mirror of
https://github.com/ghndrx/prowler.git
synced 2026-02-10 14:55:00 +00:00
fix(inspector2): fix active findings count (#2395)
This commit is contained in:
@@ -15,16 +15,21 @@ class inspector2_findings_exist(Check):
|
|||||||
report.resource_arn = ""
|
report.resource_arn = ""
|
||||||
report.region = inspector.region
|
report.region = inspector.region
|
||||||
if inspector.status == "ENABLED":
|
if inspector.status == "ENABLED":
|
||||||
|
active_findings = 0
|
||||||
report.status = "PASS"
|
report.status = "PASS"
|
||||||
report.status_extended = "Inspector2 is enabled with no findings"
|
report.status_extended = "Inspector2 is enabled with no findings"
|
||||||
for finding in inspector.findings:
|
for finding in inspector.findings:
|
||||||
|
if finding.status == "ACTIVE":
|
||||||
|
active_findings += 1
|
||||||
|
if len(inspector.findings) > 0:
|
||||||
report.status_extended = (
|
report.status_extended = (
|
||||||
"Inspector2 is enabled with no active findings"
|
"Inspector2 is enabled with no active findings"
|
||||||
)
|
)
|
||||||
if finding.status == "ACTIVE":
|
if active_findings > 0:
|
||||||
report.status = "FAIL"
|
report.status = "FAIL"
|
||||||
report.status_extended = f"There are {str(len(inspector.findings))} ACTIVE Inspector2 findings."
|
report.status_extended = (
|
||||||
break
|
f"There are {active_findings} ACTIVE Inspector2 findings."
|
||||||
|
)
|
||||||
|
|
||||||
findings.append(report)
|
findings.append(report)
|
||||||
|
|
||||||
|
|||||||
@@ -48,7 +48,7 @@ class Inspector2:
|
|||||||
][0]
|
][0]
|
||||||
self.inspectors.append(
|
self.inspectors.append(
|
||||||
Inspector(
|
Inspector(
|
||||||
id="Inspector2",
|
id=self.audited_account,
|
||||||
status=batch_get_account_status.get("state").get("status"),
|
status=batch_get_account_status.get("state").get("status"),
|
||||||
region=regional_client.region,
|
region=regional_client.region,
|
||||||
)
|
)
|
||||||
|
|||||||
@@ -19,7 +19,7 @@ class Test_inspector2_findings_exist:
|
|||||||
inspector2_client.region = AWS_REGION
|
inspector2_client.region = AWS_REGION
|
||||||
inspector2_client.inspectors = [
|
inspector2_client.inspectors = [
|
||||||
Inspector(
|
Inspector(
|
||||||
id="Inspector2", status="DISABLED", region=AWS_REGION, findings=[]
|
id=AWS_ACCOUNT_ID, status="DISABLED", region=AWS_REGION, findings=[]
|
||||||
)
|
)
|
||||||
]
|
]
|
||||||
with mock.patch(
|
with mock.patch(
|
||||||
@@ -37,7 +37,7 @@ class Test_inspector2_findings_exist:
|
|||||||
assert len(result) == 1
|
assert len(result) == 1
|
||||||
assert result[0].status == "FAIL"
|
assert result[0].status == "FAIL"
|
||||||
assert result[0].status_extended == "Inspector2 is not enabled."
|
assert result[0].status_extended == "Inspector2 is not enabled."
|
||||||
assert result[0].resource_id == "Inspector2"
|
assert result[0].resource_id == AWS_ACCOUNT_ID
|
||||||
assert result[0].resource_arn == ""
|
assert result[0].resource_arn == ""
|
||||||
assert result[0].region == AWS_REGION
|
assert result[0].region == AWS_REGION
|
||||||
|
|
||||||
@@ -46,7 +46,9 @@ class Test_inspector2_findings_exist:
|
|||||||
inspector2_client = mock.MagicMock
|
inspector2_client = mock.MagicMock
|
||||||
inspector2_client.region = AWS_REGION
|
inspector2_client.region = AWS_REGION
|
||||||
inspector2_client.inspectors = [
|
inspector2_client.inspectors = [
|
||||||
Inspector(id="Inspector2", status="ENABLED", region=AWS_REGION, findings=[])
|
Inspector(
|
||||||
|
id=AWS_ACCOUNT_ID, status="ENABLED", region=AWS_REGION, findings=[]
|
||||||
|
)
|
||||||
]
|
]
|
||||||
with mock.patch(
|
with mock.patch(
|
||||||
"prowler.providers.aws.services.inspector2.inspector2_service.Inspector2",
|
"prowler.providers.aws.services.inspector2.inspector2_service.Inspector2",
|
||||||
@@ -63,7 +65,7 @@ class Test_inspector2_findings_exist:
|
|||||||
assert len(result) == 1
|
assert len(result) == 1
|
||||||
assert result[0].status == "PASS"
|
assert result[0].status == "PASS"
|
||||||
assert result[0].status_extended == "Inspector2 is enabled with no findings"
|
assert result[0].status_extended == "Inspector2 is enabled with no findings"
|
||||||
assert result[0].resource_id == "Inspector2"
|
assert result[0].resource_id == AWS_ACCOUNT_ID
|
||||||
assert result[0].resource_arn == ""
|
assert result[0].resource_arn == ""
|
||||||
assert result[0].region == AWS_REGION
|
assert result[0].region == AWS_REGION
|
||||||
|
|
||||||
@@ -73,7 +75,7 @@ class Test_inspector2_findings_exist:
|
|||||||
inspector2_client.region = AWS_REGION
|
inspector2_client.region = AWS_REGION
|
||||||
inspector2_client.inspectors = [
|
inspector2_client.inspectors = [
|
||||||
Inspector(
|
Inspector(
|
||||||
id="Inspector2",
|
id=AWS_ACCOUNT_ID,
|
||||||
region=AWS_REGION,
|
region=AWS_REGION,
|
||||||
status="ENABLED",
|
status="ENABLED",
|
||||||
findings=[
|
findings=[
|
||||||
@@ -106,7 +108,7 @@ class Test_inspector2_findings_exist:
|
|||||||
result[0].status_extended
|
result[0].status_extended
|
||||||
== "Inspector2 is enabled with no active findings"
|
== "Inspector2 is enabled with no active findings"
|
||||||
)
|
)
|
||||||
assert result[0].resource_id == "Inspector2"
|
assert result[0].resource_id == AWS_ACCOUNT_ID
|
||||||
assert result[0].resource_arn == ""
|
assert result[0].resource_arn == ""
|
||||||
assert result[0].region == AWS_REGION
|
assert result[0].region == AWS_REGION
|
||||||
|
|
||||||
@@ -116,7 +118,7 @@ class Test_inspector2_findings_exist:
|
|||||||
inspector2_client.region = AWS_REGION
|
inspector2_client.region = AWS_REGION
|
||||||
inspector2_client.inspectors = [
|
inspector2_client.inspectors = [
|
||||||
Inspector(
|
Inspector(
|
||||||
id="Inspector2",
|
id=AWS_ACCOUNT_ID,
|
||||||
region=AWS_REGION,
|
region=AWS_REGION,
|
||||||
status="ENABLED",
|
status="ENABLED",
|
||||||
findings=[
|
findings=[
|
||||||
@@ -148,6 +150,55 @@ class Test_inspector2_findings_exist:
|
|||||||
assert (
|
assert (
|
||||||
result[0].status_extended == "There are 1 ACTIVE Inspector2 findings."
|
result[0].status_extended == "There are 1 ACTIVE Inspector2 findings."
