mirror of
https://github.com/elastic/kibana.git
synced 2025-04-24 17:59:23 -04:00
Co-authored-by: Tre' Seymour <wayne.seymour@elastic.co> Co-authored-by: Kibana Machine <42973632+kibanamachine@users.noreply.github.com> Co-authored-by: spalger <spalger@users.noreply.github.com> Co-authored-by: Spencer <email@spalger.com> Co-authored-by: Tre' Seymour <wayne.seymour@elastic.co> Co-authored-by: spalger <spalger@users.noreply.github.com>
1201 lines
34 KiB
TypeScript
1201 lines
34 KiB
TypeScript
/*
|
|
* Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
|
|
* or more contributor license agreements. Licensed under the Elastic License
|
|
* 2.0; you may not use this file except in compliance with the Elastic License
|
|
* 2.0.
|
|
*/
|
|
|
|
import { KbnClient } from '@kbn/test';
|
|
import { ApiResponse, Client } from '@elastic/elasticsearch';
|
|
import { SuperTest } from 'supertest';
|
|
import supertestAsPromised from 'supertest-as-promised';
|
|
import { Context } from '@elastic/elasticsearch/lib/Transport';
|
|
import { SearchResponse } from 'elasticsearch';
|
|
import { PrePackagedRulesAndTimelinesStatusSchema } from '../../plugins/security_solution/common/detection_engine/schemas/response';
|
|
import { NonEmptyEntriesArray } from '../../plugins/lists/common/schemas';
|
|
import { getCreateExceptionListDetectionSchemaMock } from '../../plugins/lists/common/schemas/request/create_exception_list_schema.mock';
|
|
import {
|
|
CreateRulesSchema,
|
|
UpdateRulesSchema,
|
|
FullResponseSchema,
|
|
QueryCreateSchema,
|
|
} from '../../plugins/security_solution/common/detection_engine/schemas/request';
|
|
import { EXCEPTION_LIST_ITEM_URL, EXCEPTION_LIST_URL } from '../../plugins/lists/common/constants';
|
|
import {
|
|
CreateExceptionListItemSchema,
|
|
CreateExceptionListSchema,
|
|
ExceptionListItemSchema,
|
|
ExceptionListSchema,
|
|
} from '../../plugins/lists/common';
|
|
import { Signal } from '../../plugins/security_solution/server/lib/detection_engine/signals/types';
|
|
import { signalsMigrationType } from '../../plugins/security_solution/server/lib/detection_engine/migrations/saved_objects';
|
|
import {
|
|
Status,
|
|
SignalIds,
|
|
} from '../../plugins/security_solution/common/detection_engine/schemas/common/schemas';
|
|
import { RulesSchema } from '../../plugins/security_solution/common/detection_engine/schemas/response/rules_schema';
|
|
import {
|
|
DETECTION_ENGINE_INDEX_URL,
|
|
DETECTION_ENGINE_PREPACKAGED_URL,
|
|
DETECTION_ENGINE_QUERY_SIGNALS_URL,
|
|
DETECTION_ENGINE_RULES_URL,
|
|
INTERNAL_IMMUTABLE_KEY,
|
|
INTERNAL_RULE_ID_KEY,
|
|
} from '../../plugins/security_solution/common/constants';
|
|
import { getCreateExceptionListItemMinimalSchemaMockWithoutId } from '../../plugins/lists/common/schemas/request/create_exception_list_item_schema.mock';
|
|
|
|
/**
|
|
* This will remove server generated properties such as date times, etc...
|
|
* @param rule Rule to pass in to remove typical server generated properties
|
|
*/
|
|
export const removeServerGeneratedProperties = (
|
|
rule: FullResponseSchema
|
|
): Partial<FullResponseSchema> => {
|
|
const {
|
|
/* eslint-disable @typescript-eslint/naming-convention */
|
|
created_at,
|
|
updated_at,
|
|
id,
|
|
last_failure_at,
|
|
last_failure_message,
|
|
last_success_at,
|
|
last_success_message,
|
|
status,
|
|
status_date,
|
|
/* eslint-enable @typescript-eslint/naming-convention */
|
|
...removedProperties
|
|
} = rule;
|
|
return removedProperties;
|
|
};
|
|
|
|
/**
|
|
* This will remove server generated properties such as date times, etc... including the rule_id
|
|
* @param rule Rule to pass in to remove typical server generated properties
|
|
*/
|
|
export const removeServerGeneratedPropertiesIncludingRuleId = (
|
|
rule: FullResponseSchema
|
|
): Partial<FullResponseSchema> => {
|
|
const ruleWithRemovedProperties = removeServerGeneratedProperties(rule);
|
|
// eslint-disable-next-line @typescript-eslint/naming-convention
|
|
const { rule_id, ...additionalRuledIdRemoved } = ruleWithRemovedProperties;
|
|
return additionalRuledIdRemoved;
|
|
};
|
|
|
|
/**
|
|
* This is a typical simple rule for testing that is easy for most basic testing
|
|
* @param ruleId
|
|
* @param enabled Enables the rule on creation or not. Defaulted to true.
|
|
*/
|
|
export const getSimpleRule = (ruleId = 'rule-1', enabled = false): QueryCreateSchema => ({
|
|
name: 'Simple Rule Query',
|
|
description: 'Simple Rule Query',
|
|
enabled,
|
|
risk_score: 1,
|
|
rule_id: ruleId,
|
|
severity: 'high',
|
|
index: ['auditbeat-*'],
|
|
type: 'query',
|
|
query: 'user.name: root or user.name: admin',
|
|
});
|
|
|
|
/**
|
|
* This is a typical signal testing rule that is easy for most basic testing of output of signals.
|
|
* It starts out in an enabled true state. The from is set very far back to test the basics of signal
|
|
* creation and testing by getting all the signals at once.
