diff --git a/providers/aws/aws_regions_by_service.json b/providers/aws/aws_regions_by_service.json index 2b49c312..58f4f933 100644 --- a/providers/aws/aws_regions_by_service.json +++ b/providers/aws/aws_regions_by_service.json @@ -8,8 +8,8 @@ "ap-south-1", "ap-southeast-1", "ap-southeast-3", + "eu-south-2", "eu-west-1", - "me-south-1", "sa-east-1", "us-west-2", "ap-northeast-1", @@ -18,11 +18,13 @@ "eu-south-1", "eu-west-2", "eu-west-3", + "me-south-1", "us-east-1", "us-west-1", "ap-southeast-2", "ca-central-1", "eu-central-1", + "eu-central-2", "eu-north-1", "me-central-1", "us-east-2" @@ -136,14 +138,14 @@ "af-south-1", "ap-east-1", "ap-northeast-3", - "ap-southeast-2", "eu-central-1", "eu-north-1", + "eu-south-2", "sa-east-1", "us-east-1", "ap-northeast-1", "ap-northeast-2", - "ap-southeast-1", + "ap-southeast-2", "ap-southeast-3", "eu-south-1", "eu-west-1", @@ -151,7 +153,9 @@ "me-central-1", "us-east-2", "ap-south-1", + "ap-southeast-1", "ca-central-1", + "eu-central-2", "eu-west-3", "me-south-1", "us-west-1", @@ -339,25 +343,27 @@ "ap-southeast-1", "ap-southeast-2", "ap-southeast-3", - "eu-central-1", - "eu-west-2", + "eu-central-2", + "eu-south-2", "eu-west-3", "me-south-1", "us-east-2", "us-west-1", - "af-south-1", "ap-east-1", "ap-northeast-2", "ap-south-1", "ca-central-1", - "eu-west-1", + "eu-central-1", + "eu-west-2", "me-central-1", "sa-east-1", "us-west-2", + "af-south-1", "ap-northeast-1", "ap-northeast-3", "eu-north-1", "eu-south-1", + "eu-west-1", "us-east-1" ], "cn": {}, @@ -448,7 +454,7 @@ "aws": [ "ap-northeast-1", "ap-southeast-2", - "ca-central-1", + "eu-central-2", "eu-west-2", "me-central-1", "me-south-1", @@ -459,14 +465,16 @@ "ap-northeast-2", "ap-northeast-3", "ap-southeast-1", - "eu-central-1", + "ca-central-1", "eu-south-1", "eu-west-1", "eu-west-3", "us-east-2", "ap-south-1", "ap-southeast-3", + "eu-central-1", "eu-north-1", + "eu-south-2", "us-west-1", "us-west-2" ], @@ -487,25 +495,27 @@ "ap-southeast-1", "ap-southeast-3", "eu-central-1", + "eu-central-2", "eu-west-2", "me-central-1", - "me-south-1", "sa-east-1", "us-east-1", "us-east-2", "ap-east-1", "ap-northeast-2", "ap-northeast-3", - "ap-southeast-2", "ca-central-1", "eu-north-1", "eu-south-1", - "us-west-2", + "eu-south-2", + "me-south-1", "ap-northeast-1", "ap-south-1", + "ap-southeast-2", "eu-west-1", "eu-west-3", - "us-west-1" + "us-west-1", + "us-west-2" ], "cn": [ "cn-north-1", @@ -801,27 +811,29 @@ "cloudformation": { "regions": { "aws": [ - "ap-east-1", "ap-south-1", "ap-southeast-2", + "eu-central-2", + "eu-south-2", "eu-west-2", - "eu-west-3", "me-central-1", "us-east-2", "af-south-1", + "ap-east-1", "ap-northeast-1", "ap-southeast-3", "ca-central-1", "eu-central-1", - "eu-north-1", - "me-south-1", + "eu-west-3", "us-east-1", "us-west-2", "ap-northeast-2", "ap-northeast-3", "ap-southeast-1", + "eu-north-1", "eu-south-1", "eu-west-1", + "me-south-1", "sa-east-1", "us-west-1" ], @@ -841,26 +853,28 @@ "ap-east-1", "ca-central-1", "eu-central-1", + "eu-south-2", "eu-west-1", "eu-west-3", "sa-east-1", "us-east-1", "us-east-2", - "us-west-1", "us-west-2", "ap-northeast-3", "ap-south-1", "ap-southeast-1", "ap-southeast-3", "eu-north-1", - "eu-south-1", "eu-west-2", "me-central-1", "me-south-1", + "us-west-1", "af-south-1", "ap-northeast-1", "ap-northeast-2", - "ap-southeast-2" + "ap-southeast-2", + "eu-central-2", + "eu-south-1" ], "cn": [ "cn-north-1", @@ -950,6 +964,7 @@ "ap-east-1", "ap-northeast-1", "ap-northeast-2", + "eu-south-2", "eu-west-3", "me-central-1", "sa-east-1", @@ -965,6 +980,7 @@ "ap-south-1", "ap-southeast-1", "eu-central-1", + "eu-central-2", "eu-west-2", "me-south-1", "us-east-1", @@ -998,11 +1014,13 @@ "ap-northeast-1", "ap-northeast-3", "ap-southeast-3", - "eu-central-1", + "eu-central-2", "eu-south-1", "ap-south-1", "ap-southeast-1", "ap-southeast-2", + "eu-central-1", + "eu-south-2", "eu-west-1", "eu-west-2", "eu-west-3" @@ -1124,6 +1142,7 @@ "us-west-2", "ap-northeast-2", "ap-northeast-3", + "eu-central-2", "eu-west-1", "eu-west-2", "me-central-1", @@ -1133,6 +1152,7 @@ "ap-southeast-3", "eu-central-1", "eu-north-1", + "eu-south-2", "eu-west-3", "us-east-1" ], @@ -1338,6 +1358,8 @@ "us-west-2", "af-south-1", "ap-southeast-2", + "eu-central-2", + "eu-south-2", "eu-west-1", "eu-west-3", "me-central-1", @@ -1477,6 +1499,7 @@ "ap-northeast-2", "ap-southeast-1", "eu-south-1", + "me-central-1", "us-west-2" ], "cn": {}, @@ -1584,23 +1607,25 @@ "aws": [ "ap-east-1", "ap-northeast-2", - "ap-south-1", "ap-southeast-1", "ap-southeast-3", + "eu-central-2", "eu-north-1", "sa-east-1", "us-east-2", "us-west-2", "af-south-1", "ap-northeast-3", + "ap-south-1", "eu-central-1", "eu-south-1", + "eu-south-2", "eu-west-1", - "eu-west-2", "us-west-1", "ap-northeast-1", "ap-southeast-2", "ca-central-1", + "eu-west-2", "eu-west-3", "me-central-1", "me-south-1", @@ -1636,27 +1661,29 @@ "aws": [ "ap-southeast-2", "ap-southeast-3", + "eu-central-2", + "eu-south-2", "eu-west-1", "me-central-1", "me-south-1", "sa-east-1", "us-east-1", - "us-east-2", - "us-west-1", "ap-east-1", - "ap-northeast-1", "ap-northeast-2", "ap-southeast-1", "eu-central-1", "eu-south-1", "eu-west-2", "eu-west-3", - "us-west-2", + "us-east-2", + "us-west-1", "af-south-1", + "ap-northeast-1", "ap-northeast-3", "ap-south-1", "ca-central-1", - "eu-north-1" + "eu-north-1", + "us-west-2" ], "cn": [ "cn-north-1", @@ -1743,11 +1770,12 @@ "eu-central-1", "eu-north-1", "eu-south-1", - "eu-west-1", "eu-west-3", + "me-central-1", "me-south-1", "ap-northeast-2", "ap-south-1", + "eu-west-1", "eu-west-2", "us-east-1", "us-west-1" @@ -1768,6 +1796,7 @@ "ap-southeast-3", "ca-central-1", "eu-central-1", + "eu-central-2", "eu-north-1", "eu-west-1", "eu-west-2", @@ -1775,15 +1804,16 @@ "ap-east-1", "ap-northeast-1", "ap-northeast-2", - "ap-south-1", - "ap-southeast-1", "ap-southeast-2", + "eu-south-2", "me-central-1", "us-east-2", "us-west-1", "us-west-2", "af-south-1", "ap-northeast-3", + "ap-south-1", + "ap-southeast-1", "eu-south-1", "eu-west-3", "sa-east-1", @@ -1808,6 +1838,7 @@ "ap-southeast-1", "eu-north-1", "eu-south-1", + "eu-south-2", "eu-west-1", "me-south-1", "af-south-1", @@ -1815,7 +1846,6 @@ "ca-central-1", "eu-central-1", "eu-west-2", - "eu-west-3", "me-central-1", "sa-east-1", "us-east-2", @@ -1823,6 +1853,8 @@ "ap-northeast-2", "ap-south-1", "ap-southeast-2", + "eu-central-2", + "eu-west-3", "us-east-1", "us-west-2" ], @@ -1853,13 +1885,15 @@ "ap-northeast-2", "ap-southeast-1", "eu-south-1", - "eu-west-1", + "eu-south-2", "us-east-1", "us-east-2", "us-west-2", "ap-southeast-3", "ca-central-1", "eu-central-1", + "eu-central-2", + "eu-west-1", "me-south-1", "us-west-1" ], @@ -1885,19 +1919,21 @@ "eu-west-3", "me-south-1", "sa-east-1", - "af-south-1", "ap-south-1", "ap-southeast-2", "ap-southeast-3", "ca-central-1", + "eu-central-2", "eu-west-1", "me-central-1", "us-east-1", "us-east-2", "us-west-1", + "af-south-1", "ap-northeast-2", "eu-central-1", "eu-north-1", + "eu-south-2", "us-west-2" ], "cn": [ @@ -1917,21 +1953,23 @@ "ap-southeast-1", "ap-southeast-3", "ca-central-1", + "eu-central-2", "eu-north-1", "eu-south-1", + "eu-south-2", "eu-west-3", "us-east-2", "ap-east-1", - "ap-northeast-2", "ap-northeast-3", "ap-south-1", "ap-southeast-2", - "eu-west-1", "eu-west-2", "us-east-1", "us-west-1", "af-south-1", + "ap-northeast-2", "eu-central-1", + "eu-west-1", "me-central-1", "me-south-1", "sa-east-1", @@ -1942,8 +1980,8 @@ "cn-northwest-1" ], "gov": [ - "us-gov-west-1", - "us-gov-east-1" + "us-gov-east-1", + "us-gov-west-1" ] } }, @@ -2044,27 +2082,29 @@ "ap-southeast-1", "ap-southeast-3", "ca-central-1", + "eu-central-2", + "eu-south-2", "eu-west-1", - "eu-west-2", "me-central-1", - "us-east-1", "ap-east-1", "ap-southeast-2", "eu-north-1", - "eu-west-3", + "eu-west-2", "sa-east-1", + "us-east-1", "us-west-1", "ap-northeast-2", "ap-northeast-3", "eu-central-1", "eu-south-1", + "eu-west-3", "me-south-1", "us-east-2", "us-west-2" ], "cn": [ - "cn-north-1", - "cn-northwest-1" + "cn-northwest-1", + "cn-north-1" ], "gov": [ "us-gov-east-1", @@ -2141,6 +2181,7 @@ "ap-south-1", "ap-southeast-3", "eu-central-1", + "eu-central-2", "eu-west-1", "eu-west-3", "sa-east-1", @@ -2149,6 +2190,7 @@ "ap-southeast-1", "ap-southeast-2", "ca-central-1", + "eu-south-2", "us-west-1" ], "cn": [ @@ -2176,14 +2218,16 @@ "us-west-2", "ap-northeast-2", "ap-northeast-3", - "ap-south-1", "ap-southeast-2", "eu-central-1", + "eu-central-2", "eu-west-1", "eu-west-3", "ap-east-1", "ap-northeast-1", + "ap-south-1", "eu-south-1", + "eu-south-2", "us-east-1", "us-east-2", "us-west-1" @@ -2205,6 +2249,7 @@ "ap-south-1", "ap-southeast-2", "eu-south-1", + "eu-south-2", "eu-west-3", "us-west-1", "us-west-2", @@ -2212,17 +2257,18 @@ "ap-southeast-1", "ca-central-1", "eu-central-1", + "eu-central-2", "eu-north-1", "eu-west-1", - "eu-west-2", - "me-south-1", "us-east-1", "us-east-2", "ap-northeast-1", "ap-northeast-2", "ap-northeast-3", "ap-southeast-3", + "eu-west-2", "me-central-1", + "me-south-1", "sa-east-1" ], "cn": [ @@ -2259,7 +2305,9 @@ "ap-south-1", "ap-southeast-2", "ap-southeast-3", + "eu-central-2", "eu-south-1", + "eu-south-2", "us-west-1" ], "cn": [ @@ -2284,18 +2332,20 @@ "sa-east-1", "us-east-1", "ap-northeast-1", - "ap-south-1", "ca-central-1", "eu-central-1", + "eu-central-2", "eu-north-1", "eu-south-1", + "eu-south-2", "eu-west-1", - "me-central-1", "us-west-2", "ap-east-1", "ap-northeast-3", + "ap-south-1", "ap-southeast-2", "eu-west-3", + "me-central-1", "us-east-2", "us-west-1" ], @@ -2831,17 +2881,19 @@ "ap-northeast-1", "ca-central-1", "eu-central-1", + "eu-south-2", "eu-west-2", "me-south-1", - "sa-east-1", "us-east-2", "us-west-2", "ap-northeast-2", "ap-northeast-3", "ap-south-1", + "eu-central-2", "eu-south-1", "eu-west-1", "eu-west-3", + "sa-east-1", "us-east-1" ], "cn": [ @@ -3157,22 +3209,24 @@ "ap-northeast-3", "ap-south-1", "ap-southeast-2", + "eu-central-2", + "eu-south-2", "us-east-2", - "us-west-1", "ap-east-1", "ap-southeast-1", "ap-southeast-3", "eu-central-1", "eu-south-1", - "me-south-1" + "me-south-1", + "us-west-1" ], "cn": [ "cn-northwest-1", "cn-north-1" ], "gov": [ - "us-gov-west-1", - "us-gov-east-1" + "us-gov-east-1", + "us-gov-west-1" ] } }, @@ -3244,17 +3298,19 @@ "ap-south-1", "ap-southeast-1", "ap-southeast-3", + "eu-central-2", "eu-west-1", "us-east-1", "us-east-2", - "af-south-1", "ap-northeast-1", - "ap-northeast-3", "ap-southeast-2", "eu-central-1", "eu-north-1", + "eu-south-2", "me-south-1", "sa-east-1", + "af-south-1", + "ap-northeast-3", "ca-central-1", "eu-south-1", "eu-west-2", @@ -3268,8 +3324,8 @@ "cn-northwest-1" ], "gov": [ - "us-gov-west-1", - "us-gov-east-1" + "us-gov-east-1", + "us-gov-west-1" ] } }, @@ -3311,21 +3367,22 @@ "lambda": { "regions": { "aws": [ - "ap-northeast-2", "ap-south-1", "ap-southeast-1", "ap-southeast-2", "ap-southeast-3", + "eu-south-2", "eu-west-2", "me-central-1", "me-south-1", "us-east-1", "ap-east-1", "ap-northeast-1", + "ap-northeast-2", + "eu-central-2", "eu-north-1", "eu-south-1", "eu-west-3", - "sa-east-1", "us-east-2", "us-west-2", "af-south-1", @@ -3333,6 +3390,7 @@ "ca-central-1", "eu-central-1", "eu-west-1", + "sa-east-1", "us-west-1" ], "cn": [ @@ -3483,13 +3541,18 @@ "m2": { "regions": { "aws": [ + "ap-northeast-1", + "ap-south-1", + "ap-southeast-1", "ap-southeast-2", - "ca-central-1", "eu-central-1", "eu-west-1", - "sa-east-1", + "eu-west-2", + "eu-west-3", "us-east-1", - "us-west-2" + "us-west-2", + "ca-central-1", + "sa-east-1" ], "cn": {}, "gov": {} @@ -3575,22 +3638,24 @@ "af-south-1", "ap-northeast-1", "ap-northeast-3", - "ap-southeast-1", + "eu-south-2", "me-central-1", "me-south-1", "us-west-1", "us-west-2", - "ap-east-1", "ap-northeast-2", + "ap-southeast-1", "ap-southeast-3", "ca-central-1", - "eu-central-1", + "eu-central-2", "eu-west-1", "sa-east-1", "us-east-1", "us-east-2", + "ap-east-1", "ap-south-1", "ap-southeast-2", + "eu-central-1", "eu-north-1", "eu-south-1", "eu-west-2", @@ -3767,6 +3832,35 @@ "gov": {} } }, + "memorydb": { + "regions": { + "aws": [ + "ap-northeast-1", + "ap-southeast-1", + "ap-southeast-2", + "eu-central-1", + "eu-west-1", + "eu-west-3", + "us-west-1", + "us-west-2", + "ap-east-1", + "ap-northeast-2", + "ap-south-1", + "ca-central-1", + "eu-north-1", + "eu-south-1", + "eu-west-2", + "sa-east-1", + "us-east-1", + "us-east-2" + ], + "cn": [ + "cn-north-1", + "cn-northwest-1" + ], + "gov": {} + } + }, "mgh": { "regions": { "aws": [ @@ -3912,7 +4006,7 @@ "ap-northeast-3", "ap-southeast-1", "ap-southeast-2", - "ap-southeast-3", + "eu-west-2", "eu-west-3", "me-south-1", "us-east-2", @@ -3921,12 +4015,11 @@ "ap-northeast-2", "ap-south-1", "ca-central-1", + "eu-central-1", "eu-north-1", "eu-south-1", "eu-west-1", - "eu-west-2", "us-east-1", - "eu-central-1", "sa-east-1", "us-west-2" ], @@ -4011,24 +4104,26 @@ "organizations": { "regions": { "aws": [ - "ap-northeast-3", "ap-south-1", "ap-southeast-2", "ap-southeast-3", "ca-central-1", "eu-central-1", "eu-south-1", + "eu-south-2", "me-south-1", "us-west-1", - "ap-northeast-1", "ap-northeast-2", + "ap-northeast-3", "ap-southeast-1", + "eu-central-2", "eu-north-1", "eu-west-2", "us-east-1", "us-east-2", "af-south-1", "ap-east-1", + "ap-northeast-1", "eu-west-1", "eu-west-3", "me-central-1", @@ -4113,6 +4208,7 @@ "ap-southeast-2", "ap-southeast-3", "eu-central-1", + "eu-central-2", "eu-south-1", "eu-west-3", "me-central-1", @@ -4122,6 +4218,7 @@ "ap-northeast-1", "ap-south-1", "eu-north-1", + "eu-south-2", "eu-west-1", "eu-west-2", "us-west-2" @@ -4205,16 +4302,18 @@ "ap-south-1", "ap-southeast-1", "ca-central-1", + "eu-central-2", "eu-south-1", - "eu-west-1", + "eu-south-2", "eu-west-2", - "us-east-1", "us-east-2", "us-west-1", "af-south-1", "ap-northeast-1", "eu-north-1", - "me-central-1" + "eu-west-1", + "me-central-1", + "us-east-1" ], "cn": [ "cn-north-1", @@ -4230,10 +4329,16 @@ "regions": { "aws": [ "ap-northeast-1", + "ap-northeast-2", + "ap-southeast-1", + "ca-central-1", + "eu-central-1", "eu-west-1", + "eu-west-2", "us-east-1", "us-east-2", - "us-west-2" + "us-west-2", + "ap-southeast-2" ], "cn": {}, "gov": {} @@ -4326,12 +4431,12 @@ "ap-southeast-1", "ap-southeast-3", "ca-central-1", - "eu-south-1", + "eu-central-2", "sa-east-1", "us-east-1", "us-east-2", "af-south-1", - "ap-northeast-3", + "eu-south-1", "eu-west-1", "eu-west-3", "me-central-1", @@ -4339,10 +4444,12 @@ "us-west-1", "us-west-2", "ap-northeast-1", + "ap-northeast-3", "ap-south-1", "ap-southeast-2", "eu-central-1", "eu-north-1", + "eu-south-2", "eu-west-2" ], "cn": [ @@ -4370,7 +4477,7 @@ "af-south-1", "ap-east-1", "ap-south-1", - "ap-southeast-2", + "eu-south-2", "eu-west-2", "me-south-1", "us-east-2", @@ -4378,17 +4485,19 @@ "ap-northeast-1", "ap-northeast-2", "ap-southeast-1", + "ap-southeast-2", "ap-southeast-3", - "eu-north-1", + "eu-central-2", "eu-west-1", "eu-west-3", "me-central-1", - "sa-east-1", "us-east-1", "ap-northeast-3", "ca-central-1", "eu-central-1", + "eu-north-1", "eu-south-1", + "sa-east-1", "us-west-1" ], "cn": [ @@ -4502,26 +4611,28 @@ "route53": { "regions": { "aws": [ - "af-south-1", "ap-east-1", "ap-northeast-3", "ap-south-1", "eu-central-1", + "eu-central-2", "eu-west-1", "eu-west-2", "sa-east-1", "us-west-1", + "af-south-1", "ap-northeast-2", "ap-southeast-1", "ap-southeast-2", "ap-southeast-3", - "ca-central-1", "eu-north-1", "eu-south-1", + "eu-south-2", "eu-west-3", "me-central-1", - "me-south-1", "ap-northeast-1", + "ca-central-1", + "me-south-1", "us-east-1", "us-east-2", "us-west-2" @@ -4550,14 +4661,16 @@ "ap-southeast-1", "ap-southeast-2", "ap-southeast-3", + "eu-south-2", "us-east-1", - "us-east-2", "af-south-1", "ca-central-1", + "eu-central-2", "eu-north-1", "eu-south-1", "eu-west-1", "me-south-1", + "us-east-2", "us-west-2" ], "cn": [ @@ -4612,23 +4725,25 @@ "ap-east-1", "ap-northeast-3", "ap-southeast-1", - "ap-southeast-3", + "eu-central-2", "eu-west-3", "me-south-1", "us-east-1", - "ap-northeast-2", "ap-south-1", "ap-southeast-2", + "ap-southeast-3", "eu-central-1", "eu-north-1", + "eu-south-2", "eu-west-1", - "eu-west-2", "me-central-1", "us-east-2", "us-west-2", "ap-northeast-1", + "ap-northeast-2", "ca-central-1", "eu-south-1", + "eu-west-2", "sa-east-1", "us-west-1" ], @@ -4798,14 +4913,15 @@ "ap-northeast-2", "ap-south-1", "ap-southeast-2", + "ap-southeast-3", "eu-north-1", "eu-south-1", "eu-west-1", "me-south-1", - "us-east-1", "us-east-2", "us-west-1", - "ca-central-1" + "ca-central-1", + "us-east-1" ], "cn": {}, "gov": [ @@ -4956,21 +5072,23 @@ "ap-northeast-2", "ap-southeast-1", "ap-southeast-2", - "ap-southeast-3", "eu-central-1", + "eu-central-2", "eu-west-3", "me-central-1", "me-south-1", - "af-south-1", - "ap-northeast-3", "ap-south-1", + "ap-southeast-3", "eu-north-1", "eu-south-1", + "eu-south-2", "eu-west-2", "sa-east-1", "us-east-1", "us-west-1", + "af-south-1", "ap-northeast-1", + "ap-northeast-3", "ca-central-1", "eu-west-1", "us-east-2", @@ -4999,16 +5117,18 @@ "us-east-2", "us-west-1", "ap-northeast-1", - "ap-northeast-3", "ap-south-1", "ca-central-1", - "eu-north-1", + "eu-central-2", + "eu-south-2", "eu-west-1", "eu-west-2", "me-central-1", "me-south-1", + "ap-northeast-3", "ap-southeast-2", "eu-central-1", + "eu-north-1", "eu-south-1", "sa-east-1", "us-west-2" @@ -5026,27 +5146,29 @@ "ssm": { "regions": { "aws": [ - "ap-east-1", "ap-northeast-2", "ap-southeast-2", + "eu-south-2", "eu-west-2", "me-central-1", "me-south-1", "sa-east-1", "us-east-2", "us-west-1", + "ap-east-1", "ap-northeast-3", "ap-southeast-1", "ca-central-1", "eu-central-1", "eu-north-1", - "eu-south-1", "us-east-1", "us-west-2", "af-south-1", "ap-northeast-1", "ap-south-1", "ap-southeast-3", + "eu-central-2", + "eu-south-1", "eu-west-1", "eu-west-3" ], @@ -5094,8 +5216,8 @@ "regions": { "aws": [ "ap-south-1", - "ca-central-1", "eu-central-1", + "eu-central-2", "eu-south-1", "eu-west-2", "eu-west-3", @@ -5104,14 +5226,16 @@ "us-east-2", "us-west-2", "af-south-1", - "ap-northeast-1", "ap-northeast-2", "ap-southeast-1", "ap-southeast-2", + "ca-central-1", + "eu-south-2", "eu-west-1", "me-central-1", "us-east-1", "ap-east-1", + "ap-northeast-1", "ap-northeast-3", "ap-southeast-3", "eu-north-1", @@ -5132,26 +5256,27 @@ "aws": [ "ap-east-1", "ap-northeast-1", - "ap-southeast-1", "ap-southeast-3", "ca-central-1", "eu-west-1", "eu-west-3", + "me-central-1", "us-west-2", "af-south-1", "ap-northeast-2", "ap-northeast-3", + "ap-southeast-1", "ap-southeast-2", "eu-central-1", "eu-west-2", - "us-east-2", "us-west-1", "ap-south-1", "eu-north-1", "eu-south-1", "me-south-1", "sa-east-1", - "us-east-1" + "us-east-1", + "us-east-2" ], "cn": [ "cn-northwest-1", @@ -5192,27 +5317,29 @@ "aws": [ "ap-northeast-1", "ap-northeast-2", - "ap-northeast-3", "ca-central-1", + "eu-central-2", "eu-south-1", "sa-east-1", "us-east-2", "us-west-1", - "af-south-1", "ap-east-1", + "ap-northeast-3", "ap-south-1", "ap-southeast-1", "ap-southeast-2", "ap-southeast-3", + "eu-south-2", "me-central-1", "me-south-1", "us-east-1", - "us-west-2", + "af-south-1", "eu-central-1", "eu-north-1", "eu-west-1", "eu-west-2", - "eu-west-3" + "eu-west-3", + "us-west-2" ], "cn": [ "cn-north-1", @@ -5236,15 +5363,17 @@ "eu-central-1", "eu-south-1", "sa-east-1", - "af-south-1", "ap-east-1", "ap-southeast-2", + "eu-central-2", "eu-north-1", "eu-west-2", "me-south-1", "us-east-2", "us-west-1", + "af-south-1", "ap-northeast-2", + "eu-south-2", "eu-west-1", "eu-west-3", "me-central-1", @@ -5297,7 +5426,9 @@ "us-west-2" ], "cn": {}, - "gov": {} + "gov": [ + "us-gov-west-1" + ] } }, "transcribe": { @@ -5366,20 +5497,21 @@ "ap-south-1", "ap-southeast-1", "ap-southeast-2", + "ap-southeast-3", "eu-central-1", "sa-east-1", - "us-east-1", "us-east-2", "us-west-1", "ap-northeast-2", "ap-northeast-3", - "ca-central-1", "eu-north-1", "eu-west-2", "eu-west-3", "me-south-1", + "us-east-1", "us-west-2", "ap-northeast-1", + "ca-central-1", "eu-south-1", "eu-west-1" ], @@ -5460,9 +5592,9 @@ "aws": [ "ap-south-1", "ap-southeast-1", - "ca-central-1", "eu-central-1", "eu-north-1", + "eu-south-2", "eu-west-1", "eu-west-3", "me-south-1", @@ -5470,13 +5602,15 @@ "ap-east-1", "ap-northeast-1", "ap-northeast-2", - "ap-southeast-2", "ap-southeast-3", + "ca-central-1", + "eu-central-2", "eu-south-1", - "eu-west-2", "us-west-1", "af-south-1", "ap-northeast-3", + "ap-southeast-2", + "eu-west-2", "sa-east-1", "us-east-2", "us-west-2" @@ -5534,14 +5668,16 @@ "eu-south-1", "us-east-1", "us-west-1", - "ap-northeast-1", "ap-northeast-3", - "ca-central-1", "eu-central-1", + "eu-central-2", + "eu-south-2", "eu-west-3", "us-east-2", "us-west-2", + "ap-northeast-1", "ap-northeast-2", + "ca-central-1", "eu-west-1", "eu-west-2", "me-central-1", @@ -5563,10 +5699,10 @@ "aws": [ "af-south-1", "ap-southeast-2", - "ap-southeast-3", "eu-central-1", "eu-north-1", "eu-south-1", + "eu-south-2", "eu-west-3", "me-south-1", "us-west-2", @@ -5576,12 +5712,14 @@ "ap-northeast-3", "ap-south-1", "ap-southeast-1", + "ap-southeast-3", "eu-west-2", - "sa-east-1", "us-east-2", "ca-central-1", + "eu-central-2", "eu-west-1", "me-central-1", + "sa-east-1", "us-east-1", "us-west-1" ], @@ -5741,17 +5879,17 @@ "xray": { "regions": { "aws": [ - "ap-east-1", "ap-southeast-1", "eu-central-1", + "eu-central-2", "eu-west-2", "eu-west-3", "us-east-1", "us-east-2", "us-west-1", + "ap-east-1", "ap-northeast-1", "ap-northeast-2", - "ap-south-1", "ap-southeast-2", "ap-southeast-3", "ca-central-1", @@ -5760,7 +5898,9 @@ "me-central-1", "af-south-1", "ap-northeast-3", + "ap-south-1", "eu-north-1", + "eu-south-2", "me-south-1", "sa-east-1", "us-west-2" diff --git a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py b/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py index c9ce9080..a86daf78 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py +++ b/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py @@ -134,7 +134,7 @@ class Test_cloudtrail_cloudwatch_logging_enabled: check = cloudtrail_cloudwatch_logging_enabled() result = check.execute() # len of result should be 24 -> (1 multiregion entry per region + 1 entry because of single region trail) - assert len(result) == 24 + assert len(result) == 26 for report in result: if report.resource_id == trail_name_us: assert report.resource_id == trail_name_us diff --git a/providers/aws/services/cloudtrail/cloudtrail_service_test.py b/providers/aws/services/cloudtrail/cloudtrail_service_test.py index 5718439c..263e3027 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_service_test.py +++ b/providers/aws/services/cloudtrail/cloudtrail_service_test.py @@ -84,7 +84,7 @@ class Test_Cloudtrail_Service: audit_info = self.set_mocked_audit_info() cloudtrail = Cloudtrail(audit_info) # 1 None result per region plus 2 created - assert len(cloudtrail.trails) == 23 + assert len(cloudtrail.trails) == 25 for trail in cloudtrail.trails: if trail.name: assert trail.name == trail_name_us or trail.name == trail_name_eu @@ -130,7 +130,7 @@ class Test_Cloudtrail_Service: audit_info = self.set_mocked_audit_info() cloudtrail = Cloudtrail(audit_info) # 1 None result per region plus 2 created - assert len(cloudtrail.trails) == 23 + assert len(cloudtrail.trails) == 25 for trail in cloudtrail.trails: if trail.name: if trail.name == trail_name_us: @@ -172,7 +172,7 @@ class Test_Cloudtrail_Service: audit_info = self.set_mocked_audit_info() cloudtrail = Cloudtrail(audit_info) # 1 None result per region plus 2 created - assert len(cloudtrail.trails) == 23 + assert len(cloudtrail.trails) == 25 for trail in cloudtrail.trails: if trail.name: if trail.name == trail_name_us: diff --git a/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py b/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py index c8e92838..a5d7c4c9 100644 --- a/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py +++ b/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py @@ -27,7 +27,7 @@ class Test_config_recorder_all_regions_enabled: result = check.execute() assert ( - len(result) == 23 + len(result) == 25 ) # One fail result per region, since there are no recorders assert result[0].status == "FAIL" @@ -55,7 +55,7 @@ class Test_config_recorder_all_regions_enabled: check = config_recorder_all_regions_enabled() result = check.execute() - assert len(result) == 23 + assert len(result) == 25 # Search for the recorder just created for recorder in result: if recorder.resource_id: @@ -95,7 +95,7 @@ class Test_config_recorder_all_regions_enabled: check = config_recorder_all_regions_enabled() result = check.execute() - assert len(result) == 23 + assert len(result) == 25 # Search for the recorder just created for recorder in result: if recorder.resource_id: diff --git a/providers/aws/services/config/config_service_test.py b/providers/aws/services/config/config_service_test.py index aa82420b..c47c7b91 100644 --- a/providers/aws/services/config/config_service_test.py +++ b/providers/aws/services/config/config_service_test.py @@ -81,7 +81,7 @@ class Test_Config_Service: audit_info = self.set_mocked_audit_info() config = Config(audit_info) # One recorder per region - assert len(config.recorders) == 23 + assert len(config.recorders) == 25 # Check the active one # Search for the recorder just created for recorder in config.recorders: diff --git a/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py b/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py index 5eb4c68e..f8ab2322 100644 --- a/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py +++ b/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py @@ -33,7 +33,7 @@ class Test_ec2_ebs_default_encryption: results = check.execute() # One result per region - assert len(results) == 23 + assert len(results) == 25 for result in results: if result.region == AWS_REGION: assert result.status == "PASS" @@ -63,7 +63,7 @@ class Test_ec2_ebs_default_encryption: result = check.execute() # One result per region - assert len(result) == 23 + assert len(result) == 25 assert result[0].status == "FAIL" assert search( "EBS Default Encryption is not activated", diff --git a/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py b/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py index cf01116a..c1f23d6a 100644 --- a/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py +++ b/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py @@ -28,7 +28,7 @@ class Test_ec2_ebs_public_snapshot: result = check.execute() # Default snapshots - assert len(result) == 1345 + assert len(result) == 1433 @mock_ec2 def test_ec2_public_snapshot(self): @@ -61,7 +61,7 @@ class Test_ec2_ebs_public_snapshot: results = check.execute() # Default snapshots + 1 created - assert len(results) == 1346 + assert len(results) == 1434 for snap in results: if snap.resource_id == snapshot.id: @@ -97,7 +97,7 @@ class Test_ec2_ebs_public_snapshot: results = check.execute() # Default snapshots + 1 created - assert len(results) == 1346 + assert len(results) == 1434 for snap in results: if snap.resource_id == snapshot.id: diff --git a/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py b/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py index 54c6ae13..d7e95a9b 100644 --- a/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py +++ b/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py @@ -28,7 +28,7 @@ class Test_ec2_ebs_snapshots_encrypted: result = check.execute() # Default snapshots - assert len(result) == 1345 + assert len(result) == 1433 @mock_ec2 def test_ec2_unencrypted_snapshot(self): @@ -55,7 +55,7 @@ class Test_ec2_ebs_snapshots_encrypted: results = check.execute() # Default snapshots + 1 created - assert len(results) == 1346 + assert len(results) == 1434 for snap in results: if snap.resource_id == snapshot.id: @@ -91,7 +91,7 @@ class Test_ec2_ebs_snapshots_encrypted: results = check.execute() # Default snapshots + 1 created - assert len(results) == 1346 + assert len(results) == 1434 for snap in results: if snap.resource_id == snapshot.id: diff --git a/providers/aws/services/ec2/ec2_network_acls_allow_ingress_any_port/ec2_network_acls_allow_ingress_any_port_test.py b/providers/aws/services/ec2/ec2_network_acls_allow_ingress_any_port/ec2_network_acls_allow_ingress_any_port_test.py index 45ffdbf0..4b3b18d8 100644 --- a/providers/aws/services/ec2/ec2_network_acls_allow_ingress_any_port/ec2_network_acls_allow_ingress_any_port_test.py +++ b/providers/aws/services/ec2/ec2_network_acls_allow_ingress_any_port/ec2_network_acls_allow_ingress_any_port_test.py @@ -28,7 +28,7 @@ class Test_ec2_network_acls_allow_ingress_any_port: result = check.execute() # One default nacl per region - assert len(result) == 23 + assert len(result) == 25 @mock_ec2 def test_ec2_non_default_compliant_nacl(self): @@ -51,7 +51,7 @@ class Test_ec2_network_acls_allow_ingress_any_port: result = check.execute() # One default sg per region - assert len(result) == 23 + assert len(result) == 25 # by default nacls are public assert result[0].status == "FAIL" @@ -95,7 +95,7 @@ class Test_ec2_network_acls_allow_ingress_any_port: result = check.execute() # One default sg per region + default of new VPC + new NACL - assert len(result) == 25 + assert len(result) == 27 # Search changed sg for nacl in result: if nacl.resource_id == nacl_id: @@ -140,7 +140,7 @@ class Test_ec2_network_acls_allow_ingress_any_port: result = check.execute() # One default sg per region + default of new VPC + new NACL - assert len(result) == 25 + assert len(result) == 27 # Search changed sg for nacl in result: if nacl.resource_id == nacl_id: diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py b/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py index 0ac06b8b..f7ab0cd3 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py +++ b/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py @@ -28,7 +28,7 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_22: result = check.execute() # One default nacl per region - assert len(result) == 23 + assert len(result) == 25 @mock_ec2 def test_ec2_non_default_compliant_nacl(self): @@ -51,7 +51,7 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_22: result = check.execute() # One default sg per region - assert len(result) == 23 + assert len(result) == 25 # by default nacls are public assert result[0].status == "FAIL" @@ -96,7 +96,7 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_22: result = check.execute() # One default sg per region + default of new VPC + new NACL - assert len(result) == 25 + assert len(result) == 27 # Search changed sg for nacl in result: if nacl.resource_id == nacl_id: @@ -142,7 +142,7 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_22: result = check.execute() # One default sg per region + default of new VPC + new NACL - assert len(result) == 25 + assert len(result) == 27 # Search changed sg for nacl in result: if nacl.resource_id == nacl_id: diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py b/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py index 0d3c5e65..b732c752 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py +++ b/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py @@ -28,7 +28,7 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_3389: result = check.execute() # One default nacl per region - assert len(result) == 23 + assert len(result) == 25 @mock_ec2 def test_ec2_non_default_compliant_nacl(self): @@ -51,7 +51,7 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_3389: result = check.execute() # One default sg per region - assert len(result) == 23 + assert len(result) == 25 # by default nacls are public assert result[0].status == "FAIL" @@ -96,7 +96,7 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_3389: result = check.execute() # One default sg per region + default of new VPC + new NACL - assert len(result) == 25 + assert len(result) == 27 # Search changed sg for nacl in result: if nacl.resource_id == nacl_id: @@ -142,7 +142,7 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_3389: result = check.execute() # One default sg per region + default of new VPC + new NACL - assert len(result) == 25 + assert len(result) == 27 # Search changed sg for nacl in result: if nacl.resource_id == nacl_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py index e05b4ba7..60b10952 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py @@ -32,7 +32,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_any_port: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -72,7 +72,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_any_port: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -118,7 +118,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_any_port: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py index 164197b0..22122903 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py @@ -34,7 +34,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_2 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -78,7 +78,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_2 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -128,7 +128,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_2 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py index 321a3187..4e93b7a5 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py @@ -34,7 +34,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -78,7 +78,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -128,7 +128,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py index 8e27f0a0..86258195 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py @@ -32,7 +32,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -74,7 +74,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -122,7 +122,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py index a4f39ce0..13e2eaac 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py @@ -32,7 +32,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -74,7 +74,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -122,7 +122,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py index 912465eb..08a3a654 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py @@ -34,7 +34,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -78,7 +78,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -128,7 +128,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py index 9b896f3f..704d8c69 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py @@ -34,7 +34,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsear result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -78,7 +78,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsear result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -128,7 +128,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsear result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py index 9280649b..ccb82eee 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py @@ -34,7 +34,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -78,7 +78,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -127,7 +127,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py index 7daaa3dd..3bb2f68b 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py @@ -34,7 +34,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_1 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -78,7 +78,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_1 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -128,7 +128,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_1 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py index b053d483..68c41ba1 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py @@ -34,7 +34,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -78,7 +78,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -128,7 +128,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py index 1f812d68..775ac1eb 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py @@ -34,7 +34,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -78,7 +78,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -128,7 +128,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py index e21c725c..8a14347b 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py @@ -34,7 +34,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_54 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -78,7 +78,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_54 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -128,7 +128,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_54 result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py index bdd7434b..7d1998b2 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py @@ -34,7 +34,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -78,7 +78,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -127,7 +127,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py index e3db7564..63e333ba 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py @@ -34,7 +34,7 @@ class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_ result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -78,7 +78,7 @@ class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_ result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -128,7 +128,7 @@ class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_ result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py index 295a9a96..37074927 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py @@ -34,7 +34,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -78,7 +78,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -127,7 +127,7 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py b/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py index 4bf3805f..57448c93 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py @@ -32,7 +32,7 @@ class Test_ec2_securitygroup_allow_wide_open_public_ipv4: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -72,7 +72,7 @@ class Test_ec2_securitygroup_allow_wide_open_public_ipv4: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -118,7 +118,7 @@ class Test_ec2_securitygroup_allow_wide_open_public_ipv4: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py b/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py index e9f328ed..7e8e33c5 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py @@ -31,7 +31,7 @@ class Test_ec2_securitygroup_default_restrict_traffic: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -66,7 +66,7 @@ class Test_ec2_securitygroup_default_restrict_traffic: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -109,7 +109,7 @@ class Test_ec2_securitygroup_default_restrict_traffic: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py b/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py index 76bbeb7a..0a88ec48 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py @@ -33,7 +33,7 @@ class Test_ec2_securitygroup_from_launch_wizard: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -64,7 +64,7 @@ class Test_ec2_securitygroup_from_launch_wizard: result = check.execute() # One default sg per region + created one - assert len(result) == 25 + assert len(result) == 27 # Search changed sg for sg in result: if sg.resource_id == sg_id: @@ -110,7 +110,7 @@ class Test_ec2_securitygroup_from_launch_wizard: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py b/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py index 63e01d15..b4d56ba5 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py @@ -33,7 +33,7 @@ class Test_ec2_securitygroup_in_use_without_ingress_filtering: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -73,7 +73,7 @@ class Test_ec2_securitygroup_in_use_without_ingress_filtering: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -127,7 +127,7 @@ class Test_ec2_securitygroup_in_use_without_ingress_filtering: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -164,7 +164,7 @@ class Test_ec2_securitygroup_in_use_without_ingress_filtering: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py b/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py index 0a9d5163..056c6f6d 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py @@ -33,7 +33,7 @@ class Test_ec2_securitygroup_not_used: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are unused by default assert result[0].status == "FAIL" @@ -64,7 +64,7 @@ class Test_ec2_securitygroup_not_used: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -110,7 +110,7 @@ class Test_ec2_securitygroup_not_used: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py b/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py index f9492cc4..4cda309a 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py +++ b/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py @@ -32,7 +32,7 @@ class Test_ec2_securitygroup_with_many_ingress_egress_rules: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # All are compliant by default assert result[0].status == "PASS" @@ -75,7 +75,7 @@ class Test_ec2_securitygroup_with_many_ingress_egress_rules: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: @@ -122,7 +122,7 @@ class Test_ec2_securitygroup_with_many_ingress_egress_rules: result = check.execute() # One default sg per region - assert len(result) == 24 + assert len(result) == 26 # Search changed sg for sg in result: if sg.resource_id == default_sg_id: diff --git a/providers/aws/services/ec2/ec2_service_test.py b/providers/aws/services/ec2/ec2_service_test.py index 9abc6f18..591edb07 100644 --- a/providers/aws/services/ec2/ec2_service_test.py +++ b/providers/aws/services/ec2/ec2_service_test.py @@ -195,7 +195,7 @@ class Test_EC2_Service: ec2 = EC2(audit_info) # One result per region - assert len(ec2.ebs_encryption_by_default) == 23 + assert len(ec2.ebs_encryption_by_default) == 25 for result in ec2.ebs_encryption_by_default: if result.region == AWS_REGION: assert result.status diff --git a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py b/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py index 2a4998b3..2a5bab29 100644 --- a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py +++ b/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py @@ -53,7 +53,7 @@ class Test_vpc_endpoint_services_allowed_principals_trust_boundaries: check = vpc_endpoint_services_allowed_principals_trust_boundaries() result = check.execute() - assert len(result) == 23 # one endpoint per region + assert len(result) == 25 # one endpoint per region @mock_ec2 @mock_elbv2 @@ -100,7 +100,7 @@ class Test_vpc_endpoint_services_allowed_principals_trust_boundaries: check = vpc_endpoint_services_allowed_principals_trust_boundaries() result = check.execute() - assert len(result) == 23 # one per region + assert len(result) == 25 # one per region assert result[0].status == "PASS" assert ( result[0].status_extended diff --git a/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py b/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py index f6f15c13..e602c5f2 100644 --- a/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py +++ b/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py @@ -28,7 +28,7 @@ class Test_vpc_flow_logs_enabled: result = check.execute() assert ( - len(result) == 23 + len(result) == 25 ) # Number of AWS regions, one default VPC per region @mock_ec2 diff --git a/providers/aws/services/vpc/vpc_service_test.py b/providers/aws/services/vpc/vpc_service_test.py index 671321ec..e4411595 100644 --- a/providers/aws/services/vpc/vpc_service_test.py +++ b/providers/aws/services/vpc/vpc_service_test.py @@ -76,7 +76,7 @@ class Test_VPC_Service: audit_info = self.set_mocked_audit_info() vpc = VPC(audit_info) assert ( - len(vpc.vpcs) == 24 + len(vpc.vpcs) == 26 ) # Number of AWS regions + created VPC, one default VPC per region # Test VPC Describe Flow Logs