mirror of https://github.com/MISP/PyMISP
new: More test cases, bug fixes
parent
03d8de26f1
commit
739ab41896
|
@ -79,6 +79,12 @@ class AbstractMISP(collections.MutableMapping):
|
|||
super(AbstractMISP, self).__init__()
|
||||
self.__edited = True # As we create a new object, we assume it is edited
|
||||
|
||||
if kwargs.get('force_timestamps') is not None:
|
||||
# Ignore the edited objects and keep the timestamps.
|
||||
self.__force_timestamps = True
|
||||
else:
|
||||
self.__force_timestamps = False
|
||||
|
||||
# List of classes having tags
|
||||
from .mispevent import MISPAttribute, MISPEvent
|
||||
self.__has_tags = (MISPAttribute, MISPEvent)
|
||||
|
@ -136,7 +142,7 @@ class AbstractMISP(collections.MutableMapping):
|
|||
elif isinstance(val, list) and len(val) == 0:
|
||||
continue
|
||||
if attribute == 'timestamp':
|
||||
if self.edited:
|
||||
if not self.__force_timestamps and self.edited:
|
||||
# In order to be accepted by MISP, the timestamp of an object
|
||||
# needs to be either newer, or None.
|
||||
# If the current object is marked as edited, the easiest is to
|
||||
|
|
|
@ -79,6 +79,7 @@ class ExpandedPyMISP(PyMISP):
|
|||
# TODO: Make that thing async & test it.
|
||||
def search(self, controller: str='events', return_format: str='json',
|
||||
value: Optional[SearchParameterTypes]=None,
|
||||
eventinfo: Optional[str]=None,
|
||||
type_attribute: Optional[SearchParameterTypes]=None,
|
||||
category: Optional[SearchParameterTypes]=None,
|
||||
org: Optional[SearchParameterTypes]=None,
|
||||
|
@ -106,6 +107,8 @@ class ExpandedPyMISP(PyMISP):
|
|||
query['returnFormat'] = return_format
|
||||
if value is not None:
|
||||
query['value'] = value
|
||||
if eventinfo is not None:
|
||||
query['eventinfo'] = eventinfo
|
||||
if type_attribute is not None:
|
||||
query['type'] = type_attribute
|
||||
if category is not None:
|
||||
|
@ -128,8 +131,6 @@ class ExpandedPyMISP(PyMISP):
|
|||
query['uuid'] = uuid
|
||||
if published is not None:
|
||||
query['published'] = published
|
||||
if searchall is not None:
|
||||
query['searchall'] = searchall
|
||||
if enforce_warninglist is not None:
|
||||
query['enforceWarninglist'] = enforce_warninglist
|
||||
if enforceWarninglist is not None:
|
||||
|
|
|
@ -357,8 +357,8 @@ class MISPAttribute(AbstractMISP):
|
|||
|
||||
class MISPEvent(AbstractMISP):
|
||||
|
||||
def __init__(self, describe_types=None, strict_validation=False):
|
||||
super(MISPEvent, self).__init__()
|
||||
def __init__(self, describe_types=None, strict_validation=False, **kwargs):
|
||||
super(MISPEvent, self).__init__(**kwargs)
|
||||
ressources_path = os.path.join(os.path.abspath(os.path.dirname(__file__)), 'data')
|
||||
if strict_validation:
|
||||
with open(os.path.join(ressources_path, 'schema.json'), 'rb') as f:
|
||||
|
|
|
@ -1,144 +0,0 @@
|
|||
#!/usr/bin/env python3
|
||||
# -*- coding: utf-8 -*-
|
||||
|
||||
import unittest
|
||||
|
||||
from pymisp import ExpandedPyMISP, MISPEvent, MISPOrganisation, MISPUser, Distribution, ThreatLevel, Analysis
|
||||
|
||||
# from keys import url, key_admin
|
||||
from uuid import uuid4
|
||||
|
||||
|
||||
url = 'http://localhost:8080'
|
||||
key_admin = 'fk5BodCZw8owbscW8pQ4ykMASLeJ4NYhuAbshNjo'
|
||||
|
||||
|
