ail-framework/var/www/modules/PasteSubmit/Flask_PasteSubmit.py

675 lines
22 KiB
Python
Raw Permalink Normal View History

2018-06-05 14:58:04 +00:00
#!/usr/bin/env python3
# -*-coding:UTF-8 -*
'''
Flask functions and routes for the trending modules page
'''
2021-04-28 13:24:33 +00:00
##################################
# Import External packages
##################################
import re
2018-06-05 14:58:04 +00:00
import os
import sys
2021-04-28 13:24:33 +00:00
import json
import string
2018-06-05 14:58:04 +00:00
import datetime
2021-04-28 13:24:33 +00:00
import redis
import unicodedata
import uuid
from io import BytesIO
from Date import Date
2021-04-28 13:24:33 +00:00
from functools import wraps
# Flask
from flask import Flask, render_template, jsonify, request, Blueprint, url_for, redirect, abort
2021-04-28 13:24:33 +00:00
from Role_Manager import login_admin, login_analyst
from flask_login import login_required
2018-06-05 14:58:04 +00:00
2021-04-28 13:24:33 +00:00
##################################
# Import Project packages
##################################
import Paste
import Import_helper
import Tag
2018-06-05 14:58:04 +00:00
from pytaxonomies import Taxonomies
from pymispgalaxies import Galaxies, Clusters
try:
from pymisp.mispevent import MISPObject
flag_misp = True
except:
flag_misp = False
try:
from thehive4py.models import Case, CaseTask, CustomFieldHelper, CaseObservable
flag_hive = True
except:
flag_hive = False
2018-06-05 14:58:04 +00:00
# ============ VARIABLES ============
import Flask_config
app = Flask_config.app
baseUrl = Flask_config.baseUrl
r_serv_metadata = Flask_config.r_serv_metadata
r_serv_db = Flask_config.r_serv_db
2018-06-05 14:58:04 +00:00
r_serv_log_submit = Flask_config.r_serv_log_submit
2021-04-28 13:24:33 +00:00
logger = Flask_config.redis_logger
pymisp = Flask_config.pymisp
if pymisp is False:
flag_misp = False
HiveApi = Flask_config.HiveApi
if HiveApi is False:
flag_hive = False
2018-06-05 14:58:04 +00:00
PasteSubmit = Blueprint('PasteSubmit', __name__, template_folder='templates')
valid_filename_chars = "-_ %s%s" % (string.ascii_letters, string.digits)
UPLOAD_FOLDER = Flask_config.UPLOAD_FOLDER
2018-06-06 08:05:25 +00:00
misp_event_url = Flask_config.misp_event_url
hive_case_url = Flask_config.hive_case_url
2021-04-28 13:24:33 +00:00
text_max_size = int(Flask_config.SUBMIT_PASTE_TEXT_MAX_SIZE) / (1000*1000)
file_max_size = int(Flask_config.SUBMIT_PASTE_FILE_MAX_SIZE) / (1000*1000*1000)
allowed_extensions = ", ". join(Flask_config.SUBMIT_PASTE_FILE_ALLOWED_EXTENSIONS)
# ============ Validators ============
def limit_content_length():
def decorator(f):
@wraps(f)
def wrapper(*args, **kwargs):
logger.debug('decorator')
cl = request.content_length
if cl is not None:
if cl > Flask_config.SUBMIT_PASTE_FILE_MAX_SIZE or ('file' not in request.files and cl > Flask_config.SUBMIT_PASTE_TEXT_MAX_SIZE):
logger.debug('abort')
abort(413)
return f(*args, **kwargs)
return wrapper
return decorator
2018-06-05 14:58:04 +00:00
# ============ FUNCTIONS ============
def one():
return 1
2018-06-06 08:05:25 +00:00
def allowed_file(filename):
if not '.' in filename:
return True
else:
2021-04-28 13:24:33 +00:00
file_ext = filename.rsplit('.', 1)[1].lower()
logger.debug(file_ext)
logger.debug(Flask_config.SUBMIT_PASTE_FILE_ALLOWED_EXTENSIONS)
return file_ext in Flask_config.SUBMIT_PASTE_FILE_ALLOWED_EXTENSIONS
2018-06-06 08:05:25 +00:00
2018-06-05 14:58:04 +00:00
def clean_filename(filename, whitelist=valid_filename_chars, replace=' '):
# replace characters
for r in replace:
filename = filename.replace(r,'_')
