Pangea API SDK
Project description
Pangea Python SDK
A Python SDK for integrating with Pangea Services.
Setup
pip3 install pangea-sdk
# or
poetry add pangea-sdk
Usage
Secure Audit Service - Log Data
import os
import pangea.exceptions as pe
from pangea.config import PangeaConfig
from pangea.services import Audit
# Read your project domain from an env variable
domain = os.getenv("PANGEA_DOMAIN")
# Read your access token from an env variable
token = os.getenv("PANGEA_TOKEN")
# Create a Config object contain the Audit Config ID
config = PangeaConfig(domain=domain)
# Initialize an Audit instance using the config object
audit = Audit(token, config=config)
# Create test data
# All input fields are listed, only `message` is required
print(f"Logging...")
try:
# Create test data
# All input fields are listed, only `message` is required
log_response = audit.log(
message="despicable act prevented",
action="reboot",
actor="villan",
target="world",
status="error",
source="some device",
verbose=True
)
print(f"Response: {log_response.result}")
except pe.PangeaAPIException as e:
# Catch exception in case something fails
print(f"Request Error: {e.response.summary}")
for err in e.errors:
print(f"\t{err.detail} \n")
Secure Audit Service - Search Data
# This is a search example to be used on repo readme file
import os
import pangea.exceptions as pe
from pangea.config import PangeaConfig
from pangea.services import Audit
# Read your project domain from an env variable
domain = os.getenv("PANGEA_DOMAIN")
# Read your access token from an env variable
token = os.getenv("PANGEA_AUDIT_TOKEN")
# Create a Config object contain the Audit Config
config = PangeaConfig(domain=domain)
# Initialize an Audit instance using the config object
audit = Audit(token, config=config)
print(f"Searching...")
try:
# Search for 'message' containing 'prevented'
# filtered on 'source=test', with 5 results per-page
response = audit.search(
query="message:prevented",
limit=5
)
except pe.PangeaAPIException as e:
# Catch exception in case something fails and print error
print(f"Request Error: {e.response.summary}")
for err in e.errors:
print(f"\t{err.detail} \n")
exit()
print("Search Request ID:", response.request_id, "\n")
print(
f"Found {response.result.count} event(s)",
)
for row in response.result.events:
print(f"{row.envelope.received_at}\t| actor: {row.envelope.event.actor}\t| action: {row.envelope.event.action}\t| target: {row.envelope.event.target}\t| status: {row.envelope.event.status}\t| message: {row.envelope.event.message}")
Secure Audit Service - Integrity Tools
Verify audit data
Verify that an event or a list of events has not been tampered with. Usage:
usage: python -m pangea.verify_audit [-h] [--file PATH]
or
usage: poetry run python -m pangea.verify_audit [-h] [--file PATH]
Pangea Audit Verifier
options:
-h, --help show this help message and exit
--file PATH, -f PATH Input file (default: standard input).
It accepts multiple file formats:
- a Verification Artifact from the Pangea User Console
- a search response from the REST API:
curl -H "Authorization: Bearer ${PANGEA_TOKEN}" -X POST -H 'Content-Type: application/json' --data '{"verbose": true}' https://audit.aws.us.pangea.cloud/v1/search
Bulk Download Audit Data
Download all audit logs for a given time range. Start and end date should be provided, a variety of formats is supported, including ISO-8601. The result is stored in a jsonl file (one json per line)
usage: python -m pangea.dump_audit [-h] [--token TOKEN] [--domain DOMAIN] [--output OUTPUT] start end
or
usage: poetry run python -m pangea.dump_audit [-h] [--token TOKEN] [--domain DOMAIN] [--output OUTPUT] start end
Pangea Audit Dump Tool
positional arguments:
start Start timestamp. Supports a variety of formats, including ISO-8601
end End timestamp. Supports a variety of formats, including ISO-8601
options:
-h, --help show this help message and exit
--token TOKEN, -t TOKEN
Pangea token (default: env PANGEA_TOKEN)
--domain DOMAIN, -d DOMAIN
Pangea base domain (default: env PANGEA_DOMAIN)
--output OUTPUT, -o OUTPUT
Output file name. Default: dump-<timestamp>
Perform Exhaustive Verification of Audit Data
This script performs extensive verification on a range of events of the log stream. Appart from verifying the hash and the membership proof, it checks that there is no omissions in the stream, i.e. all the events are present and properly located.
usage: python -m pangea.deep_verify [-h] [--token TOKEN] [--domain DOMAIN] --file FILE
or
usage: poetry run python -m pangea.deep_verify [-h] [--token TOKEN] [--domain DOMAIN] --file FILE
Pangea Audit Event Deep Verifier
options:
-h, --help show this help message and exit
--token TOKEN, -t TOKEN
Pangea token (default: env PANGEA_TOKEN)
--domain DOMAIN, -d DOMAIN
Pangea base domain (default: env PANGEA_DOMAIN)
--file FILE, -f FILE Event input file. Must be a collection of JSON Objects separated by newlines
It accepts multiple file formats:
- a Verification Artifact from the Pangea User Console
- a file generated by the
dump_audit
command - a search response from the REST API (see
verify_audit
)
Contributing
Currently, the setup scripts only have support for Mac/ZSH environments. Future support is incoming.
To install our linters, simply run ./dev/setup_repo.sh
These linters will run on every git commit
operation.
Generate SDK Documentation
Overview
Throughout the SDK, there are Python doc strings that serve as the source of our SDK docs.
The documentation pipeline here looks like:
- Write doc strings throughout your Python code. Please refer to existing doc strings as an example of what and how to document.
- Make your pull request.
- After the pull request is merged, go ahead and run the
parse_module.py
script to generate the JSON docs uses for rendering. - Copy the output from
parse_module.py
and overwrite the existingpython_sdk.json
file in the docs repo. File is located inplatform/docs/openapi/python_sdk.json
in the Pangea monorepo. Save this and make a merge request to update the Python SDK docs in the Pangea monorepo.
Running the autogen sdk doc script
Make sure you have all the dependencies installed. From the root of the pangea-sdk
package in the pangea-python
repo run:
poetry install
Now run the script
poetry run python parse_module.py
That will output the script in the terminal. If you're on a mac, you can do
poetry run python parse_module.py | pbcopy
to copy the output from the script into your clipboard. At the moment, a bunch of stuff will be printed to the terminal if you pipe it to pbcopy
, but the script still works and copies the output to your clipboard.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file pangea_sdk-1.8.0.tar.gz
.
File metadata
- Download URL: pangea_sdk-1.8.0.tar.gz
- Upload date:
- Size: 51.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.4.2 CPython/3.7.16 Linux/5.10.0-21-cloud-amd64
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | baa387fc752f1cb4ddfdb560e71e559f0ccf8d207bfe6ff90076f07297073ced |
|
MD5 | b74117c21537e361d182146c5b3ac95a |
|
BLAKE2b-256 | 82c8a25209e5f4ba62705fa5bcfd7ddd62f6621934d2bf407e525b098641de0c |
File details
Details for the file pangea_sdk-1.8.0-py3-none-any.whl
.
File metadata
- Download URL: pangea_sdk-1.8.0-py3-none-any.whl
- Upload date:
- Size: 61.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: poetry/1.4.2 CPython/3.7.16 Linux/5.10.0-21-cloud-amd64
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 6d2b2393494c63a6988b1683fc2102a094dd897160f9866266439b5e32c3ef98 |
|
MD5 | b8c650fea965f941cff86840f2868df2 |
|
BLAKE2b-256 | ab31ab3a744890adda3b4244a5424198d31f79bc3b148f6c460e24c836bbd611 |