123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494 |
- package apiclient
- import (
- "context"
- "fmt"
- "net/http"
- "net/url"
- "reflect"
- "testing"
- "github.com/crowdsecurity/crowdsec/pkg/cwversion"
- "github.com/crowdsecurity/crowdsec/pkg/models"
- log "github.com/sirupsen/logrus"
- "github.com/stretchr/testify/assert"
- "github.com/stretchr/testify/require"
- )
- func TestAlertsListAsMachine(t *testing.T) {
- log.SetLevel(log.DebugLevel)
- mux, urlx, teardown := setup()
- mux.HandleFunc("/watchers/login", func(w http.ResponseWriter, r *http.Request) {
- w.WriteHeader(http.StatusOK)
- w.Write([]byte(`{"code": 200, "expire": "2030-01-02T15:04:05Z", "token": "oklol"}`))
- })
- log.Printf("URL is %s", urlx)
- apiURL, err := url.Parse(urlx + "/")
- if err != nil {
- log.Fatalf("parsing api url: %s", apiURL)
- }
- client, err := NewClient(&Config{
- MachineID: "test_login",
- Password: "test_password",
- UserAgent: fmt.Sprintf("crowdsec/%s", cwversion.VersionStr()),
- URL: apiURL,
- VersionPrefix: "v1",
- })
- if err != nil {
- log.Fatalf("new api client: %s", err)
- }
- defer teardown()
- mux.HandleFunc("/alerts", func(w http.ResponseWriter, r *http.Request) {
- if r.URL.RawQuery == "ip=1.2.3.4" {
- testMethod(t, r, "GET")
- w.WriteHeader(http.StatusOK)
- fmt.Fprintf(w, `null`)
- return
- }
- testMethod(t, r, "GET")
- w.WriteHeader(http.StatusOK)
- fmt.Fprint(w, `[
- {"capacity":5,"created_at":"2020-11-28T10:20:47+01:00",
- "decisions":[
- {"duration":"59m49.264032632s",
- "id":1,
- "origin":"crowdsec",
- "scenario":"crowdsecurity/ssh-bf",
- "scope":"Ip",
- "simulated":false,
- "type":"ban",
- "value":"1.1.1.172"}
- ],
- "events":[
- {"meta":[
- {"key":"target_user","value":"netflix"},
- {"key":"service","value":"ssh"}
- ],
- "timestamp":"2020-11-28 10:20:46 +0000 UTC"},
- {"meta":[
- {"key":"target_user","value":"netflix"},
- {"key":"service","value":"ssh"}
- ],
- "timestamp":"2020-11-28 10:20:46 +0000 UTC"}
- ],
- "events_count":6,
- "id":1,
- "labels":null,
- "leakspeed":"10s",
- "machine_id":"test",
- "message":"Ip 1.1.1.172 performed 'crowdsecurity/ssh-bf' (6 events over 2.920062ms) at 2020-11-28 10:20:46.845619968 +0100 CET m=+5.903899761",
- "scenario":"crowdsecurity/ssh-bf",
- "scenario_hash":"4441dcff07020f6690d998b7101e642359ba405c2abb83565bbbdcee36de280f",
- "scenario_version":"0.1",
- "simulated":false,
- "source":{
- "as_name":"Cloudflare Inc",
- "cn":"AU",
- "ip":"1.1.1.172",
- "latitude":-37.7,
- "longitude":145.1833,
- "range":"1.1.1.0/24",
- "scope":"Ip",
- "value":"1.1.1.172"
- },
- "start_at":"2020-11-28 10:20:46.842701127 +0100 +0100",
- "stop_at":"2020-11-28 10:20:46.845621385 +0100 +0100"
- }
- ]`)
- })
- tcapacity := int32(5)
- tduration := "59m49.264032632s"
- torigin := "crowdsec"
- tscenario := "crowdsecurity/ssh-bf"
- tscope := "Ip"
- ttype := "ban"
- tvalue := "1.1.1.172"
- ttimestamp := "2020-11-28 10:20:46 +0000 UTC"
- teventscount := int32(6)
- tleakspeed := "10s"
- tmessage := "Ip 1.1.1.172 performed 'crowdsecurity/ssh-bf' (6 events over 2.920062ms) at 2020-11-28 10:20:46.845619968 +0100 CET m=+5.903899761"
- tscenariohash := "4441dcff07020f6690d998b7101e642359ba405c2abb83565bbbdcee36de280f"
- tscenarioversion := "0.1"
- tstartat := "2020-11-28 10:20:46.842701127 +0100 +0100"
- tstopat := "2020-11-28 10:20:46.845621385 +0100 +0100"
- expected := models.GetAlertsResponse{
- &models.Alert{
- Capacity: &tcapacity,
- CreatedAt: "2020-11-28T10:20:47+01:00",
- Decisions: []*models.Decision{
- &models.Decision{
- Duration: &tduration,
- ID: 1,
- Origin: &torigin,
- Scenario: &tscenario,
- Scope: &tscope,
- Simulated: new(bool), //false,
- Type: &ttype,
- Value: &tvalue,
- },
- },
- Events: []*models.Event{
- &models.Event{
- Meta: models.Meta{
- &models.MetaItems0{
- Key: "target_user",
- Value: "netflix",
- },
- &models.MetaItems0{
- Key: "service",
- Value: "ssh",
- },
- },
- Timestamp: &ttimestamp,
- },
- &models.Event{
- Meta: models.Meta{
- &models.MetaItems0{
- Key: "target_user",
- Value: "netflix",
- },
- &models.MetaItems0{
- Key: "service",
- Value: "ssh",
- },
- },
- Timestamp: &ttimestamp,
- },
- },
- EventsCount: &teventscount,
- ID: 1,
- Leakspeed: &tleakspeed,
- MachineID: "test",
- Message: &tmessage,
- Remediation: false,
- Scenario: &tscenario,
- ScenarioHash: &tscenariohash,
- ScenarioVersion: &tscenarioversion,
- Simulated: new(bool), //(false),
- Source: &models.Source{
- AsName: "Cloudflare Inc",
- AsNumber: "",
- Cn: "AU",
- IP: "1.1.1.172",
- Latitude: -37.7,
- Longitude: 145.1833,
- Range: "1.1.1.0/24",
- Scope: &tscope,
- Value: &tvalue,
- },
- StartAt: &tstartat,
- StopAt: &tstopat,
- },
- }
- //log.Debugf("data : -> %s", spew.Sdump(alerts))
- //log.Debugf("resp : -> %s", spew.Sdump(resp))
- //log.Debugf("expected : -> %s", spew.Sdump(expected))
- //first one returns data
- alerts, resp, err := client.Alerts.List(context.Background(), AlertsListOpts{})
- if err != nil {
- log.Errorf("test Unable to list alerts : %+v", err)
- }
- if resp.Response.StatusCode != http.StatusOK {
- t.Errorf("Alerts.List returned status: %d, want %d", resp.Response.StatusCode, http.StatusOK)
- }
- if !reflect.DeepEqual(*alerts, expected) {
- t.Errorf("client.Alerts.List returned %+v, want %+v", resp, expected)
- }
- //this one doesn't
- filter := AlertsListOpts{IPEquals: new(string)}
- *filter.IPEquals = "1.2.3.4"
- alerts, resp, err = client.Alerts.List(context.Background(), filter)
- if err != nil {
- log.Errorf("test Unable to list alerts : %+v", err)
- }
- if resp.Response.StatusCode != http.StatusOK {
- t.Errorf("Alerts.List returned status: %d, want %d", resp.Response.StatusCode, http.StatusOK)
- }
- assert.Equal(t, 0, len(*alerts))
- }
- func TestAlertsGetAsMachine(t *testing.T) {
- log.SetLevel(log.DebugLevel)
- mux, urlx, teardown := setup()
- mux.HandleFunc("/watchers/login", func(w http.ResponseWriter, r *http.Request) {
- w.WriteHeader(http.StatusOK)
- w.Write([]byte(`{"code": 200, "expire": "2030-01-02T15:04:05Z", "token": "oklol"}`))
- })
- log.Printf("URL is %s", urlx)
- apiURL, err := url.Parse(urlx + "/")
- if err != nil {
- log.Fatalf("parsing api url: %s", apiURL)
- }
- client, err := NewClient(&Config{
- MachineID: "test_login",
- Password: "test_password",
- UserAgent: fmt.Sprintf("crowdsec/%s", cwversion.VersionStr()),
- URL: apiURL,
- VersionPrefix: "v1",
- })
- if err != nil {
- log.Fatalf("new api client: %s", err)
- }
- defer teardown()
- mux.HandleFunc("/alerts/2", func(w http.ResponseWriter, r *http.Request) {
- testMethod(t, r, "GET")
- w.WriteHeader(http.StatusNotFound)
- fmt.Fprintf(w, `{"message":"object not found"}`)
- })
- mux.HandleFunc("/alerts/1", func(w http.ResponseWriter, r *http.Request) {
- testMethod(t, r, "GET")
- w.WriteHeader(http.StatusOK)
- fmt.Fprint(w, `{"capacity":5,"created_at":"2020-11-28T10:20:47+01:00",
- "decisions":[
- {"duration":"59m49.264032632s",
- "end_ip":16843180,
- "id":1,
- "origin":"crowdsec",
- "scenario":"crowdsecurity/ssh-bf",
- "scope":"Ip",
- "simulated":false,
- "start_ip":16843180,
- "type":"ban",
- "value":"1.1.1.172"}
- ],
- "events":[
- {"meta":[
- {"key":"target_user","value":"netflix"},
- {"key":"service","value":"ssh"}
- ],
- "timestamp":"2020-11-28 10:20:46 +0000 UTC"},
- {"meta":[
- {"key":"target_user","value":"netflix"},
- {"key":"service","value":"ssh"}
- ],
- "timestamp":"2020-11-28 10:20:46 +0000 UTC"}
- ],
- "events_count":6,
- "id":1,
- "labels":null,
- "leakspeed":"10s",
- "machine_id":"test",
- "message":"Ip 1.1.1.172 performed 'crowdsecurity/ssh-bf' (6 events over 2.920062ms) at 2020-11-28 10:20:46.845619968 +0100 CET m=+5.903899761",
- "scenario":"crowdsecurity/ssh-bf",
- "scenario_hash":"4441dcff07020f6690d998b7101e642359ba405c2abb83565bbbdcee36de280f",
- "scenario_version":"0.1",
- "simulated":false,
- "source":{
- "as_name":"Cloudflare Inc",
- "cn":"AU",
- "ip":"1.1.1.172",
- "latitude":-37.7,
- "longitude":145.1833,
- "range":"1.1.1.0/24",
- "scope":"Ip",
- "value":"1.1.1.172"
- },
- "start_at":"2020-11-28 10:20:46.842701127 +0100 +0100",
- "stop_at":"2020-11-28 10:20:46.845621385 +0100 +0100"
- }`)
- })
- tcapacity := int32(5)
- tduration := "59m49.264032632s"
- torigin := "crowdsec"
- tscenario := "crowdsecurity/ssh-bf"
- tscope := "Ip"
- ttype := "ban"
- tvalue := "1.1.1.172"
- ttimestamp := "2020-11-28 10:20:46 +0000 UTC"
- teventscount := int32(6)
- tleakspeed := "10s"
- tmessage := "Ip 1.1.1.172 performed 'crowdsecurity/ssh-bf' (6 events over 2.920062ms) at 2020-11-28 10:20:46.845619968 +0100 CET m=+5.903899761"
- tscenariohash := "4441dcff07020f6690d998b7101e642359ba405c2abb83565bbbdcee36de280f"
- tscenarioversion := "0.1"
- tstartat := "2020-11-28 10:20:46.842701127 +0100 +0100"
- tstopat := "2020-11-28 10:20:46.845621385 +0100 +0100"
- expected := &models.Alert{
- Capacity: &tcapacity,
- CreatedAt: "2020-11-28T10:20:47+01:00",
- Decisions: []*models.Decision{
- &models.Decision{
- Duration: &tduration,
- ID: 1,
- Origin: &torigin,
- Scenario: &tscenario,
- Scope: &tscope,
- Simulated: new(bool), //false,
- Type: &ttype,
- Value: &tvalue,
- },
- },
- Events: []*models.Event{
- &models.Event{
- Meta: models.Meta{
- &models.MetaItems0{
- Key: "target_user",
- Value: "netflix",
- },
- &models.MetaItems0{
- Key: "service",
- Value: "ssh",
- },
- },
- Timestamp: &ttimestamp,
- },
- &models.Event{
- Meta: models.Meta{
- &models.MetaItems0{
- Key: "target_user",
- Value: "netflix",
- },
- &models.MetaItems0{
- Key: "service",
- Value: "ssh",
- },
- },
- Timestamp: &ttimestamp,
- },
- },
- EventsCount: &teventscount,
- ID: 1,
- Leakspeed: &tleakspeed,
- MachineID: "test",
- Message: &tmessage,
- Remediation: false,
- Scenario: &tscenario,
- ScenarioHash: &tscenariohash,
- ScenarioVersion: &tscenarioversion,
- Simulated: new(bool), //(false),
- Source: &models.Source{
- AsName: "Cloudflare Inc",
- AsNumber: "",
- Cn: "AU",
- IP: "1.1.1.172",
- Latitude: -37.7,
- Longitude: 145.1833,
- Range: "1.1.1.0/24",
- Scope: &tscope,
- Value: &tvalue,
- },
- StartAt: &tstartat,
- StopAt: &tstopat,
- }
- alerts, resp, err := client.Alerts.GetByID(context.Background(), 1)
- require.NoError(t, err)
- if resp.Response.StatusCode != http.StatusOK {
- t.Errorf("Alerts.List returned status: %d, want %d", resp.Response.StatusCode, http.StatusOK)
- }
- if !reflect.DeepEqual(*alerts, *expected) {
- t.Errorf("client.Alerts.List returned %+v, want %+v", resp, expected)
- }
- //fail
- _, resp, err = client.Alerts.GetByID(context.Background(), 2)
- assert.Contains(t, fmt.Sprintf("%s", err), "API error: object not found")
- }
- func TestAlertsCreateAsMachine(t *testing.T) {
- log.SetLevel(log.DebugLevel)
- mux, urlx, teardown := setup()
- mux.HandleFunc("/watchers/login", func(w http.ResponseWriter, r *http.Request) {
- w.WriteHeader(http.StatusOK)
- w.Write([]byte(`{"code": 200, "expire": "2030-01-02T15:04:05Z", "token": "oklol"}`))
- })
- mux.HandleFunc("/alerts", func(w http.ResponseWriter, r *http.Request) {
- testMethod(t, r, "POST")
- w.WriteHeader(http.StatusOK)
- w.Write([]byte(`["3"]`))
- })
- log.Printf("URL is %s", urlx)
- apiURL, err := url.Parse(urlx + "/")
- if err != nil {
- log.Fatalf("parsing api url: %s", apiURL)
- }
- client, err := NewClient(&Config{
- MachineID: "test_login",
- Password: "test_password",
- UserAgent: fmt.Sprintf("crowdsec/%s", cwversion.VersionStr()),
- URL: apiURL,
- VersionPrefix: "v1",
- })
- if err != nil {
- log.Fatalf("new api client: %s", err)
- }
- defer teardown()
- alert := models.AddAlertsRequest{}
- alerts, resp, err := client.Alerts.Add(context.Background(), alert)
- require.NoError(t, err)
- expected := &models.AddAlertsResponse{"3"}
- if resp.Response.StatusCode != http.StatusOK {
- t.Errorf("Alerts.List returned status: %d, want %d", resp.Response.StatusCode, http.StatusOK)
- }
- if !reflect.DeepEqual(*alerts, *expected) {
- t.Errorf("client.Alerts.List returned %+v, want %+v", resp, expected)
- }
- }
- func TestAlertsDeleteAsMachine(t *testing.T) {
- log.SetLevel(log.DebugLevel)
- mux, urlx, teardown := setup()
- mux.HandleFunc("/watchers/login", func(w http.ResponseWriter, r *http.Request) {
- w.WriteHeader(http.StatusOK)
- w.Write([]byte(`{"code": 200, "expire": "2030-01-02T15:04:05Z", "token": "oklol"}`))
- })
- mux.HandleFunc("/alerts", func(w http.ResponseWriter, r *http.Request) {
- testMethod(t, r, "DELETE")
- assert.Equal(t, r.URL.RawQuery, "ip=1.2.3.4")
- w.WriteHeader(http.StatusOK)
- w.Write([]byte(`{"message":"0 deleted alerts"}`))
- })
- log.Printf("URL is %s", urlx)
- apiURL, err := url.Parse(urlx + "/")
- if err != nil {
- log.Fatalf("parsing api url: %s", apiURL)
- }
- client, err := NewClient(&Config{
- MachineID: "test_login",
- Password: "test_password",
- UserAgent: fmt.Sprintf("crowdsec/%s", cwversion.VersionStr()),
- URL: apiURL,
- VersionPrefix: "v1",
- })
- if err != nil {
- log.Fatalf("new api client: %s", err)
- }
- defer teardown()
- alert := AlertsDeleteOpts{IPEquals: new(string)}
- *alert.IPEquals = "1.2.3.4"
- alerts, resp, err := client.Alerts.Delete(context.Background(), alert)
- require.NoError(t, err)
- expected := &models.DeleteAlertsResponse{""}
- if resp.Response.StatusCode != http.StatusOK {
- t.Errorf("Alerts.List returned status: %d, want %d", resp.Response.StatusCode, http.StatusOK)
- }
- if !reflect.DeepEqual(*alerts, *expected) {
- t.Errorf("client.Alerts.List returned %+v, want %+v", resp, expected)
- }
- }
|