package cmd import ( "encoding/json" "fmt" "net" "os" "path" magellan "github.com/OpenCHAMI/magellan/internal" "github.com/OpenCHAMI/magellan/internal/cache/sqlite" "github.com/OpenCHAMI/magellan/internal/util" "github.com/rs/zerolog/log" "github.com/cznic/mathutil" "github.com/spf13/cobra" "github.com/spf13/viper" ) var ( scheme string subnets []string subnetMask net.IPMask targetHosts [][]string disableProbing bool disableCache bool ) // The `scan` command is usually the first step to using the CLI tool. // This command will perform a network scan over a subnet by supplying // a list of subnets, subnet masks, and additional IP address to probe. // // See the `ScanForAssets()` function in 'internal/scan.go' for details // related to the implementation. var scanCmd = &cobra.Command{ Use: "scan urls...", Short: "Scan to discover BMC nodes on a network", Long: "Perform a net scan by attempting to connect to each host and port specified and getting a response. " + "Each host is passed *with a full URL* including the protocol and port. Additional subnets can be added " + "by using the '--subnet' flag and providing an IP address on the subnet as well as a CIDR. If no CIDR is " + "provided, then the subnet mask specified with the '--subnet-mask' flag will be used instead (will use " + "default mask if not set).\n" + "Similarly, any host provided with no port with use either the ports specified" + "with `--port` or the default port used with each specified protocol. The default protocol is 'tcp' unless " + "specified. The `--scheme` flag works similarly and the default value is 'https' in the host URL or with the " + "'--protocol' flag.\n" + "If the '--disable-probe` flag is used, the tool will not send another request to probe for available. " + "Redfish services. This is not recommended, since the extra request makes the scan a bit more reliable " + "for determining which hosts to collect inventory data.\n\n" + "Examples:\n" + // assumes host https://10.0.0.101:443 " magellan scan 10.0.0.101\n" + // assumes subnet using HTTPS and port 443 except for specified host " magellan scan http://10.0.0.101:80 https://user:password@10.0.0.102:443 http://172.16.0.105:8080 --subnet 172.16.0.0/24\n" + // assumes hosts http://10.0.0.101:8080 and http://10.0.0.102:8080 " magellan scan 10.0.0.101 10.0.0.102 https://172.16.0.10:443 --port 8080 --protocol tcp" + // assumes subnet using default unspecified subnet-masks " magellan scan --subnet 10.0.0.0" + // assumes subnet using HTTPS and port 443 with specified CIDR " magellan scan --subnet 10.0.0.0/16" + // assumes subnet using HTTP and port 5000 similar to 192.168.0.0/16 " magellan scan --subnet 192.168.0.0 --protocol tcp --scheme https --port 5000 --subnet-mask 255.255.0.0" + // assumes subnet without CIDR has a subnet-mask of 255.255.0.0 " magellan scan --subnet 10.0.0.0/24 --subnet 172.16.0.0 --subnet-mask 255.255.0.0 --cache ./assets.db", Run: func(cmd *cobra.Command, args []string) { // format and combine flag and positional args targetHosts = append(targetHosts, util.FormatHostUrls(args, ports, scheme, verbose)...) targetHosts = append(targetHosts, util.FormatHostUrls(hosts, ports, scheme, verbose)...) // add more hosts specified with `--subnet` flag if debug { log.Debug().Msg("adding hosts from subnets") } for _, subnet := range subnets { // subnet string is empty so nothing to do here if subnet == "" { continue } // generate a slice of all hosts to scan from subnets subnetHosts := magellan.GenerateHostsWithSubnet(subnet, &subnetMask, ports, scheme) targetHosts = append(targetHosts, subnetHosts...) } // if there are no target hosts, then there's nothing to do if len(targetHosts) <= 0 { log.Warn().Msg("nothing to do (no valid target hosts)") return } else { if