Support local managment for embedded agent on nginx

This commit is contained in:
davidga
2022-11-13 13:29:35 +02:00
parent 8b01396eca
commit 1b4b7d17e0
406 changed files with 37980 additions and 35 deletions

View File

@@ -25,3 +25,6 @@ install(FILES configuration/cp-nano-orchestration-debug-conf.json DESTINATION ./
install(FILES watchdog/watchdog DESTINATION ./orchestration/watchdog/ PERMISSIONS OWNER_READ OWNER_WRITE OWNER_EXECUTE GROUP_READ GROUP_EXECUTE WORLD_READ)
install(FILES watchdog/wait-for-networking-inspection-modules.sh DESTINATION ./orchestration/watchdog/ PERMISSIONS OWNER_READ OWNER_WRITE OWNER_EXECUTE GROUP_READ GROUP_EXECUTE WORLD_READ)
install(FILES watchdog/access_pre_init DESTINATION ./orchestration/watchdog/ PERMISSIONS OWNER_READ OWNER_WRITE OWNER_EXECUTE GROUP_READ GROUP_EXECUTE WORLD_READ)
install(FILES local-default-policy.yaml DESTINATION ./orchestration/ PERMISSIONS OWNER_READ OWNER_WRITE OWNER_EXECUTE GROUP_READ GROUP_EXECUTE WORLD_READ)

View File

@@ -0,0 +1,85 @@
policies:
default:
triggers:
- appsec-default-log-trigger
mode: detect-learn
practices:
- webapp-default-practice
source-identifiers:
trusted-sources:
custom-response: appsec-default-web-user-response
exceptions:
specific-rules:
- host: "*"
triggers:
- appsec-default-log-trigger
mode: detect-learn
practices:
- webapp-default-practice
source-identifiers:
trusted-sources:
custom-response: appsec-default-web-user-response
exceptions:
practices:
- name: webapp-default-practice
openapi-schema-validation:
configmap: []
override-mode: detect-learn
snort-signatures:
configmap: []
override-mode: detect-learn
web-attacks:
max-body-size-kb: 1000000
max-header-size-bytes: 102400
max-object-depth: 40
max-url-size-bytes: 32768
minimum-confidence: Transparent
override-mode: detect-learn
protections:
csrf-protection: detect-learn
error-disclosure: detect-learn
non-valid-http-methods: true
open-redirect: detect-learn
anti-bot:
injected-URIs: []
validated-URIs: []
override-mode: detect-learn
logtriggers:
- name: appsec-default-log-trigger
access-control-logging:
allow-events: false
drop-events: true
additional-suspicious-events-logging:
enabled: true
minimum-severity: high
response-body: false
appsec-logging:
all-web-requests: false
detect-events: true
prevent-events: true
extended-logging:
http-headers: false
request-body: false
url-path: false
url-query: false
log-destination:
cloud: false
file:
stdout:
format: json-formatted
syslog-service:
cef-service:
customresponses:
- name: appsec-default-web-user-response
mode: response-code-only
http-response-code: 403
message-title: This is the best title ever
message-body: Look at this body
exceptions:
trustedsources:
sourceidentifiers:

View File

@@ -324,6 +324,10 @@ if [ "$RUN_MODE" = "install" ] && [ $var_offline_mode = false ]; then
fi
fi
if [ $var_hybrid_mode = true ] && [ -z "$var_fog_address" ]; then
var_fog_address="$var_default_gem_fog_address"
fi
if [ -n "$var_proxy" ]; then
if [ "$var_proxy" = 'none' ]; then
echo "Ignoring system proxy"
@@ -536,6 +540,8 @@ install_cp_nano_ctl()
CP_NANO_CLI="cp-nano-cli.sh"
CP_NANO_JSON="cpnano_json"
CP_NANO_CTL="cpnano"
CP_NANO_YQ_LOCATION="./scripts/yq"
CP_NANO_YQ="yq"
if [ -f $USR_SBIN_PATH/${CP_NANO_CTL_DEPRECATED} ]; then
cp_exec "rm -rf $USR_SBIN_PATH/${CP_NANO_CTL_DEPRECATED}"
@@ -563,6 +569,9 @@ install_cp_nano_ctl()
cp_exec "cp -f ${CP_NANO_BASE64} ${FILESYSTEM_PATH}/${BIN_PATH}/${CP_NANO_BASE64}" ${FORCE_STDOUT}
cp_exec "chmod 700 ${FILESYSTEM_PATH}/${BIN_PATH}/${CP_NANO_BASE64}"
cp_exec "cp -f ${CP_NANO_YQ_LOCATION} ${FILESYSTEM_PATH}/${BIN_PATH}/${CP_NANO_YQ}" ${FORCE_STDOUT}
cp_exec "chmod 700 ${FILESYSTEM_PATH}/${BIN_PATH}/${CP_NANO_YQ}"
}
set_conf_temp_location()
@@ -645,6 +654,9 @@ copy_orchestration_executable()
cp_print "Copying cp-nano-agent binary file to folder: ${FILESYSTEM_PATH}/${SERVICE_PATH}/${ORCHESTRATION_FILE_NAME}" $FORCE_STDOUT
cp_copy "$ORCHESTRATION_EXE_SOURCE_PATH" ${FILESYSTEM_PATH}/${SERVICE_PATH}/${ORCHESTRATION_FILE_NAME}
cp_exec "chmod 700 ${FILESYSTEM_PATH}/${SERVICE_PATH}/${ORCHESTRATION_FILE_NAME}"
if [ $var_hybrid_mode = true ]; then
cp_copy local-default-policy.yaml ${FILESYSTEM_PATH}/${CONF_PATH}/local_policy.yaml
fi
}
copy_k8s_executable()