Compare commits
33 Commits
702d93b9da
...
v.0.0.4
Author | SHA1 | Date | |
---|---|---|---|
5c37b2fca2 | |||
cd9c6d535e | |||
643aaa946e | |||
cc8adbebad | |||
c7b4e8ef85 | |||
09d9b78e15 | |||
de17d1d45b | |||
f99801fa2b | |||
b076be8333 | |||
5cae8105d0 | |||
17155120ab | |||
7c65c0e357 | |||
8fbd10d9df | |||
cfa23470a8 | |||
73acbb6646 | |||
82ad280aa8 | |||
0174336f39 | |||
165ba4533c | |||
822fb79fd4 | |||
9ca8631abb | |||
6615637d07 | |||
c4bd226b7e | |||
6f6e38fe13 | |||
b2ce0f26a8 | |||
a622253b55 | |||
dbd11e02a0 | |||
2b3a1a7078 | |||
045467783f | |||
1800aafd72 | |||
11b312a1e8 | |||
1f255ec33a | |||
573cd651be | |||
c030fc69a2 |
@ -1,21 +1,41 @@
|
||||
name: Build Inex Executable
|
||||
run-name: Deploy to ${{ inputs.deploy_target }} by @${{ gitea.actor }}
|
||||
on: [push]
|
||||
name: Build
|
||||
on:
|
||||
push:
|
||||
tags:
|
||||
- '*'
|
||||
|
||||
jobs:
|
||||
linux:
|
||||
runs-on: ubuntu-22.04
|
||||
build-linux-binary:
|
||||
runs-on: ubuntu-latest
|
||||
permissions:
|
||||
contents: write # release changes require contents write
|
||||
steps:
|
||||
- uses: actions/checkout@v4
|
||||
- uses: actions/setup-python@v5
|
||||
with:
|
||||
python-version: '3.12.4'
|
||||
cache: 'pip' # caching pip dependencies
|
||||
- run: lsb_release -a
|
||||
- run: apt-get update
|
||||
- run: apt-get install unixodbc -y
|
||||
- run: pip install -r requirements.txt
|
||||
- run: pyinstaller --noconfirm --onefile --console ${{ gitea.workspace }}/inex.py
|
||||
- uses: actions/upload-artifact@v3
|
||||
- uses: softprops/action-gh-release@v2
|
||||
with:
|
||||
name: Inex
|
||||
path: ${{ gitea.workspace }}/dist/inex
|
||||
files: ${{ gitea.workspace }}/dist/inex
|
||||
|
||||
build-windows-binary:
|
||||
runs-on: windows
|
||||
permissions:
|
||||
contents: write # release changes require contents write
|
||||
steps:
|
||||
- uses: actions/checkout@v4
|
||||
- uses: actions/setup-python@v4
|
||||
with:
|
||||
python-version: '3.12.4'
|
||||
cache: 'pip' # caching pip dependencies
|
||||
- run: python -m pip install -r requirements.txt
|
||||
- run: pyinstaller --noconfirm --onefile --console ${{ gitea.workspace }}/inex.py
|
||||
- uses: softprops/action-gh-release@v2
|
||||
with:
|
||||
files: ${{ gitea.workspace }}/dist/inex.exe
|
5
.gitignore
vendored
5
.gitignore
vendored
@ -1,4 +1,5 @@
|
||||
*config.toml
|
||||
*.toml
|
||||
*.json
|
||||
__pycache__/
|
||||
*.log
|
||||
*.log
|
||||
*.token
|
4
LICENSE
4
LICENSE
@ -209,7 +209,7 @@ If you develop a new program, and you want it to be of the greatest possible use
|
||||
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively state the exclusion of warranty; and each file should have at least the “copyright” line and a pointer to where the full notice is found.
|
||||
|
||||
Inex
|
||||
Copyright (C) 2024 jblu
|
||||
Copyright (C) 2024 Jonathan Branan
|
||||
|
||||
This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
|
||||
|
||||
@ -221,7 +221,7 @@ Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If the program does terminal interaction, make it output a short notice like this when it starts in an interactive mode:
|
||||
|
||||
Inex Copyright (C) 2024 jblu
|
||||
Inex Copyright (C) 2024 Jonathan Branan
|
||||
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||
This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details.