|
||||||
)
|
)
|
||||||
assert result[0].resource_id == "Inspector2"
|
assert result[0].resource_id == AWS_ACCOUNT_ID
|
||||||
|
assert result[0].resource_arn == ""
|
||||||
|
assert result[0].region == AWS_REGION
|
||||||
|
|
||||||
|
def test_enabled_with_active_and_closed_findings(self):
|
||||||
|
# Mock the inspector2 client
|
||||||
|
inspector2_client = mock.MagicMock
|
||||||
|
inspector2_client.region = AWS_REGION
|
||||||
|
inspector2_client.inspectors = [
|
||||||
|
Inspector(
|
||||||
|
id=AWS_ACCOUNT_ID,
|
||||||
|
region=AWS_REGION,
|
||||||
|
status="ENABLED",
|
||||||
|
findings=[
|
||||||
|
InspectorFinding(
|
||||||
|
arn=FINDING_ARN,
|
||||||
|
region=AWS_REGION,
|
||||||
|
severity="MEDIUM",
|
||||||
|
status="ACTIVE",
|
||||||
|
title="CVE-2022-40897 - setuptools",
|
||||||
|
),
|
||||||
|
InspectorFinding(
|
||||||
|
arn=FINDING_ARN,
|
||||||
|
region=AWS_REGION,
|
||||||
|
severity="MEDIUM",
|
||||||
|
status="CLOSED",
|
||||||
|
title="CVE-2022-27404 - freetype",
|
||||||
|
),
|
||||||
|
],
|
||||||
|
)
|
||||||
|
]
|
||||||
|
|
||||||
|
with mock.patch(
|
||||||
|
"prowler.providers.aws.services.inspector2.inspector2_service.Inspector2",
|
||||||
|
new=inspector2_client,
|
||||||
|
):
|
||||||
|
# Test Check
|
||||||
|
from prowler.providers.aws.services.inspector2.inspector2_findings_exist.inspector2_findings_exist import (
|
||||||
|
inspector2_findings_exist,
|
||||||
|
)
|
||||||
|
|
||||||
|
check = inspector2_findings_exist()
|
||||||
|
result = check.execute()
|
||||||
|
|
||||||
|
assert len(result) == 1
|
||||||
|
assert result[0].status == "FAIL"
|
||||||
|
assert (
|
||||||
|
result[0].status_extended == "There are 1 ACTIVE Inspector2 findings."
|
||||||
|
)
|
||||||
|
assert result[0].resource_id == AWS_ACCOUNT_ID
|
||||||
assert result[0].resource_arn == ""
|
assert result[0].resource_arn == ""
|
||||||
assert result[0].region == AWS_REGION
|
assert result[0].region == AWS_REGION
|
||||||
|
|||||||
@@ -23,7 +23,7 @@ def mock_make_api_call(self, operation_name, kwargs):
|
|||||||
return {
|
return {
|
||||||
"accounts": [
|
"accounts": [
|
||||||
{
|
{
|
||||||
"accountId": "string",
|
"accountId": AWS_ACCOUNT_ID,
|
||||||
"resourceState": {
|
"resourceState": {
|
||||||
"ec2": {
|
"ec2": {
|
||||||
"errorCode": "ALREADY_ENABLED",
|
"errorCode": "ALREADY_ENABLED",
|
||||||
@@ -81,7 +81,6 @@ def mock_generate_regional_clients(service, audit_info):
|
|||||||
new=mock_generate_regional_clients,
|
new=mock_generate_regional_clients,
|
||||||
)
|
)
|
||||||
class Test_Inspector2_Service:
|
class Test_Inspector2_Service:
|
||||||
|
|
||||||
# Mocked Audit Info
|
# Mocked Audit Info
|
||||||
def set_mocked_audit_info(self):
|
def set_mocked_audit_info(self):
|
||||||
audit_info = AWS_Audit_Info(
|
audit_info = AWS_Audit_Info(
|
||||||
@@ -91,7 +90,7 @@ class Test_Inspector2_Service:
|
|||||||
profile_name=None,
|
profile_name=None,
|
||||||
botocore_session=None,
|
botocore_session=None,
|
||||||
),
|
),
|
||||||
audited_account=None,
|
audited_account=AWS_ACCOUNT_ID,
