if err == nil {
|
|
|
|
|
|
if enTranslation, ok := enTranslations[key]; ok {
|
|
|
|
|
|
return enTranslation
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return key
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// getEmailStyle returns the email style from environment variable, defaulting to "modern"
|
|
|
|
|
|
func getEmailStyle() string {
|
|
|
|
|
|
style := os.Getenv("emailStyle")
|
|
|
|
|
|
if style == "classic" {
|
|
|
|
|
|
return "classic"
|
|
|
|
|
|
}
|
|
|
|
|
|
return "modern"
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-01-30 11:00:14 +01:00
|
|
|
|
// *******************************************************************
|
|
|
|
|
|
// * Unified Email Sending Function : *
|
|
|
|
|
|
// *******************************************************************
|
|
|
|
|
|
func sendEmail(to, subject, body string, settings config.AppSettings) error {
|
|
|
|
|
|
// Validate SMTP settings
|
|
|
|
|
|
if settings.SMTP.Host == "" || settings.SMTP.Username == "" || settings.SMTP.Password == "" || settings.SMTP.From == "" {
|
|
|
|
|
|
return errors.New("SMTP settings are incomplete. Please configure all required fields")
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Format message with **correct HTML headers**
|
|
|
|
|
|
message := fmt.Sprintf("From: %s\nTo: %s\nSubject: %s\n"+
|
|
|
|
|
|
"MIME-Version: 1.0\nContent-Type: text/html; charset=\"UTF-8\"\n\n%s",
|
|
|
|
|
|
settings.SMTP.From, to, subject, body)
|
|
|
|
|
|
msg := []byte(message)
|
|
|
|
|
|
|
|
|
|
|
|
// SMTP Connection Config
|
|
|
|
|
|
smtpHost := settings.SMTP.Host
|
|
|
|
|
|
smtpPort := settings.SMTP.Port
|
|
|
|
|
|
auth := LoginAuth(settings.SMTP.Username, settings.SMTP.Password)
|
2025-02-26 16:55:21 +01:00
|
|
|
|
smtpAddr := net.JoinHostPort(smtpHost, fmt.Sprintf("%d", smtpPort))
|
2025-01-30 11:00:14 +01:00
|
|
|
|
|
|
|
|
|
|
// **Choose Connection Type**
|
2025-07-16 15:47:33 +02:00
|
|
|
|
switch smtpPort {
|
|
|
|
|
|
case 465:
|
2025-01-30 11:00:14 +01:00
|
|
|
|
// SMTPS (Implicit TLS) - Not supported at the moment.
|
|
|
|
|
|
tlsConfig := &tls.Config{ServerName: smtpHost}
|
|
|
|
|
|
conn, err := tls.Dial("tcp", smtpAddr, tlsConfig)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
return fmt.Errorf("failed to connect via TLS: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
defer conn.Close()
|
|
|
|
|
|
|
|
|
|
|
|
client, err := smtp.NewClient(conn, smtpHost)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
return fmt.Errorf("failed to create SMTP client: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
defer client.Quit()
|
|
|
|
|
|
|
|
|
|
|
|
if err := client.Auth(auth); err != nil {
|
|
|
|
|
|
return fmt.Errorf("SMTP authentication failed: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return sendSMTPMessage(client, settings.SMTP.From, to, msg)
|
|
|
|
|
|
|
2025-07-16 15:47:33 +02:00
|
|
|
|
case 587:
|
2025-01-30 11:00:14 +01:00
|
|
|
|
// STARTTLS (Explicit TLS)
|
|
|
|
|
|
conn, err := net.Dial("tcp", smtpAddr)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
return fmt.Errorf("failed to connect to SMTP server: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
defer conn.Close()
|
|
|
|
|
|
|
|
|
|
|
|
client, err := smtp.NewClient(conn, smtpHost)
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
