mirror of https://github.com/MISP/misp-modules
add: cve_advanced module test + functions to test attributes and objects results
parent
93858e302a
commit
f15ab8162f
|
@ -21,6 +21,14 @@ class TestExpansions(unittest.TestCase):
|
||||||
def misp_modules_post(self, query):
|
def misp_modules_post(self, query):
|
||||||
return requests.post(urljoin(self.url, "query"), json=query)
|
return requests.post(urljoin(self.url, "query"), json=query)
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def get_attribute(reponse):
|
||||||
|
data = response.json()
|
||||||
|
if not isinstance(data, dict):
|
||||||
|
print(json.dumps(data, indent=2))
|
||||||
|
return data
|
||||||
|
return data['results']['Attribute'][0]['type']
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def get_data(response):
|
def get_data(response):
|
||||||
data = response.json()
|
data = response.json()
|
||||||
|
@ -37,6 +45,14 @@ class TestExpansions(unittest.TestCase):
|
||||||
return data
|
return data
|
||||||
return data['error']
|
return data['error']
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def get_object(response):
|
||||||
|
data = response.json()
|
||||||
|
if not isinstance(data, dict):
|
||||||
|
print(json.dumps(data, indent=2))
|
||||||
|
return data
|
||||||
|
return data['results']['Object'][0]['name']
|
||||||
|
|
||||||
@staticmethod
|
@staticmethod
|
||||||
def get_values(response):
|
def get_values(response):
|
||||||
data = response.json()
|
data = response.json()
|
||||||
|
@ -75,6 +91,18 @@ class TestExpansions(unittest.TestCase):
|
||||||
response = self.misp_modules_post(query)
|
response = self.misp_modules_post(query)
|
||||||
self.assertTrue(self.get_values(response).startswith("Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3"))
|
self.assertTrue(self.get_values(response).startswith("Stack-based buffer overflow in Microsoft Office XP SP3, Office 2003 SP3"))
|
||||||
|
|
||||||
|
def test_cve_advanced(self):
|
||||||
|
query = {"module": "cve_advanced",
|
||||||
|
"attribute": {"type": "vulnerability",
|
||||||
|
"value": "CVE-2010-3333",
|
||||||
|
"uuid": "ea89a33b-4ab7-4515-9f02-922a0bee333d"},
|
||||||
|
"config": {}}
|
||||||
|
response = self.misp_modules_post(query)
|
||||||
|
try:
|
||||||
|
self.assertEqual(self.get_object(response), 'vulnerability')
|
||||||
|
except Exception:
|
||||||
|
print(self.get_errors(response))
|
||||||
|
|
||||||
def test_dbl_spamhaus(self):
|
def test_dbl_spamhaus(self):
|
||||||
query = {"module": "dbl_spamhaus", "domain": "totalmateria.net"}
|
query = {"module": "dbl_spamhaus", "domain": "totalmateria.net"}
|
||||||
response = self.misp_modules_post(query)
|
response = self.misp_modules_post(query)
|
||||||
|
|
Loading…
Reference in New Issue