Keine Beschreibung

manage_groups.py 10KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297
  1. # IRIS Source Code
  2. # Copyright (C) 2024 - DFIR-IRIS
  3. # contact@dfir-iris.org
  4. #
  5. # This program is free software; you can redistribute it and/or
  6. # modify it under the terms of the GNU Lesser General Public
  7. # License as published by the Free Software Foundation; either
  8. # version 3 of the License, or (at your option) any later version.
  9. #
  10. # This program is distributed in the hope that it will be useful,
  11. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  13. # Lesser General Public License for more details.
  14. #
  15. # You should have received a copy of the GNU Lesser General Public License
  16. # along with this program; if not, write to the Free Software Foundation,
  17. # Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  18. import traceback
  19. import marshmallow
  20. from flask import Blueprint
  21. from flask import request
  22. from flask_login import current_user
  23. from app import db
  24. from app import app
  25. from app.datamgmt.manage.manage_groups_db import add_all_cases_access_to_group
  26. from app.datamgmt.manage.manage_groups_db import add_case_access_to_group
  27. from app.datamgmt.manage.manage_groups_db import delete_group
  28. from app.datamgmt.manage.manage_groups_db import get_group
  29. from app.datamgmt.manage.manage_groups_db import get_group_details
  30. from app.datamgmt.manage.manage_groups_db import get_group_with_members
  31. from app.datamgmt.manage.manage_groups_db import get_groups_list_hr_perms
  32. from app.datamgmt.manage.manage_groups_db import remove_cases_access_from_group
  33. from app.datamgmt.manage.manage_groups_db import remove_user_from_group
  34. from app.datamgmt.manage.manage_groups_db import update_group_members
  35. from app.datamgmt.manage.manage_users_db import get_user
  36. from app.iris_engine.access_control.utils import ac_ldp_group_removal
  37. from app.iris_engine.access_control.utils import ac_flag_match_mask
  38. from app.iris_engine.access_control.utils import ac_ldp_group_update
  39. from app.iris_engine.access_control.utils import ac_recompute_effective_ac_from_users_list
  40. from app.iris_engine.utils.tracker import track_activity
  41. from app.models.authorization import Permissions
  42. from app.schema.marshables import AuthorizationGroupSchema
  43. from app.blueprints.access_controls import ac_api_requires
  44. from app.blueprints.access_controls import ac_api_return_access_denied
  45. from app.blueprints.responses import response_error
  46. from app.blueprints.responses import response_success
  47. from app.iris_engine.demo_builder import protect_demo_mode_group
  48. manage_groups_rest_blueprint = Blueprint('manage_groups_rest', __name__)
  49. log = app.logger
  50. @manage_groups_rest_blueprint.route('/manage/groups/list', methods=['GET'])
  51. @ac_api_requires(Permissions.server_administrator)
  52. def manage_groups_index():
  53. groups = get_groups_list_hr_perms()
  54. return response_success('', data=groups)
  55. @manage_groups_rest_blueprint.route('/manage/groups/add', methods=['POST'])
  56. @ac_api_requires(Permissions.server_administrator)
  57. def manage_groups_add():
  58. if not request.is_json:
  59. return response_error('Invalid request, expecting JSON')
  60. data = request.get_json()
  61. if not data:
  62. return response_error('Invalid request, expecting JSON')
  63. ags = AuthorizationGroupSchema()
  64. try:
  65. ags_c = ags.load(data)
  66. ags.verify_unique(data)
  67. db.session.add(ags_c)
  68. db.session.commit()
  69. except marshmallow.exceptions.ValidationError as e:
  70. return response_error(msg='Data error', data=e.messages)
  71. track_activity(message=f'added group {ags_c.group_name}', ctx_less=True)
  72. return response_success('', data=ags.dump(ags_c))
  73. @manage_groups_rest_blueprint.route('/manage/groups/update/<int:cur_id>', methods=['POST'])
  74. @ac_api_requires(Permissions.server_administrator)
  75. def manage_groups_update(cur_id):
  76. if not request.is_json:
  77. return response_error("Invalid request, expecting JSON")
  78. data = request.get_json()
  79. if not data:
  80. return response_error("Invalid request, expecting JSON")
  81. group = get_group(cur_id)
  82. if not group:
  83. return response_error("Invalid group ID")
  84. if protect_demo_mode_group(group):
  85. return ac_api_return_access_denied()
  86. ags = AuthorizationGroupSchema()
  87. try:
  88. data['group_id'] = cur_id
  89. ags_c = ags.load(data, instance=group, partial=True)
  90. if not ac_flag_match_mask(data['group_permissions'], Permissions.server_administrator.value) and ac_ldp_group_update(current_user.id):
  91. db.session.rollback()
  92. return response_error(msg="That might not be a good idea Dave", data="Update the group permissions will lock you out")
  93. db.session.commit()
  94. except marshmallow.exceptions.ValidationError as e:
  95. return response_error(msg="Data error", data=e.messages)
  96. return response_success('', data=ags.dump(ags_c))
  97. @manage_groups_rest_blueprint.route('/manage/groups/delete/<int:cur_id>', methods=['POST'])
  98. @ac_api_requires(Permissions.server_administrator)
  99. def manage_groups_delete(cur_id):
  100. group = get_group(cur_id)
  101. if not group:
  102. return response_error("Invalid group ID")
