Merge pull request #273 from chisholm/update_course_of_action

Update course of action for stix2.1 (again)
master
Chris Lenk 2019-06-28 12:32:14 -04:00 committed by GitHub
commit 953a91ba8e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 59 additions and 51 deletions

View File

@ -1,14 +1,12 @@
import datetime as dt import json
import pytest import pytest
import pytz
import stix2 import stix2
import stix2.exceptions import stix2.exceptions
import stix2.utils
from .constants import COURSE_OF_ACTION_ID, IDENTITY_ID COA_WITH_BIN_JSON = """{
EXPECTED = """{
"type": "course-of-action", "type": "course-of-action",
"spec_version": "2.1", "spec_version": "2.1",
"id": "course-of-action--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f", "id": "course-of-action--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f",
@ -27,54 +25,63 @@ EXPECTED = """{
}""" }"""
def test_course_of_action_example(): COA_WITH_REF_JSON = """{
coa = stix2.v21.CourseOfAction( "type": "course-of-action",
id=COURSE_OF_ACTION_ID, "spec_version": "2.1",
created_by_ref=IDENTITY_ID, "id": "course-of-action--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f",
created="2016-04-06T20:03:48.000Z", "created_by_ref": "identity--311b2d2d-f010-4473-83ec-1edf84858f4c",
modified="2016-04-06T20:03:48.000Z", "created": "2016-04-06T20:03:48.000Z",
name="Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter", "modified": "2016-04-06T20:03:48.000Z",
description="This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ...", "name": "Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter",
action_type="textual:text/plain", "description": "This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ...",
os_execution_envs=["a", "b", "c"], "action_type": "textual:text/plain",
action_bin="aGVsbG8gd29ybGQ=", "os_execution_envs": [
) "a",
"b",
"c"
],
"action_reference": {
"source_name": "a source",
"description": "description of a source"
}
}"""
assert str(coa) == EXPECTED
COA_WITH_BIN_DICT = json.loads(COA_WITH_BIN_JSON)
COA_WITH_REF_DICT = json.loads(COA_WITH_REF_JSON)
@pytest.mark.parametrize( @pytest.mark.parametrize(
"data", [ "sdo_json,sdo_dict", [
EXPECTED, (COA_WITH_BIN_JSON, COA_WITH_BIN_DICT),
{ (COA_WITH_REF_JSON, COA_WITH_REF_DICT),
"created": "2016-04-06T20:03:48.000Z",
"created_by_ref": IDENTITY_ID,
"description": "This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ...",
"id": COURSE_OF_ACTION_ID,
"modified": "2016-04-06T20:03:48.000Z",
"name": "Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter",
"spec_version": "2.1",
"type": "course-of-action",
"action_type": "textual:text/plain",
"os_execution_envs": ["a", "b", "c"],
"action_bin": "aGVsbG8gd29ybGQ=",
},
], ],
) )
def test_parse_course_of_action(data): def test_course_of_action_example(sdo_json, sdo_dict):
coa = stix2.parse(data, version="2.1") coa = stix2.v21.CourseOfAction(**sdo_dict)
assert str(coa) == sdo_json
assert coa.type == 'course-of-action'
assert coa.spec_version == '2.1' @pytest.mark.parametrize(
assert coa.id == COURSE_OF_ACTION_ID "sdo_json,sdo_dict", [
assert coa.created == dt.datetime(2016, 4, 6, 20, 3, 48, tzinfo=pytz.utc) (COA_WITH_BIN_JSON, COA_WITH_BIN_DICT),
assert coa.modified == dt.datetime(2016, 4, 6, 20, 3, 48, tzinfo=pytz.utc) (COA_WITH_REF_JSON, COA_WITH_REF_DICT),
assert coa.created_by_ref == IDENTITY_ID ],
assert coa.description == "This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ..." )
assert coa.name == "Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter" def test_parse_course_of_action(sdo_json, sdo_dict):
assert coa.action_type == "textual:text/plain"
assert coa.os_execution_envs == ["a", "b", "c"] # Names of timestamp-valued attributes
assert coa.action_bin == "aGVsbG8gd29ybGQ=" ts_attrs = {"created", "modified"}
for data in (sdo_json, sdo_dict):
coa = stix2.parse(data, version="2.1")
# sdo_dict is handy as a source of attribute names/values to check
for attr_name, attr_value in sdo_dict.items():
cmp_value = stix2.utils.parse_into_datetime(attr_value) \
if attr_name in ts_attrs else attr_value
assert getattr(coa, attr_name) == cmp_value
def test_course_of_action_constraint(): def test_course_of_action_constraint():

View File

@ -8,9 +8,10 @@ from six.moves.urllib.parse import quote_plus
from ..core import STIXDomainObject from ..core import STIXDomainObject
from ..custom import _custom_object_builder from ..custom import _custom_object_builder
from ..properties import ( from ..properties import (
BooleanProperty, EnumProperty, FloatProperty, IDProperty, IntegerProperty, BinaryProperty, BooleanProperty, EmbeddedObjectProperty, EnumProperty,
ListProperty, ObservableProperty, PatternProperty, ReferenceProperty, FloatProperty, IDProperty, IntegerProperty, ListProperty,
StringProperty, TimestampProperty, TypeProperty, ObservableProperty, PatternProperty, ReferenceProperty, StringProperty,
TimestampProperty, TypeProperty,
) )
from ..utils import NOW from ..utils import NOW
from .common import ExternalReference, GranularMarking, KillChainPhase from .common import ExternalReference, GranularMarking, KillChainPhase
@ -101,8 +102,8 @@ class CourseOfAction(STIXDomainObject):
('description', StringProperty()), ('description', StringProperty()),
('action_type', StringProperty()), ('action_type', StringProperty()),
('os_execution_envs', ListProperty(StringProperty)), ('os_execution_envs', ListProperty(StringProperty)),
('action_bin', StringProperty()), ('action_bin', BinaryProperty()),
('action_reference', StringProperty()), ('action_reference', EmbeddedObjectProperty(ExternalReference)),
('revoked', BooleanProperty(default=lambda: False)), ('revoked', BooleanProperty(default=lambda: False)),
('labels', ListProperty(StringProperty)), ('labels', ListProperty(StringProperty)),
('confidence', IntegerProperty()), ('confidence', IntegerProperty()),