1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252 |
- package apiserver
- import (
- "bytes"
- "context"
- "encoding/json"
- "fmt"
- "net"
- "net/http"
- "net/url"
- "os"
- "reflect"
- "sync"
- "testing"
- "time"
- "github.com/jarcoal/httpmock"
- "github.com/sirupsen/logrus"
- "github.com/stretchr/testify/assert"
- "github.com/stretchr/testify/require"
- "gopkg.in/tomb.v2"
- "github.com/crowdsecurity/go-cs-lib/cstest"
- "github.com/crowdsecurity/go-cs-lib/ptr"
- "github.com/crowdsecurity/go-cs-lib/version"
- "github.com/crowdsecurity/crowdsec/pkg/apiclient"
- "github.com/crowdsecurity/crowdsec/pkg/csconfig"
- "github.com/crowdsecurity/crowdsec/pkg/database"
- "github.com/crowdsecurity/crowdsec/pkg/database/ent/decision"
- "github.com/crowdsecurity/crowdsec/pkg/database/ent/machine"
- "github.com/crowdsecurity/crowdsec/pkg/models"
- "github.com/crowdsecurity/crowdsec/pkg/modelscapi"
- "github.com/crowdsecurity/crowdsec/pkg/types"
- )
- func getDBClient(t *testing.T) *database.Client {
- t.Helper()
- dbPath, err := os.CreateTemp("", "*sqlite")
- require.NoError(t, err)
- dbClient, err := database.NewClient(&csconfig.DatabaseCfg{
- Type: "sqlite",
- DbName: "crowdsec",
- DbPath: dbPath.Name(),
- })
- require.NoError(t, err)
- return dbClient
- }
- func getAPIC(t *testing.T) *apic {
- t.Helper()
- dbClient := getDBClient(t)
- return &apic{
- AlertsAddChan: make(chan []*models.Alert),
- //DecisionDeleteChan: make(chan []*models.Decision),
- dbClient: dbClient,
- mu: sync.Mutex{},
- startup: true,
- pullTomb: tomb.Tomb{},
- pushTomb: tomb.Tomb{},
- metricsTomb: tomb.Tomb{},
- scenarioList: make([]string, 0),
- consoleConfig: &csconfig.ConsoleConfig{
- ShareManualDecisions: ptr.Of(false),
- ShareTaintedScenarios: ptr.Of(false),
- ShareCustomScenarios: ptr.Of(false),
- ShareContext: ptr.Of(false),
- },
- isPulling: make(chan bool, 1),
- }
- }
- func absDiff(a int, b int) (c int) {
- if c = a - b; c < 0 {
- return -1 * c
- }
- return c
- }
- func assertTotalDecisionCount(t *testing.T, dbClient *database.Client, count int) {
- d := dbClient.Ent.Decision.Query().AllX(context.Background())
- assert.Len(t, d, count)
- }
- func assertTotalValidDecisionCount(t *testing.T, dbClient *database.Client, count int) {
- d := dbClient.Ent.Decision.Query().Where(
- decision.UntilGT(time.Now()),
- ).AllX(context.Background())
- assert.Len(t, d, count)
- }
- func jsonMarshalX(v interface{}) []byte {
- data, err := json.Marshal(v)
- if err != nil {
- panic(err)
- }
- return data
- }
- func assertTotalAlertCount(t *testing.T, dbClient *database.Client, count int) {
- d := dbClient.Ent.Alert.Query().AllX(context.Background())
- assert.Len(t, d, count)
- }
- func TestAPICCAPIPullIsOld(t *testing.T) {
- api := getAPIC(t)
- isOld, err := api.CAPIPullIsOld()
- require.NoError(t, err)
- assert.True(t, isOld)
- decision := api.dbClient.Ent.Decision.Create().
- SetUntil(time.Now().Add(time.Hour)).
- SetScenario("crowdsec/test").
- SetType("IP").
- SetScope("Country").
- SetValue("Blah").
- SetOrigin(types.CAPIOrigin).
- SaveX(context.Background())
- api.dbClient.Ent.Alert.Create().
- SetCreatedAt(time.Now()).
- SetScenario("crowdsec/test").
- AddDecisions(
- decision,
- ).
- SaveX(context.Background())
- isOld, err = api.CAPIPullIsOld()
- require.NoError(t, err)
- assert.False(t, isOld)
- }
- func TestAPICFetchScenariosListFromDB(t *testing.T) {
- tests := []struct {
- name string
- machineIDsWithScenarios map[string]string
- expectedScenarios []string
- }{
- {
- name: "Simple one machine with two scenarios",
- machineIDsWithScenarios: map[string]string{
- "a": "crowdsecurity/http-bf,crowdsecurity/ssh-bf",
- },
- expectedScenarios: []string{"crowdsecurity/ssh-bf", "crowdsecurity/http-bf"},
- },
- {
- name: "Multi machine with custom+hub scenarios",
- machineIDsWithScenarios: map[string]string{
- "a": "crowdsecurity/http-bf,crowdsecurity/ssh-bf,my_scenario",
- "b": "crowdsecurity/http-bf,crowdsecurity/ssh-bf,foo_scenario",
- },
- expectedScenarios: []string{"crowdsecurity/ssh-bf", "crowdsecurity/http-bf", "my_scenario", "foo_scenario"},
- },
- }
- for _, tc := range tests {
- tc := tc
- t.Run(tc.name, func(t *testing.T) {
- api := getAPIC(t)
- for machineID, scenarios := range tc.machineIDsWithScenarios {
- api.dbClient.Ent.Machine.Create().
- SetMachineId(machineID).
- SetPassword(testPassword.String()).
- SetIpAddress("1.2.3.4").