return fmt.Errorf("failed to create SMTP client: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
defer client.Quit()
|
|
|
|
|
|
|
|
|
|
|
|
// Start TLS Upgrade
|
|
|
|
|
|
tlsConfig := &tls.Config{ServerName: smtpHost}
|
|
|
|
|
|
if err := client.StartTLS(tlsConfig); err != nil {
|
|
|
|
|
|
return fmt.Errorf("failed to start TLS: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if err := client.Auth(auth); err != nil {
|
|
|
|
|
|
return fmt.Errorf("SMTP authentication failed: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return sendSMTPMessage(client, settings.SMTP.From, to, msg)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return errors.New("unsupported SMTP port. Use 587 (STARTTLS) or 465 (SMTPS)")
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Helper Function to Send SMTP Message
|
|
|
|
|
|
func sendSMTPMessage(client *smtp.Client, from, to string, msg []byte) error {
|
|
|
|
|
|
// Set sender & recipient
|
|
|
|
|
|
if err := client.Mail(from); err != nil {
|
|
|
|
|
|
return fmt.Errorf("failed to set sender: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
if err := client.Rcpt(to); err != nil {
|
|
|
|
|
|
return fmt.Errorf("failed to set recipient: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Send email body
|
|
|
|
|
|
wc, err := client.Data()
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
return fmt.Errorf("failed to start data command: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
defer wc.Close()
|
|
|
|
|
|
|
|
|
|
|
|
if _, err = wc.Write(msg); err != nil {
|
|
|
|
|
|
return fmt.Errorf("failed to write email content: %w", err)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Close connection
|
|
|
|
|
|
client.Quit()
|
|
|
|
|
|
return nil
|
|
|
|
|
|
}
|
|
|
|
|
|
|
2025-11-22 13:09:54 +01:00
|
|
|
|
// renderClassicEmailDetails creates paragraph-based details for classic email template
|
|
|
|
|
|
func renderClassicEmailDetails(details []emailDetail) string {
|
|
|
|
|
|
if len(details) == 0 {
|
|
|
|
|
|
return `<p>No metadata available.</p>`
|
|
|
|
|
|
}
|
|
|
|
|
|
var b strings.Builder
|
|
|
|
|
|
for _, d := range details {
|
|
|
|
|
|
b.WriteString(`<p><span class="label">` + html.EscapeString(d.Label) + `:</span> ` + html.EscapeString(d.Value) + `</p>`)
|
|
|
|
|
|
b.WriteString("\n")
|
|
|
|
|
|
}
|
|
|
|
|
|
return b.String()
|
|
|
|
|
|
}
|
2025-01-30 11:00:14 +01:00
|
|
|
|
|
2025-11-22 13:09:54 +01:00
|
|
|
|
// buildClassicEmailBody creates the classic email template (original design with multilingual support)
|
|
|
|
|
|
func buildClassicEmailBody(title, intro string, details []emailDetail, whoisHTML, logsHTML, whoisTitle, logsTitle, footerText, supportEmail string) string {
|
|
|
|
|
|
detailRows := renderClassicEmailDetails(details)
|
|
|
|
|
|
year := time.Now().Year()
|
|
|
|
|
|
return fmt.Sprintf(`<!DOCTYPE html>
|
2025-01-30 12:35:16 +01:00
|
|
|
|
<html>
|
|
|
|
|
|
<head>
|
|
|
|
|
|
<meta charset="UTF-8">
|
|
|
|
|
|
<meta name="viewport" content="width=device-width, initial-scale=1">
|
2025-11-22 13:09:54 +01:00
|
|
|
|
<title>%s</title>
|
2025-01-30 12:35:16 +01:00
|
|
|
|
<style>
|
|
|
|
|
|
body { font-family: Arial, sans-serif; background-color: #f4f4f4; margin: 0; padding: 0; }
|
|
|
|
|
|
.container { max-width: 600px; margin: 20px auto; background: #ffffff; padding: 20px; border-radius: 8px; box-shadow: 0px 2px 4px rgba(0,0,0,0.1); }
