-
Notifications
You must be signed in to change notification settings - Fork 37
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
a66b6ed
commit 96257e6
Showing
1 changed file
with
114 additions
and
114 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,115 +1,115 @@ | ||
import os | ||
import time | ||
|
||
import sys | ||
|
||
from importing.import_objects import import_objects, add_tag_to_object_payload | ||
from utils import debug_log, generate_import_error_report, count_global_layers, compare_versions | ||
|
||
|
||
def import_package(client, args): | ||
|
||
if not os.path.isfile(args.file): | ||
debug_log("No file named " + args.file + " found!", True, True) | ||
sys.exit(1) | ||
|
||
timestamp = time.strftime("%Y_%m_%d_%H_%M") | ||
|
||
if not args.name: | ||
try: | ||
package = '__'.join(args.file.split('__')[2:-1]) | ||
except (KeyError, ValueError): | ||
package = "Imported_Package_" + timestamp | ||
else: | ||
package = args.name | ||
|
||
if len(package) == 0: | ||
debug_log("A package name for import was not provided!", True, True) | ||
sys.exit(1) | ||
|
||
debug_log("Checking if package already exists...") | ||
show_package = client.api_call("show-package", {"name": package, "details-level": "full"}) | ||
if "code" in show_package.data and "not_found" in show_package.data["code"]: | ||
debug_log("Creating a Policy Package named [" + package + "]", True) | ||
package_payload = {"name": package, "access": True, "threat-prevention": True} | ||
if args.tag_objects_on_import != "": | ||
add_tag_to_object_payload(args.tag_objects_on_import, package_payload, "package", client) | ||
client.api_call("add-package", package_payload) | ||
client.api_call("publish", wait_for_task=True) | ||
else: | ||
if not args.force: | ||
print("A package named " + package + " already exists. Are you sure you want to import?") | ||
print("1.Yes") | ||
print("2.No") | ||
choice = "" | ||
chosen = False | ||
while not chosen: | ||
choice = input() | ||
if choice not in ["1", "2"]: | ||
print("Please enter either '1' or '2'") | ||
else: | ||
chosen = True | ||
if choice == '2': | ||
exit(0) | ||
|
||
debug_log("Importing general objects", True) | ||
machine_version = client.api_version | ||
layers_to_attach = import_objects(args.file, client, {}, package, None, args) | ||
|
||
num_global_access, num_global_threat = count_global_layers(client, package) | ||
|
||
access_layer_position = num_global_access + 1 | ||
threat_layer_position = num_global_threat + 3 | ||
|
||
access_layers = [] | ||
threat_layers = [] | ||
|
||
for access_layer in layers_to_attach["access"]: | ||
access_layers.append({"name": access_layer, "position": access_layer_position}) | ||
access_layer_position += 1 | ||
|
||
for threat_layer in layers_to_attach["threat"]: | ||
threat_layers.append({"name": threat_layer, "position": threat_layer_position}) | ||
threat_layer_position += 1 | ||
|
||
set_package_payload = {"name": package, "access-layers": {"add": access_layers}, | ||
"threat-layers": {"add": threat_layers}} | ||
|
||
if "https" in layers_to_attach: | ||
# If the imported package's version < 2 | ||
if compare_versions(client.api_version, '2') == -1: | ||
outbound_layer_name = layers_to_attach["https"][0] | ||
# If the version of the machine importing the package < 2 | ||
if compare_versions(machine_version, '2') == -1: | ||
set_package_payload["https-layer"] = outbound_layer_name | ||
|
||
else: | ||
inbound_layer_name = layers_to_attach["https"][0] | ||
outbound_layer_name = layers_to_attach["https"][1] | ||
set_package_payload["https-inspection-layers"] = {"inbound-https-layer": inbound_layer_name, | ||
"outbound-https-layer": outbound_layer_name} | ||
|
||
# Remove default 'Predefined Rule' | ||
https_rulebase_reply = client.api_call("show-https-rulebase", | ||
{"name": outbound_layer_name, "details-level": "uid"}) | ||
if https_rulebase_reply.success and "total" in https_rulebase_reply.data: | ||
last_rule_number = int(https_rulebase_reply.data["total"]) | ||
if last_rule_number > 1: | ||
delete_https_rule = client.api_call("delete-https-rule", | ||
{"rule-number": last_rule_number, "layer": outbound_layer_name}) | ||
if not delete_https_rule.success: | ||
debug_log("Failed to remove default Predefined Rule in https layer [" + outbound_layer_name + "]", | ||
True, True) | ||
|
||
debug_log("Attaching layers to package") | ||
layer_attachment_reply = client.api_call("set-package", set_package_payload) | ||
if not layer_attachment_reply.success: | ||
debug_log("Failed to attach layers to package! " | ||
"Error: " + layer_attachment_reply.error_message + ". Import operation aborted.", True, True) | ||
publish_reply = client.api_call("publish", wait_for_task=True) | ||
if not publish_reply.success: | ||
debug_log("Failed to attach layers to package! " | ||