- SetScenarios(scenarios).
- ExecX(context.Background())
- }
- scenarios, err := api.FetchScenariosListFromDB()
- for machineID := range tc.machineIDsWithScenarios {
- api.dbClient.Ent.Machine.Delete().Where(machine.MachineIdEQ(machineID)).ExecX(context.Background())
- }
- require.NoError(t, err)
- assert.ElementsMatch(t, tc.expectedScenarios, scenarios)
- })
- }
- }
- func TestNewAPIC(t *testing.T) {
- var testConfig *csconfig.OnlineApiClientCfg
- setConfig := func() {
- testConfig = &csconfig.OnlineApiClientCfg{
- Credentials: &csconfig.ApiCredentialsCfg{
- URL: "http://foobar/",
- Login: "foo",
- Password: "bar",
- },
- }
- }
- type args struct {
- dbClient *database.Client
- consoleConfig *csconfig.ConsoleConfig
- }
- tests := []struct {
- name string
- args args
- expectedErr string
- action func()
- }{
- {
- name: "simple",
- action: func() {},
- args: args{
- dbClient: getDBClient(t),
- consoleConfig: LoadTestConfig(t).API.Server.ConsoleConfig,
- },
- },
- {
- name: "error in parsing URL",
- action: func() { testConfig.Credentials.URL = "foobar http://" },
- args: args{
- dbClient: getDBClient(t),
- consoleConfig: LoadTestConfig(t).API.Server.ConsoleConfig,
- },
- expectedErr: "first path segment in URL cannot contain colon",
- },
- }
- for _, tc := range tests {
- tc := tc
- t.Run(tc.name, func(t *testing.T) {
- setConfig()
- httpmock.Activate()
- defer httpmock.DeactivateAndReset()
- httpmock.RegisterResponder("POST", "http://foobar/v3/watchers/login", httpmock.NewBytesResponder(
- 200, jsonMarshalX(
- models.WatcherAuthResponse{
- Code: 200,
- Expire: "2023-01-12T22:51:43Z",
- Token: "MyToken",
- },
- ),
- ))
- tc.action()
- _, err := NewAPIC(testConfig, tc.args.dbClient, tc.args.consoleConfig, nil)
- cstest.RequireErrorContains(t, err, tc.expectedErr)
- })
- }
- }
- func TestAPICHandleDeletedDecisions(t *testing.T) {
- api := getAPIC(t)
- _, deleteCounters := makeAddAndDeleteCounters()
- decision1 := api.dbClient.Ent.Decision.Create().
- SetUntil(time.Now().Add(time.Hour)).
- SetScenario("crowdsec/test").
- SetType("ban").
- SetScope("IP").
- SetValue("1.2.3.4").
- SetOrigin(types.CAPIOrigin).
- SaveX(context.Background())
- api.dbClient.Ent.Decision.Create().
- SetUntil(time.Now().Add(time.Hour)).
- SetScenario("crowdsec/test").
- SetType("ban").
- SetScope("IP").
- SetValue("1.2.3.4").
- SetOrigin(types.CAPIOrigin).
- SaveX(context.Background())
- assertTotalDecisionCount(t, api.dbClient, 2)
- nbDeleted, err := api.HandleDeletedDecisions([]*models.Decision{{
- Value: ptr.Of("1.2.3.4"),
- Origin: ptr.Of(types.CAPIOrigin),
- Type: &decision1.Type,
- Scenario: ptr.Of("crowdsec/test"),
- Scope: ptr.Of("IP"),
- }}, deleteCounters)
- assert.NoError(t, err)
- assert.Equal(t, 2, nbDeleted)
- assert.Equal(t, 2, deleteCounters[types.CAPIOrigin]["all"])
- }
- func TestAPICGetMetrics(t *testing.T) {
- cleanUp := func(api *apic) {
- api.dbClient.Ent.Bouncer.Delete().ExecX(context.Background())
- api.dbClient.Ent.Machine.Delete().ExecX(context.Background())
- }
- tests := []struct {
- name string
- machineIDs []string
- bouncers []string
- expectedMetric *models.Metrics
- }{
- {
- name: "no bouncers nor machines should still have bouncers/machines keys in output",
- machineIDs: []string{},
- bouncers: []string{},
- expectedMetric: &models.Metrics{
- ApilVersion: ptr.Of(version.String()),
- Bouncers: []*models.MetricsBouncerInfo{},
- Machines: []*models.MetricsAgentInfo{},
- },
- },
- {
- name: "simple",
- machineIDs: []string{"a", "b", "c"},
- bouncers: []string{"1", "2", "3"},
- expectedMetric: &models.Metrics{
- ApilVersion: ptr.Of(version.String()),
- Bouncers: []*models.MetricsBouncerInfo{
- {
- CustomName: "1",
- LastPull: time.Time{}.Format(time.RFC3339),
- }, {
- CustomName: "2",
- LastPull: time.Time{}.Format(time.RFC3339),
- }, {
- CustomName: "3",
- LastPull: time.Time{}.Format(time.RFC3339),
- },
- },
- Machines: []*models.MetricsAgentInfo{
- {
- Name: "a",
- LastPush: time.Time{}.Format(time.RFC3339),
- LastUpdate: time.Time{}.Format(time.RFC3339),
- },
- {
- Name: "b",
- LastPush: time.Time{}.Format(time.RFC3339),
- LastUpdate: time.Time{}.Format(time.RFC3339),
- },
- {
- Name: "c",
- LastPush: time.Time{}.Format(time.RFC3339),
- LastUpdate: time.Time{}.Format(time.RFC3339),
- },
- },
- },
- },
- }
- for _, tc := range tests {
- tc := tc
- t.Run(tc.name, func(t *testing.T) {
- apiClient := getAPIC(t)
- cleanUp(apiClient)
- for i, machineID := range tc.machineIDs {
- apiClient.dbClient.Ent.Machine.Create().
