Compare commits
3 Commits
cb7e986842
...
49a4249fa7
Author | SHA1 | Date | |
---|---|---|---|
49a4249fa7 | |||
119e74f5ef | |||
46b4798d74 |
77
arke.py
77
arke.py
@ -1,9 +1,19 @@
|
|||||||
import requests, arkevars, json, logging, datetime, os, time
|
import requests
|
||||||
|
import arkevars
|
||||||
|
import json
|
||||||
|
import logging
|
||||||
|
import datetime
|
||||||
|
import os
|
||||||
|
import whois
|
||||||
|
import OpenSSL
|
||||||
|
import ssl
|
||||||
|
import time
|
||||||
|
|
||||||
logging.basicConfig(format='%(asctime)s %(message)s', datefmt='%Y/%m/%d %I:%M:%S %p',level=logging.INFO,filename='arke.log')
|
logging.basicConfig(format='%(asctime)s %(message)s', datefmt='%Y/%m/%d %I:%M:%S %p',level=logging.INFO,filename='arke.log')
|
||||||
logger = logging.getLogger("arke")
|
logger = logging.getLogger("arke")
|
||||||
|
|
||||||
def monitor_AllTargets(monitoringtargets):
|
|
||||||
|
def monitor_HttpTargets(monitoringtargets):
|
||||||
responseTable = {}
|
responseTable = {}
|
||||||
for target in monitoringtargets:
|
for target in monitoringtargets:
|
||||||
try:
|
try:
|
||||||
@ -14,20 +24,70 @@ def monitor_AllTargets(monitoringtargets):
|
|||||||
except requests.ConnectionError:
|
except requests.ConnectionError:
|
||||||
logger.warn(f"target: {target} ERROR: Failure to connect.")
|
logger.warn(f"target: {target} ERROR: Failure to connect.")
|
||||||
responseTable[target] = "Failed to connect."
|
responseTable[target] = "Failed to connect."
|
||||||
|
|
||||||
return responseTable
|
return responseTable
|
||||||
|
|
||||||
|
|
||||||
|
def monitor_DomainExpiry(targets):
|
||||||
|
responseTable = {}
|
||||||
|
current_year = datetime.today().year
|
||||||
|
|
||||||
|
for domain in targets:
|
||||||
|
expire_year = whois.query(domain).expiration_date.year
|
||||||
|
try:
|
||||||
|
if expire_year - current_year <= 1:
|
||||||
|
responseTable[domain] = "Domain expiring in < 1 year, please rectify."
|
||||||
|
except:
|
||||||
|
responseTable[domain] = "Failed to query domain info"
|
||||||
|
|
||||||
|
return responseTable
|
||||||
|
|
||||||
|
|
||||||
|
def monitor_TlsExpiry(targets):
|
||||||
|
responseTable = {}
|
||||||
|
current_year = datetime.today().year
|
||||||
|
|
||||||
|
for site in targets:
|
||||||
|
cert = ssl.get_server_certificate((site, 443))
|
||||||
|
x509 = OpenSSL.crypto.load_certificate(OpenSSL.crypto.FILETYPE_PEM, cert)
|
||||||
|
expiration = datetime.strptime(x509.get_notAfter().decode(), '%Y%m%d%H%M%SZ')
|
||||||
|
try:
|
||||||
|
if expiration - current_year <= 1:
|
||||||
|
responseTable[site] = "TLS expiring in < 30 days, please rectify."
|
||||||
|
except:
|
||||||
|
responseTable[site] = "Failed to query cert info"
|
||||||
|
|
||||||
|
return responseTable
|
||||||
|
|
||||||
|
|
||||||
is_on = True
|
is_on = True
|
||||||
|
|
||||||
while is_on:
|
while is_on:
|
||||||
datastore = monitor_AllTargets(arkevars.httpTargets)
|
|
||||||
|
today = datetime.today()
|
||||||
|
|
||||||
|
# make sure http targets are /up/
|
||||||
|
datastore = monitor_HttpTargets(arkevars.httpTargets)
|
||||||
json_string = json.dumps(datastore)
|
json_string = json.dumps(datastore)
|
||||||
|
|
||||||
|
# get SSL certs on http targets
|
||||||
|
cert_info = monitor_TlsExpiry(arkevars.httpTargets)
|
||||||
|
cert_json = json.dumps(cert_info)
|
||||||
|
|
||||||
|
# get whois info on domain targets
|
||||||
|
domain_info = monitor_DomainExpiry(arkevars.domains_to_check)
|
||||||
|
domain_json = json.dumps(domain_info)
|
||||||
|
|
||||||
# write new results to file
|
# write new results to file
|
||||||
file = open("/shared/results.json", "a+")
|
file = open("/shared/results.json", "a+")
|
||||||
file.write(json_string)
|
file.write(json_string)
|
||||||
file.write("\n")
|
file.write("\n")
|
||||||
|
file.write(cert_json)
|
||||||
|
file.write("\n")
|
||||||
|
file.write(domain_json)
|
||||||
|
file.write("\n")
|
||||||
file.close()
|
file.close()
|
||||||
|
|
||||||
# track state
|
# track state
|
||||||
file = open("/shared/results.json", "r")
|
file = open("/shared/results.json", "r")
|
||||||
stateFile = open("/shared/state.log", "r")
|
stateFile = open("/shared/state.log", "r")
|
||||||
@ -47,10 +107,10 @@ while is_on:
|
|||||||
for line in json_File:
|
for line in json_File:
|
||||||
results.append(json.loads(line))
|
results.append(json.loads(line))
|
||||||
for item in results:
|
for item in results:
|
||||||
for key,value in item.items():
|
for key, value in item.items():
|
||||||
if stateChanged == True:
|
if stateChanged is True:
|
||||||
errorFile = open("/shared/alerts.log", "a+")
|
errorFile = open("/shared/alerts.log", "a+")
|
||||||
errorText = key + " returned with status " + str(value) + "\n"
|
errorText = key + " returned with status " + str(value) + "\n"
|
||||||
errorFile.write(errorText)
|
errorFile.write(errorText)
|
||||||
|
|
||||||
# track state
|
# track state
|
||||||
@ -61,4 +121,3 @@ while is_on:
|
|||||||
errorFile.close()
|
errorFile.close()
|
||||||
os.remove("/shared/results.json")
|
os.remove("/shared/results.json")
|
||||||
time.sleep(60)
|
time.sleep(60)
|
||||||
|
|
||||||
|
10
arkevars.py
10
arkevars.py
@ -1,8 +1,14 @@
|
|||||||
httpTargets = (
|
httpTargets = (
|
||||||
"https://bouncer.awful.club:5000",
|
"https://bouncer.awful.club:5000",
|
||||||
"https://my.awful.club"
|
"https://my.awful.club",
|
||||||
|
"https://me.jowj.net",
|
||||||
|
"https://matrix.awful.club"
|
||||||
)
|
)
|
||||||
|
|
||||||
containerTargets = (
|
containerTargets = (
|
||||||
"slack.awful.club"
|
"slack.awful.club"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
domains_to_check = (
|
||||||
|
"jowj.net"
|
||||||
|
)
|
||||||
|
Loading…
Reference in New Issue
Block a user