|
1 |
| -# Copyright (C) 2015-2021, Wazuh Inc. |
2 |
| -# Created by Wazuh, Inc. <info@wazuh.com>. |
| 1 | +# Copyright (C) 2015-2021, Fortishield Inc. |
| 2 | +# Created by Fortishield, Inc. <info@fortishield.github.io>. |
3 | 3 | # This program is free software; you can redistribute it and/or modify it under the terms of GPLv2
|
4 | 4 |
|
5 | 5 | import logging
|
|
11 | 11 |
|
12 | 12 |
|
13 | 13 | if sys.platform == 'win32':
|
14 |
| - WAZUH_PATH = os.path.join("C:", os.sep, "Program Files (x86)", "ossec-agent") |
15 |
| - LOG_FILE_PATH = os.path.join(WAZUH_PATH, 'ossec.log') |
16 |
| - SYSCOLLECTOR_DB_PATH = os.path.join(WAZUH_PATH, 'queue', 'syscollector', 'db', 'local.db') |
| 14 | + FORTISHIELD_PATH = os.path.join("C:", os.sep, "Program Files (x86)", "ossec-agent") |
| 15 | + LOG_FILE_PATH = os.path.join(FORTISHIELD_PATH, 'ossec.log') |
| 16 | + SYSCOLLECTOR_DB_PATH = os.path.join(FORTISHIELD_PATH, 'queue', 'syscollector', 'db', 'local.db') |
17 | 17 | else:
|
18 | 18 | if sys.platform == 'darwin':
|
19 |
| - WAZUH_PATH = os.path.join("/", "Library", "Ossec") |
| 19 | + FORTISHIELD_PATH = os.path.join("/", "Library", "Ossec") |
20 | 20 | else:
|
21 |
| - WAZUH_PATH = os.path.join("/var", "ossec") |
22 |
| - LOG_FILE_PATH = os.path.join(WAZUH_PATH, 'logs', 'ossec.log') |
23 |
| - SYSCOLLECTOR_DB_PATH = os.path.join(WAZUH_PATH, 'queue', 'syscollector', 'db', 'local.db') |
24 |
| - |
25 |
| - |
26 |
| -WAZUH_CONF_PATH = os.path.join(WAZUH_PATH, 'etc', 'ossec.conf') |
27 |
| -WAZUH_LOGS_PATH = os.path.join(WAZUH_PATH, 'logs') |
28 |
| -CLIENT_KEYS_PATH = os.path.join(WAZUH_PATH, 'etc' if platform.system() == 'Linux' else '', 'client.keys') |
29 |
| -QUEUE_DB_PATH = os.path.join(WAZUH_PATH, 'queue', 'db') |
30 |
| -QUEUE_SOCKETS_PATH = os.path.join(WAZUH_PATH, 'queue', 'sockets') |
31 |
| -WAZUH_DB_SOCKET_PATH = os.path.join(QUEUE_DB_PATH, 'wdb') |
32 |
| -CVE_DB_PATH = os.path.join(WAZUH_PATH, 'queue', 'vulnerabilities', 'cve.db') |
33 |
| -ALERTS_JSON_PATH = os.path.join(WAZUH_PATH, 'logs', 'alerts', 'alerts.json') |
34 |
| -ARCHIVES_LOG_PATH = os.path.join(WAZUH_PATH, 'logs', 'archives', 'archives.log') |
35 |
| -ARCHIVES_JSON_PATH = os.path.join(WAZUH_PATH, 'logs', 'archives', 'archives.json') |
36 |
| -CPE_HELPER_PATH = os.path.join(WAZUH_PATH, 'queue', 'vulnerabilities', 'dictionaries', 'cpe_helper.json') |
37 |
| -WAZUH_API_CONF = os.path.join(WAZUH_PATH, 'api', 'configuration', 'api.yaml') |
38 |
| -WAZUH_SECURITY_CONF = os.path.join(WAZUH_PATH, 'api', 'configuration', 'security', 'security.yaml') |
39 |
| -API_LOG_FILE_PATH = os.path.join(WAZUH_PATH, 'logs', 'api.log') |
40 |
| -API_JSON_LOG_FILE_PATH = os.path.join(WAZUH_PATH, 'logs', 'api.json') |
41 |
| -API_LOG_FOLDER = os.path.join(WAZUH_PATH, 'logs', 'api') |
42 |
| -WAZUH_TESTING_PATH = os.path.dirname(os.path.abspath(__file__)) |