|
2025-01-30 13:44:39 +01:00
|
|
|
|
.header { text-align: center; padding-bottom: 10px; border-bottom: 2px solid #005DE0; }
|
2025-01-30 12:35:16 +01:00
|
|
|
|
.header img { max-width: 150px; }
|
2025-01-30 13:44:39 +01:00
|
|
|
|
.header h2 { color: #005DE0; margin: 10px 0; font-size: 24px; }
|
2025-01-30 12:35:16 +01:00
|
|
|
|
.content { padding: 15px; }
|
2025-01-30 13:44:39 +01:00
|
|
|
|
.details { background: #f9f9f9; padding: 15px; border-left: 4px solid #5579f8; margin-bottom: 10px; }
|
2025-01-30 12:35:16 +01:00
|
|
|
|
.footer { text-align: center; color: #888; font-size: 12px; padding-top: 10px; border-top: 1px solid #ddd; margin-top: 15px; }
|
|
|
|
|
|
.label { font-weight: bold; color: #333; }
|
2025-01-30 13:44:39 +01:00
|
|
|
|
pre {
|
2025-11-22 13:09:54 +01:00
|
|
|
|
background: #222;
|
|
|
|
|
|
color: #ddd;
|
|
|
|
|
|
font-family: "Courier New", Courier, monospace;
|
|
|
|
|
|
font-size: 12px;
|
2025-01-30 13:44:39 +01:00
|
|
|
|
padding: 10px;
|
|
|
|
|
|
border-radius: 5px;
|
2025-11-22 13:09:54 +01:00
|
|
|
|
overflow-x: auto;
|
|
|
|
|
|
white-space: pre-wrap;
|
2025-01-30 13:44:39 +01:00
|
|
|
|
}
|
2025-01-30 12:35:16 +01:00
|
|
|
|
@media screen and (max-width: 600px) {
|
|
|
|
|
|
.container { width: 90%%; padding: 10px; }
|
|
|
|
|
|
.header h2 { font-size: 20px; }
|
|
|
|
|
|
.details p { font-size: 14px; }
|
|
|
|
|
|
.footer { font-size: 10px; }
|
|
|
|
|
|
}
|
|
|
|
|
|
</style>
|
|
|
|
|
|
</head>
|
|
|
|
|
|
<body>
|
|
|
|
|
|
<div class="container">
|
|
|
|
|
|
<div class="header">
|
|
|
|
|
|
<img src="https://swissmakers.ch/wp-content/uploads/2023/09/cyber.png" alt="Swissmakers GmbH" width="150" />
|
2025-11-22 13:09:54 +01:00
|
|
|
|
<h2>🚨 %s</h2>
|
2025-01-30 12:35:16 +01:00
|
|
|
|
</div>
|
|
|
|
|
|
<div class="content">
|
2025-11-22 13:09:54 +01:00
|
|
|
|
<p>%s</p>
|
2025-01-30 12:35:16 +01:00
|
|
|
|
<div class="details">
|
2025-11-22 13:09:54 +01:00
|
|
|
|
%s
|
2025-01-30 12:35:16 +01:00
|
|
|
|
</div>
|
2025-11-22 13:09:54 +01:00
|
|
|
|
<h3>🔍 %s</h3>
|
|
|
|
|
|
%s
|
|
|
|
|
|
<h3>📄 %s</h3>
|
|
|
|
|
|
%s
|
2025-01-30 12:35:16 +01:00
|
|
|
|
</div>
|
|
|
|
|
|
<div class="footer">
|
2025-11-22 13:09:54 +01:00
|
|
|
|
<p>%s</p>
|
|
|
|
|
|
<p>For security inquiries, contact <a href="mailto:%s">%s</a></p>
|
2025-01-30 12:35:16 +01:00
|
|
|
|
<p>© %d Swissmakers GmbH. All rights reserved.</p>
|
|
|
|
|
|
</div>
|
|
|
|
|
|
</div>
|
|
|
|
|
|
</body>
|
2025-11-22 13:09:54 +01:00
|
|
|
|
</html>`, html.EscapeString(title), html.EscapeString(title), html.EscapeString(intro), detailRows, html.EscapeString(whoisTitle), whoisHTML, html.EscapeString(logsTitle), logsHTML, html.EscapeString(footerText), html.EscapeString(supportEmail), html.EscapeString(supportEmail), year)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// buildModernEmailBody creates the modern responsive email template (new design)
|
|
|
|
|
|
func buildModernEmailBody(title, intro string, details []emailDetail, whoisHTML, logsHTML, whoisTitle, logsTitle, footerText string) string {
|
|
|
|
|
|
detailRows := renderEmailDetails(details)
|
|
|
|
|
|
year := strconv.Itoa(time.Now().Year())
|
|
|
|
|
|
return fmt.Sprintf(`<!DOCTYPE html>
|
|
|
|
|
|
<html>
|
|
|
|
|
|
<head>
|
|
|
|
|
|
<meta charset="UTF-8">
|
|
|
|
|
|
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
|
|
|
