tcell_agent 0.4.0 → 1.0.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/Rakefile +9 -22
- data/bin/tcell_agent +127 -132
- data/lib/tcell_agent/agent/event_processor.rb +23 -22
- data/lib/tcell_agent/agent/fork_pipe_manager.rb +7 -7
- data/lib/tcell_agent/agent/policy_manager.rb +20 -15
- data/lib/tcell_agent/agent/policy_types.rb +5 -11
- data/lib/tcell_agent/agent/static_agent.rb +5 -1
- data/lib/tcell_agent/agent.rb +6 -4
- data/lib/tcell_agent/api.rb +7 -9
- data/lib/tcell_agent/appsensor/meta_data.rb +11 -4
- data/lib/tcell_agent/authlogic.rb +3 -3
- data/lib/tcell_agent/cmdi.rb +6 -4
- data/lib/tcell_agent/config/unknown_options.rb +3 -1
- data/lib/tcell_agent/configuration.rb +47 -49
- data/lib/tcell_agent/devise.rb +2 -2
- data/lib/tcell_agent/hooks/login_fraud.rb +58 -29
- data/lib/tcell_agent/instrumentation.rb +11 -10
- data/lib/tcell_agent/logger.rb +2 -2
- data/lib/tcell_agent/patches/meta_data.rb +9 -13
- data/lib/tcell_agent/patches.rb +7 -10
- data/lib/tcell_agent/policies/clickjacking_policy.rb +4 -5
- data/lib/tcell_agent/policies/content_security_policy.rb +6 -12
- data/lib/tcell_agent/policies/dataloss_policy.rb +2 -2
- data/lib/tcell_agent/policies/http_redirect_policy.rb +2 -2
- data/lib/tcell_agent/policies/policy.rb +0 -2
- data/lib/tcell_agent/policies/rust_policies.rb +90 -0
- data/lib/tcell_agent/policies/secure_headers_policy.rb +2 -2
- data/lib/tcell_agent/rails/auth/authlogic.rb +42 -24
- data/lib/tcell_agent/rails/auth/devise.rb +44 -23
- data/lib/tcell_agent/rails/auth/doorkeeper.rb +33 -15
- data/lib/tcell_agent/rails/better_ip.rb +1 -1
- data/lib/tcell_agent/rails/csrf_exception.rb +2 -2
- data/lib/tcell_agent/rails/dlp/process_request.rb +1 -1
- data/lib/tcell_agent/rails/dlp.rb +6 -6
- data/lib/tcell_agent/rails/dlp_handler.rb +1 -1
- data/lib/tcell_agent/rails/js_agent_insert.rb +1 -1
- data/lib/tcell_agent/rails/middleware/body_filter_middleware.rb +1 -1
- data/lib/tcell_agent/rails/middleware/context_middleware.rb +3 -2
- data/lib/tcell_agent/rails/middleware/headers_middleware.rb +10 -9
- data/lib/tcell_agent/rails/routes/grape.rb +6 -6
- data/lib/tcell_agent/rails/routes.rb +8 -11
- data/lib/tcell_agent/rust/libtcellagent-0.11.1.dylib +0 -0
- data/lib/tcell_agent/rust/{libtcellagent-0.6.1.so → libtcellagent-0.11.1.so} +0 -0
- data/lib/tcell_agent/rust/models.rb +16 -0
- data/lib/tcell_agent/rust/tcellagent-0.11.1.dll +0 -0
- data/lib/tcell_agent/rust/whisperer.rb +119 -48
- data/lib/tcell_agent/sensor_events/appsensor_meta_event.rb +17 -20
- data/lib/tcell_agent/sensor_events/command_injection.rb +50 -5
- data/lib/tcell_agent/sensor_events/login_fraud.rb +34 -18
- data/lib/tcell_agent/sensor_events/patches.rb +21 -0
- data/lib/tcell_agent/sensor_events/server_agent.rb +3 -3
- data/lib/tcell_agent/sensor_events/util/utils.rb +4 -3
- data/lib/tcell_agent/servers/puma.rb +2 -2
- data/lib/tcell_agent/servers/unicorn.rb +1 -1
- data/lib/tcell_agent/utils/passwords.rb +28 -0
- data/lib/tcell_agent/version.rb +1 -1
- data/lib/tcell_agent.rb +1 -5
- data/spec/apps/rails-3.2/config/tcell_agent.config +15 -0
- data/spec/apps/rails-3.2/log/development.log +0 -0
- data/spec/apps/rails-3.2/log/test.log +12 -0
- data/spec/apps/rails-4.1/log/test.log +0 -0
- data/spec/lib/tcell_agent/agent/fork_pipe_manager_spec.rb +46 -45
- data/spec/lib/tcell_agent/agent/policy_manager_spec.rb +276 -164
- data/spec/lib/tcell_agent/agent/static_agent_spec.rb +44 -47
- data/spec/lib/tcell_agent/api/api_spec.rb +16 -16
- data/spec/lib/tcell_agent/appsensor/injections_reporter_spec.rb +131 -116
- data/spec/lib/tcell_agent/appsensor/meta_data_spec.rb +55 -51
- data/spec/lib/tcell_agent/cmdi_spec.rb +413 -436
- data/spec/lib/tcell_agent/config/unknown_options_spec.rb +145 -128
- data/spec/lib/tcell_agent/configuration_spec.rb +165 -169
- data/spec/lib/tcell_agent/hooks/login_fraud_spec.rb +144 -153
- data/spec/lib/tcell_agent/instrumentation_spec.rb +84 -85
- data/spec/lib/tcell_agent/patches_spec.rb +70 -111
- data/spec/lib/tcell_agent/policies/appsensor_policy_spec.rb +313 -244
- data/spec/lib/tcell_agent/policies/clickjacking_policy_spec.rb +28 -28
- data/spec/lib/tcell_agent/policies/command_injection_policy_spec.rb +643 -513
- data/spec/lib/tcell_agent/policies/content_security_policy_spec.rb +55 -102
- data/spec/lib/tcell_agent/policies/dataloss_policy_spec.rb +111 -134
- data/spec/lib/tcell_agent/policies/http_redirect_policy_spec.rb +141 -146
- data/spec/lib/tcell_agent/policies/http_tx_policy_spec.rb +8 -8
- data/spec/lib/tcell_agent/policies/login_policy_spec.rb +15 -17
- data/spec/lib/tcell_agent/policies/patches_policy_spec.rb +231 -559
- data/spec/lib/tcell_agent/policies/secure_headers_policy_spec.rb +27 -27
- data/spec/lib/tcell_agent/rails/better_ip_spec.rb +30 -34
- data/spec/lib/tcell_agent/rails/logger_spec.rb +50 -49
- data/spec/lib/tcell_agent/rails/middleware/appsensor_middleware_spec.rb +182 -199
- data/spec/lib/tcell_agent/rails/middleware/dlp_middleware_spec.rb +110 -84
- data/spec/lib/tcell_agent/rails/middleware/global_middleware_spec.rb +107 -85
- data/spec/lib/tcell_agent/rails/middleware/redirect_middleware_spec.rb +68 -40
- data/spec/lib/tcell_agent/rails/middleware/tcell_body_proxy_spec.rb +81 -67
- data/spec/lib/tcell_agent/rails/responses_spec.rb +33 -37
- data/spec/lib/tcell_agent/rails/routes/grape_spec.rb +116 -121
- data/spec/lib/tcell_agent/rails/routes/route_id_spec.rb +25 -28
- data/spec/lib/tcell_agent/rails/routes/routes_spec.rb +87 -85
- data/spec/lib/tcell_agent/rails_spec.rb +1 -6
- data/spec/lib/tcell_agent/rust/models_spec.rb +112 -0
- data/spec/lib/tcell_agent/rust/whisperer_spec.rb +502 -179
- data/spec/lib/tcell_agent/sensor_events/appsensor_meta_event_spec.rb +44 -33
- data/spec/lib/tcell_agent/sensor_events/dlp_spec.rb +4 -4
- data/spec/lib/tcell_agent/sensor_events/sessions_metric_spec.rb +183 -169
- data/spec/lib/tcell_agent/sensor_events/util/sanitizer_utilities_spec.rb +25 -25
- data/spec/lib/tcell_agent/utils/bounded_queue_spec.rb +17 -20
- data/spec/lib/tcell_agent/utils/params_spec.rb +28 -28
- data/spec/lib/tcell_agent/utils/passwords_spec.rb +143 -0
- data/spec/lib/tcell_agent/utils/strings_spec.rb +35 -35
- data/spec/lib/tcell_agent_spec.rb +8 -8
- data/spec/spec_helper.rb +4 -4
- data/spec/support/middleware_helper.rb +10 -10
- data/spec/support/static_agent_overrides.rb +16 -12
- data/tcell_agent.gemspec +17 -33
- metadata +43 -198
- data/LICENSE_libinjection +0 -32
- data/Readme.txt +0 -7
- data/ext/libinjection/extconf.rb +0 -3
- data/ext/libinjection/libinjection.h +0 -65
- data/ext/libinjection/libinjection_html5.c +0 -847
- data/ext/libinjection/libinjection_html5.h +0 -54
- data/ext/libinjection/libinjection_sqli.c +0 -2317
- data/ext/libinjection/libinjection_sqli.h +0 -295
- data/ext/libinjection/libinjection_sqli_data.h +0 -9004
- data/ext/libinjection/libinjection_wrap.c +0 -3525
- data/ext/libinjection/libinjection_xss.c +0 -531
- data/ext/libinjection/libinjection_xss.h +0 -21
- data/lib/tcell_agent/appsensor/injections_matcher.rb +0 -155
- data/lib/tcell_agent/appsensor/rules/appsensor_rule_manager.rb +0 -49
- data/lib/tcell_agent/appsensor/rules/appsensor_rule_set.rb +0 -67
- data/lib/tcell_agent/appsensor/rules/baserules.json +0 -467
- data/lib/tcell_agent/patches/block_rule.rb +0 -93
- data/lib/tcell_agent/patches/sensors_matcher.rb +0 -31
- data/lib/tcell_agent/policies/appsensor/cmdi_sensor.rb +0 -23
- data/lib/tcell_agent/policies/appsensor/fpt_sensor.rb +0 -23
- data/lib/tcell_agent/policies/appsensor/injection_sensor.rb +0 -117
- data/lib/tcell_agent/policies/appsensor/nullbyte_sensor.rb +0 -26
- data/lib/tcell_agent/policies/appsensor/retr_sensor.rb +0 -22
- data/lib/tcell_agent/policies/appsensor/sqli_sensor.rb +0 -34
- data/lib/tcell_agent/policies/appsensor/xss_sensor.rb +0 -34
- data/lib/tcell_agent/policies/appsensor_policy.rb +0 -49
- data/lib/tcell_agent/policies/command_injection_policy.rb +0 -196
- data/lib/tcell_agent/policies/honeytokens_policy.rb +0 -69
- data/lib/tcell_agent/policies/patches_policy.rb +0 -84
- data/lib/tcell_agent/rust/libtcellagent-0.6.1.dylib +0 -0
- data/lib/tcell_agent/rust/tcellagent-0.6.1.dll +0 -0
- data/spec/apps/rails-3.2/Gemfile +0 -25
- data/spec/apps/rails-3.2/Gemfile.lock +0 -126
- data/spec/apps/rails-3.2/Rakefile +0 -7
- data/spec/apps/rails-3.2/app/assets/images/rails.png +0 -0
- data/spec/apps/rails-3.2/app/assets/javascripts/application.js +0 -15
- data/spec/apps/rails-3.2/app/assets/stylesheets/application.css +0 -13
- data/spec/apps/rails-3.2/app/controllers/application_controller.rb +0 -3
- data/spec/apps/rails-3.2/app/controllers/t_cell_app_controller.rb +0 -5
- data/spec/apps/rails-3.2/app/helpers/application_helper.rb +0 -2
- data/spec/apps/rails-3.2/app/views/layouts/application.html.erb +0 -14
- data/spec/apps/rails-3.2/app/views/t_cell_app/index.html.erb +0 -1
- data/spec/apps/rails-3.2/config/application.rb +0 -63
- data/spec/apps/rails-3.2/config/boot.rb +0 -6
- data/spec/apps/rails-3.2/config/environment.rb +0 -5
- data/spec/apps/rails-3.2/config/environments/test.rb +0 -37
- data/spec/apps/rails-3.2/config/routes.rb +0 -11
- data/spec/apps/rails-3.2/config.ru +0 -4
- data/spec/apps/rails-4.1/Gemfile +0 -7
- data/spec/apps/rails-4.1/Gemfile.lock +0 -114
- data/spec/apps/rails-4.1/Rakefile +0 -6
- data/spec/apps/rails-4.1/app/assets/javascripts/application.js +0 -16
- data/spec/apps/rails-4.1/app/assets/stylesheets/application.css +0 -15
- data/spec/apps/rails-4.1/app/controllers/application_controller.rb +0 -5
- data/spec/apps/rails-4.1/app/controllers/t_cell_app_controller.rb +0 -5
- data/spec/apps/rails-4.1/app/helpers/application_helper.rb +0 -2
- data/spec/apps/rails-4.1/app/views/layouts/application.html.erb +0 -14
- data/spec/apps/rails-4.1/app/views/t_cell_app/index.html.erb +0 -1
- data/spec/apps/rails-4.1/config/application.rb +0 -24
- data/spec/apps/rails-4.1/config/boot.rb +0 -4
- data/spec/apps/rails-4.1/config/environment.rb +0 -5
- data/spec/apps/rails-4.1/config/environments/test.rb +0 -41
- data/spec/apps/rails-4.1/config/initializers/assets.rb +0 -8
- data/spec/apps/rails-4.1/config/initializers/backtrace_silencers.rb +0 -7
- data/spec/apps/rails-4.1/config/initializers/cookies_serializer.rb +0 -3
- data/spec/apps/rails-4.1/config/initializers/filter_parameter_logging.rb +0 -4
- data/spec/apps/rails-4.1/config/initializers/inflections.rb +0 -16
- data/spec/apps/rails-4.1/config/initializers/mime_types.rb +0 -4
- data/spec/apps/rails-4.1/config/initializers/session_store.rb +0 -3
- data/spec/apps/rails-4.1/config/initializers/wrap_parameters.rb +0 -14
- data/spec/apps/rails-4.1/config/locales/en.yml +0 -23
- data/spec/apps/rails-4.1/config/routes.rb +0 -12
- data/spec/apps/rails-4.1/config/secrets.yml +0 -22
- data/spec/apps/rails-4.1/config.ru +0 -4
- data/spec/controllers/application_controller.rb +0 -12
- data/spec/lib/tcell_agent/appsensor/injections_matcher_spec.rb +0 -522
- data/spec/lib/tcell_agent/appsensor/rules/appsensor_rule_manager_spec.rb +0 -23
- data/spec/lib/tcell_agent/appsensor/rules/appsensor_rule_set_spec.rb +0 -159
- data/spec/lib/tcell_agent/patches/block_rule_spec.rb +0 -458
- data/spec/lib/tcell_agent/patches/sensors_matcher_spec.rb +0 -35
- data/spec/lib/tcell_agent/policies/appsensor/cmdi_sensor_spec.rb +0 -139
- data/spec/lib/tcell_agent/policies/appsensor/fpt_sensor_spec.rb +0 -139
- data/spec/lib/tcell_agent/policies/appsensor/nullbyte_sensor_spec.rb +0 -167
- data/spec/lib/tcell_agent/policies/appsensor/retr_sensor_spec.rb +0 -139
- data/spec/lib/tcell_agent/policies/appsensor/sqli_sensor_spec.rb +0 -246
- data/spec/lib/tcell_agent/policies/appsensor/xss_sensor_spec.rb +0 -882
- data/spec/lib/tcell_agent/policies/honeytokens_policy_spec.rb +0 -22
@@ -2,11 +2,9 @@ require 'spec_helper'
|
|
2
2
|
|
3
3
|
module TCellAgent
|
4
4
|
module Policies
|
5
|
-
|
6
5
|
describe HttpRedirectPolicy do
|
7
|
-
|
8
|
-
|
9
|
-
it "returns true" do
|
6
|
+
context 'with defaults' do
|
7
|
+
it 'returns true' do
|
10
8
|
http_redirect_plain = HttpRedirectPolicy.new
|
11
9
|
expect(http_redirect_plain.policy_id).to eq(nil)
|
12
10
|
expect(http_redirect_plain.enabled).to eq(false)
|
@@ -16,219 +14,218 @@ module TCellAgent
|
|
16
14
|
end
|
17
15
|
end
|
18
16
|
|
19
|
-
describe
|
17
|
+
describe '#suspicious_redirect?' do
|
20
18
|
it "see's other domain" do
|
21
19
|
http_redirect_policy = HttpRedirectPolicy.from_json({
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
expect(http_redirect_policy.policy_id).to eq(
|
20
|
+
'policy_id' => 'x1a1',
|
21
|
+
'data' => {
|
22
|
+
'enabled' => true
|
23
|
+
}
|
24
|
+
})
|
25
|
+
expect(http_redirect_policy.policy_id).to eq('x1a1')
|
28
26
|
expect(http_redirect_policy.enabled).to eq(true)
|
29
27
|
|
30
|
-
expect(http_redirect_policy.suspicious_redirect?(
|
28
|
+
expect(http_redirect_policy.suspicious_redirect?('test.google.com', 'www.test.com')).to eq(true)
|
31
29
|
end
|
32
30
|
|
33
|
-
context
|
34
|
-
it
|
31
|
+
context 'with wildcard domain' do
|
32
|
+
it 'should be false' do
|
35
33
|
http_redirect_policy = HttpRedirectPolicy.from_json({
|
36
|
-
|
37
|
-
|
38
|
-
|
39
|
-
|
40
|
-
|
41
|
-
|
34
|
+
'policy_id' => 'x1a1',
|
35
|
+
'data' => {
|
36
|
+
'enabled' => true,
|
37
|
+
'whitelist' => ['*.google.com']
|
38
|
+
}
|
39
|
+
})
|
42
40
|
|
43
|
-
expect(http_redirect_policy.suspicious_redirect?(
|
41
|
+
expect(http_redirect_policy.suspicious_redirect?('test.google.com', 'www.test.com')).to eq(false)
|
44
42
|
|
45
|
-
expect(http_redirect_policy.suspicious_redirect?(
|
43
|
+
expect(http_redirect_policy.suspicious_redirect?('test.google.net', 'www.test.com')).to eq(true)
|
46
44
|
end
|
47
45
|
end
|
48
46
|
end
|
49
47
|
|
50
|
-
describe
|
51
|
-
context
|
52
|
-
it
|
48
|
+
describe '#enforce' do
|
49
|
+
context 'with a disabled policy' do
|
50
|
+
it 'should not enfore the policy' do
|
53
51
|
http_redirect_policy = HttpRedirectPolicy.from_json({
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
|
58
|
-
|
59
|
-
|
60
|
-
|
52
|
+
'policy_id' => 'x1a1',
|
53
|
+
'data' => {
|
54
|
+
'enabled' => false,
|
55
|
+
'block' => true,
|
56
|
+
'whitelist' => ['*.google.com']
|
57
|
+
}
|
58
|
+
})
|
61
59
|
|
62
60
|
expect(http_redirect_policy.enforce(
|
63
|
-
|
64
|
-
).to eq(nil)
|
61
|
+
'https://test.google.com', 'www.test.com', '/path/a', 'GET', 'routex', '1.1.1.1', 400
|
62
|
+
)).to eq(nil)
|
65
63
|
end
|
66
64
|
end
|
67
65
|
|
68
|
-
context
|
69
|
-
context
|
70
|
-
it
|
66
|
+
context 'with an enabled policy' do
|
67
|
+
context 'redirecting to non whitelisted domain' do
|
68
|
+
it 'should block the redirect' do
|
71
69
|
http_redirect_policy = HttpRedirectPolicy.from_json({
|
72
|
-
|
73
|
-
|
74
|
-
|
75
|
-
|
76
|
-
|
77
|
-
|
78
|
-
|
70
|
+
'policy_id' => 'x1a1',
|
71
|
+
'data' => {
|
72
|
+
'enabled' => true,
|
73
|
+
'block' => true,
|
74
|
+
'whitelist' => ['good.com']
|
75
|
+
}
|
76
|
+
})
|
79
77
|
|
80
78
|
expect(http_redirect_policy.enforce(
|
81
|
-
|
82
|
-
)).to eq(
|
79
|
+
'https://www.google.com/abc/def', 'localhost', '/path/a', 'GET', 'routey', '1.1.1.1', 400
|
80
|
+
)).to eq('/')
|
83
81
|
end
|
84
82
|
end
|
85
83
|
|
86
|
-
context
|
87
|
-
it
|
84
|
+
context 'with a wildcard whitelist' do
|
85
|
+
it 'should not enfore allowed domains properly' do
|
88
86
|
http_redirect_policy = HttpRedirectPolicy.from_json({
|
89
|
-
|
90
|
-
|
91
|
-
|
92
|
-
|
93
|
-
|
94
|
-
|
95
|
-
|
87
|
+
'policy_id' => 'x1a1',
|
88
|
+
'data' => {
|
89
|
+
'enabled' => true,
|
90
|
+
'block' => true,
|
91
|
+
'whitelist' => ['*.allowed*.com']
|
92
|
+
}
|
93
|
+
})
|
96
94
|
|
97
95
|
expect(http_redirect_policy.enforce(
|
98
|
-
|
96
|
+
'https://allowed.com', 'localhost', '/path/a', 'GET', 'routey', '1.1.1.1', 400
|
99
97
|
)).to eq(nil)
|
100
98
|
|
101
99
|
expect(http_redirect_policy.enforce(
|
102
|
-
|
100
|
+
'https://www.alloweddomain.com', 'localhost', '/path/a', 'GET', 'routey', '1.1.1.1', 400
|
103
101
|
)).to eq(nil)
|
104
102
|
end
|
105
103
|
end
|
106
104
|
end
|
107
105
|
|
108
|
-
context
|
109
|
-
it
|
106
|
+
context 'with ports' do
|
107
|
+
it 'should remove ports in redirect event' do
|
110
108
|
http_redirect_policy = HttpRedirectPolicy.from_json({
|
111
|
-
|
112
|
-
|
113
|
-
|
114
|
-
|
115
|
-
|
116
|
-
|
109
|
+
'policy_id' => 'x1a1',
|
110
|
+
'data' => {
|
111
|
+
'enabled' => true,
|
112
|
+
'block' => false
|
113
|
+
}
|
114
|
+
})
|
117
115
|
|
118
116
|
expect(TCellAgent).to receive(:send_event).with({
|
119
|
-
|
120
|
-
|
121
|
-
|
122
|
-
|
123
|
-
|
124
|
-
|
125
|
-
|
126
|
-
|
127
|
-
|
117
|
+
'event_type' => 'redirect',
|
118
|
+
'method' => 'GET',
|
119
|
+
'from_domain' => 'www.test.com',
|
120
|
+
'status_code' => 400,
|
121
|
+
'remote_addr' => '1.1.1.1',
|
122
|
+
'to' => 'www.google.com',
|
123
|
+
'from' => '/path/a',
|
124
|
+
'rid' => 'routex'
|
125
|
+
})
|
128
126
|
|
129
127
|
result = http_redirect_policy.enforce(
|
130
|
-
|
128
|
+
'https://www.google.com:80', 'http://www.test.com', '/path/a', 'GET', 'routex', 400, '1.1.1.1'
|
131
129
|
)
|
132
130
|
expect(result).to eq(nil)
|
133
131
|
end
|
134
132
|
end
|
135
133
|
|
136
|
-
context
|
137
|
-
context
|
138
|
-
it
|
134
|
+
context 'data_scheme_allowed' do
|
135
|
+
context 'is not allowed' do
|
136
|
+
it 'should send an event' do
|
139
137
|
@http_redirect_policy = HttpRedirectPolicy.from_json({
|
140
|
-
|
141
|
-
|
142
|
-
|
143
|
-
|
144
|
-
|
145
|
-
|
146
|
-
|
147
|
-
|
138
|
+
'policy_id' => 'x1a1',
|
139
|
+
'data' => {
|
140
|
+
'enabled' => true,
|
141
|
+
'whitelist' => [],
|
142
|
+
'block' => false,
|
143
|
+
'data_scheme_allowed' => false
|
144
|
+
}
|
145
|
+
})
|
148
146
|
|
149
147
|
expect(TCellAgent).to receive(:send_event).with({
|
150
|
-
|
151
|
-
|
152
|
-
|
153
|
-
|
154
|
-
|
155
|
-
|
156
|
-
|
157
|
-
|
158
|
-
|
148
|
+
'event_type' => 'redirect',
|
149
|
+
'method' => 'GET',
|
150
|
+
'from_domain' => 'www.test.com',
|
151
|
+
'status_code' => 400,
|
152
|
+
'remote_addr' => '1.1.1.1',
|
153
|
+
'to' => 'data:text/html base64',
|
154
|
+
'from' => '/path/a',
|
155
|
+
'rid' => 'routex'
|
156
|
+
})
|
159
157
|
|
160
158
|
result = @http_redirect_policy.enforce(
|
161
|
-
|
162
|
-
|
163
|
-
|
164
|
-
|
165
|
-
|
159
|
+
'data:text/html base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K',
|
160
|
+
'http://www.test.com',
|
161
|
+
'/path/a',
|
162
|
+
'GET',
|
163
|
+
'routex',
|
166
164
|
400,
|
167
|
-
|
165
|
+
'1.1.1.1'
|
168
166
|
)
|
169
167
|
expect(result).to eq(nil)
|
170
168
|
end
|
171
169
|
|
172
|
-
context
|
173
|
-
it
|
170
|
+
context 'and blocking is enabled' do
|
171
|
+
it 'should send an event and redirect to root' do
|
174
172
|
@http_redirect_policy = HttpRedirectPolicy.from_json({
|
175
|
-
|
176
|
-
|
177
|
-
|
178
|
-
|
179
|
-
|
180
|
-
|
181
|
-
|
182
|
-
|
173
|
+
'policy_id' => 'x1a1',
|
174
|
+
'data' => {
|
175
|
+
'enabled' => true,
|
176
|
+
'whitelist' => [],
|
177
|
+
'block' => true,
|
178
|
+
'data_scheme_allowed' => false
|
179
|
+
}
|
180
|
+
})
|
183
181
|
|
184
182
|
expect(TCellAgent).to receive(:send_event).with({
|
185
|
-
|
186
|
-
|
187
|
-
|
188
|
-
|
189
|
-
|
190
|
-
|
191
|
-
|
192
|
-
|
193
|
-
|
183
|
+
'event_type' => 'redirect',
|
184
|
+
'method' => 'GET',
|
185
|
+
'from_domain' => 'www.test.com',
|
186
|
+
'status_code' => 400,
|
187
|
+
'remote_addr' => '1.1.1.1',
|
188
|
+
'to' => 'data:text/html base64',
|
189
|
+
'from' => '/path/a',
|
190
|
+
'rid' => 'routex'
|
191
|
+
})
|
194
192
|
|
195
193
|
result = @http_redirect_policy.enforce(
|
196
|
-
|
197
|
-
|
198
|
-
|
199
|
-
|
200
|
-
|
194
|
+
'data:text/html base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K',
|
195
|
+
'http://www.test.com',
|
196
|
+
'/path/a',
|
197
|
+
'GET',
|
198
|
+
'routex',
|
201
199
|
400,
|
202
|
-
|
200
|
+
'1.1.1.1'
|
203
201
|
)
|
204
|
-
expect(result).to eq(
|
205
|
-
|
202
|
+
expect(result).to eq('/')
|
206
203
|
end
|
207
204
|
end
|
208
205
|
end
|
209
206
|
|
210
|
-
context
|
211
|
-
it
|
207
|
+
context 'is allowed' do
|
208
|
+
it 'should not send an event' do
|
212
209
|
@http_redirect_policy = HttpRedirectPolicy.from_json({
|
213
|
-
|
214
|
-
|
215
|
-
|
216
|
-
|
217
|
-
|
218
|
-
|
219
|
-
|
220
|
-
|
210
|
+
'policy_id' => 'x1a1',
|
211
|
+
'data' => {
|
212
|
+
'enabled' => true,
|
213
|
+
'whitelist' => [],
|
214
|
+
'block' => false,
|
215
|
+
'data_scheme_allowed' => true
|
216
|
+
}
|
217
|
+
})
|
221
218
|
|
222
219
|
expect(TCellAgent).to_not receive(:send_event)
|
223
220
|
|
224
221
|
result = @http_redirect_policy.enforce(
|
225
|
-
|
226
|
-
|
227
|
-
|
228
|
-
|
229
|
-
|
222
|
+
'data:text/html base64,PHNjcmlwdD5hbGVydCgnWFNTJyk8L3NjcmlwdD4K',
|
223
|
+
'http://www.test.com',
|
224
|
+
'/path/a',
|
225
|
+
'GET',
|
226
|
+
'routex',
|
230
227
|
400,
|
231
|
-
|
228
|
+
'1.1.1.1'
|
232
229
|
)
|
233
230
|
|
234
231
|
expect(result).to eq(nil)
|
@@ -236,8 +233,6 @@ module TCellAgent
|
|
236
233
|
end
|
237
234
|
end
|
238
235
|
end
|
239
|
-
|
240
236
|
end
|
241
|
-
|
242
237
|
end
|
243
238
|
end
|
@@ -4,17 +4,17 @@ module TCellAgent
|
|
4
4
|
module Policies
|
5
5
|
describe HttpTxPolicy do
|
6
6
|
http_tx_policy_json = {
|
7
|
-
|
8
|
-
|
9
|
-
|
7
|
+
'policy_id' => '01a1',
|
8
|
+
'types' => {
|
9
|
+
'firehose' => { 'enabled' => true }
|
10
10
|
}
|
11
11
|
}
|
12
12
|
http_tx_from_json = HttpTxPolicy.from_json(http_tx_policy_json)
|
13
|
-
context
|
14
|
-
it
|
15
|
-
expect(http_tx_from_json.policy_id).to eq(
|
16
|
-
expect(http_tx_from_json.firehose[
|
17
|
-
expect(http_tx_from_json.firehose[
|
13
|
+
context 'initialized with 3 items' do
|
14
|
+
it 'returns true' do
|
15
|
+
expect(http_tx_from_json.policy_id).to eq('01a1')
|
16
|
+
expect(http_tx_from_json.firehose['enabled']).to eq(true)
|
17
|
+
expect(http_tx_from_json.firehose['lite']).to eq(false)
|
18
18
|
end
|
19
19
|
end
|
20
20
|
end
|
@@ -2,30 +2,29 @@ require 'spec_helper'
|
|
2
2
|
|
3
3
|
module TCellAgent
|
4
4
|
module Policies
|
5
|
-
|
6
5
|
describe LoginFraudPolicy do
|
7
6
|
policy_json_empty = {
|
8
|
-
|
9
|
-
|
10
|
-
|
7
|
+
'policy_id' => '01a1',
|
8
|
+
'data' => {
|
9
|
+
'options' => {}
|
11
10
|
}
|
12
11
|
}
|
13
12
|
|
14
13
|
policy_json_one = {
|
15
|
-
|
16
|
-
|
17
|
-
|
18
|
-
|
19
|
-
|
20
|
-
|
14
|
+
'policy_id' => '01a1',
|
15
|
+
'data' => {
|
16
|
+
'options' => {
|
17
|
+
'login_failed_enabled' => true,
|
18
|
+
'login_success_enabled' => true,
|
19
|
+
'session_hijacking_enabled' => true
|
21
20
|
}
|
22
21
|
}
|
23
22
|
}
|
24
23
|
|
25
24
|
empty_policy = LoginFraudPolicy.from_json(policy_json_empty)
|
26
|
-
context
|
27
|
-
it
|
28
|
-
expect(empty_policy.policy_id).to eq(
|
25
|
+
context 'test empty agent' do
|
26
|
+
it 'enabled is false' do
|
27
|
+
expect(empty_policy.policy_id).to eq('01a1')
|
29
28
|
expect(empty_policy.login_failed_enabled).to eq(false)
|
30
29
|
expect(empty_policy.login_success_enabled).to eq(false)
|
31
30
|
expect(empty_policy.session_hijacking_metrics).to eq(false)
|
@@ -33,15 +32,14 @@ module TCellAgent
|
|
33
32
|
end
|
34
33
|
|
35
34
|
policy_one = LoginFraudPolicy.from_json(policy_json_one)
|
36
|
-
context
|
37
|
-
it
|
38
|
-
expect(empty_policy.policy_id).to eq(
|
35
|
+
context 'enabled agent' do
|
36
|
+
it 'enabled is true' do
|
37
|
+
expect(empty_policy.policy_id).to eq('01a1')
|
39
38
|
expect(policy_one.login_failed_enabled).to eq(true)
|
40
39
|
expect(policy_one.login_success_enabled).to eq(true)
|
41
40
|
expect(policy_one.session_hijacking_metrics).to eq(true)
|
42
41
|
end
|
43
42
|
end
|
44
43
|
end
|
45
|
-
|
46
44
|
end
|
47
45
|
end
|