- SetMachineId(machineID).
- SetPassword(testPassword.String()).
- SetIpAddress(fmt.Sprintf("1.2.3.%d", i)).
- SetScenarios("crowdsecurity/test").
- SetLastPush(time.Time{}).
- SetUpdatedAt(time.Time{}).
- ExecX(context.Background())
- }
- for i, bouncerName := range tc.bouncers {
- apiClient.dbClient.Ent.Bouncer.Create().
- SetIPAddress(fmt.Sprintf("1.2.3.%d", i)).
- SetName(bouncerName).
- SetAPIKey("foobar").
- SetRevoked(false).
- SetLastPull(time.Time{}).
- ExecX(context.Background())
- }
- foundMetrics, err := apiClient.GetMetrics()
- require.NoError(t, err)
- assert.Equal(t, tc.expectedMetric.Bouncers, foundMetrics.Bouncers)
- assert.Equal(t, tc.expectedMetric.Machines, foundMetrics.Machines)
- })
- }
- }
- func TestCreateAlertsForDecision(t *testing.T) {
- httpBfDecisionList := &models.Decision{
- Origin: ptr.Of(types.ListOrigin),
- Scenario: ptr.Of("crowdsecurity/http-bf"),
- }
- sshBfDecisionList := &models.Decision{
- Origin: ptr.Of(types.ListOrigin),
- Scenario: ptr.Of("crowdsecurity/ssh-bf"),
- }
- httpBfDecisionCommunity := &models.Decision{
- Origin: ptr.Of(types.CAPIOrigin),
- Scenario: ptr.Of("crowdsecurity/http-bf"),
- }
- sshBfDecisionCommunity := &models.Decision{
- Origin: ptr.Of(types.CAPIOrigin),
- Scenario: ptr.Of("crowdsecurity/ssh-bf"),
- }
- type args struct {
- decisions []*models.Decision
- }
- tests := []struct {
- name string
- args args
- want []*models.Alert
- }{
- {
- name: "2 decisions CAPI List Decisions should create 2 alerts",
- args: args{
- decisions: []*models.Decision{
- httpBfDecisionList,
- sshBfDecisionList,
- },
- },
- want: []*models.Alert{
- createAlertForDecision(httpBfDecisionList),
- createAlertForDecision(sshBfDecisionList),
- },
- },
- {
- name: "2 decisions CAPI List same scenario decisions should create 1 alert",
- args: args{
- decisions: []*models.Decision{
- httpBfDecisionList,
- httpBfDecisionList,
- },
- },
- want: []*models.Alert{
- createAlertForDecision(httpBfDecisionList),
- },
- },
- {
- name: "5 decisions from community list should create 1 alert",
- args: args{
- decisions: []*models.Decision{
- httpBfDecisionCommunity,
- httpBfDecisionCommunity,
- sshBfDecisionCommunity,
- sshBfDecisionCommunity,
- sshBfDecisionCommunity,
- },
- },
- want: []*models.Alert{
- createAlertForDecision(sshBfDecisionCommunity),
- },
- },
- }
- for _, tc := range tests {
- tc := tc
- t.Run(tc.name, func(t *testing.T) {
- if got := createAlertsForDecisions(tc.args.decisions); !reflect.DeepEqual(got, tc.want) {
- t.Errorf("createAlertsForDecisions() = %v, want %v", got, tc.want)
- }
- })
- }
- }
- func TestFillAlertsWithDecisions(t *testing.T) {
- httpBfDecisionCommunity := &models.Decision{
- Origin: ptr.Of(types.CAPIOrigin),
- Scenario: ptr.Of("crowdsecurity/http-bf"),
- Scope: ptr.Of("ip"),
- }
- sshBfDecisionCommunity := &models.Decision{
- Origin: ptr.Of(types.CAPIOrigin),
- Scenario: ptr.Of("crowdsecurity/ssh-bf"),
- Scope: ptr.Of("ip"),
- }
- httpBfDecisionList := &models.Decision{
- Origin: ptr.Of(types.ListOrigin),
- Scenario: ptr.Of("crowdsecurity/http-bf"),
- Scope: ptr.Of("ip"),
- }
- sshBfDecisionList := &models.Decision{
- Origin: ptr.Of(types.ListOrigin),
- Scenario: ptr.Of("crowdsecurity/ssh-bf"),
- Scope: ptr.Of("ip"),
- }
- type args struct {
- alerts []*models.Alert
- decisions []*models.Decision
- }
- tests := []struct {
- name string
- args args
- want []*models.Alert
- }{
- {
- name: "1 CAPI alert should pair up with n CAPI decisions",
- args: args{
- alerts: []*models.Alert{createAlertForDecision(httpBfDecisionCommunity)},
- decisions: []*models.Decision{httpBfDecisionCommunity, sshBfDecisionCommunity, sshBfDecisionCommunity, httpBfDecisionCommunity},
- },
- want: []*models.Alert{
- func() *models.Alert {
- a := createAlertForDecision(httpBfDecisionCommunity)
- a.Decisions = []*models.Decision{httpBfDecisionCommunity, sshBfDecisionCommunity, sshBfDecisionCommunity, httpBfDecisionCommunity}
- return a
- }(),
- },
- },
- {
- name: "List alert should pair up only with decisions having same scenario",
- args: args{
- alerts: []*models.Alert{createAlertForDecision(httpBfDecisionList), createAlertForDecision(sshBfDecisionList)},
- decisions: []*models.Decision{httpBfDecisionList, httpBfDecisionList, sshBfDecisionList, sshBfDecisionList},
- },
- want: []*models.Alert{
- func() *models.Alert {
- a := createAlertForDecision(httpBfDecisionList)
- a.Decisions = []*models.Decision{httpBfDecisionList, httpBfDecisionList}
- return a
- }(),
- func() *models.Alert {
- a := createAlertForDecision(sshBfDecisionList)
- a.Decisions = []*models.Decision{sshBfDecisionList, sshBfDecisionList}
- return a
- }(),
- },
- },
- }
- for _, tc := range tests {
- tc := tc
- t.Run(tc.name, func(t *testing.T) {
- addCounters, _ := makeAddAndDeleteCounters()
- if got := fillAlertsWithDecisions(tc.args.alerts, tc.args.decisions, addCounters); !reflect.DeepEqual(got, tc.want) {
- t.Errorf("fillAlertsWithDecisions() = %v, want %v", got, tc.want)
- }
- })
- }
- }
- func TestAPICWhitelists(t *testing.T) {
- api := getAPIC(t)
- //one whitelist on IP, one on CIDR
- api.whitelists = &csconfig.CapiWhitelist{}
- ipwl1 := "9.2.3.4"
- ip := net.ParseIP(ipwl1)
- api.whitelists.Ips = append(api.whitelists.Ips, ip)
- ipwl1 = "7.2.3.4"
- ip = net.ParseIP(ipwl1)
- api.whitelists.Ips = append(api.whitelists.Ips, ip)
- cidrwl1 := "13.2.3.0/24"
- _, tnet, err := net.ParseCIDR(cidrwl1)
- if err != nil {
- t.Fatalf("unable to parse cidr : %s", err)
- }
- api.whitelists.Cidrs = append(api.whitelists.Cidrs, tnet)
- cidrwl1 = "11.2.3.0/24"
- _, tnet, err = net.ParseCIDR(cidrwl1)
- if err != nil {
- t.Fatalf("unable to parse cidr : %s", err)
- }
- api.whitelists.Cidrs = append(api.whitelists.Cidrs, tnet)
- api.dbClient.Ent.Decision.Create().
- SetOrigin(types.CAPIOrigin).
- SetType("ban").
- SetValue("9.9.9.9").
- SetScope("Ip").
- SetScenario("crowdsecurity/ssh-bf").
- SetUntil(time.Now().Add(time.Hour)).
- ExecX(context.Background())
- assertTotalDecisionCount(t, api.dbClient, 1)
- assertTotalValidDecisionCount(t, api.dbClient, 1)
- httpmock.Activate()
- defer httpmock.DeactivateAndReset()
- httpmock.RegisterResponder("GET", "http://api.crowdsec.net/api/decisions/stream", httpmock.NewBytesResponder(
- 200, jsonMarshalX(
- modelscapi.GetDecisionsStreamResponse{
- Deleted: modelscapi.GetDecisionsStreamResponseDeleted{
- &modelscapi.GetDecisionsStreamResponseDeletedItem{
- Decisions: []string{
- "9.9.9.9", // This is already present in DB
- "9.1.9.9", // This is not present in DB
- },
- Scope: ptr.Of("Ip"),
- }, // This is already present in DB
- },
- New: modelscapi.GetDecisionsStreamResponseNew{
- &modelscapi.GetDecisionsStreamResponseNewItem{
- Scenario: ptr.Of("crowdsecurity/test1"),
- Scope: ptr.Of("Ip"),
- Decisions: []*modelscapi.GetDecisionsStreamResponseNewItemDecisionsItems0{
- {
- Value: ptr.Of("13.2.3.4"), //wl by cidr
- Duration: ptr.Of("24h"),
- },
- },
- },
- &modelscapi.GetDecisionsStreamResponseNewItem{
- Scenario: ptr.Of("crowdsecurity/test1"),
- Scope: ptr.Of("Ip"),
- Decisions: []*modelscapi.GetDecisionsStreamResponseNewItemDecisionsItems0{
- {
- Value: ptr.Of("2.2.3.4"),
- Duration: ptr.Of("24h"),
- },
- },
- },
- &modelscapi.GetDecisionsStreamResponseNewItem{
- Scenario: ptr.Of("crowdsecurity/test2"),
- Scope: ptr.Of("Ip"),
- Decisions: []*modelscapi.GetDecisionsStreamResponseNewItemDecisionsItems0{
- {
- Value: ptr.Of("13.2.3.5"), //wl by cidr
- Duration: ptr.Of("24h"),
- },
- },
- }, // These two are from community list.
- &modelscapi.GetDecisionsStreamResponseNewItem{
- Scenario: ptr.Of("crowdsecurity/test1"),
- Scope: ptr.Of("Ip"),
- Decisions: []*modelscapi.GetDecisionsStreamResponseNewItemDecisionsItems0{
- {
- Value: ptr.Of("6.2.3.4"),
- Duration: ptr.Of("24h"),
- },
- },
- },
- &modelscapi.GetDecisionsStreamResponseNewItem{
- Scenario: ptr.Of("crowdsecurity/test1"),
- Scope: ptr.Of("Ip"),
- Decisions: []*modelscapi.GetDecisionsStreamResponseNewItemDecisionsItems0{
- {
- Value: ptr.Of("9.2.3.4"), //wl by ip
- Duration: ptr.Of("24h"),
- },
- },
- },
- },
- Links: &modelscapi.GetDecisionsStreamResponseLinks{
- Blocklists: []*modelscapi.BlocklistLink{
- {
- URL: ptr.Of("http://api.crowdsec.net/blocklist1"),
- Name: ptr.Of("blocklist1"),
- Scope: ptr.Of("Ip"),
- Remediation: ptr.Of("ban"),
- Duration: ptr.Of("24h"),
- },
- {
- URL: ptr.Of("http://api.crowdsec.net/blocklist2"),
- Name: ptr.Of("blocklist2"),
- Scope: ptr.Of("Ip"),
- Remediation: ptr.Of("ban"),
- Duration: ptr.Of("24h"),
- },
- },
- },
- },
- ),
- ))
- httpmock.RegisterResponder("GET", "http://api.crowdsec.net/blocklist1", httpmock.NewStringResponder(
- 200, "1.2.3.6",
- ))
- httpmock.RegisterResponder("GET", "http://api.crowdsec.net/blocklist2", httpmock.NewStringResponder(
- 200, "1.2.3.7",
- ))
- url, err := url.ParseRequestURI("http://api.crowdsec.net/")
- require.NoError(t, err)
- apic, err := apiclient.NewDefaultClient(
- url,
- "/api",
- fmt.Sprintf("crowdsec/%s", version.String()),
- nil,
- )
- require.NoError(t, err)
- api.apiClient = apic
- err = api.PullTop(false)
- require.NoError(t, err)
- assertTotalDecisionCount(t, api.dbClient, 5) //2 from FIRE + 2 from bl + 1 existing
- assertTotalValidDecisionCount(t, api.dbClient, 4)
- assertTotalAlertCount(t, api.dbClient, 3) // 2 for list sub , 1 for community list.
- alerts := api.dbClient.Ent.Alert.Query().AllX(context.Background())
- validDecisions := api.dbClient.Ent.Decision.Query().Where(
- decision.UntilGT(time.Now())).
- AllX(context.Background())
- decisionScenarioFreq := make(map[string]int)
- decisionIp := make(map[string]int)
- alertScenario := make(map[string]int)
- for _, alert := range alerts {
- alertScenario[alert.SourceScope]++
- }
- assert.Equal(t, 3, len(alertScenario))
- assert.Equal(t, 1, alertScenario[types.CommunityBlocklistPullSourceScope])
- assert.Equal(t, 1, alertScenario["lists:blocklist1"])
- assert.Equal(t, 1, alertScenario["lists:blocklist2"])
- for _, decisions := range validDecisions {
- decisionScenarioFreq[decisions.Scenario]++
- decisionIp[decisions.Value]++
- }
- assert.Equal(t, 1, decisionIp["2.2.3.4"], 1)
- assert.Equal(t, 1, decisionIp["6.2.3.4"], 1)
- if _, ok := decisionIp["13.2.3.4"]; ok {
- t.Errorf("13.2.3.4 is whitelisted")
- }
- if _, ok := decisionIp["13.2.3.5"]; ok {
- t.Errorf("13.2.3.5 is whitelisted")
- }
- if _, ok := decisionIp["9.2.3.4"]; ok {
- t.Errorf("9.2.3.4 is whitelisted")
- }
- assert.Equal(t, 1, decisionScenarioFreq["blocklist1"], 1)
- assert.Equal(t, 1, decisionScenarioFreq["blocklist2"], 1)
- assert.Equal(t, 2, decisionScenarioFreq["crowdsecurity/test1"], 2)
- }
- func TestAPICPullTop(t *testing.T) {
- api := getAPIC(t)
- api.dbClient.Ent.Decision.Create().
- SetOrigin(types.CAPIOrigin).
- SetType("ban").
- SetValue("9.9.9.9").
- SetScope("Ip").
- SetScenario("crowdsecurity/ssh-bf").
- SetUntil(time.Now().Add(time.Hour)).
- ExecX(context.Background())
- assertTotalDecisionCount(t, api.dbClient, 1)
- assertTotalValidDecisionCount(t, api.dbClient, 1)
- httpmock.Activate()
- defer httpmock.DeactivateAndReset()
- httpmock.RegisterResponder("GET", "http://api.crowdsec.net/api/decisions/stream", httpmock.NewBytesResponder(
- 200, jsonMarshalX(
- modelscapi.GetDecisionsStreamResponse{
- Deleted: modelscapi.GetDecisionsStreamResponseDeleted{
- &modelscapi.GetDecisionsStreamResponseDeletedItem{
- Decisions: []string{
- "9.9.9.9", // This is already present in DB
- "9.1.9.9", // This is not present in DB
- },
- Scope: ptr.Of("Ip"),
- }, // This is already present in DB
- },
- New: modelscapi.GetDecisionsStreamResponseNew{
- &modelscapi.GetDecisionsStreamResponseNewItem{
- Scenario: ptr.Of("crowdsecurity/test1"),
- Scope: ptr.Of("Ip"),
- Decisions: []*modelscapi.GetDecisionsStreamResponseNewItemDecisionsItems0{
- {
- Value: ptr.Of("1.2.3.4"),
- Duration: ptr.Of("24h"),
- },
- },
- },
- &modelscapi.GetDecisionsStreamResponseNewItem{
- Scenario: ptr.Of("crowdsecurity/test2"),
- Scope: ptr.Of("Ip"),
- Decisions: []*modelscapi.GetDecisionsStreamResponseNewItemDecisionsItems0{
- {
- Value: ptr.Of("1.2.3.5"),
- Duration: ptr.Of("24h"),
- },
- },
- }, // These two are from community list.
- },
- Links: &modelscapi.GetDecisionsStreamResponseLinks{
- Blocklists: []*modelscapi.BlocklistLink{
- {
- URL: ptr.Of("http://api.crowdsec.net/blocklist1"),
- Name: ptr.Of("blocklist1"),
- Scope: ptr.Of("Ip"),
- Remediation: ptr.Of("ban"),
- Duration: ptr.Of("24h"),
- },
- {
- URL: ptr.Of("http://api.crowdsec.net/blocklist2"),
- Name: ptr.Of("blocklist2"),
- Scope: ptr.Of("Ip"),
- Remediation: ptr.Of("ban"),
- Duration: ptr.Of("24h"),
- },
- },
- },
- },
- ),
- ))
- httpmock.RegisterResponder("GET", "http://api.crowdsec.net/blocklist1", httpmock.NewStringResponder(
- 200, "1.2.3.6",
- ))
- httpmock.RegisterResponder("GET", "http://api.crowdsec.net/blocklist2", httpmock.NewStringResponder(
- 200, "1.2.3.7",
- ))
- url, err := url.ParseRequestURI("http://api.crowdsec.net/")
- require.NoError(t, err)
- apic, err := apiclient.NewDefaultClient(
- url,
- "/api",
- fmt.Sprintf("crowdsec/%s", version.String()),
- nil,
- )
- require.NoError(t, err)
- api.apiClient = apic
- err = api.PullTop(false)
- require.NoError(t, err)
- assertTotalDecisionCount(t, api.dbClient, 5)
- assertTotalValidDecisionCount(t, api.dbClient, 4)
- assertTotalAlertCount(t, api.dbClient, 3) // 2 for list sub , 1 for community list.
- alerts := api.dbClient.Ent.Alert.Query().AllX(context.Background())
- validDecisions := api.dbClient.Ent.Decision.Query().Where(
- decision.UntilGT(time.Now())).
- AllX(context.Background())
- decisionScenarioFreq := make(map[string]int)
- alertScenario := make(map[string]int)
- for _, alert := range alerts {
- alertScenario[alert.SourceScope]++
- }
- assert.Equal(t, 3, len(alertScenario))
- assert.Equal(t, 1, alertScenario[types.CommunityBlocklistPullSourceScope])
- assert.Equal(t, 1, alertScenario["lists:blocklist1"])
- assert.Equal(t, 1, alertScenario["lists:blocklist2"])
- for _, decisions := range validDecisions {
- decisionScenarioFreq[decisions.Scenario]++
- }
- assert.Equal(t, 1, decisionScenarioFreq["blocklist1"], 1)
- assert.Equal(t, 1, decisionScenarioFreq["blocklist2"], 1)
- assert.Equal(t, 1, decisionScenarioFreq["crowdsecurity/test1"], 1)
- assert.Equal(t, 1, decisionScenarioFreq["crowdsecurity/test2"], 1)
- }
- func TestAPICPullTopBLCacheFirstCall(t *testing.T) {
- // no decision in db, no last modified parameter.
- api := getAPIC(t)
- httpmock.Activate()
- defer httpmock.DeactivateAndReset()
- httpmock.RegisterResponder("GET", "http://api.crowdsec.net/api/decisions/stream", httpmock.NewBytesResponder(
- 200, jsonMarshalX(
- modelscapi.GetDecisionsStreamResponse{
- New: modelscapi.GetDecisionsStreamResponseNew{
- &modelscapi.GetDecisionsStreamResponseNewItem{
- Scenario: ptr.Of("crowdsecurity/test1"),
- Scope: ptr.Of("Ip"),
- Decisions: []*modelscapi.GetDecisionsStreamResponseNewItemDecisionsItems0{
- {
- Value: ptr.Of("1.2.3.4"),
- Duration: ptr.Of("24h"),
- },
- },
- },
- },
- Links: &modelscapi.GetDecisionsStreamResponseLinks{
- Blocklists: []*modelscapi.BlocklistLink{
- {
- URL: ptr.Of("http://api.crowdsec.net/blocklist1"),
- Name: ptr.Of("blocklist1"),
- Scope: ptr.Of("Ip"),
- Remediation: ptr.Of("ban"),
- Duration: ptr.Of("24h"),
- },
- },
- },
- },
- ),
- ))
- httpmock.RegisterResponder("GET", "http://api.crowdsec.net/blocklist1", func(req *http.Request) (*http.Response, error) {
- assert.Equal(t, "", req.Header.Get("If-Modified-Since"))
- return httpmock.NewStringResponse(200, "1.2.3.4"), nil
- })
- url, err := url.ParseRequestURI("http://api.crowdsec.net/")
- require.NoError(t, err)
- apic, err := apiclient.NewDefaultClient(
- url,
- "/api",
- fmt.Sprintf("crowdsec/%s", version.String()),
- nil,
- )
- require.NoError(t, err)
- api.apiClient = apic
- err = api.PullTop(false)
- require.NoError(t, err)
- blocklistConfigItemName := "blocklist:blocklist1:last_pull"
- lastPullTimestamp, err := api.dbClient.GetConfigItem(blocklistConfigItemName)
- require.NoError(t, err)
- assert.NotEqual(t, "", *lastPullTimestamp)
- // new call should return 304 and should not change lastPullTimestamp
- httpmock.RegisterResponder("GET", "http://api.crowdsec.net/blocklist1", func(req *http.Request) (*http.Response, error) {
- assert.NotEqual(t, "", req.Header.Get("If-Modified-Since"))
- return httpmock.NewStringResponse(304, ""), nil
- })
- err = api.PullTop(false)
- require.NoError(t, err)
- secondLastPullTimestamp, err := api.dbClient.GetConfigItem(blocklistConfigItemName)
- require.NoError(t, err)
- assert.Equal(t, *lastPullTimestamp, *secondLastPullTimestamp)
- }
- func TestAPICPullTopBLCacheForceCall(t *testing.T) {
- api := getAPIC(t)
- httpmock.Activate()
- defer httpmock.DeactivateAndReset()
- // create a decision about to expire. It should force fetch
- alertInstance := api.dbClient.Ent.Alert.
- Create().
- SetScenario("update list").
- SetSourceScope("list:blocklist1").
- SetSourceValue("list:blocklist1").
- SaveX(context.Background())
- api.dbClient.Ent.Decision.Create().
- SetOrigin(types.ListOrigin).
- SetType("ban").
- SetValue("9.9.9.9").
- SetScope("Ip").
- SetScenario("blocklist1").
- SetUntil(time.Now().Add(time.Hour)).
- SetOwnerID(alertInstance.ID).
- ExecX(context.Background())
- httpmock.RegisterResponder("GET", "http://api.crowdsec.net/api/decisions/stream", httpmock.NewBytesResponder(
- 200, jsonMarshalX(
- modelscapi.GetDecisionsStreamResponse{
- New: modelscapi.GetDecisionsStreamResponseNew{
- &modelscapi.GetDecisionsStreamResponseNewItem{
- Scenario: ptr.Of("crowdsecurity/test1"),
- Scope: ptr.Of("Ip"),
- Decisions: []*modelscapi.GetDecisionsStreamResponseNewItemDecisionsItems0{
- {
- Value: ptr.Of("1.2.3.4"),
- Duration: ptr.Of("24h"),
- },
- },
- },
- },
- Links: &modelscapi.GetDecisionsStreamResponseLinks{
- Blocklists: []*modelscapi.BlocklistLink{
- {
- URL: ptr.Of("http://api.crowdsec.net/blocklist1"),
- Name: ptr.Of("blocklist1"),
- Scope: ptr.Of("Ip"),
- Remediation: ptr.Of("ban"),
- Duration: ptr.Of("24h"),
- },
- },
- },
- },
- ),
- ))
- httpmock.RegisterResponder("GET", "http://api.crowdsec.net/blocklist1", func(req *http.Request) (*http.Response, error) {
- assert.Equal(t, "", req.Header.Get("If-Modified-Since"))
- return httpmock.NewStringResponse(304, ""), nil
- })
- url, err := url.ParseRequestURI("http://api.crowdsec.net/")
- require.NoError(t, err)
- apic, err := apiclient.NewDefaultClient(
- url,
- "/api",
- fmt.Sprintf("crowdsec/%s", version.String()),
- nil,
- )
- require.NoError(t, err)
- api.apiClient = apic
- err = api.PullTop(false)
- require.NoError(t, err)
- }
- func TestAPICPullBlocklistCall(t *testing.T) {
- api := getAPIC(t)
- httpmock.Activate()
- defer httpmock.DeactivateAndReset()
- httpmock.RegisterResponder("GET", "http://api.crowdsec.net/blocklist1", func(req *http.Request) (*http.Response, error) {
- assert.Equal(t, "", req.Header.Get("If-Modified-Since"))
- return httpmock.NewStringResponse(200, "1.2.3.4"), nil
- })
- url, err := url.ParseRequestURI("http://api.crowdsec.net/")
- require.NoError(t, err)
- apic, err := apiclient.NewDefaultClient(
- url,
- "/api",
- fmt.Sprintf("crowdsec/%s", version.String()),
- nil,
- )
- require.NoError(t, err)
- api.apiClient = apic
- err = api.PullBlocklist(&modelscapi.BlocklistLink{
- URL: ptr.Of("http://api.crowdsec.net/blocklist1"),
- Name: ptr.Of("blocklist1"),
- Scope: ptr.Of("Ip"),
- Remediation: ptr.Of("ban"),
- Duration: ptr.Of("24h"),
- }, true)
- require.NoError(t, err)
- }
- func TestAPICPush(t *testing.T) {
- tests := []struct {
- name string
- alerts []*models.Alert
- expectedCalls int
- }{
- {
- name: "simple single alert",
- alerts: []*models.Alert{
- {
- Scenario: ptr.Of("crowdsec/test"),
- ScenarioHash: ptr.Of("certified"),
- ScenarioVersion: ptr.Of("v1.0"),
- Simulated: ptr.Of(false),
- Source: &models.Source{},
- },
- },
- expectedCalls: 1,
- },
- {
- name: "simulated alert is not pushed",
- alerts: []*models.Alert{
- {
- Scenario: ptr.Of("crowdsec/test"),
- ScenarioHash: ptr.Of("certified"),
- ScenarioVersion: ptr.Of("v1.0"),
- Simulated: ptr.Of(true),
- Source: &models.Source{},
- },
- },
- expectedCalls: 0,
- },
- {
- name: "1 request per 50 alerts",
- expectedCalls: 2,
- alerts: func() []*models.Alert {
- alerts := make([]*models.Alert, 100)
- for i := 0; i < 100; i++ {
- alerts[i] = &models.Alert{
- Scenario: ptr.Of("crowdsec/test"),
- ScenarioHash: ptr.Of("certified"),
- ScenarioVersion: ptr.Of("v1.0"),
- Simulated: ptr.Of(false),
- Source: &models.Source{},
- }
- }
- return alerts
- }(),
- },
- }
- for _, tc := range tests {
- tc := tc
- t.Run(tc.name, func(t *testing.T) {
- api := getAPIC(t)
- api.pushInterval = time.Millisecond
- api.pushIntervalFirst = time.Millisecond
- url, err := url.ParseRequestURI("http://api.crowdsec.net/")
- require.NoError(t, err)
- httpmock.Activate()
- defer httpmock.DeactivateAndReset()
- apic, err := apiclient.NewDefaultClient(
- url,
- "/api",
- fmt.Sprintf("crowdsec/%s", version.String()),
- nil,
- )
- require.NoError(t, err)
- api.apiClient = apic
- httpmock.RegisterResponder("POST", "http://api.crowdsec.net/api/signals", httpmock.NewBytesResponder(200, []byte{}))
- go func() {
- api.AlertsAddChan <- tc.alerts
- time.Sleep(time.Second)
- api.Shutdown()
- }()
- err = api.Push()
- require.NoError(t, err)
- assert.Equal(t, tc.expectedCalls, httpmock.GetTotalCallCount())
- })
- }
- }
- func TestAPICPull(t *testing.T) {
- api := getAPIC(t)
- tests := []struct {
- name string
- setUp func()
- expectedDecisionCount int
- logContains string
- }{
- {
- name: "test pull if no scenarios are present",
- setUp: func() {},
- logContains: "scenario list is empty, will not pull yet",
- },
- {
- name: "test pull",
- setUp: func() {
- api.dbClient.Ent.Machine.Create().
- SetMachineId("1.2.3.4").
- SetPassword(testPassword.String()).
- SetIpAddress("1.2.3.4").
- SetScenarios("crowdsecurity/ssh-bf").
- ExecX(context.Background())
- },
- expectedDecisionCount: 1,
- },
- }
- for _, tc := range tests {
- tc := tc
- t.Run(tc.name, func(t *testing.T) {
- api = getAPIC(t)
- api.pullInterval = time.Millisecond
- api.pullIntervalFirst = time.Millisecond
- url, err := url.ParseRequestURI("http://api.crowdsec.net/")
- require.NoError(t, err)
- httpmock.Activate()
- defer httpmock.DeactivateAndReset()
- apic, err := apiclient.NewDefaultClient(
- url,
- "/api",
- fmt.Sprintf("crowdsec/%s", version.String()),
- nil,
- )
- require.NoError(t, err)
- api.apiClient = apic
- httpmock.RegisterNoResponder(httpmock.NewBytesResponder(200, jsonMarshalX(
- modelscapi.GetDecisionsStreamResponse{
- New: modelscapi.GetDecisionsStreamResponseNew{
- &modelscapi.GetDecisionsStreamResponseNewItem{
- Scenario: ptr.Of("crowdsecurity/ssh-bf"),
- Scope: ptr.Of("Ip"),
- Decisions: []*modelscapi.GetDecisionsStreamResponseNewItemDecisionsItems0{
- {
- Value: ptr.Of("1.2.3.5"),
- Duration: ptr.Of("24h"),
- },
- },
- },
- },
- },
- )))
- tc.setUp()
- var buf bytes.Buffer
- go func() {
- logrus.SetOutput(&buf)
- if err := api.Pull(); err != nil {
- panic(err)
- }
- }()
- //Slightly long because the CI runner for windows are slow, and this can lead to random failure
- time.Sleep(time.Millisecond * 500)
- logrus.SetOutput(os.Stderr)
- assert.Contains(t, buf.String(), tc.logContains)
- assertTotalDecisionCount(t, api.dbClient, tc.expectedDecisionCount)
- })
- }
- }
- func TestShouldShareAlert(t *testing.T) {
- tests := []struct {
- name string
- consoleConfig *csconfig.ConsoleConfig
- alert *models.Alert
- expectedRet bool
- expectedTrust string
- }{
- {
- name: "custom alert should be shared if config enables it",
- consoleConfig: &csconfig.ConsoleConfig{
- ShareCustomScenarios: ptr.Of(true),
- },
- alert: &models.Alert{Simulated: ptr.Of(false)},
- expectedRet: true,
- expectedTrust: "custom",
- },
- {
- name: "custom alert should not be shared if config disables it",
- consoleConfig: &csconfig.ConsoleConfig{
- ShareCustomScenarios: ptr.Of(false),
- },
- alert: &models.Alert{Simulated: ptr.Of(false)},
- expectedRet: false,
- expectedTrust: "custom",
- },
- {
- name: "manual alert should be shared if config enables it",
- consoleConfig: &csconfig.ConsoleConfig{
- ShareManualDecisions: ptr.Of(true),
- },
- alert: &models.Alert{
- Simulated: ptr.Of(false),
- Decisions: []*models.Decision{{Origin: ptr.Of(types.CscliOrigin)}},
- },
- expectedRet: true,
- expectedTrust: "manual",
- },
- {
- name: "manual alert should not be shared if config disables it",
- consoleConfig: &csconfig.ConsoleConfig{
- ShareManualDecisions: ptr.Of(false),
- },
- alert: &models.Alert{
- Simulated: ptr.Of(false),
- Decisions: []*models.Decision{{Origin: ptr.Of(types.CscliOrigin)}},
- },
- expectedRet: false,
- expectedTrust: "manual",
- },
- {
- name: "manual alert should be shared if config enables it",
- consoleConfig: &csconfig.ConsoleConfig{
- ShareTaintedScenarios: ptr.Of(true),
- },
- alert: &models.Alert{
- Simulated: ptr.Of(false),
- ScenarioHash: ptr.Of("whateverHash"),
- },
- expectedRet: true,
- expectedTrust: "tainted",
- },
- {
- name: "manual alert should not be shared if config disables it",
- consoleConfig: &csconfig.ConsoleConfig{
- ShareTaintedScenarios: ptr.Of(false),
- },
- alert: &models.Alert{
- Simulated: ptr.Of(false),
- ScenarioHash: ptr.Of("whateverHash"),
- },
- expectedRet: false,
- expectedTrust: "tainted",
- },
- }
- for _, tc := range tests {
- tc := tc
- t.Run(tc.name, func(t *testing.T) {
- ret := shouldShareAlert(tc.alert, tc.consoleConfig)
- assert.Equal(t, tc.expectedRet, ret)
- })
- }
- }
|