Add Web Application Firewall and Railgun.
This commit is contained in:
23
tests/Fixtures/Endpoints/createRailgun.json
Normal file
23
tests/Fixtures/Endpoints/createRailgun.json
Normal file
@@ -0,0 +1,23 @@
|
||||
{
|
||||
"success": true,
|
||||
"errors": [
|
||||
{}
|
||||
],
|
||||
"messages": [
|
||||
{}
|
||||
],
|
||||
"result": {
|
||||
"id": "e928d310693a83094309acf9ead50448",
|
||||
"name": "My Railgun",
|
||||
"status": "active",
|
||||
"enabled": true,
|
||||
"zones_connected": 2,
|
||||
"build": "b1234",
|
||||
"version": "2.1",
|
||||
"revision": "123",
|
||||
"activation_key": "e4edc00281cb56ebac22c81be9bac8f3",
|
||||
"activated_on": "2014-01-02T02:20:00Z",
|
||||
"created_on": "2014-01-01T05:20:00Z",
|
||||
"modified_on": "2014-01-01T05:20:00Z"
|
||||
}
|
||||
}
|
||||
12
tests/Fixtures/Endpoints/deleteRailgun.json
Normal file
12
tests/Fixtures/Endpoints/deleteRailgun.json
Normal file
@@ -0,0 +1,12 @@
|
||||
{
|
||||
"success": true,
|
||||
"errors": [
|
||||
{}
|
||||
],
|
||||
"messages": [
|
||||
{}
|
||||
],
|
||||
"result": {
|
||||
"id": "e928d310693a83094309acf9ead50448"
|
||||
}
|
||||
}
|
||||
22
tests/Fixtures/Endpoints/getPackageGroupInfo.json
Normal file
22
tests/Fixtures/Endpoints/getPackageGroupInfo.json
Normal file
@@ -0,0 +1,22 @@
|
||||
{
|
||||
"success": true,
|
||||
"errors": [
|
||||
{}
|
||||
],
|
||||
"messages": [
|
||||
{}
|
||||
],
|
||||
"result": {
|
||||
"id": "de677e5818985db1285d0e80225f06e5",
|
||||
"name": "Project Honey Pot",
|
||||
"description": "Group designed to protect against IP addresses that are a threat and typically used to launch DDoS attacks",
|
||||
"rules_count": 10,
|
||||
"modified_rules_count": 2,
|
||||
"package_id": "a25a9a7e9c00afc1fb2e0245519d725b",
|
||||
"mode": "on",
|
||||
"allowed_modes": [
|
||||
"on",
|
||||
"off"
|
||||
]
|
||||
}
|
||||
}
|
||||
17
tests/Fixtures/Endpoints/getPackageInfo.json
Normal file
17
tests/Fixtures/Endpoints/getPackageInfo.json
Normal file
@@ -0,0 +1,17 @@
|
||||
{
|
||||
"success": true,
|
||||
"errors": [
|
||||
{}
|
||||
],
|
||||
"messages": [
|
||||
{}
|
||||
],
|
||||
"result": {
|
||||
"id": "a25a9a7e9c00afc1fb2e0245519d725b",
|
||||
"name": "WordPress rules",
|
||||
"description": "Common WordPress exploit protections",
|
||||
"detection_mode": "traditional",
|
||||
"zone_id": "023e105f4ecef8ad9ca31a8372d0c353",
|
||||
"status": "active"
|
||||
}
|
||||
}
|
||||
24
tests/Fixtures/Endpoints/getPackageRuleInfo.json
Normal file
24
tests/Fixtures/Endpoints/getPackageRuleInfo.json
Normal file
@@ -0,0 +1,24 @@
|
||||
{
|
||||
"success": true,
|
||||
"errors": [
|
||||
{}
|
||||
],
|
||||
"messages": [
|
||||
{}
|
||||
],
|
||||
"result": {
|
||||
"id": "f939de3be84e66e757adcdcb87908023",
|
||||
"description": "SQL injection prevention for SELECT statements",
|
||||
"priority": 5,
|
||||
"group": {
|
||||
"id": "de677e5818985db1285d0e80225f06e5",
|
||||
"name": "Project Honey Pot"
|
||||
},
|
||||
"package_id": "a25a9a7e9c00afc1fb2e0245519d725b",
|
||||
"allowed_modes": [
|
||||
"on",
|
||||
"off"
|
||||
],
|
||||
"mode": "on"
|
||||
}
|
||||
}
|
||||
23
tests/Fixtures/Endpoints/getRailgun.json
Normal file
23
tests/Fixtures/Endpoints/getRailgun.json
Normal file
@@ -0,0 +1,23 @@
|
||||
{
|
||||
"success": true,
|
||||
"errors": [
|
||||
{}
|
||||
],
|
||||
"messages": [
|
||||
{}
|
||||
],
|
||||
"result": {
|
||||
"id": "e928d310693a83094309acf9ead50448",