|
||||
|
||||
|
@ -1,3 +1,27 @@
|
||||
[fortraPlatform]
|
||||
selectedPlatform = "dev"
|
||||
|
||||
[fortraPlatform.dev]
|
||||
idp = "https://foundation.foundation-dev.cloudops.fortradev.com/idp/realms/products/protocol/openid-connect/token"
|
||||
efc_url = "https://efc.efc-dev.cloudops.fortradev.com"
|
||||
tenant_id = ""
|
||||
client_id = "eft-event-generator-confidential"
|
||||
secret = ""
|
||||
|
||||
[fortraPlatform.stage]
|
||||
idp = "https://foundation.foundation-stage.cloudops.fortradev.com/idp/realms/products/protocol/openid-connect/token"
|
||||
efc_url = "https://efc.efc-stage.cloudops.fortradev.com"
|
||||
tenant_id = ""
|
||||
client_id = "eft-event-generator-confidential"
|
||||
secret = ""
|
||||
|
||||
[fortraPlatform.prod]
|
||||
idp ="https://foundation.foundation-prod.cloudops.fortradev.com/idp/realms/products/protocol/openid-connect/token"
|
||||
efc_url = "https://efc.efc-prod.cloudops.fortradev.com"
|
||||
tenant_id = ""
|
||||
client_id = "eft-event-generator-confidential"
|
||||
secret = ""
|
||||
|
||||
[database]
|
||||
driver = "ODBC Driver 18 for SQL Server"
|
||||
server = "192.168.x.x"
|
||||
@ -6,32 +30,33 @@ user = "a"
|
||||
password = "a"
|
||||
query = """DECLARE @stopTime DATETIME2
|
||||
SET @stopTime = DATEADD(DAY, -30, GETDATE())
|
||||
SELECT [ProtocolCommandID]
|
||||
,p.[Time_stamp]
|
||||
,[RemoteIP]
|
||||
,[RemotePort]
|
||||
,[LocalIP]
|
||||
,[LocalPort]
|
||||
,[Protocol]
|
||||
,[SiteName]
|
||||
,[Command]
|
||||
,[CommandParameters]
|
||||
,[FileName]
|
||||
,[VirtualFolderName]
|
||||
,[PhysicalFolderName]
|
||||
,[IsInternal]
|
||||
,[FileSize]
|
||||
,[TransferTime]
|
||||
,[BytesTransferred]
|
||||
,[ResultID]
|
||||
,p.[TransactionID]
|
||||
,[Description]
|
||||
,[Actor]
|
||||
SELECT p.[ProtocolCommandID]
|
||||
,t.[Time_stamp]
|
||||
,p.[RemoteIP]
|
||||
,p.[RemotePort]
|
||||
,p.[LocalIP]
|
||||
,p.[LocalPort]
|
||||
,p.[Protocol]
|
||||
,p.[SiteName]
|
||||
,p.[Command]
|
||||
,p.[CommandParameters]
|
||||
,p.[FileName]
|
||||
,p.[VirtualFolderName]
|
||||
,p.[PhysicalFolderName]
|
||||
,p.[IsInternal]
|
||||
,p.[FileSize]
|
||||
,p.[TransferTime]
|
||||
,p.[BytesTransferred]
|
||||
,p.[ResultID]
|
||||
,t.[TransactionID]
|
||||
,p.[Description]
|
||||
,p.[Actor]
|
||||
,t.ParentTransactionID
|
||||
,t.TransactionObject
|
||||
,t.NodeName
|
||||
,t.TransactionGUID
|
||||
FROM [EFTDB].[dbo].[tbl_ProtocolCommands] p Full JOIN tbl_Transactions t ON (p.TransactionID = t.TransactionID)
|
||||
,a.Protocol user_type
|
||||
FROM [EFTDB].[dbo].[tbl_Transactions] t Full JOIN tbl_ProtocolCommands p ON (t.TransactionID = p.TransactionID) Full join tbl_Authentications a ON (t.TransactionID = a.TransactionID)
|
||||
WHERE p.Time_stamp > @stopTime"""
|
||||
|
||||
[immutables]
|
||||
@ -41,7 +66,10 @@ product_name = "EFT"
|
||||
product_version ="8.1.0.9"
|
||||
|
||||
[output]
|
||||
pushToplatform = true
