def main():
import os
import sys
from securityonion_airgap_download import compare_md5s
import subprocess
args = parse_arguments()
if not os.path.exists(args.input_file):
print 'ERROR: ' + args.input_file + ' doesn\'t exist. Exitting.'
sys.exit(1)
elif os.path.isdir(args.input_file):
#for f in os.listdir(args.input_file):
# file = os.join(args.input_file, f)
print 'ERROR: Script currently doesn\'t support crawling a directory. Exitting.'
#Maybe list dir, select newest tarball, and overwrite value of args.input_file. Then change next elseif to just if.
sys.exit(1)
elif not os.path.isdir(args.input_file):
print '\n[MAIN: Setup]'
if os.path.exists('.'.join([args.input_file, 'md5'])):
compare_md5s(os.path.dirname(os.path.abspath(args.input_file)))
decompress_tarfile(args.input_file)
base_dir = args.input_file[:-7]
print 'Base Dir: ' + base_dir
script_dir = os.path.dirname(os.path.realpath(__file__))
ip2c_script = script_dir + '/squert_ip2c_update.py'
#ip2c_cmd = script_dir + '/squert_ip2c_update.py -d ' + os.path.join(base_dir, 'RIR')
ids_script = script_dir + '/ids_offline_update.py'
#print os.path.abspath(base_dir)
if args.geoip:
print '\n[MAIN -> IDS: GeoIP]'
subprocess.call(['python', ids_script, '--geoip', '-G' + os.path.join(os.path.abspath(base_dir), 'GeoIP')])
elif args.rules:
print '\n[MAIN -> IDS: Snort Rules]'
# what about Doing blacklist?
subprocess.call(['python', ids_script, '--rules', '-R' + os.path.join(os.path.abspath(base_dir), 'Snort')])
elif args.ip2c:
print '\n[MAIN -> IP2C]'
##subprocess.call(['python', ip2c_script, '-h'])
##subprocess.call(['python', ip2c_cmd])
subprocess.call(['python', ip2c_script, '-d' + os.path.join(os.path.abspath(base_dir), 'RIR')])
##subprocess.call(['sudo', 'python', ip2c_script, '-d' + os.path.join(os.path.abspath(base_dir), 'RIR')])
else:
print '\n[MAIN -> IDS: Blacklists, GeoIP, Rules]'
subprocess.call(['python', ids_script, '-B' + os.path.join(os.path.abspath(base_dir), 'Snort', 'Blacklist'), '-G' + os.path.join(os.path.abspath(base_dir), 'GeoIP'), '-R' + os.path.join(os.path.abspath(base_dir), 'Snort')])
print '\n[MAIN -> IP2C]'
subprocess.call(['python', ip2c_script, '-d' + os.path.join(os.path.abspath(base_dir), 'RIR')])
print '\nFinished!'
securityonion_airgap_update.py 文件源码
python
阅读 22
收藏 0
点赞 0
评论 0
评论列表
文章目录