2018-07-03 13:00:18 +02:00
|
|
|
import datetime as dt
|
|
|
|
|
|
|
|
import pytest
|
|
|
|
import pytz
|
|
|
|
|
|
|
|
import stix2
|
|
|
|
|
2019-01-29 16:52:59 +01:00
|
|
|
from .constants import COURSE_OF_ACTION_ID, IDENTITY_ID
|
2018-07-03 13:00:18 +02:00
|
|
|
|
|
|
|
EXPECTED = """{
|
|
|
|
"type": "course-of-action",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "course-of-action--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f",
|
2019-01-29 16:52:59 +01:00
|
|
|
"created_by_ref": "identity--311b2d2d-f010-4473-83ec-1edf84858f4c",
|
2018-07-03 13:00:18 +02:00
|
|
|
"created": "2016-04-06T20:03:48.000Z",
|
|
|
|
"modified": "2016-04-06T20:03:48.000Z",
|
|
|
|
"name": "Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter",
|
|
|
|
"description": "This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ..."
|
|
|
|
}"""
|
|
|
|
|
|
|
|
|
|
|
|
def test_course_of_action_example():
|
2018-07-03 15:40:51 +02:00
|
|
|
coa = stix2.v21.CourseOfAction(
|
2019-01-23 16:56:20 +01:00
|
|
|
id=COURSE_OF_ACTION_ID,
|
2019-01-29 16:52:59 +01:00
|
|
|
created_by_ref=IDENTITY_ID,
|
2018-07-03 13:00:18 +02:00
|
|
|
created="2016-04-06T20:03:48.000Z",
|
|
|
|
modified="2016-04-06T20:03:48.000Z",
|
|
|
|
name="Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter",
|
2018-07-13 17:10:05 +02:00
|
|
|
description="This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ...",
|
2018-07-03 13:00:18 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
assert str(coa) == EXPECTED
|
|
|
|
|
|
|
|
|
2018-07-13 17:10:05 +02:00
|
|
|
@pytest.mark.parametrize(
|
|
|
|
"data", [
|
|
|
|
EXPECTED,
|
|
|
|
{
|
|
|
|
"created": "2016-04-06T20:03:48.000Z",
|
2019-01-29 16:52:59 +01:00
|
|
|
"created_by_ref": IDENTITY_ID,
|
2018-07-13 17:10:05 +02:00
|
|
|
"description": "This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ...",
|
2019-01-23 16:56:20 +01:00
|
|
|
"id": COURSE_OF_ACTION_ID,
|
2018-07-13 17:10:05 +02:00
|
|
|
"modified": "2016-04-06T20:03:48.000Z",
|
|
|
|
"name": "Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"type": "course-of-action",
|
|
|
|
},
|
|
|
|
],
|
|
|
|
)
|
2018-07-03 13:00:18 +02:00
|
|
|
def test_parse_course_of_action(data):
|
2018-07-03 15:40:51 +02:00
|
|
|
coa = stix2.parse(data, version="2.1")
|
2018-07-03 13:00:18 +02:00
|
|
|
|
|
|
|
assert coa.type == 'course-of-action'
|
2018-07-03 15:40:51 +02:00
|
|
|
assert coa.spec_version == '2.1'
|
2018-07-03 13:00:18 +02:00
|
|
|
assert coa.id == COURSE_OF_ACTION_ID
|
|
|
|
assert coa.created == dt.datetime(2016, 4, 6, 20, 3, 48, tzinfo=pytz.utc)
|
|
|
|
assert coa.modified == dt.datetime(2016, 4, 6, 20, 3, 48, tzinfo=pytz.utc)
|
2019-01-29 16:52:59 +01:00
|
|
|
assert coa.created_by_ref == IDENTITY_ID
|
2018-07-03 13:00:18 +02:00
|
|
|
assert coa.description == "This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ..."
|
|
|
|
assert coa.name == "Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter"
|
|
|
|
|
|
|
|
# TODO: Add other examples
|