|
||||
dumpTojson = true
|
||||
filename ="./data.json"
|
||||
token = "./.token"
|
||||
|
||||
[logging]
|
||||
use_log = true
|
||||
|
@ -1,35 +0,0 @@
|
||||
[database]
|
||||
driver = "ODBC Driver 18 for SQL Server"
|
||||
server = "192.168.x.x"
|
||||
database = "EFTDB"
|
||||
user = "a"
|
||||
password = "a"
|
||||
query = """SELECT TOP (1) [ProtocolCommandID]
|
||||
,[Time_stamp]
|
||||
,[RemoteIP]
|
||||
,[RemotePort]
|
||||
,[LocalIP]
|
||||
,[LocalPort]
|
||||
,[Protocol]
|
||||
,[SiteName]
|
||||
,[Command]
|
||||
,[CommandParameters]
|
||||
,[FileName]
|
||||
,[VirtualFolderName]
|
||||
,[PhysicalFolderName]
|
||||
,[IsInternal]
|
||||
,[FileSize]
|
||||
,[TransferTime]
|
||||
,[BytesTransferred]
|
||||
,[ResultID]
|
||||
,[TransactionID]
|
||||
,[Description]
|
||||
,[Actor]
|
||||
FROM [EFTDB].[dbo].[tbl_ProtocolCommands]"""
|
||||
[output]
|
||||
filename ="./data.json"
|
||||
|
||||
[logging]
|
||||
use_log = true
|
||||
logLevel = "debug"
|
||||
logPath = "./inex.log"
|
Binary file not shown.
64
inex.py
64
inex.py
@ -1,29 +1,34 @@
|
||||
import pyodbc
|
||||
import os
|
||||
import logging
|
||||
import datetime
|
||||
from tomllib import load
|
||||
import tomllib
|
||||
from inexLogging import inexLog
|
||||
import inexConnect
|
||||
from inexDataModel import dataTemplate
|
||||
from inexDataProcessing import processData
|
||||
import json
|
||||
import decimal
|
||||
|
||||
import requests
|
||||
import inexEncoder
|
||||
import inexSqlquery
|
||||
class Inex:
|
||||
def __init__(self):
|
||||
"""Initilize config, calls functions from inex-connect.py and inex-logging.py"""
|
||||
if os.path.exists('./config.toml'):
|
||||
config_file_path = './config.toml'
|
||||
with open(config_file_path, 'rb') as c:
|
||||
self.config = load(c)
|
||||
|
||||
# assign libraries
|
||||
self.db = pyodbc
|
||||
self.tm = datetime
|
||||
self.il = logging
|
||||
self.ic = inexConnect
|
||||
self.r = requests
|
||||
self.tl = tomllib
|
||||
self.os = os
|
||||
self.j = json
|
||||
self.e = inexEncoder.Encoder
|
||||
self.sq = inexSqlquery
|
||||
|
||||
if self.os.path.exists('./config.toml'):
|
||||
config_file_path = './config.toml'
|
||||
with open(config_file_path, 'rb') as c:
|
||||
self.config = self.tl.load(c)
|
||||
|
||||
# set config
|
||||
self.dbDriver = self.config["database"]["driver"]
|
||||
self.dbServer = self.config["database"]["server"]
|
||||
@ -39,34 +44,41 @@ class Inex:
|
||||
self.productGUID = self.config["immutables"]["product_guid"]
|
||||
self.productName = self.config["immutables"]["product_name"]
|
||||
self.productVersion = self.config["immutables"]["product_version"]
|
||||
|
||||
self.tokenFilepath = self.config["output"]["token"]
|
||||
self.selectedPlatform = self.config["fortraPlatform"]["selectedPlatform"]
|
||||
self.writeJsonfile = self.config["output"]["dumpTojson"]
|
||||
self.pushToplatform = self.config["output"]["pushToplatform"]