|
|
* @param ruleId The optional ruleId which is rule-1 by default.
|
|
* @param enabled Enables the rule on creation or not. Defaulted to true.
|
|
*/
|
|
export const getRuleForSignalTesting = (
|
|
index: string[],
|
|
ruleId = 'rule-1',
|
|
enabled = true
|
|
): QueryCreateSchema => ({
|
|
name: 'Signal Testing Query',
|
|
description: 'Tests a simple query',
|
|
enabled,
|
|
risk_score: 1,
|
|
rule_id: ruleId,
|
|
severity: 'high',
|
|
index,
|
|
type: 'query',
|
|
query: '*:*',
|
|
from: '1900-01-01T00:00:00.000Z',
|
|
});
|
|
|
|
export const getRuleForSignalTestingWithTimestampOverride = (
|
|
index: string[],
|
|
ruleId = 'rule-1',
|
|
enabled = true,
|
|
timestampOverride = 'event.ingested'
|
|
): QueryCreateSchema => ({
|
|
name: 'Signal Testing Query',
|
|
description: 'Tests a simple query',
|
|
enabled,
|
|
risk_score: 1,
|
|
rule_id: ruleId,
|
|
severity: 'high',
|
|
index,
|
|
type: 'query',
|
|
query: '*:*',
|
|
timestamp_override: timestampOverride,
|
|
from: '1900-01-01T00:00:00.000Z',
|
|
});
|
|
|
|
/**
|
|
* This is a typical simple rule for testing that is easy for most basic testing
|
|
* @param ruleId The rule id
|
|
* @param enabled Set to tru to enable it, by default it is off
|
|
*/
|
|
export const getSimpleRuleUpdate = (ruleId = 'rule-1', enabled = false): UpdateRulesSchema => ({
|
|
name: 'Simple Rule Query',
|
|
description: 'Simple Rule Query',
|
|
enabled,
|
|
risk_score: 1,
|
|
rule_id: ruleId,
|
|
severity: 'high',
|
|
index: ['auditbeat-*'],
|
|
type: 'query',
|
|
query: 'user.name: root or user.name: admin',
|
|
});
|
|
|
|
/**
|
|
* This is a representative ML rule payload as expected by the server
|
|
* @param ruleId The rule id
|
|
* @param enabled Set to tru to enable it, by default it is off
|
|
*/
|
|
export const getSimpleMlRule = (ruleId = 'rule-1', enabled = false): CreateRulesSchema => ({
|
|
name: 'Simple ML Rule',
|
|
description: 'Simple Machine Learning Rule',
|
|
enabled,
|
|
anomaly_threshold: 44,
|
|
risk_score: 1,
|
|
rule_id: ruleId,
|
|
severity: 'high',
|
|
machine_learning_job_id: 'some_job_id',
|
|
type: 'machine_learning',
|
|
});
|
|
|
|
/**
|
|
* This is a representative ML rule payload as expected by the server for an update
|
|
* @param ruleId The rule id
|
|
* @param enabled Set to tru to enable it, by default it is off
|
|
*/
|
|
export const getSimpleMlRuleUpdate = (ruleId = 'rule-1', enabled = false): UpdateRulesSchema => ({
|
|
name: 'Simple ML Rule',
|
|
description: 'Simple Machine Learning Rule',
|
|
enabled,
|
|
anomaly_threshold: 44,
|
|
risk_score: 1,
|
|
rule_id: ruleId,
|
|
severity: 'high',
|
|
machine_learning_job_id: 'some_job_id',
|
|
type: 'machine_learning',
|
|
});
|
|
|
|
export const getSignalStatus = () => ({
|
|
aggs: { statuses: { terms: { field: 'signal.status', size: 10 } } },
|
|
});
|
|
|
|
export const getQueryAllSignals = () => ({
|
|
query: { match_all: {} },
|
|
});
|
|
|
|
export const getQuerySignalIds = (signalIds: SignalIds) => ({
|
|
query: {
|
|
terms: {
|
|
_id: signalIds,
|
|
},
|
|
},
|
|
});
|
|
|
|
/**
|
|
* Given an array of ruleIds for a test this will get the signals
|
|
* created from that rule_id.
|
|
* @param ruleIds The rule_id to search for signals
|
|
*/
|
|
export const getQuerySignalsRuleId = (ruleIds: string[]) => ({
|
|
query: {
|
|
terms: {
|
|
'signal.rule.rule_id': ruleIds,
|
|
},
|
|
},
|
|
});
|
|
|
|
/**
|
|
* Given an array of ids for a test this will get the signals
|
|
* created from that rule's regular id.
|
|
* @param ruleIds The rule_id to search for signals
|
|
*/
|
|
export const getQuerySignalsId = (ids: string[], size = 10) => ({
|
|
size,
|
|
query: {
|
|
terms: {
|
|
'signal.rule.id': ids,
|
|
},
|
|
},
|
|
});
|
|
|
|
export const setSignalStatus = ({
|
|
signalIds,
|
|
status,
|
|
}: {
|
|
signalIds: SignalIds;
|
|
status: Status;
|
|
}) => ({
|
|
signal_ids: signalIds,
|
|
status,
|
|
});
|
|
|
|
export const getSignalStatusEmptyResponse = () => ({
|
|
timed_out: false,
|
|
total: 0,
|
|
updated: 0,
|
|
deleted: 0,
|
|
batches: 0,
|
|
version_conflicts: 0,
|
|
noops: 0,
|
|
retries: { bulk: 0, search: 0 },
|
|
throttled_millis: 0,
|
|
requests_per_second: -1,
|
|
throttled_until_millis: 0,
|
|
failures: [],
|
|
});
|
|
|
|
/**
|
|
* This is a typical simple rule for testing that is easy for most basic testing
|
|
*/
|
|
export const getSimpleRuleWithoutRuleId = (): CreateRulesSchema => {
|
|
const simpleRule = getSimpleRule();
|
|
// eslint-disable-next-line @typescript-eslint/naming-convention
|
|
const { rule_id, ...ruleWithoutId } = simpleRule;
|
|
return ruleWithoutId;
|
|
};
|
|
|
|
/**
|
|
* Useful for export_api testing to convert from a multi-part binary back to a string
|
|
* @param res Response
|
|
* @param callback Callback
|
|
*/
|
|
export const binaryToString = (res: any, callback: any): void => {
|
|
res.setEncoding('binary');
|
|
res.data = '';
|
|
res.on('data', (chunk: any) => {
|
|
res.data += chunk;
|
|
});
|
|
res.on('end', () => {
|
|
callback(null, Buffer.from(res.data));
|
|
});
|
|
};
|
|
|
|
/**
|
|
* This is the typical output of a simple rule that Kibana will output with all the defaults
|
|
* except for the server generated properties. Useful for testing end to end tests.
