decisions_service_test.go 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274
  1. package apiclient
  2. import (
  3. "context"
  4. "fmt"
  5. "net/http"
  6. "net/url"
  7. "reflect"
  8. "testing"
  9. "github.com/crowdsecurity/crowdsec/pkg/cwversion"
  10. "github.com/crowdsecurity/crowdsec/pkg/models"
  11. log "github.com/sirupsen/logrus"
  12. "github.com/stretchr/testify/assert"
  13. "github.com/stretchr/testify/require"
  14. )
  15. func TestDecisionsList(t *testing.T) {
  16. log.SetLevel(log.DebugLevel)
  17. mux, urlx, teardown := setup()
  18. defer teardown()
  19. mux.HandleFunc("/decisions", func(w http.ResponseWriter, r *http.Request) {
  20. testMethod(t, r, "GET")
  21. if r.URL.RawQuery == "ip=1.2.3.4" {
  22. assert.Equal(t, r.URL.RawQuery, "ip=1.2.3.4")
  23. assert.Equal(t, r.Header.Get("X-Api-Key"), "ixu")
  24. w.WriteHeader(http.StatusOK)
  25. w.Write([]byte(`[{"duration":"3h59m55.756182786s","id":4,"origin":"cscli","scenario":"manual 'ban' from '82929df7ee394b73b81252fe3b4e50203yaT2u6nXiaN7Ix9'","scope":"Ip","type":"ban","value":"1.2.3.4"}]`))
  26. } else {
  27. w.WriteHeader(http.StatusOK)
  28. w.Write([]byte(`null`))
  29. //no results
  30. }
  31. })
  32. apiURL, err := url.Parse(urlx + "/")
  33. if err != nil {
  34. log.Fatalf("parsing api url: %s", apiURL)
  35. }
  36. //ok answer
  37. auth := &APIKeyTransport{
  38. APIKey: "ixu",
  39. }
  40. newcli, err := NewDefaultClient(apiURL, "v1", "toto", auth.Client())
  41. if err != nil {
  42. log.Fatalf("new api client: %s", err.Error())
  43. }
  44. tduration := "3h59m55.756182786s"
  45. torigin := "cscli"
  46. tscenario := "manual 'ban' from '82929df7ee394b73b81252fe3b4e50203yaT2u6nXiaN7Ix9'"
  47. tscope := "Ip"
  48. ttype := "ban"
  49. tvalue := "1.2.3.4"
  50. expected := &models.GetDecisionsResponse{
  51. &models.Decision{
  52. Duration: &tduration,
  53. ID: 4,
  54. Origin: &torigin,
  55. Scenario: &tscenario,
  56. Scope: &tscope,
  57. Type: &ttype,
  58. Value: &tvalue,
  59. },
  60. }
  61. //OK decisions
  62. decisionsFilter := DecisionsListOpts{IPEquals: new(string)}
  63. *decisionsFilter.IPEquals = "1.2.3.4"
  64. decisions, resp, err := newcli.Decisions.List(context.Background(), decisionsFilter)
  65. if resp.Response.StatusCode != http.StatusOK {
  66. t.Errorf("Alerts.List returned status: %d, want %d", resp.Response.StatusCode, http.StatusOK)
  67. }
  68. if err != nil {
  69. log.Fatalf("new api client: %s", err.Error())
  70. }
  71. if !reflect.DeepEqual(*decisions, *expected) {
  72. t.Fatalf("returned %+v, want %+v", resp, expected)
  73. }
  74. //Empty return
  75. decisionsFilter = DecisionsListOpts{IPEquals: new(string)}
  76. *decisionsFilter.IPEquals = "1.2.3.5"
  77. decisions, resp, err = newcli.Decisions.List(context.Background(), decisionsFilter)
  78. require.NoError(t, err)
  79. if resp.Response.StatusCode != http.StatusOK {
  80. t.Errorf("Alerts.List returned status: %d, want %d", resp.Response.StatusCode, http.StatusOK)
  81. }
  82. assert.Equal(t, len(*decisions), 0)