||||
class TestComprehensive(unittest.TestCase):
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
cls.maxDiff = None
|
||||
# Connect as admin
|
||||
cls.admin_misp_connector = ExpandedPyMISP(url, key_admin)
|
||||
# Creates an org
|
||||
org = cls.admin_misp_connector.add_organisation(name='Test Org')
|
||||
cls.test_org = MISPOrganisation()
|
||||
cls.test_org.from_dict(**org)
|
||||
# Creates a user
|
||||
usr = cls.admin_misp_connector.add_user(email='testusr@user.local', org_id=cls.test_org.id, role_id=3)
|
||||
cls.test_usr = MISPUser()
|
||||
cls.test_usr.from_dict(**usr)
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
# Delete user
|
||||
cls.admin_misp_connector.delete_user(user_id=cls.test_usr.id)
|
||||
# Delete org
|
||||
cls.admin_misp_connector.delete_organisation(org_id=cls.test_org.id)
|
||||
|
||||
def create_event_org_only(self):
|
||||
mispevent = MISPEvent()
|
||||
mispevent.info = 'This is a test'
|
||||
mispevent.distribution = Distribution.your_organisation_only
|
||||
mispevent.threat_level_id = ThreatLevel.low
|
||||
mispevent.analysis = Analysis.completed
|
||||
mispevent.set_date("2017-12-31") # test the set date method
|
||||
mispevent.add_attribute('text', str(uuid4()))
|
||||
return mispevent
|
||||
|
||||
def create_event_with_tags(self):
|
||||
mispevent = self.create_event_org_only()
|
||||
mispevent.add_tag('tlp:white___test')
|
||||
mispevent.attributes[0].add_tag('tlp:amber___test')
|
||||
mispevent.add_attribute('text', str(uuid4()))
|
||||
return mispevent
|
||||
|
||||
def test_search_value_event(self):
|
||||
me = self.create_event_org_only()
|
||||
# Create event
|
||||
created_event = self.admin_misp_connector.add_event(me)
|
||||
c_me = MISPEvent()
|
||||
c_me.load(created_event)
|
||||
# Search as admin
|
||||
response = self.admin_misp_connector.search(value=me.attributes[0].value)
|
||||
self.assertEqual(len(response), 1)
|
||||
# Connect as user
|
||||
user_misp_connector = ExpandedPyMISP(url, self.test_usr.authkey)
|
||||
# Search as user
|
||||
response = user_misp_connector.search(value=me.attributes[0].value)
|
||||
self.assertEqual(response, [])
|
||||
# Delete event
|
||||
self.admin_misp_connector.delete_event(c_me.id)
|
||||
|
||||
def test_search_value_attribute(self):
|
||||
me = self.create_event_org_only()
|
||||
# Create event
|
||||
created_event = self.admin_misp_connector.add_event(me)
|
||||
c_me = MISPEvent()
|
||||
c_me.load(created_event)
|
||||
# Search as admin
|
||||
response = self.admin_misp_connector.search(controller='attributes', value=me.attributes[0].value)
|
||||
self.assertEqual(len(response), 1)
|
||||
# Connect as user
|
||||
user_misp_connector = ExpandedPyMISP(url, self.test_usr.authkey)
|
||||
# Search as user
|
||||
response = user_misp_connector.search(controller='attributes', value=me.attributes[0].value)
|
||||
self.assertEqual(response, [])
|
||||
# Delete event
|
||||
self.admin_misp_connector.delete_event(c_me.id)
|
||||
|
||||
def test_search_tag_event(self):
|
||||
me = self.create_event_with_tags()
|
||||
# Create event
|
||||
created_event = self.admin_misp_connector.add_event(me)
|
||||
c_me = MISPEvent()
|
||||
c_me.load(created_event)
|
||||
# Search as admin
|
||||