|
||||
|
||||
if "dev" in self.selectedPlatform.lower():
|
||||
self.platformConfig = self.config["fortraPlatform"]["dev"]
|
||||
if "stag" in self.selectedPlatform.lower():
|
||||
self.platformConfig = self.config["fortraPlatform"]["stage"]
|
||||
if "prod" in self.selectedPlatform.lower():
|
||||
self.platformConfig = self.config["fortraPlatform"]["prod"]
|
||||
# print(self.platformConfig)
|
||||
|
||||
#Setup logging
|
||||
inexLog(self)
|
||||
|
||||
# create the connection to the database
|
||||
self.cursor = self.ic.connectDatabase(self, self.db, self.dbDriver, self.dbServer, self.dbDatabase, self.dbUser, self.dbPassword)
|
||||
self.cursor = self.ic.inexSql.connectDatabase(self, self.db, self.dbDriver, self.dbServer, self.dbDatabase, self.dbUser, self.dbPassword)
|
||||
|
||||
self.data = self.ic.databaseQuery(self, self.cursor, self.dbQuery)
|
||||
# self.data = self.ic.inexSql.databaseQuery(self, self.cursor, self.dbQuery)
|
||||
|
||||
self.data = self.ic.inexSql.databaseQuery(self, self.cursor, self.sq.sqlQuerymodel.queryData())
|
||||
|
||||
self.modifiedData = processData(self.data, dataTemplate, prd_instance_id=self.prdInstanceID,\
|
||||
product_guid=self.productGUID,product_name=self.productName,product_version=self.productVersion)
|
||||
|
||||
|
||||
if self.pushToplatform:
|
||||
inexConnect.fortraEFC.pushPayload(self)
|
||||
|
||||
# TODO: move this to its own function
|
||||
if self.useLog:
|
||||
self.il.warning(f"Writing to '{self.outputFile}'.")
|
||||
|
||||
with open(self.outputFile, "w") as f:
|
||||
json.dump(self.modifiedData, f, indent = 2, cls=Encoder)
|
||||
|
||||
# TODO: Move this class to it's own file
|
||||
class Encoder(json.JSONEncoder):
|
||||
def default(self, o):
|
||||
if isinstance(o, decimal.Decimal):
|
||||
return int(o)
|
||||
if isinstance(o, datetime.datetime):
|
||||
return str(o)
|
||||
return super().default(o)
|
||||
if self.writeJsonfile:
|
||||
with open(self.outputFile, "w") as f:
|
||||
self.j.dump(self.modifiedData, f, indent = 2, cls=self.e)
|
||||
|
||||
# Run
|
||||
if __name__== "__main__":
|
||||
|
111
inexConnect.py
111
inexConnect.py
@ -1,43 +1,74 @@
|
||||
def connectDatabase(self, lib, driver, server, database, user, password):
|
||||
"""Connects to the database. Requires a windows driver to do so.
|
||||
Typically there is one installed by default"""
|
||||
class inexSql:
|
||||
def connectDatabase(self, lib, driver, server, database, user, password):
|
||||
"""Connects to the database. Requires a windows driver to do so.
|
||||
Typically there is one installed by default"""
|
||||
|
||||
connectionString = f'DRIVER={{{driver}}};SERVER={server};DATABASE={database};UID={user};PWD={password};TrustServerCertificate=yes'
|
||||
if self.useLog:
|
||||
self.il.debug(f"Connection String: connectionString")
|
||||
self.il.info(f"Connecting to {database}@{server} with driver[{driver}].")
