mirror of
https://github.com/ghndrx/prowler.git
synced 2026-02-10 14:55:00 +00:00
fix(vpc services): list to dicts in vpc and subnets (#2310)
This commit is contained in:
@@ -20,7 +20,7 @@ class Test_networkfirewall_in_all_vpc:
|
||||
networkfirewall_client.network_firewalls = []
|
||||
vpc_client = mock.MagicMock
|
||||
vpc_client.region = AWS_REGION
|
||||
vpc_client.vpcs = []
|
||||
vpc_client.vpcs = {}
|
||||
with mock.patch(
|
||||
"prowler.providers.aws.services.networkfirewall.networkfirewall_service.NetworkFirewall",
|
||||
new=networkfirewall_client,
|
||||
@@ -55,8 +55,8 @@ class Test_networkfirewall_in_all_vpc:
|
||||
]
|
||||
vpc_client = mock.MagicMock
|
||||
vpc_client.region = AWS_REGION
|
||||
vpc_client.vpcs = [
|
||||
VPCs(
|
||||
vpc_client.vpcs = {
|
||||
VPC_ID_PROTECTED: VPCs(
|
||||
id=VPC_ID_PROTECTED,
|
||||
default=False,
|
||||
cidr_block="192.168.0.0/16",
|
||||
@@ -76,7 +76,7 @@ class Test_networkfirewall_in_all_vpc:
|
||||
],
|
||||
tags=[],
|
||||
)
|
||||
]
|
||||
}
|
||||
with mock.patch(
|
||||
"prowler.providers.aws.services.networkfirewall.networkfirewall_service.NetworkFirewall",
|
||||
new=networkfirewall_client,
|
||||
@@ -110,8 +110,8 @@ class Test_networkfirewall_in_all_vpc:
|
||||
networkfirewall_client.network_firewalls = []
|
||||
vpc_client = mock.MagicMock
|
||||
vpc_client.region = AWS_REGION
|
||||
vpc_client.vpcs = [
|
||||
VPCs(
|
||||
vpc_client.vpcs = {
|
||||
VPC_ID_UNPROTECTED: VPCs(
|
||||
id=VPC_ID_UNPROTECTED,
|
||||
default=False,
|
||||
cidr_block="192.168.0.0/16",
|
||||
@@ -131,7 +131,7 @@ class Test_networkfirewall_in_all_vpc:
|
||||
],
|
||||
tags=[],
|
||||
)
|
||||
]
|
||||
}
|
||||
with mock.patch(
|
||||
"prowler.providers.aws.services.networkfirewall.networkfirewall_service.NetworkFirewall",
|
||||
new=networkfirewall_client,
|
||||
@@ -175,8 +175,8 @@ class Test_networkfirewall_in_all_vpc:
|
||||
]
|
||||
vpc_client = mock.MagicMock
|
||||
vpc_client.region = AWS_REGION
|
||||
vpc_client.vpcs = [
|
||||
VPCs(
|
||||
vpc_client.vpcs = {
|
||||
VPC_ID_UNPROTECTED: VPCs(
|
||||
id=VPC_ID_UNPROTECTED,
|
||||
default=False,
|
||||
cidr_block="192.168.0.0/16",
|
||||
@@ -196,7 +196,7 @@ class Test_networkfirewall_in_all_vpc:
|
||||
],
|
||||
tags=[],
|
||||
),
|
||||
VPCs(
|
||||
VPC_ID_PROTECTED: VPCs(
|
||||
id=VPC_ID_PROTECTED,
|
||||
default=False,
|
||||
cidr_block="192.168.0.0/16",
|
||||
@@ -216,7 +216,7 @@ class Test_networkfirewall_in_all_vpc:
|
||||
],
|
||||
tags=[],
|
||||
),
|
||||
]
|
||||
}
|
||||
with mock.patch(
|
||||
"prowler.providers.aws.services.networkfirewall.networkfirewall_service.NetworkFirewall",
|
||||
new=networkfirewall_client,
|
||||
|
||||
@@ -23,7 +23,7 @@ class Test_vpc_different_regions:
|
||||
audited_partition="aws",
|
||||
audited_identity_arn=None,
|
||||
profile=None,
|
||||
profile_region=["us-east-1", "eu-west-1"],
|
||||
profile_region="us-east-1",
|
||||
credentials=None,
|
||||
assumed_role_info=None,
|
||||
audited_regions=["us-east-1", "eu-west-1"],
|
||||
@@ -37,14 +37,10 @@ class Test_vpc_different_regions:
|
||||
def test_vpc_different_regions(self):
|
||||
# VPC Region 1
|
||||
ec2_client = client("ec2", region_name=AWS_REGION)
|
||||
vpc = ec2_client.create_vpc(
|
||||
CidrBlock="172.28.7.0/24", InstanceTenancy="default"
|
||||
)
|
||||
ec2_client.create_vpc(CidrBlock="172.28.7.0/24", InstanceTenancy="default")
|
||||
# VPC Region 2
|
||||
ec2_client_eu = client("ec2", region_name="eu-west-1")
|
||||
vpc_eu = ec2_client_eu.create_vpc(
|
||||
CidrBlock="172.28.7.0/24", InstanceTenancy="default"
|
||||
)
|
||||
ec2_client_eu.create_vpc(CidrBlock="172.28.7.0/24", InstanceTenancy="default")
|
||||
|
||||
from prowler.providers.aws.services.vpc.vpc_service import VPC
|
||||
|
||||
@@ -67,24 +63,19 @@ class Test_vpc_different_regions:
|
||||
result = check.execute()
|
||||
|
||||
assert len(result) == 1
|
||||
assert result[0].region in ["us-east-1", "eu-west-1"]
|
||||
assert result[0].status == "PASS"
|
||||
assert result[0].region == "us-east-1"
|
||||
assert (
|
||||
result[0].status_extended == "VPCs found in more than one region."
|
||||
)
|
||||
assert result[0].resource_id in [
|
||||
vpc["Vpc"]["VpcId"],
|
||||
vpc_eu["Vpc"]["VpcId"],
|
||||
]
|
||||
assert result[0].resource_id == AWS_ACCOUNT_NUMBER
|
||||
assert result[0].resource_tags == []
|
||||
assert result[0].status == "PASS"
|
||||
|
||||
@mock_ec2
|
||||
def test_vpc_only_one_regions(self):
|
||||
ec2_client = client("ec2", region_name=AWS_REGION)
|
||||
# VPC Region 1
|
||||
vpc = ec2_client.create_vpc(
|
||||
CidrBlock="172.28.6.0/24", InstanceTenancy="default"
|
||||
)
|
||||
ec2_client.create_vpc(CidrBlock="172.28.6.0/24", InstanceTenancy="default")
|
||||
|
||||
from prowler.providers.aws.services.vpc.vpc_service import VPC
|
||||
|
||||
@@ -108,10 +99,7 @@ class Test_vpc_different_regions:
|
||||
|
||||
assert len(result) == 1
|
||||
assert result[0].status == "FAIL"
|
||||
assert result[0].region == AWS_REGION
|
||||
assert (
|
||||
result[0].status_extended
|
||||
== f"VPCs found only in one region {AWS_REGION}."
|
||||
)
|
||||
assert result[0].resource_id == vpc["Vpc"]["VpcId"]
|
||||
assert result[0].region == "us-east-1"
|
||||
assert result[0].status_extended == "VPCs found only in one region"
|
||||
assert result[0].resource_id == AWS_ACCOUNT_NUMBER
|
||||
assert result[0].resource_tags == []
|
||||
|
||||
@@ -90,7 +90,7 @@ class Test_VPC_Service:
|
||||
assert (
|
||||
len(vpc.vpcs) == 3
|
||||
) # Number of AWS regions + created VPC, one default VPC per region
|
||||
for vpc in vpc.vpcs:
|
||||
for vpc in vpc.vpcs.values():
|
||||
if vpc.cidr_block == "10.0.0.0/16":
|
||||
assert vpc.tags == [
|
||||
{"Key": "test", "Value": "test"},
|
||||
@@ -117,9 +117,9 @@ class Test_VPC_Service:
|
||||
audit_info = self.set_mocked_audit_info()
|
||||
vpc = VPC(audit_info)
|
||||
# Search created VPC among default ones
|
||||
for vpc in vpc.vpcs:
|
||||
if vpc.id == new_vpc["VpcId"]:
|
||||
assert vpc.flow_log is True
|
||||
for vpc_iter in vpc.vpcs.values():
|
||||
if vpc_iter.id == new_vpc["VpcId"]:
|
||||
assert vpc_iter.flow_log is True
|
||||
|
||||
# Test VPC Describe VPC Peering connections
|
||||
@mock_ec2
|
||||
@@ -303,7 +303,7 @@ class Test_VPC_Service:
|
||||
assert (
|
||||
len(vpc.vpcs) == 3
|
||||
) # Number of AWS regions + created VPC, one default VPC per region
|
||||
for vpc in vpc.vpcs:
|
||||
for vpc in vpc.vpcs.values():
|
||||
if vpc.cidr_block == "172.28.7.0/24":
|
||||
assert vpc.subnets[0].id == subnet["Subnet"]["SubnetId"]
|
||||
assert vpc.subnets[0].default is False
|
||||
|
||||
Reference in New Issue
Block a user