2021-09-15 19:27:53 +00:00
|
|
|
package service
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2021-11-24 17:16:42 +00:00
|
|
|
"encoding/json"
|
2021-09-15 19:27:53 +00:00
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"net/http"
|
2021-12-15 14:35:40 +00:00
|
|
|
"net/url"
|
2021-11-24 17:16:42 +00:00
|
|
|
"reflect"
|
2021-12-15 14:35:40 +00:00
|
|
|
"strings"
|
2021-09-15 19:27:53 +00:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/fleetdm/fleet/v4/server/fleet"
|
|
|
|
"github.com/fleetdm/fleet/v4/server/ptr"
|
2021-10-15 10:34:30 +00:00
|
|
|
"github.com/fleetdm/fleet/v4/server/test"
|
2021-09-15 19:27:53 +00:00
|
|
|
"github.com/ghodss/yaml"
|
2021-12-14 21:34:11 +00:00
|
|
|
"github.com/google/uuid"
|
2021-09-15 19:27:53 +00:00
|
|
|
"github.com/stretchr/testify/assert"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
|
|
"github.com/stretchr/testify/suite"
|
2021-11-11 20:33:06 +00:00
|
|
|
"gopkg.in/guregu/null.v3"
|
2021-09-15 19:27:53 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type integrationTestSuite struct {
|
|
|
|
suite.Suite
|
|
|
|
|
|
|
|
withServer
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) SetupSuite() {
|
|
|
|
s.withServer.SetupSuite("integrationTestSuite")
|
|
|
|
}
|
|
|
|
|
2021-09-29 16:13:23 +00:00
|
|
|
func (s *integrationTestSuite) TearDownTest() {
|
|
|
|
u := s.users["admin1@example.com"]
|
|
|
|
filter := fleet.TeamFilter{User: &u}
|
|
|
|
hosts, _ := s.ds.ListHosts(context.Background(), filter, fleet.HostListOptions{})
|
|
|
|
var ids []uint
|
|
|
|
for _, host := range hosts {
|
|
|
|
ids = append(ids, host.ID)
|
|
|
|
}
|
|
|
|
s.ds.DeleteHosts(context.Background(), ids)
|
|
|
|
}
|
|
|
|
|
2021-09-15 19:27:53 +00:00
|
|
|
func TestIntegrations(t *testing.T) {
|
|
|
|
testingSuite := new(integrationTestSuite)
|
|
|
|
testingSuite.s = &testingSuite.Suite
|
|
|
|
suite.Run(t, testingSuite)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestDoubleUserCreationErrors() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
params := fleet.UserPayload{
|
|
|
|
Name: ptr.String("user1"),
|
|
|
|
Email: ptr.String("email@asd.com"),
|
|
|
|
Password: ptr.String("pass"),
|
|
|
|
GlobalRole: ptr.String(fleet.RoleObserver),
|
|
|
|
}
|
|
|
|
|
|
|
|
s.Do("POST", "/api/v1/fleet/users/admin", ¶ms, http.StatusOK)
|
|
|
|
respSecond := s.Do("POST", "/api/v1/fleet/users/admin", ¶ms, http.StatusConflict)
|
|
|
|
|
|
|
|
assertBodyContains(t, respSecond, `Error 1062: Duplicate entry 'email@asd.com'`)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestUserWithoutRoleErrors() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
params := fleet.UserPayload{
|
|
|
|
Name: ptr.String("user1"),
|
|
|
|
Email: ptr.String("email@asd.com"),
|
|
|
|
Password: ptr.String("pass"),
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := s.Do("POST", "/api/v1/fleet/users/admin", ¶ms, http.StatusUnprocessableEntity)
|
|
|
|
assertErrorCodeAndMessage(t, resp, fleet.ErrNoRoleNeeded, "either global role or team role needs to be defined")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestUserWithWrongRoleErrors() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
params := fleet.UserPayload{
|
|
|
|
Name: ptr.String("user1"),
|
|
|
|
Email: ptr.String("email@asd.com"),
|
|
|
|
Password: ptr.String("pass"),
|
|
|
|
GlobalRole: ptr.String("wrongrole"),
|
|
|
|
}
|
|
|
|
resp := s.Do("POST", "/api/v1/fleet/users/admin", ¶ms, http.StatusUnprocessableEntity)
|
|
|
|
assertErrorCodeAndMessage(t, resp, fleet.ErrNoRoleNeeded, "GlobalRole role can only be admin, observer, or maintainer.")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestUserCreationWrongTeamErrors() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
teams := []fleet.UserTeam{
|
|
|
|
{
|
|
|
|
Team: fleet.Team{
|
|
|
|
ID: 9999,
|
|
|
|
},
|
|
|
|
Role: fleet.RoleObserver,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
params := fleet.UserPayload{
|
|
|
|
Name: ptr.String("user2"),
|
|
|
|
Email: ptr.String("email2@asd.com"),
|
|
|
|
Password: ptr.String("pass"),
|
|
|
|
Teams: &teams,
|
|
|
|
}
|
|
|
|
resp := s.Do("POST", "/api/v1/fleet/users/admin", ¶ms, http.StatusUnprocessableEntity)
|
|
|
|
assertBodyContains(t, resp, `Error 1452: Cannot add or update a child row: a foreign key constraint fails`)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestQueryCreationLogsActivity() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
admin1 := s.users["admin1@example.com"]
|
|
|
|
admin1.GravatarURL = "http://iii.com"
|
|
|
|
err := s.ds.SaveUser(context.Background(), &admin1)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
params := fleet.QueryPayload{
|
|
|
|
Name: ptr.String("user1"),
|
|
|
|
Query: ptr.String("select * from time;"),
|
|
|
|
}
|
|
|
|
s.Do("POST", "/api/v1/fleet/queries", ¶ms, http.StatusOK)
|
|
|
|
|
|
|
|
activities := listActivitiesResponse{}
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/activities", nil, http.StatusOK, &activities)
|
|
|
|
|
2021-11-24 17:16:42 +00:00
|
|
|
assert.GreaterOrEqual(t, len(activities.Activities), 1)
|
|
|
|
found := false
|
|
|
|
for _, activity := range activities.Activities {
|
|
|
|
if activity.Type == "created_saved_query" {
|
|
|
|
found = true
|
|
|
|
assert.Equal(t, "Test Name admin1@example.com", activity.ActorFullName)
|
|
|
|
require.NotNil(t, activity.ActorGravatar)
|
|
|
|
assert.Equal(t, "http://iii.com", *activity.ActorGravatar)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
require.True(t, found)
|
2021-09-15 19:27:53 +00:00
|
|
|
}
|
2021-11-11 16:45:39 +00:00
|
|
|
|
2021-09-15 19:27:53 +00:00
|
|
|
func (s *integrationTestSuite) TestAppConfigAdditionalQueriesCanBeRemoved() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
spec := []byte(`
|
|
|
|
host_expiry_settings:
|
|
|
|
host_expiry_enabled: true
|
|
|
|
host_expiry_window: 0
|
|
|
|
host_settings:
|
|
|
|
additional_queries:
|
|
|
|
time: SELECT * FROM time
|
|
|
|
enable_host_users: true
|
|
|
|
`)
|
|
|
|
s.applyConfig(spec)
|
|
|
|
|
|
|
|
spec = []byte(`
|
|
|
|
host_settings:
|
|
|
|
enable_host_users: true
|
|
|
|
additional_queries: null
|
|
|
|
`)
|
|
|
|
s.applyConfig(spec)
|
|
|
|
|
|
|
|
config := s.getConfig()
|
|
|
|
assert.Nil(t, config.HostSettings.AdditionalQueries)
|
|
|
|
assert.True(t, config.HostExpirySettings.HostExpiryEnabled)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestAppConfigDefaultValues() {
|
|
|
|
config := s.getConfig()
|
|
|
|
s.Run("Update interval", func() {
|
|
|
|
require.Equal(s.T(), 1*time.Hour, config.UpdateInterval.OSQueryDetail)
|
|
|
|
})
|
|
|
|
|
|
|
|
s.Run("has logging", func() {
|
|
|
|
require.NotNil(s.T(), config.Logging)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestUserRolesSpec() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
_, err := s.ds.NewTeam(context.Background(), &fleet.Team{
|
|
|
|
ID: 42,
|
|
|
|
Name: "team1",
|
|
|
|
Description: "desc team1",
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
email := t.Name() + "@asd.com"
|
|
|
|
u := &fleet.User{
|
|
|
|
Password: []byte("asd"),
|
|
|
|
Name: t.Name(),
|
|
|
|
Email: email,
|
|
|
|
GravatarURL: "http://asd.com",
|
|
|
|
GlobalRole: ptr.String(fleet.RoleObserver),
|
|
|
|
}
|
|
|
|
user, err := s.ds.NewUser(context.Background(), u)
|
|
|
|
require.NoError(t, err)
|
|
|
|
assert.Len(t, user.Teams, 0)
|
|
|
|
|
|
|
|
spec := []byte(fmt.Sprintf(`
|
|
|
|
roles:
|
|
|
|
%s:
|
|
|
|
global_role: null
|
|
|
|
teams:
|
|
|
|
- role: maintainer
|
|
|
|
team: team1
|
|
|
|
`,
|
|
|
|
email))
|
|
|
|
|
|
|
|
var userRoleSpec applyUserRoleSpecsRequest
|
|
|
|
err = yaml.Unmarshal(spec, &userRoleSpec.Spec)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
s.Do("POST", "/api/v1/fleet/users/roles/spec", &userRoleSpec, http.StatusOK)
|
|
|
|
|
|
|
|
user, err = s.ds.UserByEmail(context.Background(), email)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Len(t, user.Teams, 1)
|
|
|
|
assert.Equal(t, fleet.RoleMaintainer, user.Teams[0].Role)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestGlobalSchedule() {
|
|
|
|
t := s.T()
|
|
|
|
|
2021-12-15 14:06:34 +00:00
|
|
|
// list the existing global schedules (none yet)
|
2021-09-15 19:27:53 +00:00
|
|
|
gs := fleet.GlobalSchedulePayload{}
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/global/schedule", nil, http.StatusOK, &gs)
|
|
|
|
require.Len(t, gs.GlobalSchedule, 0)
|
|
|
|
|
2021-12-15 14:06:34 +00:00
|
|
|
// create a query that can be scheduled
|
2021-09-15 19:27:53 +00:00
|
|
|
qr, err := s.ds.NewQuery(context.Background(), &fleet.Query{
|
|
|
|
Name: "TestQuery1",
|
|
|
|
Description: "Some description",
|
|
|
|
Query: "select * from osquery;",
|
|
|
|
ObserverCanRun: true,
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2021-12-15 14:06:34 +00:00
|
|
|
// schedule that query
|
2021-09-15 19:27:53 +00:00
|
|
|
gsParams := fleet.ScheduledQueryPayload{QueryID: ptr.Uint(qr.ID), Interval: ptr.Uint(42)}
|
|
|
|
r := globalScheduleQueryResponse{}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/global/schedule", gsParams, http.StatusOK, &r)
|
|
|
|
|
2021-12-15 14:06:34 +00:00
|
|
|
// list the scheduled queries, get the one just created
|
2021-09-15 19:27:53 +00:00
|
|
|
gs = fleet.GlobalSchedulePayload{}
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/global/schedule", nil, http.StatusOK, &gs)
|
|
|
|
require.Len(t, gs.GlobalSchedule, 1)
|
|
|
|
assert.Equal(t, uint(42), gs.GlobalSchedule[0].Interval)
|
|
|
|
assert.Equal(t, "TestQuery1", gs.GlobalSchedule[0].Name)
|
|
|
|
id := gs.GlobalSchedule[0].ID
|
|
|
|
|
2021-12-15 14:06:34 +00:00
|
|
|
// list page 2, should be empty
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/global/schedule", nil, http.StatusOK, &gs, "page", "2", "per_page", "4")
|
|
|
|
require.Len(t, gs.GlobalSchedule, 0)
|
|
|
|
|
|
|
|
// update the scheduled query
|
2021-09-15 19:27:53 +00:00
|
|
|
gs = fleet.GlobalSchedulePayload{}
|
|
|
|
gsParams = fleet.ScheduledQueryPayload{Interval: ptr.Uint(55)}
|
|
|
|
s.DoJSON("PATCH", fmt.Sprintf("/api/v1/fleet/global/schedule/%d", id), gsParams, http.StatusOK, &gs)
|
|
|
|
|
2021-12-15 14:06:34 +00:00
|
|
|
// update a non-existing schedule
|
|
|
|
gsParams = fleet.ScheduledQueryPayload{Interval: ptr.Uint(66)}
|
|
|
|
s.DoJSON("PATCH", fmt.Sprintf("/api/v1/fleet/global/schedule/%d", id+1), gsParams, http.StatusNotFound, &gs)
|
|
|
|
|
|
|
|
// read back that updated scheduled query
|
2021-09-15 19:27:53 +00:00
|
|
|
gs = fleet.GlobalSchedulePayload{}
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/global/schedule", nil, http.StatusOK, &gs)
|
|
|
|
require.Len(t, gs.GlobalSchedule, 1)
|
2021-12-15 14:06:34 +00:00
|
|
|
assert.Equal(t, id, gs.GlobalSchedule[0].ID)
|
2021-09-15 19:27:53 +00:00
|
|
|
assert.Equal(t, uint(55), gs.GlobalSchedule[0].Interval)
|
|
|
|
|
2021-12-15 14:06:34 +00:00
|
|
|
// delete the scheduled query
|
2021-09-15 19:27:53 +00:00
|
|
|
r = globalScheduleQueryResponse{}
|
|
|
|
s.DoJSON("DELETE", fmt.Sprintf("/api/v1/fleet/global/schedule/%d", id), nil, http.StatusOK, &r)
|
|
|
|
|
2021-12-15 14:06:34 +00:00
|
|
|
// delete a non-existing schedule
|
|
|
|
s.DoJSON("DELETE", fmt.Sprintf("/api/v1/fleet/global/schedule/%d", id+1), nil, http.StatusNotFound, &r)
|
|
|
|
|
|
|
|
// list the scheduled queries, back to none
|
2021-09-15 19:27:53 +00:00
|
|
|
gs = fleet.GlobalSchedulePayload{}
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/global/schedule", nil, http.StatusOK, &gs)
|
|
|
|
require.Len(t, gs.GlobalSchedule, 0)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestTranslator() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
payload := translatorResponse{}
|
|
|
|
params := translatorRequest{List: []fleet.TranslatePayload{
|
|
|
|
{
|
|
|
|
Type: fleet.TranslatorTypeUserEmail,
|
|
|
|
Payload: fleet.StringIdentifierToIDPayload{Identifier: "admin1@example.com"},
|
|
|
|
},
|
|
|
|
}}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/translate", ¶ms, http.StatusOK, &payload)
|
|
|
|
require.Len(t, payload.List, 1)
|
|
|
|
|
|
|
|
assert.Equal(t, s.users[payload.List[0].Payload.Identifier].ID, payload.List[0].Payload.ID)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestVulnerableSoftware() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
host, err := s.ds.NewHost(context.Background(), &fleet.Host{
|
|
|
|
DetailUpdatedAt: time.Now(),
|
|
|
|
LabelUpdatedAt: time.Now(),
|
2021-09-27 19:27:38 +00:00
|
|
|
PolicyUpdatedAt: time.Now(),
|
2021-09-15 19:27:53 +00:00
|
|
|
SeenTime: time.Now(),
|
|
|
|
NodeKey: t.Name() + "1",
|
|
|
|
UUID: t.Name() + "1",
|
2021-10-20 21:01:20 +00:00
|
|
|
Hostname: t.Name() + "foo.local",
|
2021-09-15 19:27:53 +00:00
|
|
|
PrimaryIP: "192.168.1.1",
|
|
|
|
PrimaryMac: "30-65-EC-6F-C4-58",
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.NotNil(t, host)
|
|
|
|
|
|
|
|
soft := fleet.HostSoftware{
|
|
|
|
Modified: true,
|
|
|
|
Software: []fleet.Software{
|
|
|
|
{Name: "foo", Version: "0.0.1", Source: "chrome_extensions"},
|
|
|
|
{Name: "bar", Version: "0.0.3", Source: "apps"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
host.HostSoftware = soft
|
|
|
|
require.NoError(t, s.ds.SaveHostSoftware(context.Background(), host))
|
|
|
|
require.NoError(t, s.ds.LoadHostSoftware(context.Background(), host))
|
|
|
|
|
|
|
|
soft1 := host.Software[0]
|
|
|
|
if soft1.Name != "bar" {
|
|
|
|
soft1 = host.Software[1]
|
|
|
|
}
|
|
|
|
|
|
|
|
require.NoError(t, s.ds.AddCPEForSoftware(context.Background(), soft1, "somecpe"))
|
|
|
|
require.NoError(t, s.ds.InsertCVEForCPE(context.Background(), "cve-123-123-132", []string{"somecpe"}))
|
|
|
|
|
|
|
|
resp := s.Do("GET", fmt.Sprintf("/api/v1/fleet/hosts/%d", host.ID), nil, http.StatusOK)
|
|
|
|
bodyBytes, err := ioutil.ReadAll(resp.Body)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
expectedJSONSoft2 := `"name": "bar",
|
|
|
|
"version": "0.0.3",
|
|
|
|
"source": "apps",
|
|
|
|
"generated_cpe": "somecpe",
|
|
|
|
"vulnerabilities": [
|
|
|
|
{
|
|
|
|
"cve": "cve-123-123-132",
|
|
|
|
"details_link": "https://nvd.nist.gov/vuln/detail/cve-123-123-132"
|
|
|
|
}
|
|
|
|
]`
|
|
|
|
expectedJSONSoft1 := `"name": "foo",
|
|
|
|
"version": "0.0.1",
|
|
|
|
"source": "chrome_extensions",
|
|
|
|
"generated_cpe": "",
|
|
|
|
"vulnerabilities": null`
|
|
|
|
// We are doing Contains instead of equals to test the output for software in particular
|
|
|
|
// ignoring other things like timestamps and things that are outside the cope of this ticket
|
|
|
|
assert.Contains(t, string(bodyBytes), expectedJSONSoft2)
|
|
|
|
assert.Contains(t, string(bodyBytes), expectedJSONSoft1)
|
2021-10-20 21:01:20 +00:00
|
|
|
|
2021-12-03 13:54:17 +00:00
|
|
|
countReq := countSoftwareRequest{}
|
|
|
|
countResp := countSoftwareResponse{}
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/software/count", countReq, http.StatusOK, &countResp)
|
|
|
|
assert.Equal(t, 2, countResp.Count)
|
|
|
|
|
2021-10-20 21:01:20 +00:00
|
|
|
lsReq := listSoftwareRequest{}
|
|
|
|
lsResp := listSoftwareResponse{}
|
2021-11-05 16:36:05 +00:00
|
|
|
s.DoJSON("GET", "/api/v1/fleet/software", lsReq, http.StatusOK, &lsResp, "vulnerable", "true", "order_key", "generated_cpe", "order_direction", "desc")
|
2021-10-20 21:01:20 +00:00
|
|
|
assert.Len(t, lsResp.Software, 1)
|
|
|
|
assert.Equal(t, soft1.ID, lsResp.Software[0].ID)
|
|
|
|
assert.Len(t, lsResp.Software[0].Vulnerabilities, 1)
|
2021-11-11 11:49:17 +00:00
|
|
|
|
2021-12-03 13:54:17 +00:00
|
|
|
s.DoJSON("GET", "/api/v1/fleet/software/count", countReq, http.StatusOK, &countResp, "vulnerable", "true", "order_key", "generated_cpe", "order_direction", "desc")
|
|
|
|
assert.Equal(t, 1, countResp.Count)
|
|
|
|
|
2021-11-23 18:50:51 +00:00
|
|
|
s.DoJSON("GET", "/api/v1/fleet/software", lsReq, http.StatusOK, &lsResp, "vulnerable", "true", "order_key", "name,id", "order_direction", "desc")
|
2021-11-11 11:49:17 +00:00
|
|
|
assert.Len(t, lsResp.Software, 1)
|
|
|
|
assert.Equal(t, soft1.ID, lsResp.Software[0].ID)
|
|
|
|
assert.Len(t, lsResp.Software[0].Vulnerabilities, 1)
|
2021-09-15 19:27:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestGlobalPolicies() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
for i := 0; i < 3; i++ {
|
|
|
|
_, err := s.ds.NewHost(context.Background(), &fleet.Host{
|
|
|
|
DetailUpdatedAt: time.Now(),
|
|
|
|
LabelUpdatedAt: time.Now(),
|
2021-09-27 19:27:38 +00:00
|
|
|
PolicyUpdatedAt: time.Now(),
|
2021-09-15 19:27:53 +00:00
|
|
|
SeenTime: time.Now().Add(-time.Duration(i) * time.Minute),
|
2021-09-29 16:13:23 +00:00
|
|
|
OsqueryHostID: fmt.Sprintf("%s%d", t.Name(), i),
|
|
|
|
NodeKey: fmt.Sprintf("%s%d", t.Name(), i),
|
|
|
|
UUID: fmt.Sprintf("%s%d", t.Name(), i),
|
|
|
|
Hostname: fmt.Sprintf("%sfoo.local%d", t.Name(), i),
|
2021-09-15 19:27:53 +00:00
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
qr, err := s.ds.NewQuery(context.Background(), &fleet.Query{
|
|
|
|
Name: "TestQuery3",
|
|
|
|
Description: "Some description",
|
|
|
|
Query: "select * from osquery;",
|
|
|
|
ObserverCanRun: true,
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2021-11-24 17:16:42 +00:00
|
|
|
gpParams := globalPolicyRequest{
|
|
|
|
QueryID: &qr.ID,
|
|
|
|
Resolution: "some global resolution",
|
|
|
|
}
|
2021-09-15 19:27:53 +00:00
|
|
|
gpResp := globalPolicyResponse{}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/global/policies", gpParams, http.StatusOK, &gpResp)
|
|
|
|
require.NotNil(t, gpResp.Policy)
|
2021-11-24 17:16:42 +00:00
|
|
|
assert.Equal(t, qr.Name, gpResp.Policy.Name)
|
|
|
|
assert.Equal(t, qr.Query, gpResp.Policy.Query)
|
|
|
|
assert.Equal(t, qr.Description, gpResp.Policy.Description)
|
2021-10-28 13:10:03 +00:00
|
|
|
require.NotNil(t, gpResp.Policy.Resolution)
|
|
|
|
assert.Equal(t, "some global resolution", *gpResp.Policy.Resolution)
|
2021-09-15 19:27:53 +00:00
|
|
|
|
|
|
|
policiesResponse := listGlobalPoliciesResponse{}
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/global/policies", nil, http.StatusOK, &policiesResponse)
|
|
|
|
require.Len(t, policiesResponse.Policies, 1)
|
2021-11-24 17:16:42 +00:00
|
|
|
assert.Equal(t, qr.Name, policiesResponse.Policies[0].Name)
|
|
|
|
assert.Equal(t, qr.Query, policiesResponse.Policies[0].Query)
|
|
|
|
assert.Equal(t, qr.Description, policiesResponse.Policies[0].Description)
|
2021-09-15 19:27:53 +00:00
|
|
|
|
|
|
|
singlePolicyResponse := getPolicyByIDResponse{}
|
|
|
|
singlePolicyURL := fmt.Sprintf("/api/v1/fleet/global/policies/%d", policiesResponse.Policies[0].ID)
|
|
|
|
s.DoJSON("GET", singlePolicyURL, nil, http.StatusOK, &singlePolicyResponse)
|
2021-11-24 17:16:42 +00:00
|
|
|
assert.Equal(t, qr.Name, singlePolicyResponse.Policy.Name)
|
|
|
|
assert.Equal(t, qr.Query, singlePolicyResponse.Policy.Query)
|
|
|
|
assert.Equal(t, qr.Description, singlePolicyResponse.Policy.Description)
|
2021-09-15 19:27:53 +00:00
|
|
|
|
|
|
|
listHostsURL := fmt.Sprintf("/api/v1/fleet/hosts?policy_id=%d", policiesResponse.Policies[0].ID)
|
|
|
|
listHostsResp := listHostsResponse{}
|
|
|
|
s.DoJSON("GET", listHostsURL, nil, http.StatusOK, &listHostsResp)
|
|
|
|
require.Len(t, listHostsResp.Hosts, 3)
|
|
|
|
|
|
|
|
h1 := listHostsResp.Hosts[0]
|
|
|
|
h2 := listHostsResp.Hosts[1]
|
|
|
|
|
|
|
|
listHostsURL = fmt.Sprintf("/api/v1/fleet/hosts?policy_id=%d&policy_response=passing", policiesResponse.Policies[0].ID)
|
|
|
|
listHostsResp = listHostsResponse{}
|
|
|
|
s.DoJSON("GET", listHostsURL, nil, http.StatusOK, &listHostsResp)
|
|
|
|
require.Len(t, listHostsResp.Hosts, 0)
|
|
|
|
|
2021-11-08 14:42:37 +00:00
|
|
|
require.NoError(t, s.ds.RecordPolicyQueryExecutions(context.Background(), h1.Host, map[uint]*bool{policiesResponse.Policies[0].ID: ptr.Bool(true)}, time.Now(), false))
|
|
|
|
require.NoError(t, s.ds.RecordPolicyQueryExecutions(context.Background(), h2.Host, map[uint]*bool{policiesResponse.Policies[0].ID: nil}, time.Now(), false))
|
2021-09-15 19:27:53 +00:00
|
|
|
|
|
|
|
listHostsURL = fmt.Sprintf("/api/v1/fleet/hosts?policy_id=%d&policy_response=passing", policiesResponse.Policies[0].ID)
|
|
|
|
listHostsResp = listHostsResponse{}
|
|
|
|
s.DoJSON("GET", listHostsURL, nil, http.StatusOK, &listHostsResp)
|
|
|
|
require.Len(t, listHostsResp.Hosts, 1)
|
|
|
|
|
|
|
|
deletePolicyParams := deleteGlobalPoliciesRequest{IDs: []uint{policiesResponse.Policies[0].ID}}
|
|
|
|
deletePolicyResp := deleteGlobalPoliciesResponse{}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/global/policies/delete", deletePolicyParams, http.StatusOK, &deletePolicyResp)
|
|
|
|
|
|
|
|
policiesResponse = listGlobalPoliciesResponse{}
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/global/policies", nil, http.StatusOK, &policiesResponse)
|
|
|
|
require.Len(t, policiesResponse.Policies, 0)
|
|
|
|
}
|
2021-09-29 16:13:23 +00:00
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestBulkDeleteHostsFromTeam() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
hosts := s.createHosts(t)
|
|
|
|
|
|
|
|
team1, err := s.ds.NewTeam(context.Background(), &fleet.Team{Name: t.Name() + "team1"})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
require.NoError(t, s.ds.AddHostsToTeam(context.Background(), &team1.ID, []uint{hosts[0].ID}))
|
|
|
|
|
|
|
|
req := deleteHostsRequest{
|
|
|
|
Filters: struct {
|
|
|
|
MatchQuery string `json:"query"`
|
|
|
|
Status fleet.HostStatus `json:"status"`
|
|
|
|
LabelID *uint `json:"label_id"`
|
|
|
|
TeamID *uint `json:"team_id"`
|
|
|
|
}{TeamID: ptr.Uint(team1.ID)},
|
|
|
|
}
|
|
|
|
resp := deleteHostsResponse{}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/hosts/delete", req, http.StatusOK, &resp)
|
|
|
|
|
2021-11-18 17:36:35 +00:00
|
|
|
_, err = s.ds.Host(context.Background(), hosts[0].ID, false)
|
2021-09-29 16:13:23 +00:00
|
|
|
require.Error(t, err)
|
2021-11-18 17:36:35 +00:00
|
|
|
_, err = s.ds.Host(context.Background(), hosts[1].ID, false)
|
2021-09-29 16:13:23 +00:00
|
|
|
require.NoError(t, err)
|
2021-11-18 17:36:35 +00:00
|
|
|
_, err = s.ds.Host(context.Background(), hosts[2].ID, false)
|
2021-09-29 16:13:23 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
err = s.ds.DeleteHosts(context.Background(), []uint{hosts[1].ID, hosts[2].ID})
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestBulkDeleteHostsInLabel() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
hosts := s.createHosts(t)
|
|
|
|
|
|
|
|
label := &fleet.Label{
|
|
|
|
Name: "foo",
|
|
|
|
Query: "select * from foo;",
|
|
|
|
}
|
|
|
|
label, err := s.ds.NewLabel(context.Background(), label)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2021-11-08 14:42:37 +00:00
|
|
|
require.NoError(t, s.ds.RecordLabelQueryExecutions(context.Background(), hosts[1], map[uint]*bool{label.ID: ptr.Bool(true)}, time.Now(), false))
|
|
|
|
require.NoError(t, s.ds.RecordLabelQueryExecutions(context.Background(), hosts[2], map[uint]*bool{label.ID: ptr.Bool(true)}, time.Now(), false))
|
2021-09-29 16:13:23 +00:00
|
|
|
|
|
|
|
req := deleteHostsRequest{
|
|
|
|
Filters: struct {
|
|
|
|
MatchQuery string `json:"query"`
|
|
|
|
Status fleet.HostStatus `json:"status"`
|
|
|
|
LabelID *uint `json:"label_id"`
|
|
|
|
TeamID *uint `json:"team_id"`
|
|
|
|
}{LabelID: ptr.Uint(label.ID)},
|
|
|
|
}
|
|
|
|
resp := deleteHostsResponse{}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/hosts/delete", req, http.StatusOK, &resp)
|
|
|
|
|
2021-11-18 17:36:35 +00:00
|
|
|
_, err = s.ds.Host(context.Background(), hosts[0].ID, false)
|
2021-09-29 16:13:23 +00:00
|
|
|
require.NoError(t, err)
|
2021-11-18 17:36:35 +00:00
|
|
|
_, err = s.ds.Host(context.Background(), hosts[1].ID, false)
|
2021-09-29 16:13:23 +00:00
|
|
|
require.Error(t, err)
|
2021-11-18 17:36:35 +00:00
|
|
|
_, err = s.ds.Host(context.Background(), hosts[2].ID, false)
|
2021-09-29 16:13:23 +00:00
|
|
|
require.Error(t, err)
|
|
|
|
|
|
|
|
err = s.ds.DeleteHosts(context.Background(), []uint{hosts[0].ID})
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestBulkDeleteHostByIDs() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
hosts := s.createHosts(t)
|
|
|
|
|
|
|
|
req := deleteHostsRequest{
|
|
|
|
IDs: []uint{hosts[0].ID, hosts[1].ID},
|
|
|
|
}
|
|
|
|
resp := deleteHostsResponse{}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/hosts/delete", req, http.StatusOK, &resp)
|
|
|
|
|
2021-11-18 17:36:35 +00:00
|
|
|
_, err := s.ds.Host(context.Background(), hosts[0].ID, false)
|
2021-09-29 16:13:23 +00:00
|
|
|
require.Error(t, err)
|
2021-11-18 17:36:35 +00:00
|
|
|
_, err = s.ds.Host(context.Background(), hosts[1].ID, false)
|
2021-09-29 16:13:23 +00:00
|
|
|
require.Error(t, err)
|
2021-11-18 17:36:35 +00:00
|
|
|
_, err = s.ds.Host(context.Background(), hosts[2].ID, false)
|
2021-09-29 16:13:23 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
err = s.ds.DeleteHosts(context.Background(), []uint{hosts[2].ID})
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) createHosts(t *testing.T) []*fleet.Host {
|
|
|
|
var hosts []*fleet.Host
|
|
|
|
|
|
|
|
for i := 0; i < 3; i++ {
|
|
|
|
host, err := s.ds.NewHost(context.Background(), &fleet.Host{
|
|
|
|
DetailUpdatedAt: time.Now(),
|
|
|
|
LabelUpdatedAt: time.Now(),
|
|
|
|
PolicyUpdatedAt: time.Now(),
|
|
|
|
SeenTime: time.Now().Add(-time.Duration(i) * time.Minute),
|
|
|
|
OsqueryHostID: fmt.Sprintf("%s%d", t.Name(), i),
|
|
|
|
NodeKey: fmt.Sprintf("%s%d", t.Name(), i),
|
2021-12-14 21:34:11 +00:00
|
|
|
UUID: uuid.New().String(),
|
2021-09-29 16:13:23 +00:00
|
|
|
Hostname: fmt.Sprintf("%sfoo.local%d", t.Name(), i),
|
2021-11-09 14:35:36 +00:00
|
|
|
Platform: "linux",
|
2021-09-29 16:13:23 +00:00
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
hosts = append(hosts, host)
|
|
|
|
}
|
|
|
|
return hosts
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestBulkDeleteHostsErrors() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
hosts := s.createHosts(t)
|
|
|
|
|
|
|
|
req := deleteHostsRequest{
|
|
|
|
IDs: []uint{hosts[0].ID, hosts[1].ID},
|
|
|
|
Filters: struct {
|
|
|
|
MatchQuery string `json:"query"`
|
|
|
|
Status fleet.HostStatus `json:"status"`
|
|
|
|
LabelID *uint `json:"label_id"`
|
|
|
|
TeamID *uint `json:"team_id"`
|
|
|
|
}{LabelID: ptr.Uint(1)},
|
|
|
|
}
|
|
|
|
resp := deleteHostsResponse{}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/hosts/delete", req, http.StatusBadRequest, &resp)
|
|
|
|
}
|
2021-10-07 11:25:35 +00:00
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestCountSoftware() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
hosts := s.createHosts(t)
|
|
|
|
|
|
|
|
label := &fleet.Label{
|
|
|
|
Name: t.Name() + "foo",
|
|
|
|
Query: "select * from foo;",
|
|
|
|
}
|
|
|
|
label, err := s.ds.NewLabel(context.Background(), label)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
2021-11-08 14:42:37 +00:00
|
|
|
require.NoError(t, s.ds.RecordLabelQueryExecutions(context.Background(), hosts[0], map[uint]*bool{label.ID: ptr.Bool(true)}, time.Now(), false))
|
2021-10-07 11:25:35 +00:00
|
|
|
|
|
|
|
req := countHostsRequest{}
|
|
|
|
resp := countHostsResponse{}
|
|
|
|
s.DoJSON(
|
|
|
|
"GET", "/api/v1/fleet/hosts/count", req, http.StatusOK, &resp,
|
|
|
|
"additional_info_filters", "*",
|
|
|
|
)
|
|
|
|
assert.Equal(t, 3, resp.Count)
|
|
|
|
|
|
|
|
req = countHostsRequest{}
|
|
|
|
resp = countHostsResponse{}
|
|
|
|
s.DoJSON(
|
|
|
|
"GET", "/api/v1/fleet/hosts/count", req, http.StatusOK, &resp,
|
|
|
|
"additional_info_filters", "*",
|
|
|
|
"label_id", fmt.Sprint(label.ID),
|
|
|
|
)
|
|
|
|
assert.Equal(t, 1, resp.Count)
|
|
|
|
}
|
2021-10-11 14:17:21 +00:00
|
|
|
|
2021-12-15 14:35:40 +00:00
|
|
|
func (s *integrationTestSuite) TestPacks() {
|
2021-10-11 14:17:21 +00:00
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
var packResp getPackResponse
|
2021-12-15 14:35:40 +00:00
|
|
|
// get non-existing pack
|
|
|
|
s.Do("GET", "/api/v1/fleet/packs/999", nil, http.StatusNotFound)
|
|
|
|
|
|
|
|
// create some packs
|
|
|
|
packs := make([]fleet.Pack, 3)
|
|
|
|
for i := range packs {
|
|
|
|
req := &createPackRequest{
|
|
|
|
PackPayload: fleet.PackPayload{
|
|
|
|
Name: ptr.String(fmt.Sprintf("%s_%d", strings.ReplaceAll(t.Name(), "/", "_"), i)),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
var createResp createPackResponse
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/packs", req, http.StatusOK, &createResp)
|
|
|
|
packs[i] = createResp.Pack.Pack
|
|
|
|
}
|
2021-10-11 14:17:21 +00:00
|
|
|
|
2021-12-15 14:35:40 +00:00
|
|
|
// get existing pack
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/packs/%d", packs[0].ID), nil, http.StatusOK, &packResp)
|
|
|
|
require.Equal(t, packs[0].ID, packResp.Pack.ID)
|
|
|
|
|
|
|
|
// list packs
|
|
|
|
var listResp listPacksResponse
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/packs", nil, http.StatusOK, &listResp, "per_page", "2", "order_key", "name")
|
|
|
|
require.Len(t, listResp.Packs, 2)
|
|
|
|
assert.Equal(t, packs[0].ID, listResp.Packs[0].ID)
|
|
|
|
assert.Equal(t, packs[1].ID, listResp.Packs[1].ID)
|
|
|
|
|
|
|
|
// get page 1
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/packs", nil, http.StatusOK, &listResp, "page", "1", "per_page", "2", "order_key", "name")
|
|
|
|
require.Len(t, listResp.Packs, 1)
|
|
|
|
assert.Equal(t, packs[2].ID, listResp.Packs[0].ID)
|
|
|
|
|
|
|
|
// get page 2, empty
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/packs", nil, http.StatusOK, &listResp, "page", "2", "per_page", "2", "order_key", "name")
|
|
|
|
require.Len(t, listResp.Packs, 0)
|
|
|
|
|
|
|
|
var delResp deletePackResponse
|
|
|
|
// delete non-existing pack by name
|
|
|
|
s.DoJSON("DELETE", fmt.Sprintf("/api/v1/fleet/packs/%s", "zzz"), nil, http.StatusNotFound, &delResp)
|
|
|
|
|
|
|
|
// delete existing pack by name
|
|
|
|
s.DoJSON("DELETE", fmt.Sprintf("/api/v1/fleet/packs/%s", url.PathEscape(packs[0].Name)), nil, http.StatusOK, &delResp)
|
|
|
|
|
|
|
|
// delete non-existing pack by id
|
|
|
|
var delIDResp deletePackByIDResponse
|
|
|
|
s.DoJSON("DELETE", fmt.Sprintf("/api/v1/fleet/packs/id/%d", packs[2].ID+1), nil, http.StatusNotFound, &delIDResp)
|
|
|
|
|
|
|
|
// delete existing pack by id
|
|
|
|
s.DoJSON("DELETE", fmt.Sprintf("/api/v1/fleet/packs/id/%d", packs[1].ID), nil, http.StatusOK, &delIDResp)
|
|
|
|
|
|
|
|
var modResp modifyPackResponse
|
|
|
|
// modify non-existing pack
|
|
|
|
req := &fleet.PackPayload{Name: ptr.String("updated_" + packs[2].Name)}
|
|
|
|
s.DoJSON("PATCH", fmt.Sprintf("/api/v1/fleet/packs/%d", packs[2].ID+1), req, http.StatusNotFound, &modResp)
|
|
|
|
|
|
|
|
// modify existing pack
|
|
|
|
req = &fleet.PackPayload{Name: ptr.String("updated_" + packs[2].Name)}
|
|
|
|
s.DoJSON("PATCH", fmt.Sprintf("/api/v1/fleet/packs/%d", packs[2].ID), req, http.StatusOK, &modResp)
|
|
|
|
require.Equal(t, packs[2].ID, modResp.Pack.ID)
|
|
|
|
require.Contains(t, modResp.Pack.Name, "updated_")
|
|
|
|
|
|
|
|
// list packs, only packs[2] remains
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/packs", nil, http.StatusOK, &listResp, "per_page", "2", "order_key", "name")
|
|
|
|
require.Len(t, listResp.Packs, 1)
|
|
|
|
assert.Equal(t, packs[2].ID, listResp.Packs[0].ID)
|
2021-10-11 14:17:21 +00:00
|
|
|
}
|
2021-10-11 14:37:48 +00:00
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestListHosts() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
hosts := s.createHosts(t)
|
|
|
|
|
|
|
|
var resp listHostsResponse
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/hosts", nil, http.StatusOK, &resp)
|
|
|
|
require.Len(t, resp.Hosts, len(hosts))
|
|
|
|
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/hosts", nil, http.StatusOK, &resp, "per_page", "1")
|
|
|
|
require.Len(t, resp.Hosts, 1)
|
2021-10-12 18:59:01 +00:00
|
|
|
assert.Nil(t, resp.Software)
|
2021-10-12 14:38:12 +00:00
|
|
|
|
2021-11-29 18:06:00 +00:00
|
|
|
s.DoJSON("GET", "/api/v1/fleet/hosts", nil, http.StatusOK, &resp, "order_key", "h.id", "after", fmt.Sprint(hosts[1].ID))
|
|
|
|
require.Len(t, resp.Hosts, len(hosts)-2)
|
|
|
|
|
2021-10-12 14:38:12 +00:00
|
|
|
host := hosts[2]
|
|
|
|
host.HostSoftware = fleet.HostSoftware{
|
|
|
|
Modified: true,
|
|
|
|
Software: []fleet.Software{
|
2021-12-09 20:36:12 +00:00
|
|
|
{Name: "foo", Version: "0.0.1", Source: "chrome_extensions"},
|
2021-10-12 14:38:12 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
require.NoError(t, s.ds.SaveHostSoftware(context.Background(), host))
|
|
|
|
require.NoError(t, s.ds.LoadHostSoftware(context.Background(), host))
|
|
|
|
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/hosts", nil, http.StatusOK, &resp, "software_id", fmt.Sprint(host.Software[0].ID))
|
|
|
|
require.Len(t, resp.Hosts, 1)
|
|
|
|
assert.Equal(t, host.ID, resp.Hosts[0].ID)
|
2021-10-12 18:59:01 +00:00
|
|
|
assert.Equal(t, "foo", resp.Software.Name)
|
2021-10-15 10:34:30 +00:00
|
|
|
|
2021-11-24 17:16:42 +00:00
|
|
|
user1 := test.NewUser(t, s.ds, "Alice", "alice@example.com", true)
|
2021-10-15 10:34:30 +00:00
|
|
|
q := test.NewQuery(t, s.ds, "query1", "select 1", 0, true)
|
2021-11-24 17:16:42 +00:00
|
|
|
p, err := s.ds.NewGlobalPolicy(context.Background(), &user1.ID, fleet.PolicyPayload{
|
|
|
|
QueryID: &q.ID,
|
|
|
|
})
|
2021-10-15 10:34:30 +00:00
