mirror of
https://github.com/syntrex-lab/gomcp.git
synced 2026-04-29 22:36:21 +02:00
Release prep: 54 engines, self-hosted signatures, i18n, dashboard updates
This commit is contained in:
parent
694e32be26
commit
41cbfd6e0a
178 changed files with 36008 additions and 399 deletions
200
internal/config/config.go
Normal file
200
internal/config/config.go
Normal file
|
|
@ -0,0 +1,200 @@
|
|||
package config
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"os"
|
||||
"time"
|
||||
|
||||
"gopkg.in/yaml.v3"
|
||||
)
|
||||
|
||||
// Config is the root configuration loaded from syntrex.yaml (§19.3, §21).
|
||||
type Config struct {
|
||||
Server ServerConfig `yaml:"server"`
|
||||
SOC SOCConfig `yaml:"soc"`
|
||||
RBAC RBACConfig `yaml:"rbac"`
|
||||
Webhooks []WebhookConfig `yaml:"webhooks"`
|
||||
ThreatIntel ThreatIntelConfig `yaml:"threat_intel"`
|
||||
Sovereign SovereignConfig `yaml:"sovereign"`
|
||||
P2P P2PConfig `yaml:"p2p"`
|
||||
Logging LoggingConfig `yaml:"logging"`
|
||||
}
|
||||
|
||||
// ServerConfig defines HTTP server settings.
|
||||
type ServerConfig struct {
|
||||
Port int `yaml:"port"`
|
||||
ReadTimeout time.Duration `yaml:"read_timeout"`
|
||||
WriteTimeout time.Duration `yaml:"write_timeout"`
|
||||
RateLimitPerMin int `yaml:"rate_limit_per_min"`
|
||||
CORSAllowOrigins []string `yaml:"cors_allow_origins"`
|
||||
}
|
||||
|
||||
// SOCConfig defines SOC pipeline settings (§7).
|
||||
type SOCConfig struct {
|
||||
DataDir string `yaml:"data_dir"`
|
||||
MaxEventsPerHour int `yaml:"max_events_per_hour"`
|
||||
ClusterEnabled bool `yaml:"cluster_enabled"`
|
||||
ClusterEps float64 `yaml:"cluster_eps"`
|
||||
ClusterMinPts int `yaml:"cluster_min_pts"`
|
||||
KillChainEnabled bool `yaml:"kill_chain_enabled"`
|
||||
SSEBufferSize int `yaml:"sse_buffer_size"`
|
||||
}
|
||||
|
||||
// RBACConfig defines API key authentication (§17).
|
||||
type RBACConfig struct {
|
||||
Enabled bool `yaml:"enabled"`
|
||||
Keys []KeyEntry `yaml:"keys"`
|
||||
}
|
||||
|
||||
// KeyEntry is a pre-configured API key.
|
||||
type KeyEntry struct {
|
||||
Key string `yaml:"key"`
|
||||
Role string `yaml:"role"`
|
||||
Name string `yaml:"name"`
|
||||
}
|
||||
|
||||
// WebhookConfig defines a SOAR webhook (§15).
|
||||
type WebhookConfig struct {
|
||||
ID string `yaml:"id"`
|
||||
URL string `yaml:"url"`
|
||||
Events []string `yaml:"events"`
|
||||
Headers map[string]string `yaml:"headers"`
|
||||
Active bool `yaml:"active"`
|
||||
Retries int `yaml:"retries"`
|
||||
}
|
||||
|
||||
// ThreatIntelConfig defines IOC feed sources (§6).
|
||||
type ThreatIntelConfig struct {
|
||||
Enabled bool `yaml:"enabled"`
|
||||
RefreshInterval time.Duration `yaml:"refresh_interval"`
|
||||
Feeds []FeedConfig `yaml:"feeds"`
|
||||
}
|
||||
|
||||
// FeedConfig is a single threat intel feed.