response = self.admin_misp_connector.search(tags='tlp:white___test')
|
||||
self.assertEqual(len(response), 1)
|
||||
# Connect as user
|
||||
user_misp_connector = ExpandedPyMISP(url, self.test_usr.authkey)
|
||||
# Search as user
|
||||
response = user_misp_connector.search(value='tlp:white___test')
|
||||
self.assertEqual(response, [])
|
||||
# Delete event
|
||||
self.admin_misp_connector.delete_event(c_me.id)
|
||||
|
||||
def test_search_tag_event_fancy(self):
|
||||
# Create event
|
||||
me = self.create_event_with_tags()
|
||||
# Connect as user
|
||||
user_misp_connector = ExpandedPyMISP(url, self.test_usr.authkey)
|
||||
created_event = user_misp_connector.add_event(me)
|
||||
to_delete = MISPEvent()
|
||||
to_delete.load(created_event)
|
||||
complex_query = user_misp_connector.build_complex_query(or_parameters=['tlp:white___test'], not_parameters=['tlp:amber___test'])
|
||||
# Search as user
|
||||
response = user_misp_connector.search(tags=complex_query)
|
||||
for e in response:
|
||||
to_validate = MISPEvent()
|
||||
to_validate.load(e)
|
||||
# FIXME Expected event without the tlp:amber attribute, broken for now
|
||||
for a in to_validate.attributes:
|
||||
print([t for t in a.tags if t.name == 'tlp:amber___test'])
|
||||
# self.assertEqual([t for t in a.tags if t.name == 'tlp:amber___test'], [])
|
||||
# Delete event
|
||||
self.admin_misp_connector.delete_event(to_delete.id)
|
||||
|
||||
# def test_search_tag_attribute(self):
|
||||
# me = self.create_event_with_tags()
|
||||
# # Create event
|
||||
# created_event = self.admin_misp_connector.add_event(me)
|
||||
# c_me = MISPEvent()
|
||||
# c_me.load(created_event)
|
||||
# # Search as admin
|
||||
# response = self.admin_misp_connector.search(controller='attributes', tags='tlp:white__test')
|
||||
# print(response)
|
||||
# self.assertEqual(len(response), 1)
|
||||
# Connect as user
|
||||
# user_misp_connector = ExpandedPyMISP(url, self.test_usr.authkey)
|
||||
# Search as user
|
||||
# response = user_misp_connector.search(controller='attributes', value='tlp:white__test')
|
||||
# self.assertEqual(response, [])
|
||||
# Delete event
|
||||
# self.admin_misp_connector.delete_event(c_me.id)
|
|
@ -0,0 +1,315 @@
|
|||
#!/usr/bin/env python3
|
||||
# -*- coding: utf-8 -*-
|
||||
|
||||
import unittest
|
||||
|
||||
from pymisp import ExpandedPyMISP, MISPEvent, MISPOrganisation, MISPUser, Distribution, ThreatLevel, Analysis
|
||||
from datetime import datetime, timedelta
|
||||
|
||||
import time
|
||||
|
||||
try:
|
||||
from keys import url, key
|
||||
except ImportError:
|
||||
url = 'http://localhost:8080'
|
||||
key = 'fk5BodCZw8owbscW8pQ4ykMASLeJ4NYhuAbshNjo'
|
||||
|
||||
from uuid import uuid4
|
||||
|
||||
|
||||
class TestComprehensive(unittest.TestCase):
|
||||
|
||||
@classmethod
|
||||
def setUpClass(cls):
|
||||
cls.maxDiff = None
|
||||
# Connect as admin
|
||||
cls.admin_misp_connector = ExpandedPyMISP(url, key)
|
||||
# Creates an org
|
||||
org = cls.admin_misp_connector.add_organisation(name='Test Org')
|
||||
cls.test_org = MISPOrganisation()
|
||||
cls.test_org.from_dict(**org)
|
||||
# Creates a user
|
||||
usr = cls.admin_misp_connector.add_user(email='testusr@user.local', org_id=cls.test_org.id, role_id=3)
|
||||
cls.test_usr = MISPUser()