|
||||
"name": "My Railgun",
|
||||
"status": "active",
|
||||
"enabled": true,
|
||||
"zones_connected": 2,
|
||||
"build": "b1234",
|
||||
"version": "2.1",
|
||||
"revision": "123",
|
||||
"activation_key": "e4edc00281cb56ebac22c81be9bac8f3",
|
||||
"activated_on": "2014-01-02T02:20:00Z",
|
||||
"created_on": "2014-01-01T05:20:00Z",
|
||||
"modified_on": "2014-01-01T05:20:00Z"
|
||||
}
|
||||
}
|
||||
30
tests/Fixtures/Endpoints/listPackageGroups.json
Normal file
30
tests/Fixtures/Endpoints/listPackageGroups.json
Normal file
@@ -0,0 +1,30 @@
|
||||
{
|
||||
"success": true,
|
||||
"errors": [
|
||||
{}
|
||||
],
|
||||
"messages": [
|
||||
{}
|
||||
],
|
||||
"result": [
|
||||
{
|
||||
"id": "de677e5818985db1285d0e80225f06e5",
|
||||
"name": "Project Honey Pot",
|
||||
"description": "Group designed to protect against IP addresses that are a threat and typically used to launch DDoS attacks",
|
||||
"rules_count": 10,
|
||||
"modified_rules_count": 2,
|
||||
"package_id": "a25a9a7e9c00afc1fb2e0245519d725b",
|
||||
"mode": "on",
|
||||
"allowed_modes": [
|
||||
"on",
|
||||
"off"
|
||||
]
|
||||
}
|
||||
],
|
||||
"result_info": {
|
||||
"page": 1,
|
||||
"per_page": 20,
|
||||
"count": 1,
|
||||
"total_count": 2000
|
||||
}
|
||||
}
|
||||
38
tests/Fixtures/Endpoints/listPackageRules.json
Normal file
38
tests/Fixtures/Endpoints/listPackageRules.json
Normal file
@@ -0,0 +1,38 @@
|
||||
{
|
||||
"success": true,
|
||||
"errors": [
|
||||
{}
|
||||
],
|
||||
"messages": [
|
||||
{}
|
||||
],
|
||||
"result": [
|
||||
{
|
||||
"id": "92f17202ed8bd63d69a66b86a49a8f6b",
|
||||
"notes": "This rule is on because of an event that occured on date X",
|
||||
"allowed_modes": [
|
||||
"whitelist",
|
||||
"block",
|
||||
"challenge"
|
||||
],
|
||||
"mode": "challenge",
|
||||
"configuration": {
|
||||
"target": "ip",
|
||||
"value": "1.2.3.4"
|
||||
},
|
||||
"scope": {
|
||||
"id": "7c5dae5552338874e5053f2534d2767a",
|
||||
"email": "user@example.com",
|
||||
"type": "user"
|
||||
},
|
||||
"created_on": "2014-01-01T05:20:00.12345Z",
|
||||
"modified_on": "2014-01-01T05:20:00.12345Z"
|
||||
}
|
||||
],
|
||||
"result_info": {
|
||||
"page": 1,
|
||||
"per_page": 20,
|
||||
"count": 1,
|
||||
"total_count": 2000
|
||||
}
|
||||
}
|
||||
25
tests/Fixtures/Endpoints/listPackages.json
Normal file
25
tests/Fixtures/Endpoints/listPackages.json
Normal file
@@ -0,0 +1,25 @@
|
||||
{
|
||||
"success": true,
|
||||
"errors": [
|
||||
{}
|
||||
],
|
||||
"messages": [
|
||||
{}
|
||||
],
|
||||
"result": [
|
||||
{
|
||||
"id": "a25a9a7e9c00afc1fb2e0245519d725b",
|
||||
"name": "WordPress rules",
|
||||
"description": "Common WordPress exploit protections",
|
||||
"detection_mode": "traditional",
|
||||
"zone_id": "023e105f4ecef8ad9ca31a8372d0c353",
|
||||
"status": "active"
|
||||
}
|
||||
],
|
||||
"result_info": {
|
||||
"page": 1,
|
||||
"per_page": 20,
|
||||
"count": 1,
|
||||
"total_count": 2000
|
||||
}
|
||||
}
|
||||
30
tests/Fixtures/Endpoints/listRailgunZones.json
Normal file
30
tests/Fixtures/Endpoints/listRailgunZones.json
Normal file
@@ -0,0 +1,30 @@
|
||||
{
|
||||
"success": true,
|
||||
"errors": [
|
||||
{}
|
||||
],
|
||||
"messages": [
|
||||
{}
|
||||
],
|
||||
"result": [
|
||||
{
|
||||
"id": "023e105f4ecef8ad9ca31a8372d0c353",
|
||||
"name": "example.com",
|
||||
"development_mode": 7200,
|
||||
"original_name_servers": [
|
||||
"ns1.originaldnshost.com",
|
||||
"ns2.originaldnshost.com"
|
||||
],
|
||||
"original_registrar": "GoDaddy",
|
||||
"original_dnshost": "NameCheap",
|
||||
"created_on": "2014-01-01T05:20:00.12345Z",
|
||||
"modified_on": "2014-01-01T05:20:00.12345Z"
|
||||
}
|
||||
],
|
||||
"result_info": {
|
||||
"page": 1,
|
||||
"per_page": 20,
|
||||
"count": 1,
|
||||
"total_count": 2000
|
||||
}
|
||||
}
|
||||
31
tests/Fixtures/Endpoints/listRailguns.json
Normal file
31
tests/Fixtures/Endpoints/listRailguns.json
Normal file
@@ -0,0 +1,31 @@
|
||||
{
|
||||
"success": true,
|
||||
"errors": [
|
||||
{}
|
||||
],
|
||||
"messages": [
|
||||
{}
|
||||
],
|
||||
"result": [
|
||||
{
|
||||
"id": "e928d310693a83094309acf9ead50448",
|
||||
"name": "My Railgun",
|
||||
"status": "active",
|
||||
"enabled": true,
|
||||
"zones_connected": 2,
|
||||
"build": "b1234",
|
||||
"version": "2.1",
|
||||
"revision": "123",
|
||||
"activation_key": "e4edc00281cb56ebac22c81be9bac8f3",
|
||||
"activated_on": "2014-01-02T02:20:00Z",
|
||||
"created_on": "2014-01-01T05:20:00Z",
|
||||
"modified_on": "2014-01-01T05:20:00Z"
|
||||
}
|
||||
],
|
||||
"result_info": {
|
||||
"page": 1,
|
||||
"per_page": 20,
|
||||
"count": 1,
|
||||
"total_count": 2000
|
||||
}
|
||||
}
|
||||
22
tests/Fixtures/Endpoints/updatePackageGroup.json
Normal file
22
tests/Fixtures/Endpoints/updatePackageGroup.json
Normal file
@@ -0,0 +1,22 @@
|
||||
{
|
||||
"success": true,
|
||||
"errors": [
|
||||
{}
|
||||
],
|
||||
"messages": [
|
||||
{}
|
||||
],
|
||||
"result": {
|
||||
"id": "de677e5818985db1285d0e80225f06e5",
|
||||
"name": "Project Honey Pot",
|
||||
"description": "Group designed to protect against IP addresses that are a threat and typically used to launch DDoS attacks",
|
||||
"rules_count": 10,
|
||||
"modified_rules_count": 2,
|
||||
"package_id": "a25a9a7e9c00afc1fb2e0245519d725b",
|
||||
"mode": "off",
|
||||
"allowed_modes": [
|
||||
"on",
|
||||
"off"
|
||||
]
|
||||
}
|
||||
}
|
||||
24
tests/Fixtures/Endpoints/updatePackageRule.json
Normal file
24
tests/Fixtures/Endpoints/updatePackageRule.json
Normal file
@@ -0,0 +1,24 @@
|
||||
{
|
||||
"success": true,
|
||||
"errors": [
|
||||
{}
|
||||
],
|
||||
"messages": [
|
||||
{}
|
||||
],
|
||||
"result": {
|
||||
"id": "f939de3be84e66e757adcdcb87908023",
|
||||
"description": "SQL injection prevention for SELECT statements",
|
||||
"priority": 5,
|
||||
"group": {
|
||||
"id": "de677e5818985db1285d0e80225f06e5",
|
||||
"name": "Project Honey Pot"
|
||||
},
|
||||
"package_id": "a25a9a7e9c00afc1fb2e0245519d725b",
|
||||
"allowed_modes": [
|
||||
"on",
|
||||
"off"
|
||||
],
|
||||
"mode": "on"
|
||||
}
|
||||
}
|
||||
23
tests/Fixtures/Endpoints/updateRailgun.json
Normal file
23
tests/Fixtures/Endpoints/updateRailgun.json
Normal file
@@ -0,0 +1,23 @@
|
||||
{
|
||||
"success": true,
|
||||
"errors": [
|
||||
{}
|
||||
],
|
||||
"messages": [
|
||||
{}
|
||||
],
|
||||
"result": {
|
||||
"id": "e928d310693a83094309acf9ead50448",
|
||||
"name": "My Railgun",
|
||||
"status": "active",
|
||||
"enabled": true,
|
||||
"zones_connected": 2,
|
||||
"build": "b1234",
|
||||
"version": "2.1",
|
||||
"revision": "123",
|
||||
"activation_key": "e4edc00281cb56ebac22c81be9bac8f3",
|
||||
"activated_on": "2014-01-02T02:20:00Z",
|
||||
"created_on": "2014-01-01T05:20:00Z",
|
||||
"modified_on": "2014-01-01T05:20:00Z"
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user