len(targetHosts[0]) <= 0 { log.Warn().Msg("nothing to do (no valid target hosts)") return } } // add default ports for hosts if none are specified with flag if len(ports) == 0 { if debug { log.Debug().Msg("adding default ports") } ports = magellan.GetDefaultPorts() } // show the parameters going into the scan if debug { combinedTargetHosts := []string{} for _, targetHost := range targetHosts { combinedTargetHosts = append(combinedTargetHosts, targetHost...) } c := map[string]any{ "hosts": combinedTargetHosts, "cache": cachePath, "concurrency": concurrency, "protocol": protocol, "subnets": subnets, "subnet-masks": subnetMask, "cert": cacertPath, "disable-probing": disableProbing, "disable-caching": disableCache, } b, _ := json.MarshalIndent(c, "", " ") fmt.Printf("%s", string(b)) } // set the number of concurrent requests (1 request per BMC node) // // NOTE: The number of concurrent job is equal to the number of hosts by default. // The max concurrent jobs cannot be greater than the number of hosts. if concurrency <= 0 { concurrency = len(targetHosts) } else { concurrency = mathutil.Clamp(len(targetHosts), 1, len(targetHosts)) } // scan and store scanned data in cache foundAssets := magellan.ScanForAssets(&magellan.ScanParams{ TargetHosts: targetHosts, Scheme: scheme, Protocol: protocol, Concurrency: concurrency, Timeout: timeout, DisableProbing: disableProbing, Verbose: verbose, Debug: debug, }) if len(foundAssets) > 0 && verbose { log.Info().Any("assets", foundAssets).Msgf("found assets from scan") } if !disableCache && cachePath != "" { // make the cache directory path if needed err := os.MkdirAll(path.Dir(cachePath), 0755) if err != nil { log.Printf("failed to make cache directory: %v", err) } // TODO: change this to use an extensible plugin system for storage solutions // (i.e. something like cache.InsertScannedAssets(path, assets) which implements a Cache interface) if len(foundAssets) > 0 { err = sqlite.InsertScannedAssets(cachePath, foundAssets...) if err != nil { log.Error().Err(err).Msg("failed to write scanned assets to cache") } if verbose { log.Info().Msgf("saved assets to cache: %s", cachePath) } } else { log.Warn().Msg("no assets found to save") } } }, } func init() { // scanCmd.Flags().StringSliceVar(&hosts, "host", []string{}, "set additional hosts to scan") scanCmd.Flags().StringSliceVar(&hosts, "host", nil, "Add individual hosts to scan. (example: https://my.bmc.com:5000; same as using positional args)") scanCmd.Flags().IntSliceVar(&ports, "port", nil, "Adds additional ports to scan for each host with unspecified ports.") scanCmd.Flags().StringVar(&scheme, "scheme", "https", "Set the default scheme to use if not specified in host URI. (default is 'https')") scanCmd.Flags().StringVar(&protocol, "protocol", "tcp", "Set the default protocol to use in scan. (default is 'tcp')") scanCmd.Flags().StringSliceVar(&subnets, "subnet", nil, "Add additional hosts from specified subnets to scan.") scanCmd.Flags().IPMaskVar(&subnetMask, "subnet-mask", net.IPv4Mask(255, 255, 255, 0), "Set the default subnet mask to use for with all subnets not using CIDR notation.") scanCmd.Flags().BoolVar(&disableProbing, "disable-probing", false, "disable probing found assets for Redfish service(s) running on BMC nodes") scanCmd.Flags().BoolVar(&disableCache, "disable-cache", false, "disable saving found assets to a cache database specified with 'cache' flag") viper.BindPFlag("scan.hosts", scanCmd.Flags().Lookup("host")) viper.BindPFlag("scan.ports", scanCmd.Flags().Lookup("port")) viper.BindPFlag("scan.subnets", scanCmd.Flags().Lookup("subnet")) viper.BindPFlag("scan.subnet-masks", scanCmd.Flags().Lookup("subnet-mask")) viper.BindPFlag("scan.disable-probing", scanCmd.Flags().Lookup("disable-probing")) rootCmd.AddCommand(scanCmd) }