|
||||
cls.test_usr.from_dict(**usr)
|
||||
# Creates a publisher
|
||||
pub = cls.admin_misp_connector.add_user(email='testpub@user.local', org_id=cls.test_org.id, role_id=4)
|
||||
cls.test_pub = MISPUser()
|
||||
cls.test_pub.from_dict(**pub)
|
||||
|
||||
@classmethod
|
||||
def tearDownClass(cls):
|
||||
# Delete publisher
|
||||
cls.admin_misp_connector.delete_user(user_id=cls.test_pub.id)
|
||||
# Delete user
|
||||
cls.admin_misp_connector.delete_user(user_id=cls.test_usr.id)
|
||||
# Delete org
|
||||
cls.admin_misp_connector.delete_organisation(org_id=cls.test_org.id)
|
||||
|
||||
def create_event_org_only(self, force_timestamps=False):
|
||||
mispevent = MISPEvent(force_timestamps=force_timestamps)
|
||||
mispevent.info = 'This is a test'
|
||||
mispevent.distribution = Distribution.your_organisation_only
|
||||
mispevent.threat_level_id = ThreatLevel.low
|
||||
mispevent.analysis = Analysis.completed
|
||||
mispevent.set_date("2017-12-31") # test the set date method
|
||||
mispevent.add_attribute('text', str(uuid4()))
|
||||
return mispevent
|
||||
|
||||
def create_event_with_tags(self):
|
||||
mispevent = self.create_event_org_only()
|
||||
mispevent.add_tag('tlp:white___test')
|
||||
mispevent.attributes[0].add_tag('tlp:amber___test')
|
||||
mispevent.add_attribute('text', str(uuid4()))
|
||||
return mispevent
|
||||
|
||||
def test_search_value_event(self):
|
||||
me = self.create_event_org_only()
|
||||
# Create event
|
||||
try:
|
||||
created_event = self.admin_misp_connector.add_event(me)
|
||||
c_me = MISPEvent()
|
||||
c_me.load(created_event)
|
||||
# Search as admin
|
||||
response = self.admin_misp_connector.search(value=me.attributes[0].value)
|
||||
self.assertEqual(len(response), 1)
|
||||
# Connect as user
|
||||
user_misp_connector = ExpandedPyMISP(url, self.test_usr.authkey)
|
||||
# Search as user
|
||||
response = user_misp_connector.search(value=me.attributes[0].value)
|
||||
self.assertEqual(response, [])
|
||||
finally:
|
||||
# Delete event
|
||||
self.admin_misp_connector.delete_event(c_me.id)
|
||||
|
||||
def test_search_value_attribute(self):
|
||||
me = self.create_event_org_only()
|
||||
# Create event
|
||||
created_event = self.admin_misp_connector.add_event(me)
|
||||
c_me = MISPEvent()
|
||||
c_me.load(created_event)
|
||||
# Search as admin
|
||||
response = self.admin_misp_connector.search(controller='attributes', value=me.attributes[0].value)
|
||||
self.assertEqual(len(response), 1)
|
||||
# Connect as user
|
||||
user_misp_connector = ExpandedPyMISP(url, self.test_usr.authkey)
|
||||
# Search as user
|
||||
response = user_misp_connector.search(controller='attributes', value=me.attributes[0].value)
|
||||
self.assertEqual(response, [])
|
||||
# Delete event
|
||||
self.admin_misp_connector.delete_event(c_me.id)
|
||||
|
||||
def test_search_tag_event(self):
|
||||
me = self.create_event_with_tags()
|
||||
# Create event
|
||||
created_event = self.admin_misp_connector.add_event(me)
|
||||
c_me = MISPEvent()
|
||||
c_me.load(created_event)
|
||||
# Search as admin
|
||||
response = self.admin_misp_connector.search(tags='tlp:white___test')
|
||||
self.assertEqual(len(response), 1)
|
||||
# Connect as user
|
||||
