mirror of
https://github.com/ghndrx/prowler.git
synced 2026-02-10 14:55:00 +00:00
fix(iam_inline_policy_no_administrative_privileges): set resource id as the entity name (#2820)
This commit is contained in:
@@ -10,7 +10,7 @@ class iam_inline_policy_no_administrative_privileges(Check):
|
||||
report = Check_Report_AWS(self.metadata())
|
||||
report.region = iam_client.region
|
||||
report.resource_arn = policy.arn
|
||||
report.resource_id = policy.name
|
||||
report.resource_id = policy.entity
|
||||
report.resource_tags = policy.tags
|
||||
report.status = "PASS"
|
||||
report.status_extended = f"{policy.type} policy {policy.name} for IAM identity {policy.arn} does not allow '*:*' administrative privileges."
|
||||
|
||||
@@ -398,6 +398,7 @@ class IAM(AWSService):
|
||||
Policy(
|
||||
name=policy,
|
||||
arn=user.arn,
|
||||
entity=user.name,
|
||||
type="Inline",
|
||||
attached=True,
|
||||
version_id="v1",
|
||||
@@ -438,6 +439,7 @@ class IAM(AWSService):
|
||||
Policy(
|
||||
name=policy,
|
||||
arn=group.arn,
|
||||
entity=group.name,
|
||||
type="Inline",
|
||||
attached=True,
|
||||
version_id="v1",
|
||||
@@ -478,6 +480,7 @@ class IAM(AWSService):
|
||||
Policy(
|
||||
name=policy,
|
||||
arn=role.arn,
|
||||
entity=role.name,
|
||||
type="Inline",
|
||||
attached=True,
|
||||
version_id="v1",
|
||||
@@ -536,6 +539,7 @@ class IAM(AWSService):
|
||||
Policy(
|
||||
name=policy["PolicyName"],
|
||||
arn=policy["Arn"],
|
||||
entity=policy["PolicyId"],
|
||||
version_id=policy["DefaultVersionId"],
|
||||
type="Custom" if scope == "Local" else "AWS",
|
||||
attached=True
|
||||
@@ -714,6 +718,7 @@ class Certificate(BaseModel):
|
||||
class Policy(BaseModel):
|
||||
name: str
|
||||
arn: str
|
||||
entity: str
|
||||
version_id: str
|
||||
type: str
|
||||
attached: bool
|
||||
|
||||
@@ -128,7 +128,7 @@ class Test_iam_inline_policy_no_administrative_privileges:
|
||||
assert len(results) == 1
|
||||
assert results[0].region == AWS_REGION
|
||||
assert results[0].resource_arn == group_arn
|
||||
assert results[0].resource_id == policy_name
|
||||
assert results[0].resource_id == group_name
|
||||
assert results[0].resource_tags == []
|
||||
assert results[0].status == "FAIL"
|
||||
assert (
|
||||
@@ -172,7 +172,7 @@ class Test_iam_inline_policy_no_administrative_privileges:
|
||||
assert len(results) == 1
|
||||
assert results[0].region == AWS_REGION
|
||||
assert results[0].resource_arn == group_arn
|
||||
assert results[0].resource_id == policy_name
|
||||
assert results[0].resource_id == group_name
|
||||
assert results[0].resource_tags == []
|
||||
assert results[0].status == "PASS"
|
||||
assert (
|
||||
@@ -316,7 +316,7 @@ class Test_iam_inline_policy_no_administrative_privileges:
|
||||
assert len(results) == 1
|
||||
assert results[0].region == AWS_REGION
|
||||
assert results[0].resource_arn == role_arn
|
||||
assert results[0].resource_id == policy_name
|
||||
assert results[0].resource_id == role_name
|
||||
assert results[0].resource_tags == []
|
||||
assert results[0].status == "FAIL"
|
||||
assert (
|
||||
@@ -363,7 +363,7 @@ class Test_iam_inline_policy_no_administrative_privileges:
|
||||
assert len(results) == 1
|
||||
assert results[0].region == AWS_REGION
|
||||
assert results[0].resource_arn == role_arn
|
||||
assert results[0].resource_id == policy_name
|
||||
assert results[0].resource_id == role_name
|
||||
assert results[0].resource_tags == []
|
||||
assert results[0].status == "PASS"
|
||||
assert (
|
||||
@@ -507,7 +507,7 @@ class Test_iam_inline_policy_no_administrative_privileges:
|
||||
assert len(results) == 1
|
||||
assert results[0].region == AWS_REGION
|
||||
assert results[0].resource_arn == user_arn
|
||||
assert results[0].resource_id == policy_name
|
||||
assert results[0].resource_id == user_name
|
||||
assert results[0].resource_tags == []
|
||||
assert results[0].status == "FAIL"
|
||||
assert (
|
||||
@@ -553,7 +553,7 @@ class Test_iam_inline_policy_no_administrative_privileges:
|
||||
assert len(results) == 1
|
||||
assert results[0].region == AWS_REGION
|
||||
assert results[0].resource_arn == user_arn
|
||||
assert results[0].resource_id == policy_name
|
||||
assert results[0].resource_id == user_name
|
||||
assert results[0].resource_tags == []
|
||||
assert results[0].status == "PASS"
|
||||
assert (
|
||||
|
||||
@@ -818,6 +818,7 @@ nTTxU4a7x1naFxzYXK1iQ1vMARKMjDb19QEJIEJKZlDK4uS7yMlf1nFS
|
||||
type="Inline",
|
||||
attached=True,
|
||||
document=INLINE_POLICY_NOT_ADMIN,
|
||||
entity=user_name,
|
||||
)
|
||||
|
||||
# Test IAM Group Inline Policy
|
||||
@@ -861,6 +862,7 @@ nTTxU4a7x1naFxzYXK1iQ1vMARKMjDb19QEJIEJKZlDK4uS7yMlf1nFS
|
||||
type="Inline",
|
||||
attached=True,
|
||||
document=INLINE_POLICY_NOT_ADMIN,
|
||||
entity=group_name,
|
||||
)
|
||||
|
||||
# Test IAM Role Inline Policy
|
||||
@@ -906,4 +908,5 @@ nTTxU4a7x1naFxzYXK1iQ1vMARKMjDb19QEJIEJKZlDK4uS7yMlf1nFS
|
||||
type="Inline",
|
||||
attached=True,
|
||||
document=INLINE_POLICY_NOT_ADMIN,
|
||||
entity=role_name,
|
||||
)
|
||||
|
||||
Reference in New Issue
Block a user