prelude-sdk-beta 1435__tar.gz → 1449__tar.gz

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of prelude-sdk-beta might be problematic. Click here for more details.

Files changed (35) hide show
  1. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/PKG-INFO +1 -1
  2. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/partner_controller.py +1 -13
  3. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/scm_controller.py +71 -0
  4. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/models/codes.py +104 -4
  5. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta.egg-info/PKG-INFO +1 -1
  6. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/setup.cfg +1 -1
  7. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/test_partner.py +1 -30
  8. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/test_scm.py +3 -2
  9. prelude_sdk_beta-1449/tests/test_scm_build.py +104 -0
  10. prelude_sdk_beta-1435/tests/test_scm_build.py +0 -55
  11. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/LICENSE +0 -0
  12. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/README.md +0 -0
  13. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/__init__.py +0 -0
  14. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/__init__.py +0 -0
  15. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/build_controller.py +0 -0
  16. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/detect_controller.py +0 -0
  17. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/export_controller.py +0 -0
  18. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/generate_controller.py +0 -0
  19. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/http_controller.py +0 -0
  20. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/iam_controller.py +0 -0
  21. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/jobs_controller.py +0 -0
  22. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/probe_controller.py +0 -0
  23. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/models/__init__.py +0 -0
  24. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/models/account.py +0 -0
  25. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta.egg-info/SOURCES.txt +0 -0
  26. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta.egg-info/dependency_links.txt +0 -0
  27. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta.egg-info/requires.txt +0 -0
  28. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta.egg-info/top_level.txt +0 -0
  29. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/pyproject.toml +0 -0
  30. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/test_build.py +0 -0
  31. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/test_detect.py +0 -0
  32. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/test_generate.py +0 -0
  33. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/test_iam.py +0 -0
  34. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/test_probe.py +0 -0
  35. {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/testutils.py +0 -0
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: prelude-sdk-beta
3
- Version: 1435
3
+ Version: 1449
4
4
  Summary: For interacting with the Prelude API
5
5
  Home-page: https://github.com/preludeorg
6
6
  Author: Prelude Research
@@ -45,7 +45,7 @@ class PartnerController(HttpController):
45
45
  res = self.delete(
46
46
  f"{self.account.hq}/partner/{partner.name}/{instance_id}",
47
47
  headers=self.account.headers,
48
- timeout=10,
48
+ timeout=30,
49
49
  )
50
50
  return res.json()
51
51
 
@@ -104,18 +104,6 @@ class PartnerController(HttpController):
104
104
  )
105
105
  return res.json()
106
106
 
107
- @verify_credentials
108
- def ioa_stats(self, test_id: str | None = None):
109
- """Get IOA stats"""
110
- params = dict(test_id=test_id) if test_id else dict()
111
- res = self.get(
112
- f"{self.account.hq}/partner/ioa_stats",
113
- headers=self.account.headers,
114
- json=params,
115
- timeout=30,
116
- )
117
- return res.json()
118
-
119
107
  @verify_credentials
120
108
  def observed_detected(self, test_id: str | None = None, hours: int | None = None):
121
109
  """Get observed_detected stats"""
@@ -593,3 +593,74 @@ class ScmController(HttpController):
593
593
  ],
594
594
  )
595
595
  return history
596
+
597
+ @verify_credentials
598
+ def get_report(self, report_id: str):
599
+ """Get SCM report by ID"""
600
+ res = self.get(
601
+ f"{self.account.hq}/scm/reports/{report_id}",
602
+ headers=self.account.headers,
603
+ timeout=10,
604
+ )
605
+ return res.json()
606
+
607
+ @verify_credentials
608
+ def list_reports(self):
609
+ """List SCM reports"""
610
+ res = self.get(
611
+ f"{self.account.hq}/scm/reports",
612
+ headers=self.account.headers,
613
+ timeout=10,
614
+ )
615
+ return res.json()
616
+
617
+ @verify_credentials
618
+ def delete_report(self, report_id: str):
619
+ """Delete SCM report by ID"""
620
+ res = self.delete(
621
+ f"{self.account.hq}/scm/reports/{report_id}",
622
+ headers=self.account.headers,
623
+ timeout=10,
624
+ )
625
+ return res.json()
626
+
627
+ @verify_credentials
628
+ def put_report(self, report_data: dict, report_id: str = None):
629
+ """Put SCM report by ID"""
630
+ res = self.put(
631
+ f"{self.account.hq}/scm/reports",
632
+ headers=self.account.headers,
633
+ json=dict(report=report_data, id=report_id),
634
+ timeout=10,
635
+ )
636
+ return res.json()
637
+
638
+ @verify_credentials
639
+ def get_chart_data(
640
+ self,
641
+ scm_category: SCMCategory,
642
+ sort_by: str,
643
+ group_by: str,
644
+ group_limit: int,
645
+ display_overrides: dict = None,
646
+ odata_filter: str = None,
647
+ scopes: dict = None,
648
+ ):
649
+ """Get SCM chart data"""
650
+ body = {
651
+ "category": scm_category.name,
652
+ "display_overrides": display_overrides,
653
+ "group_by": group_by,
654
+ "group_limit": group_limit,
655
+ "scopes": scopes,
656
+ "sort_by": sort_by,
657
+ }
658
+ if odata_filter:
659
+ body["$filter"] = odata_filter
660
+ res = self.post(
661
+ f"{self.account.hq}/scm/reports/data",
662
+ headers=self.account.headers,
663
+ json=body,
664
+ timeout=30,
665
+ )
666
+ return res.json()
@@ -206,10 +206,6 @@ class Control(Enum, metaclass=MissingItem):
206
206
  return k
207
207
  return SCMCategory.NONE
208
208
 
