Files
fail2ban-ui/internal/fail2ban/client.go

173 lines
4.9 KiB
Go
Raw Normal View History

// Fail2ban UI - A Swiss made, management interface for Fail2ban.
//
// Copyright (C) 2025 Swissmakers GmbH (https://swissmakers.ch)
//
// Licensed under the GNU General Public License, Version 3 (GPL-3.0)
// You may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// https://www.gnu.org/licenses/gpl-3.0.en.html
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
2025-01-25 16:21:14 +01:00
package fail2ban
import (
"fmt"
"os"
"os/exec"
"path/filepath"
2025-01-25 16:21:14 +01:00
"strings"
"time"
)
type JailInfo struct {
JailName string `json:"jailName"`
TotalBanned int `json:"totalBanned"`
NewInLastHour int `json:"newInLastHour"`
BannedIPs []string `json:"bannedIPs"`
2025-01-25 16:21:14 +01:00
}
// GetJails returns all configured jails using "fail2ban-client status".
func GetJails() ([]string, error) {
cmd := exec.Command("fail2ban-client", "status")
out, err := cmd.CombinedOutput()
if err != nil {
return nil, fmt.Errorf("could not get jail information. is fail2ban running? error: %v", err)
2025-01-25 16:21:14 +01:00
}
var jails []string
lines := strings.Split(string(out), "\n")
for _, line := range lines {
if strings.Contains(line, "Jail list:") {
parts := strings.Split(line, ":")
if len(parts) > 1 {
raw := strings.TrimSpace(parts[1])
jails = strings.Split(raw, ",")
for i := range jails {
jails[i] = strings.TrimSpace(jails[i])
}
}
}
}
return jails, nil
}
// GetBannedIPs returns a slice of currently banned IPs for a specific jail.
func GetBannedIPs(jail string) ([]string, error) {
cmd := exec.Command("fail2ban-client", "status", jail)
out, err := cmd.CombinedOutput()
if err != nil {
return nil, fmt.Errorf("fail2ban-client status %s failed: %v", jail, err)
}
var bannedIPs []string
lines := strings.Split(string(out), "\n")
for _, line := range lines {
if strings.Contains(line, "IP list:") {
parts := strings.Split(line, ":")
if len(parts) > 1 {
ips := strings.Fields(strings.TrimSpace(parts[1]))
bannedIPs = append(bannedIPs, ips...)
}
break
}
}
return bannedIPs, nil
}
// UnbanIP unbans an IP from the given jail.
func UnbanIP(jail, ip string) error {
// We assume "fail2ban-client set <jail> unbanip <ip>" works.
cmd := exec.Command("fail2ban-client", "set", jail, "unbanip", ip)
out, err := cmd.CombinedOutput()
if err != nil {
return fmt.Errorf("error unbanning IP %s from jail %s: %v\nOutput: %s", ip, jail, err, out)
}
return nil
}
// BuildJailInfos returns extended info for each jail:
// - total banned count
// - new banned in the last hour
// - list of currently banned IPs
func BuildJailInfos(logPath string) ([]JailInfo, error) {
jails, err := GetJails()
if err != nil {
return nil, err
}
// Parse the log once, so we can determine "newInLastHour" per jail
// for performance reasons. We'll gather all ban timestamps by jail.
banHistory, err := ParseBanLog(logPath)
if err != nil {
// If fail2ban.log can't be read, we can still show partial info.
banHistory = make(map[string][]BanEvent)
}
oneHourAgo := time.Now().Add(-1 * time.Hour)
var results []JailInfo
for _, jail := range jails {
bannedIPs, err := GetBannedIPs(jail)
if err != nil {
// Just skip or handle error per jail
continue
}
// Count how many bans occurred in the last hour for this jail
newInLastHour := 0
if events, ok := banHistory[jail]; ok {
for _, e := range events {
if e.Time.After(oneHourAgo) {
newInLastHour++
}
}
}
jinfo := JailInfo{
JailName: jail,
TotalBanned: len(bannedIPs),
NewInLastHour: newInLastHour,
BannedIPs: bannedIPs,
}
results = append(results, jinfo)
}
return results, nil
}
// GetJailConfig returns the config content for a given jail.
// Example: we assume each jail config is at /etc/fail2ban/filter.d/<jail>.conf
// Adapt this to your environment.
func GetJailConfig(jail string) (string, error) {
configPath := filepath.Join("/etc/fail2ban/filter.d", jail+".conf")
content, err := os.ReadFile(configPath)
if err != nil {
return "", fmt.Errorf("failed to read config for jail %s: %v", jail, err)
}
return string(content), nil
2025-01-25 16:21:14 +01:00
}
// SetJailConfig overwrites the config file for a given jail with new content.
func SetJailConfig(jail, newContent string) error {
configPath := filepath.Join("/etc/fail2ban/filter.d", jail+".conf")
if err := os.WriteFile(configPath, []byte(newContent), 0644); err != nil {
return fmt.Errorf("failed to write config for jail %s: %v", jail, err)
}
return nil
2025-01-25 16:21:14 +01:00
}
// ReloadFail2ban runs "fail2ban-client reload"
func ReloadFail2ban() error {
cmd := exec.Command("fail2ban-client", "reload")
out, err := cmd.CombinedOutput()
if err != nil {
return fmt.Errorf("fail2ban reload error: %v\nOutput: %s", err, out)
}
return nil
}