2019-06-27 03:01:41 +02:00
|
|
|
import json
|
2018-07-03 13:00:18 +02:00
|
|
|
|
|
|
|
import pytest
|
|
|
|
|
|
|
|
import stix2
|
2019-06-12 00:10:02 +02:00
|
|
|
import stix2.exceptions
|
2019-06-27 03:01:41 +02:00
|
|
|
import stix2.utils
|
2018-07-03 13:00:18 +02:00
|
|
|
|
2019-06-27 03:01:41 +02:00
|
|
|
COA_WITH_BIN_JSON = """{
|
2018-07-03 13:00:18 +02:00
|
|
|
"type": "course-of-action",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "course-of-action--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f",
|
2019-01-29 16:52:59 +01:00
|
|
|
"created_by_ref": "identity--311b2d2d-f010-4473-83ec-1edf84858f4c",
|
2018-07-03 13:00:18 +02:00
|
|
|
"created": "2016-04-06T20:03:48.000Z",
|
|
|
|
"modified": "2016-04-06T20:03:48.000Z",
|
|
|
|
"name": "Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter",
|
2019-06-12 00:10:02 +02:00
|
|
|
"description": "This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ...",
|
|
|
|
"action_type": "textual:text/plain",
|
|
|
|
"os_execution_envs": [
|
|
|
|
"a",
|
|
|
|
"b",
|
|
|
|
"c"
|
|
|
|
],
|
|
|
|
"action_bin": "aGVsbG8gd29ybGQ="
|
2018-07-03 13:00:18 +02:00
|
|
|
}"""
|
|
|
|
|
|
|
|
|
2019-06-27 03:01:41 +02:00
|
|
|
COA_WITH_REF_JSON = """{
|
|
|
|
"type": "course-of-action",
|
|
|
|
"spec_version": "2.1",
|
|
|
|
"id": "course-of-action--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f",
|
|
|
|
"created_by_ref": "identity--311b2d2d-f010-4473-83ec-1edf84858f4c",
|
|
|
|
"created": "2016-04-06T20:03:48.000Z",
|
|
|
|
"modified": "2016-04-06T20:03:48.000Z",
|
|
|
|
"name": "Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter",
|
|
|
|
"description": "This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ...",
|
|
|
|
"action_type": "textual:text/plain",
|
|
|
|
"os_execution_envs": [
|
|
|
|
"a",
|
|
|
|
"b",
|
|
|
|
"c"
|
|
|
|
],
|
|
|
|
"action_reference": {
|
|
|
|
"source_name": "a source",
|
|
|
|
"description": "description of a source"
|
|
|
|
}
|
|
|
|
}"""
|
|
|
|
|
|
|
|
|
|
|
|
COA_WITH_BIN_DICT = json.loads(COA_WITH_BIN_JSON)
|
|
|
|
COA_WITH_REF_DICT = json.loads(COA_WITH_REF_JSON)
|
2018-07-03 13:00:18 +02:00
|
|
|
|
2019-06-27 03:01:41 +02:00
|
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
|
|
"sdo_json,sdo_dict", [
|
|
|
|
(COA_WITH_BIN_JSON, COA_WITH_BIN_DICT),
|
|
|
|
(COA_WITH_REF_JSON, COA_WITH_REF_DICT),
|
|
|
|
],
|
|
|
|
)
|
|
|
|
def test_course_of_action_example(sdo_json, sdo_dict):
|
|
|
|
coa = stix2.v21.CourseOfAction(**sdo_dict)
|
|
|
|
assert str(coa) == sdo_json
|
2018-07-03 13:00:18 +02:00
|
|
|
|
|
|
|
|
2018-07-13 17:10:05 +02:00
|
|
|
@pytest.mark.parametrize(
|
2019-06-27 03:01:41 +02:00
|
|
|
"sdo_json,sdo_dict", [
|
|
|
|
(COA_WITH_BIN_JSON, COA_WITH_BIN_DICT),
|
|
|
|
(COA_WITH_REF_JSON, COA_WITH_REF_DICT),
|
2018-07-13 17:10:05 +02:00
|
|
|
],
|
|
|
|
)
|
2019-06-27 03:01:41 +02:00
|
|
|
def test_parse_course_of_action(sdo_json, sdo_dict):
|
|
|
|
|
|
|
|
# Names of timestamp-valued attributes
|
|
|
|
ts_attrs = {"created", "modified"}
|
|
|
|
|
|
|
|
for data in (sdo_json, sdo_dict):
|
|
|
|
coa = stix2.parse(data, version="2.1")
|
|
|
|
|
|
|
|
# sdo_dict is handy as a source of attribute names/values to check
|
|
|
|
for attr_name, attr_value in sdo_dict.items():
|
|
|
|
cmp_value = stix2.utils.parse_into_datetime(attr_value) \
|
|
|
|
if attr_name in ts_attrs else attr_value
|
|
|
|
|
|
|
|
assert getattr(coa, attr_name) == cmp_value
|
2019-06-12 00:10:02 +02:00
|
|
|
|
|
|
|
|
|
|
|
def test_course_of_action_constraint():
|
|
|
|
with pytest.raises(stix2.exceptions.MutuallyExclusivePropertiesError):
|
|
|
|
stix2.v21.CourseOfAction(
|
|
|
|
name="Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter",
|
|
|
|
action_bin="aGVsbG8gd29ybGQ=",
|
|
|
|
action_reference=stix2.v21.ExternalReference(
|
|
|
|
source_name="a source",
|
2019-06-12 20:49:34 +02:00
|
|
|
description="description of a source",
|
|
|
|
),
|
2019-06-12 00:10:02 +02:00
|
|
|
)
|
2018-07-03 13:00:18 +02:00
|
|
|
|
|
|
|
# TODO: Add other examples
|