|
|
|
require.NoError(t, err)
|
|
|
|
|
2021-11-08 14:42:37 +00:00
|
|
|
require.NoError(t, s.ds.RecordPolicyQueryExecutions(context.Background(), host, map[uint]*bool{p.ID: ptr.Bool(false)}, time.Now(), false))
|
2021-10-15 10:34:30 +00:00
|
|
|
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/hosts", nil, http.StatusOK, &resp, "software_id", fmt.Sprint(host.Software[0].ID))
|
|
|
|
require.Len(t, resp.Hosts, 1)
|
|
|
|
assert.Equal(t, 1, resp.Hosts[0].HostIssues.FailingPoliciesCount)
|
|
|
|
assert.Equal(t, 1, resp.Hosts[0].HostIssues.TotalIssuesCount)
|
2021-11-29 21:04:33 +00:00
|
|
|
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/hosts", nil, http.StatusOK, &resp, "software_id", fmt.Sprint(host.Software[0].ID), "disable_failing_policies", "true")
|
|
|
|
require.Len(t, resp.Hosts, 1)
|
|
|
|
assert.Equal(t, 0, resp.Hosts[0].HostIssues.FailingPoliciesCount)
|
|
|
|
assert.Equal(t, 0, resp.Hosts[0].HostIssues.TotalIssuesCount)
|
2021-10-11 14:37:48 +00:00
|
|
|
}
|
2021-11-09 14:35:36 +00:00
|
|
|
|
2021-11-11 20:33:06 +00:00
|
|
|
func (s *integrationTestSuite) TestInvites() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
team, err := s.ds.NewTeam(context.Background(), &fleet.Team{
|
|
|
|
Name: t.Name() + "team1",
|
|
|
|
Description: "desc team1",
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
createInviteReq := createInviteRequest{
|
|
|
|
payload: fleet.InvitePayload{
|
|
|
|
Email: ptr.String("some email"),
|
|
|
|
Name: ptr.String("some name"),
|
|
|
|
Position: nil,
|
|
|
|
SSOEnabled: nil,
|
|
|
|
GlobalRole: null.StringFrom(fleet.RoleAdmin),
|
|
|
|
Teams: nil,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
createInviteResp := createInviteResponse{}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/invites", createInviteReq.payload, http.StatusOK, &createInviteResp)
|
|
|
|
require.NotNil(t, createInviteResp.Invite)
|
|
|
|
require.NotZero(t, createInviteResp.Invite.ID)
|
|
|
|
|
|
|
|
updateInviteReq := updateInviteRequest{
|
|
|
|
InvitePayload: fleet.InvitePayload{
|
|
|
|
Teams: []fleet.UserTeam{
|
|
|
|
{
|
|
|
|
Team: fleet.Team{ID: team.ID},
|
|
|
|
Role: fleet.RoleObserver,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
updateInviteResp := updateInviteResponse{}
|
|
|
|
s.DoJSON("PATCH", fmt.Sprintf("/api/v1/fleet/invites/%d", createInviteResp.Invite.ID), updateInviteReq, http.StatusOK, &updateInviteResp)
|
|
|
|
|
|
|
|
verify, err := s.ds.Invite(context.Background(), createInviteResp.Invite.ID)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Equal(t, "", verify.GlobalRole.String)
|
|
|
|
require.Len(t, verify.Teams, 1)
|
|
|
|
assert.Equal(t, team.ID, verify.Teams[0].ID)
|
|
|
|
}
|
|
|
|
|
2021-11-09 14:35:36 +00:00
|
|
|
func (s *integrationTestSuite) TestGetHostSummary() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
hosts := s.createHosts(t)
|
|
|
|
|
|
|
|
team1, err := s.ds.NewTeam(context.Background(), &fleet.Team{Name: t.Name() + "team1"})
|
|
|
|
require.NoError(t, err)
|
|
|
|
team2, err := s.ds.NewTeam(context.Background(), &fleet.Team{Name: t.Name() + "team2"})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
require.NoError(t, s.ds.AddHostsToTeam(context.Background(), &team1.ID, []uint{hosts[0].ID}))
|
|
|
|
|
|
|
|
var resp getHostSummaryResponse
|
|
|
|
|
|
|
|
// no team filter
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/host_summary", nil, http.StatusOK, &resp)
|
|
|
|
require.Equal(t, resp.TotalsHostsCount, uint(len(hosts)))
|
|
|
|
require.Len(t, resp.Platforms, 1)
|
|
|
|
require.Equal(t, "linux", resp.Platforms[0].Platform)
|
|
|
|
require.Equal(t, uint(len(hosts)), resp.Platforms[0].HostsCount)
|
2021-11-15 14:56:13 +00:00
|
|
|
require.Nil(t, resp.TeamID)
|
2021-11-09 14:35:36 +00:00
|
|
|
|
|
|
|
// team filter, no host
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/host_summary", nil, http.StatusOK, &resp, "team_id", fmt.Sprint(team2.ID))
|
|
|
|
require.Equal(t, resp.TotalsHostsCount, uint(0))
|
|
|
|
require.Len(t, resp.Platforms, 0)
|
2021-11-15 14:56:13 +00:00
|
|
|
require.Equal(t, team2.ID, *resp.TeamID)
|
2021-11-09 14:35:36 +00:00
|
|
|
|
|
|
|
// team filter, one host
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/host_summary", nil, http.StatusOK, &resp, "team_id", fmt.Sprint(team1.ID))
|
|
|
|
require.Equal(t, resp.TotalsHostsCount, uint(1))
|
|
|
|
require.Len(t, resp.Platforms, 1)
|
|
|
|
require.Equal(t, "linux", resp.Platforms[0].Platform)
|
|
|
|
require.Equal(t, uint(1), resp.Platforms[0].HostsCount)
|
2021-11-15 14:56:13 +00:00
|
|
|
require.Equal(t, team1.ID, *resp.TeamID)
|
2021-11-09 14:35:36 +00:00
|
|
|
}
|
2021-11-24 17:16:42 +00:00
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestGlobalPoliciesProprietary() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
for i := 0; i < 3; i++ {
|
|
|
|
_, err := s.ds.NewHost(context.Background(), &fleet.Host{
|
|
|
|
DetailUpdatedAt: time.Now(),
|
|
|
|
LabelUpdatedAt: time.Now(),
|
|
|
|
PolicyUpdatedAt: time.Now(),
|
|
|
|
SeenTime: time.Now().Add(-time.Duration(i) * time.Minute),
|
|
|
|
OsqueryHostID: fmt.Sprintf("%s%d", t.Name(), i),
|
|
|
|
NodeKey: fmt.Sprintf("%s%d", t.Name(), i),
|
|
|
|
UUID: fmt.Sprintf("%s%d", t.Name(), i),
|
|
|
|
Hostname: fmt.Sprintf("%sfoo.local%d", t.Name(), i),
|
2021-12-03 18:33:33 +00:00
|
|
|
Platform: "darwin",
|
2021-11-24 17:16:42 +00:00
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
qr, err := s.ds.NewQuery(context.Background(), &fleet.Query{
|
|
|
|
Name: "TestQuery321",
|
|
|
|
Description: "Some description",
|
|
|
|
Query: "select * from osquery;",
|
|
|
|
ObserverCanRun: true,
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
// Cannot set both QueryID and Query.
|
|
|
|
gpParams0 := globalPolicyRequest{
|
|
|
|
QueryID: &qr.ID,
|
|
|
|
Query: "select * from osquery;",
|
|
|
|
}
|
|
|
|
gpResp0 := globalPolicyResponse{}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/global/policies", gpParams0, http.StatusBadRequest, &gpResp0)
|
|
|
|
require.Nil(t, gpResp0.Policy)
|
|
|
|
|
|
|
|
gpParams := globalPolicyRequest{
|
|
|
|
Name: "TestQuery3",
|
|
|
|
Query: "select * from osquery;",
|
|
|
|
Description: "Some description",
|
|
|
|
Resolution: "some global resolution",
|
2021-12-10 16:55:49 +00:00
|
|
|
Platform: "darwin",
|
2021-11-24 17:16:42 +00:00
|
|
|
}
|
|
|
|
gpResp := globalPolicyResponse{}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/global/policies", gpParams, http.StatusOK, &gpResp)
|
|
|
|
require.NotNil(t, gpResp.Policy)
|
|
|
|
require.NotEmpty(t, gpResp.Policy.ID)
|
|
|
|
assert.Equal(t, "TestQuery3", gpResp.Policy.Name)
|
|
|
|
assert.Equal(t, "select * from osquery;", gpResp.Policy.Query)
|
|
|
|
assert.Equal(t, "Some description", gpResp.Policy.Description)
|
|
|
|
require.NotNil(t, gpResp.Policy.Resolution)
|
|
|
|
assert.Equal(t, "some global resolution", *gpResp.Policy.Resolution)
|
|
|
|
assert.NotNil(t, gpResp.Policy.AuthorID)
|
|
|
|
assert.Equal(t, "Test Name admin1@example.com", gpResp.Policy.AuthorName)
|
|
|
|
assert.Equal(t, "admin1@example.com", gpResp.Policy.AuthorEmail)
|
2021-12-06 16:56:28 +00:00
|
|
|
assert.Equal(t, "darwin", gpResp.Policy.Platform)
|
2021-11-24 17:16:42 +00:00
|
|
|
|
|
|
|
mgpParams := modifyGlobalPolicyRequest{
|
|
|
|
ModifyPolicyPayload: fleet.ModifyPolicyPayload{
|
|
|
|
Name: ptr.String("TestQuery4"),
|
|
|
|
Query: ptr.String("select * from osquery_info;"),
|
|
|
|
Description: ptr.String("Some description updated"),
|
|
|
|
Resolution: ptr.String("some global resolution updated"),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
mgpResp := modifyGlobalPolicyResponse{}
|
|
|
|
s.DoJSON("PATCH", fmt.Sprintf("/api/v1/fleet/global/policies/%d", gpResp.Policy.ID), mgpParams, http.StatusOK, &mgpResp)
|
|
|
|
require.NotNil(t, gpResp.Policy)
|
|
|
|
assert.Equal(t, "TestQuery4", mgpResp.Policy.Name)
|
|
|
|
assert.Equal(t, "select * from osquery_info;", mgpResp.Policy.Query)
|
|
|
|
assert.Equal(t, "Some description updated", mgpResp.Policy.Description)
|
|
|
|
require.NotNil(t, mgpResp.Policy.Resolution)
|
|
|
|
assert.Equal(t, "some global resolution updated", *mgpResp.Policy.Resolution)
|
2021-12-07 16:01:00 +00:00
|
|
|
assert.Equal(t, "darwin", mgpResp.Policy.Platform)
|
2021-11-24 17:16:42 +00:00
|
|
|
|
|
|
|
ggpResp := getPolicyByIDResponse{}
