60 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Python
		
	
	
			
		
		
	
	
			60 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Python
		
	
	
| import datetime as dt
 | |
| 
 | |
| import pytest
 | |
| import pytz
 | |
| 
 | |
| import stix2
 | |
| 
 | |
| from .constants import COURSE_OF_ACTION_ID, IDENTITY_ID
 | |
| 
 | |
| EXPECTED = """{
 | |
|     "type": "course-of-action",
 | |
|     "id": "course-of-action--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f",
 | |
|     "created_by_ref": "identity--311b2d2d-f010-4473-83ec-1edf84858f4c",
 | |
|     "created": "2016-04-06T20:03:48.000Z",
 | |
|     "modified": "2016-04-06T20:03:48.000Z",
 | |
|     "name": "Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter",
 | |
|     "description": "This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ..."
 | |
| }"""
 | |
| 
 | |
| 
 | |
| def test_course_of_action_example():
 | |
|     coa = stix2.v20.CourseOfAction(
 | |
|         id=COURSE_OF_ACTION_ID,
 | |
|         created_by_ref=IDENTITY_ID,
 | |
|         created="2016-04-06T20:03:48.000Z",
 | |
|         modified="2016-04-06T20:03:48.000Z",
 | |
|         name="Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter",
 | |
|         description="This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ...",
 | |
|     )
 | |
| 
 | |
|     assert coa.serialize(pretty=True) == EXPECTED
 | |
| 
 | |
| 
 | |
| @pytest.mark.parametrize(
 | |
|     "data", [
 | |
|         EXPECTED,
 | |
|         {
 | |
|             "created": "2016-04-06T20:03:48.000Z",
 | |
|             "created_by_ref": IDENTITY_ID,
 | |
|             "description": "This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ...",
 | |
|             "id": COURSE_OF_ACTION_ID,
 | |
|             "modified": "2016-04-06T20:03:48.000Z",
 | |
|             "name": "Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter",
 | |
|             "type": "course-of-action",
 | |
|         },
 | |
|     ],
 | |
| )
 | |
| def test_parse_course_of_action(data):
 | |
|     coa = stix2.parse(data, version="2.0")
 | |
| 
 | |
|     assert coa.type == 'course-of-action'
 | |
|     assert coa.id == COURSE_OF_ACTION_ID
 | |
|     assert coa.created == dt.datetime(2016, 4, 6, 20, 3, 48, tzinfo=pytz.utc)
 | |
|     assert coa.modified == dt.datetime(2016, 4, 6, 20, 3, 48, tzinfo=pytz.utc)
 | |
|     assert coa.created_by_ref == IDENTITY_ID
 | |
|     assert coa.description == "This is how to add a filter rule to block inbound access to TCP port 80 to the existing UDP 1434 filter ..."
 | |
|     assert coa.name == "Add TCP port 80 Filter Rule to the existing Block UDP 1434 Filter"
 | |
| 
 | |
| # TODO: Add other examples
 |