209
- @property
210
- def policy_types(self):
211
- return [k for k, v in PolicyType.control_mapping().items() if self in v]
212
-
213
209
  @property
214
210
  def parent(self):
215
211
  match self:
@@ -240,6 +236,68 @@ class Control(Enum, metaclass=MissingItem):
240
236
  case _:
241
237
  return []
242
238
 
239
+ @property
240
+ def display_name(self):
241
+ match self:
242
+ case Control.CROWDSTRIKE:
243
+ return "CrowdStrike"
244
+ case Control.DEFENDER:
245
+ return "Microsoft Defender"
246
+ case Control.SPLUNK:
247
+ return "Splunk"
248
+ case Control.SENTINELONE:
249
+ return "SentinelOne"
250
+ case Control.VECTR:
251
+ return "VECTR"
252
+ case Control.S3:
253
+ return "Amazon S3"
254
+ case Control.INTUNE:
255
+ return "Microsoft Intune"
256
+ case Control.SERVICENOW:
257
+ return "ServiceNow"
258
+ case Control.OKTA:
259
+ return "Okta"
260
+ case Control.M365:
261
+ return "Microsoft 365"
262
+ case Control.ENTRA:
263
+ return "Microsoft Entra ID"
264
+ case Control.JAMF:
265
+ return "Jamf"
266
+ case Control.GMAIL:
267
+ return "Gmail"
268
+ case Control.GOOGLE_IDENTITY:
269
+ return "Google Cloud Identity Platform"
270
+ case Control.DEFENDER_DISCOVERY:
271
+ return "Microsoft Defender Discovery"
272
+ case Control.TENABLE:
273
+ return "Tenable"
274
+ case Control.EC2:
275
+ return "Amazon EC2"
276
+ case Control.AWS_SSM:
277
+ return "Amazon SSM"
278
+ case Control.AZURE_VM:
279
+ return "Azure VM"
280
+ case Control.GITHUB:
281
+ return "GitHub"
282
+ case Control.TENABLE_DISCOVERY:
283
+ return "Tenable Discovery"
284
+ case Control.QUALYS:
285
+ return "Qualys"
286
+ case Control.QUALYS_DISCOVERY:
287
+ return "Qualys Discovery"
288
+ case Control.RAPID7:
289
+ return "Rapid7"
290
+ case Control.RAPID7_DISCOVERY:
291
+ return "Rapid7 Discovery"
292
+ case Control.INTEL_INTUNE:
293
+ return "Intel"
294
+ case Control.CISCO_MERAKI:
295
+ return "Cisco Meraki"
296
+ case Control.CISCO_MERAKI_IDENTITY:
297
+ return "Cisco Meraki Identity"
298
+ case _:
299
+ return "Unknown Control"
300
+
243
301
 