|
||||
try:
|
||||
connection = lib.connect(connectionString)
|
||||
except lib.Error as ex:
|
||||
sqlstate = ex.args[1]
|
||||
connectionString = f'DRIVER={{{driver}}};SERVER={server};DATABASE={database};UID={user};PWD={password};TrustServerCertificate=yes'
|
||||
if self.useLog:
|
||||
self.il.error(sqlstate)
|
||||
if self.useLog:
|
||||
self.il.debug(f"Connected.")
|
||||
cursor = connection.cursor()
|
||||
|
||||
return cursor
|
||||
|
||||
def databaseQuery(self, cursor, query, args=()):
|
||||
if self.useLog:
|
||||
self.il.debug(f"Query:")
|
||||
self.il.debug(query)
|
||||
self.il.info(f"Sending query:{query[0:20]}...")
|
||||
|
||||
try:
|
||||
cur = cursor.execute(query, args)
|
||||
except cur.Error as ex:
|
||||
sqlstate = ex.args[1]
|
||||
self.il.debug(f"Connection String: connectionString")
|
||||
self.il.info(f"Connecting to {database}@{server} with driver[{driver}].")
|
||||
try:
|
||||
connection = lib.connect(connectionString)
|
||||
except lib.Error as ex:
|
||||
sqlstate = ex.args[1]
|
||||
if self.useLog:
|
||||
self.il.error(sqlstate)
|
||||
if self.useLog:
|
||||
self.il.error(sqlstate)
|
||||
|
||||
if self.useLog:
|
||||
self.il.debug(f"Processing database response...")
|
||||
r = [dict((cur.description[i][0], value) \
|
||||
for i, value in enumerate(row)) for row in cur.fetchall()]
|
||||
|
||||
cur.connection.close()
|
||||
if self.useLog:
|
||||
self.il.debug(f"Database connection closed")
|
||||
# return (r[0] if r else None) if one else r
|
||||
return r
|
||||
self.il.debug(f"Connected.")
|
||||
cursor = connection.cursor()
|
||||
|
||||
return cursor
|
||||
|
||||
def databaseQuery(self, cursor, query, args=()):
|
||||
if self.useLog:
|
||||
self.il.debug(f"Query:")
|
||||
self.il.debug(query)
|
||||
self.il.info(f"Sending query:{query[0:20]}...")
|
||||
|
||||
try:
|
||||
cur = cursor.execute(query, args)
|
||||
except cur.Error as ex:
|
||||
sqlstate = ex.args[1]
|
||||
if self.useLog:
|
||||
self.il.error(sqlstate)
|
||||
|
||||
if self.useLog:
|
||||
self.il.debug(f"Processing database response...")
|
||||
r = [dict((cur.description[i][0], value) \
|
||||
for i, value in enumerate(row)) for row in cur.fetchall()]
|
||||
|
||||
cur.connection.close()
|
||||
if self.useLog:
|
||||
self.il.debug(f"Database connection closed")
|
||||
return r
|
||||
|
||||
class fortraEFC:
|
||||
def getToken(self):
|
||||
self.tokenData = self.r.post(self.platformConfig["idp"], data={"grant_type":"client_credentials",\
|
||||
"client_id": self.platformConfig["client_id"],\
|
||||
"client_secret": self.platformConfig["secret"],})
|
||||
def writeToken(self):
|
||||
fortraEFC.getToken(self)
|
||||
with open(self.tokenFilepath, "w") as f:
|
||||
self.j.dump(self.tokenData.json(), f, indent = 2)
|
||||
|
||||
def readToken(self):
|
||||
if self.os.path.exists(self.tokenFilepath):
|
||||
with open(self.tokenFilepath, 'rb') as t:
|
||||
self.tokenData = self.j.load(t)
|
||||
# print(self.tokenData["access_token"])
|
||||
else:
|
||||
fortraEFC.writeToken(self)
|
||||
|
||||
def pushPayload(self):
|
||||
fortraEFC.readToken(self)
|
||||
try:
|
||||
url = f'{self.platformConfig["efc_url"]}/api/v1/unity/data/{self.platformConfig["tenant_id"]}/machine_event'
|
||||
pushPayloadResponse = self.r.post(url, headers={'Authorization': f'bearer {self.tokenData["access_token"]}'},\
|
||||
json=self.j.dumps(self.modifiedData,indent = 2, cls=self.e))
|
||||
return pushPayloadResponse.status_code
|
||||
except self.r.exceptions.HTTPError as errh:
|
||||
print ("Http Error:",errh)
|
||||
if "401" in errh:
|
||||
fortraEFC.writeToken(self)
|
||||
fortraEFC.pushPayload(self)
|
165
inexDataModel.py
165
inexDataModel.py
@ -45,4 +45,167 @@ def dataTemplate(**kwargs):
|
||||
"utype": kwargs.get('utype')
|
||||
}
|
||||
|
||||
return template
|
||||
return template
|
||||
|
||||
FileUploaded = {
|
||||
"bytes" : 2490,
|
||||
"dst_endpoint": {
|
||||
"port": 22,
|
||||
"ip": "10.91.160.77",
|
||||
"type": "SFTP"
|
||||
},
|
||||
"duration": 200,
|
||||
"file": {
|
||||
"created_time": 1722485724000,
|
||||
"size": 2490,
|
||||
"name": "Case9.vbs",
|
||||
"path": "\\\\10.255.255.9\\shared\\HASite\\InetPub\\EFTRoot\\MySite\\Usr\\Ivan //<PhysicalFolderName>"
|
||||
},
|
||||
"guid": "48D9C7A3-2DC6-11EF-AA59-00155D641204",
|
||||
"node_name":"PERF01-S2019-77",
|
||||
"prd_ext_tenant_id": "e71851c2-593f-4f49-9c07-91727b1be94b",
|
||||
"product_name": "GlobalScape EFT",
|
||||
"prd_ext_tenant_name": "GlobalScape EFT",
|
||||
"classifications": [{
|
||||
"ref_id": "globalscape:48D9C7A3-2DC6-11EF-AA59-00155D641204",
|
||||
"time":1722485724000,
|
||||
}],
|
||||
"session": {
|
||||
"created_time":1722485724000,
|
||||
"uid": "3615136"
|
||||
},
|
||||
"src_endpoint": {
|
||||
"port": 58868,
|
||||
"ip": "10.91.160.45",
|
||||
"type":"SFTP"
|
||||
},
|
||||
"tenant": "e71851c2-593f-4f49-9c07-91727b1be94b",
|
||||
"tenant_name":"GlobalScape",
|
||||
"time":1722485724000,
|
||||
"status_code":226,
|
||||
"status_detail":"Upload Successful",
|
||||
"user": {
|
||||
"home_directory": "/Usr/Ivan/",
|
||||
"uuid":"48D9C7A3-2DC6-11EF-AA59-00155D641204",
|
||||
"uid": "3978403",
|
||||
"type": "User",
|
||||
"name": "Ivan"
|
||||
},
|
||||
"utype": "file_uploaded"
|
||||
}
|
||||
|
||||
FileDownloaded = {
|
||||
"bytes" : 4891,
|
||||
"dst_endpoint": {
|
||||
"port": 443,
|
||||
"ip": "10.91.160.77",
|
||||
"type": "HTTPS"
|
||||
},
|
||||
"duration": 200,
|
||||
"file": {
|
||||
"created_time": 1722518124000,
|
||||
"size": 4891,
|
||||
"name": "FileDownload1.exe",
|
||||
"path": "\\\\10.255.255.9\\shared\\HASite\\InetPub\\EFTRoot\\MySite\\Usr\\Ivan //<PhysicalFolderName>"
|
||||
},
|
||||
"guid": "48D9C7A3-2DC6-11EF-AA59-00155D641205",
|
||||
"node_name":"PERF01-S2019-77",
|
||||