# keep only valid ascii chars
cleaned_filename = unicodedata.normalize('NFKD', filename).encode('ASCII', 'ignore').decode()
# keep only whitelisted chars
return ''.join(c for c in cleaned_filename if c in whitelist)
def date_to_str(date):
return "{0}-{1}-{2}".format(date.year, date.month, date.day)
def misp_create_event(distribution, threat_level_id, analysis, info, l_tags, publish, path):
paste = Paste.Paste(path)
source = path.split('/')[-6:]
source = '/'.join(source)[:-3]
ail_uuid = r_serv_db.get('ail:uuid')
pseudofile = BytesIO(paste.get_p_content().encode())
temp = paste._get_p_duplicate()
#beautifier
if not temp:
temp = ''
p_duplicate_number = len(temp) if len(temp) >= 0 else 0
to_ret = ""
for dup in temp[:10]:
dup = dup.replace('\'','\"').replace('(','[').replace(')',']')
dup = json.loads(dup)
algo = dup[0]
path = dup[1].split('/')[-6:]
path = '/'.join(path)[:-3] # -3 removes .gz
if algo == 'tlsh':
perc = 100 - int(dup[2])
else:
perc = dup[2]
to_ret += "{}: {} [{}%]\n".format(path, algo, perc)
p_duplicate = to_ret
today = datetime.date.today()
# [0-3]
if publish == 'True':
published = True
else:
published = False
org_id = None
orgc_id = None
sharing_group_id = None
date = today
event = pymisp.new_event(distribution, threat_level_id,
analysis, info, date,
published, orgc_id, org_id, sharing_group_id)
eventUuid = event['Event']['uuid']
eventid = event['Event']['id']
2018-06-18 15:16:22 +00:00
r_serv_metadata.set('misp_events:'+path, eventid)
# add tags
for tag in l_tags:
pymisp.tag(eventUuid, tag)
# create attributes
obj_name = 'ail-leak'
leak_obj = MISPObject(obj_name)
leak_obj.add_attribute('sensor', value=ail_uuid, type="text")
leak_obj.add_attribute('origin', value=source, type='text')
leak_obj.add_attribute('last-seen', value=date_to_str(paste.p_date), type='datetime')
leak_obj.add_attribute('raw-data', value=source, data=pseudofile, type="attachment")
if p_duplicate_number > 0:
leak_obj.add_attribute('duplicate', value=p_duplicate, type='text')
leak_obj.add_attribute('duplicate_number', value=p_duplicate_number, type='counter')
try:
2019-06-25 12:55:03 +00:00
templateID = [x['ObjectTemplate']['id'] for x in pymisp.get_object_templates_list()['response'] if x['ObjectTemplate']['name'] == obj_name][0]
except IndexError:
valid_types = ", ".join([x['ObjectTemplate']['name'] for x in pymisp.get_object_templates_list()])
print ("Template for type {} not found! Valid types are: {%s}".format(obj_name, valid_types))
r = pymisp.add_object(eventid, templateID, leak_obj)
if 'errors' in r:
2018-06-18 15:16:22 +00:00
print(r)
return False
else:
event_url = misp_event_url + eventid
return event_url
def hive_create_case(hive_tlp, threat_level, hive_description, hive_case_title, l_tags, path):
ail_uuid = r_serv_db.get('ail:uuid')
source = path.split('/')[-6:]
source = '/'.join(source)[:-3]
# get paste date
var = path.split('/')
last_seen = "{0}-{1}-{2}".format(var[-4], var[-3], var[-2])
case = Case(title=hive_case_title,
tlp=hive_tlp,
severity=threat_level,
flag=False,
tags=l_tags,
description='hive_description')
# Create the case
id = None
response = HiveApi.create_case(case)
if response.status_code == 201:
id = response.json()['id']
observ_sensor = CaseObservable(dataType="other", data=[ail_uuid], message="sensor")
observ_file = CaseObservable(dataType="file", data=[path], tags=l_tags)
observ_source = CaseObservable(dataType="other", data=[source], message="source")
observ_last_seen = CaseObservable(dataType="other", data=[last_seen], message="last-seen")
res = HiveApi.create_case_observable(id,observ_sensor)