244
302
  class ControlCategory(Enum, metaclass=MissingItem):
245
303
  INVALID = -1
@@ -312,6 +370,34 @@ class ControlCategory(Enum, metaclass=MissingItem):
312
370
  ],
313
371
  }
314
372
 
373
+ @property
374
+ def display_name(self):
375
+ match self:
376
+ case ControlCategory.CLOUD:
377
+ return "Cloud"
378
+ case ControlCategory.EMAIL:
379
+ return "Email"
380
+ case ControlCategory.IDENTITY:
381
+ return "Identity Provider"
382
+ case ControlCategory.NETWORK:
383
+ return "Network"
384
+ case ControlCategory.XDR:
385
+ return "EDR"
386
+ case ControlCategory.ASSET_MANAGER:
387
+ return "Endpoint Management"
388
+ case ControlCategory.DISCOVERED_DEVICES:
389
+ return "Discovered Devices"
390
+ case ControlCategory.VULN_MANAGER:
391
+ return "Vulnerability Management"
392
+ case ControlCategory.SIEM:
393
+ return "SIEM"
394
+ case ControlCategory.PRIVATE_REPO:
395
+ return "Private Repository"
396
+ case ControlCategory.HARDWARE:
397
+ return "Client Hardware Security"
398
+ case _:
399
+ return "Unknown Control Category"
400
+
315
401
 
316
402
  class SCMCategory(Enum, metaclass=MissingItem):
317
403
  INVALID = -1
@@ -523,6 +609,7 @@ class PolicyType(Enum, metaclass=MissingItem):
523
609
  def _missing_(cls, value):
524
610
  return PolicyType.INVALID
525
611
 
612
+
526
613
  class Platform(Enum, metaclass=MissingItem):
527
614
  INVALID = 0
528
615
  WINDOWS = 1
@@ -553,3 +640,16 @@ class NotationType(Enum, metaclass=MissingItem):
553
640
  @classmethod
554
641
  def _missing_(cls, value):
555
642
  return NotationType.INVALID
643
+
644
+
645
+ class ChartType(Enum, metaclass=MissingItem):
646
+ INVALID = -1
647
+ NUMBER = 1
648
+ COLUMN = 2
649
+ BAR = 3
650
+ PIE = 4
651
+ PERCENT = 5
652
+
653
+ @classmethod
654
+ def _missing_(cls, value):
655
+ return ChartType.INVALID
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: prelude-sdk-beta
3
- Version: 1435
3
+ Version: 1449
4
4
  Summary: For interacting with the Prelude API
5
5
  Home-page: https://github.com/preludeorg
6
6
  Author: Prelude Research
@@ -1,6 +1,6 @@
1
1
  [metadata]
2
2
  name = prelude-sdk-beta
3
- version = 1435
3
+ version = 1449
4
4
  author = Prelude Research
5
5
  author_email = support@preludesecurity.com
6
6
  description = For interacting with the Prelude API
@@ -100,7 +100,7 @@ class TestPartnerAttach:
100
100
  ),
101
101
  )
102
102
  for c in Control
103
- if c.value > 0
103
+ if c.value > 0 and not c.parent
104
104
  ]
105
105
 
106
106
  def setup_class(self):
@@ -431,11 +431,8 @@ class TestPartner:
431
431
  )
432
432
  assert 1 == len(res)
433
433
  expected = dict(
434
- blocked=0,
435
- detected=0,
436
434
  detection_id=pytest.detection_id,
437
435
  group_id=group_id,
438
- monitored=0,
439
436
  platform=pytest.expected_detection["rule"]["logsource"]["product"],
440
437
  test_id=pytest.test_id,
441
438
  )
@@ -471,32 +468,6 @@ class TestPartner:
471
468
  res[control.name][0]["account_id"] == pytest.expected_account["account_id"]
472
469
  )
473
470
 