user_misp_connector = ExpandedPyMISP(url, self.test_usr.authkey)
|
||||
# Search as user
|
||||
response = user_misp_connector.search(value='tlp:white___test')
|
||||
self.assertEqual(response, [])
|
||||
# Delete event
|
||||
self.admin_misp_connector.delete_event(c_me.id)
|
||||
|
||||
@unittest.skip("currently failing")
|
||||
def test_search_tag_event_fancy(self):
|
||||
# Create event
|
||||
me = self.create_event_with_tags()
|
||||
# Connect as user
|
||||
user_misp_connector = ExpandedPyMISP(url, self.test_usr.authkey)
|
||||
created_event = user_misp_connector.add_event(me)
|
||||
to_delete = MISPEvent()
|
||||
to_delete.load(created_event)
|
||||
complex_query = user_misp_connector.build_complex_query(or_parameters=['tlp:white___test'], not_parameters=['tlp:amber___test'])
|
||||
# Search as user
|
||||
response = user_misp_connector.search(tags=complex_query)
|
||||
for e in response:
|
||||
to_validate = MISPEvent()
|
||||
to_validate.load(e)
|
||||
# FIXME Expected event without the tlp:amber attribute, broken for now
|
||||
for a in to_validate.attributes:
|
||||
print([t for t in a.tags if t.name == 'tlp:amber___test'])
|
||||
# self.assertEqual([t for t in a.tags if t.name == 'tlp:amber___test'], [])
|
||||
# Delete event
|
||||
self.admin_misp_connector.delete_event(to_delete.id)
|
||||
|
||||
def test_search_timestamp(self):
|
||||
# Creating event 1 - timestamp 5 min ago
|
||||
first = self.create_event_org_only(force_timestamps=True)
|
||||
event_creation_timestamp_first = datetime.now() - timedelta(minutes=5)
|
||||
first.timestamp = event_creation_timestamp_first
|
||||
# Creating event 2 - timestamp 2 min ago
|
||||
second = self.create_event_org_only(force_timestamps=True)
|
||||
event_creation_timestamp_second = datetime.now() - timedelta(minutes=2)
|
||||
second.timestamp = event_creation_timestamp_second
|
||||
# Connect as user
|
||||
user_misp_connector = ExpandedPyMISP(url, self.test_usr.authkey)
|
||||
first_created_event = user_misp_connector.add_event(first)
|
||||
first_to_delete = MISPEvent()
|
||||
first_to_delete.load(first_created_event)
|
||||
second_created_event = user_misp_connector.add_event(second)
|
||||
second_to_delete = MISPEvent()
|
||||
second_to_delete.load(second_created_event)
|
||||
try:
|
||||
# Search as user
|
||||
# # Test - last 4 min
|
||||
response = user_misp_connector.search(timestamp='4m')
|
||||
self.assertEqual(len(response), 1)
|
||||
received_event = MISPEvent()
|
||||
received_event.load(response[0])
|
||||
self.assertEqual(received_event.timestamp.timestamp(), int(event_creation_timestamp_second.timestamp()))
|
||||
|
||||
# # Test 5 sec before timestamp of 2nd event
|
||||
response = user_misp_connector.search(timestamp=(event_creation_timestamp_second.timestamp()))
|
||||
self.assertEqual(len(response), 1)
|
||||
received_event = MISPEvent()
|
||||
received_event.load(response[0])
|
||||
self.assertEqual(received_event.timestamp.timestamp(), int(event_creation_timestamp_second.timestamp()))
|
||||
|
||||
# # Test interval -6 min -> -4 min
|
||||
response = user_misp_connector.search(timestamp=['6m', '4m'])
|
||||
self.assertEqual(len(response), 1)
|
||||
received_event = MISPEvent()
|
||||
received_event.load(response[0])
|
||||