  103. if protect_demo_mode_group(group):
  104. return ac_api_return_access_denied()
  105. if ac_ldp_group_removal(current_user.id, group_id=group.group_id):
  106. return response_error("I can't let you do that Dave", data="Removing this group will lock you out")
  107. delete_group(group)
  108. return response_success('Group deleted')
  109. @manage_groups_rest_blueprint.route('/manage/groups/<int:cur_id>', methods=['GET'])
  110. @ac_api_requires(Permissions.server_administrator)
  111. def manage_groups_view(cur_id):
  112. group = get_group_details(cur_id)
  113. if not group:
  114. return response_error("Invalid group ID")
  115. ags = AuthorizationGroupSchema()
  116. return response_success('', data=ags.dump(group))
  117. @manage_groups_rest_blueprint.route('/manage/groups/<int:cur_id>/members/update', methods=['POST'])
  118. @ac_api_requires(Permissions.server_administrator)
  119. def manage_groups_members_update(cur_id):
  120. group = get_group_with_members(cur_id)
  121. if not group:
  122. return response_error("Invalid group ID")
  123. if protect_demo_mode_group(group):
  124. return ac_api_return_access_denied()
  125. if not request.is_json:
  126. return response_error("Invalid request, expecting JSON")
  127. data = request.get_json()
  128. if not data:
  129. return response_error("Invalid request, expecting JSON")
  130. if not isinstance(data.get('group_members'), list):
  131. return response_error("Expecting a list of IDs")
  132. update_group_members(group, data.get('group_members'))
  133. group = get_group_with_members(cur_id)
  134. return response_success('', data=group)
  135. @manage_groups_rest_blueprint.route('/manage/groups/<int:cur_id>/members/delete/<int:cur_id_2>', methods=['POST'])
  136. @ac_api_requires(Permissions.server_administrator)
  137. def manage_groups_members_delete(cur_id, cur_id_2):
  138. group = get_group_with_members(cur_id)
  139. if not group:
  140. return response_error("Invalid group ID")
  141. if protect_demo_mode_group(group):
  142. return ac_api_return_access_denied()
  143. user = get_user(cur_id_2)
  144. if not user:
  145. return response_error("Invalid user ID")
  146. if ac_ldp_group_removal(user_id=user.id, group_id=group.group_id):
  147. return response_error('I cannot let you do that Dave', data="Removing you from the group will make you "
  148. "loose your access rights")
  149. remove_user_from_group(group, user)
  150. group = get_group_with_members(cur_id)
  151. return response_success('Member deleted from group', data=group)
  152. @manage_groups_rest_blueprint.route('/manage/groups/<int:cur_id>/cases-access/update', methods=['POST'])
  153. @ac_api_requires(Permissions.server_administrator)
  154. def manage_groups_cac_add_case(cur_id):
  155. if not request.is_json:
  156. return response_error("Invalid request, expecting JSON")
  157. data = request.get_json()
  158. if not data:
  159. return response_error("Invalid request, expecting JSON")
  160. group = get_group_with_members(cur_id)
  161. if not group:
  162. return response_error("Invalid group ID")
  163. if protect_demo_mode_group(group):
  164. return ac_api_return_access_denied()
  165. if not isinstance(data.get('access_level'), int):
  166. try:
  167. data['access_level'] = int(data.get('access_level'))
  168. except:
  169. return response_error("Expecting access_level as int")
  170. if not isinstance(data.get('cases_list'), list) and data.get('auto_follow_cases') is False:
  171. return response_error("Expecting cases_list as list")
  172. if data.get('auto_follow_cases') is True:
  173. group, logs = add_all_cases_access_to_group(group, data.get('access_level'))
  174. group.group_auto_follow = True
  175. group.group_auto_follow_access_level = data.get('access_level')
  176. db.session.commit()
  177. else:
  178. group, logs = add_case_access_to_group(group, data.get('cases_list'), data.get('access_level'))
  179. group.group_auto_follow = False
  180. db.session.commit()
  181. if not group:
  182. return response_error(msg=logs)
  183. group = get_group_details(cur_id)
  184. ac_recompute_effective_ac_from_users_list(group.group_members)
  185. return response_success(data=group)
  186. @manage_groups_rest_blueprint.route('/manage/groups/<int:cur_id>/cases-access/delete', methods=['POST'])
  187. @ac_api_requires(Permissions.server_administrator)
  188. def manage_groups_cac_delete_case(cur_id):
  189. group = get_group_with_members(cur_id)
  190. if not group:
  191. return response_error("Invalid group ID")
  192. if protect_demo_mode_group(group):
  193. return ac_api_return_access_denied()
  194. if not request.is_json:
  195. return response_error("Invalid request")
  196. data = request.get_json()
  197. if not data:
  198. return response_error("Invalid request")
  199. if not isinstance(data.get('cases'), list):
  200. return response_error("Expecting cases as list")
  201. try:
  202. success, logs = remove_cases_access_from_group(group.group_id, data.get('cases'))
  203. db.session.commit()
  204. except Exception as e:
  205. log.error("Error while removing cases access from group: {}".format(e))
  206. log.error(traceback.format_exc())
  207. return response_error(msg=str(e))
  208. if success:
  209. ac_recompute_effective_ac_from_users_list(group.group_members)
  210. return response_success(msg="Cases access removed from group")
  211. return response_error(msg=logs)