474
- def test_ioa_stats(
475
- self,
476
- unwrap,
477
- host,
478
- edr_id,
479
- control,
480
- os,
481
- platform,
482
- policy,
483
- policy_name,
484
- webhook_keys,
485
- group_id,
486
- ):
487
- try:
488
- if control != Control.CROWDSTRIKE:
489
- pytest.skip("IOA stats only supported for CROWDSTRIKE")
490
- if not pytest.expected_account["features"]["observed_detected"]:
491
- pytest.skip("OBSERVED_DETECTED feature not enabled")
492
-
493
- res = unwrap(self.partner.ioa_stats)(self.partner)
494
- assert 0 == len(res)
495
- finally:
496
- unwrap(self.detect.delete_endpoint)(
497
- self.detect, ident=pytest.endpoint["endpoint_id"]
498
- )
499
-
500
471
  def test_list_advisories(
501
472
  self,
502
473
  unwrap,
@@ -116,7 +116,7 @@ class TestScmAcrossControls:
116
116
  job_id = unwrap(self.export.export_scm)(
117
117
  self.export,
118
118
  SCMCategory.ENDPOINT,
119
- filter="contains(hostname, 'spencer')",
119
+ filter="contains(hostname, 'i')",
120
120
  top=1,
121
121
  )["job_id"]
122
122
  while (result := unwrap(self.jobs.job_status)(self.jobs, job_id))[
@@ -131,7 +131,8 @@ class TestScmAcrossControls:
131
131
  @pytest.mark.order(9)
132
132
  @pytest.mark.usefixtures("setup_account")
133
133
  @pytest.mark.parametrize(
134
- "control", [c for c in Control if c.scm_category != SCMCategory.NONE]
134
+ "control",
135
+ [c for c in Control if c.scm_category != SCMCategory.NONE and not c.parent],
135
136
  )
136
137
  class TestScmPerControl:
137
138
  def setup_class(self):
@@ -0,0 +1,104 @@
1
+ import pytest
2
+ import uuid
3
+
4
+ from prelude_sdk_beta.controllers.scm_controller import ScmController
5
+ from prelude_sdk_beta.models.codes import ControlCategory
6
+
7
+
8
+ @pytest.mark.order(8)
9
+ @pytest.mark.usefixtures("setup_account")
10
+ class TestScmBuild:
11
+ def setup_class(self):
12
+ if not pytest.expected_account["features"]["policy_evaluator"]:
13
+ pytest.skip("POLICY_EVALUATOR feature not enabled")
14
+ self.scm = ScmController(pytest.account)
15
+
16
+ def test_create_object_exception(self, unwrap):
17
+ res = unwrap(self.scm.create_object_exception)(
18
+ self.scm,
19
+ ControlCategory.ASSET_MANAGER,
20
+ "hostname eq 'host1'",
21
+ name="filter me",
22
+ expires="5555-05-05",
23
+ )
24
+ assert res["exception_id"]
25
+ pytest.exception_id = res["exception_id"]
26
+
27
+ def test_update_object_exception(self, unwrap):
28
+ res = unwrap(self.scm.update_object_exception)(
29
+ self.scm,
30
+ pytest.exception_id,
31
+ filter="hostname eq 'host2'",
32
+ expires=None,
33
+ )
34
+ assert res["status"]
35
+
36
+ def test_list_object_exceptions(self, unwrap):
37
+ res = unwrap(self.scm.list_object_exceptions)(self.scm)
38
+ exception = [x for x in res if x["id"] == pytest.exception_id]
39
+ assert len(exception) == 1
40
+ exception = exception[0]
41
+ del exception["author"]
42
+ del exception["created"]
43
+ assert exception == {
44
+ "category": ControlCategory.ASSET_MANAGER.value,
45
+ "expires": None,
46
+ "filter": "hostname eq 'host2'",
47
+ "id": pytest.exception_id,
48
+ "name": "filter me",
49
+ }
50
+
51
+ def test_delete_object_exception(self, unwrap):
52
+ res = unwrap(self.scm.delete_object_exception)(self.scm, pytest.exception_id)
53
+ assert res["status"]
54
+ res = unwrap(self.scm.list_object_exceptions)(self.scm)
55
+ assert not any(x["id"] == pytest.exception_id for x in res)
56
+
57
+ def test_put_report(self, unwrap):
58
+ report_blob = {
59