"prd_ext_tenant_id": "e71851c2-593f-4f49-9c07-91727b1be94b",
|
||||
"product_name": "GlobalScape EFT",
|
||||
"prd_ext_tenant_name": "GlobalScape EFT",
|
||||
"classifications": [{
|
||||
"ref_id": "globalscape:48D9C7A3-2DC6-11EF-AA59-00155D641205",
|
||||
"time":1722518124000,
|
||||
}],
|
||||
"session": {
|
||||
"created_time":1722518124000,
|
||||
"uid": "3615137"
|
||||
},
|
||||
"src_endpoint": {
|
||||
"port": 443,
|
||||
"ip": "10.91.160.45",
|
||||
"type":"HTTPS"
|
||||
},
|
||||
"tenant": "e71851c2-593f-4f49-9c07-91727b1be94b",
|
||||
"tenant_name":"GlobalScape",
|
||||
"time":1722518124000,
|
||||
"status_code":226,
|
||||
"status_detail":"Download Successful",
|
||||
"user": {
|
||||
"home_directory": "/Usr/Ivan/",
|
||||
"uuid":"48D9C7A3-2DC6-11EF-AA59-00155D641205",
|
||||
"uid": "3978404",
|
||||
"type": "User",
|
||||
"name": "Ivan"
|
||||
},
|
||||
"utype": "file_downloaded"}
|
||||
|
||||
FileDeleted = {
|
||||
"file": {
|
||||
"size": 304673,
|
||||
"path": "\\\\10.255.255.9\\shared\\HASite\\InetPub\\EFTRoot\\MySite\\Usr\\Ivan",
|
||||
"name": "DeleteME.txt"
|
||||
},
|
||||
"guid": "48D9C7A3-2DC6-11EF-AA59-00155D641207",
|
||||
"classifications": [{
|
||||
"ref_id": "globalscape:48D9C7A3-2DC6-11EF-AA59-00155D641207",
|
||||
"time":1722515664000,
|
||||
}],
|
||||
"prd_ext_tenant_name": "Globalscape EFT",
|
||||
"prd_ext_tenant_id": "e71851c2-593f-4f49-9c07-91727b1be94b",
|
||||
"product_name": "Globalscape EFT",
|
||||
"session": {
|
||||
"created_time":1722515664000,
|
||||
"uid": "3615138"
|
||||
},
|
||||
"src_endpoint": {
|
||||
"port": 443,
|
||||
"ip": "10.91.160.45",
|
||||
"type":"HTTPS"
|
||||
},
|
||||
"dst_endpoint": {
|
||||
"port": 443,
|
||||
"ip": "10.91.160.77",
|
||||
"type": "HTTPS"
|
||||
},
|
||||
"time": 1722515664000,
|
||||
"user": {
|
||||
"home_directory": "/Usr/Ivan/",
|
||||
"uuid":"48D9C7A3-2DC6-11EF-AA59-00155D641207",
|
||||
"uid": "3978406",
|
||||
"type": "User",
|
||||
"name": "Ivan"
|
||||
},
|
||||
"utype": "file_deleted"
|
||||
}
|
||||
|
||||
Logon ={
|
||||
"classifications": [{
|
||||
"ref_id": "globalscape:48D9C7A3-2DC6-11EF-AA59-00155D641206",
|
||||
"time": 1722510924000,
|
||||
|
||||
}],
|
||||
"dst_endpoint": {
|
||||
"port": 443,
|
||||
"ip": "10.91.160.77",
|
||||
"type": "HTTPS"
|
||||
},
|
||||
"guid": "48D9C7A3-2DC6-11EF-AA59-00155D641206",
|
||||
"prd_ext_tenant_id": "e71851c2-593f-4f49-9c07-91727b1be94b",
|
||||
"product_name": "GlobalScape EFT",
|
||||
"prd_ext_tenant_name": "GlobalScape EFT",
|
||||
"src_endpoint": {
|
||||
"port": 443,
|
||||
"ip": "10.91.160.45",
|
||||
"type":"HTTPS"
|
||||
},
|
||||
"time": 1722510924000,
|
||||
"user": {
|
||||
"home_directory": "/Usr/Ivan/",
|
||||
"uuid":"48D9C7A3-2DC6-11EF-AA59-00155D641206",
|
||||
"uid": "3978405",
|
||||
"type": "User",
|
||||
"name": "Ivan"
|
||||
},
|
||||
"utype": "user_logged_on"
|
||||
}
|
@ -28,7 +28,7 @@ def processData(data, template, **kwargs):
