-
Notifications
You must be signed in to change notification settings - Fork 262
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add tests for sensitive cmd token invocation IDs
- Loading branch information
1 parent
c1ac32b
commit a030953
Showing
3 changed files
with
129 additions
and
13 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,82 @@ | ||
import random | ||
from canarytokens.constants import CANARYTOKEN_ALPHABET, INVOCATION_ID_LENGTH | ||
import pytest | ||
|
||
from canarytokens.models import ( | ||
CMDTokenHistory, | ||
CMDTokenRequest, | ||
CMDTokenResponse, | ||
TokenAlertDetailGeneric, | ||
) | ||
|
||
from tests.utils import ( | ||
clear_stats_on_webhook, | ||
trigger_cmd_token, | ||
create_token, | ||
get_stats_from_webhook, | ||
get_token_history, | ||
run_or_skip, | ||
v3, | ||
) | ||
|
||
|
||
@pytest.mark.parametrize("version", [v3]) | ||
@pytest.mark.parametrize( | ||
"use_invocation_id, expected_hits", | ||
[ | ||
(True, 1), | ||
(False, 2), | ||
], | ||
) | ||
def test_cmd_token_fires( | ||
use_invocation_id: bool, | ||
expected_hits: int, | ||
webhook_receiver, | ||
version, | ||
runv2, | ||
runv3, | ||
): | ||
""" | ||
Tests the sensitive command token. | ||
""" | ||
run_or_skip(version, runv2=runv2, runv3=runv3) | ||
# Create a CMD token request | ||
memo = "Test stuff break stuff test stuff sometimes build stuff" | ||
|
||
token_request = CMDTokenRequest( | ||
webhook_url=webhook_receiver, memo=memo, cmd_process="klist.exe" | ||
) | ||
resp = create_token(token_request, version=version) | ||
|
||
# Check dns token has correct attributes | ||
token_info = CMDTokenResponse(**resp) | ||
# assert dns_token_info.webhook_url == token_request.webhook_url | ||
assert token_info.token in token_info.hostname.split(".") | ||
|
||
clear_stats_on_webhook(webhook_receiver, token=token_info.token) | ||
# Trigger CMD token twice, make sure the invocation ID limits it to one hit | ||
invocation_id = ( | ||
"".join( | ||
random.choice(CANARYTOKEN_ALPHABET) for _ in range(INVOCATION_ID_LENGTH) | ||
) | ||
if use_invocation_id | ||
else None | ||
) | ||
_ = trigger_cmd_token(token_info, version=version, invocation_id=invocation_id) | ||
_ = trigger_cmd_token(token_info, version=version, invocation_id=invocation_id) | ||
|
||
stats = get_stats_from_webhook(webhook_receiver, token=token_info.token) | ||
if stats is not None: | ||
# Check that what was sent to the webhook is consistent. | ||
assert len(stats) == expected_hits | ||
assert stats[0]["memo"] == memo | ||
_ = TokenAlertDetailGeneric(**stats[0]) | ||
|
||
# Check that the returned history has a single hit. | ||
resp = get_token_history(token_info=token_info, version=version) | ||
|
||
token_history = CMDTokenHistory(**resp) | ||
# TODO: what other fields do we want to assert on. | ||
# note: making them TokenHistory have stronger validators is | ||
# the better option. | ||
assert len(token_history.hits) == expected_hits |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters