fix(vpc services): list to dicts in vpc and subnets (#2310)

This commit is contained in:
Nacho Rivera
2023-05-04 15:35:02 +02:00
committed by GitHub
parent 9b551ef0ba
commit 05e4911d6f
9 changed files with 59 additions and 69 deletions

View File

@@ -20,7 +20,7 @@ class Test_networkfirewall_in_all_vpc:
networkfirewall_client.network_firewalls = []
vpc_client = mock.MagicMock
vpc_client.region = AWS_REGION
vpc_client.vpcs = []
vpc_client.vpcs = {}
with mock.patch(
"prowler.providers.aws.services.networkfirewall.networkfirewall_service.NetworkFirewall",
new=networkfirewall_client,
@@ -55,8 +55,8 @@ class Test_networkfirewall_in_all_vpc:
]
vpc_client = mock.MagicMock
vpc_client.region = AWS_REGION
vpc_client.vpcs = [
VPCs(
vpc_client.vpcs = {
VPC_ID_PROTECTED: VPCs(
id=VPC_ID_PROTECTED,
default=False,
cidr_block="192.168.0.0/16",
@@ -76,7 +76,7 @@ class Test_networkfirewall_in_all_vpc:
],
tags=[],
)
]
}
with mock.patch(
"prowler.providers.aws.services.networkfirewall.networkfirewall_service.NetworkFirewall",
new=networkfirewall_client,
@@ -110,8 +110,8 @@ class Test_networkfirewall_in_all_vpc:
networkfirewall_client.network_firewalls = []
vpc_client = mock.MagicMock
vpc_client.region = AWS_REGION
vpc_client.vpcs = [
VPCs(
vpc_client.vpcs = {
VPC_ID_UNPROTECTED: VPCs(
id=VPC_ID_UNPROTECTED,
default=False,
cidr_block="192.168.0.0/16",
@@ -131,7 +131,7 @@ class Test_networkfirewall_in_all_vpc:
],
tags=[],
)
]
}
with mock.patch(
"prowler.providers.aws.services.networkfirewall.networkfirewall_service.NetworkFirewall",
new=networkfirewall_client,
@@ -175,8 +175,8 @@ class Test_networkfirewall_in_all_vpc:
]
vpc_client = mock.MagicMock
vpc_client.region = AWS_REGION
vpc_client.vpcs = [
VPCs(
vpc_client.vpcs = {
VPC_ID_UNPROTECTED: VPCs(
id=VPC_ID_UNPROTECTED,
default=False,
cidr_block="192.168.0.0/16",
@@ -196,7 +196,7 @@ class Test_networkfirewall_in_all_vpc:
],
tags=[],
),
VPCs(
VPC_ID_PROTECTED: VPCs(
id=VPC_ID_PROTECTED,
default=False,
cidr_block="192.168.0.0/16",
@@ -216,7 +216,7 @@ class Test_networkfirewall_in_all_vpc:
],
tags=[],
),
]
}
with mock.patch(
"prowler.providers.aws.services.networkfirewall.networkfirewall_service.NetworkFirewall",
new=networkfirewall_client,

View File

@@ -23,7 +23,7 @@ class Test_vpc_different_regions:
audited_partition="aws",
audited_identity_arn=None,
profile=None,
profile_region=["us-east-1", "eu-west-1"],
profile_region="us-east-1",
credentials=None,
assumed_role_info=None,
audited_regions=["us-east-1", "eu-west-1"],
@@ -37,14 +37,10 @@ class Test_vpc_different_regions:
def test_vpc_different_regions(self):
# VPC Region 1
ec2_client = client("ec2", region_name=AWS_REGION)
vpc = ec2_client.create_vpc(
CidrBlock="172.28.7.0/24", InstanceTenancy="default"
)
ec2_client.create_vpc(CidrBlock="172.28.7.0/24", InstanceTenancy="default")
# VPC Region 2
ec2_client_eu = client("ec2", region_name="eu-west-1")
vpc_eu = ec2_client_eu.create_vpc(
CidrBlock="172.28.7.0/24", InstanceTenancy="default"
)
ec2_client_eu.create_vpc(CidrBlock="172.28.7.0/24", InstanceTenancy="default")
from prowler.providers.aws.services.vpc.vpc_service import VPC
@@ -67,24 +63,19 @@ class Test_vpc_different_regions:
result = check.execute()
assert len(result) == 1
assert result[0].region in ["us-east-1", "eu-west-1"]
assert result[0].status == "PASS"
assert result[0].region == "us-east-1"
assert (
result[0].status_extended == "VPCs found in more than one region."
)
assert result[0].resource_id in [
vpc["Vpc"]["VpcId"],
vpc_eu["Vpc"]["VpcId"],
]
assert result[0].resource_id == AWS_ACCOUNT_NUMBER
assert result[0].resource_tags == []
assert result[0].status == "PASS"
@mock_ec2
def test_vpc_only_one_regions(self):
ec2_client = client("ec2", region_name=AWS_REGION)
# VPC Region 1
vpc = ec2_client.create_vpc(
CidrBlock="172.28.6.0/24", InstanceTenancy="default"
)
ec2_client.create_vpc(CidrBlock="172.28.6.0/24", InstanceTenancy="default")
from prowler.providers.aws.services.vpc.vpc_service import VPC
@@ -108,10 +99,7 @@ class Test_vpc_different_regions:
assert len(result) == 1
assert result[0].status == "FAIL"
assert result[0].region == AWS_REGION
assert (
result[0].status_extended
== f"VPCs found only in one region {AWS_REGION}."
)
assert result[0].resource_id == vpc["Vpc"]["VpcId"]
assert result[0].region == "us-east-1"
assert result[0].status_extended == "VPCs found only in one region"
assert result[0].resource_id == AWS_ACCOUNT_NUMBER
assert result[0].resource_tags == []

View File

@@ -90,7 +90,7 @@ class Test_VPC_Service:
assert (
len(vpc.vpcs) == 3
) # Number of AWS regions + created VPC, one default VPC per region
for vpc in vpc.vpcs:
for vpc in vpc.vpcs.values():
if vpc.cidr_block == "10.0.0.0/16":
assert vpc.tags == [
{"Key": "test", "Value": "test"},
@@ -117,9 +117,9 @@ class Test_VPC_Service:
audit_info = self.set_mocked_audit_info()
vpc = VPC(audit_info)
# Search created VPC among default ones
for vpc in vpc.vpcs:
if vpc.id == new_vpc["VpcId"]:
assert vpc.flow_log is True
for vpc_iter in vpc.vpcs.values():
if vpc_iter.id == new_vpc["VpcId"]:
assert vpc_iter.flow_log is True
# Test VPC Describe VPC Peering connections
@mock_ec2
@@ -303,7 +303,7 @@ class Test_VPC_Service:
assert (
len(vpc.vpcs) == 3
) # Number of AWS regions + created VPC, one default VPC per region
for vpc in vpc.vpcs:
for vpc in vpc.vpcs.values():
if vpc.cidr_block == "172.28.7.0/24":
assert vpc.subnets[0].id == subnet["Subnet"]["SubnetId"]
assert vpc.subnets[0].default is False