|
||||
user_type=identifyUserType(row.get('user_type')),\
|
||||
user_domain=row.get('SiteName'),\
|
||||
user_name=row.get('Actor'),\
|
||||
utype=row.get('TransactionObject')))
|
||||
utype=identifyUtype(row.get('TransactionObject'))))
|
||||
return processedData
|
||||
|
||||
def identifyUserType(obj):
|
||||
@ -37,5 +37,21 @@ def identifyUserType(obj):
|
||||
return "Administrator"
|
||||
else:
|
||||
return "User"
|
||||
else:
|
||||
return None
|
||||
def identifyUtype(obj):
|
||||
user_logged_on = []
|
||||
file_deleted = []
|
||||
file_uploaded = []
|
||||
file_downloaded = []
|
||||
|
||||
if obj in user_logged_on:
|
||||
return "user_logged_on"
|
||||
if obj in file_deleted:
|
||||
return "file_deleted"
|
||||
if obj in file_uploaded:
|
||||
return "file_uploaded"
|
||||
if obj in file_downloaded:
|
||||
return "file_downloaded"
|
||||
else:
|
||||
return None
|
11
inexEncoder.py
Normal file
11
inexEncoder.py
Normal file
@ -0,0 +1,11 @@
|
||||
import json
|
||||
import decimal
|
||||
import datetime
|
||||
|
||||
class Encoder(json.JSONEncoder):
|
||||
def default(self, o):
|
||||
if isinstance(o, decimal.Decimal):
|
||||
return int(o)
|
||||
if isinstance(o, datetime.datetime):
|
||||
return int(o.timestamp() * 1000)
|
||||
return super().default(o)
|
11
inexSqlquery.py
Normal file
11
inexSqlquery.py
Normal file
@ -0,0 +1,11 @@
|
||||
class sqlQuerymodel:
|
||||
def queryData():
|
||||
"""Embedded query data"""
|
||||
q ="""DECLARE @stopTime DATETIME2
|
||||
SET @stopTime=DATEADD(DAY, -30, GETDATE())
|
||||
SELECT p.ProtocolCommandID, t.Time_stamp, p.RemoteIP, p.RemotePort, p.LocalIP, p.LocalPort, p.Protocol, p.SiteName, p.Command, p.CommandParameters, p.FileName, p.VirtualFolderName, p.PhysicalFolderName, p.IsInternal, p.FileSize, p.TransferTime, p.BytesTransferred, p.ResultID, t.TransactionID, p.Description, p.Actor, t.ParentTransactionID, t.TransactionObject, t.NodeName, t.TransactionGUID, a.Protocol user_type
|
||||
FROM tbl_Transactions t
|
||||
Full JOIN tbl_ProtocolCommands p ON(t.TransactionID=p.TransactionID)
|
||||
Full join tbl_Authentications a ON(t.TransactionID=a.TransactionID)
|
||||
WHERE p.Time_stamp>@stopTime"""
|
||||
return q
|
9
test.py
9
test.py
@ -1,5 +1,12 @@
|
||||
import datetime
|
||||
|
||||
def connectDatabase(driver, server, database, user, password):
|
||||
connectionString = f'DRIVER={{{driver}}};SERVER={server};DATABASE={database};UID={user};PWD={password};TrustServerCertificate=yes'
|
||||
print(connectionString)
|
||||
|
||||
a = connectDatabase("ODBC Driver 18 for SQL Server","b","c","d","e")
|
||||
# a = connectDatabase("ODBC Driver 18 for SQL Server","b","c","d","e")
|
||||
|
||||
def converttimestamp(t):
|
||||
print(int(t.timestamp()* 1000))
|
||||
|
||||
a = converttimestamp(datetime.datetime(2024, 7, 23, 14, 26, 38, 214000))
|
Reference in New Issue
Block a user