  83. }
  84. func TestDecisionsStream(t *testing.T) {
  85. log.SetLevel(log.DebugLevel)
  86. mux, urlx, teardown := setup()
  87. defer teardown()
  88. mux.HandleFunc("/decisions/stream", func(w http.ResponseWriter, r *http.Request) {
  89. assert.Equal(t, r.Header.Get("X-Api-Key"), "ixu")
  90. testMethod(t, r, "GET")
  91. if r.Method == "GET" {
  92. if r.URL.RawQuery == "startup=true" {
  93. w.WriteHeader(http.StatusOK)
  94. w.Write([]byte(`{"deleted":null,"new":[{"duration":"3h59m55.756182786s","id":4,"origin":"cscli","scenario":"manual 'ban' from '82929df7ee394b73b81252fe3b4e50203yaT2u6nXiaN7Ix9'","scope":"Ip","type":"ban","value":"1.2.3.4"}]}`))
  95. } else {
  96. w.WriteHeader(http.StatusOK)
  97. w.Write([]byte(`{"deleted":null,"new":null}`))
  98. }
  99. }
  100. })
  101. mux.HandleFunc("/decisions", func(w http.ResponseWriter, r *http.Request) {
  102. assert.Equal(t, r.Header.Get("X-Api-Key"), "ixu")
  103. testMethod(t, r, "DELETE")
  104. if r.Method == "DELETE" {
  105. w.WriteHeader(http.StatusOK)
  106. }
  107. })
  108. apiURL, err := url.Parse(urlx + "/")
  109. if err != nil {
  110. log.Fatalf("parsing api url: %s", apiURL)
  111. }
  112. //ok answer
  113. auth := &APIKeyTransport{
  114. APIKey: "ixu",
  115. }
  116. newcli, err := NewDefaultClient(apiURL, "v1", "toto", auth.Client())
  117. if err != nil {
  118. log.Fatalf("new api client: %s", err.Error())
  119. }
  120. tduration := "3h59m55.756182786s"
  121. torigin := "cscli"
  122. tscenario := "manual 'ban' from '82929df7ee394b73b81252fe3b4e50203yaT2u6nXiaN7Ix9'"
  123. tscope := "Ip"
  124. ttype := "ban"
  125. tvalue := "1.2.3.4"
  126. expected := &models.DecisionsStreamResponse{
  127. New: models.GetDecisionsResponse{
  128. &models.Decision{
  129. Duration: &tduration,
  130. ID: 4,
  131. Origin: &torigin,
  132. Scenario: &tscenario,
  133. Scope: &tscope,
  134. Type: &ttype,
  135. Value: &tvalue,
  136. },
  137. },
  138. }
  139. decisions, resp, err := newcli.Decisions.GetStream(context.Background(), true, []string{})
  140. require.NoError(t, err)
  141. if resp.Response.StatusCode != http.StatusOK {
  142. t.Errorf("Alerts.List returned status: %d, want %d", resp.Response.StatusCode, http.StatusOK)
  143. }
  144. if err != nil {
  145. log.Fatalf("new api client: %s", err.Error())
  146. }
  147. if !reflect.DeepEqual(*decisions, *expected) {
  148. t.Fatalf("returned %+v, want %+v", resp, expected)
  149. }
  150. //and second call, we get empty lists
  151. decisions, resp, err = newcli.Decisions.GetStream(context.Background(), false, []string{})
  152. require.NoError(t, err)
  153. if resp.Response.StatusCode != http.StatusOK {
  154. t.Errorf("Alerts.List returned status: %d, want %d", resp.Response.StatusCode, http.StatusOK)
  155. }
  156. assert.Equal(t, 0, len(decisions.New))
  157. assert.Equal(t, 0, len(decisions.Deleted))
  158. //delete stream
  159. resp, err = newcli.Decisions.StopStream(context.Background())
  160. require.NoError(t, err)
