hcornet 506716e703
Some checks failed
Deployment Verification / deploy-and-test (push) Failing after 29s
first sync
2025-03-04 07:59:21 +01:00

233 lines
8.4 KiB
Python

#!/usr/bin/env python3
#
# IRIS Source Code
# DFIR IRIS
# contact@dfir-iris.org
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU Lesser General Public
# License as published by the Free Software Foundation; either
# version 3 of the License, or (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# Lesser General Public License for more details.
#
# You should have received a copy of the GNU Lesser General Public License
# along with this program; if not, write to the Free Software Foundation,
# Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
import random
import string
from flask_login import current_user
from app import app
from app import bc
from app import db
from app.datamgmt.manage.manage_groups_db import add_case_access_to_group
from app.datamgmt.manage.manage_users_db import add_user_to_group
from app.datamgmt.manage.manage_users_db import add_user_to_organisation
from app.datamgmt.manage.manage_users_db import user_exists
from app.iris_engine.access_control.utils import ac_add_users_multi_effective_access
from app.models import Cases
from app.models import Client
from app.models import get_or_create
from app.models.authorization import CaseAccessLevel
from app.models.authorization import User
log = app.logger
def protect_demo_mode_user(user):
if app.config.get('DEMO_MODE_ENABLED') != 'True':
return False
users_p = [f'user_std_{i}' for i in range(1, int(app.config.get('DEMO_USERS_COUNT', 10)))]
users_p += [f'adm_{i}' for i in range(1, int(app.config.get('DEMO_ADM_COUNT', 4)))]
if current_user.id != 1 and user.id == 1:
return True
if user.user in users_p:
return True
return False
def protect_demo_mode_group(group):
if app.config.get('DEMO_MODE_ENABLED') != 'True':
return False
if current_user.id != 1 and group.group_id in [1, 2]:
return True
return False
def gen_demo_admins(count, seed_adm):
random.seed(seed_adm, version=2)
for i in range(1, count):
yield f'Adm {i}',\
f'adm_{i}', \
''.join(random.choices(string.printable[:-6], k=16)), \
''.join(random.choices(string.ascii_letters, k=64))
def gen_demo_users(count, seed_user):
random.seed(seed_user, version=2)
for i in range(1, count):
yield f'User Std {i}',\
f'user_std_{i}', \
''.join(random.choices(string.printable[:-6], k=16)), \
''.join(random.choices(string.ascii_letters, k=64))
def create_demo_users(def_org, gadm, ganalystes, users_count, seed_user, adm_count, seed_adm):
users = {
'admins': [],
'users': [],
'gadm': gadm,
'ganalystes': ganalystes
}
for name, username, pwd, api_key in gen_demo_users(users_count, seed_user):
# Create default users
user = user_exists(username, f'{username}@iris.local')
if not user:
password = bc.generate_password_hash(pwd.encode('utf-8')).decode('utf-8')
user = User(
user=username,
password=password,
email=f'{username}@iris.local',
name=name,
active=True)
user.api_key = api_key
db.session.add(user)
db.session.commit()
add_user_to_group(user_id=user.id, group_id=ganalystes.group_id)
add_user_to_organisation(user_id=user.id, org_id=def_org.org_id)
db.session.commit()
log.info(f'Created demo user: {user.user} - {pwd}')
users['users'].append(user)
for name, username, pwd, api_key in gen_demo_admins(adm_count, seed_adm):
user = user_exists(username, f'{username}@iris.local')
if not user:
password = bc.generate_password_hash(pwd.encode('utf-8')).decode('utf-8')
user = User(
user=username,
password=password,
email=f'{username}@iris.local',
name=name,
active=True)
user.api_key = api_key
db.session.add(user)
db.session.commit()
add_user_to_group(user_id=user.id, group_id=gadm.group_id)
add_user_to_organisation(user_id=user.id, org_id=def_org.org_id)
db.session.commit()
log.info(f'Created demo admin: {user.user} - {pwd}')
users['admins'].append(user)
return users
def create_demo_cases(users_data: dict = None, cases_count: int = 0, clients_count: int = 0):
clients = []
for client_index in range(0, clients_count):
client = get_or_create(db.session,
Client,
name=f'Client {client_index}',
description=f'Description for client {client_index}')
clients.append(client.client_id)
cases_list = []
for case_index in range(0, cases_count):
if demo_case_exists(f"Unrestricted Case {case_index}", f"SOC-{case_index}") is not None:
log.info(f'Restricted case {case_index} already exists')
continue
case = Cases(
name=f"Unrestricted Case {case_index}",
description="This is a demonstration of an unrestricted case",
soc_id=f"SOC-{case_index}",
gen_report=False,
user=random.choice(users_data['users']),
client_id=random.choice(clients)
)
case.validate_on_build()
case.save()
db.session.commit()
cases_list.append(case.case_id)
log.info('Added unrestricted case {}'.format(case.name))
log.info('Setting permissions for unrestricted cases')
add_case_access_to_group(group=users_data['ganalystes'],
cases_list=cases_list,
access_level=CaseAccessLevel.full_access.value)
add_case_access_to_group(group=users_data['gadm'],
cases_list=cases_list,
access_level=CaseAccessLevel.full_access.value)
ac_add_users_multi_effective_access(users_list=[u.id for u in users_data['users']],
cases_list=cases_list,
access_level=CaseAccessLevel.full_access.value)
ac_add_users_multi_effective_access(users_list=[u.id for u in users_data['admins']],
cases_list=cases_list,
access_level=CaseAccessLevel.full_access.value)
cases_list = []
for case_index in range(0, int(cases_count/2)):
if demo_case_exists(f"Restricted Case {case_index}", f"SOC-RSTRCT-{case_index}") is not None:
log.info(f'Restricted case {case_index} already exists')
continue
case = Cases(
name=f"Restricted Case {case_index}",
description="This is a demonstration of a restricted case that shouldn't be visible to analyst",
soc_id=f"SOC-RSTRCT-{case_index}",
user=random.choice(users_data['admins']),
client_id=random.choice(clients)
)
case.validate_on_build()
case.save()
db.session.commit()
cases_list.append(case.case_id)
log.info('Added restricted case {}'.format(case.name))
add_case_access_to_group(group=users_data['ganalystes'],
cases_list=cases_list,
access_level=CaseAccessLevel.deny_all.value)
ac_add_users_multi_effective_access(users_list=[u.id for u in users_data['users']],
cases_list=cases_list,
access_level=CaseAccessLevel.deny_all.value)
add_case_access_to_group(group=users_data['gadm'],
cases_list=cases_list,
access_level=CaseAccessLevel.full_access.value)
ac_add_users_multi_effective_access(users_list=[u.id for u in users_data['admins']],
cases_list=cases_list,
access_level=CaseAccessLevel.full_access.value)
log.info('Demo data created successfully')
def demo_case_exists(name, soc_id):
return db.session.query(Cases).filter(Cases.name.like(f'%{name}'),
Cases.soc_id == soc_id).first()