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/global/policies/%d", gpResp.Policy.ID), getPolicyByIDRequest{}, http.StatusOK, &ggpResp)
|
|
|
|
require.NotNil(t, ggpResp.Policy)
|
|
|
|
assert.Equal(t, "TestQuery4", ggpResp.Policy.Name)
|
|
|
|
assert.Equal(t, "select * from osquery_info;", ggpResp.Policy.Query)
|
|
|
|
assert.Equal(t, "Some description updated", ggpResp.Policy.Description)
|
|
|
|
require.NotNil(t, ggpResp.Policy.Resolution)
|
|
|
|
assert.Equal(t, "some global resolution updated", *ggpResp.Policy.Resolution)
|
2021-12-07 16:01:00 +00:00
|
|
|
assert.Equal(t, "darwin", mgpResp.Policy.Platform)
|
2021-11-24 17:16:42 +00:00
|
|
|
|
|
|
|
policiesResponse := listGlobalPoliciesResponse{}
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/global/policies", nil, http.StatusOK, &policiesResponse)
|
|
|
|
require.Len(t, policiesResponse.Policies, 1)
|
|
|
|
assert.Equal(t, "TestQuery4", policiesResponse.Policies[0].Name)
|
|
|
|
assert.Equal(t, "select * from osquery_info;", policiesResponse.Policies[0].Query)
|
|
|
|
assert.Equal(t, "Some description updated", policiesResponse.Policies[0].Description)
|
|
|
|
require.NotNil(t, policiesResponse.Policies[0].Resolution)
|
|
|
|
assert.Equal(t, "some global resolution updated", *policiesResponse.Policies[0].Resolution)
|
2021-12-07 16:01:00 +00:00
|
|
|
assert.Equal(t, "darwin", policiesResponse.Policies[0].Platform)
|
2021-11-24 17:16:42 +00:00
|
|
|
|
|
|
|
listHostsURL := fmt.Sprintf("/api/v1/fleet/hosts?policy_id=%d", policiesResponse.Policies[0].ID)
|
|
|
|
listHostsResp := listHostsResponse{}
|
|
|
|
s.DoJSON("GET", listHostsURL, nil, http.StatusOK, &listHostsResp)
|
|
|
|
require.Len(t, listHostsResp.Hosts, 3)
|
|
|
|
h1 := listHostsResp.Hosts[0]
|
|
|
|
h2 := listHostsResp.Hosts[1]
|
|
|
|
|
|
|
|
listHostsURL = fmt.Sprintf("/api/v1/fleet/hosts?policy_id=%d&policy_response=passing", policiesResponse.Policies[0].ID)
|
|
|
|
listHostsResp = listHostsResponse{}
|
|
|
|
s.DoJSON("GET", listHostsURL, nil, http.StatusOK, &listHostsResp)
|
|
|
|
require.Len(t, listHostsResp.Hosts, 0)
|
|
|
|
|
|
|
|
require.NoError(t, s.ds.RecordPolicyQueryExecutions(context.Background(), h1.Host, map[uint]*bool{policiesResponse.Policies[0].ID: ptr.Bool(true)}, time.Now(), false))
|
|
|
|
require.NoError(t, s.ds.RecordPolicyQueryExecutions(context.Background(), h2.Host, map[uint]*bool{policiesResponse.Policies[0].ID: nil}, time.Now(), false))
|
|
|
|
|
|
|
|
listHostsURL = fmt.Sprintf("/api/v1/fleet/hosts?policy_id=%d&policy_response=passing", policiesResponse.Policies[0].ID)
|
|
|
|
listHostsResp = listHostsResponse{}
|
|
|
|
s.DoJSON("GET", listHostsURL, nil, http.StatusOK, &listHostsResp)
|
|
|
|
require.Len(t, listHostsResp.Hosts, 1)
|
|
|
|
|
|
|
|
deletePolicyParams := deleteGlobalPoliciesRequest{IDs: []uint{policiesResponse.Policies[0].ID}}
|
|
|
|
deletePolicyResp := deleteGlobalPoliciesResponse{}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/global/policies/delete", deletePolicyParams, http.StatusOK, &deletePolicyResp)
|
|
|
|
|
|
|
|
policiesResponse = listGlobalPoliciesResponse{}
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/global/policies", nil, http.StatusOK, &policiesResponse)
|
|
|
|
require.Len(t, policiesResponse.Policies, 0)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestTeamPoliciesProprietary() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
team1, err := s.ds.NewTeam(context.Background(), &fleet.Team{
|
|
|
|
ID: 42,
|
|
|
|
Name: "team1-policies",
|
|
|
|
Description: "desc team1",
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
hosts := make([]uint, 2)
|
|
|
|
for i := 0; i < 2; i++ {
|
|
|
|
h, err := s.ds.NewHost(context.Background(), &fleet.Host{
|
|
|
|
DetailUpdatedAt: time.Now(),
|
|
|
|
LabelUpdatedAt: time.Now(),
|
|
|
|
PolicyUpdatedAt: time.Now(),
|
|
|
|
SeenTime: time.Now().Add(-time.Duration(i) * time.Minute),
|
|
|
|
OsqueryHostID: fmt.Sprintf("%s%d", t.Name(), i),
|
|
|
|
NodeKey: fmt.Sprintf("%s%d", t.Name(), i),
|
|
|
|
UUID: fmt.Sprintf("%s%d", t.Name(), i),
|
|
|
|
Hostname: fmt.Sprintf("%sfoo.local%d", t.Name(), i),
|
2021-12-03 18:33:33 +00:00
|
|
|
Platform: "darwin",
|
2021-11-24 17:16:42 +00:00
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
hosts[i] = h.ID
|
|
|
|
}
|
|
|
|
err = s.ds.AddHostsToTeam(context.Background(), &team1.ID, hosts)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
tpParams := teamPolicyRequest{
|
|
|
|
Name: "TestQuery3",
|
|
|
|
Query: "select * from osquery;",
|
|
|
|
Description: "Some description",
|
|
|
|
Resolution: "some team resolution",
|
2021-12-10 16:55:49 +00:00
|
|
|
Platform: "darwin",
|
2021-11-24 17:16:42 +00:00
|
|
|
}
|
|
|
|
tpResp := teamPolicyResponse{}
|
|
|
|
s.DoJSON("POST", fmt.Sprintf("/api/v1/fleet/teams/%d/policies", team1.ID), tpParams, http.StatusOK, &tpResp)
|
|
|
|
require.NotNil(t, tpResp.Policy)
|
|
|
|
require.NotEmpty(t, tpResp.Policy.ID)
|
|
|
|
assert.Equal(t, "TestQuery3", tpResp.Policy.Name)
|
|
|
|
assert.Equal(t, "select * from osquery;", tpResp.Policy.Query)
|
|
|
|
assert.Equal(t, "Some description", tpResp.Policy.Description)
|
|
|
|
require.NotNil(t, tpResp.Policy.Resolution)
|
|
|
|
assert.Equal(t, "some team resolution", *tpResp.Policy.Resolution)
|
|
|
|
assert.NotNil(t, tpResp.Policy.AuthorID)
|
|
|
|
assert.Equal(t, "Test Name admin1@example.com", tpResp.Policy.AuthorName)
|
|
|
|
assert.Equal(t, "admin1@example.com", tpResp.Policy.AuthorEmail)
|
|
|
|
|
|
|
|
mtpParams := modifyTeamPolicyRequest{
|
|
|
|
ModifyPolicyPayload: fleet.ModifyPolicyPayload{
|
|
|
|
Name: ptr.String("TestQuery4"),
|
|
|
|
Query: ptr.String("select * from osquery_info;"),
|
|
|
|
Description: ptr.String("Some description updated"),
|
|
|
|
Resolution: ptr.String("some team resolution updated"),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
mtpResp := modifyTeamPolicyResponse{}
|
|
|
|
s.DoJSON("PATCH", fmt.Sprintf("/api/v1/fleet/teams/%d/policies/%d", team1.ID, tpResp.Policy.ID), mtpParams, http.StatusOK, &mtpResp)
|
|
|
|
require.NotNil(t, mtpResp.Policy)
|
|
|
|
assert.Equal(t, "TestQuery4", mtpResp.Policy.Name)
|
|
|
|
assert.Equal(t, "select * from osquery_info;", mtpResp.Policy.Query)
|
|
|
|
assert.Equal(t, "Some description updated", mtpResp.Policy.Description)
|
|
|
|
require.NotNil(t, mtpResp.Policy.Resolution)
|
|
|
|
assert.Equal(t, "some team resolution updated", *mtpResp.Policy.Resolution)
|
2021-12-07 16:01:00 +00:00
|
|
|
assert.Equal(t, "darwin", mtpResp.Policy.Platform)
|
2021-11-24 17:16:42 +00:00
|
|
|
|
|
|
|
gtpResp := getPolicyByIDResponse{}
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/teams/%d/policies/%d", team1.ID, tpResp.Policy.ID), getPolicyByIDRequest{}, http.StatusOK, >pResp)
|
|
|
|
require.NotNil(t, gtpResp.Policy)
|
|
|
|
assert.Equal(t, "TestQuery4", gtpResp.Policy.Name)
|
|
|
|
assert.Equal(t, "select * from osquery_info;", gtpResp.Policy.Query)
|
|
|
|
assert.Equal(t, "Some description updated", gtpResp.Policy.Description)
|
|
|
|
require.NotNil(t, gtpResp.Policy.Resolution)
|
|
|
|
assert.Equal(t, "some team resolution updated", *gtpResp.Policy.Resolution)
|
2021-12-07 16:01:00 +00:00
|
|
|
assert.Equal(t, "darwin", gtpResp.Policy.Platform)
|
2021-11-24 17:16:42 +00:00
|
|
|
|
|
|
|
policiesResponse := listTeamPoliciesResponse{}
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/teams/%d/policies", team1.ID), nil, http.StatusOK, &policiesResponse)
|
|
|
|
require.Len(t, policiesResponse.Policies, 1)
|
|
|
|
assert.Equal(t, "TestQuery4", policiesResponse.Policies[0].Name)
|
|
|
|
assert.Equal(t, "select * from osquery_info;", policiesResponse.Policies[0].Query)
|
|
|
|
assert.Equal(t, "Some description updated", policiesResponse.Policies[0].Description)
|
|
|
|
require.NotNil(t, policiesResponse.Policies[0].Resolution)
|
|
|
|
assert.Equal(t, "some team resolution updated", *policiesResponse.Policies[0].Resolution)
|
2021-12-07 16:01:00 +00:00
|
|
|
assert.Equal(t, "darwin", policiesResponse.Policies[0].Platform)
|
2021-11-24 17:16:42 +00:00
|
|
|
|
|
|
|
listHostsURL := fmt.Sprintf("/api/v1/fleet/hosts?policy_id=%d", policiesResponse.Policies[0].ID)
|
|
|
|
listHostsResp := listHostsResponse{}
|
|
|
|
s.DoJSON("GET", listHostsURL, nil, http.StatusOK, &listHostsResp)
|
|
|
|
require.Len(t, listHostsResp.Hosts, 2)
|
|
|
|
h1 := listHostsResp.Hosts[0]
|
|
|
|
h2 := listHostsResp.Hosts[1]
|
|
|
|
|
|
|
|
listHostsURL = fmt.Sprintf("/api/v1/fleet/hosts?team_id=%d&policy_id=%d&policy_response=passing", team1.ID, policiesResponse.Policies[0].ID)
|
|
|
|
listHostsResp = listHostsResponse{}
|
|
|
|
s.DoJSON("GET", listHostsURL, nil, http.StatusOK, &listHostsResp)
|
|
|
|
require.Len(t, listHostsResp.Hosts, 0)
|
|
|
|
|
|
|
|
require.NoError(t, s.ds.RecordPolicyQueryExecutions(context.Background(), h1.Host, map[uint]*bool{policiesResponse.Policies[0].ID: ptr.Bool(true)}, time.Now(), false))
|
|
|
|
require.NoError(t, s.ds.RecordPolicyQueryExecutions(context.Background(), h2.Host, map[uint]*bool{policiesResponse.Policies[0].ID: nil}, time.Now(), false))
|
|
|
|
|
|
|
|
listHostsURL = fmt.Sprintf("/api/v1/fleet/hosts?team_id=%d&policy_id=%d&policy_response=passing", team1.ID, policiesResponse.Policies[0].ID)
|
|
|
|
listHostsResp = listHostsResponse{}
|
|
|
|
s.DoJSON("GET", listHostsURL, nil, http.StatusOK, &listHostsResp)
|
|
|
|
require.Len(t, listHostsResp.Hosts, 1)
|
|
|
|
|
|
|
|
deletePolicyParams := deleteTeamPoliciesRequest{IDs: []uint{policiesResponse.Policies[0].ID}}
|
|
|
|
deletePolicyResp := deleteTeamPoliciesResponse{}
|
|
|
|
s.DoJSON("POST", fmt.Sprintf("/api/v1/fleet/teams/%d/policies/delete", team1.ID), deletePolicyParams, http.StatusOK, &deletePolicyResp)
|
|
|
|
|
|
|
|
policiesResponse = listTeamPoliciesResponse{}
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/teams/%d/policies", team1.ID), nil, http.StatusOK, &policiesResponse)
|
|
|
|
require.Len(t, policiesResponse.Policies, 0)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestTeamPoliciesProprietaryInvalid() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
team1, err := s.ds.NewTeam(context.Background(), &fleet.Team{
|
|
|
|
ID: 42,
|
|
|
|
Name: "team1-policies-2",
|
|
|
|
Description: "desc team1",
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
tpParams := teamPolicyRequest{
|
|
|
|
Name: "TestQuery3-Team",
|
|
|
|
Query: "select * from osquery;",
|
|
|
|
Description: "Some description",
|
|
|
|
Resolution: "some team resolution",
|
|
|
|
}
|
|
|
|
tpResp := teamPolicyResponse{}
|
|
|
|
s.DoJSON("POST", fmt.Sprintf("/api/v1/fleet/teams/%d/policies", team1.ID), tpParams, http.StatusOK, &tpResp)
|
|
|
|
require.NotNil(t, tpResp.Policy)
|
|
|
|
teamPolicyID := tpResp.Policy.ID
|
|
|
|
|
|
|
|
gpParams := globalPolicyRequest{
|
|
|
|
Name: "TestQuery3-Global",
|
|
|
|
Query: "select * from osquery;",
|
|
|
|
Description: "Some description",
|
|
|
|
Resolution: "some global resolution",
|
|
|
|
}
|
|
|
|
gpResp := globalPolicyResponse{}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/global/policies", gpParams, http.StatusOK, &gpResp)
|
|
|
|
require.NotNil(t, gpResp.Policy)
|
|
|
|
require.NotEmpty(t, gpResp.Policy.ID)
|
|
|
|
globalPolicyID := gpResp.Policy.ID
|
|
|
|
|
|
|
|
for _, tc := range []struct {
|
|
|
|
tname string
|
|
|
|
testUpdate bool
|
|
|
|
queryID *uint
|
|
|
|
name string
|
|
|
|
query string
|
2021-12-03 18:33:33 +00:00
|
|
|
platforms string
|
2021-11-24 17:16:42 +00:00
|
|
|
}{
|
|
|
|
{
|
|
|
|
tname: "set both QueryID and Query",
|
|
|
|
testUpdate: false,
|
|
|
|
queryID: ptr.Uint(1),
|
|
|
|
name: "Some name",
|
|
|
|
query: "select * from osquery;",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
tname: "empty query",
|
|
|
|
testUpdate: true,
|
|
|
|
name: "Some name",
|
|
|
|
query: "",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
tname: "empty name",
|
|
|
|
testUpdate: true,
|
|
|
|
name: "",
|
|
|
|
query: "select 1;",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
tname: "Invalid query",
|
|
|
|
testUpdate: true,
|
|
|
|
name: "Invalid query",
|
|
|
|
query: "ATTACH 'foo' AS bar;",
|
|
|
|
},
|
|
|
|
} {
|
|
|
|
t.Run(tc.tname, func(t *testing.T) {
|
|
|
|
tpReq := teamPolicyRequest{
|
2021-12-10 16:55:49 +00:00
|
|
|
QueryID: tc.queryID,
|
|
|
|
Name: tc.name,
|
|
|
|
Query: tc.query,
|
|
|
|
Platform: tc.platforms,
|
2021-11-24 17:16:42 +00:00
|
|
|
}
|
|
|
|
tpResp := teamPolicyResponse{}
|
|
|
|
s.DoJSON("POST", fmt.Sprintf("/api/v1/fleet/teams/%d/policies", team1.ID), tpReq, http.StatusBadRequest, &tpResp)
|
|
|
|
require.Nil(t, tpResp.Policy)
|
|
|
|
|
|
|
|
testUpdate := tc.queryID == nil
|
|
|
|
|
|
|
|
if testUpdate {
|
|
|
|
tpReq := modifyTeamPolicyRequest{
|
|
|
|
ModifyPolicyPayload: fleet.ModifyPolicyPayload{
|
2021-12-07 16:01:00 +00:00
|
|
|
Name: ptr.String(tc.name),
|
|
|
|
Query: ptr.String(tc.query),
|
2021-11-24 17:16:42 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
tpResp := modifyTeamPolicyResponse{}
|
|
|
|
s.DoJSON("PATCH", fmt.Sprintf("/api/v1/fleet/teams/%d/policies/%d", team1.ID, teamPolicyID), tpReq, http.StatusBadRequest, &tpResp)
|
|
|
|
require.Nil(t, tpResp.Policy)
|
|
|
|
}
|
|
|
|
|
|
|
|
gpReq := globalPolicyRequest{
|
2021-12-10 16:55:49 +00:00
|
|
|
QueryID: tc.queryID,
|
|
|
|
Name: tc.name,
|
|
|
|
Query: tc.query,
|
|
|
|
Platform: tc.platforms,
|
2021-11-24 17:16:42 +00:00
|
|
|
}
|
|
|
|
gpResp := globalPolicyResponse{}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/global/policies", gpReq, http.StatusBadRequest, &gpResp)
|
|
|
|
require.Nil(t, tpResp.Policy)
|
|
|
|
|
|
|
|
if testUpdate {
|
|
|
|
gpReq := modifyGlobalPolicyRequest{
|
|
|
|
ModifyPolicyPayload: fleet.ModifyPolicyPayload{
|
2021-12-07 16:01:00 +00:00
|
|
|
Name: ptr.String(tc.name),
|
|
|
|
Query: ptr.String(tc.query),
|
2021-11-24 17:16:42 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
gpResp := modifyGlobalPolicyResponse{}
|
|
|
|
s.DoJSON("PATCH", fmt.Sprintf("/api/v1/fleet/global/policies/%d", globalPolicyID), gpReq, http.StatusBadRequest, &gpResp)
|
|
|
|
require.Nil(t, tpResp.Policy)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestHostDetailsPolicies() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
hosts := s.createHosts(t)
|
|
|
|
host1 := hosts[0]
|
|
|
|
team1, err := s.ds.NewTeam(context.Background(), &fleet.Team{
|
|
|
|
ID: 42,
|
|
|
|
Name: "HostDetailsPolicies-Team",
|
|
|
|
Description: "desc team1",
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
err = s.ds.AddHostsToTeam(context.Background(), &team1.ID, []uint{host1.ID})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
gpParams := globalPolicyRequest{
|
|
|
|
Name: "HostDetailsPolicies",
|
|
|
|
Query: "select * from osquery;",
|
|
|
|
Description: "Some description",
|
|
|
|
Resolution: "some global resolution",
|
|
|
|
}
|
|
|
|
gpResp := globalPolicyResponse{}
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/global/policies", gpParams, http.StatusOK, &gpResp)
|
|
|
|
require.NotNil(t, gpResp.Policy)
|
|
|
|
require.NotEmpty(t, gpResp.Policy.ID)
|
|
|
|
|
|
|
|
tpParams := teamPolicyRequest{
|
|
|
|
Name: "HostDetailsPolicies-Team",
|
|
|
|
Query: "select * from osquery;",
|
|
|
|
Description: "Some description",
|
|
|
|
Resolution: "some team resolution",
|
|
|
|
}
|
|
|
|
tpResp := teamPolicyResponse{}
|
|
|
|
s.DoJSON("POST", fmt.Sprintf("/api/v1/fleet/teams/%d/policies", team1.ID), tpParams, http.StatusOK, &tpResp)
|
|
|
|
require.NotNil(t, tpResp.Policy)
|
|
|
|
require.NotEmpty(t, tpResp.Policy.ID)
|
|
|
|
|
|
|
|
err = s.ds.RecordPolicyQueryExecutions(
|
|
|
|
context.Background(),
|
|
|
|
host1,
|
|
|
|
map[uint]*bool{gpResp.Policy.ID: ptr.Bool(true)},
|
|
|
|
time.Now(),
|
|
|
|
false,
|
|
|
|
)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
resp := s.Do("GET", fmt.Sprintf("/api/v1/fleet/hosts/%d", host1.ID), nil, http.StatusOK)
|
|
|
|
b, err := ioutil.ReadAll(resp.Body)
|
|
|
|
require.NoError(t, err)
|
|
|
|
var r struct {
|
|
|
|
Host *HostDetailResponse `json:"host"`
|
|
|
|
Err error `json:"error,omitempty"`
|
|
|
|
}
|
|
|
|
err = json.Unmarshal(b, &r)
|
|
|
|
require.NoError(t, err)
|
|
|
|
require.Nil(t, r.Err)
|
|
|
|
hd := r.Host.HostDetail
|
|
|
|
require.Len(t, hd.Policies, 2)
|
|
|
|
require.True(t, reflect.DeepEqual(gpResp.Policy.PolicyData, hd.Policies[0].PolicyData))
|
|
|
|
require.Equal(t, hd.Policies[0].Response, "pass")
|
|
|
|
|
|
|
|
require.True(t, reflect.DeepEqual(tpResp.Policy.PolicyData, hd.Policies[1].PolicyData))
|
|
|
|
require.Equal(t, hd.Policies[1].Response, "") // policy didn't "run"
|
|
|
|
|
|
|
|
// Try to create a global policy with an existing name.
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/global/policies", gpParams, http.StatusConflict, &gpResp)
|
|
|
|
// Try to create a team policy with an existing name.
|
|
|
|
s.DoJSON("POST", fmt.Sprintf("/api/v1/fleet/teams/%d/policies", team1.ID), tpParams, http.StatusConflict, &tpResp)
|
|
|
|
}
|
2021-11-29 13:12:22 +00:00
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestListActivities() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
ctx := context.Background()
|
|
|
|
u := s.users["admin1@example.com"]
|
|
|
|
details := make(map[string]interface{})
|
|
|
|
|
|
|
|
err := s.ds.NewActivity(ctx, &u, fleet.ActivityTypeAppliedSpecPack, &details)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
err = s.ds.NewActivity(ctx, &u, fleet.ActivityTypeDeletedPack, &details)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
err = s.ds.NewActivity(ctx, &u, fleet.ActivityTypeEditedPack, &details)
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
var listResp listActivitiesResponse
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/activities", nil, http.StatusOK, &listResp, "per_page", "2", "order_key", "id")
|
|
|
|
require.Len(t, listResp.Activities, 2)
|
|
|
|
assert.Equal(t, fleet.ActivityTypeAppliedSpecPack, listResp.Activities[0].Type)
|
|
|
|
assert.Equal(t, fleet.ActivityTypeDeletedPack, listResp.Activities[1].Type)
|
|
|
|
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/activities", nil, http.StatusOK, &listResp, "per_page", "2", "order_key", "id", "page", "1")
|
|
|
|
require.Len(t, listResp.Activities, 1)
|
|
|
|
assert.Equal(t, fleet.ActivityTypeEditedPack, listResp.Activities[0].Type)
|
|
|
|
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/activities", nil, http.StatusOK, &listResp, "per_page", "1", "order_key", "id", "order_direction", "desc")
|
|
|
|
require.Len(t, listResp.Activities, 1)
|
|
|
|
assert.Equal(t, fleet.ActivityTypeEditedPack, listResp.Activities[0].Type)
|
|
|
|
}
|
2021-12-01 20:45:29 +00:00
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestListGetCarves() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
ctx := context.Background()
|
|
|
|
|
|
|
|
hosts := s.createHosts(t)
|
|
|
|
c1, err := s.ds.NewCarve(ctx, &fleet.CarveMetadata{
|
|
|
|
CreatedAt: time.Now(),
|
|
|
|
HostId: hosts[0].ID,
|
|
|
|
Name: t.Name() + "_1",
|
|
|
|
SessionId: "ssn1",
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
c2, err := s.ds.NewCarve(ctx, &fleet.CarveMetadata{
|
|
|
|
CreatedAt: time.Now(),
|
|
|
|
HostId: hosts[1].ID,
|
|
|
|
Name: t.Name() + "_2",
|
|
|
|
SessionId: "ssn2",
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
c3, err := s.ds.NewCarve(ctx, &fleet.CarveMetadata{
|
|
|
|
CreatedAt: time.Now(),
|
|
|
|
HostId: hosts[2].ID,
|
|
|
|
Name: t.Name() + "_3",
|
|
|
|
SessionId: "ssn3",
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
// set c1 max block
|
|
|
|
c1.MaxBlock = 3
|
|
|
|
require.NoError(t, s.ds.UpdateCarve(ctx, c1))
|
|
|
|
// make c2 expired, set max block
|
|
|
|
c2.Expired = true
|
|
|
|
c2.MaxBlock = 3
|
|
|
|
require.NoError(t, s.ds.UpdateCarve(ctx, c2))
|
|
|
|
|
|
|
|
var listResp listCarvesResponse
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/carves", nil, http.StatusOK, &listResp, "per_page", "2", "order_key", "id")
|
|
|
|
require.Len(t, listResp.Carves, 2)
|
|
|
|
assert.Equal(t, c1.ID, listResp.Carves[0].ID)
|
|
|
|
assert.Equal(t, c3.ID, listResp.Carves[1].ID)
|
|
|
|
|
|
|
|
// include expired
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/carves", nil, http.StatusOK, &listResp, "per_page", "2", "order_key", "id", "expired", "1")
|
|
|
|
require.Len(t, listResp.Carves, 2)
|
|
|
|
assert.Equal(t, c1.ID, listResp.Carves[0].ID)
|
|
|
|
assert.Equal(t, c2.ID, listResp.Carves[1].ID)
|
|
|
|
|
|
|
|
// empty page
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/carves", nil, http.StatusOK, &listResp, "page", "3", "per_page", "2", "order_key", "id", "expired", "1")
|
|
|
|
require.Len(t, listResp.Carves, 0)
|
|
|
|
|
|
|
|
// get specific carve
|
|
|
|
var getResp getCarveResponse
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/carves/%d", c2.ID), nil, http.StatusOK, &getResp)
|
|
|
|
require.Equal(t, c2.ID, getResp.Carve.ID)
|
|
|
|
require.True(t, getResp.Carve.Expired)
|
|
|
|
|
|
|
|
// get non-existing carve
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/carves/%d", c3.ID+1), nil, http.StatusNotFound, &getResp)
|
|
|
|
|
|
|
|
// get expired carve block
|
|
|
|
var blkResp getCarveBlockResponse
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/carves/%d/block/%d", c2.ID, 1), nil, http.StatusInternalServerError, &blkResp)
|
|
|
|
|
|
|
|
// get valid carve block, but block not inserted yet
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/carves/%d/block/%d", c1.ID, 1), nil, http.StatusNotFound, &blkResp)
|
|
|
|
|
|
|
|
require.NoError(t, s.ds.NewBlock(ctx, c1, 1, []byte("block1")))
|
|
|
|
require.NoError(t, s.ds.NewBlock(ctx, c1, 2, []byte("block2")))
|
|
|
|
require.NoError(t, s.ds.NewBlock(ctx, c1, 3, []byte("block3")))
|
|
|
|
|
|
|
|
// get valid carve block
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/carves/%d/block/%d", c1.ID, 1), nil, http.StatusOK, &blkResp)
|
|
|
|
require.Equal(t, "block1", string(blkResp.Data))
|
|
|
|
}
|
2021-12-14 21:34:11 +00:00
|
|
|
|
|
|
|
func (s *integrationTestSuite) TestHostsAddToTeam() {
|
|
|
|
t := s.T()
|
|
|
|
|
|
|
|
ctx := context.Background()
|
|
|
|
|
|
|
|
tm1, err := s.ds.NewTeam(ctx, &fleet.Team{
|
|
|
|
Name: uuid.New().String(),
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
tm2, err := s.ds.NewTeam(ctx, &fleet.Team{
|
|
|
|
Name: uuid.New().String(),
|
|
|
|
})
|
|
|
|
require.NoError(t, err)
|
|
|
|
|
|
|
|
hosts := s.createHosts(t)
|
|
|
|
var refetchResp refetchHostResponse
|
|
|
|
// refetch existing
|
|
|
|
s.DoJSON("POST", fmt.Sprintf("/api/v1/fleet/hosts/%d/refetch", hosts[0].ID), nil, http.StatusOK, &refetchResp)
|
|
|
|
require.NoError(t, refetchResp.Err)
|
|
|
|
|
|
|
|
// refetch unknown
|
|
|
|
s.DoJSON("POST", fmt.Sprintf("/api/v1/fleet/hosts/%d/refetch", hosts[2].ID+1), nil, http.StatusNotFound, &refetchResp)
|
|
|
|
|
|
|
|
// get by identifier unknown
|
|
|
|
var getResp getHostResponse
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/hosts/identifier/no-such-host", nil, http.StatusNotFound, &getResp)
|
|
|
|
|
|
|
|
// get by identifier valid
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/hosts/identifier/%s", hosts[0].UUID), nil, http.StatusOK, &getResp)
|
|
|
|
require.Equal(t, hosts[0].ID, getResp.Host.ID)
|
|
|
|
require.Nil(t, getResp.Host.TeamID)
|
|
|
|
|
|
|
|
// assign hosts to team 1
|
|
|
|
var addResp addHostsToTeamResponse
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/hosts/transfer", addHostsToTeamRequest{
|
|
|
|
TeamID: &tm1.ID,
|
|
|
|
HostIDs: []uint{hosts[0].ID, hosts[1].ID},
|
|
|
|
}, http.StatusOK, &addResp)
|
|
|
|
|
|
|
|
// check that hosts are now part of that team
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/hosts/%d", hosts[0].ID), nil, http.StatusOK, &getResp)
|
|
|
|
require.NotNil(t, getResp.Host.TeamID)
|
|
|
|
require.Equal(t, tm1.ID, *getResp.Host.TeamID)
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/hosts/%d", hosts[1].ID), nil, http.StatusOK, &getResp)
|
|
|
|
require.NotNil(t, getResp.Host.TeamID)
|
|
|
|
require.Equal(t, tm1.ID, *getResp.Host.TeamID)
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/hosts/%d", hosts[2].ID), nil, http.StatusOK, &getResp)
|
|
|
|
require.Nil(t, getResp.Host.TeamID)
|
|
|
|
|
|
|
|
// assign host to team 2 with filter
|
|
|
|
var addfResp addHostsToTeamByFilterResponse
|
|
|
|
req := addHostsToTeamByFilterRequest{TeamID: &tm2.ID}
|
|
|
|
req.Filters.MatchQuery = hosts[2].Hostname
|
|
|
|
s.DoJSON("POST", "/api/v1/fleet/hosts/transfer/filter", req, http.StatusOK, &addfResp)
|
|
|
|
|
|
|
|
// check that host 2 is now part of team 2
|
|
|
|
s.DoJSON("GET", fmt.Sprintf("/api/v1/fleet/hosts/%d", hosts[2].ID), nil, http.StatusOK, &getResp)
|
|
|
|
require.NotNil(t, getResp.Host.TeamID)
|
|
|
|
require.Equal(t, tm2.ID, *getResp.Host.TeamID)
|
|
|
|
|
|
|
|
// delete host 0
|
|
|
|
var delResp deleteHostResponse
|
|
|
|
s.DoJSON("DELETE", fmt.Sprintf("/api/v1/fleet/hosts/%d", hosts[0].ID), nil, http.StatusOK, &delResp)
|
|
|
|
// delete non-existing host
|
|
|
|
s.DoJSON("DELETE", fmt.Sprintf("/api/v1/fleet/hosts/%d", hosts[2].ID+1), nil, http.StatusNotFound, &delResp)
|
|
|
|
|
|
|
|
// list the hosts
|
|
|
|
var listResp listHostsResponse
|
|
|
|
s.DoJSON("GET", "/api/v1/fleet/hosts", nil, http.StatusOK, &listResp, "per_page", "3")
|
|
|
|
require.Len(t, listResp.Hosts, 2)
|
|
|
|
ids := []uint{listResp.Hosts[0].ID, listResp.Hosts[1].ID}
|
|
|
|
require.ElementsMatch(t, ids, []uint{hosts[1].ID, hosts[2].ID})
|
|
|
|
}
|