def setUpClass(cls): importModelFile( os.environ['CAIRIS_SRC'] + '/../examples/exemplars/NeuroGrid/NeuroGrid.xml', 1, 'test') importSecurityPatternsFile( os.environ['CAIRIS_SRC'] + '/../examples/architecture/schumacher_patterns.xml', 'test')
def setUpClass(cls): cairis.core.BorgFactory.initialise() importModelFile( os.environ['CAIRIS_SRC'] + '/../examples/exemplars/NeuroGrid/NeuroGrid.xml', 1) importSecurityPatternsFile( os.environ['CAIRIS_SRC'] + '/../examples/architecture/schumacher_patterns.xml')
def setUpClass(cls): importModelFile(os.environ['CAIRIS_SRC'] + '/test/webinos.xml', 1, 'test') importComponentViewFile( os.environ['CAIRIS_SRC'] + '/test/ContextPolicyManagement.xml', 'test') importSecurityPatternsFile( os.environ['CAIRIS_SRC'] + '/test/test_security_patterns.xml', 'test')
def test_get_by_name(self): importSecurityPatternsFile( os.environ['CAIRIS_SRC'] + '/../examples/architecture/schumacher_patterns.xml', 'test') url = '/api/security_patterns/name/Packet%20Filter%20Firewall?session_id=test' method = 'test_get_by_name' rv = self.app.get(url) self.assertIsNotNone(rv.data, 'No response') self.logger.debug('[%s] Response data: %s', method, rv.data) ap = jsonpickle.decode(rv.data) self.assertIsInstance(ap, dict, 'Response is not a valid JSON object') self.assertEqual(ap['theName'], 'Packet Filter Firewall')
def test_situate_security_pattern(self): importSecurityPatternsFile( os.environ['CAIRIS_SRC'] + '/../examples/architecture/schumacher_patterns.xml', 'test') url = '/api/security_patterns/name/Demilitarized%20Zone/environment/Psychosis/situate?session_id=test' method = 'test_situate_security_pattern' self.logger.info('[%s] URL: %s', method, url) rv = self.app.post(url, content_type='application/json') self.logger.debug('[%s] Response data: %s', method, rv.data) json_resp = jsonpickle.decode(rv.data) self.assertIsNotNone(json_resp, 'No results after deserialization') msg = json_resp.get('message', None) self.assertEquals(msg, 'Security Pattern successfully situated')
def test_get_by_name(self): importSecurityPatternsFile(os.environ['CAIRIS_SRC'] + '/../examples/architecture/schumacher_patterns.xml','test') url = '/api/security_patterns/name/Packet%20Filter%20Firewall?session_id=test' method = 'test_get_by_name' rv = self.app.get(url) self.assertIsNotNone(rv.data, 'No response') if (sys.version_info > (3,)): responseData = rv.data.decode('utf-8') else: responseData = rv.data self.logger.debug('[%s] Response data: %s', method, responseData) ap = jsonpickle.decode(responseData) self.assertIsInstance(ap, dict, 'Response is not a valid JSON object') self.assertEqual(ap['theName'],'Packet Filter Firewall')
def test_delete(self): importSecurityPatternsFile( os.environ['CAIRIS_SRC'] + '/../examples/architecture/schumacher_patterns.xml', 'test') url = '/api/security_patterns/name/Packet%20Filter%20Firewall?session_id=test' method = 'test_delete' rv = self.app.delete(url) self.assertIsNotNone(rv.data, 'No response') json_resp = jsonpickle.decode(rv.data) self.assertIsInstance( json_resp, dict, 'The response cannot be converted to a dictionary') message = json_resp.get('message', None) self.assertIsNotNone(message, 'No message in response') self.logger.info('[%s] Message: %s\n', method, message)
def test_delete(self): importSecurityPatternsFile(os.environ['CAIRIS_SRC'] + '/../examples/architecture/schumacher_patterns.xml','test') url = '/api/security_patterns/name/Packet%20Filter%20Firewall?session_id=test' method = 'test_delete' rv = self.app.delete(url) self.assertIsNotNone(rv.data, 'No response') if (sys.version_info > (3,)): responseData = rv.data.decode('utf-8') else: responseData = rv.data json_resp = jsonpickle.decode(responseData) self.assertIsInstance(json_resp, dict, 'The response cannot be converted to a dictionary') message = json_resp.get('message', None) self.assertIsNotNone(message, 'No message in response') self.logger.info('[%s] Message: %s\n', method, message)
def test_situate_security_pattern(self): importSecurityPatternsFile(os.environ['CAIRIS_SRC'] + '/../examples/architecture/schumacher_patterns.xml','test') url = '/api/security_patterns/name/Demilitarized%20Zone/environment/Psychosis/situate?session_id=test' method = 'test_situate_security_pattern' self.logger.info('[%s] URL: %s', method, url) rv = self.app.post(url, content_type='application/json') if (sys.version_info > (3,)): responseData = rv.data.decode('utf-8') else: responseData = rv.data self.logger.debug('[%s] Response data: %s', method, responseData) json_resp = jsonpickle.decode(responseData) self.assertIsNotNone(json_resp, 'No results after deserialization') msg = json_resp.get('message', None) self.assertEqual(msg, 'Security Pattern successfully situated')
def test_get(self): importSecurityPatternsFile(os.environ['CAIRIS_SRC'] + '/../examples/architecture/schumacher_patterns.xml','test') method = 'test_get' url = '/api/security_patterns?session_id=test' self.logger.info('[%s] URL: %s', method, url) rv = self.app.get(url) self.assertIsNotNone(rv.data, 'No response') if (sys.version_info > (3,)): responseData = rv.data.decode('utf-8') else: responseData = rv.data self.logger.debug('[%s] Response data: %s', method, responseData) sps = jsonpickle.decode(responseData) sp = sps[0] self.assertIsInstance(sp, dict, 'Response is not a valid JSON object') self.assertEqual(len(sps),5)
def file_import(importFile, mFormat, overwriteFlag, session_id=None): if overwriteFlag == None: overwriteFlag = 1 from cairis.mio.ModelImport import importSecurityPatternsFile, importAttackPattern, importTVTypeFile, importDirectoryFile, importRequirementsFile, importRiskAnalysisFile, importUsabilityFile, importAssociationsFile, importProjectFile, importDomainValuesFile, importComponentViewFile, importSynopsesFile, importProcessesFile, importAssetsFile, importLocationsFile, importModelFile, importMisusabilityFile, importDataflowsFile, importStoriesFile try: ET.fromstring(open(importFile).read()) except ET.ParseError as e: raise ARMException('Error parsing ' + importFile + ': ' + str(e)) msgStr = '' if (mFormat == 'securitypattern' or mFormat == 'Security Pattern'): msgStr += importSecurityPatternsFile(importFile, session_id) elif (mFormat == 'attackpattern' or mFormat == 'Attack Pattern'): msgStr += importAttackPattern(importFile, session_id) elif (mFormat == 'tvtypes' or mFormat == 'Threat and Vulnerability Types'): msgStr += importTVTypeFile(importFile, int(overwriteFlag), session_id) elif (mFormat == 'directory' or mFormat == 'Threat and Vulnerability Directory'): msgStr += importDirectoryFile(importFile, int(overwriteFlag), session_id) elif (mFormat == 'requirements' or mFormat == 'Requirements'): msgStr += importRequirementsFile(importFile, session_id) elif (mFormat == 'riskanalysis' or mFormat == 'Risk Analysis'): msgStr += importRiskAnalysisFile(importFile, session_id) elif (mFormat == 'usability' or mFormat == 'Usability'): msgStr += importUsabilityFile(importFile, session_id) elif (mFormat == 'misusability' or mFormat == 'Misusability'): msgStr += importMisusabilityFile(importFile, session_id) elif (mFormat == 'associations' or mFormat == 'Associations'): msgStr += importAssociationsFile(importFile, session_id) elif (mFormat == 'project' or mFormat == 'Project data'): msgStr += importProjectFile(importFile, session_id) elif (mFormat == 'domainvalues' or mFormat == 'Domain Values'): msgStr += importDomainValuesFile(importFile, session_id) elif (mFormat == 'architecturalpattern' or mFormat == 'Architectural Pattern'): msgStr += importComponentViewFile(importFile, session_id) elif (mFormat == 'synopses' or mFormat == 'Synopses'): msgStr += importSynopsesFile(importFile, session_id) elif (mFormat == 'processes' or mFormat == 'Processes'): msgStr += importProcessesFile(importFile, session_id) elif (mFormat == 'assets' or mFormat == 'Assets'): msgStr += importAssetsFile(importFile, session_id) elif (mFormat == 'locations' or mFormat == 'Locations'): msgStr += importLocationsFile(importFile, session_id) elif (mFormat == 'dataflows' or mFormat == 'Dataflows'): msgStr += importDataflowsFile(importFile, session_id) elif (mFormat == 'stories' or mFormat == 'Stories'): msgStr += importStoriesFile(importFile, session_id) elif (mFormat == 'all' or mFormat == 'Model' or mFormat == 'Model file (.xml)'): msgStr += importModelFile(importFile, int(overwriteFlag), session_id) else: raise ARMException('Input model type ' + mFormat + ' not recognised') return 0
def file_import(importFile, mFormat, overwriteFlag, session_id=None): if overwriteFlag == None: overwriteFlag = 1 if (os.access(importFile, os.R_OK)) == False: raise ARMException("Cannot access " + importFile) from cairis.mio.ModelImport import importSecurityPatternsFile, importAttackPattern, importTVTypeFile, importDirectoryFile, importRequirementsFile, importRiskAnalysisFile, importUsabilityFile, importAssociationsFile, importProjectFile, importDomainValuesFile, importComponentViewFile, importSynopsesFile, importProcessesFile, importAssetsFile, importLocationsFile, importModelFile, importMisusabilityFile, importDataflowsFile msgStr = '' if (mFormat == 'securitypattern' or mFormat == 'Security Pattern'): msgStr += importSecurityPatternsFile(importFile, session_id=session_id) elif (mFormat == 'attackpattern' or mFormat == 'Attack Pattern'): msgStr += importAttackPattern(importFile, session_id) elif (mFormat == 'tvtypes' or mFormat == 'Threat and Vulnerability Types'): msgStr += importTVTypeFile(importFile, int(overwriteFlag), session_id) elif (mFormat == 'directory' or mFormat == 'Threat and Vulnerability Directory'): msgStr += importDirectoryFile(importFile, int(overwriteFlag), session_id) elif (mFormat == 'requirements' or mFormat == 'Requirements'): msgStr += importRequirementsFile(importFile, session_id) elif (mFormat == 'riskanalysis' or mFormat == 'Risk Analysis'): msgStr += importRiskAnalysisFile(importFile, session_id) elif (mFormat == 'usability' or mFormat == 'Usability'): msgStr += importUsabilityFile(importFile, session_id) elif (mFormat == 'misusability' or mFormat == 'Misusability'): msgStr += importMisusabilityFile(importFile, session_id) elif (mFormat == 'associations' or mFormat == 'Associations'): msgStr += importAssociationsFile(importFile, session_id) elif (mFormat == 'project' or mFormat == 'Project data'): msgStr += importProjectFile(importFile, session_id) elif (mFormat == 'domainvalues' or mFormat == 'Domain Values'): msgStr += importDomainValuesFile(importFile, session_id) elif (mFormat == 'architecturalpattern' or mFormat == 'Architectural Pattern'): msgStr += importComponentViewFile(importFile, session_id) elif (mFormat == 'synopses' or mFormat == 'Synopses'): msgStr += importSynopsesFile(importFile, session_id) elif (mFormat == 'processes' or mFormat == 'Processes'): msgStr += importProcessesFile(importFile, session_id) elif (mFormat == 'assets' or mFormat == 'Assets'): msgStr += importAssetsFile(importFile, session_id) elif (mFormat == 'locations' or mFormat == 'Locations'): msgStr += importLocationsFile(importFile, session_id) elif (mFormat == 'dataflows' or mFormat == 'Dataflows'): msgStr += importDataflowsFile(importFile, session_id) elif (mFormat == 'all' or mFormat == 'Model'): msgStr += importModelFile(importFile, int(overwriteFlag), session_id) else: raise ARMException('Input model type ' + mFormat + ' not recognised') return 0