if res.status_code != 201:
2021-04-28 13:24:33 +00:00
logger.info(f'ko sensor: {res.status_code}/{res.text}')
res = HiveApi.create_case_observable(id, observ_source)
if res.status_code != 201:
2021-04-28 13:24:33 +00:00
logger.info(f'ko source: {res.status_code}/{res.text}')
res = HiveApi.create_case_observable(id, observ_file)
if res.status_code != 201:
2021-04-28 13:24:33 +00:00
logger.info(f'ko file: {res.status_code}/{res.text}')
res = HiveApi.create_case_observable(id, observ_last_seen)
if res.status_code != 201:
2021-04-28 13:24:33 +00:00
logger.info(f'ko last_seen: {res.status_code}/{res.text}')
2018-06-18 15:16:22 +00:00
r_serv_metadata.set('hive_cases:'+path, id)
return hive_case_url.replace('id_here', id)
else:
2021-04-28 13:24:33 +00:00
logger.info(f'ko: {response.status_code}/{response.text}')
return False
2018-06-05 14:58:04 +00:00
# ============= ROUTES ==============
@PasteSubmit.route("/PasteSubmit/", methods=['GET'])
2019-05-02 15:31:14 +00:00
@login_required
@login_analyst
2018-06-05 14:58:04 +00:00
def PasteSubmit_page():
# Get all active tags/galaxy
active_taxonomies = Tag.get_active_taxonomies()
active_galaxies = Tag.get_active_galaxies()
2018-06-05 14:58:04 +00:00
return render_template("submit_items.html",
2018-06-05 14:58:04 +00:00
active_taxonomies = active_taxonomies,
active_galaxies = active_galaxies,
2021-04-28 13:24:33 +00:00
text_max_size = text_max_size,
file_max_size = file_max_size,
allowed_extensions = allowed_extensions)
2018-06-05 14:58:04 +00:00
@PasteSubmit.route("/PasteSubmit/submit", methods=['POST'])
2019-05-02 15:31:14 +00:00
@login_required
@login_analyst
2021-04-28 13:24:33 +00:00
@limit_content_length()
2018-06-05 14:58:04 +00:00
def submit():
#paste_name = request.form['paste_name']
2021-04-28 13:24:33 +00:00
logger.debug('submit')
password = request.form['archive_pass']
2018-06-05 14:58:04 +00:00
ltags = request.form['tags_taxonomies']
ltagsgalaxies = request.form['tags_galaxies']
paste_content = request.form['paste_content']
2021-04-28 13:24:33 +00:00
paste_source = request.form['paste_source']
2018-06-05 14:58:04 +00:00
if paste_source:
# limit source length
paste_source = paste_source.replace('/', '')[:80]
if paste_source in ['crawled', 'tests']:
content = f'Invalid source'
logger.info(paste_source)
return content, 400
if not re.match('^[0-9a-zA-Z-_\+@#&\.;=:!]*$', paste_source):
content = f'Invalid source name: Forbidden character(s)'
logger.info(content)
return content, 400
is_file = False
if 'file' in request.files:
2021-04-28 13:24:33 +00:00
file_import = request.files['file']
if file_import:
if file_import.filename:
is_file = True
2021-04-28 13:24:33 +00:00
logger.debug(f'is file ? {is_file}')
submitted_tag = 'infoleak:submission="manual"'
2018-09-26 09:59:51 +00:00
#active taxonomies
active_taxonomies = Tag.get_active_taxonomies()
2018-09-26 09:59:51 +00:00
#active galaxies
active_galaxies = Tag.get_active_galaxies()
2018-09-26 09:59:51 +00:00
2018-06-06 08:05:25 +00:00
if ltags or ltagsgalaxies:
2021-04-28 13:24:33 +00:00
logger.debug(f'ltags ? {ltags} {ltagsgalaxies}')
2019-12-02 16:15:48 +00:00
ltags = Tag.unpack_str_tags_list(ltags)
ltagsgalaxies = Tag.unpack_str_tags_list(ltagsgalaxies)
2019-07-26 12:28:02 +00:00
2019-12-02 16:15:48 +00:00
if not Tag.is_valid_tags_taxonomies_galaxy(ltags, ltagsgalaxies):
content = 'INVALID TAGS'
2021-04-28 13:24:33 +00:00
logger.info(content)
return content, 400
2018-06-05 14:58:04 +00:00
# add submitted tags
2019-07-26 12:28:02 +00:00
if not ltags:
ltags = []
ltags.append(submitted_tag)
if is_file:
2021-04-28 13:24:33 +00:00
logger.debug('file management')
2018-06-05 14:58:04 +00:00
2021-04-28 13:24:33 +00:00
if allowed_file(file_import.filename):
logger.debug('file extension allowed')
2018-06-05 14:58:04 +00:00
2021-04-28 13:24:33 +00:00
# get UUID
UUID = str(uuid.uuid4())
2018-06-05 14:58:04 +00:00
2021-04-28 13:24:33 +00:00
'''if paste_name:
# clean file name
UUID = clean_filename(paste_name)'''
2018-06-05 14:58:04 +00:00
2021-04-28 13:24:33 +00:00
# create submitted dir
if not os.path.exists(UPLOAD_FOLDER):
logger.debug('create folder')
os.makedirs(UPLOAD_FOLDER)
2021-04-28 13:24:33 +00:00
if not '.' in file_import.filename:
logger.debug('add UUID to path')
full_path = os.path.join(UPLOAD_FOLDER, UUID)
else:
if file_import.filename[-6:] == 'tar.gz':
logger.debug('file extension is tar.gz')
file_type = 'tar.gz'
else:
2021-04-28 13:24:33 +00:00
file_type = file_import.filename.rsplit('.', 1)[1]
logger.debug(f'file type {file_type}')
name = UUID + '.' + file_type
full_path = os.path.join(UPLOAD_FOLDER, name)
logger.debug(f'full path {full_path}')
#Flask verify the file size
file_import.save(full_path)
logger.debug('file saved')
2021-04-28 13:24:33 +00:00
Import_helper.create_import_queue(ltags, ltagsgalaxies, full_path, UUID, password, True)
2018-06-06 08:05:25 +00:00
2021-04-28 13:24:33 +00:00
return render_template("submit_items.html",
active_taxonomies = active_taxonomies,
active_galaxies = active_galaxies,
UUID = UUID)
2018-06-06 08:05:25 +00:00
2021-04-28 13:24:33 +00:00
else:
content = f'wrong file type, allowed_extensions: {allowed_extensions} or remove the extension'
logger.info(content)
return content, 400
2018-06-06 08:05:25 +00:00
2018-06-05 14:58:04 +00:00
2018-06-18 15:16:22 +00:00
elif paste_content != '':
2021-04-28 13:24:33 +00:00
logger.debug(f'entering text paste management')
if sys.getsizeof(paste_content) < Flask_config.SUBMIT_PASTE_TEXT_MAX_SIZE:
logger.debug(f'size {sys.getsizeof(paste_content)}')
# get id
UUID = str(uuid.uuid4())
2021-04-28 13:24:33 +00:00
logger.debug('create import')
Import_helper.create_import_queue(ltags, ltagsgalaxies, paste_content, UUID, password, source=paste_source)
logger.debug('import OK')
return render_template("submit_items.html",
2018-09-26 09:59:51 +00:00
active_taxonomies = active_taxonomies,
active_galaxies = active_galaxies,
UUID = UUID)
else:
2021-04-28 13:24:33 +00:00
content = f'text paste size is over {Flask_config.SUBMIT_PASTE_TEXT_MAX_SIZE} bytes limit'
logger.info(content)
return content, 400
content = 'submit aborded'
2021-04-28 13:24:33 +00:00
logger.error(content)
return content, 400
return PasteSubmit_page()
2018-06-05 14:58:04 +00:00
@PasteSubmit.route("/PasteSubmit/submit_status", methods=['GET'])
2019-05-02 15:31:14 +00:00
@login_required
@login_analyst
2018-06-05 14:58:04 +00:00
def submit_status():
UUID = request.args.get('UUID')
if UUID:
end = r_serv_log_submit.get(UUID + ':end')
nb_total = r_serv_log_submit.get(UUID + ':nb_total')
nb_end = r_serv_log_submit.get(UUID + ':nb_end')
error = r_serv_log_submit.get(UUID + ':error')
processing = r_serv_log_submit.get(UUID + ':processing')
nb_sucess = r_serv_log_submit.get(UUID + ':nb_sucess')
paste_submit_link = list(r_serv_log_submit.smembers(UUID + ':paste_submit_link'))
2019-07-26 12:28:02 +00:00
if (end != None) and (nb_total != None) and (nb_end != None) and (processing != None):
link = ''
if paste_submit_link:
for paste in paste_submit_link:
url = url_for('objects_item.showItem') + '?id=' + paste
link += '<a target="_blank" href="' + url + '" class="list-group-item">' + paste +'</a>'
if nb_total == '-1':
in_progress = nb_sucess + ' / '
else:
in_progress = nb_sucess + ' / ' + nb_total
2018-06-05 14:58:04 +00:00
if int(nb_total) != 0:
prog = int(int(nb_end) * 100 / int(nb_total))
else:
prog = 0
2018-06-05 14:58:04 +00:00
if error:
2018-06-05 14:58:04 +00:00
isError = True
else:
isError = False
2018-06-05 14:58:04 +00:00
if end == '0':
end = False
else:
end = True
if processing == '0':
processing = False
else:
processing = True
2018-06-05 14:58:04 +00:00
return jsonify(end=end,
in_progress=in_progress,
prog=prog,
link=link,
processing=processing,
2018-06-05 14:58:04 +00:00
isError=isError,
error=error)
else:
# FIXME TODO
print(end)
print(nb_total)
print(nb_end)
print(error)
print(processing)
print(nb_sucess)
2018-06-05 14:58:04 +00:00
return 'to do'
else:
return 'INVALID UUID'
2018-06-05 14:58:04 +00:00
@PasteSubmit.route("/PasteSubmit/create_misp_event", methods=['POST'])
2019-05-02 15:31:14 +00:00
@login_required
@login_analyst
def create_misp_event():
distribution = int(request.form['misp_data[Event][distribution]'])
threat_level_id = int(request.form['misp_data[Event][threat_level_id]'])
analysis = int(request.form['misp_data[Event][analysis]'])
info = request.form['misp_data[Event][info]']
path = request.form['paste']
publish = request.form.get('misp_publish')
#verify input
if (0 <= distribution <= 3) and (1 <= threat_level_id <= 4) and (0 <= analysis <= 2):
l_tags = list(r_serv_metadata.smembers('tag:'+path))
event = misp_create_event(distribution, threat_level_id, analysis, info, l_tags, publish, path)
if event != False:
return redirect(event)
else:
2018-06-19 11:43:26 +00:00
return 'error, event creation'
2018-06-18 15:16:22 +00:00
return 'error0'
@PasteSubmit.route("/PasteSubmit/create_hive_case", methods=['POST'])
2019-05-02 15:31:14 +00:00
@login_required
@login_analyst
def create_hive_case():
hive_tlp = int(request.form['hive_tlp'])
threat_level = int(request.form['threat_level_hive'])
hive_description = request.form['hive_description']
hive_case_title = request.form['hive_case_title']
2020-05-13 13:24:29 +00:00
path = os.environ['AIL_HOME'] + "/PASTES/"+ request.form['paste']
#verify input
if (0 <= hive_tlp <= 3) and (1 <= threat_level <= 4):
l_tags = list(r_serv_metadata.smembers('tag:'+path))
case = hive_create_case(hive_tlp, threat_level, hive_description, hive_case_title, l_tags, path)
if case != False:
return redirect(case)
else:
return 'error'
return 'error'
@PasteSubmit.route("/PasteSubmit/edit_tag_export")
2019-05-02 15:31:14 +00:00
@login_required
@login_analyst
def edit_tag_export():
misp_auto_events = r_serv_db.get('misp:auto-events')
hive_auto_alerts = r_serv_db.get('hive:auto-alerts')
whitelist_misp = r_serv_db.scard('whitelist_misp')
whitelist_hive = r_serv_db.scard('whitelist_hive')
list_export_tags = list(r_serv_db.smembers('list_export_tags'))
status_misp = []
status_hive = []
infoleak_tags = Taxonomies().get('infoleak').machinetags()
is_infoleak_tag = []
for tag in list_export_tags:
if r_serv_db.sismember('whitelist_misp', tag):
status_misp.append(True)
else:
status_misp.append(False)
2018-07-24 12:46:35 +00:00
for tag in list_export_tags:
if r_serv_db.sismember('whitelist_hive', tag):
status_hive.append(True)
2018-07-24 12:46:35 +00:00
else:
status_hive.append(False)
2018-06-19 09:54:34 +00:00
if tag in infoleak_tags:
is_infoleak_tag.append(True)
else:
is_infoleak_tag.append(False)
2018-07-24 12:46:35 +00:00
if misp_auto_events is not None:
2018-06-19 09:54:34 +00:00
if int(misp_auto_events) == 1:
misp_active = True
else:
misp_active = False
2018-07-24 12:46:35 +00:00
