2019-06-27 03:01:41 +02:00
|
|
|
import json
|
2018-07-03 13:00:18 +02:00
|
|
|
|
|
|
|
import pytest
|
|
|
|
|
|
|
|
import stix2
|
2019-06-12 00:10:02 +02:00
|
|
|
import stix2.exceptions
|
2019-06-27 03:01:41 +02:00
|
|
|
import stix2.utils
|
2018-07-03 13:00:18 +02:00
|
|
|
|
2019-06-27 03:01:41 +02:00
|
|
|
COA_WITH_BIN_JSON = """{
|
2018-07-03 13:00:18 +02:00
|
|
|
"type": "course-of-action",
|
2020-02-24 18:09:11 +01:00
|
|
|
"spec_version": "2.1",
|
2018-07-03 13:00:18 +02:00
|
|
|
"id": "course-of-action--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f",
|
2019-01-29 16:52:59 +01:00
|
|
|
"created_by_ref": "identity--311b2d2d-f010-4473-83ec-1edf84858f4c",
|
2018-07-03 13:00:18 +02:00
|
|
|
"created": "2016-04-06T20:03:48.000Z",
|
|
|
|
"modified": "2016-04-06T20:03:48.000Z",
|
|
|
|
"name": "Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter",
|
2020-02-19 15:34:23 +01:00
|
|
|
"description": "This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ..."
|
2018-07-03 13:00:18 +02:00
|
|
|
}"""
|
|
|
|
|
|
|
|
|
2019-06-27 03:01:41 +02:00
|
|
|
COA_WITH_REF_JSON = """{
|
|
|
|
"type": "course-of-action",
|
2020-02-24 18:09:11 +01:00
|
|
|
"spec_version": "2.1",
|
2019-06-27 03:01:41 +02:00
|
|
|
"id": "course-of-action--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f",
|
|
|
|
"created_by_ref": "identity--311b2d2d-f010-4473-83ec-1edf84858f4c",
|
|
|
|
"created": "2016-04-06T20:03:48.000Z",
|
|
|
|
"modified": "2016-04-06T20:03:48.000Z",
|
|
|
|
"name": "Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter",
|
2020-02-19 15:34:23 +01:00
|
|
|
"description": "This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ..."
|
2019-06-27 03:01:41 +02:00
|
|
|
}"""
|
|
|
|
|
|
|
|
|
|
|
|
COA_WITH_BIN_DICT = json.loads(COA_WITH_BIN_JSON)
|
|
|
|
COA_WITH_REF_DICT = json.loads(COA_WITH_REF_JSON)
|
2018-07-03 13:00:18 +02:00
|
|
|
|
2019-06-27 03:01:41 +02:00
|
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
|
|
"sdo_json,sdo_dict", [
|
|
|
|
(COA_WITH_BIN_JSON, COA_WITH_BIN_DICT),
|
|
|
|
(COA_WITH_REF_JSON, COA_WITH_REF_DICT),
|
|
|
|
],
|
|
|
|
)
|
|
|
|
def test_course_of_action_example(sdo_json, sdo_dict):
|
|
|
|
coa = stix2.v21.CourseOfAction(**sdo_dict)
|
|
|
|
assert str(coa) == sdo_json
|
2018-07-03 13:00:18 +02:00
|
|
|
|
|
|
|
|
2018-07-13 17:10:05 +02:00
|
|
|
@pytest.mark.parametrize(
|
2019-06-27 03:01:41 +02:00
|
|
|
"sdo_json,sdo_dict", [
|
|
|
|
(COA_WITH_BIN_JSON, COA_WITH_BIN_DICT),
|
|
|
|
(COA_WITH_REF_JSON, COA_WITH_REF_DICT),
|
2018-07-13 17:10:05 +02:00
|
|
|
],
|
|
|
|
)
|
2019-06-27 03:01:41 +02:00
|
|
|
def test_parse_course_of_action(sdo_json, sdo_dict):
|
|
|
|
|
|
|
|
# Names of timestamp-valued attributes
|
|
|
|
ts_attrs = {"created", "modified"}
|
|
|
|
|
|
|
|
for data in (sdo_json, sdo_dict):
|
|
|
|
coa = stix2.parse(data, version="2.1")
|
|
|
|
|
|
|
|
# sdo_dict is handy as a source of attribute names/values to check
|
|
|
|
for attr_name, attr_value in sdo_dict.items():
|
|
|
|
cmp_value = stix2.utils.parse_into_datetime(attr_value) \
|
|
|
|
if attr_name in ts_attrs else attr_value
|
|
|
|
|
|
|
|
assert getattr(coa, attr_name) == cmp_value
|
2019-06-12 00:10:02 +02:00
|
|
|
|
|
|
|
|
2018-07-03 13:00:18 +02:00
|
|
|
# TODO: Add other examples
|