|
|
<meta http-equiv="X-UA-Compatible" content="IE=edge">
|
|
|
|
|
|
<title>%s</title>
|
|
|
|
|
|
<style>
|
|
|
|
|
|
* { box-sizing: border-box; }
|
|
|
|
|
|
body { margin:0; padding:0; background-color:#f6f8fb; font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial, sans-serif; color:#1f2933; line-height:1.6; -webkit-font-smoothing:antialiased; -moz-osx-font-smoothing:grayscale; }
|
|
|
|
|
|
.email-wrapper { width:100%%; padding:20px 10px; }
|
|
|
|
|
|
.email-container { max-width:640px; margin:0 auto; background:#ffffff; border-radius:20px; box-shadow:0 4px 20px rgba(0,0,0,0.08), 0 0 0 1px rgba(0,0,0,0.04); overflow:hidden; }
|
|
|
|
|
|
.email-header { background:linear-gradient(135deg,#004cff 0%%,#6c2bd9 100%%); color:#ffffff; padding:32px 28px; text-align:center; }
|
|
|
|
|
|
.email-header-brand { margin:0 0 8px; font-size:11px; letter-spacing:0.3em; text-transform:uppercase; opacity:0.9; font-weight:600; }
|
|
|
|
|
|
.email-header-title { margin:0 0 10px; font-size:26px; font-weight:700; line-height:1.2; }
|
|
|
|
|
|
.email-body { padding:36px 28px; }
|
|
|
|
|
|
.email-intro { font-size:16px; line-height:1.7; margin:0 0 28px; color:#4b5563; }
|
|
|
|
|
|
.email-details-wrapper { background:#f9fafb; border-radius:12px; padding:20px; margin:0 0 32px; border:1px solid #e5e7eb; }
|
|
|
|
|
|
.email-details-wrapper p { margin:8px 0; font-size:14px; line-height:1.6; color:#111827; }
|
|
|
|
|
|
.email-details-wrapper p:first-child { margin-top:0; }
|
|
|
|
|
|
.email-details-wrapper p:last-child { margin-bottom:0; }
|
|
|
|
|
|
.email-detail-label { font-weight:700; color:#374151; margin-right:8px; }
|
|
|
|
|
|
.email-section { margin:36px 0 0; }
|
|
|
|
|
|
.email-section-title { font-size:13px; text-transform:uppercase; letter-spacing:0.1em; color:#6b7280; margin:0 0 16px; font-weight:700; }
|
|
|
|
|
|
.email-terminal { background:#111827; color:#f3f4f6; padding:20px; font-family:"SFMono-Regular","Consolas","Liberation Mono","Courier New",monospace; border-radius:12px; font-size:12px; line-height:1.7; white-space:pre-wrap; word-break:break-word; overflow-x:auto; margin:0; }
|
|
|
|
|
|
.email-log-stack { background:#0f172a; border-radius:12px; padding:16px; }
|
|
|
|
|
|
.email-log-line { font-family:"SFMono-Regular","Consolas","Liberation Mono","Courier New",monospace; font-size:12px; line-height:1.6; color:#cbd5f5; padding:8px 12px; border-radius:8px; margin:0 0 6px; background:rgba(255,255,255,0.05); }
|
|
|
|
|
|
.email-log-line:last-child { margin-bottom:0; }
|
|
|
|
|
|
.email-log-line-alert { background:rgba(248,113,113,0.25); color:#ffffff; border:1px solid rgba(248,113,113,0.5); }
|
|
|
|
|
|
.email-muted { color:#9ca3af; font-size:13px; line-height:1.6; }
|
|
|
|
|
|
.email-footer { border-top:1px solid #e5e7eb; padding:24px 28px; font-size:12px; color:#6b7280; text-align:center; background:#fafbfc; }
|
|
|
|
|
|
.email-footer-text { margin:0 0 8px; }
|
|
|
|
|
|
.email-footer-copyright { margin:0; font-size:11px; color:#9ca3af; }
|
|
|
|
|
|
@media only screen and (max-width:600px) {
|
|
|
|
|
|
.email-wrapper { padding:12px 8px; }
|
|
|
|
|
|
.email-header { padding:24px 20px; }
|
|
|
|
|
|
.email-header-title { font-size:22px; }
|
|
|
|
|
|
.email-body { padding:28px 20px; }
|
|
|
|
|
|
.email-intro { font-size:15px; }
|
|
|
|
|
|
.email-details-wrapper { padding:16px; }
