| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297 |
- # IRIS Source Code
- # Copyright (C) 2024 - DFIR-IRIS
- # contact@dfir-iris.org
- #
- # This program is free software; you can redistribute it and/or
- # modify it under the terms of the GNU Lesser General Public
- # License as published by the Free Software Foundation; either
- # version 3 of the License, or (at your option) any later version.
- #
- # This program is distributed in the hope that it will be useful,
- # but WITHOUT ANY WARRANTY; without even the implied warranty of
- # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
- # Lesser General Public License for more details.
- #
- # You should have received a copy of the GNU Lesser General Public License
- # along with this program; if not, write to the Free Software Foundation,
- # Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
- import traceback
- import marshmallow
- from flask import Blueprint
- from flask import request
- from flask_login import current_user
- from app import db
- from app import app
- from app.datamgmt.manage.manage_groups_db import add_all_cases_access_to_group
- from app.datamgmt.manage.manage_groups_db import add_case_access_to_group
- from app.datamgmt.manage.manage_groups_db import delete_group
- from app.datamgmt.manage.manage_groups_db import get_group
- from app.datamgmt.manage.manage_groups_db import get_group_details
- from app.datamgmt.manage.manage_groups_db import get_group_with_members
- from app.datamgmt.manage.manage_groups_db import get_groups_list_hr_perms
- from app.datamgmt.manage.manage_groups_db import remove_cases_access_from_group
- from app.datamgmt.manage.manage_groups_db import remove_user_from_group
- from app.datamgmt.manage.manage_groups_db import update_group_members
- from app.datamgmt.manage.manage_users_db import get_user
- from app.iris_engine.access_control.utils import ac_ldp_group_removal
- from app.iris_engine.access_control.utils import ac_flag_match_mask
- from app.iris_engine.access_control.utils import ac_ldp_group_update
- from app.iris_engine.access_control.utils import ac_recompute_effective_ac_from_users_list
- from app.iris_engine.utils.tracker import track_activity
- from app.models.authorization import Permissions
- from app.schema.marshables import AuthorizationGroupSchema
- from app.blueprints.access_controls import ac_api_requires
- from app.blueprints.access_controls import ac_api_return_access_denied
- from app.blueprints.responses import response_error
- from app.blueprints.responses import response_success
- from app.iris_engine.demo_builder import protect_demo_mode_group
- manage_groups_rest_blueprint = Blueprint('manage_groups_rest', __name__)
- log = app.logger
- @manage_groups_rest_blueprint.route('/manage/groups/list', methods=['GET'])
- @ac_api_requires(Permissions.server_administrator)
- def manage_groups_index():
- groups = get_groups_list_hr_perms()
- return response_success('', data=groups)
- @manage_groups_rest_blueprint.route('/manage/groups/add', methods=['POST'])
- @ac_api_requires(Permissions.server_administrator)
- def manage_groups_add():
- if not request.is_json:
- return response_error('Invalid request, expecting JSON')
- data = request.get_json()
- if not data:
- return response_error('Invalid request, expecting JSON')
- ags = AuthorizationGroupSchema()
- try:
- ags_c = ags.load(data)
- ags.verify_unique(data)
- db.session.add(ags_c)
- db.session.commit()
- except marshmallow.exceptions.ValidationError as e:
- return response_error(msg='Data error', data=e.messages)
- track_activity(message=f'added group {ags_c.group_name}', ctx_less=True)
- return response_success('', data=ags.dump(ags_c))
- @manage_groups_rest_blueprint.route('/manage/groups/update/<int:cur_id>', methods=['POST'])
- @ac_api_requires(Permissions.server_administrator)
- def manage_groups_update(cur_id):
- if not request.is_json:
- return response_error("Invalid request, expecting JSON")
- data = request.get_json()
- if not data:
- return response_error("Invalid request, expecting JSON")
- group = get_group(cur_id)
- if not group:
- return response_error("Invalid group ID")
- if protect_demo_mode_group(group):
- return ac_api_return_access_denied()
- ags = AuthorizationGroupSchema()
- try:
- data['group_id'] = cur_id
- ags_c = ags.load(data, instance=group, partial=True)
- if not ac_flag_match_mask(data['group_permissions'], Permissions.server_administrator.value) and ac_ldp_group_update(current_user.id):
- db.session.rollback()
- return response_error(msg="That might not be a good idea Dave", data="Update the group permissions will lock you out")
- db.session.commit()
- except marshmallow.exceptions.ValidationError as e:
- return response_error(msg="Data error", data=e.messages)
- return response_success('', data=ags.dump(ags_c))
- @manage_groups_rest_blueprint.route('/manage/groups/delete/<int:cur_id>', methods=['POST'])
- @ac_api_requires(Permissions.server_administrator)
- def manage_groups_delete(cur_id):