|
|
*/
|
|
export const getSimpleRuleOutput = (ruleId = 'rule-1', enabled = false): Partial<RulesSchema> => ({
|
|
actions: [],
|
|
author: [],
|
|
created_by: 'elastic',
|
|
description: 'Simple Rule Query',
|
|
enabled,
|
|
false_positives: [],
|
|
from: 'now-6m',
|
|
immutable: false,
|
|
index: ['auditbeat-*'],
|
|
interval: '5m',
|
|
rule_id: ruleId,
|
|
language: 'kuery',
|
|
output_index: '.siem-signals-default',
|
|
max_signals: 100,
|
|
risk_score: 1,
|
|
risk_score_mapping: [],
|
|
name: 'Simple Rule Query',
|
|
query: 'user.name: root or user.name: admin',
|
|
references: [],
|
|
severity: 'high',
|
|
severity_mapping: [],
|
|
updated_by: 'elastic',
|
|
tags: [],
|
|
to: 'now',
|
|
type: 'query',
|
|
threat: [],
|
|
throttle: 'no_actions',
|
|
exceptions_list: [],
|
|
version: 1,
|
|
});
|
|
|
|
/**
|
|
* This is the typical output of a simple rule that Kibana will output with all the defaults except
|
|
* for all the server generated properties such as created_by. Useful for testing end to end tests.
|
|
*/
|
|
export const getSimpleRuleOutputWithoutRuleId = (ruleId = 'rule-1'): Partial<RulesSchema> => {
|
|
const rule = getSimpleRuleOutput(ruleId);
|
|
// eslint-disable-next-line @typescript-eslint/naming-convention
|
|
const { rule_id, ...ruleWithoutRuleId } = rule;
|
|
return ruleWithoutRuleId;
|
|
};
|
|
|
|
export const getSimpleMlRuleOutput = (ruleId = 'rule-1'): Partial<RulesSchema> => {
|
|
const rule = getSimpleRuleOutput(ruleId);
|
|
const { query, language, index, ...rest } = rule;
|
|
|
|
return {
|
|
...rest,
|
|
name: 'Simple ML Rule',
|
|
description: 'Simple Machine Learning Rule',
|
|
anomaly_threshold: 44,
|
|
machine_learning_job_id: 'some_job_id',
|
|
type: 'machine_learning',
|
|
};
|
|
};
|
|
|
|
/**
|
|
* Removes all rules by looping over any found and removing them from REST.
|
|
* @param supertest The supertest agent.
|
|
*/
|
|
export const deleteAllAlerts = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>
|
|
): Promise<void> => {
|
|
await countDownTest(
|
|
async () => {
|
|
const { body } = await supertest
|
|
.get(`${DETECTION_ENGINE_RULES_URL}/_find?per_page=9999`)
|
|
.set('kbn-xsrf', 'true')
|
|
.send();
|
|
|
|
const ids = body.data.map((rule: FullResponseSchema) => ({
|
|
id: rule.id,
|
|
}));
|
|
|
|
await supertest
|
|
.post(`${DETECTION_ENGINE_RULES_URL}/_bulk_delete`)
|
|
.send(ids)
|
|
.set('kbn-xsrf', 'true');
|
|
|
|
const { body: finalCheck } = await supertest
|
|
.get(`${DETECTION_ENGINE_RULES_URL}/_find`)
|
|
.set('kbn-xsrf', 'true')
|
|
.send();
|
|
return finalCheck.data.length === 0;
|
|
},
|
|
'deleteAllAlerts',
|
|
50,
|
|
1000
|
|
);
|
|
};
|
|
|
|
export const downgradeImmutableRule = async (es: Client, ruleId: string): Promise<void> => {
|
|
return countDownES(async () => {
|
|
return es.updateByQuery({
|
|
index: '.kibana',
|
|
refresh: true,
|
|
wait_for_completion: true,
|
|
body: {
|
|
script: {
|
|
lang: 'painless',
|
|
source: 'ctx._source.alert.params.version--',
|
|
},
|
|
query: {
|
|
term: {
|
|
'alert.tags': `${INTERNAL_RULE_ID_KEY}:${ruleId}`,
|
|
},
|
|
},
|
|
},
|
|
});
|
|
}, 'downgradeImmutableRule');
|
|
};
|
|
|
|
/**
|
|
* Remove all timelines from the .kibana index
|
|
* @param es The ElasticSearch handle
|
|
*/
|
|
export const deleteAllTimelines = async (es: Client): Promise<void> => {
|
|
await es.deleteByQuery({
|
|
index: '.kibana',
|
|
q: 'type:siem-ui-timeline',
|
|
wait_for_completion: true,
|
|
refresh: true,
|
|
body: {},
|
|
});
|
|
};
|
|
|
|
/**
|
|
* Remove all rules statuses from the .kibana index
|
|
* This will retry 20 times before giving up and hopefully still not interfere with other tests
|
|
* @param es The ElasticSearch handle
|
|
*/
|
|
export const deleteAllRulesStatuses = async (es: Client): Promise<void> => {
|
|
return countDownES(async () => {
|
|
return es.deleteByQuery({
|
|
index: '.kibana',
|
|
q: 'type:siem-detection-engine-rule-status',
|
|
wait_for_completion: true,
|
|
refresh: true,
|
|
body: {},
|
|
});
|
|
}, 'deleteAllRulesStatuses');
|
|
};
|
|
|
|
/**
|
|
* Creates the signals index for use inside of beforeEach blocks of tests
|
|
* This will retry 20 times before giving up and hopefully still not interfere with other tests
|
|
* @param supertest The supertest client library
|
|
*/
|
|
export const createSignalsIndex = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>
|
|
): Promise<void> => {
|
|
await countDownTest(async () => {
|
|
await supertest.post(DETECTION_ENGINE_INDEX_URL).set('kbn-xsrf', 'true').send();
|
|
return true;
|
|
}, 'createSignalsIndex');
|
|
};
|
|
|
|
/**
|
|
* Deletes the signals index for use inside of afterEach blocks of tests
|
|
* @param supertest The supertest client library
|
|
*/
|
|
export const deleteSignalsIndex = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>
|
|
): Promise<void> => {
|
|
await countDownTest(async () => {
|
|
await supertest.delete(DETECTION_ENGINE_INDEX_URL).set('kbn-xsrf', 'true').send();
|
|
return true;
|
|
}, 'deleteSignalsIndex');
|
|
};
|
|
|
|
/**
|
|
* Given an array of rule_id strings this will return a ndjson buffer which is useful
|
|
* for testing uploads.
|
|
* @param ruleIds Array of strings of rule_ids
|
|
*/
|
|
export const getSimpleRuleAsNdjson = (ruleIds: string[], enabled = false): Buffer => {
|
|
const stringOfRules = ruleIds.map((ruleId) => {
|
|
const simpleRule = getSimpleRule(ruleId, enabled);
|
|
return JSON.stringify(simpleRule);
|
|
});
|
|
return Buffer.from(stringOfRules.join('\n'));
|
|
};
|
|
|
|
/**
|
|
* Given a rule this will convert it to an ndjson buffer which is useful for
|
|
* testing upload features.
|
|
* @param rule The rule to convert to ndjson
|
|
*/
|
|
export const ruleToNdjson = (rule: CreateRulesSchema): Buffer => {
|
|
const stringified = JSON.stringify(rule);
|
|
return Buffer.from(`${stringified}\n`);
|
|
};
|
|
|
|
/**
|
|
* This will return a complex rule with all the outputs possible
|
|
* @param ruleId The ruleId to set which is optional and defaults to rule-1
|
|
*/
|
|
export const getComplexRule = (ruleId = 'rule-1'): Partial<RulesSchema> => ({
|
|
actions: [],
|
|
author: [],
|
|
name: 'Complex Rule Query',
|
|
description: 'Complex Rule Query',
|
|
false_positives: [
|
|
'https://www.example.com/some-article-about-a-false-positive',
|
|
'some text string about why another condition could be a false positive',
|
|
],
|
|
risk_score: 1,
|
|
risk_score_mapping: [],
|
|
rule_id: ruleId,
|
|
filters: [
|
|
{
|
|
query: {
|
|
match_phrase: {
|
|
'host.name': 'siem-windows',
|
|
},
|
|
},
|
|
},
|
|
],
|
|
enabled: false,
|
|
index: ['auditbeat-*', 'filebeat-*'],
|
|
interval: '5m',
|
|
output_index: '.siem-signals-default',
|
|
meta: {
|
|
anything_you_want_ui_related_or_otherwise: {
|
|
as_deep_structured_as_you_need: {
|
|
any_data_type: {},
|
|
},
|
|
},
|
|
},
|
|
max_signals: 10,
|
|
tags: ['tag 1', 'tag 2', 'any tag you want'],
|
|
to: 'now',
|
|
from: 'now-6m',
|
|
severity: 'high',
|
|
severity_mapping: [],
|
|
language: 'kuery',
|
|
type: 'query',
|
|
threat: [
|
|
{
|
|
framework: 'MITRE ATT&CK',
|
|
tactic: {
|
|
id: 'TA0040',
|
|
name: 'impact',
|
|
reference: 'https://attack.mitre.org/tactics/TA0040/',
|
|
},
|
|
technique: [
|
|
{
|
|
id: 'T1499',
|
|
name: 'endpoint denial of service',
|
|
reference: 'https://attack.mitre.org/techniques/T1499/',
|
|
},
|
|
],
|
|
},
|
|
{
|
|
framework: 'Some other Framework you want',
|
|
tactic: {
|
|
id: 'some-other-id',
|
|
name: 'Some other name',
|
|
reference: 'https://example.com',
|
|
},
|
|
technique: [
|
|
{
|
|
id: 'some-other-id',
|
|
name: 'some other technique name',
|
|
reference: 'https://example.com',
|
|
},
|
|
],
|
|
},
|
|
],
|
|
references: [
|
|
'http://www.example.com/some-article-about-attack',
|
|
'Some plain text string here explaining why this is a valid thing to look out for',
|
|
],
|
|
timeline_id: 'timeline_id',
|
|
timeline_title: 'timeline_title',
|
|
note: '# some investigation documentation',
|
|
version: 1,
|
|
query: 'user.name: root or user.name: admin',
|
|
});
|
|
|
|
/**
|
|
* This will return a complex rule with all the outputs possible
|
|
* @param ruleId The ruleId to set which is optional and defaults to rule-1
|
|
*/
|
|
export const getComplexRuleOutput = (ruleId = 'rule-1'): Partial<RulesSchema> => ({
|
|
actions: [],
|
|