|
||||
type FeedConfig struct {
|
||||
Name string `yaml:"name"`
|
||||
URL string `yaml:"url"`
|
||||
Format string `yaml:"format"` // stix, csv, json
|
||||
Enabled bool `yaml:"enabled"`
|
||||
}
|
||||
|
||||
// SovereignConfig implements §21 — air-gapped deployment mode.
|
||||
type SovereignConfig struct {
|
||||
Enabled bool `yaml:"enabled"`
|
||||
Mode string `yaml:"mode"` // airgap, restricted, open
|
||||
DisableExternalAPI bool `yaml:"disable_external_api"`
|
||||
DisableTelemetry bool `yaml:"disable_telemetry"`
|
||||
LocalModelsOnly bool `yaml:"local_models_only"`
|
||||
DataRetentionDays int `yaml:"data_retention_days"`
|
||||
EncryptAtRest bool `yaml:"encrypt_at_rest"`
|
||||
AuditAllRequests bool `yaml:"audit_all_requests"`
|
||||
MaxPeers int `yaml:"max_peers"`
|
||||
}
|
||||
|
||||
// P2PConfig defines SOC mesh sync settings (§14).
|
||||
type P2PConfig struct {
|
||||
Enabled bool `yaml:"enabled"`
|
||||
ListenAddr string `yaml:"listen_addr"`
|
||||
Peers []PeerConfig `yaml:"peers"`
|
||||
}
|
||||
|
||||
// PeerConfig is a pre-configured P2P peer.
|
||||
type PeerConfig struct {
|
||||
ID string `yaml:"id"`
|
||||
Name string `yaml:"name"`
|
||||
Endpoint string `yaml:"endpoint"`
|
||||
Trust string `yaml:"trust"` // full, partial, readonly
|
||||
}
|
||||
|
||||
// LoggingConfig defines structured logging settings.
|
||||
type LoggingConfig struct {
|
||||
Level string `yaml:"level"` // debug, info, warn, error
|
||||
Format string `yaml:"format"` // json, text
|
||||
AccessLog bool `yaml:"access_log"`
|
||||
AuditLog bool `yaml:"audit_log"`
|
||||
OutputFile string `yaml:"output_file"`
|
||||
}
|
||||
|
||||
// Load reads and parses config from a YAML file.
|
||||
func Load(path string) (*Config, error) {
|
||||
data, err := os.ReadFile(path)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("config: read %s: %w", path, err)
|
||||
}
|
||||
|
||||
cfg := DefaultConfig()
|
||||
if err := yaml.Unmarshal(data, cfg); err != nil {
|
||||
return nil, fmt.Errorf("config: parse %s: %w", path, err)
|
||||
}
|
||||
|
||||
if err := cfg.Validate(); err != nil {
|
||||
return nil, fmt.Errorf("config: validate: %w", err)
|
||||
}
|
||||
|
||||
return cfg, nil
|
||||
}
|
||||
|
||||
// DefaultConfig returns sensible defaults.
|
||||
func DefaultConfig() *Config {
|
||||
return &Config{
|
||||
Server: ServerConfig{
|
||||
Port: 9100,
|
||||
ReadTimeout: 10 * time.Second,
|
||||
WriteTimeout: 30 * time.Second,
|
||||
RateLimitPerMin: 100,
|
||||
},
|
||||
SOC: SOCConfig{
|
||||
DataDir: ".syntrex",
|
||||
MaxEventsPerHour: 10000,
|
||||
ClusterEnabled: true,
|
||||
ClusterEps: 0.5,
|
||||
ClusterMinPts: 3,
|
||||
KillChainEnabled: true,
|
||||
SSEBufferSize: 256,
|
||||
},
|
||||
RBAC: RBACConfig{
|
||||
Enabled: false,
|
||||
},
|
||||
ThreatIntel: ThreatIntelConfig{
|
||||
RefreshInterval: 30 * time.Minute,
|
||||
},
|
||||
Sovereign: SovereignConfig{
|
||||
Mode: "open",
|
||||
DataRetentionDays: 90,
|
||||
MaxPeers: 10,
|
||||
},
|
||||
Logging: LoggingConfig{
|
||||
Level: "info",
|
||||
Format: "json",
|
||||
AccessLog: true,
|
||||
AuditLog: true,
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
// Validate checks config for consistency.
