virustotal_api 0.5.2 → 0.5.6
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.github/ISSUE_TEMPLATE/bug_report.md +38 -0
- data/.github/ISSUE_TEMPLATE/feature_request.md +20 -0
- data/.github/pull_request_template.md +11 -0
- data/.github/workflows/ruby.yml +42 -3
- data/CHANGELOG.md +19 -0
- data/README.md +15 -3
- data/lib/virustotal_api/analysis.rb +0 -8
- data/lib/virustotal_api/base.rb +18 -6
- data/lib/virustotal_api/domain.rb +0 -6
- data/lib/virustotal_api/file.rb +20 -9
- data/lib/virustotal_api/group.rb +0 -8
- data/lib/virustotal_api/ip.rb +0 -6
- data/lib/virustotal_api/url.rb +0 -8
- data/lib/virustotal_api/user.rb +0 -8
- data/lib/virustotal_api/version.rb +1 -1
- data/test/analysis_test.rb +4 -1
- data/test/base_test.rb +16 -0
- data/test/domain_test.rb +3 -8
- data/test/file_test.rb +31 -29
- data/test/fixtures/domain_bad_request.yml +52 -0
- data/test/fixtures/file_upload.yml +1 -1
- data/test/fixtures/large_file_upload.yml +99 -0
- data/test/fixtures/url_encoding_find.yml +651 -0
- data/test/group_test.rb +2 -7
- data/test/ip_test.rb +2 -0
- data/test/url_test.rb +7 -25
- data/test/user_test.rb +2 -7
- metadata +11 -3
- data/.github/ISSUE_TEMPLATE.md +0 -15
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: bee3cd27ce8111b538905c1946c0ce5937c64852d8b7c2220727dd3d8720e3b3
|
4
|
+
data.tar.gz: be167894fbbe3a4ca1c6915aaab6796c350ef0115b6a7b1a9c13dbbf8ba1d068
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: f43f121b8b44967792d9ebaa7e047658b5f16b355cc9c74eb6474b061b43717a5675768a99ae8bcd6bbeb6e645b924fa09f647145dcd43275acf69685cdb86dc
|
7
|
+
data.tar.gz: efcd01e2d34e0ca29c7bfe2aeac95af54d9e97d0e2fc55611c84059379df95322fb82fd4e7b8e834bd196aa09b2c24b9b3bff2272b7f81e1ac615ab904dc82c8
|
@@ -0,0 +1,38 @@
|
|
1
|
+
---
|
2
|
+
name: Bug report
|
3
|
+
about: Create a report to help us improve
|
4
|
+
title: ''
|
5
|
+
labels: ''
|
6
|
+
assignees: ''
|
7
|
+
|
8
|
+
---
|
9
|
+
|
10
|
+
**Describe the bug**
|
11
|
+
A clear and concise description of what the bug is.
|
12
|
+
|
13
|
+
**To Reproduce**
|
14
|
+
Steps to reproduce the behavior:
|
15
|
+
1. Go to '...'
|
16
|
+
2. Click on '....'
|
17
|
+
3. Scroll down to '....'
|
18
|
+
4. See error
|
19
|
+
|
20
|
+
**Expected behavior**
|
21
|
+
A clear and concise description of what you expected to happen.
|
22
|
+
|
23
|
+
**Screenshots**
|
24
|
+
If applicable, add screenshots to help explain your problem.
|
25
|
+
|
26
|
+
**Desktop (please complete the following information):**
|
27
|
+
- OS: [e.g. iOS]
|
28
|
+
- Browser [e.g. chrome, safari]
|
29
|
+
- Version [e.g. 22]
|
30
|
+
|
31
|
+
**Smartphone (please complete the following information):**
|
32
|
+
- Device: [e.g. iPhone6]
|
33
|
+
- OS: [e.g. iOS8.1]
|
34
|
+
- Browser [e.g. stock browser, safari]
|
35
|
+
- Version [e.g. 22]
|
36
|
+
|
37
|
+
**Additional context**
|
38
|
+
Add any other context about the problem here.
|
@@ -0,0 +1,20 @@
|
|
1
|
+
---
|
2
|
+
name: Feature request
|
3
|
+
about: Suggest an idea for this project
|
4
|
+
title: ''
|
5
|
+
labels: ''
|
6
|
+
assignees: ''
|
7
|
+
|
8
|
+
---
|
9
|
+
|
10
|
+
**Is your feature request related to a problem? Please describe.**
|
11
|
+
A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
|
12
|
+
|
13
|
+
**Describe the solution you'd like**
|
14
|
+
A clear and concise description of what you want to happen.
|
15
|
+
|
16
|
+
**Describe alternatives you've considered**
|
17
|
+
A clear and concise description of any alternative solutions or features you've considered.
|
18
|
+
|
19
|
+
**Additional context**
|
20
|
+
Add any other context or screenshots about the feature request here.
|
data/.github/workflows/ruby.yml
CHANGED
@@ -7,17 +7,56 @@ on:
|
|
7
7
|
branches: [ master ]
|
8
8
|
|
9
9
|
jobs:
|
10
|
-
Test:
|
10
|
+
Test-Ruby-2-5:
|
11
11
|
runs-on: ubuntu-latest
|
12
|
-
|
13
12
|
steps:
|
14
13
|
- uses: actions/checkout@v2
|
15
14
|
- name: Set up Ruby
|
16
15
|
# To automatically get bug fixes and new Ruby versions for ruby/setup-ruby,
|
17
16
|
# change this to (see https://github.com/ruby/setup-ruby#versioning):
|
18
|
-
uses: ruby/setup-ruby@v1.
|
17
|
+
uses: ruby/setup-ruby@v1.70.1
|
19
18
|
with:
|
20
19
|
ruby-version: 2.5
|
20
|
+
- name: Show Ruby Version
|
21
|
+
run: ruby --version
|
22
|
+
- name: Install dependencies
|
23
|
+
run: bundle install
|
24
|
+
- name: Lint
|
25
|
+
run: bundle exec rake rubocop
|
26
|
+
- name: Run tests
|
27
|
+
run: bundle exec rake
|
28
|
+
|
29
|
+
Test-Ruby-2-7:
|
30
|
+
runs-on: ubuntu-latest
|
31
|
+
steps:
|
32
|
+
- uses: actions/checkout@v2
|
33
|
+
- name: Set up Ruby
|
34
|
+
# To automatically get bug fixes and new Ruby versions for ruby/setup-ruby,
|
35
|
+
# change this to (see https://github.com/ruby/setup-ruby#versioning):
|
36
|
+
uses: ruby/setup-ruby@v1.70.1
|
37
|
+
with:
|
38
|
+
ruby-version: 2.7
|
39
|
+
- name: Show Ruby Version
|
40
|
+
run: ruby --version
|
41
|
+
- name: Install dependencies
|
42
|
+
run: bundle install
|
43
|
+
- name: Lint
|
44
|
+
run: bundle exec rake rubocop
|
45
|
+
- name: Run tests
|
46
|
+
run: bundle exec rake
|
47
|
+
|
48
|
+
Test-Ruby-3-0:
|
49
|
+
runs-on: ubuntu-latest
|
50
|
+
steps:
|
51
|
+
- uses: actions/checkout@v2
|
52
|
+
- name: Set up Ruby
|
53
|
+
# To automatically get bug fixes and new Ruby versions for ruby/setup-ruby,
|
54
|
+
# change this to (see https://github.com/ruby/setup-ruby#versioning):
|
55
|
+
uses: ruby/setup-ruby@v1.70.1
|
56
|
+
with:
|
57
|
+
ruby-version: 3.0
|
58
|
+
- name: Show Ruby Version
|
59
|
+
run: ruby --version
|
21
60
|
- name: Install dependencies
|
22
61
|
run: bundle install
|
23
62
|
- name: Lint
|
data/CHANGELOG.md
CHANGED
@@ -1,5 +1,24 @@
|
|
1
1
|
# VirusTotal API Changelog
|
2
2
|
|
3
|
+
## [0.5.6] - 2021-09-20
|
4
|
+
|
5
|
+
* Use urlsafe base64 encoding
|
6
|
+
* Fix changelog
|
7
|
+
* [@jonnynux](https://github.com/jonnynux)
|
8
|
+
|
9
|
+
## [0.5.5] - 2021-05-10
|
10
|
+
|
11
|
+
* Add support for larger files
|
12
|
+
* [@Grandman](https://github.com/Grandman)
|
13
|
+
|
14
|
+
## [0.5.4] - 2020-12-10
|
15
|
+
|
16
|
+
* Manage bad requests like not found
|
17
|
+
* Use strict base64 encoding
|
18
|
+
* [@crondaemon](https://github.com/crondaemon)
|
19
|
+
|
20
|
+
## [0.5.3] = 2020-10-12
|
21
|
+
|
3
22
|
## [0.5.2] - 2020-10-06
|
4
23
|
|
5
24
|
* Fix Fix exists? check
|
data/README.md
CHANGED
@@ -65,7 +65,10 @@ require 'virustotal_api'
|
|
65
65
|
file = '/path/to/file'
|
66
66
|
api_key = 'MY_API_KEY'
|
67
67
|
|
68
|
+
# for upload file
|
68
69
|
vtscan = VirustotalAPI::File.upload(file, api_key)
|
70
|
+
# or large file (more than 32MB)
|
71
|
+
vtscan = VirustotalAPI::File.upload_large(file, api_key)
|
69
72
|
|
70
73
|
# Virustotal ID of file
|
71
74
|
vtscan.id
|
@@ -117,7 +120,7 @@ vturl_report.exists?
|
|
117
120
|
|
118
121
|
# URL for Report (if it exists)
|
119
122
|
vturl_report.report_url
|
120
|
-
# => "https://www.virustotal.com/api/v3/urls/dd014af5ed6b38d9130e3f466f850e46d21b951199d53a18ef29ee9341614eaf
|
123
|
+
# => "https://www.virustotal.com/api/v3/urls/dd014af5ed6b38d9130e3f466f850e46d21b951199d53a18ef29ee9341614eaf"
|
121
124
|
|
122
125
|
# Report results (if they exist) are available via #report
|
123
126
|
vturl_report.report['data']['attributes']['last_analysis_results']['Avira']
|
@@ -161,6 +164,10 @@ vtip_report = VirustotalAPI::IP.find(ip, api_key)
|
|
161
164
|
vtip_report.exists?
|
162
165
|
# => true
|
163
166
|
|
167
|
+
# URL for Report (if it exists)
|
168
|
+
vtip_report.report_url
|
169
|
+
# => "https://www.virustotal.com/api/v3/ip_addresses/8.8.8.8"
|
170
|
+
|
164
171
|
# Report results (if they exist) are available via #report
|
165
172
|
vtip_report.report
|
166
173
|
# => Hash of report results
|
@@ -180,6 +187,10 @@ vtdomain_report = VirustotalAPI::Domain.find(domain, api_key)
|
|
180
187
|
vtdomain_report.exists?
|
181
188
|
# => true
|
182
189
|
|
190
|
+
# URL for Report (if it exists)
|
191
|
+
vtdomain_report.report_url
|
192
|
+
# => "https://www.virustotal.com/api/v3/domains/virustotal.com"
|
193
|
+
|
183
194
|
# Report results (if they exist) are available via #report
|
184
195
|
vtdomain_report.report
|
185
196
|
# => Hash of report results
|
@@ -225,10 +236,11 @@ vtgroup_report.report
|
|
225
236
|
|
226
237
|
## Contributors
|
227
238
|
|
228
|
-
- [@postmodern](https://github.com/postmodern)
|
229
|
-
- [@mkunkel](https://github.com/mkunkel)
|
230
239
|
- [@jonnynux](https://github.com/jonnynux)
|
231
240
|
- [@crondaemon](https://github.com/crondaemon/)
|
241
|
+
- [@postmodern](https://github.com/postmodern)
|
242
|
+
- [@mkunkel](https://github.com/mkunkel)
|
243
|
+
- [@Grandman](https://github.com/Grandman)
|
232
244
|
|
233
245
|
## Contributing
|
234
246
|
|
@@ -5,13 +5,6 @@ require_relative 'base'
|
|
5
5
|
module VirustotalAPI
|
6
6
|
# A class for '/analyses' API
|
7
7
|
class Analysis < Base
|
8
|
-
attr_reader :report
|
9
|
-
|
10
|
-
# rubocop:disable Lint/MissingSuper
|
11
|
-
def initialize(report)
|
12
|
-
@report = report
|
13
|
-
end
|
14
|
-
|
15
8
|
# @param [String] id The Virustotal ID to get the report for.
|
16
9
|
# @param [String] api_key The key for virustotal
|
17
10
|
# @return [VirustotalAPI::IP] Report
|
@@ -21,4 +14,3 @@ module VirustotalAPI
|
|
21
14
|
end
|
22
15
|
end
|
23
16
|
end
|
24
|
-
# rubocop:enable Lint/MissingSuper
|
data/lib/virustotal_api/base.rb
CHANGED
@@ -9,10 +9,12 @@ require 'base64'
|
|
9
9
|
module VirustotalAPI
|
10
10
|
# The base class implementing the raw calls to Virustotal API V3.
|
11
11
|
class Base
|
12
|
-
attr_reader :report
|
12
|
+
attr_reader :report, :report_url, :id
|
13
13
|
|
14
14
|
def initialize(report)
|
15
|
-
@report
|
15
|
+
@report = report
|
16
|
+
@report_url = report&.dig('data', 'links', 'self')
|
17
|
+
@id = report&.dig('data', 'id')
|
16
18
|
end
|
17
19
|
|
18
20
|
# @return [String] string of API URI class method
|
@@ -20,6 +22,14 @@ module VirustotalAPI
|
|
20
22
|
VirustotalAPI::URI
|
21
23
|
end
|
22
24
|
|
25
|
+
def self.perform(path, api_key, method = :get, options = {})
|
26
|
+
base_perform(api_uri + path, api_key, method, options)
|
27
|
+
end
|
28
|
+
|
29
|
+
def self.perform_absolute(url, api_key, method = :get, options = {})
|
30
|
+
base_perform(url, api_key, method, options)
|
31
|
+
end
|
32
|
+
|
23
33
|
# The actual method performing a call to Virustotal
|
24
34
|
#
|
25
35
|
# @param [String] url The url of the API
|
@@ -27,15 +37,15 @@ module VirustotalAPI
|
|
27
37
|
# @param [String] method The HTTP method to use
|
28
38
|
# @param [Hash] options Options to pass as payload
|
29
39
|
# @return [VirustotalAPI::Domain] Report Search Result
|
30
|
-
def self.
|
40
|
+
def self.base_perform(url, api_key, method = :get, options = {})
|
31
41
|
response = RestClient::Request.execute(
|
32
42
|
method: method,
|
33
|
-
url:
|
43
|
+
url: url,
|
34
44
|
headers: { 'x-apikey': api_key },
|
35
45
|
payload: options
|
36
46
|
)
|
37
47
|
JSON.parse(response.body)
|
38
|
-
rescue RestClient::NotFound
|
48
|
+
rescue RestClient::NotFound, RestClient::BadRequest
|
39
49
|
{}
|
40
50
|
rescue RestClient::Unauthorized
|
41
51
|
# Raise a custom exception not to expose the underlying
|
@@ -47,6 +57,8 @@ module VirustotalAPI
|
|
47
57
|
raise VirustotalAPI::RateLimitError
|
48
58
|
end
|
49
59
|
|
60
|
+
private_class_method :base_perform
|
61
|
+
|
50
62
|
# @return [String] string of API URI instance method
|
51
63
|
def api_uri
|
52
64
|
self.class.api_uri
|
@@ -60,7 +72,7 @@ module VirustotalAPI
|
|
60
72
|
# Generate a URL identifier.
|
61
73
|
# @see https://developers.virustotal.com/v3.0/reference#url
|
62
74
|
def self.url_identifier(url)
|
63
|
-
Base64.
|
75
|
+
Base64.urlsafe_encode64(url).strip.gsub('=', '')
|
64
76
|
end
|
65
77
|
end
|
66
78
|
end
|
@@ -5,11 +5,6 @@ require_relative 'base'
|
|
5
5
|
module VirustotalAPI
|
6
6
|
# A class for '/domains' API
|
7
7
|
class Domain < Base
|
8
|
-
# rubocop:disable Lint/UselessMethodDefinition
|
9
|
-
def initialize(report)
|
10
|
-
super(report)
|
11
|
-
end
|
12
|
-
|
13
8
|
# Find a domain.
|
14
9
|
#
|
15
10
|
# @param [String] domain The domain to search
|
@@ -21,4 +16,3 @@ module VirustotalAPI
|
|
21
16
|
end
|
22
17
|
end
|
23
18
|
end
|
24
|
-
# rubocop:enable Lint/UselessMethodDefinition
|
data/lib/virustotal_api/file.rb
CHANGED
@@ -5,14 +5,6 @@ require_relative 'base'
|
|
5
5
|
module VirustotalAPI
|
6
6
|
# A class for '/files' API
|
7
7
|
class File < Base
|
8
|
-
attr_reader :id, :report_url
|
9
|
-
|
10
|
-
def initialize(report)
|
11
|
-
super(report)
|
12
|
-
@id = report&.dig('data', 'id')
|
13
|
-
@report_url = report&.dig('data', 'links', 'self')
|
14
|
-
end
|
15
|
-
|
16
8
|
# Find a hash.
|
17
9
|
#
|
18
10
|
# @param [String] resource file as a md5/sha1/sha256 hash
|
@@ -31,7 +23,20 @@ module VirustotalAPI
|
|
31
23
|
# @return [VirusotalAPI::File] Report
|
32
24
|
def self.upload(file_path, api_key, opts = {})
|
33
25
|
filename = opts.fetch('filename') { ::File.basename(file_path) }
|
34
|
-
report
|
26
|
+
report = perform('/files', api_key, :post, filename: filename, file: ::File.open(file_path, 'r'))
|
27
|
+
new(report)
|
28
|
+
end
|
29
|
+
|
30
|
+
# Upload a new file with size more than 32MB.
|
31
|
+
#
|
32
|
+
# @param [String] file_path for file to be sent for scan
|
33
|
+
# @param [String] api_key The key for virustotal
|
34
|
+
# @param [Hash] opts hash for additional options
|
35
|
+
# @return [VirusotalAPI::File] Report
|
36
|
+
def self.upload_large(file_path, api_key, opts = {})
|
37
|
+
filename = opts.fetch('filename') { ::File.basename(file_path) }
|
38
|
+
url = upload_url(api_key)
|
39
|
+
report = perform_absolute(url, api_key, :post, filename: filename, file: ::File.open(file_path, 'r'))
|
35
40
|
new(report)
|
36
41
|
end
|
37
42
|
|
@@ -45,6 +50,12 @@ module VirustotalAPI
|
|
45
50
|
new(report)
|
46
51
|
end
|
47
52
|
|
53
|
+
# @return [String] url for upload file
|
54
|
+
def self.upload_url(api_key)
|
55
|
+
data = perform('/files/upload_url', api_key)
|
56
|
+
data&.dig('data')
|
57
|
+
end
|
58
|
+
|
48
59
|
# Check if the submitted hash is detected by an AV engine.
|
49
60
|
#
|
50
61
|
# @param [String] engine The engine to check.
|
data/lib/virustotal_api/group.rb
CHANGED
@@ -5,14 +5,6 @@ require_relative 'base'
|
|
5
5
|
module VirustotalAPI
|
6
6
|
# A class for '/groups' API
|
7
7
|
class Group < Base
|
8
|
-
attr_reader :report_url, :id
|
9
|
-
|
10
|
-
def initialize(report)
|
11
|
-
super(report)
|
12
|
-
@report_url = report&.dig('data', 'links', 'self')
|
13
|
-
@id = report&.dig('data', 'id')
|
14
|
-
end
|
15
|
-
|
16
8
|
# Find a Group.
|
17
9
|
#
|
18
10
|
# @param [String] group_id to find
|
data/lib/virustotal_api/ip.rb
CHANGED
@@ -5,11 +5,6 @@ require_relative 'base'
|
|
5
5
|
module VirustotalAPI
|
6
6
|
# A class for '/ip_addresses' API
|
7
7
|
class IP < Base
|
8
|
-
# rubocop:disable Lint/UselessMethodDefinition
|
9
|
-
def initialize(report)
|
10
|
-
super(report)
|
11
|
-
end
|
12
|
-
|
13
8
|
# Find an IP.
|
14
9
|
#
|
15
10
|
# @param [String] ip address The IP to find.
|
@@ -21,4 +16,3 @@ module VirustotalAPI
|
|
21
16
|
end
|
22
17
|
end
|
23
18
|
end
|
24
|
-
# rubocop:enable Lint/UselessMethodDefinition
|
data/lib/virustotal_api/url.rb
CHANGED
@@ -5,14 +5,6 @@ require_relative 'base'
|
|
5
5
|
module VirustotalAPI
|
6
6
|
# A class for '/urls' API
|
7
7
|
class URL < Base
|
8
|
-
attr_reader :report_url, :id
|
9
|
-
|
10
|
-
def initialize(report)
|
11
|
-
super(report)
|
12
|
-
@report_url = report&.dig('data', 'links', 'self')
|
13
|
-
@id = report&.dig('data', 'id')
|
14
|
-
end
|
15
|
-
|
16
8
|
# Find a URL.
|
17
9
|
#
|
18
10
|
# @param [String] resource as an ip/domain/url
|
data/lib/virustotal_api/user.rb
CHANGED
@@ -5,14 +5,6 @@ require_relative 'base'
|
|
5
5
|
module VirustotalAPI
|
6
6
|
# A class for '/users' API
|
7
7
|
class User < Base
|
8
|
-
attr_reader :report_url, :id
|
9
|
-
|
10
|
-
def initialize(report)
|
11
|
-
super(report)
|
12
|
-
@report_url = report&.dig('data', 'links', 'self')
|
13
|
-
@id = report&.dig('data', 'id')
|
14
|
-
end
|
15
|
-
|
16
8
|
# Find a User.
|
17
9
|
#
|
18
10
|
# @param [String] user_key with id or api_key
|
data/test/analysis_test.rb
CHANGED
@@ -11,13 +11,16 @@ class VirustotalAPIAnalysisTest < Minitest::Test
|
|
11
11
|
def test_todo
|
12
12
|
VCR.use_cassette('url_find') do
|
13
13
|
vtreport = VirustotalAPI::URL.find(@url, @api_key)
|
14
|
+
|
14
15
|
@id = vtreport.id
|
15
|
-
assert @id
|
16
|
+
assert @id.is_a?(String)
|
16
17
|
end
|
17
18
|
|
18
19
|
VCR.use_cassette('analysis') do
|
19
20
|
analysis = VirustotalAPI::Analysis.find(@id, @api_key)
|
21
|
+
|
20
22
|
assert analysis.exists?
|
23
|
+
assert analysis.id.is_a?(String)
|
21
24
|
end
|
22
25
|
end
|
23
26
|
end
|
data/test/base_test.rb
CHANGED
@@ -4,7 +4,9 @@ require './test/test_helper'
|
|
4
4
|
|
5
5
|
class VirustotalAPIBaseTest < Minitest::Test
|
6
6
|
def setup
|
7
|
+
@domain = 'xpressco.za'
|
7
8
|
@sha256 = '01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b'
|
9
|
+
@url = 'https://www.dropbox.com/s/qmi112rc4ns75eb/Confidential_123.xls?dl=1'
|
8
10
|
@api_key = 'testapikey'
|
9
11
|
end
|
10
12
|
|
@@ -43,5 +45,19 @@ class VirustotalAPIBaseTest < Minitest::Test
|
|
43
45
|
|
44
46
|
assert !virustotal_report.exists?
|
45
47
|
end
|
48
|
+
|
49
|
+
VCR.use_cassette('domain_bad_request') do
|
50
|
+
virustotal_report = VirustotalAPI::Domain.find(@domain, @api_key)
|
51
|
+
|
52
|
+
assert !virustotal_report.exists?
|
53
|
+
end
|
54
|
+
end
|
55
|
+
|
56
|
+
def test_url_encoding
|
57
|
+
VCR.use_cassette('url_encoding_find') do
|
58
|
+
virustotal_report = VirustotalAPI::URL.find(@url, @api_key)
|
59
|
+
|
60
|
+
assert virustotal_report.exists?
|
61
|
+
end
|
46
62
|
end
|
47
63
|
end
|
data/test/domain_test.rb
CHANGED
@@ -17,16 +17,11 @@ class VirustotalAPIDomainTest < Minitest::Test
|
|
17
17
|
vtdomain_report = VirustotalAPI::Domain.find(@domain, @api_key)
|
18
18
|
|
19
19
|
# Make sure that the JSON was parsed
|
20
|
+
assert vtdomain_report.exists?
|
20
21
|
assert vtdomain_report.is_a?(VirustotalAPI::Domain)
|
21
22
|
assert vtdomain_report.report.is_a?(Hash)
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
def test_exists?
|
26
|
-
VCR.use_cassette('domain') do
|
27
|
-
vtdomain_report = VirustotalAPI::Domain.find(@domain, @api_key)
|
28
|
-
|
29
|
-
assert vtdomain_report.exists?
|
23
|
+
assert vtdomain_report.id.is_a?(String)
|
24
|
+
assert vtdomain_report.report_url.is_a?(String)
|
30
25
|
end
|
31
26
|
end
|
32
27
|
end
|
data/test/file_test.rb
CHANGED
@@ -4,9 +4,9 @@ require './test/test_helper'
|
|
4
4
|
|
5
5
|
class VirustotalAPIFileTest < Minitest::Test
|
6
6
|
def setup
|
7
|
-
@sha256
|
7
|
+
@sha256 = '01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b'
|
8
8
|
@file_path = File.expand_path('test/fixtures/null_file')
|
9
|
-
@api_key
|
9
|
+
@api_key = 'testapikey'
|
10
10
|
end
|
11
11
|
|
12
12
|
def test_class_exists
|
@@ -15,57 +15,59 @@ class VirustotalAPIFileTest < Minitest::Test
|
|
15
15
|
|
16
16
|
def test_report_response
|
17
17
|
VCR.use_cassette('file_find') do
|
18
|
-
|
18
|
+
vt_file_report = VirustotalAPI::File.find(@sha256, @api_key)
|
19
19
|
|
20
20
|
# Make sure that the JSON was parsed
|
21
|
-
assert
|
22
|
-
assert
|
21
|
+
assert vt_file_report.exists?
|
22
|
+
assert vt_file_report.is_a?(VirustotalAPI::File)
|
23
|
+
assert vt_file_report.report.is_a?(Hash)
|
24
|
+
assert vt_file_report.id.is_a?(String)
|
25
|
+
assert vt_file_report.report_url.is_a?(String)
|
23
26
|
end
|
24
27
|
end
|
25
28
|
|
26
29
|
def test_find
|
27
|
-
|
28
|
-
|
30
|
+
id = '01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b'
|
31
|
+
permalink = "https://www.virustotal.com/api/v3/files/#{id}"
|
32
|
+
|
29
33
|
VCR.use_cassette('file_find') do
|
30
|
-
|
34
|
+
vt_file_report = VirustotalAPI::File.find(@sha256, @api_key)
|
31
35
|
|
32
|
-
|
33
|
-
assert_equal
|
34
|
-
assert
|
35
|
-
assert !
|
36
|
-
assert !
|
36
|
+
assert_equal permalink, vt_file_report.report_url
|
37
|
+
assert_equal id, vt_file_report.id
|
38
|
+
assert vt_file_report.detected_by('Avira')
|
39
|
+
assert !vt_file_report.detected_by('Acronis')
|
40
|
+
assert !vt_file_report.detected_by('Yeyeyeye') # not present in file
|
37
41
|
end
|
38
42
|
end
|
39
43
|
|
40
44
|
def test_upload
|
41
45
|
VCR.use_cassette('file_upload') do
|
42
|
-
|
46
|
+
vt_file_upload = VirustotalAPI::File.upload(@file_path, @api_key)
|
43
47
|
|
44
|
-
assert
|
48
|
+
assert vt_file_upload.exists?
|
49
|
+
assert vt_file_upload.report.is_a?(Hash)
|
50
|
+
assert vt_file_upload.id.is_a?(String)
|
45
51
|
end
|
46
52
|
end
|
47
53
|
|
48
|
-
def
|
49
|
-
VCR.use_cassette('
|
50
|
-
|
54
|
+
def test_upload_large
|
55
|
+
VCR.use_cassette('large_file_upload') do
|
56
|
+
vt_file_upload = VirustotalAPI::File.upload_large(@file_path, @api_key)
|
51
57
|
|
52
|
-
assert
|
58
|
+
assert vt_file_upload.exists?
|
59
|
+
assert vt_file_upload.report.is_a?(Hash)
|
60
|
+
assert vt_file_upload.id.is_a?(String)
|
53
61
|
end
|
54
62
|
end
|
55
63
|
|
56
64
|
def test_analyse
|
57
65
|
VCR.use_cassette('file_analyse') do
|
58
|
-
|
59
|
-
|
60
|
-
assert virustotal_analyse.report.is_a?(Hash)
|
61
|
-
end
|
62
|
-
end
|
63
|
-
|
64
|
-
def test_analyse_id
|
65
|
-
VCR.use_cassette('file_analyse') do
|
66
|
-
virustotal_analyse = VirustotalAPI::File.analyse(@sha256, @api_key)
|
66
|
+
vt_file_analyse = VirustotalAPI::File.analyse(@sha256, @api_key)
|
67
67
|
|
68
|
-
assert
|
68
|
+
assert vt_file_analyse.exists?
|
69
|
+
assert vt_file_analyse.report.is_a?(Hash)
|
70
|
+
assert vt_file_analyse.id.is_a?(String)
|
69
71
|
end
|
70
72
|
end
|
71
73
|
end
|
@@ -0,0 +1,52 @@
|
|
1
|
+
---
|
2
|
+
http_interactions:
|
3
|
+
- request:
|
4
|
+
method: get
|
5
|
+
uri: https://www.virustotal.com/api/v3/domains/xpressco.za
|
6
|
+
body:
|
7
|
+
encoding: US-ASCII
|
8
|
+
string: ''
|
9
|
+
headers:
|
10
|
+
Accept:
|
11
|
+
- "*/*"
|
12
|
+
User-Agent:
|
13
|
+
- rest-client/2.1.0 (linux-gnu x86_64) ruby/2.5.1p57
|
14
|
+
X-Apikey:
|
15
|
+
- testapikey
|
16
|
+
Content-Length:
|
17
|
+
- '0'
|
18
|
+
Content-Type:
|
19
|
+
- application/x-www-form-urlencoded
|
20
|
+
Accept-Encoding:
|
21
|
+
- gzip;q=1.0,deflate;q=0.6,identity;q=0.3
|
22
|
+
Host:
|
23
|
+
- www.virustotal.com
|
24
|
+
response:
|
25
|
+
status:
|
26
|
+
code: 400
|
27
|
+
message: Bad Request
|
28
|
+
headers:
|
29
|
+
Cache-Control:
|
30
|
+
- no-cache
|
31
|
+
Content-Type:
|
32
|
+
- application/json; charset=utf-8
|
33
|
+
X-Cloud-Trace-Context:
|
34
|
+
- f9f5f005efc95b0390a91fb6306201d6
|
35
|
+
Date:
|
36
|
+
- Mon, 28 Dec 2020 13:56:50 GMT
|
37
|
+
Server:
|
38
|
+
- Google Frontend
|
39
|
+
Content-Length:
|
40
|
+
- '138'
|
41
|
+
body:
|
42
|
+
encoding: UTF-8
|
43
|
+
string: |-
|
44
|
+
{
|
45
|
+
"error": {
|
46
|
+
"code": "InvalidArgumentError",
|
47
|
+
"message": "Domain \"xpressco.za\" is not a valid domain pattern"
|
48
|
+
}
|
49
|
+
}
|
50
|
+
http_version:
|
51
|
+
recorded_at: Mon, 28 Dec 2020 13:56:50 GMT
|
52
|
+
recorded_with: VCR 5.0.0
|