2020-04-29 19:51:01 +08:00
|
|
|
*** Settings ***
|
|
|
|
|
Test Teardown DeletePolicyAndObject ${policyIds} ${objectids}
|
|
|
|
|
Force Tags tsg_adc proxy_policy
|
|
|
|
|
Library OperatingSystem
|
|
|
|
|
Resource ../../../../02-Keyword/tsg_adc/SystemCommand.robot
|
|
|
|
|
Resource ../../../../02-Keyword/tsg_bfapi/PolicyObject.robot
|
|
|
|
|
Resource ../../../../02-Keyword/tsg_bfapi/LogVariable.robot
|
|
|
|
|
Resource ../../../../02-Keyword/tsg_bfapi/ApiRequest.robot
|
|
|
|
|
Resource ../../../../03-Variable/AllFlowCaseVariable.txt
|
|
|
|
|
|
|
|
|
|
*** Variables ***
|
|
|
|
|
${policyIds} ${EMPTY}
|
|
|
|
|
${objectids} ${EMPTY}
|
|
|
|
|
${url} /policy/profile/hijackfiles
|
|
|
|
|
${profiledId} ${EMPTY}
|
|
|
|
|
|
|
|
|
|
*** Test Cases ***
|
|
|
|
|
ProxyPolicy-Hijack-Http-00001
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建目标IP
|
|
|
|
|
${objectDict} Create Dictionary objectType=ip isValid=${1} addItemList=CIDR|192.168.100.5|32|0/0
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
2020-04-30 16:38:33 +08:00
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test.apk hijack {"isValid":1,"contentType":"application/vnd.android.package-archive","opAction":"add","profileName":"test1","contentName":"Create-Hijack Files-test.apk","profileId":null,"returnData":1}
|
2020-04-29 19:51:01 +08:00
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject=${objectId}|TSG_SECURITY_DESTINATION_ADDR isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00001 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_SECURITY_DESTINATION_ADDR,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Intercept-HTTP-0001.bat
|
|
|
|
|
... ELSE set variable curl http://open.node.com/test/xiaozhu/xiaozhu.html
|
2020-04-30 16:38:33 +08:00
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List 6b72:f91d:6f81:bfcd:5b0f:e81d:f827:e075
|
|
|
|
|
... ELSE Create List 6b72:f91d:6f81:bfcd:5b0f:e81d:f827:e075
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00002
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+fqdn完整匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建fqdn
|
|
|
|
|
${objectDict} Create Dictionary objectType=fqdn isValid=${1} addItemList=$open.node.com
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
|
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-3.html hijack
|
|
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00002 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_HOST,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Intercept-HTTP-0001.bat
|
|
|
|
|
... ELSE set variable curl http://open.node.com/test/xiaozhu/xiaozhu.html
|
2020-04-30 16:38:33 +08:00
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List 控制小蛇在地图范围内移动
|
|
|
|
|
... ELSE Create List 控制小蛇在地图范围内移动
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00003
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+cat右匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建cat
|
|
|
|
|
${objectDict} Create Dictionary objectType=fqdn_category isValid=${1} addItemList=*node.com
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
2020-04-30 16:38:33 +08:00
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-1.exe hijack {"isValid":1,"contentType":"application/x-msdos-program","opAction":"add","profileName":"test2","contentName":"Create-Hijack Files-test-1.exe","profileId":null,"returnData":1}
|
2020-04-29 19:51:01 +08:00
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00003 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_HOST,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Intercept-HTTP-0001.bat
|
|
|
|
|
... ELSE set variable curl http://open.node.com/test/xiaozhu/xiaozhu.html
|
2020-04-30 16:38:33 +08:00
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List b76f:a340:7b1f:f4d0:27f3:8f0e:2db0:2bac
|
|
|
|
|
... ELSE Create List b76f:a340:7b1f:f4d0:27f3:8f0e:2db0:2bac
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00004
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+url右匹配
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=*xiaozhu.html
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建hijack文件
|
|
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-3.html hijack
|
|
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00004 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Intercept-HTTP-0001.bat
|
|
|
|
|
... ELSE set variable curl http://open.node.com/test/xiaozhu/xiaozhu.html
|
2020-04-30 16:38:33 +08:00
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List 控制小蛇在地图范围内移动
|
|
|
|
|
... ELSE Create List 控制小蛇在地图范围内移动
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00005
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+url字串匹配
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=test
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建hijack文件
|
2020-04-30 16:38:33 +08:00
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-5.png hijack {"isValid":1,"contentType":"image/png","opAction":"add","profileName":"test4","contentName":"Create-Hijack Files-test-5.png","profileId":null,"returnData":1}
|
2020-04-29 19:51:01 +08:00
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00005 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Intercept-HTTP-0002.bat
|
2020-04-30 16:38:33 +08:00
|
|
|
... ELSE set variable curl -kv \ http://open.node.com/test/youtube/youtube.html
|
|
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List bFiles-test-5.png
|
|
|
|
|
... ELSE Create List bFiles-test-5.png
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00006
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+url完整匹配
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=$open.node.com/test/nationalbank/nationalbank.html
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建hijack文件
|
2020-04-30 16:38:33 +08:00
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-4.jpeg hijack {"isValid":1,"contentType":"image/jpeg","opAction":"add","profileName":"test5","contentName":"Create-Hijack Files-test-4.jpeg","profileId":null,"returnData":1}
|
2020-04-29 19:51:01 +08:00
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00006 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Intercept-HTTP-0003.bat
|
2020-04-30 16:38:33 +08:00
|
|
|
... ELSE set variable curl -kv http://open.node.com/test/nationalbank/nationalbank.html
|
|
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List test-4.jpeg
|
|
|
|
|
... ELSE Create List test-4.jpeg
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00007
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+url左匹配
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open.node*
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建hijack文件
|
2020-04-30 16:38:33 +08:00
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-2.gif hijack {"isValid":1,"contentType":"image/gif","opAction":"add","profileName":"test6","contentName":"Create-Hijack Files-test-2.gif","profileId":null,"returnData":1}
|
2020-04-29 19:51:01 +08:00
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00007 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Intercept-HTTP-0001.bat
|
2020-04-30 16:38:33 +08:00
|
|
|
... ELSE set variable curl -kv http://open.node.com/test/xiaozhu/xiaozhu.html
|
|
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List test-2.gif
|
|
|
|
|
... ELSE Create List test-2.gif
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00008
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+请求头右匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建请求头
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=*Safari/537.36|User-Agent
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
|
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-3.html hijack
|
|
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00008 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_REQ_HDR,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Deny-HTTP-0008.bat
|
|
|
|
|
... ELSE set variable curl \ --user-agent "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/31.0.1650.63 Safari/537.36" --referer 'http://www.baidu.com/' \ http://open.node.com
|
2020-04-30 16:38:33 +08:00
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List 控制小蛇在地图范围内移动
|
|
|
|
|
... ELSE Create List 控制小蛇在地图范围内移动
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00009
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+请求头字串匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建请求头
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=Chrome|User-Agent
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
|
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-3.html hijack
|
|
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00009 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_REQ_HDR,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Deny-HTTP-0008.bat
|
|
|
|
|
... ELSE set variable curl \ --user-agent "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/31.0.1650.63 Safari/537.36" --referer 'http://www.baidu.com/' \ http://open.node.com
|
2020-04-30 16:38:33 +08:00
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List 控制小蛇在地图范围内移动
|
|
|
|
|
... ELSE Create List 控制小蛇在地图范围内移动
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00010
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+请求头完整匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建请求头
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=$Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/31.0.1650.63 Safari/537.36|User-Agent
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
|
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-3.html hijack
|
|
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00010 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_REQ_HDR,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Deny-HTTP-0008.bat
|
|
|
|
|
... ELSE set variable curl \ --user-agent "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/31.0.1650.63 Safari/537.36" --referer 'http://www.baidu.com/' \ http://open.node.com
|
2020-04-30 16:38:33 +08:00
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List 控制小蛇在地图范围内移动
|
|
|
|
|
... ELSE Create List 控制小蛇在地图范围内移动
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00011
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+请求头左匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建请求头
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=Mozilla/5.0*|User-Agent
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
2020-04-30 16:38:33 +08:00
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-1.exe hijack {"isValid":1,"contentType":"application/x-msdos-program","opAction":"add","profileName":"test2","contentName":"Create-Hijack Files-test-1.exe","profileId":null,"returnData":1}
|
2020-04-29 19:51:01 +08:00
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00011 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_REQ_HDR,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Deny-HTTP-0008.bat
|
2020-04-30 16:38:33 +08:00
|
|
|
... ELSE set variable curl -kv --user-agent "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/31.0.1650.63 Safari/537.36" --referer 'http://www.baidu.com/' \ http://open.node.com
|
|
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List b76f:a340:7b1f:f4d0:27f3:8f0e:2db0:2bac
|
|
|
|
|
... ELSE Create List b76f:a340:7b1f:f4d0:27f3:8f0e:2db0:2bac
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00012
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+cookie字串匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建cookie
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=_ym_isad=2|Cookie
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
2020-04-30 16:38:33 +08:00
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-5.png hijack {"isValid":1,"contentType":"image/png","opAction":"add","profileName":"test4","contentName":"Create-Hijack Files-test-5.png","profileId":null,"returnData":1}
|
2020-04-29 19:51:01 +08:00
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00012 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_REQ_HDR,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Deny-HTTP-0012.bat
|
2020-04-30 16:38:33 +08:00
|
|
|
... ELSE set variable curl -kv --cookie "*_ga=GA1.2.721078436.1587543528; _gid=GA1.2.916148851.1587543528; _gat=1; _ym_uid=1587543532244912958; _ym_d=1587543532; _ym_isad=2" --referer 'http://www.baidu.com/' \ http://open.node.com/test/nationalbank/nationalbank.html
|
|
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List bFiles-test-5.png
|
|
|
|
|
... ELSE Create List bFiles-test-5.png
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00013
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+应答头右匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建应答头
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=*charset=UTF-8|Content-Type
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
2020-04-30 16:38:33 +08:00
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-4.jpeg hijack {"isValid":1,"contentType":"image/jpeg","opAction":"add","profileName":"test5","contentName":"Create-Hijack Files-test-4.jpeg","profileId":null,"returnData":1}
|
2020-04-29 19:51:01 +08:00
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00013 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_RES_HDR,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Intercept-HTTP-0001.bat
|
|
|
|
|
... ELSE set variable curl http://open.node.com/test/xiaozhu/xiaozhu.html
|
2020-04-30 16:38:33 +08:00
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List test-4.jpeg
|
|
|
|
|
... ELSE Create List test-4.jpeg
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00014
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+应答头字串匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建应答头
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=html|Content-Type
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
2020-04-30 16:38:33 +08:00
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-2.gif hijack {"isValid":1,"contentType":"image/gif","opAction":"add","profileName":"test6","contentName":"Create-Hijack Files-test-2.gif","profileId":null,"returnData":1}
|
2020-04-29 19:51:01 +08:00
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00014 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_RES_HDR,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Intercept-HTTP-0001.bat
|
|
|
|
|
... ELSE set variable curl http://open.node.com/test/xiaozhu/xiaozhu.html
|
2020-04-30 16:38:33 +08:00
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List test-2.gif
|
|
|
|
|
... ELSE Create List test-2.gif
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00015
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+应答头完整匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建应答头
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=$text/html; charset=UTF-8|Content-Type
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
|
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-3.html hijack
|
|
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00015 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_RES_HDR,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Intercept-HTTP-0003.bat
|
|
|
|
|
... ELSE set variable curl \ http://open.node.com/test/nationalbank/nationalbank.html
|
2020-04-30 16:38:33 +08:00
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List 控制小蛇在地图范围内移动
|
|
|
|
|
... ELSE Create List 控制小蛇在地图范围内移动
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00016
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+应答头左匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建应答头
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=text/html*|Content-Type
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
|
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-3.html hijack
|
|
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00016 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_RES_HDR,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Intercept-HTTP-0002.bat \
|
|
|
|
|
... ELSE set variable curl http://open.node.com/test/youtube/youtube.html
|
2020-04-30 16:38:33 +08:00
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List 控制小蛇在地图范围内移动
|
|
|
|
|
... ELSE Create List 控制小蛇在地图范围内移动
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00017
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+set-cookie右匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建set-cookie
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=*HttpOnly|Set-Cookie
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
|
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-3.html hijack
|
|
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00017 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_RES_HDR,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/proxyPolicy-Deny-HTTP-00017.bat
|
|
|
|
|
... ELSE set variable curl http://open.node.com/
|
2020-04-30 16:38:33 +08:00
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List 控制小蛇在地图范围内移动
|
|
|
|
|
... ELSE Create List 控制小蛇在地图范围内移动
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00018
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+set-cookie字串匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建set-cookie
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=Path=/tsgInterface|Set-Cookie
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
2020-04-30 16:38:33 +08:00
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-5.png hijack {"isValid":1,"contentType":"image/png","opAction":"add","profileName":"test4","contentName":"Create-Hijack Files-test-5.png","profileId":null,"returnData":1}
|
2020-04-29 19:51:01 +08:00
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00018 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_RES_HDR,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/proxyPolicy-Deny-HTTP-00017.bat
|
2020-04-30 16:38:33 +08:00
|
|
|
... ELSE set variable curl -kv http://open.node.com/
|
|
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List bFiles-test-5.png
|
|
|
|
|
... ELSE Create List bFiles-test-5.png
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00019
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+set-cookie完整匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建set-cookie
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=$12345678|Set-Cookie
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
2020-04-30 16:38:33 +08:00
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-4.jpeg hijack {"isValid":1,"contentType":"image/jpeg","opAction":"add","profileName":"test5","contentName":"Create-Hijack Files-test-4.jpeg","profileId":null,"returnData":1}
|
2020-04-29 19:51:01 +08:00
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00019 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_RES_HDR,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/SecurityPolicy-Deny-HTTP-0017.bat
|
2020-04-30 16:38:33 +08:00
|
|
|
... ELSE set variable curl -kv -H "Content-Type:application/x-www-form-urlencoded" -X POST -d "reqBody=test&setCookie=12345678&contentType=content-type&resBody=yyyyy" http://open.node.com/action
|
|
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List test-4.jpeg
|
|
|
|
|
... ELSE Create List test-4.jpeg
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00020
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver http hijack ip+set-cookie左匹配+url
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建set-cookie
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=JSESSIONID*|Set-Cookie
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
|
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=open
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建hijack文件
|
2020-04-30 16:38:33 +08:00
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-2.gif hijack {"isValid":1,"contentType":"image/gif","opAction":"add","profileName":"test6","contentName":"Create-Hijack Files-test-2.gif","profileId":null,"returnData":1}
|
2020-04-29 19:51:01 +08:00
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00020 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${objectId}|TSG_FIELD_HTTP_RES_HDR,${object_url_Id}|TSG_FIELD_HTTP_URL
|
|
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/proxyPolicy-Deny-HTTP-00017.bat
|
2020-04-30 16:38:33 +08:00
|
|
|
... ELSE set variable curl -kv http://open.node.com/
|
|
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List test-2.gif
|
|
|
|
|
... ELSE Create List test-2.gif
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|
|
|
|
|
|
|
|
|
|
ProxyPolicy-Hijack-Http-00021
|
2020-05-06 19:38:55 +08:00
|
|
|
[Tags] selfserver 最大组合 http hijack
|
2020-04-30 16:38:33 +08:00
|
|
|
Comment 创建目标IP
|
|
|
|
|
${objectDict} Create Dictionary objectType=ip isValid=${1} addItemList=CIDR|192.168.100.5|32|0/0
|
|
|
|
|
${rescode} ${objectId} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} set Variable ${objectId}
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建fqdn
|
|
|
|
|
${objectDict} Create Dictionary objectType=fqdn isValid=${1} addItemList=$open.node.com
|
|
|
|
|
${rescode} ${object_fqdn_Id} AddObject2 ${1} ${objectDict}
|
2020-04-30 16:38:33 +08:00
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_fqdn_Id}
|
2020-04-29 19:51:01 +08:00
|
|
|
Comment 创建url
|
|
|
|
|
${objectDict} Create Dictionary objectType=url isValid=${1} addItemList=*xiaozhu.html
|
|
|
|
|
${rescode} ${object_url_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_url_Id}
|
|
|
|
|
Comment 创建请求头
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=*Safari/537.36|User-Agent
|
|
|
|
|
${rescode} ${object_rq_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_rq_Id}
|
|
|
|
|
Comment 创建应答头
|
|
|
|
|
${objectDict} Create Dictionary objectType=http_signature isValid=${1} addItemList=html|Content-Type
|
|
|
|
|
${rescode} ${object_re_Id} AddObject2 ${1} ${objectDict}
|
|
|
|
|
${objectids} Catenate SEPARATOR=, ${objectids} ${object_re_Id}
|
|
|
|
|
Comment 创建hijack文件
|
|
|
|
|
${response} CreatePolicyFile2 ${url} ${path}/hijack_files/ Create-Hijack Files-test-3.html hijack
|
|
|
|
|
${profiledId} Get From Dictionary ${response} profileId
|
|
|
|
|
Comment 创建安全策略
|
|
|
|
|
${policyDict} Create Dictionary policyName=SecurityPolicy-Intercept-HTTP-00001 policyType=tsg_security policyDesc=autotest userTags= action=intercept effectiveRange= userRegion={"protocol": "HTTP"} referenceObject= isValid=${1} appObjectIdArray=2
|
|
|
|
|
${rescode} ${policyId} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId1} set Variable {"policyType":"tsg_security","policyIds":[${policyId}]}
|
|
|
|
|
${policyIds} Create List ${policyId1}
|
|
|
|
|
Comment 创建管控策略
|
2020-04-30 16:38:33 +08:00
|
|
|
${policyDict} Create Dictionary policyName=proxyPolicy-Hijack-HTTP-00021 policyType=pxy_manipulation policyDesc=autotest userTags= action=manipulation effectiveRange= userRegion={"method":"hijack","hijack_profile":${profiledId},"protocol":"HTTP"} isValid=${1} appObjectIdArray=2 referenceObject=${object_fqdn_Id}|TSG_FIELD_HTTP_HOST,${object_url_Id}|TSG_FIELD_HTTP_URL,${object_rq_Id}|TSG_FIELD_HTTP_REQ_HDR,${object_re_Id}|TSG_FIELD_HTTP_RES_HDR,${objectId}|TSG_SECURITY_DESTINATION_ADDR
|
2020-04-29 19:51:01 +08:00
|
|
|
${rescode} ${policyId3} AddPolicy2 ${1} ${policyDict}
|
|
|
|
|
#删除策略
|
|
|
|
|
${policyId2} set Variable {"policyType":"pxy_manipulation","policyIds":[${policyId3}]}
|
|
|
|
|
${policyIds} Create List ${policyId1} ${policyId2}
|
|
|
|
|
Comment 功能端验证HTTP验证
|
|
|
|
|
${commandstr} run keyword if '${systemType}'=='Windows' set variable ${curlbatpath}/selfserver/proxyPolicy-Deny-HTTP-00023.bat
|
|
|
|
|
... ELSE set variable curl \ --user-agent "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML like Gecko) Chrome/31.0.1650.63 Safari/537.36" --referer 'http://www.baidu.com/' \ http://open.node.com/test/xiaozhu/xiaozhu.html
|
2020-04-30 16:38:33 +08:00
|
|
|
${stringlist} run keyword if '${systemType}'=='Windows' Create List 控制小蛇在地图范围内移动
|
|
|
|
|
... ELSE Create List 控制小蛇在地图范围内移动
|
2020-04-29 19:51:01 +08:00
|
|
|
${starttime} Get Time
|
|
|
|
|
Sleep ${policyVerificationSleepSeconds}s
|
|
|
|
|
${rescode} SystemCommands ${commandstr} ${stringlist}
|
|
|
|
|
Sleep ${policyLogVerificationSleepSeconds}s
|
|
|
|
|
${endtime} Get Time
|
|
|
|
|
#日志验证
|
|
|
|
|
${s} Convert to String ${policyId3}
|
|
|
|
|
GetLogList proxy_event_log ${starttime} ${endtime} ${testClentIP} ${s} http_host open.node.com
|