+ "name": "test report",
60
+ "sections": [
61
+ {
62
+ "name": "test section",
63
+ "charts": [
64
+ {
65
+ "name": "test chart",
66
+ "columns": ["platforms"],
67
+ "type": "PIE",
68
+ "filter": "instances/any(i: i/control eq 1)",
69
+ "group_by": "platforms",
70
+ "scm_category": "ENDPOINT",
71
+ }
72
+ ],
73
+ }
74
+ ],
75
+ }
76
+ res = unwrap(self.scm.put_report)(self.scm, report_data=report_blob)
77
+ pytest.report_id = res["report_id"]
78
+ for section in res["report"]["sections"]:
79
+ assert "id" in section
80
+ for chart in res["report"]["sections"][0]["charts"]:
81
+ assert "id" in chart
82
+ assert "ignore" in chart
83
+
84
+ def test_list_reports(self, unwrap):
85
+ res = unwrap(self.scm.list_reports)(self.scm)
86
+ report = [r for r in res if r["report_id"] == pytest.report_id]
87
+ assert len(report) == 1
88
+ assert report[0]["name"] == "test report"
89
+ assert "report" not in report[0]
90
+
91
+ def test_get_report(self, unwrap):
92
+ res = unwrap(self.scm.get_report)(self.scm, pytest.report_id)
93
+ assert res["report_id"] == pytest.report_id
94
+ for section in res["report"]["sections"]:
95
+ assert "id" in section
96
+ for chart in res["report"]["sections"][0]["charts"]:
97
+ assert "id" in chart
98
+ assert "ignore" in chart
99
+
100
+ def test_delete_report(self, unwrap):
101
+ res = unwrap(self.scm.delete_report)(self.scm, pytest.report_id)
102
+ assert res["status"]
103
+ res = unwrap(self.scm.list_reports)(self.scm)
104
+ assert not any(r["report_id"] == pytest.report_id for r in res)
@@ -1,55 +0,0 @@
1
- import pytest
2
- from datetime import datetime, timezone, timedelta
3
-
4
- from prelude_sdk_beta.controllers.scm_controller import ScmController
5
- from prelude_sdk_beta.models.codes import Control, ControlCategory
6
-
7
-
8
- @pytest.mark.order(8)
9
- @pytest.mark.usefixtures("setup_account")
10
- class TestScmBuild:
11
- def setup_class(self):
12
- if not pytest.expected_account["features"]["policy_evaluator"]:
13
- pytest.skip("POLICY_EVALUATOR feature not enabled")
14
- self.scm = ScmController(pytest.account)
15
-
16
- def test_create_object_exception(self, unwrap):
17
- res = unwrap(self.scm.create_object_exception)(
18
- self.scm,
19
- ControlCategory.ASSET_MANAGER,
20
- "hostname eq 'host1'",
21
- name="filter me",
22
- expires="5555-05-05",
23
- )
24
- assert res["exception_id"]
25
- pytest.exception_id = res["exception_id"]
26
-
27
- def test_update_object_exception(self, unwrap):
28
- res = unwrap(self.scm.update_object_exception)(
29
- self.scm,
30
- pytest.exception_id,
31
- filter="hostname eq 'host2'",
32
- expires=None,
33
- )
34
- assert res["status"]
35
-
36
- def test_list_object_exceptions(self, unwrap):
37
- res = unwrap(self.scm.list_object_exceptions)(self.scm)
38
- exception = [x for x in res if x["id"] == pytest.exception_id]
39
- assert len(exception) == 1
40
- exception = exception[0]
41
- del exception["author"]
42
- del exception["created"]
43
- assert exception == {
44
- "category": ControlCategory.ASSET_MANAGER.value,
45
- "expires": None,
46
- "filter": "hostname eq 'host2'",
47
- "id": pytest.exception_id,
48
- "name": "filter me",
49
- }
50
-
51
- def test_delete_object_exception(self, unwrap):
52
- res = unwrap(self.scm.delete_object_exception)(self.scm, pytest.exception_id)
53
- assert res["status"]
54
- res = unwrap(self.scm.list_object_exceptions)(self.scm)
55
- assert not any(x["id"] == pytest.exception_id for x in res)
File without changes