Skip to main content

Multi-cloud data scan tool

Project description

Dragoneye

CD PyPI GitHub license PRs Welcome

dragoneye

dragoneye is a Python tool that is used to collect data about a cloud environment using the cloud provider's APIs. It is intended to function as component in other tools who have the need to collect data quickly (multi-threaded), or as a command line to collect a snapshot of a cloud account.

dragoneye currently supports AWS (AssumeRole and AccessKey based collection) and Azure (with client secret).

Setup

Clone this git repository, navigate to the root directory where setup.py is located and run:

pip install .

(note the period at the end of the command)

We recommend doing this within a virtual environment, like so:

python3.9 -m venv ./venv
. ./venv/bin/activate
pip install .

Usage

Programmatic Usage

Create an instance of one of the CollectRequest classes, such as AwsAccessKeyCollectRequest, AwsAssumeRoleCollectRequest, AzureCollectRequest and call the collect function. For example:

from dragoneye import AwsScanner, AwsCloudScanSettings, AwsSessionFactory, AzureScanner, AzureCloudScanSettings, AzureAuthorizer, GcpCloudScanSettings, GcpCredentialsFactory, GcpScanner

### AWS ###
aws_settings = AwsCloudScanSettings(
    commands_path='/Users/dev/python/dragoneye/aws_commands_example.yaml',
    account_name='default', default_region='us-east-1', regions_filter=['us-east-1']
)

#### Using environment variables
session = AwsSessionFactory.get_session(profile_name=None, region='us-east-1')  # Raises exception if authentication is unsuccessful
aws_scan_output_directory = AwsScanner(session, aws_settings).scan()

#### Using an AWS Profile
session = AwsSessionFactory.get_session(profile_name='MyProfile', region='us-east-1')  # Raises exception if authentication is unsuccessful
aws_scan_output_directory = AwsScanner(session, aws_settings).scan()

#### Assume Role
session = AwsSessionFactory.get_session_using_assume_role(external_id='...',
                                                          role_arn="...",
                                                          region='us-east-1')
aws_scan_output_directory = AwsScanner(session, aws_settings).scan()

### Azure ###
azure_settings = AzureCloudScanSettings(
    commands_path='/Users/dev/python/dragoneye/azure_commands_example.yaml',
    subscription_id='...',
    account_name='my-account'
)

#### Using a registered application in Azure AD
token = AzureAuthorizer.get_authorization_token(
    tenant_id='...',
    client_id='...',
    client_secret='...'
)  # Raises exception if authentication is unsuccessful
azure_scan_output_directory = AzureScanner(token, azure_settings).scan()

### GCP ###
gcp_settings = GcpCloudScanSettings(commands_path='/Users/dev/python/dragoneye/gcp_commands_example.yaml',
                                    account_name='gcp', project_id='project-id')

# Authenticating by GCP default auth mechanism:
#    Checks environment in order of precedence:
#    - Environment variable GOOGLE_APPLICATION_CREDENTIALS pointing to
#      a file with stored credentials information.
#    - Stored "well known" file associated with `gcloud` command line tool.
#    - Google App Engine (production and testing)
#    - Google Compute Engine production environment.
default_credentials = GcpCredentialsFactory.get_default_credentials()
# Using a file that contains the service account credentials 
service_account_file_credentials = GcpCredentialsFactory.from_service_account_file('filepath.json')
# Using a dictionary that contains the service account credentials (the content of the file from above example)
service_account_dict_credentials = GcpCredentialsFactory.from_service_account_info({'...': '...'})
# Using impersonation method (service_account_A allowing service_account_B to generate short-lived credentials of service_account_A)
impersonation_credentials = GcpCredentialsFactory.impersonate(default_credentials, 'client_email@google.com', ['https://www.googleapis.com/auth/compute.readonly'])
# Authenticating from an AWS resource via a credentials config file defined by the 'Workload Identity Federation'
wif_credentials = GcpCredentialsFactory.from_aws_credentials_config_file('filepath.json')
# Same as above, but with the content of the above file
wif_credentials = GcpCredentialsFactory.from_aws_credentials_config_info({'...': '...'})

gcp_scan_output_directory = GcpScanner(default_credentials, gcp_settings)

CLI usage

For collecting data from AWS

Dragoneye will use the same mechanisms boto3 uses for authentication. It will generally look for AWS_ACCESS_KEY_ID, etc. as environment variables.

dragoneye aws

For collecting data from Azure

You can authenticate in one of two ways:

  1. az login, which will allow dragoneye to use credentials loaded through Azure CLI.
  2. With client id and secret of an application registered in your Azure AD.
dragoneye azure

For collecting data from GP

You can authenticate in several ways:

  1. gcloud auth application-default login, which will allow dragoneye to use credentials loaded through GCP CLI.
  2. With service account credentials - either a file, or its content.
  3. With impersonation mechanism; service_account_A allowing service_account_B to generate short-lived credentials of service_account_A
  4. With Workload Identity Federation mechanism, authenticating from AWS.
dragoneye gcp

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

dragoneye-0.0.77.tar.gz (23.9 kB view details)

Uploaded Source

Built Distribution

dragoneye-0.0.77-py3-none-any.whl (30.2 kB view details)

Uploaded Python 3

File details

Details for the file dragoneye-0.0.77.tar.gz.

File metadata

  • Download URL: dragoneye-0.0.77.tar.gz
  • Upload date:
  • Size: 23.9 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.7.1 importlib_metadata/4.10.1 pkginfo/1.8.2 requests/2.27.1 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.9.9

File hashes

Hashes for dragoneye-0.0.77.tar.gz
Algorithm Hash digest
SHA256 c737257abf8c92fc547986044d7630db2db4632fa420ad383a60da076b7a3d77
MD5 91fd8ff0527dc9d29c38c3a115e365a4
BLAKE2b-256 a6817078b571cc760fdd90df8d6f6066cc4752011d37e208bdf803ab9d0f2f91

See more details on using hashes here.

File details

Details for the file dragoneye-0.0.77-py3-none-any.whl.

File metadata

  • Download URL: dragoneye-0.0.77-py3-none-any.whl
  • Upload date:
  • Size: 30.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.7.1 importlib_metadata/4.10.1 pkginfo/1.8.2 requests/2.27.1 requests-toolbelt/0.9.1 tqdm/4.62.3 CPython/3.9.9

File hashes

Hashes for dragoneye-0.0.77-py3-none-any.whl
Algorithm Hash digest
SHA256 888e69ad076c9b5e74b82bade71c5cc562475a657cdc79b164ce8a7b22bc9df9
MD5 95b8db538d459baa4d39095e343ef648
BLAKE2b-256 2249a6c5ab79e5cd7910743ea37122f4eadc2018e98d46b254b58dcfee490b00

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page