|
|
|
|
|
|
.email-details-wrapper p { font-size:14px; margin:10px 0; }
|
|
|
|
|
|
.email-footer { padding:20px 16px; }
|
|
|
|
|
|
}
|
|
|
|
|
|
@media only screen and (max-width:480px) {
|
|
|
|
|
|
.email-header-title { font-size:20px; }
|
|
|
|
|
|
.email-body { padding:24px 16px; }
|
|
|
|
|
|
.email-details-wrapper { padding:12px; }
|
|
|
|
|
|
}
|
|
|
|
|
|
</style>
|
|
|
|
|
|
</head>
|
|
|
|
|
|
<body>
|
|
|
|
|
|
<div class="email-wrapper">
|
|
|
|
|
|
<div class="email-container">
|
|
|
|
|
|
<div class="email-header">
|
|
|
|
|
|
<p class="email-header-brand">Fail2Ban UI</p>
|
|
|
|
|
|
<h1 class="email-header-title">%s</h1>
|
|
|
|
|
|
</div>
|
|
|
|
|
|
<div class="email-body">
|
|
|
|
|
|
<p class="email-intro">%s</p>
|
|
|
|
|
|
<div class="email-details-wrapper">
|
|
|
|
|
|
%s
|
|
|
|
|
|
</div>
|
|
|
|
|
|
<div class="email-section">
|
|
|
|
|
|
<p class="email-section-title">%s</p>
|
|
|
|
|
|
%s
|
|
|
|
|
|
</div>
|
|
|
|
|
|
<div class="email-section">
|
|
|
|
|
|
<p class="email-section-title">%s</p>
|
|
|
|
|
|
%s
|
|
|
|
|
|
</div>
|
|
|
|
|
|
</div>
|
|
|
|
|
|
<div class="email-footer">
|
|
|
|
|
|
<p class="email-footer-text">%s</p>
|
|
|
|
|
|
<p class="email-footer-copyright">© %s Swissmakers GmbH. All rights reserved.</p>
|
|
|
|
|
|
</div>
|
|
|
|
|
|
</div>
|
|
|
|
|
|
</div>
|
|
|
|
|
|
</body>
|
2025-11-22 13:22:15 +01:00
|
|
|
|
</html>`, html.EscapeString(title), html.EscapeString(title), html.EscapeString(intro), detailRows, html.EscapeString(whoisTitle), whoisHTML, html.EscapeString(logsTitle), logsHTML, html.EscapeString(footerText), year)
|
2025-11-22 13:09:54 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func renderEmailDetails(details []emailDetail) string {
|
|
|
|
|
|
if len(details) == 0 {
|
|
|
|
|
|
return `<p class="email-muted">No metadata available.</p>`
|
|
|
|
|
|
}
|
|
|
|
|
|
var b strings.Builder
|
|
|
|
|
|
for _, d := range details {
|
|
|
|
|
|
b.WriteString(`<p><span class="email-detail-label">` + html.EscapeString(d.Label) + `:</span> ` + html.EscapeString(d.Value) + `</p>`)
|
|
|
|
|
|
b.WriteString("\n")
|
|
|
|
|
|
}
|
|
|
|
|
|
return b.String()
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func formatWhoisForEmail(whois string, lang string, isModern bool) string {
|
|
|
|
|
|
noDataMsg := getEmailTranslation(lang, "email.whois.no_data")
|
|
|
|
|
|
if strings.TrimSpace(whois) == "" {
|
|
|
|
|
|
if isModern {
|
|
|
|
|
|
return `<p class="email-muted">` + html.EscapeString(noDataMsg) + `</p>`
|
|
|
|
|
|
}
|
|
|
|
|
|
return `<pre style="background: #222; color: #ddd; font-family: 'Courier New', Courier, monospace; font-size: 12px; padding: 10px; border-radius: 5px; overflow-x: auto; white-space: pre-wrap;">` + html.EscapeString(noDataMsg) + `</pre>`
|
|
|
|
|
|
}
|
|
|
|
|
|
// Use <pre> to preserve all whitespace and newlines exactly as they are
|
|
|
|
|
|
if isModern {
|
|
|
|
|
|
return `<pre class="email-terminal">` + html.EscapeString(whois) + `</pre>`
|
|
|
|
|
|
}
|
|
|
|
|
|
return `<pre style="background: #222; color: #ddd; font-family: 'Courier New', Courier, monospace; font-size: 12px; padding: 10px; border-radius: 5px; overflow-x: auto; white-space: pre-wrap;">` + html.EscapeString(whois) + `</pre>`
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func formatLogsForEmail(ip, logs string, lang string, isModern bool) string {