else:
misp_active = False
if hive_auto_alerts is not None:
2018-06-19 09:54:34 +00:00
if int(hive_auto_alerts) == 1:
hive_active = True
else:
hive_active = False
else:
hive_active = False
nb_tags = str(r_serv_db.scard('list_export_tags'))
nb_tags_whitelist_misp = str(r_serv_db.scard('whitelist_misp')) + ' / ' + nb_tags
nb_tags_whitelist_hive = str(r_serv_db.scard('whitelist_hive')) + ' / ' + nb_tags
return render_template("edit_tag_export.html",
misp_active=misp_active,
hive_active=hive_active,
list_export_tags=list_export_tags,
is_infoleak_tag=is_infoleak_tag,
status_misp=status_misp,
status_hive=status_hive,
nb_tags_whitelist_misp=nb_tags_whitelist_misp,
nb_tags_whitelist_hive=nb_tags_whitelist_hive,
flag_misp=flag_misp,
flag_hive=flag_hive)
@PasteSubmit.route("/PasteSubmit/tag_export_edited", methods=['POST'])
2019-05-02 15:31:14 +00:00
@login_required
@login_analyst
def tag_export_edited():
tag_enabled_misp = request.form.getlist('tag_enabled_misp')
tag_enabled_hive = request.form.getlist('tag_enabled_hive')
list_export_tags = list(r_serv_db.smembers('list_export_tags'))
r_serv_db.delete('whitelist_misp')
r_serv_db.delete('whitelist_hive')
for tag in tag_enabled_misp:
if r_serv_db.sismember('list_export_tags', tag):
r_serv_db.sadd('whitelist_misp', tag)
else:
return 'invalid input'
for tag in tag_enabled_hive:
if r_serv_db.sismember('list_export_tags', tag):
r_serv_db.sadd('whitelist_hive', tag)
else:
return 'invalid input'
return redirect(url_for('PasteSubmit.edit_tag_export'))
@PasteSubmit.route("/PasteSubmit/enable_misp_auto_event")
2019-05-02 15:31:14 +00:00
@login_required
@login_analyst
def enable_misp_auto_event():
r_serv_db.set('misp:auto-events', 1)
return edit_tag_export()
@PasteSubmit.route("/PasteSubmit/disable_misp_auto_event")
2019-05-02 15:31:14 +00:00
@login_required
@login_analyst
def disable_misp_auto_event():
r_serv_db.set('misp:auto-events', 0)
return edit_tag_export()
@PasteSubmit.route("/PasteSubmit/enable_hive_auto_alert")
2019-05-02 15:31:14 +00:00
@login_required
@login_analyst
def enable_hive_auto_alert():
r_serv_db.set('hive:auto-alerts', 1)
return edit_tag_export()
@PasteSubmit.route("/PasteSubmit/disable_hive_auto_alert")
2019-05-02 15:31:14 +00:00
@login_required
@login_analyst
def disable_hive_auto_alert():
r_serv_db.set('hive:auto-alerts', 0)
return edit_tag_export()
2018-11-07 08:41:58 +00:00
@PasteSubmit.route("/PasteSubmit/add_push_tag")
2019-05-02 15:31:14 +00:00
@login_required
@login_analyst
2018-11-07 08:41:58 +00:00
def add_push_tag():
tag = request.args.get('tag')
2018-11-07 10:42:31 +00:00
if tag is not None:
2018-11-07 10:42:31 +00:00
#limit tag length
if len(tag) > 49:
tag = tag[0:48]
2018-11-07 08:41:58 +00:00
2018-11-07 10:42:31 +00:00
r_serv_db.sadd('list_export_tags', tag)
to_return = {}
to_return["tag"] = tag
return jsonify(to_return)
else:
return 'None args', 400
2018-11-07 08:41:58 +00:00
@PasteSubmit.route("/PasteSubmit/delete_push_tag")
2019-05-02 15:31:14 +00:00
@login_required
@login_analyst
def delete_push_tag():
tag = request.args.get('tag')
infoleak_tags = Taxonomies().get('infoleak').machinetags()
if tag not in infoleak_tags and r_serv_db.sismember('list_export_tags', tag):
r_serv_db.srem('list_export_tags', tag)
2018-11-07 08:41:58 +00:00
r_serv_db.srem('whitelist_misp', tag)
r_serv_db.srem('whitelist_hive', tag)
to_return = {}
to_return["tag"] = tag
return jsonify(to_return)
else:
return 'this tag can\'t be removed', 400
2018-06-05 14:58:04 +00:00
# ========= REGISTRATION =========
app.register_blueprint(PasteSubmit, url_prefix=baseUrl)