self.assertEqual(received_event.timestamp.timestamp(), int(event_creation_timestamp_first.timestamp()))
|
||||
finally:
|
||||
# Delete event
|
||||
self.admin_misp_connector.delete_event(first_to_delete.id)
|
||||
self.admin_misp_connector.delete_event(second_to_delete.id)
|
||||
|
||||
def test_user_perms(self):
|
||||
first = self.create_event_org_only()
|
||||
first.publish()
|
||||
user_misp_connector = ExpandedPyMISP(url, self.test_usr.authkey)
|
||||
try:
|
||||
# Add event as user, no publish rights
|
||||
first_created_event = user_misp_connector.add_event(first)
|
||||
first_to_delete = MISPEvent()
|
||||
first_to_delete.load(first_created_event)
|
||||
self.assertFalse(first_to_delete.published)
|
||||
# Add event as publisher
|
||||
first_to_delete.publish()
|
||||
publisher_misp_connector = ExpandedPyMISP(url, self.test_pub.authkey)
|
||||
first_created_event = publisher_misp_connector.update(first_to_delete)
|
||||
first_to_delete = MISPEvent()
|
||||
first_to_delete.load(first_created_event)
|
||||
self.assertTrue(first_to_delete.published)
|
||||
finally:
|
||||
# Delete event
|
||||
self.admin_misp_connector.delete_event(first_to_delete.id)
|
||||
|
||||
def test_search_publish_timestamp(self):
|
||||
# Creating event 1
|
||||
first = self.create_event_org_only()
|
||||
first.publish()
|
||||
# Creating event 2
|
||||
second = self.create_event_org_only()
|
||||
second.publish()
|
||||
# Connect as user
|
||||
pub_misp_connector = ExpandedPyMISP(url, self.test_pub.authkey)
|
||||
first_created_event = pub_misp_connector.add_event(first)
|
||||
first_to_delete = MISPEvent()
|
||||
first_to_delete.load(first_created_event)
|
||||
time.sleep(10)
|
||||
second_created_event = pub_misp_connector.add_event(second)
|
||||
second_to_delete = MISPEvent()
|
||||
second_to_delete.load(second_created_event)
|
||||
try:
|
||||
# Test invalid query
|
||||
response = pub_misp_connector.search(publish_timestamp='5x')
|
||||
self.assertEqual(len(response), 0)
|
||||
# Search as user
|
||||
# # Test - last 4 min
|
||||
response = pub_misp_connector.search(publish_timestamp='5s')
|
||||
self.assertEqual(len(response), 1)
|
||||
received_event = MISPEvent()
|
||||
received_event.load(response[0])
|
||||
|
||||
# # Test 5 sec before timestamp of 2nd event
|
||||
response = pub_misp_connector.search(publish_timestamp=(second_to_delete.publish_timestamp.timestamp()))
|
||||
self.assertEqual(len(response), 1)
|
||||
received_event = MISPEvent()
|
||||
received_event.load(response[0])
|
||||
|
||||
# # Test interval -6 min -> -4 min
|
||||
response = pub_misp_connector.search(publish_timestamp=[first_to_delete.publish_timestamp.timestamp() - 5, second_to_delete.publish_timestamp.timestamp() - 5])
|
||||
self.assertEqual(len(response), 1)
|
||||
received_event = MISPEvent()
|
||||
received_event.load(response[0])
|
||||
finally:
|
||||
# Delete event
|
||||
self.admin_misp_connector.delete_event(first_to_delete.id)
|
||||
self.admin_misp_connector.delete_event(second_to_delete.id)
|
||||
|
||||
def test_simple(self):
|
||||
event = self.create_event_org_only()
|
||||
event.info = 'foo bar blah'
|
||||
user_misp_connector = ExpandedPyMISP(url, self.test_usr.authkey)
|
||||
first_created_event = user_misp_connector.add_event(event)
|
||||