- group = get_group(cur_id)
- if not group:
- return response_error("Invalid group ID")
- if protect_demo_mode_group(group):
- return ac_api_return_access_denied()
- if ac_ldp_group_removal(current_user.id, group_id=group.group_id):
- return response_error("I can't let you do that Dave", data="Removing this group will lock you out")
- delete_group(group)
- return response_success('Group deleted')
- @manage_groups_rest_blueprint.route('/manage/groups/<int:cur_id>', methods=['GET'])
- @ac_api_requires(Permissions.server_administrator)
- def manage_groups_view(cur_id):
- group = get_group_details(cur_id)
- if not group:
- return response_error("Invalid group ID")
- ags = AuthorizationGroupSchema()
- return response_success('', data=ags.dump(group))
- @manage_groups_rest_blueprint.route('/manage/groups/<int:cur_id>/members/update', methods=['POST'])
- @ac_api_requires(Permissions.server_administrator)
- def manage_groups_members_update(cur_id):
- group = get_group_with_members(cur_id)
- if not group:
- return response_error("Invalid group ID")
- if protect_demo_mode_group(group):
- return ac_api_return_access_denied()
- if not request.is_json:
- return response_error("Invalid request, expecting JSON")
- data = request.get_json()
- if not data:
- return response_error("Invalid request, expecting JSON")
- if not isinstance(data.get('group_members'), list):
- return response_error("Expecting a list of IDs")
- update_group_members(group, data.get('group_members'))
- group = get_group_with_members(cur_id)
- return response_success('', data=group)
- @manage_groups_rest_blueprint.route('/manage/groups/<int:cur_id>/members/delete/<int:cur_id_2>', methods=['POST'])
- @ac_api_requires(Permissions.server_administrator)
- def manage_groups_members_delete(cur_id, cur_id_2):
- group = get_group_with_members(cur_id)
- if not group:
- return response_error("Invalid group ID")
- if protect_demo_mode_group(group):
- return ac_api_return_access_denied()
- user = get_user(cur_id_2)
- if not user:
- return response_error("Invalid user ID")
- if ac_ldp_group_removal(user_id=user.id, group_id=group.group_id):
- return response_error('I cannot let you do that Dave', data="Removing you from the group will make you "
- "loose your access rights")
- remove_user_from_group(group, user)
- group = get_group_with_members(cur_id)
- return response_success('Member deleted from group', data=group)
- @manage_groups_rest_blueprint.route('/manage/groups/<int:cur_id>/cases-access/update', methods=['POST'])
- @ac_api_requires(Permissions.server_administrator)
- def manage_groups_cac_add_case(cur_id):
- if not request.is_json:
- return response_error("Invalid request, expecting JSON")
- data = request.get_json()
- if not data:
- return response_error("Invalid request, expecting JSON")
- group = get_group_with_members(cur_id)
- if not group:
- return response_error("Invalid group ID")
- if protect_demo_mode_group(group):
- return ac_api_return_access_denied()
- if not isinstance(data.get('access_level'), int):
- try:
- data['access_level'] = int(data.get('access_level'))
- except:
- return response_error("Expecting access_level as int")
- if not isinstance(data.get('cases_list'), list) and data.get('auto_follow_cases') is False:
- return response_error("Expecting cases_list as list")
- if data.get('auto_follow_cases') is True:
- group, logs = add_all_cases_access_to_group(group, data.get('access_level'))
- group.group_auto_follow = True
- group.group_auto_follow_access_level = data.get('access_level')
- db.session.commit()
- else:
- group, logs = add_case_access_to_group(group, data.get('cases_list'), data.get('access_level'))
- group.group_auto_follow = False
- db.session.commit()
- if not group:
- return response_error(msg=logs)
- group = get_group_details(cur_id)
- ac_recompute_effective_ac_from_users_list(group.group_members)
- return response_success(data=group)
- @manage_groups_rest_blueprint.route('/manage/groups/<int:cur_id>/cases-access/delete', methods=['POST'])
- @ac_api_requires(Permissions.server_administrator)
- def manage_groups_cac_delete_case(cur_id):
- group = get_group_with_members(cur_id)
- if not group:
- return response_error("Invalid group ID")
- if protect_demo_mode_group(group):
- return ac_api_return_access_denied()
- if not request.is_json:
- return response_error("Invalid request")
- data = request.get_json()
- if not data:
- return response_error("Invalid request")
- if not isinstance(data.get('cases'), list):
- return response_error("Expecting cases as list")
- try:
- success, logs = remove_cases_access_from_group(group.group_id, data.get('cases'))
- db.session.commit()
- except Exception as e:
- log.error("Error while removing cases access from group: {}".format(e))
- log.error(traceback.format_exc())
- return response_error(msg=str(e))
- if success:
- ac_recompute_effective_ac_from_users_list(group.group_members)
- return response_success(msg="Cases access removed from group")
- return response_error(msg=logs)
|