|
||||
func (c *Config) Validate() error {
|
||||
if c.Server.Port < 1 || c.Server.Port > 65535 {
|
||||
return fmt.Errorf("server.port must be 1-65535, got %d", c.Server.Port)
|
||||
}
|
||||
if c.Sovereign.Enabled && c.Sovereign.Mode == "" {
|
||||
return fmt.Errorf("sovereign.mode required when sovereign.enabled=true")
|
||||
}
|
||||
if c.Sovereign.Enabled && c.Sovereign.Mode == "airgap" {
|
||||
// Enforce: no external APIs, no telemetry, local only
|
||||
c.Sovereign.DisableExternalAPI = true
|
||||
c.Sovereign.DisableTelemetry = true
|
||||
c.Sovereign.LocalModelsOnly = true
|
||||
}
|
||||
return nil
|
||||
}
|
||||
|
||||
// IsSovereign returns whether sovereign mode is active.
|
||||
func (c *Config) IsSovereign() bool {
|
||||
return c.Sovereign.Enabled
|
||||
}
|
||||
|
||||
// IsAirGapped returns whether the deployment is fully air-gapped.
|
||||
func (c *Config) IsAirGapped() bool {
|
||||
return c.Sovereign.Enabled && c.Sovereign.Mode == "airgap"
|
||||
}
|
||||
152
internal/config/config_test.go
Normal file
152
internal/config/config_test.go
Normal file
|
|
@ -0,0 +1,152 @@
|
|||
package config
|
||||
|
||||
import (
|
||||
"os"
|
||||
"path/filepath"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func TestDefaultConfig(t *testing.T) {
|
||||
cfg := DefaultConfig()
|
||||
|
||||
if cfg.Server.Port != 9100 {
|
||||
t.Fatalf("default port should be 9100, got %d", cfg.Server.Port)
|
||||
}
|
||||
if cfg.RBAC.Enabled {
|
||||
t.Fatal("RBAC should be disabled by default")
|
||||
}
|
||||
if cfg.Sovereign.Enabled {
|
||||
t.Fatal("Sovereign should be disabled by default")
|
||||
}
|
||||
if cfg.SOC.ClusterEnabled != true {
|
||||
t.Fatal("clustering should be enabled by default")
|
||||
}
|
||||
if cfg.Logging.Level != "info" {
|
||||
t.Fatalf("default log level should be info, got %s", cfg.Logging.Level)
|
||||
}
|
||||
}
|
||||
|
||||
func TestConfig_Validate_InvalidPort(t *testing.T) {
|
||||
cfg := DefaultConfig()
|
||||
cfg.Server.Port = 0
|
||||
if err := cfg.Validate(); err == nil {
|
||||
t.Fatal("should reject port 0")
|
||||
}
|
||||
cfg.Server.Port = 99999
|
||||
if err := cfg.Validate(); err == nil {
|
||||
t.Fatal("should reject port 99999")
|
||||
}
|
||||
}
|
||||
|
||||
func TestConfig_AirGapEnforcement(t *testing.T) {
|
||||
cfg := DefaultConfig()
|
||||
cfg.Sovereign.Enabled = true
|
||||
cfg.Sovereign.Mode = "airgap"
|
||||
|
||||
if err := cfg.Validate(); err != nil {
|
||||
t.Fatalf("airgap config should validate: %v", err)
|
||||
}
|
||||
|
||||
if !cfg.Sovereign.DisableExternalAPI {
|
||||
t.Fatal("airgap should force DisableExternalAPI=true")
|
||||
}
|
||||
if !cfg.Sovereign.DisableTelemetry {
|
||||
t.Fatal("airgap should force DisableTelemetry=true")
|
||||
}
|
||||
if !cfg.Sovereign.LocalModelsOnly {