  161. if resp.Response.StatusCode != http.StatusOK {
  162. t.Errorf("Alerts.List returned status: %d, want %d", resp.Response.StatusCode, http.StatusOK)
  163. }
  164. }
  165. func TestDeleteDecisions(t *testing.T) {
  166. mux, urlx, teardown := setup()
  167. mux.HandleFunc("/watchers/login", func(w http.ResponseWriter, r *http.Request) {
  168. w.WriteHeader(http.StatusOK)
  169. w.Write([]byte(`{"code": 200, "expire": "2030-01-02T15:04:05Z", "token": "oklol"}`))
  170. })
  171. mux.HandleFunc("/decisions", func(w http.ResponseWriter, r *http.Request) {
  172. testMethod(t, r, "DELETE")
  173. assert.Equal(t, r.URL.RawQuery, "ip=1.2.3.4")
  174. w.WriteHeader(http.StatusOK)
  175. w.Write([]byte(`{"nbDeleted":"1"}`))
  176. //w.Write([]byte(`{"message":"0 deleted alerts"}`))
  177. })
  178. log.Printf("URL is %s", urlx)
  179. apiURL, err := url.Parse(urlx + "/")
  180. if err != nil {
  181. log.Fatalf("parsing api url: %s", apiURL)
  182. }
  183. client, err := NewClient(&Config{
  184. MachineID: "test_login",
  185. Password: "test_password",
  186. UserAgent: fmt.Sprintf("crowdsec/%s", cwversion.VersionStr()),
  187. URL: apiURL,
  188. VersionPrefix: "v1",
  189. })
  190. if err != nil {
  191. log.Fatalf("new api client: %s", err.Error())
  192. }
  193. filters := DecisionsDeleteOpts{IPEquals: new(string)}
  194. *filters.IPEquals = "1.2.3.4"
  195. deleted, _, err := client.Decisions.Delete(context.Background(), filters)
  196. if err != nil {
  197. t.Fatalf("unexpected err : %s", err)
  198. }
  199. assert.Equal(t, "1", deleted.NbDeleted)
  200. defer teardown()
  201. }
  202. // func TestDeleteOneDecision(t *testing.T) {
  203. // mux, urlx, teardown := setup()
  204. // mux.HandleFunc("/watchers/login", func(w http.ResponseWriter, r *http.Request) {
  205. // w.WriteHeader(http.StatusOK)
  206. // w.Write([]byte(`{"code": 200, "expire": "2030-01-02T15:04:05Z", "token": "oklol"}`))
  207. // })
  208. // mux.HandleFunc("/decisions/1", func(w http.ResponseWriter, r *http.Request) {
  209. // testMethod(t, r, "DELETE")
  210. // w.WriteHeader(http.StatusOK)
  211. // w.Write([]byte(`{"nbDeleted":"1"}`))
  212. // })
  213. // log.Printf("URL is %s", urlx)
  214. // apiURL, err := url.Parse(urlx + "/")
  215. // if err != nil {
  216. // log.Fatalf("parsing api url: %s", apiURL)
  217. // }
  218. // client, err := NewClient(&Config{
  219. // MachineID: "test_login",
  220. // Password: "test_password",
  221. // UserAgent: fmt.Sprintf("crowdsec/%s", cwversion.VersionStr()),
  222. // URL: apiURL,
  223. // VersionPrefix: "v1",
  224. // })
  225. // if err != nil {
  226. // log.Fatalf("new api client: %s", err.Error())
  227. // }
  228. // filters := DecisionsDeleteOpts{IPEquals: new(string)}
  229. // *filters.IPEquals = "1.2.3.4"
  230. // deleted, _, err := client.Decisions.Delete(context.Background(), filters)
  231. // if err != nil {
  232. // t.Fatalf("unexpected err : %s", err)
  233. // }
  234. // assert.Equal(t, "1", deleted.NbDeleted)
  235. // defer teardown()
  236. // }