|
||||||
audited_user_id=None,
|
audited_user_id=None,
|
||||||
audited_partition="aws",
|
audited_partition="aws",
|
||||||
audited_identity_arn=None,
|
audited_identity_arn=None,
|
||||||
@@ -107,33 +106,32 @@ class Test_Inspector2_Service:
|
|||||||
|
|
||||||
def test__get_client__(self):
|
def test__get_client__(self):
|
||||||
audit_info = self.set_mocked_audit_info()
|
audit_info = self.set_mocked_audit_info()
|
||||||
ssmincidents = Inspector2(audit_info)
|
inspector2 = Inspector2(audit_info)
|
||||||
assert (
|
assert (
|
||||||
ssmincidents.regional_clients[AWS_REGION].__class__.__name__ == "Inspector2"
|
inspector2.regional_clients[AWS_REGION].__class__.__name__ == "Inspector2"
|
||||||
)
|
)
|
||||||
|
|
||||||
def test__get_service__(self):
|
def test__get_service__(self):
|
||||||
audit_info = self.set_mocked_audit_info()
|
audit_info = self.set_mocked_audit_info()
|
||||||
ssmincidents = Inspector2(audit_info)
|
inspector2 = Inspector2(audit_info)
|
||||||
assert ssmincidents.service == "inspector2"
|
assert inspector2.service == "inspector2"
|
||||||
|
|
||||||
def test__batch_get_account_status__(self):
|
def test__batch_get_account_status__(self):
|
||||||
audit_info = self.set_mocked_audit_info()
|
audit_info = self.set_mocked_audit_info()
|
||||||
ssmincidents = Inspector2(audit_info)
|
inspector2 = Inspector2(audit_info)
|
||||||
assert len(ssmincidents.inspectors) == 1
|
assert len(inspector2.inspectors) == 1
|
||||||
assert ssmincidents.inspectors[0].id == "Inspector2"
|
assert inspector2.inspectors[0].id == AWS_ACCOUNT_ID
|
||||||
assert ssmincidents.inspectors[0].region == AWS_REGION
|
assert inspector2.inspectors[0].region == AWS_REGION
|
||||||
assert ssmincidents.inspectors[0].status == "ENABLED"
|
assert inspector2.inspectors[0].status == "ENABLED"
|
||||||
|
|
||||||
def test__list_findings__(self):
|
def test__list_findings__(self):
|
||||||
audit_info = self.set_mocked_audit_info()
|
audit_info = self.set_mocked_audit_info()
|
||||||
ssmincidents = Inspector2(audit_info)
|
inspector2 = Inspector2(audit_info)
|
||||||
assert len(ssmincidents.inspectors[0].findings) == 1
|
assert len(inspector2.inspectors[0].findings) == 1
|
||||||
assert ssmincidents.inspectors[0].findings[0].arn == FINDING_ARN
|
assert inspector2.inspectors[0].findings[0].arn == FINDING_ARN
|
||||||
assert ssmincidents.inspectors[0].findings[0].region == AWS_REGION
|
assert inspector2.inspectors[0].findings[0].region == AWS_REGION
|
||||||
assert ssmincidents.inspectors[0].findings[0].severity == "MEDIUM"
|
assert inspector2.inspectors[0].findings[0].severity == "MEDIUM"
|
||||||
assert ssmincidents.inspectors[0].findings[0].status == "ACTIVE"
|
assert inspector2.inspectors[0].findings[0].status == "ACTIVE"
|
||||||
assert (
|
assert (
|
||||||
ssmincidents.inspectors[0].findings[0].title
|
inspector2.inspectors[0].findings[0].title == "CVE-2022-40897 - setuptools"
|
||||||
== "CVE-2022-40897 - setuptools"
|
|
||||||
)
|
)
|
||||||
|
|||||||
Reference in New Issue
Block a user