|
||||
t.Fatal("airgap should force LocalModelsOnly=true")
|
||||
}
|
||||
}
|
||||
|
||||
func TestConfig_Load_YAML(t *testing.T) {
|
||||
yaml := `
|
||||
server:
|
||||
port: 9200
|
||||
rate_limit_per_min: 50
|
||||
soc:
|
||||
data_dir: /var/syntrex
|
||||
cluster_enabled: true
|
||||
rbac:
|
||||
enabled: true
|
||||
keys:
|
||||
- key: test-key-123
|
||||
role: admin
|
||||
name: CI Key
|
||||
sovereign:
|
||||
enabled: true
|
||||
mode: restricted
|
||||
encrypt_at_rest: true
|
||||
data_retention_days: 30
|
||||
p2p:
|
||||
enabled: true
|
||||
peers:
|
||||
- id: soc-2
|
||||
name: Site-B
|
||||
endpoint: http://soc-b:9100
|
||||
trust: full
|
||||
logging:
|
||||
level: debug
|
||||
access_log: true
|
||||
`
|
||||
dir := t.TempDir()
|
||||
path := filepath.Join(dir, "syntrex.yaml")
|
||||
os.WriteFile(path, []byte(yaml), 0644)
|
||||
|
||||
cfg, err := Load(path)
|
||||
if err != nil {
|
||||
t.Fatalf("load failed: %v", err)
|
||||
}
|
||||
|
||||
if cfg.Server.Port != 9200 {
|
||||
t.Fatalf("expected port 9200, got %d", cfg.Server.Port)
|
||||
}
|
||||
if cfg.Server.RateLimitPerMin != 50 {
|
||||
t.Fatalf("expected rate 50, got %d", cfg.Server.RateLimitPerMin)
|
||||
}
|
||||
if !cfg.RBAC.Enabled {
|
||||
t.Fatal("RBAC should be enabled")
|
||||
}
|
||||
if len(cfg.RBAC.Keys) != 1 || cfg.RBAC.Keys[0].Role != "admin" {
|
||||
t.Fatal("should have 1 admin key")
|
||||
}
|
||||
if !cfg.Sovereign.Enabled || cfg.Sovereign.Mode != "restricted" {
|
||||
t.Fatal("sovereign should be restricted")
|
||||
}
|
||||
if !cfg.Sovereign.EncryptAtRest {
|
||||
t.Fatal("encrypt_at_rest should be true")
|
||||
}
|
||||
if cfg.Sovereign.DataRetentionDays != 30 {
|
||||
t.Fatalf("retention should be 30, got %d", cfg.Sovereign.DataRetentionDays)
|
||||
}
|
||||
if len(cfg.P2P.Peers) != 1 || cfg.P2P.Peers[0].Trust != "full" {
|
||||
t.Fatal("should have 1 full-trust peer")
|
||||
}
|
||||
if cfg.Logging.Level != "debug" {
|
||||
t.Fatalf("expected debug, got %s", cfg.Logging.Level)
|
||||
}
|
||||
}
|
||||
|
||||
func TestConfig_IsSovereign(t *testing.T) {
|
||||
cfg := DefaultConfig()
|
||||
if cfg.IsSovereign() {
|
||||
t.Fatal("default should not be sovereign")
|
||||
}
|
||||
cfg.Sovereign.Enabled = true
|
||||
if !cfg.IsSovereign() {
|
||||
t.Fatal("should be sovereign when enabled")
|
||||
}
|
||||
}
|
||||
|
||||
func TestConfig_IsAirGapped(t *testing.T) {
|
||||
cfg := DefaultConfig()
|
||||
cfg.Sovereign.Enabled = true
|
||||
cfg.Sovereign.Mode = "restricted"
|
||||
if cfg.IsAirGapped() {
|
||||
t.Fatal("restricted is not air-gapped")
|
||||
}
|
||||
cfg.Sovereign.Mode = "airgap"
|
||||
cfg.Validate()
|
||||
if !cfg.IsAirGapped() {
|
||||
t.Fatal("should be air-gapped")
|
||||
}
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue