@@ -37,101 +37,103 @@ $SCRIPTDIR/../examples/set_secure_user_falco_rules.py $PYTHON_SDC_TEST_API_TOKEN
3737$SCRIPTDIR /../examples/get_secure_user_falco_rules.py $PYTHON_SDC_TEST_API_TOKEN > /tmp/falco_rules.yaml
3838diff /tmp/falco_rules.yaml /tmp/test_apis_user_rules.yaml
3939
40- # Temporarily disabled while the Secure API is being reviewed
41- # # Delete all policies and then get them. There should be none.
42- # $SCRIPTDIR/../examples/delete_all_policies.py $PYTHON_SDC_TEST_API_TOKEN
43- # OUT=`$SCRIPTDIR/../examples/list_policies.py $PYTHON_SDC_TEST_API_TOKEN`
44- # if [[ $OUT != *"[]"* ]]; then
45- # echo "Unexpected output after deleting all policies"
46- # exit 1
47- # fi
48-
49- # # Create the default set of policies and then fetch them. There should
50- # # be 1, corresponding to the system falco rule.
51- # $SCRIPTDIR/../examples/create_default_policies.py $PYTHON_SDC_TEST_API_TOKEN
52- # OUT=`$SCRIPTDIR/../examples/list_policies.py $PYTHON_SDC_TEST_API_TOKEN`
53- # if [[ $OUT != *"\"Write below binary dir \""* ]]; then
54- # echo "Unexpected output after creating default policies"
55- # exit 1
56- # fi
40+
41+ # Delete all policies and then get them. There should be none.
42+ $SCRIPTDIR /../examples/delete_all_policies.py $PYTHON_SDC_TEST_API_TOKEN
43+ OUT=` $SCRIPTDIR /../examples/list_policies.py $PYTHON_SDC_TEST_API_TOKEN `
44+ if [[ $OUT != * " []" * ]]; then
45+ echo " Unexpected output after deleting all policies"
46+ exit 1
47+ fi
48+
49+ # Create the default set of policies and then fetch them. There should
50+ # be 1, corresponding to the system falco rule.
51+ $SCRIPTDIR /../examples/create_default_policies.py $PYTHON_SDC_TEST_API_TOKEN
52+ OUT=` $SCRIPTDIR /../examples/list_policies.py $PYTHON_SDC_TEST_API_TOKEN `
53+ if [[ $OUT != * " \" Suspicious Filesystem Changes \" " * ]]; then
54+ echo " Unexpected output after creating default policies"
55+ exit 1
56+ fi
5757
5858# Get that policy, change the name, and create a new duplicate policy.
59- OUT=` $SCRIPTDIR /../examples/get_policy.py $PYTHON_SDC_TEST_API_TOKEN " Write below binary dir " `
59+ OUT=` $SCRIPTDIR /../examples/get_policy.py $PYTHON_SDC_TEST_API_TOKEN " Suspicious Filesystem Changes " `
6060MY_POLICY=$OUT
61- if [[ $OUT != * " \" Write below binary dir \" " * ]]; then
62- echo " Could not fetch policy with name \" Write below binary dir \" "
61+ if [[ $OUT != * " \" Suspicious Filesystem Changes \" " * ]]; then
62+ echo " Could not fetch policy with name \" Suspicious Filesystem Changes \" "
6363 exit 1
6464fi
6565
66- NEW_POLICY=` echo $MY_POLICY | sed -e " s/Write below binary dir/Write below etc /g" | sed -e ' s/"id": [0-9]*,//' | sed -e ' s/"version": [0-9]*/"version": null/' `
66+ NEW_POLICY=` echo $MY_POLICY | sed -e " s/Suspicious Filesystem Changes/Suspicious Filesystem Changes 2 /g" | sed -e ' s/"id": [0-9]*,//' | sed -e ' s/"version": [0-9]*/"version": null/' `
6767OUT=` echo $NEW_POLICY | $SCRIPTDIR /../examples/add_policy.py $PYTHON_SDC_TEST_API_TOKEN `
68- if [[ $OUT != * " \" Write below etc \" " * ]]; then
68+ if [[ $OUT != * " \" Suspicious Filesystem Changes 2 \" " * ]]; then
6969 echo " Could not create new policy"
7070 exit 1
7171fi
7272
7373# Change the description of the new policy and update it.
74- MODIFIED_POLICY=` echo $MY_POLICY | sed -e " s/an attempt to write to any file below a set of binary directories/My New Description/g" `
74+ ID=` echo $OUT | grep -E -o ' "id": [^,]+,' | awk ' {print $2}' | awk -F, ' {print $1}' `
75+ MODIFIED_POLICY=` echo $MY_POLICY | sed -e " s/Suspicious Filesystem Changes/Suspicious Filesystem Changes 2/g" | sed -e " s,Identified suspicious filesystem activity that might change sensitive/important files,My New Description,g" | sed -e " s/\" id\" : [0-9]*,/\" id\" : $ID ,/" `
7576OUT=` echo $MODIFIED_POLICY | $SCRIPTDIR /../examples/update_policy.py $PYTHON_SDC_TEST_API_TOKEN `
7677if [[ $OUT != * " \" description\" : \" My New Description\" " * ]]; then
77- echo " Could not update policy \" Copy Of Write below binary dir \" "
78+ echo " Could not update policy \" Suspicious Filesystem Changes 2 \" "
7879 exit 1
7980fi
8081
8182# Delete the new policy.
82- OUT=` $SCRIPTDIR /../examples/delete_policy.py --name " Copy Of Write below binary dir " $PYTHON_SDC_TEST_API_TOKEN `
83- if [[ $OUT != * " \" Copy Of Write below binary dir \" " * ]]; then
84- echo " Could not delete policy \" Copy Of Write below binary dir \" "
83+ OUT=` $SCRIPTDIR /../examples/delete_policy.py --name " Suspicious Filesystem Changes 2 " $PYTHON_SDC_TEST_API_TOKEN `
84+ if [[ $OUT != * " \" Suspicious Filesystem Changes 2 \" " * ]]; then
85+ echo " Could not delete policy \" Suspicious Filesystem Changes 2 \" "
8586 exit 1
8687fi
8788
8889OUT=` $SCRIPTDIR /../examples/list_policies.py $PYTHON_SDC_TEST_API_TOKEN `
89- if [[ $OUT = * " \" Copy Of Write below binary dir \" " * ]]; then
90- echo " After deleting policy Copy Of Write below binary dir , policy was still present?"
90+ if [[ $OUT = * " \" Suspicious Filesystem Changes 2 \" " * ]]; then
91+ echo " After deleting policy Suspicious Filesystem Changes 2 , policy was still present?"
9192 exit 1
9293fi
9394
9495# Make a copy again, but this time delete by id
95- NEW_POLICY=` echo $MY_POLICY | sed -e " s/Write below binary dir /Another Copy Of Write below binary dir /g" | sed -e ' s/"id": [0-9]*,//' | sed -e ' s/"version": [0-9]*/"version": null/' `
96+ NEW_POLICY=` echo $MY_POLICY | sed -e " s/Suspicious Filesystem Changes /Another Copy Of Suspicious Filesystem Changes /g" | sed -e ' s/"id": [0-9]*,//' | sed -e ' s/"version": [0-9]*/"version": null/' `
9697OUT=` echo $NEW_POLICY | $SCRIPTDIR /../examples/add_policy.py $PYTHON_SDC_TEST_API_TOKEN `
97- if [[ $OUT != * " \" Another Copy Of Write below binary dir \" " * ]]; then
98+ if [[ $OUT != * " \" Another Copy Of Suspicious Filesystem Changes \" " * ]]; then
9899 echo " Could not create new policy"
99100 exit 1
100101fi
101102
102103ID=` echo $OUT | grep -E -o ' "id": [^,]+,' | awk ' {print $2}' | awk -F, ' {print $1}' `
103104
104105OUT=` $SCRIPTDIR /../examples/delete_policy.py --id $ID $PYTHON_SDC_TEST_API_TOKEN `
105- if [[ $OUT != * " \" Another Copy Of Write below binary dir \" " * ]]; then
106- echo " Could not delete policy \" Copy Of Write below binary dir \" "
106+ if [[ $OUT != * " \" Another Copy Of Suspicious Filesystem Changes \" " * ]]; then
107+ echo " Could not delete policy \" Another Copy Of Suspicious Filesystem Changes \" "
107108 exit 1
108109fi
109110
110111OUT=` $SCRIPTDIR /../examples/list_policies.py $PYTHON_SDC_TEST_API_TOKEN `
111112if [[ $OUT = * " \" Another Copy Of Write below binary dir\" " * ]]; then
112- echo " After deleting policy Another Copy Of Write below binary dir , policy was still present?"
113+ echo " After deleting policy Another Copy Of Suspicious Filesystem Changes , policy was still present?"
113114 exit 1
114115fi
115116
116117# Trigger some events
117- FOUND=0
118+ # should be able to uncomment after SSPROD-2580 is addressed
119+ # FOUND=0
118120
119- for i in $( seq 10) ; do
120- sudo touch /bin/some-file.txt
121- sleep 10
121+ # for i in $(seq 10); do
122+ # sudo cat /etc/shadow
123+ # sleep 10
122124
123- EVTS=` $SCRIPTDIR /../examples/get_secure_policy_events.py $PYTHON_SDC_TEST_API_TOKEN 60`
125+ # EVTS=`$SCRIPTDIR/../examples/get_secure_policy_events.py $PYTHON_SDC_TEST_API_TOKEN 60`
124126
125- if [[ " $EVTS " != " " ]]; then
126- FOUND=1
127- break ;
128- fi
129- done
127+ # if [[ "$EVTS" != "" ]]; then
128+ # FOUND=1
129+ # break;
130+ # fi
131+ # done
130132
131- if [[ $FOUND == 0 ]]; then
132- echo " Did not find any policy events after 10 attempts..."
133- exit 1
134- fi
133+ # if [[ $FOUND == 0 ]]; then
134+ # echo "Did not find any policy events after 10 attempts..."
135+ # exit 1
136+ # fi
135137
136138
137139#
0 commit comments