43 |
| -CIS_RULESET_PATH = os.path.join(WAZUH_PATH, 'ruleset', 'sca') |
44 |
| -WAZUH_TESTING_DATA_PATH = os.path.join(os.path.dirname(os.path.realpath(__file__)), 'data') |
45 |
| -DEFAULT_AUTHD_PASS_PATH = os.path.join(WAZUH_PATH, 'etc', 'authd.pass') |
| 21 | + FORTISHIELD_PATH = os.path.join("/var", "ossec") |
| 22 | + LOG_FILE_PATH = os.path.join(FORTISHIELD_PATH, 'logs', 'ossec.log') |
| 23 | + SYSCOLLECTOR_DB_PATH = os.path.join(FORTISHIELD_PATH, 'queue', 'syscollector', 'db', 'local.db') |
| 24 | + |
| 25 | + |
| 26 | +FORTISHIELD_CONF_PATH = os.path.join(FORTISHIELD_PATH, 'etc', 'ossec.conf') |
| 27 | +FORTISHIELD_LOGS_PATH = os.path.join(FORTISHIELD_PATH, 'logs') |
| 28 | +CLIENT_KEYS_PATH = os.path.join(FORTISHIELD_PATH, 'etc' if platform.system() == 'Linux' else '', 'client.keys') |
| 29 | +QUEUE_DB_PATH = os.path.join(FORTISHIELD_PATH, 'queue', 'db') |
| 30 | +QUEUE_SOCKETS_PATH = os.path.join(FORTISHIELD_PATH, 'queue', 'sockets') |
| 31 | +FORTISHIELD_DB_SOCKET_PATH = os.path.join(QUEUE_DB_PATH, 'wdb') |
| 32 | +CVE_DB_PATH = os.path.join(FORTISHIELD_PATH, 'queue', 'vulnerabilities', 'cve.db') |
| 33 | +ALERTS_JSON_PATH = os.path.join(FORTISHIELD_PATH, 'logs', 'alerts', 'alerts.json') |
| 34 | +ARCHIVES_LOG_PATH = os.path.join(FORTISHIELD_PATH, 'logs', 'archives', 'archives.log') |
| 35 | +ARCHIVES_JSON_PATH = os.path.join(FORTISHIELD_PATH, 'logs', 'archives', 'archives.json') |
| 36 | +CPE_HELPER_PATH = os.path.join(FORTISHIELD_PATH, 'queue', 'vulnerabilities', 'dictionaries', 'cpe_helper.json') |
| 37 | +FORTISHIELD_API_CONF = os.path.join(FORTISHIELD_PATH, 'api', 'configuration', 'api.yaml') |
| 38 | +FORTISHIELD_SECURITY_CONF = os.path.join(FORTISHIELD_PATH, 'api', 'configuration', 'security', 'security.yaml') |
| 39 | +API_LOG_FILE_PATH = os.path.join(FORTISHIELD_PATH, 'logs', 'api.log') |
| 40 | +API_JSON_LOG_FILE_PATH = os.path.join(FORTISHIELD_PATH, 'logs', 'api.json') |
| 41 | +API_LOG_FOLDER = os.path.join(FORTISHIELD_PATH, 'logs', 'api') |
| 42 | +FORTISHIELD_TESTING_PATH = os.path.dirname(os.path.abspath(__file__)) |
| 43 | +CIS_RULESET_PATH = os.path.join(FORTISHIELD_PATH, 'ruleset', 'sca') |
| 44 | +FORTISHIELD_TESTING_DATA_PATH = os.path.join(os.path.dirname(os.path.realpath(__file__)), 'data') |
| 45 | +DEFAULT_AUTHD_PASS_PATH = os.path.join(FORTISHIELD_PATH, 'etc', 'authd.pass') |
46 | 46 | TEMPLATE_DIR = 'configuration_template'
|
47 | 47 | TEST_CASES_DIR = 'test_cases'
|
48 | 48 |
|
49 | 49 |
|
50 | 50 | # Daemons
|
51 |
| -LOGCOLLECTOR_DAEMON = 'wazuh-logcollector' |
52 |
| -AGENTLESS_DAEMON = 'wazuh-agentlessd' |
53 |
| -CSYSLOG_DAEMON = 'wazuh-csyslogd' |
54 |
| -REMOTE_DAEMON = 'wazuh-remoted' |
55 |
| -ANALYSISD_DAEMON = 'wazuh-analysisd' |
56 |
| -API_DAEMON = 'wazuh-apid' |
57 |
| -MAIL_DAEMON = 'wazuh-maild' |
58 |
| -SYSCHECK_DAEMON = 'wazuh-syscheckd' |
59 |
| -EXEC_DAEMON = 'wazuh-execd' |
60 |
| -MODULES_DAEMON = 'wazuh-modulesd' |
61 |
| -CLUSTER_DAEMON = 'wazuh-clusterd' |
62 |
| -INTEGRATOR_DAEMON = 'wazuh-integratord' |
63 |
| -MONITOR_DAEMON = 'wazuh-monitord' |
64 |
| -DB_DAEMON = 'wazuh-db' |
65 |
| -AGENT_DAEMON = 'wazuh-agentd' |
| 51 | +LOGCOLLECTOR_DAEMON = 'fortishield-logcollector' |
| 52 | +AGENTLESS_DAEMON = 'fortishield-agentlessd' |
| 53 | +CSYSLOG_DAEMON = 'fortishield-csyslogd' |
| 54 | +REMOTE_DAEMON = 'fortishield-remoted' |
| 55 | +ANALYSISD_DAEMON = 'fortishield-analysisd' |
| 56 | +API_DAEMON = 'fortishield-apid' |
| 57 | +MAIL_DAEMON = 'fortishield-maild' |
| 58 | +SYSCHECK_DAEMON = 'fortishield-syscheckd' |
| 59 | +EXEC_DAEMON = 'fortishield-execd' |
| 60 | +MODULES_DAEMON = 'fortishield-modulesd' |
| 61 | +CLUSTER_DAEMON = 'fortishield-clusterd' |
| 62 | +INTEGRATOR_DAEMON = 'fortishield-integratord' |
| 63 | +MONITOR_DAEMON = 'fortishield-monitord' |
| 64 | +DB_DAEMON = 'fortishield-db' |
| 65 | +AGENT_DAEMON = 'fortishield-agentd' |
66 | 66 |
|
67 | 67 | API_DAEMONS_REQUIREMENTS = [API_DAEMON, DB_DAEMON, EXEC_DAEMON, ANALYSISD_DAEMON, REMOTE_DAEMON, MODULES_DAEMON]
|
68 | 68 |
|
69 | 69 | # Paths
|
70 |
| -SYSLOG_SIMULATOR = os.path.join(WAZUH_TESTING_PATH, 'scripts', 'syslog_simulator.py') |
71 |
| -ANALYSISD_STATE = os.path.join(WAZUH_PATH, 'var', 'run', 'wazuh-analysisd.state') |
| 70 | +SYSLOG_SIMULATOR = os.path.join(FORTISHIELD_TESTING_PATH, 'scripts', 'syslog_simulator.py') |
| 71 | +ANALYSISD_STATE = os.path.join(FORTISHIELD_PATH, 'var', 'run', 'fortishield-analysisd.state') |
72 | 72 |
|
73 | 73 | # Timeouts
|
74 | 74 |
|
|
84 | 84 |
|
85 | 85 |
|
86 | 86 | # Local internal options
|
87 |
| -MODULESD_DEBUG = 'wazuh_modules.debug' |
| 87 | +MODULESD_DEBUG = 'fortishield_modules.debug' |
88 | 88 | WINDOWS_DEBUG = 'windows.debug'
|
89 | 89 | SYSCHECK_DEBUG = 'syscheck.debug'
|
90 | 90 | VERBOSE_DEBUG_OUTPUT = 2
|
91 | 91 |
|
92 |
| -# Wazuh Service commands |
93 |
| -WAZUH_SERVICES_STOP = 'stop' |
94 |
| -WAZUH_SERVICES_START = 'start' |
| 92 | +# Fortishield Service commands |
| 93 | +FORTISHIELD_SERVICES_STOP = 'stop' |
| 94 | +FORTISHIELD_SERVICES_START = 'start' |
95 | 95 |
|
96 | 96 |
|
97 | 97 | # Configurations
|
98 | 98 | DATA = 'data'
|
99 |
| -WAZUH_LOG_MONITOR = 'wazuh_log_monitor' |
| 99 | +FORTISHIELD_LOG_MONITOR = 'fortishield_log_monitor' |
100 | 100 |
|
101 | 101 |
|
102 | 102 | # File Types
|
@@ -347,7 +347,7 @@ def fim_mode(self, value):
|
347 | 347 |
|
348 | 348 |
|
349 | 349 | global_parameters = Parameters()
|
350 |
| -logger = logging.getLogger('wazuh_testing') |
| 350 | +logger = logging.getLogger('fortishield_testing') |
351 | 351 | logger.setLevel(logging.DEBUG)
|
352 | 352 |
|
353 | 353 | handler = logging.StreamHandler(sys.stderr)
|
|
0 commit comments