|
|
|
|
|
|
noLogsMsg := getEmailTranslation(lang, "email.logs.no_data")
|
|
|
|
|
|
if strings.TrimSpace(logs) == "" {
|
|
|
|
|
|
if isModern {
|
|
|
|
|
|
return `<p class="email-muted">` + html.EscapeString(noLogsMsg) + `</p>`
|
|
|
|
|
|
}
|
|
|
|
|
|
return `<pre style="background: #222; color: #ddd; font-family: 'Courier New', Courier, monospace; font-size: 12px; padding: 10px; border-radius: 5px; overflow-x: auto; white-space: pre-wrap;">` + html.EscapeString(noLogsMsg) + `</pre>`
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
if isModern {
|
|
|
|
|
|
var b strings.Builder
|
|
|
|
|
|
b.WriteString(`<div class="email-log-stack">`)
|
|
|
|
|
|
lines := strings.Split(logs, "\n")
|
|
|
|
|
|
for _, line := range lines {
|
|
|
|
|
|
trimmed := strings.TrimRight(line, "\r")
|
|
|
|
|
|
if trimmed == "" {
|
|
|
|
|
|
continue
|
|
|
|
|
|
}
|
|
|
|
|
|
class := "email-log-line"
|
|
|
|
|
|
if isSuspiciousLogLineEmail(trimmed, ip) {
|
|
|
|
|
|
class = "email-log-line email-log-line-alert"
|
|
|
|
|
|
}
|
|
|
|
|
|
b.WriteString(`<div class="` + class + `">` + html.EscapeString(trimmed) + `</div>`)
|
|
|
|
|
|
}
|
|
|
|
|
|
b.WriteString(`</div>`)
|
|
|
|
|
|
return b.String()
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Classic format: simple pre tag
|
|
|
|
|
|
return `<pre style="background: #222; color: #ddd; font-family: 'Courier New', Courier, monospace; font-size: 12px; padding: 10px; border-radius: 5px; overflow-x: auto; white-space: pre-wrap;">` + html.EscapeString(logs) + `</pre>`
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func isSuspiciousLogLineEmail(line, ip string) bool {
|
|
|
|
|
|
trimmed := strings.TrimSpace(line)
|
|
|
|
|
|
if trimmed == "" {
|
|
|
|
|
|
return false
|
|
|
|
|
|
}
|
|
|
|
|
|
lowered := strings.ToLower(trimmed)
|
|
|
|
|
|
containsIP := ip != "" && strings.Contains(trimmed, ip)
|
|
|
|
|
|
statusCode := extractStatusCodeFromLine(trimmed)
|
|
|
|
|
|
hasBadStatus := statusCode >= 300
|
|
|
|
|
|
hasIndicator := false
|
|
|
|
|
|
for _, indicator := range suspiciousLogIndicators {
|
|
|
|
|
|
if strings.Contains(lowered, indicator) {
|
|
|
|
|
|
hasIndicator = true
|
|
|
|
|
|
break
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
if containsIP {
|
|
|
|
|
|
return hasBadStatus || hasIndicator
|
|
|
|
|
|
}
|
|
|
|
|
|
return (hasBadStatus || hasIndicator) && ip == ""
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func extractStatusCodeFromLine(line string) int {
|
|
|
|
|
|
if match := httpQuotedStatusPattern.FindStringSubmatch(line); len(match) == 2 {
|
|
|
|
|
|
if code, err := strconv.Atoi(match[1]); err == nil {
|
|
|
|
|
|
return code
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
if match := httpPlainStatusPattern.FindStringSubmatch(line); len(match) == 2 {
|
|
|
|
|
|
if code, err := strconv.Atoi(match[1]); err == nil {
|
|
|
|
|
|
return code
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
return 0
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// *******************************************************************
|
|
|
|
|
|
// * sendBanAlert Function : *
|
|
|
|
|
|
// *******************************************************************
|
|
|
|
|
|
func sendBanAlert(ip, jail, hostname, failures, whois, logs, country string, settings config.AppSettings) error {
|
|
|