"Error: " + publish_reply.error_message + ". Import operation aborted.", True, True) | ||
sys.exit(1) | ||
|
||
import os | ||
import time | ||
|
||
import sys | ||
|
||
from importing.import_objects import import_objects, add_tag_to_object_payload | ||
from utils import debug_log, generate_import_error_report, count_global_layers, compare_versions | ||
|
||
|
||
def import_package(client, args): | ||
|
||
if not os.path.isfile(args.file): | ||
debug_log("No file named " + args.file + " found!", True, True) | ||
sys.exit(1) | ||
|
||
timestamp = time.strftime("%Y_%m_%d_%H_%M") | ||
|
||
if not args.name: | ||
try: | ||
package = '__'.join(args.file.split('__')[2:-1]) | ||
except (KeyError, ValueError): | ||
package = "Imported_Package_" + timestamp | ||
else: | ||
package = args.name | ||
|
||
if len(package) == 0: | ||
debug_log("A package name for import was not provided!", True, True) | ||
sys.exit(1) | ||
|
||
debug_log("Checking if package already exists...") | ||
show_package = client.api_call("show-package", {"name": package, "details-level": "full"}) | ||
if "code" in show_package.data and "not_found" in show_package.data["code"]: | ||
debug_log("Creating a Policy Package named [" + package + "]", True) | ||
package_payload = {"name": package, "access": True, "threat-prevention": True} | ||
if args.tag_objects_on_import != "": | ||
add_tag_to_object_payload(args.tag_objects_on_import, package_payload, "package", client) | ||
client.api_call("add-package", package_payload) | ||
client.api_call("publish", wait_for_task=True) | ||
else: | ||
if not args.force: | ||
print("A package named " + package + " already exists. Are you sure you want to import?") | ||
print("1.Yes") | ||
print("2.No") | ||
choice = "" | ||
chosen = False | ||
while not chosen: | ||
choice = input() | ||
if choice not in ["1", "2"]: | ||
print("Please enter either '1' or '2'") | ||
else: | ||
chosen = True | ||
if choice == '2': | ||
exit(0) | ||
|
||
debug_log("Importing general objects", True) | ||
machine_version = client.api_version | ||
layers_to_attach = import_objects(args.file, client, {}, package, None, args) | ||
|
||
num_global_access, num_global_threat = count_global_layers(client, package) | ||
|
||
access_layer_position = num_global_access + 1 | ||
threat_layer_position = num_global_threat + 3 | ||
|
||
access_layers = [] | ||
threat_layers = [] | ||
|
||
for access_layer in layers_to_attach["access"]: | ||
access_layers.append({"name": access_layer, "position": access_layer_position}) | ||
access_layer_position += 1 | ||
|
||
for threat_layer in layers_to_attach["threat"]: | ||
threat_layers.append({"name": threat_layer, "position": threat_layer_position}) | ||
threat_layer_position += 1 | ||
|
||
set_package_payload = {"name": package, "access-layers": {"add": access_layers}, | ||
"threat-layers": {"add": threat_layers}} | ||
|
||
if "https" in layers_to_attach and len(layers_to_attach["https"]) > 0: | ||
# If the imported package's version < 2 | ||
if compare_versions(client.api_version, '2') == -1: | ||
outbound_layer_name = layers_to_attach["https"][0] | ||
# If the version of the machine importing the package < 2 | ||
if compare_versions(machine_version, '2') == -1: | ||
set_package_payload["https-layer"] = outbound_layer_name | ||
|
||
else: | ||
inbound_layer_name = layers_to_attach["https"][0] | ||
outbound_layer_name = layers_to_attach["https"][1] | ||
set_package_payload["https-inspection-layers"] = {"inbound-https-layer": inbound_layer_name, | ||
"outbound-https-layer": outbound_layer_name} | ||
|
||
# Remove default 'Predefined Rule' | ||
https_rulebase_reply = client.api_call("show-https-rulebase", | ||
{"name": outbound_layer_name, "details-level": "uid"}) | ||
if https_rulebase_reply.success and "total" in https_rulebase_reply.data: | ||
last_rule_number = int(https_rulebase_reply.data["total"]) | ||
if last_rule_number > 1: | ||
delete_https_rule = client.api_call("delete-https-rule", | ||
{"rule-number": last_rule_number, "layer": outbound_layer_name}) | ||
if not delete_https_rule.success: | ||
debug_log("Failed to remove default Predefined Rule in https layer [" + outbound_layer_name + "]", | ||
True, True) | ||
|
||
debug_log("Attaching layers to package") | ||
layer_attachment_reply = client.api_call("set-package", set_package_payload) | ||
if not layer_attachment_reply.success: | ||
debug_log("Failed to attach layers to package! " | ||
"Error: " + layer_attachment_reply.error_message + ". Import operation aborted.", True, True) | ||
publish_reply = client.api_call("publish", wait_for_task=True) | ||
if not publish_reply.success: | ||
debug_log("Failed to attach layers to package! " | ||
"Error: " + publish_reply.error_message + ". Import operation aborted.", True, True) | ||
sys.exit(1) | ||
|
||
generate_import_error_report() |