def file_import(importFile,mFormat,overwriteFlag,session_id = None): if overwriteFlag == None: overwriteFlag = 1 if (os.access(importFile, os.R_OK)) == False: raise ARMException("Cannot access " + importFile) from cairis.mio.ModelImport import importSecurityPatternsFile, importAttackPattern,importTVTypeFile,importDirectoryFile,importRequirementsFile, importRiskAnalysisFile, importUsabilityFile, importAssociationsFile, importProjectFile, importDomainValuesFile, importComponentViewFile, importSynopsesFile,importProcessesFile,importAssetsFile,importLocationsFile,importModelFile,importMisusabilityFile,importDataflowsFile msgStr = '' if (mFormat == 'securitypattern' or mFormat == 'Security Pattern'): msgStr += importSecurityPatternsFile(importFile,session_id = session_id) elif (mFormat == 'attackpattern' or mFormat == 'Attack Pattern'): msgStr += importAttackPattern(importFile,session_id) elif (mFormat == 'tvtypes' or mFormat == 'Threat and Vulnerability Types'): msgStr += importTVTypeFile(importFile,int(overwriteFlag),session_id) elif (mFormat == 'directory' or mFormat == 'Threat and Vulnerability Directory'): msgStr += importDirectoryFile(importFile,int(overwriteFlag),session_id) elif (mFormat == 'requirements' or mFormat == 'Requirements'): msgStr += importRequirementsFile(importFile,session_id) elif (mFormat == 'riskanalysis' or mFormat == 'Risk Analysis'): msgStr += importRiskAnalysisFile(importFile,session_id) elif (mFormat == 'usability' or mFormat == 'Usability'): msgStr += importUsabilityFile(importFile,session_id) elif (mFormat == 'misusability' or mFormat == 'Misusability'): msgStr += importMisusabilityFile(importFile,session_id) elif (mFormat == 'associations' or mFormat == 'Associations'): msgStr += importAssociationsFile(importFile,session_id) elif (mFormat == 'project' or mFormat == 'Project data'): msgStr += importProjectFile(importFile,session_id) elif (mFormat == 'domainvalues' or mFormat == 'Domain Values'): msgStr += importDomainValuesFile(importFile,session_id) elif (mFormat == 'architecturalpattern' or mFormat == 'Architectural Pattern'): msgStr += importComponentViewFile(importFile,session_id) elif (mFormat == 'synopses' or mFormat == 'Synopses'): msgStr += importSynopsesFile(importFile,session_id) elif (mFormat == 'processes' or mFormat == 'Processes'): msgStr += importProcessesFile(importFile,session_id) elif (mFormat == 'assets' or mFormat == 'Assets'): msgStr += importAssetsFile(importFile,session_id) elif (mFormat == 'locations' or mFormat == 'Locations'): msgStr += importLocationsFile(importFile,session_id) elif (mFormat == 'dataflows' or mFormat == 'Dataflows'): msgStr += importDataflowsFile(importFile,session_id) elif (mFormat == 'all' or mFormat == 'Model'): msgStr += importModelFile(importFile,int(overwriteFlag),session_id) else: raise ARMException('Input model type ' + mFormat + ' not recognised') return 0
def setUpClass(cls): importModelFile(os.environ['CAIRIS_SRC'] + '/../examples/exemplars/NeuroGrid/NeuroGrid.xml',1,'test') importSecurityPatternsFile(os.environ['CAIRIS_SRC'] + '/../examples/architecture/schumacher_patterns.xml','test')