|
|
|
lang := settings.Language
|
|
|
|
|
|
if lang == "" {
|
|
|
|
|
|
lang = "en"
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Get translations
|
|
|
|
|
|
subject := fmt.Sprintf("[Fail2Ban] %s: %s %s %s %s", jail,
|
|
|
|
|
|
getEmailTranslation(lang, "email.ban.subject.banned"),
|
|
|
|
|
|
ip,
|
|
|
|
|
|
getEmailTranslation(lang, "email.ban.subject.from"),
|
|
|
|
|
|
hostname)
|
|
|
|
|
|
|
|
|
|
|
|
details := []emailDetail{
|
|
|
|
|
|
{Label: getEmailTranslation(lang, "email.ban.details.banned_ip"), Value: ip},
|
|
|
|
|
|
{Label: getEmailTranslation(lang, "email.ban.details.jail"), Value: jail},
|
|
|
|
|
|
{Label: getEmailTranslation(lang, "email.ban.details.hostname"), Value: hostname},
|
|
|
|
|
|
{Label: getEmailTranslation(lang, "email.ban.details.failed_attempts"), Value: failures},
|
|
|
|
|
|
{Label: getEmailTranslation(lang, "email.ban.details.country"), Value: country},
|
|
|
|
|
|
{Label: getEmailTranslation(lang, "email.ban.details.timestamp"), Value: time.Now().UTC().Format(time.RFC3339)},
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
title := getEmailTranslation(lang, "email.ban.title")
|
|
|
|
|
|
intro := getEmailTranslation(lang, "email.ban.intro")
|
|
|
|
|
|
whoisTitle := getEmailTranslation(lang, "email.ban.whois_title")
|
|
|
|
|
|
logsTitle := getEmailTranslation(lang, "email.ban.logs_title")
|
|
|
|
|
|
footerText := getEmailTranslation(lang, "email.footer.text")
|
|
|
|
|
|
supportEmail := "support@swissmakers.ch"
|
|
|
|
|
|
|
|
|
|
|
|
// Determine email style
|
|
|
|
|
|
emailStyle := getEmailStyle()
|
|
|
|
|
|
isModern := emailStyle == "modern"
|
|
|
|
|
|
|
|
|
|
|
|
whoisHTML := formatWhoisForEmail(whois, lang, isModern)
|
|
|
|
|
|
logsHTML := formatLogsForEmail(ip, logs, lang, isModern)
|
|
|
|
|
|
|
|
|
|
|
|
var body string
|
|
|
|
|
|
if isModern {
|
|
|
|
|
|
body = buildModernEmailBody(title, intro, details, whoisHTML, logsHTML, whoisTitle, logsTitle, footerText)
|
|
|
|
|
|
} else {
|
|
|
|
|
|
body = buildClassicEmailBody(title, intro, details, whoisHTML, logsHTML, whoisTitle, logsTitle, footerText, supportEmail)
|
|
|
|
|
|
}
|
2025-01-30 11:00:14 +01:00
|
|
|
|
|
|
|
|
|
|
return sendEmail(settings.Destemail, subject, body, settings)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// *******************************************************************
|
|
|
|
|
|
// * TestEmailHandler to send test-mail : *
|
|
|
|
|
|
// *******************************************************************
|
|
|
|
|
|
func TestEmailHandler(c *gin.Context) {
|
|
|
|
|
|
settings := config.GetSettings()
|
|
|
|
|
|
|
2025-11-22 13:09:54 +01:00
|
|
|
|
lang := settings.Language
|
|
|
|
|
|
if lang == "" {
|
|
|
|
|
|
lang = "en"
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Get translations
|
|
|
|
|
|
testDetails := []emailDetail{
|
|
|
|
|
|
{Label: getEmailTranslation(lang, "email.test.details.recipient"), Value: settings.Destemail},
|
|
|
|
|
|
{Label: getEmailTranslation(lang, "email.test.details.smtp_host"), Value: settings.SMTP.Host},
|
|
|
|
|
|
{Label: getEmailTranslation(lang, "email.test.details.triggered_at"), Value: time.Now().Format(time.RFC1123)},
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
title := getEmailTranslation(lang, "email.test.title")
|
|
|
|
|
|
intro := getEmailTranslation(lang, "email.test.intro")
|
|
|
|
|
|
whoisTitle := getEmailTranslation(lang, "email.ban.whois_title")
|
|
|
|
|
|
logsTitle := getEmailTranslation(lang, "email.ban.logs_title")
|
|
|
|
|
|
footerText := getEmailTranslation(lang, "email.footer.text")
|
|
|
|
|
|
whoisNoData := getEmailTranslation(lang, "email.test.whois_no_data")
|
|
|
|
|
|
supportEmail := "support@swissmakers.ch"
|
|
|
|
|
|
|
|
|
|
|
|
// Determine email style
|
|
|
|
|
|
emailStyle := getEmailStyle()
|
|
|
|
|
|
isModern := emailStyle == "modern"
|
|
|
|
|
|
|
|
|
|
|
|
whoisHTML := `<pre style="background: #222; color: #ddd; font-family: 'Courier New', Courier, monospace; font-size: 12px; padding: 10px; border-radius: 5px; overflow-x: auto; white-space: pre-wrap;">` + html.EscapeString(whoisNoData) + `</pre>`
|
|
|
|
|
|
if isModern {
|
|
|
|
|
|
whoisHTML = `<p class="email-muted">` + html.EscapeString(whoisNoData) + `</p>`
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
sampleLogs := getEmailTranslation(lang, "email.test.sample_logs")
|
|
|
|
|
|
logsHTML := formatLogsForEmail("", sampleLogs, lang, isModern)
|
|
|
|
|
|
|
|
|
|
|
|
var testBody string
|
|
|
|
|
|
if isModern {
|
|
|
|
|
|
testBody = buildModernEmailBody(title, intro, testDetails, whoisHTML, logsHTML, whoisTitle, logsTitle, footerText)
|
|
|
|
|
|
} else {
|
|
|
|
|
|
testBody = buildClassicEmailBody(title, intro, testDetails, whoisHTML, logsHTML, whoisTitle, logsTitle, footerText, supportEmail)
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
subject := getEmailTranslation(lang, "email.test.subject")
|
|
|
|
|
|
|
2025-01-30 11:00:14 +01:00
|
|
|
|
err := sendEmail(
|
|
|
|
|
|
settings.Destemail,
|
2025-11-22 13:09:54 +01:00
|
|
|
|
subject,
|
|
|
|
|
|
testBody,
|
2025-01-30 11:00:14 +01:00
|
|
|
|
settings,
|
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
|
|
log.Printf("❌ Test email failed: %v", err)
|
|
|
|
|
|
c.JSON(http.StatusInternalServerError, gin.H{"error": "Failed to send test email: " + err.Error()})
|
|
|
|
|
|
return
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
log.Println("✅ Test email sent successfully!")
|
|
|
|
|
|
c.JSON(http.StatusOK, gin.H{"message": "Test email sent successfully!"})
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// *******************************************************************
|
|
|
|
|
|
// * Office365 LOGIN Authentication : *
|
|
|
|
|
|
// *******************************************************************
|
|
|
|
|
|
type loginAuth struct {
|
|
|
|
|
|
username, password string
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func LoginAuth(username, password string) smtp.Auth {
|
|
|
|
|
|
return &loginAuth{username, password}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func (a *loginAuth) Start(server *smtp.ServerInfo) (string, []byte, error) {
|
|
|
|
|
|
return "LOGIN", []byte(a.username), nil
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
func (a *loginAuth) Next(fromServer []byte, more bool) ([]byte, error) {
|
|
|
|
|
|
if more {
|
|
|
|
|
|
switch string(fromServer) {
|
|
|
|
|
|
case "Username:":
|
|
|
|
|
|
return []byte(a.username), nil
|
|
|
|
|
|
case "Password:":
|
|
|
|
|
|
return []byte(a.password), nil
|
|
|
|
|
|
default:
|
|
|
|
|
|
return nil, errors.New("unexpected server challenge")
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
return nil, nil
|
|
|
|
|
|
}
|