|
14 | 14 |
|
15 | 15 | from random import randint
|
16 | 16 |
|
17 |
| -import pretend |
18 | 17 | import pytest
|
19 | 18 |
|
20 | 19 | from pyramid.httpexceptions import HTTPBadRequest, HTTPNotFound
|
21 | 20 |
|
22 | 21 | from warehouse.admin.views import verdicts as views
|
| 22 | +from warehouse.malware.models import VerdictClassification, VerdictConfidence |
23 | 23 |
|
24 |
| -from ....common.db.malware import MalwareVerdictFactory |
| 24 | +from ....common.db.malware import MalwareCheckFactory, MalwareVerdictFactory |
25 | 25 |
|
26 | 26 |
|
27 | 27 | class TestListVerdicts:
|
28 | 28 | def test_none(self, db_request):
|
29 |
| - assert views.get_verdicts(db_request) == {"verdicts": []} |
| 29 | + assert views.get_verdicts(db_request) == { |
| 30 | + "verdicts": [], |
| 31 | + "check_names": set(), |
| 32 | + "classifications": set(["threat", "indeterminate", "benign"]), |
| 33 | + "confidences": set(["low", "medium", "high"]), |
| 34 | + } |
30 | 35 |
|
31 | 36 | def test_some(self, db_request):
|
32 |
| - verdicts = [MalwareVerdictFactory.create() for _ in range(10)] |
| 37 | + check = MalwareCheckFactory.create() |
| 38 | + verdicts = [MalwareVerdictFactory.create(check=check) for _ in range(10)] |
33 | 39 |
|
34 |
| - assert views.get_verdicts(db_request) == {"verdicts": verdicts} |
| 40 | + assert views.get_verdicts(db_request) == { |
| 41 | + "verdicts": verdicts, |
| 42 | + "check_names": set([check.name]), |
| 43 | + "classifications": set(["threat", "indeterminate", "benign"]), |
| 44 | + "confidences": set(["low", "medium", "high"]), |
| 45 | + } |
35 | 46 |
|
36 | 47 | def test_some_with_multipage(self, db_request):
|
37 |
| - verdicts = [MalwareVerdictFactory.create() for _ in range(60)] |
| 48 | + check1 = MalwareCheckFactory.create() |
| 49 | + check2 = MalwareCheckFactory.create() |
| 50 | + verdicts = [MalwareVerdictFactory.create(check=check2) for _ in range(60)] |
38 | 51 |
|
39 | 52 | db_request.GET["page"] = "2"
|
40 | 53 |
|
41 |
| - assert views.get_verdicts(db_request) == {"verdicts": verdicts[25:50]} |
42 |
| - |
43 |
| - def test_with_invalid_page(self): |
44 |
| - request = pretend.stub(params={"page": "not an integer"}) |
45 |
| - |
| 54 | + assert views.get_verdicts(db_request) == { |
| 55 | + "verdicts": verdicts[25:50], |
| 56 | + "check_names": set([check1.name, check2.name]), |
| 57 | + "classifications": set(["threat", "indeterminate", "benign"]), |
| 58 | + "confidences": set(["low", "medium", "high"]), |
| 59 | + } |
| 60 | + |
| 61 | + @pytest.mark.parametrize( |
| 62 | + "check_name", ["check0", "check1", ""], |
| 63 | + ) |
| 64 | + def test_check_name_filter(self, db_request, check_name): |
| 65 | + result_verdicts, all_verdicts = [], [] |
| 66 | + for i in range(3): |
| 67 | + check = MalwareCheckFactory.create(name="check%d" % i) |
| 68 | + verdicts = [MalwareVerdictFactory.create(check=check) for _ in range(5)] |
| 69 | + all_verdicts.extend(verdicts) |
| 70 | + if check.name == check_name: |
| 71 | + result_verdicts = verdicts |
| 72 | + |
| 73 | + # Emptry string |
| 74 | + if not result_verdicts: |
| 75 | + result_verdicts = all_verdicts |
| 76 | + |
| 77 | + response = { |
| 78 | + "verdicts": result_verdicts, |
| 79 | + "check_names": set(["check0", "check1", "check2"]), |
| 80 | + "classifications": set(["threat", "indeterminate", "benign"]), |
| 81 | + "confidences": set(["low", "medium", "high"]), |
| 82 | + } |
| 83 | + |
| 84 | + db_request.GET["check_name"] = check_name |
| 85 | + assert views.get_verdicts(db_request) == response |
| 86 | + |
| 87 | + @pytest.mark.parametrize( |
| 88 | + "classification", ["benign", "indeterminate", "threat", ""], |
| 89 | + ) |
| 90 | + def test_classification_filter(self, db_request, classification): |
| 91 | + check1 = MalwareCheckFactory.create() |
| 92 | + result_verdicts, all_verdicts = [], [] |
| 93 | + for c in VerdictClassification: |
| 94 | + verdicts = [ |
| 95 | + MalwareVerdictFactory.create(check=check1, classification=c) |
| 96 | + for _ in range(5) |
| 97 | + ] |
| 98 | + all_verdicts.extend(verdicts) |
| 99 | + if c.value == classification: |
| 100 | + result_verdicts = verdicts |
| 101 | + |
| 102 | + # Emptry string |
| 103 | + if not result_verdicts: |
| 104 | + result_verdicts = all_verdicts |
| 105 | + |
| 106 | + db_request.GET["classification"] = classification |
| 107 | + response = { |
| 108 | + "verdicts": result_verdicts, |
| 109 | + "check_names": set([check1.name]), |
| 110 | + "classifications": set(["threat", "indeterminate", "benign"]), |
| 111 | + "confidences": set(["low", "medium", "high"]), |
| 112 | + } |
| 113 | + assert views.get_verdicts(db_request) == response |
| 114 | + |
| 115 | + @pytest.mark.parametrize( |
| 116 | + "confidence", ["low", "medium", "high", ""], |
| 117 | + ) |
| 118 | + def test_confidence_filter(self, db_request, confidence): |
| 119 | + check1 = MalwareCheckFactory.create() |
| 120 | + result_verdicts, all_verdicts = [], [] |
| 121 | + for c in VerdictConfidence: |
| 122 | + verdicts = [ |
| 123 | + MalwareVerdictFactory.create(check=check1, confidence=c) |
| 124 | + for _ in range(5) |
| 125 | + ] |
| 126 | + all_verdicts.extend(verdicts) |
| 127 | + if c.value == confidence: |
| 128 | + result_verdicts = verdicts |
| 129 | + |
| 130 | + # Emptry string |
| 131 | + if not result_verdicts: |
| 132 | + result_verdicts = all_verdicts |
| 133 | + |
| 134 | + response = { |
| 135 | + "verdicts": result_verdicts, |
| 136 | + "check_names": set([check1.name]), |
| 137 | + "classifications": set(["threat", "indeterminate", "benign"]), |
| 138 | + "confidences": set(["low", "medium", "high"]), |
| 139 | + } |
| 140 | + |
| 141 | + db_request.GET["confidence"] = confidence |
| 142 | + assert views.get_verdicts(db_request) == response |
| 143 | + |
| 144 | + @pytest.mark.parametrize( |
| 145 | + "manually_reviewed", [1, 0], |
| 146 | + ) |
| 147 | + def test_manually_reviewed_filter(self, db_request, manually_reviewed): |
| 148 | + check1 = MalwareCheckFactory.create() |
| 149 | + result_verdicts = [ |
| 150 | + MalwareVerdictFactory.create( |
| 151 | + check=check1, manually_reviewed=bool(manually_reviewed) |
| 152 | + ) |
| 153 | + for _ in range(5) |
| 154 | + ] |
| 155 | + |
| 156 | + # Create other verdicts to ensure filter works properly |
| 157 | + for _ in range(10): |
| 158 | + MalwareVerdictFactory.create( |
| 159 | + check=check1, manually_reviewed=not bool(manually_reviewed) |
| 160 | + ) |
| 161 | + |
| 162 | + db_request.GET["manually_reviewed"] = str(manually_reviewed) |
| 163 | + |
| 164 | + response = { |
| 165 | + "verdicts": result_verdicts, |
| 166 | + "check_names": set([check1.name]), |
| 167 | + "classifications": set(["threat", "indeterminate", "benign"]), |
| 168 | + "confidences": set(["low", "medium", "high"]), |
| 169 | + } |
| 170 | + |
| 171 | + assert views.get_verdicts(db_request) == response |
| 172 | + |
| 173 | + @pytest.mark.parametrize( |
| 174 | + "invalid_param", |
| 175 | + [ |
| 176 | + ("page", "invalid"), |
| 177 | + ("check_name", "NotACheck"), |
| 178 | + ("confidence", "NotAConfidence"), |
| 179 | + ("classification", "NotAClassification"), |
| 180 | + ("manually_reviewed", "False"), |
| 181 | + ], |
| 182 | + ) |
| 183 | + def test_errors(self, db_request, invalid_param): |
| 184 | + db_request.GET[invalid_param[0]] = invalid_param[1] |
46 | 185 | with pytest.raises(HTTPBadRequest):
|
47 |
| - views.get_verdicts(request) |
| 186 | + views.get_verdicts(db_request) |
48 | 187 |
|
49 | 188 |
|
50 | 189 | class TestGetVerdict:
|
|
0 commit comments