author: [],
|
|
created_by: 'elastic',
|
|
name: 'Complex Rule Query',
|
|
description: 'Complex Rule Query',
|
|
false_positives: [
|
|
'https://www.example.com/some-article-about-a-false-positive',
|
|
'some text string about why another condition could be a false positive',
|
|
],
|
|
risk_score: 1,
|
|
risk_score_mapping: [],
|
|
rule_id: ruleId,
|
|
filters: [
|
|
{
|
|
query: {
|
|
match_phrase: {
|
|
'host.name': 'siem-windows',
|
|
},
|
|
},
|
|
},
|
|
],
|
|
enabled: false,
|
|
index: ['auditbeat-*', 'filebeat-*'],
|
|
immutable: false,
|
|
interval: '5m',
|
|
output_index: '.siem-signals-default',
|
|
meta: {
|
|
anything_you_want_ui_related_or_otherwise: {
|
|
as_deep_structured_as_you_need: {
|
|
any_data_type: {},
|
|
},
|
|
},
|
|
},
|
|
max_signals: 10,
|
|
tags: ['tag 1', 'tag 2', 'any tag you want'],
|
|
to: 'now',
|
|
from: 'now-6m',
|
|
severity: 'high',
|
|
severity_mapping: [],
|
|
language: 'kuery',
|
|
type: 'query',
|
|
threat: [
|
|
{
|
|
framework: 'MITRE ATT&CK',
|
|
tactic: {
|
|
id: 'TA0040',
|
|
name: 'impact',
|
|
reference: 'https://attack.mitre.org/tactics/TA0040/',
|
|
},
|
|
technique: [
|
|
{
|
|
id: 'T1499',
|
|
name: 'endpoint denial of service',
|
|
reference: 'https://attack.mitre.org/techniques/T1499/',
|
|
},
|
|
],
|
|
},
|
|
{
|
|
framework: 'Some other Framework you want',
|
|
tactic: {
|
|
id: 'some-other-id',
|
|
name: 'Some other name',
|
|
reference: 'https://example.com',
|
|
},
|
|
technique: [
|
|
{
|
|
id: 'some-other-id',
|
|
name: 'some other technique name',
|
|
reference: 'https://example.com',
|
|
},
|
|
],
|
|
},
|
|
],
|
|
references: [
|
|
'http://www.example.com/some-article-about-attack',
|
|
'Some plain text string here explaining why this is a valid thing to look out for',
|
|
],
|
|
throttle: 'no_actions',
|
|
timeline_id: 'timeline_id',
|
|
timeline_title: 'timeline_title',
|
|
updated_by: 'elastic',
|
|
note: '# some investigation documentation',
|
|
version: 1,
|
|
query: 'user.name: root or user.name: admin',
|
|
exceptions_list: [],
|
|
});
|
|
|
|
export const getWebHookAction = () => ({
|
|
actionTypeId: '.webhook',
|
|
config: {
|
|
method: 'post',
|
|
url: 'http://localhost',
|
|
},
|
|
secrets: {
|
|
user: 'example',
|
|
password: 'example',
|
|
},
|
|
name: 'Some connector',
|
|
});
|
|
|
|
export const getRuleWithWebHookAction = (
|
|
id: string,
|
|
enabled = false,
|
|
rule?: QueryCreateSchema
|
|
): CreateRulesSchema | UpdateRulesSchema => {
|
|
const finalRule = rule != null ? { ...rule, enabled } : getSimpleRule('rule-1', enabled);
|
|
return {
|
|
...finalRule,
|
|
throttle: 'rule',
|
|
actions: [
|
|
{
|
|
group: 'default',
|
|
id,
|
|
params: {
|
|
body: '{}',
|
|
},
|
|
action_type_id: '.webhook',
|
|
},
|
|
],
|
|
};
|
|
};
|
|
|
|
export const getSimpleRuleOutputWithWebHookAction = (actionId: string): Partial<RulesSchema> => ({
|
|
...getSimpleRuleOutput(),
|
|
throttle: 'rule',
|
|
actions: [
|
|
{
|
|
action_type_id: '.webhook',
|
|
group: 'default',
|
|
id: actionId,
|
|
params: {
|
|
body: '{}',
|
|
},
|
|
},
|
|
],
|
|
});
|
|
|
|
// Similar to ReactJs's waitFor from here: https://testing-library.com/docs/dom-testing-library/api-async#waitfor
|
|
export const waitFor = async (
|
|
functionToTest: () => Promise<boolean>,
|
|
functionName: string,
|
|
maxTimeout: number = 10000,
|
|
timeoutWait: number = 10
|
|
): Promise<void> => {
|
|
await new Promise<void>(async (resolve, reject) => {
|
|
let found = false;
|
|
let numberOfTries = 0;
|
|
while (!found && numberOfTries < Math.floor(maxTimeout / timeoutWait)) {
|
|
const itPasses = await functionToTest();
|
|
if (itPasses) {
|
|
found = true;
|
|
} else {
|
|
numberOfTries++;
|
|
}
|
|
await new Promise((resolveTimeout) => setTimeout(resolveTimeout, timeoutWait));
|
|
}
|
|
if (found) {
|
|
resolve();
|
|
} else {
|
|
reject(
|
|
new Error(`timed out waiting for function condition to be true within ${functionName}`)
|
|
);
|
|
}
|
|
});
|
|
};
|
|
|
|
/**
|
|
* Does a plain countdown and checks against es queries for either conflicts in the error
|
|
* or for any over the wire issues such as timeouts or temp 404's to make the tests more
|
|
* reliant.
