Implements production-ready MSP platform with cross-machine persistent memory for Claude. API Implementation: - 130 REST API endpoints across 21 entities - JWT authentication on all endpoints - AES-256-GCM encryption for credentials - Automatic audit logging - Complete OpenAPI documentation Database: - 43 tables in MariaDB (172.16.3.20:3306) - 42 SQLAlchemy models with modern 2.0 syntax - Full Alembic migration system - 99.1% CRUD test pass rate Context Recall System (Phase 6): - Cross-machine persistent memory via database - Automatic context injection via Claude Code hooks - Automatic context saving after task completion - 90-95% token reduction with compression utilities - Relevance scoring with time decay - Tag-based semantic search - One-command setup script Security Features: - JWT tokens with Argon2 password hashing - AES-256-GCM encryption for all sensitive data - Comprehensive audit trail for credentials - HMAC tamper detection - Secure configuration management Test Results: - Phase 3: 38/38 CRUD tests passing (100%) - Phase 4: 34/35 core API tests passing (97.1%) - Phase 5: 62/62 extended API tests passing (100%) - Phase 6: 10/10 compression tests passing (100%) - Overall: 144/145 tests passing (99.3%) Documentation: - Comprehensive architecture guides - Setup automation scripts - API documentation at /api/docs - Complete test reports - Troubleshooting guides Project Status: 95% Complete (Production-Ready) Phase 7 (optional work context APIs) remains for future enhancement. Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
61 lines
3.2 KiB
Python
61 lines
3.2 KiB
Python
"""
|
|
Pydantic schemas for SecurityIncident model.
|
|
|
|
Request and response schemas for security incident tracking.
|
|
"""
|
|
|
|
from datetime import datetime
|
|
from typing import Optional
|
|
from uuid import UUID
|
|
|
|
from pydantic import BaseModel, Field
|
|
|
|
|
|
class SecurityIncidentBase(BaseModel):
|
|
"""Base schema with shared SecurityIncident fields."""
|
|
|
|
client_id: Optional[UUID] = Field(None, description="Reference to affected client")
|
|
service_id: Optional[UUID] = Field(None, description="Reference to affected service")
|
|
infrastructure_id: Optional[UUID] = Field(None, description="Reference to affected infrastructure")
|
|
incident_type: Optional[str] = Field(None, description="Type of incident: bec, backdoor, malware, unauthorized_access, data_breach, phishing, ransomware, brute_force")
|
|
incident_date: datetime = Field(..., description="When the incident occurred")
|
|
severity: Optional[str] = Field(None, description="Severity level: critical, high, medium, low")
|
|
description: str = Field(..., description="Detailed description of the incident")
|
|
findings: Optional[str] = Field(None, description="Investigation results and findings")
|
|
remediation_steps: Optional[str] = Field(None, description="Steps taken to remediate the incident")
|
|
status: str = Field("investigating", description="Status: investigating, contained, resolved, monitoring")
|
|
resolved_at: Optional[datetime] = Field(None, description="When the incident was resolved")
|
|
notes: Optional[str] = Field(None, description="Additional notes and context")
|
|
|
|
|
|
class SecurityIncidentCreate(SecurityIncidentBase):
|
|
"""Schema for creating a new SecurityIncident."""
|
|
pass
|
|
|
|
|
|
class SecurityIncidentUpdate(BaseModel):
|
|
"""Schema for updating an existing SecurityIncident. All fields are optional."""
|
|
|
|
client_id: Optional[UUID] = Field(None, description="Reference to affected client")
|
|
service_id: Optional[UUID] = Field(None, description="Reference to affected service")
|
|
infrastructure_id: Optional[UUID] = Field(None, description="Reference to affected infrastructure")
|
|
incident_type: Optional[str] = Field(None, description="Type of incident")
|
|
incident_date: Optional[datetime] = Field(None, description="When the incident occurred")
|
|
severity: Optional[str] = Field(None, description="Severity level")
|
|
description: Optional[str] = Field(None, description="Detailed description of the incident")
|
|
findings: Optional[str] = Field(None, description="Investigation results and findings")
|
|
remediation_steps: Optional[str] = Field(None, description="Steps taken to remediate the incident")
|
|
status: Optional[str] = Field(None, description="Status of incident handling")
|
|
resolved_at: Optional[datetime] = Field(None, description="When the incident was resolved")
|
|
notes: Optional[str] = Field(None, description="Additional notes and context")
|
|
|
|
|
|
class SecurityIncidentResponse(SecurityIncidentBase):
|
|
"""Schema for SecurityIncident responses with ID and timestamps."""
|
|
|
|
id: UUID = Field(..., description="Unique identifier for the security incident")
|
|
created_at: datetime = Field(..., description="Timestamp when the incident was created")
|
|
updated_at: datetime = Field(..., description="Timestamp when the incident was last updated")
|
|
|
|
model_config = {"from_attributes": True}
|