first_to_delete = MISPEvent()
|
||||
first_to_delete.load(first_created_event)
|
||||
timeframe = [first_to_delete.timestamp.timestamp() - 5, first_to_delete.timestamp.timestamp() + 5]
|
||||
try:
|
||||
# Search event we just created in multiple ways. Make sure it doesn't catchi it when it shouldn't
|
||||
response = user_misp_connector.search(timestamp=timeframe)
|
||||
self.assertEqual(len(response), 1)
|
||||
response = user_misp_connector.search(timestamp=timeframe, value='nothere')
|
||||
self.assertEqual(len(response), 0)
|
||||
response = user_misp_connector.search(timestamp=timeframe, value=first_to_delete.attributes[0].value)
|
||||
self.assertEqual(len(response), 1)
|
||||
response = user_misp_connector.search(timestamp=[first_to_delete.timestamp.timestamp() - 50, first_to_delete.timestamp.timestamp() - 10], value=first_to_delete.attributes[0].value)
|
||||
self.assertEqual(len(response), 0)
|
||||
# Test return content
|
||||
response = user_misp_connector.search(timestamp=timeframe, metadata=False)
|
||||
self.assertEqual(len(response), 1)
|
||||
t = MISPEvent()
|
||||
t.load(response[0])
|
||||
self.assertEqual(len(t.attributes), 1)
|
||||
response = user_misp_connector.search(timestamp=timeframe, metadata=True)
|
||||
self.assertEqual(len(response), 1)
|
||||
t = MISPEvent()
|
||||
t.load(response[0])
|
||||
self.assertEqual(len(t.attributes), 0)
|
||||
# other things
|
||||
response = user_misp_connector.search(timestamp=timeframe, published=True)
|
||||
self.assertEqual(len(response), 0)
|
||||
response = user_misp_connector.search(timestamp=timeframe, published=False)
|
||||
self.assertEqual(len(response), 1)
|
||||
response = user_misp_connector.search(eventid=first_to_delete.id)
|
||||
self.assertEqual(len(response), 1)
|
||||
response = user_misp_connector.search(uuid=first_to_delete.uuid)
|
||||
self.assertEqual(len(response), 1)
|
||||
response = user_misp_connector.search(org=first_to_delete.orgc_id)
|
||||
self.assertEqual(len(response), 1)
|
||||
# test like search
|
||||
response = user_misp_connector.search(timestamp=timeframe, value='%{}%'.format(first_to_delete.attributes[0].value.split('-')[2]))
|
||||
self.assertEqual(len(response), 1)
|
||||
response = user_misp_connector.search(timestamp=timeframe, eventinfo='%bar blah%')
|
||||
self.assertEqual(len(response), 1)
|
||||
|
||||
finally:
|
||||
# Delete event
|
||||
self.admin_misp_connector.delete_event(first_to_delete.id)
|
||||
|
||||
@unittest.skip("currently failing")
|
||||
def test_search_tag_attribute(self):
|
||||
me = self.create_event_with_tags()
|
||||
# Create event
|
||||
created_event = self.admin_misp_connector.add_event(me)
|
||||
c_me = MISPEvent()
|
||||
c_me.load(created_event)
|
||||
# Search as admin
|
||||
response = self.admin_misp_connector.search(controller='attributes', tags='tlp:white__test')
|
||||
self.assertEqual(len(response), 1)
|
||||
# Connect as user
|
||||
user_misp_connector = ExpandedPyMISP(url, self.test_usr.authkey)
|
||||
# Search as user
|
||||
response = user_misp_connector.search(controller='attributes', value='tlp:white__test')
|
||||
self.assertEqual(response, [])
|
||||
# Delete event
|
||||
self.admin_misp_connector.delete_event(c_me.id)
|
Loading…
Reference in New Issue