|
|
* @param esFunction The function to test against
|
|
* @param esFunctionName The name of the function to print if we encounter errors
|
|
* @param retryCount The number of times to retry before giving up (has default)
|
|
* @param timeoutWait Time to wait before trying again (has default)
|
|
*/
|
|
export const countDownES = async (
|
|
esFunction: () => Promise<ApiResponse<Record<string, any>, Context>>,
|
|
esFunctionName: string,
|
|
retryCount: number = 20,
|
|
timeoutWait = 250
|
|
): Promise<void> => {
|
|
await countDownTest(
|
|
async () => {
|
|
const result = await esFunction();
|
|
if (result.body.version_conflicts !== 0) {
|
|
// eslint-disable-next-line no-console
|
|
console.log(`Version conflicts for ${result.body.version_conflicts}`);
|
|
return false;
|
|
} else {
|
|
return true;
|
|
}
|
|
},
|
|
esFunctionName,
|
|
retryCount,
|
|
timeoutWait
|
|
);
|
|
};
|
|
|
|
/**
|
|
* Does a plain countdown and checks against a boolean to determine if to wait and try again.
|
|
* This is useful for over the wire things that can cause issues such as conflict or timeouts
|
|
* for testing resiliency.
|
|
* @param functionToTest The function to test against
|
|
* @param name The name of the function to print if we encounter errors
|
|
* @param retryCount The number of times to retry before giving up (has default)
|
|
* @param timeoutWait Time to wait before trying again (has default)
|
|
*/
|
|
export const countDownTest = async (
|
|
functionToTest: () => Promise<boolean>,
|
|
name: string,
|
|
retryCount: number = 20,
|
|
timeoutWait = 250,
|
|
ignoreThrow: boolean = false
|
|
) => {
|
|
if (retryCount > 0) {
|
|
try {
|
|
const passed = await functionToTest();
|
|
if (!passed) {
|
|
// eslint-disable-next-line no-console
|
|
console.log(`Failure trying to ${name}, retries left are: ${retryCount - 1}`);
|
|
// retry, counting down, and delay a bit before
|
|
await new Promise((resolve) => setTimeout(resolve, timeoutWait));
|
|
await countDownTest(functionToTest, name, retryCount - 1, timeoutWait, ignoreThrow);
|
|
}
|
|
} catch (err) {
|
|
if (ignoreThrow) {
|
|
throw err;
|
|
} else {
|
|
// eslint-disable-next-line no-console
|
|
console.log(
|
|
`Failure trying to ${name}, with exception message of:`,
|
|
err.message,
|
|
`retries left are: ${retryCount - 1}`
|
|
);
|
|
// retry, counting down, and delay a bit before
|
|
await new Promise((resolve) => setTimeout(resolve, timeoutWait));
|
|
await countDownTest(functionToTest, name, retryCount - 1, timeoutWait, ignoreThrow);
|
|
}
|
|
}
|
|
} else {
|
|
// eslint-disable-next-line no-console
|
|
console.log(`Could not ${name}, no retries are left`);
|
|
}
|
|
};
|
|
|
|
/**
|
|
* Helper to cut down on the noise in some of the tests. This checks for
|
|
* an expected 200 still and does not try to any retries.
|
|
* @param supertest The supertest deps
|
|
* @param rule The rule to create
|
|
*/
|
|
export const createRule = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>,
|
|
rule: CreateRulesSchema
|
|
): Promise<FullResponseSchema> => {
|
|
const { body } = await supertest
|
|
.post(DETECTION_ENGINE_RULES_URL)
|
|
.set('kbn-xsrf', 'true')
|
|
.send(rule)
|
|
.expect(200);
|
|
return body;
|
|
};
|
|
|
|
/**
|
|
* Helper to cut down on the noise in some of the tests. This checks for
|
|
* an expected 200 still and does not do any retries.
|
|
* @param supertest The supertest deps
|
|
* @param rule The rule to create
|
|
*/
|
|
export const updateRule = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>,
|
|
updatedRule: UpdateRulesSchema
|
|
): Promise<FullResponseSchema> => {
|
|
const { body } = await supertest
|
|
.put(DETECTION_ENGINE_RULES_URL)
|
|
.set('kbn-xsrf', 'true')
|
|
.send(updatedRule)
|
|
.expect(200);
|
|
return body;
|
|
};
|
|
|
|
/**
|
|
* Helper to cut down on the noise in some of the tests. This
|
|
* creates a new action and expects a 200 and does not do any retries.
|
|
* @param supertest The supertest deps
|
|
*/
|
|
export const createNewAction = async (supertest: SuperTest<supertestAsPromised.Test>) => {
|
|
const { body } = await supertest
|
|
.post('/api/actions/action')
|
|
.set('kbn-xsrf', 'true')
|
|
.send(getWebHookAction())
|
|
.expect(200);
|
|
return body;
|
|
};
|
|
|
|
/**
|
|
* Helper to cut down on the noise in some of the tests. This
|
|
* creates a new action and expects a 200 and does not do any retries.
|
|
* @param supertest The supertest deps
|
|
*/
|
|
export const findImmutableRuleById = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>,
|
|
ruleId: string
|
|
): Promise<{
|
|
page: number;
|
|
perPage: number;
|
|
total: number;
|
|
data: FullResponseSchema[];
|
|
}> => {
|
|
const { body } = await supertest
|
|
.get(
|
|
`${DETECTION_ENGINE_RULES_URL}/_find?filter=alert.attributes.tags: "${INTERNAL_IMMUTABLE_KEY}:true" AND alert.attributes.tags: "${INTERNAL_RULE_ID_KEY}:${ruleId}"`
|
|
)
|
|
.set('kbn-xsrf', 'true')
|
|
.send()
|
|
.expect(200);
|
|
return body;
|
|
};
|
|
|
|
/**
|
|
* Helper to cut down on the noise in some of the tests. This
|
|
* creates a new action and expects a 200 and does not do any retries.
|
|
* @param supertest The supertest deps
|
|
*/
|
|
export const getPrePackagedRulesStatus = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>
|
|
): Promise<PrePackagedRulesAndTimelinesStatusSchema> => {
|
|
const { body } = await supertest
|
|
.get(`${DETECTION_ENGINE_PREPACKAGED_URL}/_status`)
|
|
.set('kbn-xsrf', 'true')
|
|
.send()
|
|
.expect(200);
|
|
return body;
|
|
};
|
|
|
|
/**
|
|
* Helper to cut down on the noise in some of the tests. This checks for
|
|
* an expected 200 still and does not try to any retries. Creates exception lists
|
|
* @param supertest The supertest deps
|
|
* @param rule The rule to create
|
|
*/
|
|
export const createExceptionList = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>,
|
|
exceptionList: CreateExceptionListSchema
|
|
): Promise<ExceptionListSchema> => {
|
|
const { body } = await supertest
|
|
.post(EXCEPTION_LIST_URL)
|
|
.set('kbn-xsrf', 'true')
|
|
.send(exceptionList)
|
|
.expect(200);
|
|
return body;
|
|
};
|
|
|
|
/**
|
|
* Helper to cut down on the noise in some of the tests. This checks for
|
|
* an expected 200 still and does not try to any retries. Creates exception lists
|
|
* @param supertest The supertest deps
|
|
* @param rule The rule to create
|
|
*/
|
|
export const createExceptionListItem = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>,
|
|
exceptionListItem: CreateExceptionListItemSchema
|
|
): Promise<ExceptionListItemSchema> => {
|
|
const { body } = await supertest
|
|
.post(EXCEPTION_LIST_ITEM_URL)
|
|
.set('kbn-xsrf', 'true')
|
|
.send(exceptionListItem)
|
|
.expect(200);
|
|
return body;
|
|
};
|
|
|
|
/**
|
|
* Helper to cut down on the noise in some of the tests. This gets
|
|
* a particular rule.
|
|
* @param supertest The supertest deps
|
|
* @param rule The rule to create
|
|
*/
|
|
export const getRule = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>,
|
|
ruleId: string
|
|
): Promise<RulesSchema> => {
|
|
const { body } = await supertest
|
|
.get(`${DETECTION_ENGINE_RULES_URL}?rule_id=${ruleId}`)
|
|
.set('kbn-xsrf', 'true')
|
|
.expect(200);
|
|
return body;
|
|
};
|
|
|
|
export const waitForAlertToComplete = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>,
|
|
id: string
|
|
): Promise<void> => {
|
|
await waitFor(async () => {
|
|
const { body: alertBody } = await supertest
|
|
.get(`/api/alerts/alert/${id}/state`)
|
|
.set('kbn-xsrf', 'true')
|
|
.expect(200);
|
|
return alertBody.previousStartedAt != null;
|
|
}, 'waitForAlertToComplete');
|
|
};
|
|
|
|
/**
|
|
* Waits for the rule in find status to be 'succeeded'
|
|
* or the provided status, before continuing
|
|
* @param supertest Deps
|
|
*/
|
|
export const waitForRuleSuccessOrStatus = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>,
|
|
id: string,
|
|
status: 'succeeded' | 'failed' | 'partial failure' | 'warning' = 'succeeded'
|
|
): Promise<void> => {
|
|
await waitFor(async () => {
|
|
const { body } = await supertest
|
|
.post(`${DETECTION_ENGINE_RULES_URL}/_find_statuses`)
|
|
.set('kbn-xsrf', 'true')
|
|
.send({ ids: [id] })
|
|
.expect(200);
|
|
return body[id]?.current_status?.status === status;
|
|
}, 'waitForRuleSuccess');
|
|
};
|
|
|
|
/**
|
|
* Waits for the signal hits to be greater than the supplied number
|
|
* before continuing with a default of at least one signal
|
|
* @param supertest Deps
|
|
* @param numberOfSignals The number of signals to wait for, default is 1
|
|
*/
|
|
export const waitForSignalsToBePresent = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>,
|
|
numberOfSignals = 1,
|
|
signalIds: string[]
|
|
): Promise<void> => {
|
|
await waitFor(async () => {
|
|
const signalsOpen = await getSignalsByIds(supertest, signalIds, numberOfSignals);
|
|
return signalsOpen.hits.hits.length >= numberOfSignals;
|
|
}, 'waitForSignalsToBePresent');
|
|
};
|
|
|
|
/**
|
|
* Returns all signals both closed and opened by ruleId
|
|
* @param supertest Deps
|
|
*/
|
|
export const getSignalsByRuleIds = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>,
|
|
ruleIds: string[]
|
|
): Promise<
|
|
SearchResponse<{
|
|
signal: Signal;
|
|
[x: string]: unknown;
|
|
}>
|
|
> => {
|
|
const { body: signalsOpen }: { body: SearchResponse<{ signal: Signal }> } = await supertest
|
|
.post(DETECTION_ENGINE_QUERY_SIGNALS_URL)
|
|
.set('kbn-xsrf', 'true')
|
|
.send(getQuerySignalsRuleId(ruleIds))
|
|
.expect(200);
|
|
return signalsOpen;
|
|
};
|
|
|
|
/**
|
|
* Given an array of rule ids this will return only signals based on that rule id both
|
|
* open and closed
|
|
* @param supertest agent
|
|
* @param ids Array of the rule ids
|
|
*/
|
|
export const getSignalsByIds = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>,
|
|
ids: string[],
|
|
size?: number
|
|
): Promise<
|
|
SearchResponse<{
|
|
signal: Signal;
|
|
[x: string]: unknown;
|
|
}>
|
|
> => {
|
|
const { body: signalsOpen }: { body: SearchResponse<{ signal: Signal }> } = await supertest
|
|
.post(DETECTION_ENGINE_QUERY_SIGNALS_URL)
|
|
.set('kbn-xsrf', 'true')
|
|
.send(getQuerySignalsId(ids, size))
|
|
.expect(200);
|
|
return signalsOpen;
|
|
};
|
|
|
|
/**
|
|
* Given a single rule id this will return only signals based on that rule id.
|
|
* @param supertest agent
|
|
* @param ids Rule id
|
|
*/
|
|
export const getSignalsById = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>,
|
|
id: string
|
|
): Promise<
|
|
SearchResponse<{
|
|
signal: Signal;
|
|
[x: string]: unknown;
|
|
}>
|
|
> => {
|
|
const { body: signalsOpen }: { body: SearchResponse<{ signal: Signal }> } = await supertest
|
|
.post(DETECTION_ENGINE_QUERY_SIGNALS_URL)
|
|
.set('kbn-xsrf', 'true')
|
|
.send(getQuerySignalsId([id]))
|
|
.expect(200);
|
|
return signalsOpen;
|
|
};
|
|
|
|
export const installPrePackagedRules = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>
|
|
): Promise<void> => {
|
|
await countDownTest(async () => {
|
|
const { status } = await supertest
|
|
.put(DETECTION_ENGINE_PREPACKAGED_URL)
|
|
.set('kbn-xsrf', 'true')
|
|
.send();
|
|
return status === 200;
|
|
}, 'installPrePackagedRules');
|
|
};
|
|
|
|
/**
|
|
* Convenience testing function where you can pass in just the entries and you will
|
|
* get a rule created with the entries added to an exception list and exception list item
|
|
* all auto-created at once.
|
|
* @param supertest super test agent
|
|
* @param rule The rule to create and attach an exception list to
|
|
* @param entries The entries to create the rule and exception list from
|
|
*/
|
|
export const createRuleWithExceptionEntries = async (
|
|
supertest: SuperTest<supertestAsPromised.Test>,
|
|
rule: QueryCreateSchema,
|
|
entries: NonEmptyEntriesArray[]
|
|
): Promise<FullResponseSchema> => {
|
|
// eslint-disable-next-line @typescript-eslint/naming-convention
|
|
const { id, list_id, namespace_type, type } = await createExceptionList(
|
|
supertest,
|
|
getCreateExceptionListDetectionSchemaMock()
|
|
);
|
|
|
|
await Promise.all(
|
|
entries.map((entry) => {
|
|
const exceptionListItem: CreateExceptionListItemSchema = {
|
|
...getCreateExceptionListItemMinimalSchemaMockWithoutId(),
|
|
entries: entry,
|
|
};
|
|
return createExceptionListItem(supertest, exceptionListItem);
|
|
})
|
|
);
|
|
|
|
// To reduce the odds of in-determinism and/or bugs we ensure we have
|
|
// the same length of entries before continuing.
|
|
await waitFor(async () => {
|
|
const { body } = await supertest.get(
|
|
`${EXCEPTION_LIST_ITEM_URL}/_find?list_id=${
|
|
getCreateExceptionListDetectionSchemaMock().list_id
|
|
}`
|
|
);
|
|
return body.data.length === entries.length;
|
|
}, `within createRuleWithExceptionEntries ${EXCEPTION_LIST_ITEM_URL}/_find?list_id=${getCreateExceptionListDetectionSchemaMock().list_id}`);
|
|
|
|
// create the rule but don't run it immediately as running it immediately can cause
|
|
// the rule to sometimes not filter correctly the first time with an exception list
|
|
// or other timing issues. Then afterwards wait for the rule to have succeeded before
|
|
// returning.
|
|
const ruleWithException: QueryCreateSchema = {
|
|
...rule,
|
|
enabled: false,
|
|
exceptions_list: [
|
|
{
|
|
id,
|
|
list_id,
|
|
namespace_type,
|
|
type,
|
|
},
|
|
],
|
|
};
|
|
const ruleResponse = await createRule(supertest, ruleWithException);
|
|
await supertest
|
|
.patch(DETECTION_ENGINE_RULES_URL)
|
|
.set('kbn-xsrf', 'true')
|
|
.send({ rule_id: ruleResponse.rule_id, enabled: true })
|
|
.expect(200);
|
|
|
|
return ruleResponse;
|
|
};
|
|
|
|
export const getIndexNameFromLoad = (loadResponse: Record<string, unknown>): string => {
|
|
const indexNames = Object.keys(loadResponse);
|
|
if (indexNames.length > 1) {
|
|
throw new Error(
|
|
`expected load response to contain one index, but contained multiple: [${indexNames}]`
|
|
);
|
|
}
|
|
return indexNames[0];
|
|
};
|
|
|
|
/**
|
|
* Waits for the given index to contain documents
|
|
*
|
|
* @param esClient elasticsearch {@link Client}
|
|
* @param index name of the index to query
|
|
*/
|
|
export const waitForIndexToPopulate = async (es: Client, index: string): Promise<void> => {
|
|
await waitFor(async () => {
|
|
const response = await es.count<{ count: number }>({ index });
|
|
return response.body.count > 0;
|
|
}, `waitForIndexToPopulate: ${index}`);
|
|
};
|
|
|
|
export const deleteMigrations = async ({
|
|
ids,
|
|
kbnClient,
|
|
}: {
|
|
ids: string[];
|
|
kbnClient: KbnClient;
|
|
}): Promise<void> => {
|
|
await Promise.all(
|
|
ids.map((id) =>
|
|
kbnClient.savedObjects.delete({
|
|
id,
|
|
type: signalsMigrationType,
|
|
})
|
|
)
|
|
);
|
|
};
|