diff --git a/.github/ISSUE_TEMPLATE/bug_report.md b/.github/ISSUE_TEMPLATE/bug_report.md index edb3d410..c4aaef3c 100644 --- a/.github/ISSUE_TEMPLATE/bug_report.md +++ b/.github/ISSUE_TEMPLATE/bug_report.md @@ -15,30 +15,30 @@ PROTIP: record your screen and attach it as a gif to showcase the issue. - How to record and attach gif: https://bit.ly/2Mi8T6K --> -**What happened?** +**What happened?** A clear and concise description of what the bug is or what is not working as expected -**How to reproduce it** +**How to reproduce it** Steps to reproduce the behavior: 1. What command are you running? 2. Environment you have, like single account, multi-account, organizations, etc. 3. See error -**Expected behavior** +**Expected behavior** A clear and concise description of what you expected to happen. -**Screenshots or Logs** +**Screenshots or Logs** If applicable, add screenshots to help explain your problem. Also, you can add logs (anonymize them first!). Here a command that may help to share a log `bash -x ./prowler -options > debug.log 2>&1` then attach here `debug.log` -**From where are you running Prowler?** +**From where are you running Prowler?** Please, complete the following information: - - Resource: [e.g. EC2 instance, Fargate task, Docker container manually, EKS, Cloud9, CodeBuild, workstation, etc.) + - Resource: [e.g. EC2 instance, Fargate task, Docker container manually, EKS, Cloud9, CodeBuild, workstation, etc.) - OS: [e.g. Amazon Linux 2, Mac, Alpine, Windows, etc. ] - AWS-CLI Version [`aws --version`]: - Prowler Version [`./prowler -V`]: diff --git a/.github/pull_request_template.md b/.github/pull_request_template.md index 73692ae0..1c82e697 100644 --- a/.github/pull_request_template.md +++ b/.github/pull_request_template.md @@ -1,4 +1,4 @@ -### Context +### Context Please include relevant motivation and context for this PR. diff --git a/.github/workflows/build-lint-push-containers.yml b/.github/workflows/build-lint-push-containers.yml index 35ac697a..a734ecfa 100644 --- a/.github/workflows/build-lint-push-containers.yml +++ b/.github/workflows/build-lint-push-containers.yml @@ -7,7 +7,7 @@ on: paths-ignore: - '.github/**' - 'README.md' - + release: types: [published] diff --git a/.github/workflows/pull-request.yml b/.github/workflows/pull-request.yml index fe3a8f25..52ecb5c9 100644 --- a/.github/workflows/pull-request.yml +++ b/.github/workflows/pull-request.yml @@ -3,14 +3,13 @@ name: Lint & Test on: push: branches: - - 'prowler-3.0-dev' + - "prowler-3.0-dev" pull_request: branches: - - 'prowler-3.0-dev' + - "prowler-3.0-dev" jobs: build: - runs-on: ubuntu-latest strategy: matrix: @@ -36,7 +35,7 @@ jobs: pipenv run black --check . - name: Lint with pylint run: | - pipenv run pylint --disable=W,C,R,E -j 0 providers lib util config + pipenv run pylint --disable=W,C,R,E -j 0 -rn -sn prowler/ - name: Bandit run: | pipenv run bandit -q -lll -x '*_test.py,./contrib/' -r . @@ -48,4 +47,4 @@ jobs: pipenv run vulture --exclude "contrib" --min-confidence 100 . - name: Test with pytest run: | - pipenv run pytest -n auto + pipenv run pytest tests -n auto diff --git a/.github/workflows/refresh_aws_services_regions.yml b/.github/workflows/refresh_aws_services_regions.yml index 1d17c77b..243f1ba1 100644 --- a/.github/workflows/refresh_aws_services_regions.yml +++ b/.github/workflows/refresh_aws_services_regions.yml @@ -44,7 +44,7 @@ jobs: ### Description This PR updates the regions for AWS services. - + ### License By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license. diff --git a/.gitignore b/.gitignore index b7f67fa9..15936b9b 100644 --- a/.gitignore +++ b/.gitignore @@ -8,6 +8,9 @@ # Python code __pycache__ venv/ +build/ +dist/ +*.egg-info/ # Session Session.vim diff --git a/.pre-commit-config.yaml b/.pre-commit-config.yaml index ee56761c..7baa9ceb 100644 --- a/.pre-commit-config.yaml +++ b/.pre-commit-config.yaml @@ -57,12 +57,12 @@ repos: hooks: - id: pylint name: pylint - entry: bash -c 'pylint --disable=W,C,R,E -j 0 -rn -sn providers lib util config' + entry: bash -c 'pylint --disable=W,C,R,E -j 0 -rn -sn prowler/' language: system - id: pytest-check name: pytest-check - entry: bash -c 'pytest -n auto' + entry: bash -c 'pytest tests -n auto' language: system - id: bandit diff --git a/LICENSE b/LICENSE index 0903645a..2b1debdd 100644 --- a/LICENSE +++ b/LICENSE @@ -198,4 +198,4 @@ Copyright 2018 Netflix, Inc. distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and - limitations under the License. \ No newline at end of file + limitations under the License. diff --git a/Makefile b/Makefile index 3fd9a469..a8a5eb7c 100644 --- a/Makefile +++ b/Makefile @@ -22,6 +22,18 @@ lint: ## Lint Code @echo "Running pylint..." pylint --disable=W,C,R,E -j 0 providers lib util config +##@ PyPI +pypi-clean: ## Delete the distribution files + rm -rf ./dist && rm -rf ./build && rm -rf prowler_cloud.egg-info + +pypi-build: ## Build package + $(MAKE) pypi-clean && \ + python3 -m build + +pypi-upload: ## Upload package + python3 -m twine upload --repository pypi dist/* + + ##@ Help help: ## Show this help. @echo "Prowler Makefile" diff --git a/Pipfile b/Pipfile index 368062aa..cb767796 100644 --- a/Pipfile +++ b/Pipfile @@ -28,7 +28,7 @@ flake8 = "5.0.4" bandit = "1.7.4" safety = "2.3.1" vulture = "2.6" -moto = "4.0.9" +moto = "4.0.11" docker = "6.0.0" openapi-spec-validator = "0.5.1" pytest = "7.1.2" diff --git a/Pipfile.lock b/Pipfile.lock index e94f2a03..3d458fe9 100644 --- a/Pipfile.lock +++ b/Pipfile.lock @@ -1,1508 +1,1500 @@ { - "_meta": { - "hash": { - "sha256": "7860a43544b6af1c974d803ad88cd25d6750e4c72d98b71097baa3d59a260288" + "_meta": { + "hash": { + "sha256": "267c2834261b566bdbfe631a063a481e14a0114871d7ca2f02d57a798e33ee56" + }, + "pipfile-spec": 6, + "requires": { + "python_version": "3.9" + }, + "sources": [ + { + "name": "pypi", + "url": "https://pypi.org/simple", + "verify_ssl": true + } + ] }, - "pipfile-spec": 6, - "requires": { - "python_version": "3.9" + "default": { + "about-time": { + "hashes": [ + "sha256:586b329450c9387d1ae8c42d2db4f5b4c57a54508d0f1b7bb00322ffd5ce9f9b", + "sha256:96841beb3f9b5de1cbb323d2bdb0fa9abdecbc46f2d546b9b3c2483d23daa17a" + ], + "version": "==3.1.1" + }, + "alive-progress": { + "hashes": [ + "sha256:089757c8197f27ad972ba27e1060f6db92368d83c736884e159034fd74865323", + "sha256:5503ffca0a0607d5f0d24d3b10a718fe50e375470fa07602b246333eb7ec88ee" + ], + "index": "pypi", + "version": "==2.4.1" + }, + "arnparse": { + "hashes": [ + "sha256:b0906734e4b8f19e39b1e32944c6cd6274b6da90c066a83882ac7a11d27553e0", + "sha256:cb87f17200d07121108a9085d4a09cc69a55582647776b9a917b0b1f279db8f8" + ], + "index": "pypi", + "version": "==0.0.2" + }, + "azure-common": { + "hashes": [ + "sha256:4ac0cd3214e36b6a1b6a442686722a5d8cc449603aa833f3f0f40bda836704a3", + "sha256:5c12d3dcf4ec20599ca6b0d3e09e86e146353d443e7fcc050c9a19c1f9df20ad" + ], + "version": "==1.1.28" + }, + "azure-core": { + "hashes": [ + "sha256:223b0e90cbdd1f03c41b195b03239899843f20d00964dbb85e64386873414a2d", + "sha256:726ffd1ded04a2c1cb53f9d9155cbb05ac5c1c2a29af4ef622e93e1c0a8bc92b" + ], + "markers": "python_version >= '3.7'", + "version": "==1.26.1" + }, + "azure-identity": { + "hashes": [ + "sha256:2a58ce4a209a013e37eaccfd5937570ab99e9118b3e1acf875eed3a85d541b92", + "sha256:7f9b1ae7d97ea7af3f38dd09305e19ab81a1e16ab66ea186b6579d85c1ca2347" + ], + "index": "pypi", + "version": "==1.12.0" + }, + "azure-mgmt-authorization": { + "hashes": [ + "sha256:0a5d7f683bf3372236b841cdbd4677f6b08ed7ce41b999c3e644d4286252057d", + "sha256:b3f9e584b87d5cc39d41283211237945e620c0b868394880aeded80a126b2c40" + ], + "index": "pypi", + "version": "==3.0.0" + }, + "azure-mgmt-core": { + "hashes": [ + "sha256:07f4afe823a55d704b048d61edfdc1318c051ed59f244032126350be95e9d501", + "sha256:fd829f67086e5cf6f7eb016c9e80bb0fb293cbbbd4d8738dc90af9aa1055fb7b" + ], + "markers": "python_version >= '3.6'", + "version": "==1.3.2" + }, + "azure-mgmt-security": { + "hashes": [ + "sha256:3b14a236383effdc5e3135b394b7883a183fcc9cdde01b735b2aae227b42e2e9", + "sha256:bcba7cef857f6b02a2d98afeb07f9871b1628fa33d8861ab1387e732e7db3f84" + ], + "index": "pypi", + "version": "==3.0.0" + }, + "azure-mgmt-storage": { + "hashes": [ + "sha256:6eb13eeecf89195b2b5f47be0679e3f27888efd7bd2132eec7ebcbce75cb1377", + "sha256:89d644c6192118b0b097deaa9c4925832d8f7ea4693d38d5fce3f0125b43a1c5" + ], + "index": "pypi", + "version": "==21.0.0" + }, + "azure-mgmt-subscription": { + "hashes": [ + "sha256:38d4574a8d47fa17e3587d756e296cb63b82ad8fb21cd8543bcee443a502bf48", + "sha256:4e255b4ce9b924357bb8c5009b3c88a2014d3203b2495e2256fa027bf84e800e" + ], + "index": "pypi", + "version": "==3.1.1" + }, + "azure-storage-blob": { + "hashes": [ + "sha256:52b84658e8df7853a3cf1c563814655b5028b979b2a87905b92aa6bb30be240e", + "sha256:860d4d82985a4bfc7d3271e71275af330f54f330a754355435a7ba749ccde997" + ], + "index": "pypi", + "version": "==12.14.1" + }, + "boto3": { + "hashes": [ + "sha256:53badfc5f145b8a3f9117512b41bc5a64db1cce1b549061d8edba68909e63fdf", + "sha256:548081a0f8854bb2eea1e368ab29945478105f56989546f653c75528dcb07d88" + ], + "index": "pypi", + "version": "==1.26.28" + }, + "botocore": { + "hashes": [ + "sha256:982732e7ed65cb6ed11ea3ce0e32dff2bcd465836c32376154f0802aa0a112c7", + "sha256:f0b8bb976e368dea20a960b47169e31fc0828feb6f0b9f59f1e5be8d08919b10" + ], + "index": "pypi", + "version": "==1.29.28" + }, + "certifi": { + "hashes": [ + "sha256:35824b4c3a97115964b408844d64aa14db1cc518f6562e8d7261699d1350a9e3", + "sha256:4ad3232f5e926d6718ec31cfc1fcadfde020920e278684144551c91769c7bc18" + ], + "markers": "python_version >= '3.6'", + "version": "==2022.12.7" + }, + "cffi": { + "hashes": [ + "sha256:00a9ed42e88df81ffae7a8ab6d9356b371399b91dbdf0c3cb1e84c03a13aceb5", + "sha256:03425bdae262c76aad70202debd780501fabeaca237cdfddc008987c0e0f59ef", + "sha256:04ed324bda3cda42b9b695d51bb7d54b680b9719cfab04227cdd1e04e5de3104", + "sha256:0e2642fe3142e4cc4af0799748233ad6da94c62a8bec3a6648bf8ee68b1c7426", + "sha256:173379135477dc8cac4bc58f45db08ab45d228b3363adb7af79436135d028405", + "sha256:198caafb44239b60e252492445da556afafc7d1e3ab7a1fb3f0584ef6d742375", + "sha256:1e74c6b51a9ed6589199c787bf5f9875612ca4a8a0785fb2d4a84429badaf22a", + "sha256:2012c72d854c2d03e45d06ae57f40d78e5770d252f195b93f581acf3ba44496e", + "sha256:21157295583fe8943475029ed5abdcf71eb3911894724e360acff1d61c1d54bc", + "sha256:2470043b93ff09bf8fb1d46d1cb756ce6132c54826661a32d4e4d132e1977adf", + "sha256:285d29981935eb726a4399badae8f0ffdff4f5050eaa6d0cfc3f64b857b77185", + "sha256:30d78fbc8ebf9c92c9b7823ee18eb92f2e6ef79b45ac84db507f52fbe3ec4497", + "sha256:320dab6e7cb2eacdf0e658569d2575c4dad258c0fcc794f46215e1e39f90f2c3", + "sha256:33ab79603146aace82c2427da5ca6e58f2b3f2fb5da893ceac0c42218a40be35", + "sha256:3548db281cd7d2561c9ad9984681c95f7b0e38881201e157833a2342c30d5e8c", + "sha256:3799aecf2e17cf585d977b780ce79ff0dc9b78d799fc694221ce814c2c19db83", + "sha256:39d39875251ca8f612b6f33e6b1195af86d1b3e60086068be9cc053aa4376e21", + "sha256:3b926aa83d1edb5aa5b427b4053dc420ec295a08e40911296b9eb1b6170f6cca", + "sha256:3bcde07039e586f91b45c88f8583ea7cf7a0770df3a1649627bf598332cb6984", + "sha256:3d08afd128ddaa624a48cf2b859afef385b720bb4b43df214f85616922e6a5ac", + "sha256:3eb6971dcff08619f8d91607cfc726518b6fa2a9eba42856be181c6d0d9515fd", + "sha256:40f4774f5a9d4f5e344f31a32b5096977b5d48560c5592e2f3d2c4374bd543ee", + "sha256:4289fc34b2f5316fbb762d75362931e351941fa95fa18789191b33fc4cf9504a", + "sha256:470c103ae716238bbe698d67ad020e1db9d9dba34fa5a899b5e21577e6d52ed2", + "sha256:4f2c9f67e9821cad2e5f480bc8d83b8742896f1242dba247911072d4fa94c192", + "sha256:50a74364d85fd319352182ef59c5c790484a336f6db772c1a9231f1c3ed0cbd7", + "sha256:54a2db7b78338edd780e7ef7f9f6c442500fb0d41a5a4ea24fff1c929d5af585", + "sha256:5635bd9cb9731e6d4a1132a498dd34f764034a8ce60cef4f5319c0541159392f", + "sha256:59c0b02d0a6c384d453fece7566d1c7e6b7bae4fc5874ef2ef46d56776d61c9e", + "sha256:5d598b938678ebf3c67377cdd45e09d431369c3b1a5b331058c338e201f12b27", + "sha256:5df2768244d19ab7f60546d0c7c63ce1581f7af8b5de3eb3004b9b6fc8a9f84b", + "sha256:5ef34d190326c3b1f822a5b7a45f6c4535e2f47ed06fec77d3d799c450b2651e", + "sha256:6975a3fac6bc83c4a65c9f9fcab9e47019a11d3d2cf7f3c0d03431bf145a941e", + "sha256:6c9a799e985904922a4d207a94eae35c78ebae90e128f0c4e521ce339396be9d", + "sha256:70df4e3b545a17496c9b3f41f5115e69a4f2e77e94e1d2a8e1070bc0c38c8a3c", + "sha256:7473e861101c9e72452f9bf8acb984947aa1661a7704553a9f6e4baa5ba64415", + "sha256:8102eaf27e1e448db915d08afa8b41d6c7ca7a04b7d73af6514df10a3e74bd82", + "sha256:87c450779d0914f2861b8526e035c5e6da0a3199d8f1add1a665e1cbc6fc6d02", + "sha256:8b7ee99e510d7b66cdb6c593f21c043c248537a32e0bedf02e01e9553a172314", + "sha256:91fc98adde3d7881af9b59ed0294046f3806221863722ba7d8d120c575314325", + "sha256:94411f22c3985acaec6f83c6df553f2dbe17b698cc7f8ae751ff2237d96b9e3c", + "sha256:98d85c6a2bef81588d9227dde12db8a7f47f639f4a17c9ae08e773aa9c697bf3", + "sha256:9ad5db27f9cabae298d151c85cf2bad1d359a1b9c686a275df03385758e2f914", + "sha256:a0b71b1b8fbf2b96e41c4d990244165e2c9be83d54962a9a1d118fd8657d2045", + "sha256:a0f100c8912c114ff53e1202d0078b425bee3649ae34d7b070e9697f93c5d52d", + "sha256:a591fe9e525846e4d154205572a029f653ada1a78b93697f3b5a8f1f2bc055b9", + "sha256:a5c84c68147988265e60416b57fc83425a78058853509c1b0629c180094904a5", + "sha256:a66d3508133af6e8548451b25058d5812812ec3798c886bf38ed24a98216fab2", + "sha256:a8c4917bd7ad33e8eb21e9a5bbba979b49d9a97acb3a803092cbc1133e20343c", + "sha256:b3bbeb01c2b273cca1e1e0c5df57f12dce9a4dd331b4fa1635b8bec26350bde3", + "sha256:cba9d6b9a7d64d4bd46167096fc9d2f835e25d7e4c121fb2ddfc6528fb0413b2", + "sha256:cc4d65aeeaa04136a12677d3dd0b1c0c94dc43abac5860ab33cceb42b801c1e8", + "sha256:ce4bcc037df4fc5e3d184794f27bdaab018943698f4ca31630bc7f84a7b69c6d", + "sha256:cec7d9412a9102bdc577382c3929b337320c4c4c4849f2c5cdd14d7368c5562d", + "sha256:d400bfb9a37b1351253cb402671cea7e89bdecc294e8016a707f6d1d8ac934f9", + "sha256:d61f4695e6c866a23a21acab0509af1cdfd2c013cf256bbf5b6b5e2695827162", + "sha256:db0fbb9c62743ce59a9ff687eb5f4afbe77e5e8403d6697f7446e5f609976f76", + "sha256:dd86c085fae2efd48ac91dd7ccffcfc0571387fe1193d33b6394db7ef31fe2a4", + "sha256:e00b098126fd45523dd056d2efba6c5a63b71ffe9f2bbe1a4fe1716e1d0c331e", + "sha256:e229a521186c75c8ad9490854fd8bbdd9a0c9aa3a524326b55be83b54d4e0ad9", + "sha256:e263d77ee3dd201c3a142934a086a4450861778baaeeb45db4591ef65550b0a6", + "sha256:ed9cb427ba5504c1dc15ede7d516b84757c3e3d7868ccc85121d9310d27eed0b", + "sha256:fa6693661a4c91757f4412306191b6dc88c1703f780c8234035eac011922bc01", + "sha256:fcd131dd944808b5bdb38e6f5b53013c5aa4f334c5cad0c72742f6eba4b73db0" + ], + "version": "==1.15.1" + }, + "charset-normalizer": { + "hashes": [ + "sha256:5a3d016c7c547f69d6f81fb0db9449ce888b418b5b9952cc5e6e66843e9dd845", + "sha256:83e9a75d1911279afd89352c68b45348559d1fc0506b054b346651b5e7fee29f" + ], + "markers": "python_version >= '3.6'", + "version": "==2.1.1" + }, + "click": { + "hashes": [ + "sha256:7682dc8afb30297001674575ea00d1814d808d6a36af415a82bd481d37ba7b8e", + "sha256:bb4d8133cb15a609f44e8213d9b391b0809795062913b383c62be0ee95b1db48" + ], + "markers": "python_version >= '3.7'", + "version": "==8.1.3" + }, + "click-plugins": { + "hashes": [ + "sha256:46ab999744a9d831159c3411bb0c79346d94a444df9a3a3742e9ed63645f264b", + "sha256:5d262006d3222f5057fd81e1623d4443e41dcda5dc815c06b442aa3c02889fc8" + ], + "version": "==1.1.1" + }, + "colorama": { + "hashes": [ + "sha256:08695f5cb7ed6e0531a20572697297273c47b8cae5a63ffc6d6ed5c201be6e44", + "sha256:4f1d9991f5acc0ca119f9d443620b77f9d6b33703e51011c16baf57afb285fc6" + ], + "index": "pypi", + "version": "==0.4.6" + }, + "cryptography": { + "hashes": [ + "sha256:0e70da4bdff7601b0ef48e6348339e490ebfb0cbe638e083c9c41fb49f00c8bd", + "sha256:10652dd7282de17990b88679cb82f832752c4e8237f0c714be518044269415db", + "sha256:175c1a818b87c9ac80bb7377f5520b7f31b3ef2a0004e2420319beadedb67290", + "sha256:1d7e632804a248103b60b16fb145e8df0bc60eed790ece0d12efe8cd3f3e7744", + "sha256:1f13ddda26a04c06eb57119caf27a524ccae20533729f4b1e4a69b54e07035eb", + "sha256:2ec2a8714dd005949d4019195d72abed84198d877112abb5a27740e217e0ea8d", + "sha256:2fa36a7b2cc0998a3a4d5af26ccb6273f3df133d61da2ba13b3286261e7efb70", + "sha256:2fb481682873035600b5502f0015b664abc26466153fab5c6bc92c1ea69d478b", + "sha256:3178d46f363d4549b9a76264f41c6948752183b3f587666aff0555ac50fd7876", + "sha256:4367da5705922cf7070462e964f66e4ac24162e22ab0a2e9d31f1b270dd78083", + "sha256:4eb85075437f0b1fd8cd66c688469a0c4119e0ba855e3fef86691971b887caf6", + "sha256:50a1494ed0c3f5b4d07650a68cd6ca62efe8b596ce743a5c94403e6f11bf06c1", + "sha256:53049f3379ef05182864d13bb9686657659407148f901f3f1eee57a733fb4b00", + "sha256:6391e59ebe7c62d9902c24a4d8bcbc79a68e7c4ab65863536127c8a9cd94043b", + "sha256:67461b5ebca2e4c2ab991733f8ab637a7265bb582f07c7c88914b5afb88cb95b", + "sha256:78e47e28ddc4ace41dd38c42e6feecfdadf9c3be2af389abbfeef1ff06822285", + "sha256:80ca53981ceeb3241998443c4964a387771588c4e4a5d92735a493af868294f9", + "sha256:8a4b2bdb68a447fadebfd7d24855758fe2d6fecc7fed0b78d190b1af39a8e3b0", + "sha256:8e45653fb97eb2f20b8c96f9cd2b3a0654d742b47d638cf2897afbd97f80fa6d", + "sha256:998cd19189d8a747b226d24c0207fdaa1e6658a1d3f2494541cb9dfbf7dcb6d2", + "sha256:a10498349d4c8eab7357a8f9aa3463791292845b79597ad1b98a543686fb1ec8", + "sha256:b4cad0cea995af760f82820ab4ca54e5471fc782f70a007f31531957f43e9dee", + "sha256:bfe6472507986613dc6cc00b3d492b2f7564b02b3b3682d25ca7f40fa3fd321b", + "sha256:c9e0d79ee4c56d841bd4ac6e7697c8ff3c8d6da67379057f29e66acffcd1e9a7", + "sha256:ca57eb3ddaccd1112c18fc80abe41db443cc2e9dcb1917078e02dfa010a4f353", + "sha256:ce127dd0a6a0811c251a6cddd014d292728484e530d80e872ad9806cfb1c5b3c" + ], + "markers": "python_version >= '3.6'", + "version": "==38.0.4" + }, + "detect-secrets": { + "hashes": [ + "sha256:d08ecabeee8b68c0acb0e8a354fb98d822a653f6ed05e520cead4c6fc1fc02cd", + "sha256:d56787e339758cef48c9ccd6692f7a094b9963c979c9813580b0169e41132833" + ], + "index": "pypi", + "version": "==1.4.0" + }, + "grapheme": { + "hashes": [ + "sha256:44c2b9f21bbe77cfb05835fec230bd435954275267fea1858013b102f8603cca" + ], + "version": "==0.6.0" + }, + "idna": { + "hashes": [ + "sha256:814f528e8dead7d329833b91c5faa87d60bf71824cd12a7530b5526063d02cb4", + "sha256:90b77e79eaa3eba6de819a0c442c0b4ceefc341a7a2ab77d7562bf49f425c5c2" + ], + "markers": "python_version >= '3.5'", + "version": "==3.4" + }, + "isodate": { + "hashes": [ + "sha256:0751eece944162659049d35f4f549ed815792b38793f07cf73381c1c87cbed96", + "sha256:48c5881de7e8b0a0d648cb024c8062dc84e7b840ed81e864c7614fd3c127bde9" + ], + "version": "==0.6.1" + }, + "jmespath": { + "hashes": [ + "sha256:02e2e4cc71b5bcab88332eebf907519190dd9e6e82107fa7f83b1003a6252980", + "sha256:90261b206d6defd58fdd5e85f478bf633a2901798906be2ad389150c5c60edbe" + ], + "markers": "python_version >= '3.7'", + "version": "==1.0.1" + }, + "msal": { + "hashes": [ + "sha256:78344cd4c91d6134a593b5e3e45541e666e37b747ff8a6316c3668dd1e6ab6b2", + "sha256:d2f1c26368ecdc28c8657d457352faa0b81b1845a7b889d8676787721ba86792" + ], + "version": "==1.20.0" + }, + "msal-extensions": { + "hashes": [ + "sha256:91e3db9620b822d0ed2b4d1850056a0f133cba04455e62f11612e40f5502f2ee", + "sha256:c676aba56b0cce3783de1b5c5ecfe828db998167875126ca4b47dc6436451354" + ], + "version": "==1.0.0" + }, + "msgraph-core": { + "hashes": [ + "sha256:147324246788abe8ed7e05534cd9e4e0ec98b33b30e011693b8d014cebf97f63", + "sha256:e297564b9a0ca228493d8851f95cb2de9522143d82efa40ce3a6ad286e21392e" + ], + "index": "pypi", + "version": "==0.2.2" + }, + "msrest": { + "hashes": [ + "sha256:21120a810e1233e5e6cc7fe40b474eeb4ec6f757a15d7cf86702c369f9567c32", + "sha256:6e7661f46f3afd88b75667b7187a92829924446c7ea1d169be8c4bb7eeb788b9" + ], + "markers": "python_version >= '3.6'", + "version": "==0.7.1" + }, + "oauthlib": { + "hashes": [ + "sha256:8139f29aac13e25d502680e9e19963e83f16838d48a0d71c287fe40e7067fbca", + "sha256:9859c40929662bec5d64f34d01c99e093149682a3f38915dc0655d5a633dd918" + ], + "markers": "python_version >= '3.6'", + "version": "==3.2.2" + }, + "portalocker": { + "hashes": [ + "sha256:102ed1f2badd8dec9af3d732ef70e94b215b85ba45a8d7ff3c0003f19b442f4e", + "sha256:964f6830fb42a74b5d32bce99ed37d8308c1d7d44ddf18f3dd89f4680de97b39" + ], + "markers": "python_version >= '3.5' and platform_system != 'Windows'", + "version": "==2.6.0" + }, + "pycparser": { + "hashes": [ + "sha256:8ee45429555515e1f6b185e78100aea234072576aa43ab53aefcae078162fca9", + "sha256:e644fdec12f7872f86c58ff790da456218b10f863970249516d60a5eaca77206" + ], + "version": "==2.21" + }, + "pydantic": { + "hashes": [ + "sha256:05e00dbebbe810b33c7a7362f231893183bcc4251f3f2ff991c31d5c08240c42", + "sha256:06094d18dd5e6f2bbf93efa54991c3240964bb663b87729ac340eb5014310624", + "sha256:0b959f4d8211fc964772b595ebb25f7652da3f22322c007b6fed26846a40685e", + "sha256:19b3b9ccf97af2b7519c42032441a891a5e05c68368f40865a90eb88833c2559", + "sha256:1b6ee725bd6e83ec78b1aa32c5b1fa67a3a65badddde3976bca5fe4568f27709", + "sha256:1ee433e274268a4b0c8fde7ad9d58ecba12b069a033ecc4645bb6303c062d2e9", + "sha256:216f3bcbf19c726b1cc22b099dd409aa371f55c08800bcea4c44c8f74b73478d", + "sha256:2d0567e60eb01bccda3a4df01df677adf6b437958d35c12a3ac3e0f078b0ee52", + "sha256:2e05aed07fa02231dbf03d0adb1be1d79cabb09025dd45aa094aa8b4e7b9dcda", + "sha256:352aedb1d71b8b0736c6d56ad2bd34c6982720644b0624462059ab29bd6e5912", + "sha256:355639d9afc76bcb9b0c3000ddcd08472ae75318a6eb67a15866b87e2efa168c", + "sha256:37c90345ec7dd2f1bcef82ce49b6235b40f282b94d3eec47e801baf864d15525", + "sha256:4b8795290deaae348c4eba0cebb196e1c6b98bdbe7f50b2d0d9a4a99716342fe", + "sha256:5760e164b807a48a8f25f8aa1a6d857e6ce62e7ec83ea5d5c5a802eac81bad41", + "sha256:6eb843dcc411b6a2237a694f5e1d649fc66c6064d02b204a7e9d194dff81eb4b", + "sha256:7b5ba54d026c2bd2cb769d3468885f23f43710f651688e91f5fb1edcf0ee9283", + "sha256:7c2abc4393dea97a4ccbb4ec7d8658d4e22c4765b7b9b9445588f16c71ad9965", + "sha256:81a7b66c3f499108b448f3f004801fcd7d7165fb4200acb03f1c2402da73ce4c", + "sha256:91b8e218852ef6007c2b98cd861601c6a09f1aa32bbbb74fab5b1c33d4a1e410", + "sha256:9300fcbebf85f6339a02c6994b2eb3ff1b9c8c14f502058b5bf349d42447dcf5", + "sha256:9cabf4a7f05a776e7793e72793cd92cc865ea0e83a819f9ae4ecccb1b8aa6116", + "sha256:a1f5a63a6dfe19d719b1b6e6106561869d2efaca6167f84f5ab9347887d78b98", + "sha256:a4c805731c33a8db4b6ace45ce440c4ef5336e712508b4d9e1aafa617dc9907f", + "sha256:ae544c47bec47a86bc7d350f965d8b15540e27e5aa4f55170ac6a75e5f73b644", + "sha256:b97890e56a694486f772d36efd2ba31612739bc6f3caeee50e9e7e3ebd2fdd13", + "sha256:bb6ad4489af1bac6955d38ebcb95079a836af31e4c4f74aba1ca05bb9f6027bd", + "sha256:bedf309630209e78582ffacda64a21f96f3ed2e51fbf3962d4d488e503420254", + "sha256:c1ba1afb396148bbc70e9eaa8c06c1716fdddabaf86e7027c5988bae2a829ab6", + "sha256:c33602f93bfb67779f9c507e4d69451664524389546bacfe1bee13cae6dc7488", + "sha256:c4aac8e7103bf598373208f6299fa9a5cfd1fc571f2d40bf1dd1955a63d6eeb5", + "sha256:c6f981882aea41e021f72779ce2a4e87267458cc4d39ea990729e21ef18f0f8c", + "sha256:cc78cc83110d2f275ec1970e7a831f4e371ee92405332ebfe9860a715f8336e1", + "sha256:d49f3db871575e0426b12e2f32fdb25e579dea16486a26e5a0474af87cb1ab0a", + "sha256:dd3f9a40c16daf323cf913593083698caee97df2804aa36c4b3175d5ac1b92a2", + "sha256:e0bedafe4bc165ad0a56ac0bd7695df25c50f76961da29c050712596cf092d6d", + "sha256:e9069e1b01525a96e6ff49e25876d90d5a563bc31c658289a8772ae186552236" + ], + "index": "pypi", + "version": "==1.10.2" + }, + "pyjwt": { + "extras": [ + "crypto" + ], + "hashes": [ + "sha256:69285c7e31fc44f68a1feb309e948e0df53259d579295e6cfe2b1792329f05fd", + "sha256:d83c3d892a77bbb74d3e1a2cfa90afaadb60945205d1095d9221f04466f64c14" + ], + "markers": "python_version >= '3.7'", + "version": "==2.6.0" + }, + "python-dateutil": { + "hashes": [ + "sha256:0123cacc1627ae19ddf3c27a5de5bd67ee4586fbdd6440d9748f8abb483d3e86", + "sha256:961d03dc3453ebbc59dbdea9e4e11c5651520a876d0f4db161e8674aae935da9" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", + "version": "==2.8.2" + }, + "pyyaml": { + "hashes": [ + "sha256:01b45c0191e6d66c470b6cf1b9531a771a83c1c4208272ead47a3ae4f2f603bf", + "sha256:0283c35a6a9fbf047493e3a0ce8d79ef5030852c51e9d911a27badfde0605293", + "sha256:055d937d65826939cb044fc8c9b08889e8c743fdc6a32b33e2390f66013e449b", + "sha256:07751360502caac1c067a8132d150cf3d61339af5691fe9e87803040dbc5db57", + "sha256:0b4624f379dab24d3725ffde76559cff63d9ec94e1736b556dacdfebe5ab6d4b", + "sha256:0ce82d761c532fe4ec3f87fc45688bdd3a4c1dc5e0b4a19814b9009a29baefd4", + "sha256:1e4747bc279b4f613a09eb64bba2ba602d8a6664c6ce6396a4d0cd413a50ce07", + "sha256:213c60cd50106436cc818accf5baa1aba61c0189ff610f64f4a3e8c6726218ba", + "sha256:231710d57adfd809ef5d34183b8ed1eeae3f76459c18fb4a0b373ad56bedcdd9", + "sha256:277a0ef2981ca40581a47093e9e2d13b3f1fbbeffae064c1d21bfceba2030287", + "sha256:2cd5df3de48857ed0544b34e2d40e9fac445930039f3cfe4bcc592a1f836d513", + "sha256:40527857252b61eacd1d9af500c3337ba8deb8fc298940291486c465c8b46ec0", + "sha256:432557aa2c09802be39460360ddffd48156e30721f5e8d917f01d31694216782", + "sha256:473f9edb243cb1935ab5a084eb238d842fb8f404ed2193a915d1784b5a6b5fc0", + "sha256:48c346915c114f5fdb3ead70312bd042a953a8ce5c7106d5bfb1a5254e47da92", + "sha256:50602afada6d6cbfad699b0c7bb50d5ccffa7e46a3d738092afddc1f9758427f", + "sha256:68fb519c14306fec9720a2a5b45bc9f0c8d1b9c72adf45c37baedfcd949c35a2", + "sha256:77f396e6ef4c73fdc33a9157446466f1cff553d979bd00ecb64385760c6babdc", + "sha256:81957921f441d50af23654aa6c5e5eaf9b06aba7f0a19c18a538dc7ef291c5a1", + "sha256:819b3830a1543db06c4d4b865e70ded25be52a2e0631ccd2f6a47a2822f2fd7c", + "sha256:897b80890765f037df3403d22bab41627ca8811ae55e9a722fd0392850ec4d86", + "sha256:98c4d36e99714e55cfbaaee6dd5badbc9a1ec339ebfc3b1f52e293aee6bb71a4", + "sha256:9df7ed3b3d2e0ecfe09e14741b857df43adb5a3ddadc919a2d94fbdf78fea53c", + "sha256:9fa600030013c4de8165339db93d182b9431076eb98eb40ee068700c9c813e34", + "sha256:a80a78046a72361de73f8f395f1f1e49f956c6be882eed58505a15f3e430962b", + "sha256:afa17f5bc4d1b10afd4466fd3a44dc0e245382deca5b3c353d8b757f9e3ecb8d", + "sha256:b3d267842bf12586ba6c734f89d1f5b871df0273157918b0ccefa29deb05c21c", + "sha256:b5b9eccad747aabaaffbc6064800670f0c297e52c12754eb1d976c57e4f74dcb", + "sha256:bfaef573a63ba8923503d27530362590ff4f576c626d86a9fed95822a8255fd7", + "sha256:c5687b8d43cf58545ade1fe3e055f70eac7a5a1a0bf42824308d868289a95737", + "sha256:cba8c411ef271aa037d7357a2bc8f9ee8b58b9965831d9e51baf703280dc73d3", + "sha256:d15a181d1ecd0d4270dc32edb46f7cb7733c7c508857278d3d378d14d606db2d", + "sha256:d4b0ba9512519522b118090257be113b9468d804b19d63c71dbcf4a48fa32358", + "sha256:d4db7c7aef085872ef65a8fd7d6d09a14ae91f691dec3e87ee5ee0539d516f53", + "sha256:d4eccecf9adf6fbcc6861a38015c2a64f38b9d94838ac1810a9023a0609e1b78", + "sha256:d67d839ede4ed1b28a4e8909735fc992a923cdb84e618544973d7dfc71540803", + "sha256:daf496c58a8c52083df09b80c860005194014c3698698d1a57cbcfa182142a3a", + "sha256:dbad0e9d368bb989f4515da330b88a057617d16b6a8245084f1b05400f24609f", + "sha256:e61ceaab6f49fb8bdfaa0f92c4b57bcfbea54c09277b1b4f7ac376bfb7a7c174", + "sha256:f84fbc98b019fef2ee9a1cb3ce93e3187a6df0b2538a651bfb890254ba9f90b5" + ], + "markers": "python_version >= '3.6'", + "version": "==6.0" + }, + "requests": { + "hashes": [ + "sha256:7c5599b102feddaa661c826c56ab4fee28bfd17f5abca1ebbe3e7f19d7c97983", + "sha256:8fefa2a1a1365bf5520aac41836fbee479da67864514bdb821f31ce07ce65349" + ], + "markers": "python_version >= '3.7' and python_version < '4'", + "version": "==2.28.1" + }, + "requests-oauthlib": { + "hashes": [ + "sha256:2577c501a2fb8d05a304c09d090d6e47c306fef15809d102b327cf8364bddab5", + "sha256:75beac4a47881eeb94d5ea5d6ad31ef88856affe2332b9aafb52c6452ccf0d7a" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", + "version": "==1.3.1" + }, + "s3transfer": { + "hashes": [ + "sha256:06176b74f3a15f61f1b4f25a1fc29a4429040b7647133a463da8fa5bd28d5ecd", + "sha256:2ed07d3866f523cc561bf4a00fc5535827981b117dd7876f036b0c1aca42c947" + ], + "markers": "python_version >= '3.7'", + "version": "==0.6.0" + }, + "shodan": { + "hashes": [ + "sha256:18bd2ae81114b70836e0e3315227325e14398275223998a8c235b099432f4b0b" + ], + "index": "pypi", + "version": "==1.28.0" + }, + "six": { + "hashes": [ + "sha256:1e61c37477a1626458e36f7b1d82aa5c9b094fa4802892072e49de9c60c4c926", + "sha256:8abb2f1d86890a2dfb989f9a77cfcfd3e47c2a354b01111771326f8aa26e0254" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", + "version": "==1.16.0" + }, + "tabulate": { + "hashes": [ + "sha256:0095b12bf5966de529c0feb1fa08671671b3368eec77d7ef7ab114be2c068b3c", + "sha256:024ca478df22e9340661486f85298cff5f6dcdba14f3813e8830015b9ed1948f" + ], + "index": "pypi", + "version": "==0.9.0" + }, + "typing-extensions": { + "hashes": [ + "sha256:1511434bb92bf8dd198c12b1cc812e800d4181cfcb867674e0f8279cc93087aa", + "sha256:16fa4864408f655d35ec496218b85f79b3437c829e93320c7c9215ccfd92489e" + ], + "markers": "python_version >= '3.7'", + "version": "==4.4.0" + }, + "urllib3": { + "hashes": [ + "sha256:47cc05d99aaa09c9e72ed5809b60e7ba354e64b59c9c173ac3018642d8bb41fc", + "sha256:c083dd0dce68dbfbe1129d5271cb90f9447dea7d52097c6e0126120c521ddea8" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3, 3.4, 3.5'", + "version": "==1.26.13" + }, + "xlsxwriter": { + "hashes": [ + "sha256:df0aefe5137478d206847eccf9f114715e42aaea077e6a48d0e8a2152e983010", + "sha256:e89f4a1d2fa2c9ea15cde77de95cd3fd8b0345d0efb3964623f395c8c4988b7f" + ], + "markers": "python_version >= '3.4'", + "version": "==3.0.3" + } }, - "sources": [ - { - "name": "pypi", - "url": "https://pypi.org/simple", - "verify_ssl": true - } - ] - }, - "default": { - "about-time": { - "hashes": [ - "sha256:586b329450c9387d1ae8c42d2db4f5b4c57a54508d0f1b7bb00322ffd5ce9f9b", - "sha256:96841beb3f9b5de1cbb323d2bdb0fa9abdecbc46f2d546b9b3c2483d23daa17a" - ], - "version": "==3.1.1" - }, - "alive-progress": { - "hashes": [ - "sha256:089757c8197f27ad972ba27e1060f6db92368d83c736884e159034fd74865323", - "sha256:5503ffca0a0607d5f0d24d3b10a718fe50e375470fa07602b246333eb7ec88ee" - ], - "index": "pypi", - "version": "==2.4.1" - }, - "arnparse": { - "hashes": [ - "sha256:b0906734e4b8f19e39b1e32944c6cd6274b6da90c066a83882ac7a11d27553e0", - "sha256:cb87f17200d07121108a9085d4a09cc69a55582647776b9a917b0b1f279db8f8" - ], - "index": "pypi", - "version": "==0.0.2" - }, - "azure-common": { - "hashes": [ - "sha256:4ac0cd3214e36b6a1b6a442686722a5d8cc449603aa833f3f0f40bda836704a3", - "sha256:5c12d3dcf4ec20599ca6b0d3e09e86e146353d443e7fcc050c9a19c1f9df20ad" - ], - "version": "==1.1.28" - }, - "azure-core": { - "hashes": [ - "sha256:223b0e90cbdd1f03c41b195b03239899843f20d00964dbb85e64386873414a2d", - "sha256:726ffd1ded04a2c1cb53f9d9155cbb05ac5c1c2a29af4ef622e93e1c0a8bc92b" - ], - "markers": "python_version >= '3.7'", - "version": "==1.26.1" - }, - "azure-identity": { - "hashes": [ - "sha256:2a58ce4a209a013e37eaccfd5937570ab99e9118b3e1acf875eed3a85d541b92", - "sha256:7f9b1ae7d97ea7af3f38dd09305e19ab81a1e16ab66ea186b6579d85c1ca2347" - ], - "index": "pypi", - "version": "==1.12.0" - }, - "azure-mgmt-authorization": { - "hashes": [ - "sha256:0a5d7f683bf3372236b841cdbd4677f6b08ed7ce41b999c3e644d4286252057d", - "sha256:b3f9e584b87d5cc39d41283211237945e620c0b868394880aeded80a126b2c40" - ], - "index": "pypi", - "version": "==3.0.0" - }, - "azure-mgmt-core": { - "hashes": [ - "sha256:07f4afe823a55d704b048d61edfdc1318c051ed59f244032126350be95e9d501", - "sha256:fd829f67086e5cf6f7eb016c9e80bb0fb293cbbbd4d8738dc90af9aa1055fb7b" - ], - "markers": "python_version >= '3.6'", - "version": "==1.3.2" - }, - "azure-mgmt-security": { - "hashes": [ - "sha256:3b14a236383effdc5e3135b394b7883a183fcc9cdde01b735b2aae227b42e2e9", - "sha256:bcba7cef857f6b02a2d98afeb07f9871b1628fa33d8861ab1387e732e7db3f84" - ], - "index": "pypi", - "version": "==3.0.0" - }, - "azure-mgmt-storage": { - "hashes": [ - "sha256:6eb13eeecf89195b2b5f47be0679e3f27888efd7bd2132eec7ebcbce75cb1377", - "sha256:89d644c6192118b0b097deaa9c4925832d8f7ea4693d38d5fce3f0125b43a1c5" - ], - "index": "pypi", - "version": "==21.0.0" - }, - "azure-mgmt-subscription": { - "hashes": [ - "sha256:38d4574a8d47fa17e3587d756e296cb63b82ad8fb21cd8543bcee443a502bf48", - "sha256:4e255b4ce9b924357bb8c5009b3c88a2014d3203b2495e2256fa027bf84e800e" - ], - "index": "pypi", - "version": "==3.1.1" - }, - "azure-storage-blob": { - "hashes": [ - "sha256:52b84658e8df7853a3cf1c563814655b5028b979b2a87905b92aa6bb30be240e", - "sha256:860d4d82985a4bfc7d3271e71275af330f54f330a754355435a7ba749ccde997" - ], - "index": "pypi", - "version": "==12.14.1" - }, - "boto3": { - "hashes": [ - "sha256:4b4edf893b01c651007d61534c1d248cd2350d311a4e295039bd23fd60bf899a", - "sha256:59aa6c7810a815fb52671f834d10ac4cd80b9c7c01a3cbde670cb41330059464" - ], - "index": "pypi", - "version": "==1.26.19" - }, - "botocore": { - "hashes": [ - "sha256:917807ee4ccca34a2f2848eb4fcf878d9e97a44a911a6965ff556d0830c471fd", - "sha256:a54561e591f5d8e653657ce04dcad09c10ebca9dbefba73471976e522abf038a" - ], - "index": "pypi", - "version": "==1.29.19" - }, - "certifi": { - "hashes": [ - "sha256:0d9c601124e5a6ba9712dbc60d9c53c21e34f5f641fe83002317394311bdce14", - "sha256:90c1a32f1d68f940488354e36370f6cca89f0f106db09518524c88d6ed83f382" - ], - "markers": "python_version >= '3.6'", - "version": "==2022.9.24" - }, - "cffi": { - "hashes": [ - "sha256:00a9ed42e88df81ffae7a8ab6d9356b371399b91dbdf0c3cb1e84c03a13aceb5", - "sha256:03425bdae262c76aad70202debd780501fabeaca237cdfddc008987c0e0f59ef", - "sha256:04ed324bda3cda42b9b695d51bb7d54b680b9719cfab04227cdd1e04e5de3104", - "sha256:0e2642fe3142e4cc4af0799748233ad6da94c62a8bec3a6648bf8ee68b1c7426", - "sha256:173379135477dc8cac4bc58f45db08ab45d228b3363adb7af79436135d028405", - "sha256:198caafb44239b60e252492445da556afafc7d1e3ab7a1fb3f0584ef6d742375", - "sha256:1e74c6b51a9ed6589199c787bf5f9875612ca4a8a0785fb2d4a84429badaf22a", - "sha256:2012c72d854c2d03e45d06ae57f40d78e5770d252f195b93f581acf3ba44496e", - "sha256:21157295583fe8943475029ed5abdcf71eb3911894724e360acff1d61c1d54bc", - "sha256:2470043b93ff09bf8fb1d46d1cb756ce6132c54826661a32d4e4d132e1977adf", - "sha256:285d29981935eb726a4399badae8f0ffdff4f5050eaa6d0cfc3f64b857b77185", - "sha256:30d78fbc8ebf9c92c9b7823ee18eb92f2e6ef79b45ac84db507f52fbe3ec4497", - "sha256:320dab6e7cb2eacdf0e658569d2575c4dad258c0fcc794f46215e1e39f90f2c3", - "sha256:33ab79603146aace82c2427da5ca6e58f2b3f2fb5da893ceac0c42218a40be35", - "sha256:3548db281cd7d2561c9ad9984681c95f7b0e38881201e157833a2342c30d5e8c", - "sha256:3799aecf2e17cf585d977b780ce79ff0dc9b78d799fc694221ce814c2c19db83", - "sha256:39d39875251ca8f612b6f33e6b1195af86d1b3e60086068be9cc053aa4376e21", - "sha256:3b926aa83d1edb5aa5b427b4053dc420ec295a08e40911296b9eb1b6170f6cca", - "sha256:3bcde07039e586f91b45c88f8583ea7cf7a0770df3a1649627bf598332cb6984", - "sha256:3d08afd128ddaa624a48cf2b859afef385b720bb4b43df214f85616922e6a5ac", - "sha256:3eb6971dcff08619f8d91607cfc726518b6fa2a9eba42856be181c6d0d9515fd", - "sha256:40f4774f5a9d4f5e344f31a32b5096977b5d48560c5592e2f3d2c4374bd543ee", - "sha256:4289fc34b2f5316fbb762d75362931e351941fa95fa18789191b33fc4cf9504a", - "sha256:470c103ae716238bbe698d67ad020e1db9d9dba34fa5a899b5e21577e6d52ed2", - "sha256:4f2c9f67e9821cad2e5f480bc8d83b8742896f1242dba247911072d4fa94c192", - "sha256:50a74364d85fd319352182ef59c5c790484a336f6db772c1a9231f1c3ed0cbd7", - "sha256:54a2db7b78338edd780e7ef7f9f6c442500fb0d41a5a4ea24fff1c929d5af585", - "sha256:5635bd9cb9731e6d4a1132a498dd34f764034a8ce60cef4f5319c0541159392f", - "sha256:59c0b02d0a6c384d453fece7566d1c7e6b7bae4fc5874ef2ef46d56776d61c9e", - "sha256:5d598b938678ebf3c67377cdd45e09d431369c3b1a5b331058c338e201f12b27", - "sha256:5df2768244d19ab7f60546d0c7c63ce1581f7af8b5de3eb3004b9b6fc8a9f84b", - "sha256:5ef34d190326c3b1f822a5b7a45f6c4535e2f47ed06fec77d3d799c450b2651e", - "sha256:6975a3fac6bc83c4a65c9f9fcab9e47019a11d3d2cf7f3c0d03431bf145a941e", - "sha256:6c9a799e985904922a4d207a94eae35c78ebae90e128f0c4e521ce339396be9d", - "sha256:70df4e3b545a17496c9b3f41f5115e69a4f2e77e94e1d2a8e1070bc0c38c8a3c", - "sha256:7473e861101c9e72452f9bf8acb984947aa1661a7704553a9f6e4baa5ba64415", - "sha256:8102eaf27e1e448db915d08afa8b41d6c7ca7a04b7d73af6514df10a3e74bd82", - "sha256:87c450779d0914f2861b8526e035c5e6da0a3199d8f1add1a665e1cbc6fc6d02", - "sha256:8b7ee99e510d7b66cdb6c593f21c043c248537a32e0bedf02e01e9553a172314", - "sha256:91fc98adde3d7881af9b59ed0294046f3806221863722ba7d8d120c575314325", - "sha256:94411f22c3985acaec6f83c6df553f2dbe17b698cc7f8ae751ff2237d96b9e3c", - "sha256:98d85c6a2bef81588d9227dde12db8a7f47f639f4a17c9ae08e773aa9c697bf3", - "sha256:9ad5db27f9cabae298d151c85cf2bad1d359a1b9c686a275df03385758e2f914", - "sha256:a0b71b1b8fbf2b96e41c4d990244165e2c9be83d54962a9a1d118fd8657d2045", - "sha256:a0f100c8912c114ff53e1202d0078b425bee3649ae34d7b070e9697f93c5d52d", - "sha256:a591fe9e525846e4d154205572a029f653ada1a78b93697f3b5a8f1f2bc055b9", - "sha256:a5c84c68147988265e60416b57fc83425a78058853509c1b0629c180094904a5", - "sha256:a66d3508133af6e8548451b25058d5812812ec3798c886bf38ed24a98216fab2", - "sha256:a8c4917bd7ad33e8eb21e9a5bbba979b49d9a97acb3a803092cbc1133e20343c", - "sha256:b3bbeb01c2b273cca1e1e0c5df57f12dce9a4dd331b4fa1635b8bec26350bde3", - "sha256:cba9d6b9a7d64d4bd46167096fc9d2f835e25d7e4c121fb2ddfc6528fb0413b2", - "sha256:cc4d65aeeaa04136a12677d3dd0b1c0c94dc43abac5860ab33cceb42b801c1e8", - "sha256:ce4bcc037df4fc5e3d184794f27bdaab018943698f4ca31630bc7f84a7b69c6d", - "sha256:cec7d9412a9102bdc577382c3929b337320c4c4c4849f2c5cdd14d7368c5562d", - "sha256:d400bfb9a37b1351253cb402671cea7e89bdecc294e8016a707f6d1d8ac934f9", - "sha256:d61f4695e6c866a23a21acab0509af1cdfd2c013cf256bbf5b6b5e2695827162", - "sha256:db0fbb9c62743ce59a9ff687eb5f4afbe77e5e8403d6697f7446e5f609976f76", - "sha256:dd86c085fae2efd48ac91dd7ccffcfc0571387fe1193d33b6394db7ef31fe2a4", - "sha256:e00b098126fd45523dd056d2efba6c5a63b71ffe9f2bbe1a4fe1716e1d0c331e", - "sha256:e229a521186c75c8ad9490854fd8bbdd9a0c9aa3a524326b55be83b54d4e0ad9", - "sha256:e263d77ee3dd201c3a142934a086a4450861778baaeeb45db4591ef65550b0a6", - "sha256:ed9cb427ba5504c1dc15ede7d516b84757c3e3d7868ccc85121d9310d27eed0b", - "sha256:fa6693661a4c91757f4412306191b6dc88c1703f780c8234035eac011922bc01", - "sha256:fcd131dd944808b5bdb38e6f5b53013c5aa4f334c5cad0c72742f6eba4b73db0" - ], - "version": "==1.15.1" - }, - "charset-normalizer": { - "hashes": [ - "sha256:5a3d016c7c547f69d6f81fb0db9449ce888b418b5b9952cc5e6e66843e9dd845", - "sha256:83e9a75d1911279afd89352c68b45348559d1fc0506b054b346651b5e7fee29f" - ], - "markers": "python_version >= '3.6'", - "version": "==2.1.1" - }, - "click": { - "hashes": [ - "sha256:7682dc8afb30297001674575ea00d1814d808d6a36af415a82bd481d37ba7b8e", - "sha256:bb4d8133cb15a609f44e8213d9b391b0809795062913b383c62be0ee95b1db48" - ], - "markers": "python_version >= '3.7'", - "version": "==8.1.3" - }, - "click-plugins": { - "hashes": [ - "sha256:46ab999744a9d831159c3411bb0c79346d94a444df9a3a3742e9ed63645f264b", - "sha256:5d262006d3222f5057fd81e1623d4443e41dcda5dc815c06b442aa3c02889fc8" - ], - "version": "==1.1.1" - }, - "colorama": { - "hashes": [ - "sha256:08695f5cb7ed6e0531a20572697297273c47b8cae5a63ffc6d6ed5c201be6e44", - "sha256:4f1d9991f5acc0ca119f9d443620b77f9d6b33703e51011c16baf57afb285fc6" - ], - "index": "pypi", - "version": "==0.4.6" - }, - "cryptography": { - "hashes": [ - "sha256:0e70da4bdff7601b0ef48e6348339e490ebfb0cbe638e083c9c41fb49f00c8bd", - "sha256:10652dd7282de17990b88679cb82f832752c4e8237f0c714be518044269415db", - "sha256:175c1a818b87c9ac80bb7377f5520b7f31b3ef2a0004e2420319beadedb67290", - "sha256:1d7e632804a248103b60b16fb145e8df0bc60eed790ece0d12efe8cd3f3e7744", - "sha256:1f13ddda26a04c06eb57119caf27a524ccae20533729f4b1e4a69b54e07035eb", - "sha256:2ec2a8714dd005949d4019195d72abed84198d877112abb5a27740e217e0ea8d", - "sha256:2fa36a7b2cc0998a3a4d5af26ccb6273f3df133d61da2ba13b3286261e7efb70", - "sha256:2fb481682873035600b5502f0015b664abc26466153fab5c6bc92c1ea69d478b", - "sha256:3178d46f363d4549b9a76264f41c6948752183b3f587666aff0555ac50fd7876", - "sha256:4367da5705922cf7070462e964f66e4ac24162e22ab0a2e9d31f1b270dd78083", - "sha256:4eb85075437f0b1fd8cd66c688469a0c4119e0ba855e3fef86691971b887caf6", - "sha256:50a1494ed0c3f5b4d07650a68cd6ca62efe8b596ce743a5c94403e6f11bf06c1", - "sha256:53049f3379ef05182864d13bb9686657659407148f901f3f1eee57a733fb4b00", - "sha256:6391e59ebe7c62d9902c24a4d8bcbc79a68e7c4ab65863536127c8a9cd94043b", - "sha256:67461b5ebca2e4c2ab991733f8ab637a7265bb582f07c7c88914b5afb88cb95b", - "sha256:78e47e28ddc4ace41dd38c42e6feecfdadf9c3be2af389abbfeef1ff06822285", - "sha256:80ca53981ceeb3241998443c4964a387771588c4e4a5d92735a493af868294f9", - "sha256:8a4b2bdb68a447fadebfd7d24855758fe2d6fecc7fed0b78d190b1af39a8e3b0", - "sha256:8e45653fb97eb2f20b8c96f9cd2b3a0654d742b47d638cf2897afbd97f80fa6d", - "sha256:998cd19189d8a747b226d24c0207fdaa1e6658a1d3f2494541cb9dfbf7dcb6d2", - "sha256:a10498349d4c8eab7357a8f9aa3463791292845b79597ad1b98a543686fb1ec8", - "sha256:b4cad0cea995af760f82820ab4ca54e5471fc782f70a007f31531957f43e9dee", - "sha256:bfe6472507986613dc6cc00b3d492b2f7564b02b3b3682d25ca7f40fa3fd321b", - "sha256:c9e0d79ee4c56d841bd4ac6e7697c8ff3c8d6da67379057f29e66acffcd1e9a7", - "sha256:ca57eb3ddaccd1112c18fc80abe41db443cc2e9dcb1917078e02dfa010a4f353", - "sha256:ce127dd0a6a0811c251a6cddd014d292728484e530d80e872ad9806cfb1c5b3c" - ], - "markers": "python_version >= '3.6'", - "version": "==38.0.4" - }, - "detect-secrets": { - "hashes": [ - "sha256:d08ecabeee8b68c0acb0e8a354fb98d822a653f6ed05e520cead4c6fc1fc02cd", - "sha256:d56787e339758cef48c9ccd6692f7a094b9963c979c9813580b0169e41132833" - ], - "index": "pypi", - "version": "==1.4.0" - }, - "grapheme": { - "hashes": [ - "sha256:44c2b9f21bbe77cfb05835fec230bd435954275267fea1858013b102f8603cca" - ], - "version": "==0.6.0" - }, - "idna": { - "hashes": [ - "sha256:814f528e8dead7d329833b91c5faa87d60bf71824cd12a7530b5526063d02cb4", - "sha256:90b77e79eaa3eba6de819a0c442c0b4ceefc341a7a2ab77d7562bf49f425c5c2" - ], - "markers": "python_version >= '3.5'", - "version": "==3.4" - }, - "isodate": { - "hashes": [ - "sha256:0751eece944162659049d35f4f549ed815792b38793f07cf73381c1c87cbed96", - "sha256:48c5881de7e8b0a0d648cb024c8062dc84e7b840ed81e864c7614fd3c127bde9" - ], - "version": "==0.6.1" - }, - "jmespath": { - "hashes": [ - "sha256:02e2e4cc71b5bcab88332eebf907519190dd9e6e82107fa7f83b1003a6252980", - "sha256:90261b206d6defd58fdd5e85f478bf633a2901798906be2ad389150c5c60edbe" - ], - "markers": "python_version >= '3.7'", - "version": "==1.0.1" - }, - "msal": { - "hashes": [ - "sha256:78344cd4c91d6134a593b5e3e45541e666e37b747ff8a6316c3668dd1e6ab6b2", - "sha256:d2f1c26368ecdc28c8657d457352faa0b81b1845a7b889d8676787721ba86792" - ], - "version": "==1.20.0" - }, - "msal-extensions": { - "hashes": [ - "sha256:91e3db9620b822d0ed2b4d1850056a0f133cba04455e62f11612e40f5502f2ee", - "sha256:c676aba56b0cce3783de1b5c5ecfe828db998167875126ca4b47dc6436451354" - ], - "version": "==1.0.0" - }, - "msgraph-core": { - "hashes": [ - "sha256:147324246788abe8ed7e05534cd9e4e0ec98b33b30e011693b8d014cebf97f63", - "sha256:e297564b9a0ca228493d8851f95cb2de9522143d82efa40ce3a6ad286e21392e" - ], - "index": "pypi", - "version": "==0.2.2" - }, - "msrest": { - "hashes": [ - "sha256:21120a810e1233e5e6cc7fe40b474eeb4ec6f757a15d7cf86702c369f9567c32", - "sha256:6e7661f46f3afd88b75667b7187a92829924446c7ea1d169be8c4bb7eeb788b9" - ], - "markers": "python_version >= '3.6'", - "version": "==0.7.1" - }, - "oauthlib": { - "hashes": [ - "sha256:8139f29aac13e25d502680e9e19963e83f16838d48a0d71c287fe40e7067fbca", - "sha256:9859c40929662bec5d64f34d01c99e093149682a3f38915dc0655d5a633dd918" - ], - "markers": "python_version >= '3.6'", - "version": "==3.2.2" - }, - "portalocker": { - "hashes": [ - "sha256:102ed1f2badd8dec9af3d732ef70e94b215b85ba45a8d7ff3c0003f19b442f4e", - "sha256:964f6830fb42a74b5d32bce99ed37d8308c1d7d44ddf18f3dd89f4680de97b39" - ], - "markers": "python_version >= '3.5' and platform_system != 'Windows'", - "version": "==2.6.0" - }, - "pycparser": { - "hashes": [ - "sha256:8ee45429555515e1f6b185e78100aea234072576aa43ab53aefcae078162fca9", - "sha256:e644fdec12f7872f86c58ff790da456218b10f863970249516d60a5eaca77206" - ], - "version": "==2.21" - }, - "pydantic": { - "hashes": [ - "sha256:05e00dbebbe810b33c7a7362f231893183bcc4251f3f2ff991c31d5c08240c42", - "sha256:06094d18dd5e6f2bbf93efa54991c3240964bb663b87729ac340eb5014310624", - "sha256:0b959f4d8211fc964772b595ebb25f7652da3f22322c007b6fed26846a40685e", - "sha256:19b3b9ccf97af2b7519c42032441a891a5e05c68368f40865a90eb88833c2559", - "sha256:1b6ee725bd6e83ec78b1aa32c5b1fa67a3a65badddde3976bca5fe4568f27709", - "sha256:1ee433e274268a4b0c8fde7ad9d58ecba12b069a033ecc4645bb6303c062d2e9", - "sha256:216f3bcbf19c726b1cc22b099dd409aa371f55c08800bcea4c44c8f74b73478d", - "sha256:2d0567e60eb01bccda3a4df01df677adf6b437958d35c12a3ac3e0f078b0ee52", - "sha256:2e05aed07fa02231dbf03d0adb1be1d79cabb09025dd45aa094aa8b4e7b9dcda", - "sha256:352aedb1d71b8b0736c6d56ad2bd34c6982720644b0624462059ab29bd6e5912", - "sha256:355639d9afc76bcb9b0c3000ddcd08472ae75318a6eb67a15866b87e2efa168c", - "sha256:37c90345ec7dd2f1bcef82ce49b6235b40f282b94d3eec47e801baf864d15525", - "sha256:4b8795290deaae348c4eba0cebb196e1c6b98bdbe7f50b2d0d9a4a99716342fe", - "sha256:5760e164b807a48a8f25f8aa1a6d857e6ce62e7ec83ea5d5c5a802eac81bad41", - "sha256:6eb843dcc411b6a2237a694f5e1d649fc66c6064d02b204a7e9d194dff81eb4b", - "sha256:7b5ba54d026c2bd2cb769d3468885f23f43710f651688e91f5fb1edcf0ee9283", - "sha256:7c2abc4393dea97a4ccbb4ec7d8658d4e22c4765b7b9b9445588f16c71ad9965", - "sha256:81a7b66c3f499108b448f3f004801fcd7d7165fb4200acb03f1c2402da73ce4c", - "sha256:91b8e218852ef6007c2b98cd861601c6a09f1aa32bbbb74fab5b1c33d4a1e410", - "sha256:9300fcbebf85f6339a02c6994b2eb3ff1b9c8c14f502058b5bf349d42447dcf5", - "sha256:9cabf4a7f05a776e7793e72793cd92cc865ea0e83a819f9ae4ecccb1b8aa6116", - "sha256:a1f5a63a6dfe19d719b1b6e6106561869d2efaca6167f84f5ab9347887d78b98", - "sha256:a4c805731c33a8db4b6ace45ce440c4ef5336e712508b4d9e1aafa617dc9907f", - "sha256:ae544c47bec47a86bc7d350f965d8b15540e27e5aa4f55170ac6a75e5f73b644", - "sha256:b97890e56a694486f772d36efd2ba31612739bc6f3caeee50e9e7e3ebd2fdd13", - "sha256:bb6ad4489af1bac6955d38ebcb95079a836af31e4c4f74aba1ca05bb9f6027bd", - "sha256:bedf309630209e78582ffacda64a21f96f3ed2e51fbf3962d4d488e503420254", - "sha256:c1ba1afb396148bbc70e9eaa8c06c1716fdddabaf86e7027c5988bae2a829ab6", - "sha256:c33602f93bfb67779f9c507e4d69451664524389546bacfe1bee13cae6dc7488", - "sha256:c4aac8e7103bf598373208f6299fa9a5cfd1fc571f2d40bf1dd1955a63d6eeb5", - "sha256:c6f981882aea41e021f72779ce2a4e87267458cc4d39ea990729e21ef18f0f8c", - "sha256:cc78cc83110d2f275ec1970e7a831f4e371ee92405332ebfe9860a715f8336e1", - "sha256:d49f3db871575e0426b12e2f32fdb25e579dea16486a26e5a0474af87cb1ab0a", - "sha256:dd3f9a40c16daf323cf913593083698caee97df2804aa36c4b3175d5ac1b92a2", - "sha256:e0bedafe4bc165ad0a56ac0bd7695df25c50f76961da29c050712596cf092d6d", - "sha256:e9069e1b01525a96e6ff49e25876d90d5a563bc31c658289a8772ae186552236" - ], - "index": "pypi", - "version": "==1.10.2" - }, - "pyjwt": { - "extras": [ - "crypto" - ], - "hashes": [ - "sha256:69285c7e31fc44f68a1feb309e948e0df53259d579295e6cfe2b1792329f05fd", - "sha256:d83c3d892a77bbb74d3e1a2cfa90afaadb60945205d1095d9221f04466f64c14" - ], - "markers": "python_version >= '3.7'", - "version": "==2.6.0" - }, - "python-dateutil": { - "hashes": [ - "sha256:0123cacc1627ae19ddf3c27a5de5bd67ee4586fbdd6440d9748f8abb483d3e86", - "sha256:961d03dc3453ebbc59dbdea9e4e11c5651520a876d0f4db161e8674aae935da9" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", - "version": "==2.8.2" - }, - "pyyaml": { - "hashes": [ - "sha256:01b45c0191e6d66c470b6cf1b9531a771a83c1c4208272ead47a3ae4f2f603bf", - "sha256:0283c35a6a9fbf047493e3a0ce8d79ef5030852c51e9d911a27badfde0605293", - "sha256:055d937d65826939cb044fc8c9b08889e8c743fdc6a32b33e2390f66013e449b", - "sha256:07751360502caac1c067a8132d150cf3d61339af5691fe9e87803040dbc5db57", - "sha256:0b4624f379dab24d3725ffde76559cff63d9ec94e1736b556dacdfebe5ab6d4b", - "sha256:0ce82d761c532fe4ec3f87fc45688bdd3a4c1dc5e0b4a19814b9009a29baefd4", - "sha256:1e4747bc279b4f613a09eb64bba2ba602d8a6664c6ce6396a4d0cd413a50ce07", - "sha256:213c60cd50106436cc818accf5baa1aba61c0189ff610f64f4a3e8c6726218ba", - "sha256:231710d57adfd809ef5d34183b8ed1eeae3f76459c18fb4a0b373ad56bedcdd9", - "sha256:277a0ef2981ca40581a47093e9e2d13b3f1fbbeffae064c1d21bfceba2030287", - "sha256:2cd5df3de48857ed0544b34e2d40e9fac445930039f3cfe4bcc592a1f836d513", - "sha256:40527857252b61eacd1d9af500c3337ba8deb8fc298940291486c465c8b46ec0", - "sha256:432557aa2c09802be39460360ddffd48156e30721f5e8d917f01d31694216782", - "sha256:473f9edb243cb1935ab5a084eb238d842fb8f404ed2193a915d1784b5a6b5fc0", - "sha256:48c346915c114f5fdb3ead70312bd042a953a8ce5c7106d5bfb1a5254e47da92", - "sha256:50602afada6d6cbfad699b0c7bb50d5ccffa7e46a3d738092afddc1f9758427f", - "sha256:68fb519c14306fec9720a2a5b45bc9f0c8d1b9c72adf45c37baedfcd949c35a2", - "sha256:77f396e6ef4c73fdc33a9157446466f1cff553d979bd00ecb64385760c6babdc", - "sha256:81957921f441d50af23654aa6c5e5eaf9b06aba7f0a19c18a538dc7ef291c5a1", - "sha256:819b3830a1543db06c4d4b865e70ded25be52a2e0631ccd2f6a47a2822f2fd7c", - "sha256:897b80890765f037df3403d22bab41627ca8811ae55e9a722fd0392850ec4d86", - "sha256:98c4d36e99714e55cfbaaee6dd5badbc9a1ec339ebfc3b1f52e293aee6bb71a4", - "sha256:9df7ed3b3d2e0ecfe09e14741b857df43adb5a3ddadc919a2d94fbdf78fea53c", - "sha256:9fa600030013c4de8165339db93d182b9431076eb98eb40ee068700c9c813e34", - "sha256:a80a78046a72361de73f8f395f1f1e49f956c6be882eed58505a15f3e430962b", - "sha256:afa17f5bc4d1b10afd4466fd3a44dc0e245382deca5b3c353d8b757f9e3ecb8d", - "sha256:b3d267842bf12586ba6c734f89d1f5b871df0273157918b0ccefa29deb05c21c", - "sha256:b5b9eccad747aabaaffbc6064800670f0c297e52c12754eb1d976c57e4f74dcb", - "sha256:bfaef573a63ba8923503d27530362590ff4f576c626d86a9fed95822a8255fd7", - "sha256:c5687b8d43cf58545ade1fe3e055f70eac7a5a1a0bf42824308d868289a95737", - "sha256:cba8c411ef271aa037d7357a2bc8f9ee8b58b9965831d9e51baf703280dc73d3", - "sha256:d15a181d1ecd0d4270dc32edb46f7cb7733c7c508857278d3d378d14d606db2d", - "sha256:d4b0ba9512519522b118090257be113b9468d804b19d63c71dbcf4a48fa32358", - "sha256:d4db7c7aef085872ef65a8fd7d6d09a14ae91f691dec3e87ee5ee0539d516f53", - "sha256:d4eccecf9adf6fbcc6861a38015c2a64f38b9d94838ac1810a9023a0609e1b78", - "sha256:d67d839ede4ed1b28a4e8909735fc992a923cdb84e618544973d7dfc71540803", - "sha256:daf496c58a8c52083df09b80c860005194014c3698698d1a57cbcfa182142a3a", - "sha256:dbad0e9d368bb989f4515da330b88a057617d16b6a8245084f1b05400f24609f", - "sha256:e61ceaab6f49fb8bdfaa0f92c4b57bcfbea54c09277b1b4f7ac376bfb7a7c174", - "sha256:f84fbc98b019fef2ee9a1cb3ce93e3187a6df0b2538a651bfb890254ba9f90b5" - ], - "markers": "python_version >= '3.6'", - "version": "==6.0" - }, - "requests": { - "hashes": [ - "sha256:7c5599b102feddaa661c826c56ab4fee28bfd17f5abca1ebbe3e7f19d7c97983", - "sha256:8fefa2a1a1365bf5520aac41836fbee479da67864514bdb821f31ce07ce65349" - ], - "markers": "python_version >= '3.7' and python_version < '4'", - "version": "==2.28.1" - }, - "requests-oauthlib": { - "hashes": [ - "sha256:2577c501a2fb8d05a304c09d090d6e47c306fef15809d102b327cf8364bddab5", - "sha256:75beac4a47881eeb94d5ea5d6ad31ef88856affe2332b9aafb52c6452ccf0d7a" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", - "version": "==1.3.1" - }, - "s3transfer": { - "hashes": [ - "sha256:06176b74f3a15f61f1b4f25a1fc29a4429040b7647133a463da8fa5bd28d5ecd", - "sha256:2ed07d3866f523cc561bf4a00fc5535827981b117dd7876f036b0c1aca42c947" - ], - "markers": "python_version >= '3.7'", - "version": "==0.6.0" - }, - "shodan": { - "hashes": [ - "sha256:18bd2ae81114b70836e0e3315227325e14398275223998a8c235b099432f4b0b" - ], - "index": "pypi", - "version": "==1.28.0" - }, - "six": { - "hashes": [ - "sha256:1e61c37477a1626458e36f7b1d82aa5c9b094fa4802892072e49de9c60c4c926", - "sha256:8abb2f1d86890a2dfb989f9a77cfcfd3e47c2a354b01111771326f8aa26e0254" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", - "version": "==1.16.0" - }, - "tabulate": { - "hashes": [ - "sha256:0095b12bf5966de529c0feb1fa08671671b3368eec77d7ef7ab114be2c068b3c", - "sha256:024ca478df22e9340661486f85298cff5f6dcdba14f3813e8830015b9ed1948f" - ], - "index": "pypi", - "version": "==0.9.0" - }, - "typing-extensions": { - "hashes": [ - "sha256:1511434bb92bf8dd198c12b1cc812e800d4181cfcb867674e0f8279cc93087aa", - "sha256:16fa4864408f655d35ec496218b85f79b3437c829e93320c7c9215ccfd92489e" - ], - "markers": "python_version >= '3.7'", - "version": "==4.4.0" - }, - "urllib3": { - "hashes": [ - "sha256:47cc05d99aaa09c9e72ed5809b60e7ba354e64b59c9c173ac3018642d8bb41fc", - "sha256:c083dd0dce68dbfbe1129d5271cb90f9447dea7d52097c6e0126120c521ddea8" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3, 3.4, 3.5'", - "version": "==1.26.13" - }, - "xlsxwriter": { - "hashes": [ - "sha256:df0aefe5137478d206847eccf9f114715e42aaea077e6a48d0e8a2152e983010", - "sha256:e89f4a1d2fa2c9ea15cde77de95cd3fd8b0345d0efb3964623f395c8c4988b7f" - ], - "markers": "python_version >= '3.4'", - "version": "==3.0.3" + "develop": { + "astroid": { + "hashes": [ + "sha256:10e0ad5f7b79c435179d0d0f0df69998c4eef4597534aae44910db060baeb907", + "sha256:1493fe8bd3dfd73dc35bd53c9d5b6e49ead98497c47b2307662556a5692d29d7" + ], + "markers": "python_full_version >= '3.7.2'", + "version": "==2.12.13" + }, + "attrs": { + "hashes": [ + "sha256:29adc2665447e5191d0e7c568fde78b21f9672d344281d0c6e1ab085429b22b6", + "sha256:86efa402f67bf2df34f51a335487cf46b1ec130d02b8d39fd248abfd30da551c" + ], + "markers": "python_version >= '3.5'", + "version": "==22.1.0" + }, + "bandit": { + "hashes": [ + "sha256:2d63a8c573417bae338962d4b9b06fbc6080f74ecd955a092849e1e65c717bd2", + "sha256:412d3f259dab4077d0e7f0c11f50f650cc7d10db905d98f6520a95a18049658a" + ], + "index": "pypi", + "version": "==1.7.4" + }, + "black": { + "hashes": [ + "sha256:101c69b23df9b44247bd88e1d7e90154336ac4992502d4197bdac35dd7ee3320", + "sha256:159a46a4947f73387b4d83e87ea006dbb2337eab6c879620a3ba52699b1f4351", + "sha256:1f58cbe16dfe8c12b7434e50ff889fa479072096d79f0a7f25e4ab8e94cd8350", + "sha256:229351e5a18ca30f447bf724d007f890f97e13af070bb6ad4c0a441cd7596a2f", + "sha256:436cc9167dd28040ad90d3b404aec22cedf24a6e4d7de221bec2730ec0c97bcf", + "sha256:559c7a1ba9a006226f09e4916060982fd27334ae1998e7a38b3f33a37f7a2148", + "sha256:7412e75863aa5c5411886804678b7d083c7c28421210180d67dfd8cf1221e1f4", + "sha256:77d86c9f3db9b1bf6761244bc0b3572a546f5fe37917a044e02f3166d5aafa7d", + "sha256:82d9fe8fee3401e02e79767016b4907820a7dc28d70d137eb397b92ef3cc5bfc", + "sha256:9eedd20838bd5d75b80c9f5487dbcb06836a43833a37846cf1d8c1cc01cef59d", + "sha256:c116eed0efb9ff870ded8b62fe9f28dd61ef6e9ddd28d83d7d264a38417dcee2", + "sha256:d30b212bffeb1e252b31dd269dfae69dd17e06d92b87ad26e23890f3efea366f" + ], + "index": "pypi", + "version": "==22.12.0" + }, + "boto3": { + "hashes": [ + "sha256:53badfc5f145b8a3f9117512b41bc5a64db1cce1b549061d8edba68909e63fdf", + "sha256:548081a0f8854bb2eea1e368ab29945478105f56989546f653c75528dcb07d88" + ], + "index": "pypi", + "version": "==1.26.28" + }, + "botocore": { + "hashes": [ + "sha256:982732e7ed65cb6ed11ea3ce0e32dff2bcd465836c32376154f0802aa0a112c7", + "sha256:f0b8bb976e368dea20a960b47169e31fc0828feb6f0b9f59f1e5be8d08919b10" + ], + "index": "pypi", + "version": "==1.29.28" + }, + "certifi": { + "hashes": [ + "sha256:35824b4c3a97115964b408844d64aa14db1cc518f6562e8d7261699d1350a9e3", + "sha256:4ad3232f5e926d6718ec31cfc1fcadfde020920e278684144551c91769c7bc18" + ], + "markers": "python_version >= '3.6'", + "version": "==2022.12.7" + }, + "cffi": { + "hashes": [ + "sha256:00a9ed42e88df81ffae7a8ab6d9356b371399b91dbdf0c3cb1e84c03a13aceb5", + "sha256:03425bdae262c76aad70202debd780501fabeaca237cdfddc008987c0e0f59ef", + "sha256:04ed324bda3cda42b9b695d51bb7d54b680b9719cfab04227cdd1e04e5de3104", + "sha256:0e2642fe3142e4cc4af0799748233ad6da94c62a8bec3a6648bf8ee68b1c7426", + "sha256:173379135477dc8cac4bc58f45db08ab45d228b3363adb7af79436135d028405", + "sha256:198caafb44239b60e252492445da556afafc7d1e3ab7a1fb3f0584ef6d742375", + "sha256:1e74c6b51a9ed6589199c787bf5f9875612ca4a8a0785fb2d4a84429badaf22a", + "sha256:2012c72d854c2d03e45d06ae57f40d78e5770d252f195b93f581acf3ba44496e", + "sha256:21157295583fe8943475029ed5abdcf71eb3911894724e360acff1d61c1d54bc", + "sha256:2470043b93ff09bf8fb1d46d1cb756ce6132c54826661a32d4e4d132e1977adf", + "sha256:285d29981935eb726a4399badae8f0ffdff4f5050eaa6d0cfc3f64b857b77185", + "sha256:30d78fbc8ebf9c92c9b7823ee18eb92f2e6ef79b45ac84db507f52fbe3ec4497", + "sha256:320dab6e7cb2eacdf0e658569d2575c4dad258c0fcc794f46215e1e39f90f2c3", + "sha256:33ab79603146aace82c2427da5ca6e58f2b3f2fb5da893ceac0c42218a40be35", + "sha256:3548db281cd7d2561c9ad9984681c95f7b0e38881201e157833a2342c30d5e8c", + "sha256:3799aecf2e17cf585d977b780ce79ff0dc9b78d799fc694221ce814c2c19db83", + "sha256:39d39875251ca8f612b6f33e6b1195af86d1b3e60086068be9cc053aa4376e21", + "sha256:3b926aa83d1edb5aa5b427b4053dc420ec295a08e40911296b9eb1b6170f6cca", + "sha256:3bcde07039e586f91b45c88f8583ea7cf7a0770df3a1649627bf598332cb6984", + "sha256:3d08afd128ddaa624a48cf2b859afef385b720bb4b43df214f85616922e6a5ac", + "sha256:3eb6971dcff08619f8d91607cfc726518b6fa2a9eba42856be181c6d0d9515fd", + "sha256:40f4774f5a9d4f5e344f31a32b5096977b5d48560c5592e2f3d2c4374bd543ee", + "sha256:4289fc34b2f5316fbb762d75362931e351941fa95fa18789191b33fc4cf9504a", + "sha256:470c103ae716238bbe698d67ad020e1db9d9dba34fa5a899b5e21577e6d52ed2", + "sha256:4f2c9f67e9821cad2e5f480bc8d83b8742896f1242dba247911072d4fa94c192", + "sha256:50a74364d85fd319352182ef59c5c790484a336f6db772c1a9231f1c3ed0cbd7", + "sha256:54a2db7b78338edd780e7ef7f9f6c442500fb0d41a5a4ea24fff1c929d5af585", + "sha256:5635bd9cb9731e6d4a1132a498dd34f764034a8ce60cef4f5319c0541159392f", + "sha256:59c0b02d0a6c384d453fece7566d1c7e6b7bae4fc5874ef2ef46d56776d61c9e", + "sha256:5d598b938678ebf3c67377cdd45e09d431369c3b1a5b331058c338e201f12b27", + "sha256:5df2768244d19ab7f60546d0c7c63ce1581f7af8b5de3eb3004b9b6fc8a9f84b", + "sha256:5ef34d190326c3b1f822a5b7a45f6c4535e2f47ed06fec77d3d799c450b2651e", + "sha256:6975a3fac6bc83c4a65c9f9fcab9e47019a11d3d2cf7f3c0d03431bf145a941e", + "sha256:6c9a799e985904922a4d207a94eae35c78ebae90e128f0c4e521ce339396be9d", + "sha256:70df4e3b545a17496c9b3f41f5115e69a4f2e77e94e1d2a8e1070bc0c38c8a3c", + "sha256:7473e861101c9e72452f9bf8acb984947aa1661a7704553a9f6e4baa5ba64415", + "sha256:8102eaf27e1e448db915d08afa8b41d6c7ca7a04b7d73af6514df10a3e74bd82", + "sha256:87c450779d0914f2861b8526e035c5e6da0a3199d8f1add1a665e1cbc6fc6d02", + "sha256:8b7ee99e510d7b66cdb6c593f21c043c248537a32e0bedf02e01e9553a172314", + "sha256:91fc98adde3d7881af9b59ed0294046f3806221863722ba7d8d120c575314325", + "sha256:94411f22c3985acaec6f83c6df553f2dbe17b698cc7f8ae751ff2237d96b9e3c", + "sha256:98d85c6a2bef81588d9227dde12db8a7f47f639f4a17c9ae08e773aa9c697bf3", + "sha256:9ad5db27f9cabae298d151c85cf2bad1d359a1b9c686a275df03385758e2f914", + "sha256:a0b71b1b8fbf2b96e41c4d990244165e2c9be83d54962a9a1d118fd8657d2045", + "sha256:a0f100c8912c114ff53e1202d0078b425bee3649ae34d7b070e9697f93c5d52d", + "sha256:a591fe9e525846e4d154205572a029f653ada1a78b93697f3b5a8f1f2bc055b9", + "sha256:a5c84c68147988265e60416b57fc83425a78058853509c1b0629c180094904a5", + "sha256:a66d3508133af6e8548451b25058d5812812ec3798c886bf38ed24a98216fab2", + "sha256:a8c4917bd7ad33e8eb21e9a5bbba979b49d9a97acb3a803092cbc1133e20343c", + "sha256:b3bbeb01c2b273cca1e1e0c5df57f12dce9a4dd331b4fa1635b8bec26350bde3", + "sha256:cba9d6b9a7d64d4bd46167096fc9d2f835e25d7e4c121fb2ddfc6528fb0413b2", + "sha256:cc4d65aeeaa04136a12677d3dd0b1c0c94dc43abac5860ab33cceb42b801c1e8", + "sha256:ce4bcc037df4fc5e3d184794f27bdaab018943698f4ca31630bc7f84a7b69c6d", + "sha256:cec7d9412a9102bdc577382c3929b337320c4c4c4849f2c5cdd14d7368c5562d", + "sha256:d400bfb9a37b1351253cb402671cea7e89bdecc294e8016a707f6d1d8ac934f9", + "sha256:d61f4695e6c866a23a21acab0509af1cdfd2c013cf256bbf5b6b5e2695827162", + "sha256:db0fbb9c62743ce59a9ff687eb5f4afbe77e5e8403d6697f7446e5f609976f76", + "sha256:dd86c085fae2efd48ac91dd7ccffcfc0571387fe1193d33b6394db7ef31fe2a4", + "sha256:e00b098126fd45523dd056d2efba6c5a63b71ffe9f2bbe1a4fe1716e1d0c331e", + "sha256:e229a521186c75c8ad9490854fd8bbdd9a0c9aa3a524326b55be83b54d4e0ad9", + "sha256:e263d77ee3dd201c3a142934a086a4450861778baaeeb45db4591ef65550b0a6", + "sha256:ed9cb427ba5504c1dc15ede7d516b84757c3e3d7868ccc85121d9310d27eed0b", + "sha256:fa6693661a4c91757f4412306191b6dc88c1703f780c8234035eac011922bc01", + "sha256:fcd131dd944808b5bdb38e6f5b53013c5aa4f334c5cad0c72742f6eba4b73db0" + ], + "version": "==1.15.1" + }, + "charset-normalizer": { + "hashes": [ + "sha256:5a3d016c7c547f69d6f81fb0db9449ce888b418b5b9952cc5e6e66843e9dd845", + "sha256:83e9a75d1911279afd89352c68b45348559d1fc0506b054b346651b5e7fee29f" + ], + "markers": "python_version >= '3.6'", + "version": "==2.1.1" + }, + "click": { + "hashes": [ + "sha256:7682dc8afb30297001674575ea00d1814d808d6a36af415a82bd481d37ba7b8e", + "sha256:bb4d8133cb15a609f44e8213d9b391b0809795062913b383c62be0ee95b1db48" + ], + "markers": "python_version >= '3.7'", + "version": "==8.1.3" + }, + "coverage": { + "hashes": [ + "sha256:027018943386e7b942fa832372ebc120155fd970837489896099f5cfa2890f79", + "sha256:11b990d520ea75e7ee8dcab5bc908072aaada194a794db9f6d7d5cfd19661e5a", + "sha256:12adf310e4aafddc58afdb04d686795f33f4d7a6fa67a7a9d4ce7d6ae24d949f", + "sha256:1431986dac3923c5945271f169f59c45b8802a114c8f548d611f2015133df77a", + "sha256:1ef221513e6f68b69ee9e159506d583d31aa3567e0ae84eaad9d6ec1107dddaa", + "sha256:20c8ac5386253717e5ccc827caad43ed66fea0efe255727b1053a8154d952398", + "sha256:2198ea6fc548de52adc826f62cb18554caedfb1d26548c1b7c88d8f7faa8f6ba", + "sha256:255758a1e3b61db372ec2736c8e2a1fdfaf563977eedbdf131de003ca5779b7d", + "sha256:265de0fa6778d07de30bcf4d9dc471c3dc4314a23a3c6603d356a3c9abc2dfcf", + "sha256:33a7da4376d5977fbf0a8ed91c4dffaaa8dbf0ddbf4c8eea500a2486d8bc4d7b", + "sha256:42eafe6778551cf006a7c43153af1211c3aaab658d4d66fa5fcc021613d02518", + "sha256:4433b90fae13f86fafff0b326453dd42fc9a639a0d9e4eec4d366436d1a41b6d", + "sha256:4a5375e28c5191ac38cca59b38edd33ef4cc914732c916f2929029b4bfb50795", + "sha256:4a8dbc1f0fbb2ae3de73eb0bdbb914180c7abfbf258e90b311dcd4f585d44bd2", + "sha256:59f53f1dc5b656cafb1badd0feb428c1e7bc19b867479ff72f7a9dd9b479f10e", + "sha256:5dbec3b9095749390c09ab7c89d314727f18800060d8d24e87f01fb9cfb40b32", + "sha256:633713d70ad6bfc49b34ead4060531658dc6dfc9b3eb7d8a716d5873377ab745", + "sha256:6b07130585d54fe8dff3d97b93b0e20290de974dc8177c320aeaf23459219c0b", + "sha256:6c4459b3de97b75e3bd6b7d4b7f0db13f17f504f3d13e2a7c623786289dd670e", + "sha256:6d4817234349a80dbf03640cec6109cd90cba068330703fa65ddf56b60223a6d", + "sha256:723e8130d4ecc8f56e9a611e73b31219595baa3bb252d539206f7bbbab6ffc1f", + "sha256:784f53ebc9f3fd0e2a3f6a78b2be1bd1f5575d7863e10c6e12504f240fd06660", + "sha256:7b6be138d61e458e18d8e6ddcddd36dd96215edfe5f1168de0b1b32635839b62", + "sha256:7ccf362abd726b0410bf8911c31fbf97f09f8f1061f8c1cf03dfc4b6372848f6", + "sha256:83516205e254a0cb77d2d7bb3632ee019d93d9f4005de31dca0a8c3667d5bc04", + "sha256:851cf4ff24062c6aec510a454b2584f6e998cada52d4cb58c5e233d07172e50c", + "sha256:8f830ed581b45b82451a40faabb89c84e1a998124ee4212d440e9c6cf70083e5", + "sha256:94e2565443291bd778421856bc975d351738963071e9b8839ca1fc08b42d4bef", + "sha256:95203854f974e07af96358c0b261f1048d8e1083f2de9b1c565e1be4a3a48cfc", + "sha256:97117225cdd992a9c2a5515db1f66b59db634f59d0679ca1fa3fe8da32749cae", + "sha256:98e8a10b7a314f454d9eff4216a9a94d143a7ee65018dd12442e898ee2310578", + "sha256:a1170fa54185845505fbfa672f1c1ab175446c887cce8212c44149581cf2d466", + "sha256:a6b7d95969b8845250586f269e81e5dfdd8ff828ddeb8567a4a2eaa7313460c4", + "sha256:a8fb6cf131ac4070c9c5a3e21de0f7dc5a0fbe8bc77c9456ced896c12fcdad91", + "sha256:af4fffaffc4067232253715065e30c5a7ec6faac36f8fc8d6f64263b15f74db0", + "sha256:b4a5be1748d538a710f87542f22c2cad22f80545a847ad91ce45e77417293eb4", + "sha256:b5604380f3415ba69de87a289a2b56687faa4fe04dbee0754bfcae433489316b", + "sha256:b9023e237f4c02ff739581ef35969c3739445fb059b060ca51771e69101efffe", + "sha256:bc8ef5e043a2af066fa8cbfc6e708d58017024dc4345a1f9757b329a249f041b", + "sha256:c4ed2820d919351f4167e52425e096af41bfabacb1857186c1ea32ff9983ed75", + "sha256:cca4435eebea7962a52bdb216dec27215d0df64cf27fc1dd538415f5d2b9da6b", + "sha256:d900bb429fdfd7f511f868cedd03a6bbb142f3f9118c09b99ef8dc9bf9643c3c", + "sha256:d9ecf0829c6a62b9b573c7bb6d4dcd6ba8b6f80be9ba4fc7ed50bf4ac9aecd72", + "sha256:dbdb91cd8c048c2b09eb17713b0c12a54fbd587d79adcebad543bc0cd9a3410b", + "sha256:de3001a203182842a4630e7b8d1a2c7c07ec1b45d3084a83d5d227a3806f530f", + "sha256:e07f4a4a9b41583d6eabec04f8b68076ab3cd44c20bd29332c6572dda36f372e", + "sha256:ef8674b0ee8cc11e2d574e3e2998aea5df5ab242e012286824ea3c6970580e53", + "sha256:f4f05d88d9a80ad3cac6244d36dd89a3c00abc16371769f1340101d3cb899fc3", + "sha256:f642e90754ee3e06b0e7e51bce3379590e76b7f76b708e1a71ff043f87025c84", + "sha256:fc2af30ed0d5ae0b1abdb4ebdce598eafd5b35397d4d75deb341a614d333d987" + ], + "index": "pypi", + "version": "==6.5.0" + }, + "cryptography": { + "hashes": [ + "sha256:0e70da4bdff7601b0ef48e6348339e490ebfb0cbe638e083c9c41fb49f00c8bd", + "sha256:10652dd7282de17990b88679cb82f832752c4e8237f0c714be518044269415db", + "sha256:175c1a818b87c9ac80bb7377f5520b7f31b3ef2a0004e2420319beadedb67290", + "sha256:1d7e632804a248103b60b16fb145e8df0bc60eed790ece0d12efe8cd3f3e7744", + "sha256:1f13ddda26a04c06eb57119caf27a524ccae20533729f4b1e4a69b54e07035eb", + "sha256:2ec2a8714dd005949d4019195d72abed84198d877112abb5a27740e217e0ea8d", + "sha256:2fa36a7b2cc0998a3a4d5af26ccb6273f3df133d61da2ba13b3286261e7efb70", + "sha256:2fb481682873035600b5502f0015b664abc26466153fab5c6bc92c1ea69d478b", + "sha256:3178d46f363d4549b9a76264f41c6948752183b3f587666aff0555ac50fd7876", + "sha256:4367da5705922cf7070462e964f66e4ac24162e22ab0a2e9d31f1b270dd78083", + "sha256:4eb85075437f0b1fd8cd66c688469a0c4119e0ba855e3fef86691971b887caf6", + "sha256:50a1494ed0c3f5b4d07650a68cd6ca62efe8b596ce743a5c94403e6f11bf06c1", + "sha256:53049f3379ef05182864d13bb9686657659407148f901f3f1eee57a733fb4b00", + "sha256:6391e59ebe7c62d9902c24a4d8bcbc79a68e7c4ab65863536127c8a9cd94043b", + "sha256:67461b5ebca2e4c2ab991733f8ab637a7265bb582f07c7c88914b5afb88cb95b", + "sha256:78e47e28ddc4ace41dd38c42e6feecfdadf9c3be2af389abbfeef1ff06822285", + "sha256:80ca53981ceeb3241998443c4964a387771588c4e4a5d92735a493af868294f9", + "sha256:8a4b2bdb68a447fadebfd7d24855758fe2d6fecc7fed0b78d190b1af39a8e3b0", + "sha256:8e45653fb97eb2f20b8c96f9cd2b3a0654d742b47d638cf2897afbd97f80fa6d", + "sha256:998cd19189d8a747b226d24c0207fdaa1e6658a1d3f2494541cb9dfbf7dcb6d2", + "sha256:a10498349d4c8eab7357a8f9aa3463791292845b79597ad1b98a543686fb1ec8", + "sha256:b4cad0cea995af760f82820ab4ca54e5471fc782f70a007f31531957f43e9dee", + "sha256:bfe6472507986613dc6cc00b3d492b2f7564b02b3b3682d25ca7f40fa3fd321b", + "sha256:c9e0d79ee4c56d841bd4ac6e7697c8ff3c8d6da67379057f29e66acffcd1e9a7", + "sha256:ca57eb3ddaccd1112c18fc80abe41db443cc2e9dcb1917078e02dfa010a4f353", + "sha256:ce127dd0a6a0811c251a6cddd014d292728484e530d80e872ad9806cfb1c5b3c" + ], + "markers": "python_version >= '3.6'", + "version": "==38.0.4" + }, + "dill": { + "hashes": [ + "sha256:a07ffd2351b8c678dfc4a856a3005f8067aea51d6ba6c700796a4d9e280f39f0", + "sha256:e5db55f3687856d8fbdab002ed78544e1c4559a130302693d839dfe8f93f2373" + ], + "markers": "python_version >= '3.7'", + "version": "==0.3.6" + }, + "docker": { + "hashes": [ + "sha256:896c4282e5c7af5c45e8b683b0b0c33932974fe6e50fc6906a0a83616ab3da97", + "sha256:dbcb3bd2fa80dca0788ed908218bf43972772009b881ed1e20dfc29a65e49782" + ], + "index": "pypi", + "version": "==6.0.1" + }, + "dparse": { + "hashes": [ + "sha256:8097076f1dd26c377f30d4745e6ec18fef42f3bf493933b842ac5bafad8c345f", + "sha256:d45255bda21f998bc7ddf2afd5e62505ba6134756ba2d42a84c56b0826614dfe" + ], + "markers": "python_version >= '3.5'", + "version": "==0.6.2" + }, + "exceptiongroup": { + "hashes": [ + "sha256:542adf9dea4055530d6e1279602fa5cb11dab2395fa650b8674eaec35fc4a828", + "sha256:bd14967b79cd9bdb54d97323216f8fdf533e278df937aa2a90089e7d6e06e5ec" + ], + "markers": "python_version < '3.11'", + "version": "==1.0.4" + }, + "execnet": { + "hashes": [ + "sha256:8f694f3ba9cc92cab508b152dcfe322153975c29bda272e2fd7f3f00f36e47c5", + "sha256:a295f7cc774947aac58dde7fdc85f4aa00c42adf5d8f5468fc630c1acf30a142" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3, 3.4'", + "version": "==1.9.0" + }, + "flake8": { + "hashes": [ + "sha256:3833794e27ff64ea4e9cf5d410082a8b97ff1a06c16aa3d2027339cd0f1195c7", + "sha256:c61007e76655af75e6785a931f452915b371dc48f56efd765247c8fe68f2b181" + ], + "index": "pypi", + "version": "==6.0.0" + }, + "freezegun": { + "hashes": [ + "sha256:cd22d1ba06941384410cd967d8a99d5ae2442f57dfafeff2fda5de8dc5c05446", + "sha256:ea1b963b993cb9ea195adbd893a48d573fda951b0da64f60883d7e988b606c9f" + ], + "index": "pypi", + "version": "==1.2.2" + }, + "gitdb": { + "hashes": [ + "sha256:6eb990b69df4e15bad899ea868dc46572c3f75339735663b81de79b06f17eb9a", + "sha256:c286cf298426064079ed96a9e4a9d39e7f3e9bf15ba60701e95f5492f28415c7" + ], + "markers": "python_version >= '3.7'", + "version": "==4.0.10" + }, + "gitpython": { + "hashes": [ + "sha256:41eea0deec2deea139b459ac03656f0dd28fc4a3387240ec1d3c259a2c47850f", + "sha256:cc36bfc4a3f913e66805a28e84703e419d9c264c1077e537b54f0e1af85dbefd" + ], + "markers": "python_version >= '3.7'", + "version": "==3.1.29" + }, + "idna": { + "hashes": [ + "sha256:814f528e8dead7d329833b91c5faa87d60bf71824cd12a7530b5526063d02cb4", + "sha256:90b77e79eaa3eba6de819a0c442c0b4ceefc341a7a2ab77d7562bf49f425c5c2" + ], + "markers": "python_version >= '3.5'", + "version": "==3.4" + }, + "importlib-resources": { + "hashes": [ + "sha256:32bb095bda29741f6ef0e5278c42df98d135391bee5f932841efc0041f748dc3", + "sha256:c09b067d82e72c66f4f8eb12332f5efbebc9b007c0b6c40818108c9870adc363" + ], + "markers": "python_version >= '3.7'", + "version": "==5.10.1" + }, + "iniconfig": { + "hashes": [ + "sha256:011e24c64b7f47f6ebd835bb12a743f2fbe9a26d4cecaa7f53bc4f35ee9da8b3", + "sha256:bc3af051d7d14b2ee5ef9969666def0cd1a000e121eaea580d4a313df4b37f32" + ], + "version": "==1.1.1" + }, + "isort": { + "hashes": [ + "sha256:7c5bd998504826b6f1e6f2f98b533976b066baba29b8bae83fdeefd0b89c6b70", + "sha256:bf02c95f1fe615ebbe13a619cfed1619ddfe8941274c9e3de3143adca406cb02" + ], + "markers": "python_version >= '3.7'", + "version": "==5.11.1" + }, + "jinja2": { + "hashes": [ + "sha256:31351a702a408a9e7595a8fc6150fc3f43bb6bf7e319770cbc0db9df9437e852", + "sha256:6088930bfe239f0e6710546ab9c19c9ef35e29792895fed6e6e31a023a182a61" + ], + "markers": "python_version >= '3.7'", + "version": "==3.1.2" + }, + "jmespath": { + "hashes": [ + "sha256:02e2e4cc71b5bcab88332eebf907519190dd9e6e82107fa7f83b1003a6252980", + "sha256:90261b206d6defd58fdd5e85f478bf633a2901798906be2ad389150c5c60edbe" + ], + "markers": "python_version >= '3.7'", + "version": "==1.0.1" + }, + "jsonschema": { + "hashes": [ + "sha256:0f864437ab8b6076ba6707453ef8f98a6a0d512a80e93f8abdb676f737ecb60d", + "sha256:a870ad254da1a8ca84b6a2905cac29d265f805acc57af304784962a2aa6508f6" + ], + "markers": "python_version >= '3.7'", + "version": "==4.17.3" + }, + "jsonschema-spec": { + "hashes": [ + "sha256:1e525177574c23ae0f55cd62382632a083a0339928f0ca846a975a4da9851cec", + "sha256:780a22d517cdc857d9714a80d8349c546945063f20853ea32ba7f85bc643ec7d" + ], + "markers": "python_version >= '3.7' and python_full_version < '4.0.0'", + "version": "==0.1.2" + }, + "lazy-object-proxy": { + "hashes": [ + "sha256:0c1c7c0433154bb7c54185714c6929acc0ba04ee1b167314a779b9025517eada", + "sha256:14010b49a2f56ec4943b6cf925f597b534ee2fe1f0738c84b3bce0c1a11ff10d", + "sha256:4e2d9f764f1befd8bdc97673261b8bb888764dfdbd7a4d8f55e4fbcabb8c3fb7", + "sha256:4fd031589121ad46e293629b39604031d354043bb5cdf83da4e93c2d7f3389fe", + "sha256:5b51d6f3bfeb289dfd4e95de2ecd464cd51982fe6f00e2be1d0bf94864d58acd", + "sha256:6850e4aeca6d0df35bb06e05c8b934ff7c533734eb51d0ceb2d63696f1e6030c", + "sha256:6f593f26c470a379cf7f5bc6db6b5f1722353e7bf937b8d0d0b3fba911998858", + "sha256:71d9ae8a82203511a6f60ca5a1b9f8ad201cac0fc75038b2dc5fa519589c9288", + "sha256:7e1561626c49cb394268edd00501b289053a652ed762c58e1081224c8d881cec", + "sha256:8f6ce2118a90efa7f62dd38c7dbfffd42f468b180287b748626293bf12ed468f", + "sha256:ae032743794fba4d171b5b67310d69176287b5bf82a21f588282406a79498891", + "sha256:afcaa24e48bb23b3be31e329deb3f1858f1f1df86aea3d70cb5c8578bfe5261c", + "sha256:b70d6e7a332eb0217e7872a73926ad4fdc14f846e85ad6749ad111084e76df25", + "sha256:c219a00245af0f6fa4e95901ed28044544f50152840c5b6a3e7b2568db34d156", + "sha256:ce58b2b3734c73e68f0e30e4e725264d4d6be95818ec0a0be4bb6bf9a7e79aa8", + "sha256:d176f392dbbdaacccf15919c77f526edf11a34aece58b55ab58539807b85436f", + "sha256:e20bfa6db17a39c706d24f82df8352488d2943a3b7ce7d4c22579cb89ca8896e", + "sha256:eac3a9a5ef13b332c059772fd40b4b1c3d45a3a2b05e33a361dee48e54a4dad0", + "sha256:eb329f8d8145379bf5dbe722182410fe8863d186e51bf034d2075eb8d85ee25b" + ], + "markers": "python_version >= '3.7'", + "version": "==1.8.0" + }, + "markupsafe": { + "hashes": [ + "sha256:0212a68688482dc52b2d45013df70d169f542b7394fc744c02a57374a4207003", + "sha256:089cf3dbf0cd6c100f02945abeb18484bd1ee57a079aefd52cffd17fba910b88", + "sha256:10c1bfff05d95783da83491be968e8fe789263689c02724e0c691933c52994f5", + "sha256:33b74d289bd2f5e527beadcaa3f401e0df0a89927c1559c8566c066fa4248ab7", + "sha256:3799351e2336dc91ea70b034983ee71cf2f9533cdff7c14c90ea126bfd95d65a", + "sha256:3ce11ee3f23f79dbd06fb3d63e2f6af7b12db1d46932fe7bd8afa259a5996603", + "sha256:421be9fbf0ffe9ffd7a378aafebbf6f4602d564d34be190fc19a193232fd12b1", + "sha256:43093fb83d8343aac0b1baa75516da6092f58f41200907ef92448ecab8825135", + "sha256:46d00d6cfecdde84d40e572d63735ef81423ad31184100411e6e3388d405e247", + "sha256:4a33dea2b688b3190ee12bd7cfa29d39c9ed176bda40bfa11099a3ce5d3a7ac6", + "sha256:4b9fe39a2ccc108a4accc2676e77da025ce383c108593d65cc909add5c3bd601", + "sha256:56442863ed2b06d19c37f94d999035e15ee982988920e12a5b4ba29b62ad1f77", + "sha256:671cd1187ed5e62818414afe79ed29da836dde67166a9fac6d435873c44fdd02", + "sha256:694deca8d702d5db21ec83983ce0bb4b26a578e71fbdbd4fdcd387daa90e4d5e", + "sha256:6a074d34ee7a5ce3effbc526b7083ec9731bb3cbf921bbe1d3005d4d2bdb3a63", + "sha256:6d0072fea50feec76a4c418096652f2c3238eaa014b2f94aeb1d56a66b41403f", + "sha256:6fbf47b5d3728c6aea2abb0589b5d30459e369baa772e0f37a0320185e87c980", + "sha256:7f91197cc9e48f989d12e4e6fbc46495c446636dfc81b9ccf50bb0ec74b91d4b", + "sha256:86b1f75c4e7c2ac2ccdaec2b9022845dbb81880ca318bb7a0a01fbf7813e3812", + "sha256:8dc1c72a69aa7e082593c4a203dcf94ddb74bb5c8a731e4e1eb68d031e8498ff", + "sha256:8e3dcf21f367459434c18e71b2a9532d96547aef8a871872a5bd69a715c15f96", + "sha256:8e576a51ad59e4bfaac456023a78f6b5e6e7651dcd383bcc3e18d06f9b55d6d1", + "sha256:96e37a3dc86e80bf81758c152fe66dbf60ed5eca3d26305edf01892257049925", + "sha256:97a68e6ada378df82bc9f16b800ab77cbf4b2fada0081794318520138c088e4a", + "sha256:99a2a507ed3ac881b975a2976d59f38c19386d128e7a9a18b7df6fff1fd4c1d6", + "sha256:a49907dd8420c5685cfa064a1335b6754b74541bbb3706c259c02ed65b644b3e", + "sha256:b09bf97215625a311f669476f44b8b318b075847b49316d3e28c08e41a7a573f", + "sha256:b7bd98b796e2b6553da7225aeb61f447f80a1ca64f41d83612e6139ca5213aa4", + "sha256:b87db4360013327109564f0e591bd2a3b318547bcef31b468a92ee504d07ae4f", + "sha256:bcb3ed405ed3222f9904899563d6fc492ff75cce56cba05e32eff40e6acbeaa3", + "sha256:d4306c36ca495956b6d568d276ac11fdd9c30a36f1b6eb928070dc5360b22e1c", + "sha256:d5ee4f386140395a2c818d149221149c54849dfcfcb9f1debfe07a8b8bd63f9a", + "sha256:dda30ba7e87fbbb7eab1ec9f58678558fd9a6b8b853530e176eabd064da81417", + "sha256:e04e26803c9c3851c931eac40c695602c6295b8d432cbe78609649ad9bd2da8a", + "sha256:e1c0b87e09fa55a220f058d1d49d3fb8df88fbfab58558f1198e08c1e1de842a", + "sha256:e72591e9ecd94d7feb70c1cbd7be7b3ebea3f548870aa91e2732960fa4d57a37", + "sha256:e8c843bbcda3a2f1e3c2ab25913c80a3c5376cd00c6e8c4a86a89a28c8dc5452", + "sha256:efc1913fd2ca4f334418481c7e595c00aad186563bbc1ec76067848c7ca0a933", + "sha256:f121a1420d4e173a5d96e47e9a0c0dcff965afdf1626d28de1460815f7c4ee7a", + "sha256:fc7b548b17d238737688817ab67deebb30e8073c95749d55538ed473130ec0c7" + ], + "markers": "python_version >= '3.7'", + "version": "==2.1.1" + }, + "mccabe": { + "hashes": [ + "sha256:348e0240c33b60bbdf4e523192ef919f28cb2c3d7d5c7794f74009290f236325", + "sha256:6c2d30ab6be0e4a46919781807b4f0d834ebdd6c6e3dca0bda5a15f863427b6e" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==0.7.0" + }, + "mock": { + "hashes": [ + "sha256:122fcb64ee37cfad5b3f48d7a7d51875d7031aaf3d8be7c42e2bee25044eee62", + "sha256:7d3fbbde18228f4ff2f1f119a45cdffa458b4c0dee32eb4d2bb2f82554bac7bc" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==4.0.3" + }, + "moto": { + "hashes": [ + "sha256:704d6d38a4e6fe49e1fe9c6b4127ca46c66aac00368149bc1f1d70a0ceff8846", + "sha256:a6388de4a746e0b509286e1d7e70f86900b4f69ec65f6c92c47e570f95d05b14" + ], + "index": "pypi", + "version": "==4.0.11" + }, + "mypy-extensions": { + "hashes": [ + "sha256:090fedd75945a69ae91ce1303b5824f428daf5a028d2f6ab8a299250a846f15d", + "sha256:2d82818f5bb3e369420cb3c4060a7970edba416647068eb4c5343488a6c604a8" + ], + "version": "==0.4.3" + }, + "openapi-schema-validator": { + "hashes": [ + "sha256:34fbd14b7501abe25e64d7b4624a9db02cde1a578d285b3da6f34b290cdf0b3a", + "sha256:7cf27585dd7970b7257cefe48e1a3a10d4e34421831bdb472d96967433bc27bd" + ], + "markers": "python_version >= '3.7' and python_full_version < '4.0.0'", + "version": "==0.3.4" + }, + "openapi-spec-validator": { + "hashes": [ + "sha256:4a8aee1e45b1ac868e07ab25e18828fe9837baddd29a8e20fdb3d3c61c8eea3d", + "sha256:8248634bad1f23cac5d5a34e193ab36e23914057ca69e91a1ede5af75552c465" + ], + "index": "pypi", + "version": "==0.5.1" + }, + "packaging": { + "hashes": [ + "sha256:dd47c42927d89ab911e606518907cc2d3a1f38bbd026385970643f9c5b8ecfeb", + "sha256:ef103e05f519cdc783ae24ea4e2e0f508a9c99b2d4969652eed6a2e1ea5bd522" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==21.3" + }, + "pathable": { + "hashes": [ + "sha256:5c869d315be50776cc8a993f3af43e0c60dc01506b399643f919034ebf4cdcab", + "sha256:cdd7b1f9d7d5c8b8d3315dbf5a86b2596053ae845f056f57d97c0eefff84da14" + ], + "markers": "python_version >= '3.7' and python_full_version < '4.0.0'", + "version": "==0.4.3" + }, + "pathspec": { + "hashes": [ + "sha256:3c95343af8b756205e2aba76e843ba9520a24dd84f68c22b9f93251507509dd6", + "sha256:56200de4077d9d0791465aa9095a01d421861e405b5096955051deefd697d6f6" + ], + "markers": "python_version >= '3.7'", + "version": "==0.10.3" + }, + "pbr": { + "hashes": [ + "sha256:b97bc6695b2aff02144133c2e7399d5885223d42b7912ffaec2ca3898e673bfe", + "sha256:db2317ff07c84c4c63648c9064a79fe9d9f5c7ce85a9099d4b6258b3db83225a" + ], + "markers": "python_version >= '2.6'", + "version": "==5.11.0" + }, + "platformdirs": { + "hashes": [ + "sha256:1a89a12377800c81983db6be069ec068eee989748799b946cce2a6e80dcc54ca", + "sha256:b46ffafa316e6b83b47489d240ce17173f123a9b9c83282141c3daf26ad9ac2e" + ], + "markers": "python_version >= '3.7'", + "version": "==2.6.0" + }, + "pluggy": { + "hashes": [ + "sha256:4224373bacce55f955a878bf9cfa763c1e360858e330072059e10bad68531159", + "sha256:74134bbf457f031a36d68416e1509f34bd5ccc019f0bcc952c7b909d06b37bd3" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==1.0.0" + }, + "pycodestyle": { + "hashes": [ + "sha256:347187bdb476329d98f695c213d7295a846d1152ff4fe9bacb8a9590b8ee7053", + "sha256:8a4eaf0d0495c7395bdab3589ac2db602797d76207242c17d470186815706610" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==2.10.0" + }, + "pycparser": { + "hashes": [ + "sha256:8ee45429555515e1f6b185e78100aea234072576aa43ab53aefcae078162fca9", + "sha256:e644fdec12f7872f86c58ff790da456218b10f863970249516d60a5eaca77206" + ], + "version": "==2.21" + }, + "pyflakes": { + "hashes": [ + "sha256:ec55bf7fe21fff7f1ad2f7da62363d749e2a470500eab1b555334b67aa1ef8cf", + "sha256:ec8b276a6b60bd80defed25add7e439881c19e64850afd9b346283d4165fd0fd" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==3.0.1" + }, + "pylint": { + "hashes": [ + "sha256:ea82cd6a1e11062dc86d555d07c021b0fb65afe39becbe6fe692efd6c4a67443", + "sha256:ec4a87c33da054ab86a6c79afa6771dc8765cb5631620053e727fcf3ef8cbed7" + ], + "index": "pypi", + "version": "==2.15.8" + }, + "pyparsing": { + "hashes": [ + "sha256:2b020ecf7d21b687f219b71ecad3631f644a47f01403fa1d1036b0c6416d70fb", + "sha256:5026bae9a10eeaefb61dab2f09052b9f4307d44aee4eda64b309723d8d206bbc" + ], + "markers": "python_full_version >= '3.6.8'", + "version": "==3.0.9" + }, + "pyrsistent": { + "hashes": [ + "sha256:055ab45d5911d7cae397dc418808d8802fb95262751872c841c170b0dbf51eed", + "sha256:111156137b2e71f3a9936baf27cb322e8024dac3dc54ec7fb9f0bcf3249e68bb", + "sha256:187d5730b0507d9285a96fca9716310d572e5464cadd19f22b63a6976254d77a", + "sha256:21455e2b16000440e896ab99e8304617151981ed40c29e9507ef1c2e4314ee95", + "sha256:2aede922a488861de0ad00c7630a6e2d57e8023e4be72d9d7147a9fcd2d30712", + "sha256:3ba4134a3ff0fc7ad225b6b457d1309f4698108fb6b35532d015dca8f5abed73", + "sha256:456cb30ca8bff00596519f2c53e42c245c09e1a4543945703acd4312949bfd41", + "sha256:71d332b0320642b3261e9fee47ab9e65872c2bd90260e5d225dabeed93cbd42b", + "sha256:879b4c2f4d41585c42df4d7654ddffff1239dc4065bc88b745f0341828b83e78", + "sha256:9cd3e9978d12b5d99cbdc727a3022da0430ad007dacf33d0bf554b96427f33ab", + "sha256:a178209e2df710e3f142cbd05313ba0c5ebed0a55d78d9945ac7a4e09d923308", + "sha256:b39725209e06759217d1ac5fcdb510e98670af9e37223985f330b611f62e7425", + "sha256:bfa0351be89c9fcbcb8c9879b826f4353be10f58f8a677efab0c017bf7137ec2", + "sha256:bfd880614c6237243ff53a0539f1cb26987a6dc8ac6e66e0c5a40617296a045e", + "sha256:c43bec251bbd10e3cb58ced80609c5c1eb238da9ca78b964aea410fb820d00d6", + "sha256:d690b18ac4b3e3cab73b0b7aa7dbe65978a172ff94970ff98d82f2031f8971c2", + "sha256:d6982b5a0237e1b7d876b60265564648a69b14017f3b5f908c5be2de3f9abb7a", + "sha256:dec3eac7549869365fe263831f576c8457f6c833937c68542d08fde73457d291", + "sha256:e371b844cec09d8dc424d940e54bba8f67a03ebea20ff7b7b0d56f526c71d584", + "sha256:e5d8f84d81e3729c3b506657dddfe46e8ba9c330bf1858ee33108f8bb2adb38a", + "sha256:ea6b79a02a28550c98b6ca9c35b9f492beaa54d7c5c9e9949555893c8a9234d0", + "sha256:f1258f4e6c42ad0b20f9cfcc3ada5bd6b83374516cd01c0960e3cb75fdca6770" + ], + "markers": "python_version >= '3.7'", + "version": "==0.19.2" + }, + "pytest": { + "hashes": [ + "sha256:892f933d339f068883b6fd5a459f03d85bfcb355e4981e146d2c7616c21fef71", + "sha256:c4014eb40e10f11f355ad4e3c2fb2c6c6d1919c73f3b5a433de4708202cade59" + ], + "index": "pypi", + "version": "==7.2.0" + }, + "pytest-xdist": { + "hashes": [ + "sha256:40fdb8f3544921c5dfcd486ac080ce22870e71d82ced6d2e78fa97c2addd480c", + "sha256:70a76f191d8a1d2d6be69fc440cdf85f3e4c03c08b520fd5dc5d338d6cf07d89" + ], + "index": "pypi", + "version": "==3.1.0" + }, + "python-dateutil": { + "hashes": [ + "sha256:0123cacc1627ae19ddf3c27a5de5bd67ee4586fbdd6440d9748f8abb483d3e86", + "sha256:961d03dc3453ebbc59dbdea9e4e11c5651520a876d0f4db161e8674aae935da9" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", + "version": "==2.8.2" + }, + "pytz": { + "hashes": [ + "sha256:222439474e9c98fced559f1709d89e6c9cbf8d79c794ff3eb9f8800064291427", + "sha256:e89512406b793ca39f5971bc999cc538ce125c0e51c27941bef4568b460095e2" + ], + "version": "==2022.6" + }, + "pyyaml": { + "hashes": [ + "sha256:01b45c0191e6d66c470b6cf1b9531a771a83c1c4208272ead47a3ae4f2f603bf", + "sha256:0283c35a6a9fbf047493e3a0ce8d79ef5030852c51e9d911a27badfde0605293", + "sha256:055d937d65826939cb044fc8c9b08889e8c743fdc6a32b33e2390f66013e449b", + "sha256:07751360502caac1c067a8132d150cf3d61339af5691fe9e87803040dbc5db57", + "sha256:0b4624f379dab24d3725ffde76559cff63d9ec94e1736b556dacdfebe5ab6d4b", + "sha256:0ce82d761c532fe4ec3f87fc45688bdd3a4c1dc5e0b4a19814b9009a29baefd4", + "sha256:1e4747bc279b4f613a09eb64bba2ba602d8a6664c6ce6396a4d0cd413a50ce07", + "sha256:213c60cd50106436cc818accf5baa1aba61c0189ff610f64f4a3e8c6726218ba", + "sha256:231710d57adfd809ef5d34183b8ed1eeae3f76459c18fb4a0b373ad56bedcdd9", + "sha256:277a0ef2981ca40581a47093e9e2d13b3f1fbbeffae064c1d21bfceba2030287", + "sha256:2cd5df3de48857ed0544b34e2d40e9fac445930039f3cfe4bcc592a1f836d513", + "sha256:40527857252b61eacd1d9af500c3337ba8deb8fc298940291486c465c8b46ec0", + "sha256:432557aa2c09802be39460360ddffd48156e30721f5e8d917f01d31694216782", + "sha256:473f9edb243cb1935ab5a084eb238d842fb8f404ed2193a915d1784b5a6b5fc0", + "sha256:48c346915c114f5fdb3ead70312bd042a953a8ce5c7106d5bfb1a5254e47da92", + "sha256:50602afada6d6cbfad699b0c7bb50d5ccffa7e46a3d738092afddc1f9758427f", + "sha256:68fb519c14306fec9720a2a5b45bc9f0c8d1b9c72adf45c37baedfcd949c35a2", + "sha256:77f396e6ef4c73fdc33a9157446466f1cff553d979bd00ecb64385760c6babdc", + "sha256:81957921f441d50af23654aa6c5e5eaf9b06aba7f0a19c18a538dc7ef291c5a1", + "sha256:819b3830a1543db06c4d4b865e70ded25be52a2e0631ccd2f6a47a2822f2fd7c", + "sha256:897b80890765f037df3403d22bab41627ca8811ae55e9a722fd0392850ec4d86", + "sha256:98c4d36e99714e55cfbaaee6dd5badbc9a1ec339ebfc3b1f52e293aee6bb71a4", + "sha256:9df7ed3b3d2e0ecfe09e14741b857df43adb5a3ddadc919a2d94fbdf78fea53c", + "sha256:9fa600030013c4de8165339db93d182b9431076eb98eb40ee068700c9c813e34", + "sha256:a80a78046a72361de73f8f395f1f1e49f956c6be882eed58505a15f3e430962b", + "sha256:afa17f5bc4d1b10afd4466fd3a44dc0e245382deca5b3c353d8b757f9e3ecb8d", + "sha256:b3d267842bf12586ba6c734f89d1f5b871df0273157918b0ccefa29deb05c21c", + "sha256:b5b9eccad747aabaaffbc6064800670f0c297e52c12754eb1d976c57e4f74dcb", + "sha256:bfaef573a63ba8923503d27530362590ff4f576c626d86a9fed95822a8255fd7", + "sha256:c5687b8d43cf58545ade1fe3e055f70eac7a5a1a0bf42824308d868289a95737", + "sha256:cba8c411ef271aa037d7357a2bc8f9ee8b58b9965831d9e51baf703280dc73d3", + "sha256:d15a181d1ecd0d4270dc32edb46f7cb7733c7c508857278d3d378d14d606db2d", + "sha256:d4b0ba9512519522b118090257be113b9468d804b19d63c71dbcf4a48fa32358", + "sha256:d4db7c7aef085872ef65a8fd7d6d09a14ae91f691dec3e87ee5ee0539d516f53", + "sha256:d4eccecf9adf6fbcc6861a38015c2a64f38b9d94838ac1810a9023a0609e1b78", + "sha256:d67d839ede4ed1b28a4e8909735fc992a923cdb84e618544973d7dfc71540803", + "sha256:daf496c58a8c52083df09b80c860005194014c3698698d1a57cbcfa182142a3a", + "sha256:dbad0e9d368bb989f4515da330b88a057617d16b6a8245084f1b05400f24609f", + "sha256:e61ceaab6f49fb8bdfaa0f92c4b57bcfbea54c09277b1b4f7ac376bfb7a7c174", + "sha256:f84fbc98b019fef2ee9a1cb3ce93e3187a6df0b2538a651bfb890254ba9f90b5" + ], + "markers": "python_version >= '3.6'", + "version": "==6.0" + }, + "requests": { + "hashes": [ + "sha256:7c5599b102feddaa661c826c56ab4fee28bfd17f5abca1ebbe3e7f19d7c97983", + "sha256:8fefa2a1a1365bf5520aac41836fbee479da67864514bdb821f31ce07ce65349" + ], + "markers": "python_version >= '3.7' and python_version < '4'", + "version": "==2.28.1" + }, + "responses": { + "hashes": [ + "sha256:396acb2a13d25297789a5866b4881cf4e46ffd49cc26c43ab1117f40b973102e", + "sha256:dcf294d204d14c436fddcc74caefdbc5764795a40ff4e6a7740ed8ddbf3294be" + ], + "markers": "python_version >= '3.7'", + "version": "==0.22.0" + }, + "ruamel.yaml": { + "hashes": [ + "sha256:742b35d3d665023981bd6d16b3d24248ce5df75fdb4e2924e93a05c1f8b61ca7", + "sha256:8b7ce697a2f212752a35c1ac414471dc16c424c9573be4926b56ff3f5d23b7af" + ], + "markers": "python_version >= '3'", + "version": "==0.17.21" + }, + "ruamel.yaml.clib": { + "hashes": [ + "sha256:045e0626baf1c52e5527bd5db361bc83180faaba2ff586e763d3d5982a876a9e", + "sha256:15910ef4f3e537eea7fe45f8a5d19997479940d9196f357152a09031c5be59f3", + "sha256:184faeaec61dbaa3cace407cffc5819f7b977e75360e8d5ca19461cd851a5fc5", + "sha256:1f08fd5a2bea9c4180db71678e850b995d2a5f4537be0e94557668cf0f5f9497", + "sha256:2aa261c29a5545adfef9296b7e33941f46aa5bbd21164228e833412af4c9c75f", + "sha256:3110a99e0f94a4a3470ff67fc20d3f96c25b13d24c6980ff841e82bafe827cac", + "sha256:3243f48ecd450eddadc2d11b5feb08aca941b5cd98c9b1db14b2fd128be8c697", + "sha256:370445fd795706fd291ab00c9df38a0caed0f17a6fb46b0f607668ecb16ce763", + "sha256:40d030e2329ce5286d6b231b8726959ebbe0404c92f0a578c0e2482182e38282", + "sha256:41d0f1fa4c6830176eef5b276af04c89320ea616655d01327d5ce65e50575c94", + "sha256:4a4d8d417868d68b979076a9be6a38c676eca060785abaa6709c7b31593c35d1", + "sha256:4b3a93bb9bc662fc1f99c5c3ea8e623d8b23ad22f861eb6fce9377ac07ad6072", + "sha256:5bc0667c1eb8f83a3752b71b9c4ba55ef7c7058ae57022dd9b29065186a113d9", + "sha256:721bc4ba4525f53f6a611ec0967bdcee61b31df5a56801281027a3a6d1c2daf5", + "sha256:763d65baa3b952479c4e972669f679fe490eee058d5aa85da483ebae2009d231", + "sha256:7bdb4c06b063f6fd55e472e201317a3bb6cdeeee5d5a38512ea5c01e1acbdd93", + "sha256:8831a2cedcd0f0927f788c5bdf6567d9dc9cc235646a434986a852af1cb54b4b", + "sha256:91a789b4aa0097b78c93e3dc4b40040ba55bef518f84a40d4442f713b4094acb", + "sha256:92460ce908546ab69770b2e576e4f99fbb4ce6ab4b245345a3869a0a0410488f", + "sha256:99e77daab5d13a48a4054803d052ff40780278240a902b880dd37a51ba01a307", + "sha256:a234a20ae07e8469da311e182e70ef6b199d0fbeb6c6cc2901204dd87fb867e8", + "sha256:a7b301ff08055d73223058b5c46c55638917f04d21577c95e00e0c4d79201a6b", + "sha256:be2a7ad8fd8f7442b24323d24ba0b56c51219513cfa45b9ada3b87b76c374d4b", + "sha256:bf9a6bc4a0221538b1a7de3ed7bca4c93c02346853f44e1cd764be0023cd3640", + "sha256:c3ca1fbba4ae962521e5eb66d72998b51f0f4d0f608d3c0347a48e1af262efa7", + "sha256:d000f258cf42fec2b1bbf2863c61d7b8918d31ffee905da62dede869254d3b8a", + "sha256:d5859983f26d8cd7bb5c287ef452e8aacc86501487634573d260968f753e1d71", + "sha256:d5e51e2901ec2366b79f16c2299a03e74ba4531ddcfacc1416639c557aef0ad8", + "sha256:debc87a9516b237d0466a711b18b6ebeb17ba9f391eb7f91c649c5c4ec5006c7", + "sha256:df5828871e6648db72d1c19b4bd24819b80a755c4541d3409f0f7acd0f335c80", + "sha256:ecdf1a604009bd35c674b9225a8fa609e0282d9b896c03dd441a91e5f53b534e", + "sha256:efa08d63ef03d079dcae1dfe334f6c8847ba8b645d08df286358b1f5293d24ab", + "sha256:f01da5790e95815eb5a8a138508c01c758e5f5bc0ce4286c4f7028b8dd7ac3d0", + "sha256:f34019dced51047d6f70cb9383b2ae2853b7fc4dce65129a5acd49f4f9256646" + ], + "markers": "python_version < '3.11' and platform_python_implementation == 'CPython'", + "version": "==0.2.7" + }, + "s3transfer": { + "hashes": [ + "sha256:06176b74f3a15f61f1b4f25a1fc29a4429040b7647133a463da8fa5bd28d5ecd", + "sha256:2ed07d3866f523cc561bf4a00fc5535827981b117dd7876f036b0c1aca42c947" + ], + "markers": "python_version >= '3.7'", + "version": "==0.6.0" + }, + "safety": { + "hashes": [ + "sha256:2227fcac1b22b53c1615af78872b48348661691450aa25d6704a5504dbd1f7e2", + "sha256:a60c11f8952f412cbb165d70cb1f673a3b43a2ba9a93ce11f97e6a4de834aa3a" + ], + "index": "pypi", + "version": "==2.3.5" + }, + "setuptools": { + "hashes": [ + "sha256:57f6f22bde4e042978bcd50176fdb381d7c21a9efa4041202288d3737a0c6a54", + "sha256:a7620757bf984b58deaf32fc8a4577a9bbc0850cf92c20e1ce41c38c19e5fb75" + ], + "markers": "python_version >= '3.7'", + "version": "==65.6.3" + }, + "six": { + "hashes": [ + "sha256:1e61c37477a1626458e36f7b1d82aa5c9b094fa4802892072e49de9c60c4c926", + "sha256:8abb2f1d86890a2dfb989f9a77cfcfd3e47c2a354b01111771326f8aa26e0254" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", + "version": "==1.16.0" + }, + "smmap": { + "hashes": [ + "sha256:2aba19d6a040e78d8b09de5c57e96207b09ed71d8e55ce0959eeee6c8e190d94", + "sha256:c840e62059cd3be204b0c9c9f74be2c09d5648eddd4580d9314c3ecde0b30936" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==5.0.0" + }, + "stevedore": { + "hashes": [ + "sha256:7f8aeb6e3f90f96832c301bff21a7eb5eefbe894c88c506483d355565d88cc1a", + "sha256:aa6436565c069b2946fe4ebff07f5041e0c8bf18c7376dd29edf80cf7d524e4e" + ], + "markers": "python_version >= '3.8'", + "version": "==4.1.1" + }, + "sure": { + "hashes": [ + "sha256:34ae88c846046742ef074036bf311dc90ab152b7bc09c342b281cebf676727a2" + ], + "index": "pypi", + "version": "==2.0.0" + }, + "toml": { + "hashes": [ + "sha256:806143ae5bfb6a3c6e736a764057db0e6a0e05e338b5630894a5f779cabb4f9b", + "sha256:b3bda1d108d5dd99f4a20d24d9c348e91c4db7ab1b749200bded2f839ccbe68f" + ], + "markers": "python_version >= '2.6' and python_version not in '3.0, 3.1, 3.2, 3.3'", + "version": "==0.10.2" + }, + "tomli": { + "hashes": [ + "sha256:939de3e7a6161af0c887ef91b7d41a53e7c5a1ca976325f429cb46ea9bc30ecc", + "sha256:de526c12914f0c550d15924c62d72abc48d6fe7364aa87328337a31007fe8a4f" + ], + "markers": "python_version < '3.11'", + "version": "==2.0.1" + }, + "tomlkit": { + "hashes": [ + "sha256:07de26b0d8cfc18f871aec595fda24d95b08fef89d147caa861939f37230bf4b", + "sha256:71b952e5721688937fb02cf9d354dbcf0785066149d2855e44531ebdd2b65d73" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==0.11.6" + }, + "types-toml": { + "hashes": [ + "sha256:171bdb3163d79a520560f24ba916a9fc9bff81659c5448a9fea89240923722be", + "sha256:b7b5c4977f96ab7b5ac06d8a6590d17c0bf252a96efc03b109c2711fb3e0eafd" + ], + "version": "==0.10.8.1" + }, + "typing-extensions": { + "hashes": [ + "sha256:1511434bb92bf8dd198c12b1cc812e800d4181cfcb867674e0f8279cc93087aa", + "sha256:16fa4864408f655d35ec496218b85f79b3437c829e93320c7c9215ccfd92489e" + ], + "markers": "python_version >= '3.7'", + "version": "==4.4.0" + }, + "urllib3": { + "hashes": [ + "sha256:47cc05d99aaa09c9e72ed5809b60e7ba354e64b59c9c173ac3018642d8bb41fc", + "sha256:c083dd0dce68dbfbe1129d5271cb90f9447dea7d52097c6e0126120c521ddea8" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3, 3.4, 3.5'", + "version": "==1.26.13" + }, + "vulture": { + "hashes": [ + "sha256:2515fa848181001dc8a73aba6a01a1a17406f5d372f24ec7f7191866f9f4997e", + "sha256:e792e903ccc063ec4873a8979dcf11b51ea3d65a2d3b31c113d47be48f0cdcae" + ], + "index": "pypi", + "version": "==2.6" + }, + "websocket-client": { + "hashes": [ + "sha256:d6b06432f184438d99ac1f456eaf22fe1ade524c3dd16e661142dc54e9cba574", + "sha256:d6e8f90ca8e2dd4e8027c4561adeb9456b54044312dba655e7cae652ceb9ae59" + ], + "markers": "python_version >= '3.7'", + "version": "==1.4.2" + }, + "werkzeug": { + "hashes": [ + "sha256:7ea2d48322cc7c0f8b3a215ed73eabd7b5d75d0b50e31ab006286ccff9e00b8f", + "sha256:f979ab81f58d7318e064e99c4506445d60135ac5cd2e177a2de0089bfd4c9bd5" + ], + "markers": "python_version >= '3.7'", + "version": "==2.2.2" + }, + "wrapt": { + "hashes": [ + "sha256:00b6d4ea20a906c0ca56d84f93065b398ab74b927a7a3dbd470f6fc503f95dc3", + "sha256:01c205616a89d09827986bc4e859bcabd64f5a0662a7fe95e0d359424e0e071b", + "sha256:02b41b633c6261feff8ddd8d11c711df6842aba629fdd3da10249a53211a72c4", + "sha256:07f7a7d0f388028b2df1d916e94bbb40624c59b48ecc6cbc232546706fac74c2", + "sha256:11871514607b15cfeb87c547a49bca19fde402f32e2b1c24a632506c0a756656", + "sha256:1b376b3f4896e7930f1f772ac4b064ac12598d1c38d04907e696cc4d794b43d3", + "sha256:21ac0156c4b089b330b7666db40feee30a5d52634cc4560e1905d6529a3897ff", + "sha256:257fd78c513e0fb5cdbe058c27a0624c9884e735bbd131935fd49e9fe719d310", + "sha256:2b39d38039a1fdad98c87279b48bc5dce2c0ca0d73483b12cb72aa9609278e8a", + "sha256:2cf71233a0ed05ccdabe209c606fe0bac7379fdcf687f39b944420d2a09fdb57", + "sha256:2fe803deacd09a233e4762a1adcea5db5d31e6be577a43352936179d14d90069", + "sha256:3232822c7d98d23895ccc443bbdf57c7412c5a65996c30442ebe6ed3df335383", + "sha256:34aa51c45f28ba7f12accd624225e2b1e5a3a45206aa191f6f9aac931d9d56fe", + "sha256:36f582d0c6bc99d5f39cd3ac2a9062e57f3cf606ade29a0a0d6b323462f4dd87", + "sha256:380a85cf89e0e69b7cfbe2ea9f765f004ff419f34194018a6827ac0e3edfed4d", + "sha256:40e7bc81c9e2b2734ea4bc1aceb8a8f0ceaac7c5299bc5d69e37c44d9081d43b", + "sha256:43ca3bbbe97af00f49efb06e352eae40434ca9d915906f77def219b88e85d907", + "sha256:4fcc4649dc762cddacd193e6b55bc02edca674067f5f98166d7713b193932b7f", + "sha256:5a0f54ce2c092aaf439813735584b9537cad479575a09892b8352fea5e988dc0", + "sha256:5a9a0d155deafd9448baff28c08e150d9b24ff010e899311ddd63c45c2445e28", + "sha256:5b02d65b9ccf0ef6c34cba6cf5bf2aab1bb2f49c6090bafeecc9cd81ad4ea1c1", + "sha256:60db23fa423575eeb65ea430cee741acb7c26a1365d103f7b0f6ec412b893853", + "sha256:642c2e7a804fcf18c222e1060df25fc210b9c58db7c91416fb055897fc27e8cc", + "sha256:6a9a25751acb379b466ff6be78a315e2b439d4c94c1e99cb7266d40a537995d3", + "sha256:6b1a564e6cb69922c7fe3a678b9f9a3c54e72b469875aa8018f18b4d1dd1adf3", + "sha256:6d323e1554b3d22cfc03cd3243b5bb815a51f5249fdcbb86fda4bf62bab9e164", + "sha256:6e743de5e9c3d1b7185870f480587b75b1cb604832e380d64f9504a0535912d1", + "sha256:709fe01086a55cf79d20f741f39325018f4df051ef39fe921b1ebe780a66184c", + "sha256:7b7c050ae976e286906dd3f26009e117eb000fb2cf3533398c5ad9ccc86867b1", + "sha256:7d2872609603cb35ca513d7404a94d6d608fc13211563571117046c9d2bcc3d7", + "sha256:7ef58fb89674095bfc57c4069e95d7a31cfdc0939e2a579882ac7d55aadfd2a1", + "sha256:80bb5c256f1415f747011dc3604b59bc1f91c6e7150bd7db03b19170ee06b320", + "sha256:81b19725065dcb43df02b37e03278c011a09e49757287dca60c5aecdd5a0b8ed", + "sha256:833b58d5d0b7e5b9832869f039203389ac7cbf01765639c7309fd50ef619e0b1", + "sha256:88bd7b6bd70a5b6803c1abf6bca012f7ed963e58c68d76ee20b9d751c74a3248", + "sha256:8ad85f7f4e20964db4daadcab70b47ab05c7c1cf2a7c1e51087bfaa83831854c", + "sha256:8c0ce1e99116d5ab21355d8ebe53d9460366704ea38ae4d9f6933188f327b456", + "sha256:8d649d616e5c6a678b26d15ece345354f7c2286acd6db868e65fcc5ff7c24a77", + "sha256:903500616422a40a98a5a3c4ff4ed9d0066f3b4c951fa286018ecdf0750194ef", + "sha256:9736af4641846491aedb3c3f56b9bc5568d92b0692303b5a305301a95dfd38b1", + "sha256:988635d122aaf2bdcef9e795435662bcd65b02f4f4c1ae37fbee7401c440b3a7", + "sha256:9cca3c2cdadb362116235fdbd411735de4328c61425b0aa9f872fd76d02c4e86", + "sha256:9e0fd32e0148dd5dea6af5fee42beb949098564cc23211a88d799e434255a1f4", + "sha256:9f3e6f9e05148ff90002b884fbc2a86bd303ae847e472f44ecc06c2cd2fcdb2d", + "sha256:a85d2b46be66a71bedde836d9e41859879cc54a2a04fad1191eb50c2066f6e9d", + "sha256:a9a52172be0b5aae932bef82a79ec0a0ce87288c7d132946d645eba03f0ad8a8", + "sha256:aa31fdcc33fef9eb2552cbcbfee7773d5a6792c137b359e82879c101e98584c5", + "sha256:b014c23646a467558be7da3d6b9fa409b2c567d2110599b7cf9a0c5992b3b471", + "sha256:b21bb4c09ffabfa0e85e3a6b623e19b80e7acd709b9f91452b8297ace2a8ab00", + "sha256:b5901a312f4d14c59918c221323068fad0540e34324925c8475263841dbdfe68", + "sha256:b9b7a708dd92306328117d8c4b62e2194d00c365f18eff11a9b53c6f923b01e3", + "sha256:d1967f46ea8f2db647c786e78d8cc7e4313dbd1b0aca360592d8027b8508e24d", + "sha256:d52a25136894c63de15a35bc0bdc5adb4b0e173b9c0d07a2be9d3ca64a332735", + "sha256:d77c85fedff92cf788face9bfa3ebaa364448ebb1d765302e9af11bf449ca36d", + "sha256:d79d7d5dc8a32b7093e81e97dad755127ff77bcc899e845f41bf71747af0c569", + "sha256:dbcda74c67263139358f4d188ae5faae95c30929281bc6866d00573783c422b7", + "sha256:ddaea91abf8b0d13443f6dac52e89051a5063c7d014710dcb4d4abb2ff811a59", + "sha256:dee0ce50c6a2dd9056c20db781e9c1cfd33e77d2d569f5d1d9321c641bb903d5", + "sha256:dee60e1de1898bde3b238f18340eec6148986da0455d8ba7848d50470a7a32fb", + "sha256:e2f83e18fe2f4c9e7db597e988f72712c0c3676d337d8b101f6758107c42425b", + "sha256:e3fb1677c720409d5f671e39bac6c9e0e422584e5f518bfd50aa4cbbea02433f", + "sha256:ee2b1b1769f6707a8a445162ea16dddf74285c3964f605877a20e38545c3c462", + "sha256:ee6acae74a2b91865910eef5e7de37dc6895ad96fa23603d1d27ea69df545015", + "sha256:ef3f72c9666bba2bab70d2a8b79f2c6d2c1a42a7f7e2b0ec83bb2f9e383950af" + ], + "markers": "python_version < '3.11'", + "version": "==1.14.1" + }, + "xmltodict": { + "hashes": [ + "sha256:341595a488e3e01a85a9d8911d8912fd922ede5fecc4dce437eb4b6c8d037e56", + "sha256:aa89e8fd76320154a40d19a0df04a4695fb9dc5ba977cbb68ab3e4eb225e7852" + ], + "markers": "python_version >= '3.4'", + "version": "==0.13.0" + }, + "zipp": { + "hashes": [ + "sha256:83a28fcb75844b5c0cdaf5aa4003c2d728c77e05f5aeabe8e95e56727005fbaa", + "sha256:a7a22e05929290a67401440b39690ae6563279bced5f314609d9d03798f56766" + ], + "markers": "python_version < '3.10'", + "version": "==3.11.0" + } } - }, - "develop": { - "astroid": { - "hashes": [ - "sha256:10e0ad5f7b79c435179d0d0f0df69998c4eef4597534aae44910db060baeb907", - "sha256:1493fe8bd3dfd73dc35bd53c9d5b6e49ead98497c47b2307662556a5692d29d7" - ], - "markers": "python_full_version >= '3.7.2'", - "version": "==2.12.13" - }, - "attrs": { - "hashes": [ - "sha256:29adc2665447e5191d0e7c568fde78b21f9672d344281d0c6e1ab085429b22b6", - "sha256:86efa402f67bf2df34f51a335487cf46b1ec130d02b8d39fd248abfd30da551c" - ], - "markers": "python_version >= '3.5'", - "version": "==22.1.0" - }, - "bandit": { - "hashes": [ - "sha256:2d63a8c573417bae338962d4b9b06fbc6080f74ecd955a092849e1e65c717bd2", - "sha256:412d3f259dab4077d0e7f0c11f50f650cc7d10db905d98f6520a95a18049658a" - ], - "index": "pypi", - "version": "==1.7.4" - }, - "black": { - "hashes": [ - "sha256:14ff67aec0a47c424bc99b71005202045dc09270da44a27848d534600ac64fc7", - "sha256:197df8509263b0b8614e1df1756b1dd41be6738eed2ba9e9769f3880c2b9d7b6", - "sha256:1e464456d24e23d11fced2bc8c47ef66d471f845c7b7a42f3bd77bf3d1789650", - "sha256:2039230db3c6c639bd84efe3292ec7b06e9214a2992cd9beb293d639c6402edb", - "sha256:21199526696b8f09c3997e2b4db8d0b108d801a348414264d2eb8eb2532e540d", - "sha256:2644b5d63633702bc2c5f3754b1b475378fbbfb481f62319388235d0cd104c2d", - "sha256:432247333090c8c5366e69627ccb363bc58514ae3e63f7fc75c54b1ea80fa7de", - "sha256:444ebfb4e441254e87bad00c661fe32df9969b2bf224373a448d8aca2132b395", - "sha256:5b9b29da4f564ba8787c119f37d174f2b69cdfdf9015b7d8c5c16121ddc054ae", - "sha256:5cc42ca67989e9c3cf859e84c2bf014f6633db63d1cbdf8fdb666dcd9e77e3fa", - "sha256:5d8f74030e67087b219b032aa33a919fae8806d49c867846bfacde57f43972ef", - "sha256:72ef3925f30e12a184889aac03d77d031056860ccae8a1e519f6cbb742736383", - "sha256:819dc789f4498ecc91438a7de64427c73b45035e2e3680c92e18795a839ebb66", - "sha256:915ace4ff03fdfff953962fa672d44be269deb2eaf88499a0f8805221bc68c87", - "sha256:9311e99228ae10023300ecac05be5a296f60d2fd10fff31cf5c1fa4ca4b1988d", - "sha256:974308c58d057a651d182208a484ce80a26dac0caef2895836a92dd6ebd725e0", - "sha256:b8b49776299fece66bffaafe357d929ca9451450f5466e997a7285ab0fe28e3b", - "sha256:c957b2b4ea88587b46cf49d1dc17681c1e672864fd7af32fc1e9664d572b3458", - "sha256:e41a86c6c650bcecc6633ee3180d80a025db041a8e2398dcc059b3afa8382cd4", - "sha256:f513588da599943e0cde4e32cc9879e825d58720d6557062d1098c5ad80080e1", - "sha256:fba8a281e570adafb79f7755ac8721b6cf1bbf691186a287e990c7929c7692ff" - ], - "index": "pypi", - "version": "==22.10.0" - }, - "boto3": { - "hashes": [ - "sha256:4b4edf893b01c651007d61534c1d248cd2350d311a4e295039bd23fd60bf899a", - "sha256:59aa6c7810a815fb52671f834d10ac4cd80b9c7c01a3cbde670cb41330059464" - ], - "index": "pypi", - "version": "==1.26.19" - }, - "botocore": { - "hashes": [ - "sha256:917807ee4ccca34a2f2848eb4fcf878d9e97a44a911a6965ff556d0830c471fd", - "sha256:a54561e591f5d8e653657ce04dcad09c10ebca9dbefba73471976e522abf038a" - ], - "index": "pypi", - "version": "==1.29.19" - }, - "certifi": { - "hashes": [ - "sha256:0d9c601124e5a6ba9712dbc60d9c53c21e34f5f641fe83002317394311bdce14", - "sha256:90c1a32f1d68f940488354e36370f6cca89f0f106db09518524c88d6ed83f382" - ], - "markers": "python_version >= '3.6'", - "version": "==2022.9.24" - }, - "cffi": { - "hashes": [ - "sha256:00a9ed42e88df81ffae7a8ab6d9356b371399b91dbdf0c3cb1e84c03a13aceb5", - "sha256:03425bdae262c76aad70202debd780501fabeaca237cdfddc008987c0e0f59ef", - "sha256:04ed324bda3cda42b9b695d51bb7d54b680b9719cfab04227cdd1e04e5de3104", - "sha256:0e2642fe3142e4cc4af0799748233ad6da94c62a8bec3a6648bf8ee68b1c7426", - "sha256:173379135477dc8cac4bc58f45db08ab45d228b3363adb7af79436135d028405", - "sha256:198caafb44239b60e252492445da556afafc7d1e3ab7a1fb3f0584ef6d742375", - "sha256:1e74c6b51a9ed6589199c787bf5f9875612ca4a8a0785fb2d4a84429badaf22a", - "sha256:2012c72d854c2d03e45d06ae57f40d78e5770d252f195b93f581acf3ba44496e", - "sha256:21157295583fe8943475029ed5abdcf71eb3911894724e360acff1d61c1d54bc", - "sha256:2470043b93ff09bf8fb1d46d1cb756ce6132c54826661a32d4e4d132e1977adf", - "sha256:285d29981935eb726a4399badae8f0ffdff4f5050eaa6d0cfc3f64b857b77185", - "sha256:30d78fbc8ebf9c92c9b7823ee18eb92f2e6ef79b45ac84db507f52fbe3ec4497", - "sha256:320dab6e7cb2eacdf0e658569d2575c4dad258c0fcc794f46215e1e39f90f2c3", - "sha256:33ab79603146aace82c2427da5ca6e58f2b3f2fb5da893ceac0c42218a40be35", - "sha256:3548db281cd7d2561c9ad9984681c95f7b0e38881201e157833a2342c30d5e8c", - "sha256:3799aecf2e17cf585d977b780ce79ff0dc9b78d799fc694221ce814c2c19db83", - "sha256:39d39875251ca8f612b6f33e6b1195af86d1b3e60086068be9cc053aa4376e21", - "sha256:3b926aa83d1edb5aa5b427b4053dc420ec295a08e40911296b9eb1b6170f6cca", - "sha256:3bcde07039e586f91b45c88f8583ea7cf7a0770df3a1649627bf598332cb6984", - "sha256:3d08afd128ddaa624a48cf2b859afef385b720bb4b43df214f85616922e6a5ac", - "sha256:3eb6971dcff08619f8d91607cfc726518b6fa2a9eba42856be181c6d0d9515fd", - "sha256:40f4774f5a9d4f5e344f31a32b5096977b5d48560c5592e2f3d2c4374bd543ee", - "sha256:4289fc34b2f5316fbb762d75362931e351941fa95fa18789191b33fc4cf9504a", - "sha256:470c103ae716238bbe698d67ad020e1db9d9dba34fa5a899b5e21577e6d52ed2", - "sha256:4f2c9f67e9821cad2e5f480bc8d83b8742896f1242dba247911072d4fa94c192", - "sha256:50a74364d85fd319352182ef59c5c790484a336f6db772c1a9231f1c3ed0cbd7", - "sha256:54a2db7b78338edd780e7ef7f9f6c442500fb0d41a5a4ea24fff1c929d5af585", - "sha256:5635bd9cb9731e6d4a1132a498dd34f764034a8ce60cef4f5319c0541159392f", - "sha256:59c0b02d0a6c384d453fece7566d1c7e6b7bae4fc5874ef2ef46d56776d61c9e", - "sha256:5d598b938678ebf3c67377cdd45e09d431369c3b1a5b331058c338e201f12b27", - "sha256:5df2768244d19ab7f60546d0c7c63ce1581f7af8b5de3eb3004b9b6fc8a9f84b", - "sha256:5ef34d190326c3b1f822a5b7a45f6c4535e2f47ed06fec77d3d799c450b2651e", - "sha256:6975a3fac6bc83c4a65c9f9fcab9e47019a11d3d2cf7f3c0d03431bf145a941e", - "sha256:6c9a799e985904922a4d207a94eae35c78ebae90e128f0c4e521ce339396be9d", - "sha256:70df4e3b545a17496c9b3f41f5115e69a4f2e77e94e1d2a8e1070bc0c38c8a3c", - "sha256:7473e861101c9e72452f9bf8acb984947aa1661a7704553a9f6e4baa5ba64415", - "sha256:8102eaf27e1e448db915d08afa8b41d6c7ca7a04b7d73af6514df10a3e74bd82", - "sha256:87c450779d0914f2861b8526e035c5e6da0a3199d8f1add1a665e1cbc6fc6d02", - "sha256:8b7ee99e510d7b66cdb6c593f21c043c248537a32e0bedf02e01e9553a172314", - "sha256:91fc98adde3d7881af9b59ed0294046f3806221863722ba7d8d120c575314325", - "sha256:94411f22c3985acaec6f83c6df553f2dbe17b698cc7f8ae751ff2237d96b9e3c", - "sha256:98d85c6a2bef81588d9227dde12db8a7f47f639f4a17c9ae08e773aa9c697bf3", - "sha256:9ad5db27f9cabae298d151c85cf2bad1d359a1b9c686a275df03385758e2f914", - "sha256:a0b71b1b8fbf2b96e41c4d990244165e2c9be83d54962a9a1d118fd8657d2045", - "sha256:a0f100c8912c114ff53e1202d0078b425bee3649ae34d7b070e9697f93c5d52d", - "sha256:a591fe9e525846e4d154205572a029f653ada1a78b93697f3b5a8f1f2bc055b9", - "sha256:a5c84c68147988265e60416b57fc83425a78058853509c1b0629c180094904a5", - "sha256:a66d3508133af6e8548451b25058d5812812ec3798c886bf38ed24a98216fab2", - "sha256:a8c4917bd7ad33e8eb21e9a5bbba979b49d9a97acb3a803092cbc1133e20343c", - "sha256:b3bbeb01c2b273cca1e1e0c5df57f12dce9a4dd331b4fa1635b8bec26350bde3", - "sha256:cba9d6b9a7d64d4bd46167096fc9d2f835e25d7e4c121fb2ddfc6528fb0413b2", - "sha256:cc4d65aeeaa04136a12677d3dd0b1c0c94dc43abac5860ab33cceb42b801c1e8", - "sha256:ce4bcc037df4fc5e3d184794f27bdaab018943698f4ca31630bc7f84a7b69c6d", - "sha256:cec7d9412a9102bdc577382c3929b337320c4c4c4849f2c5cdd14d7368c5562d", - "sha256:d400bfb9a37b1351253cb402671cea7e89bdecc294e8016a707f6d1d8ac934f9", - "sha256:d61f4695e6c866a23a21acab0509af1cdfd2c013cf256bbf5b6b5e2695827162", - "sha256:db0fbb9c62743ce59a9ff687eb5f4afbe77e5e8403d6697f7446e5f609976f76", - "sha256:dd86c085fae2efd48ac91dd7ccffcfc0571387fe1193d33b6394db7ef31fe2a4", - "sha256:e00b098126fd45523dd056d2efba6c5a63b71ffe9f2bbe1a4fe1716e1d0c331e", - "sha256:e229a521186c75c8ad9490854fd8bbdd9a0c9aa3a524326b55be83b54d4e0ad9", - "sha256:e263d77ee3dd201c3a142934a086a4450861778baaeeb45db4591ef65550b0a6", - "sha256:ed9cb427ba5504c1dc15ede7d516b84757c3e3d7868ccc85121d9310d27eed0b", - "sha256:fa6693661a4c91757f4412306191b6dc88c1703f780c8234035eac011922bc01", - "sha256:fcd131dd944808b5bdb38e6f5b53013c5aa4f334c5cad0c72742f6eba4b73db0" - ], - "version": "==1.15.1" - }, - "charset-normalizer": { - "hashes": [ - "sha256:5a3d016c7c547f69d6f81fb0db9449ce888b418b5b9952cc5e6e66843e9dd845", - "sha256:83e9a75d1911279afd89352c68b45348559d1fc0506b054b346651b5e7fee29f" - ], - "markers": "python_version >= '3.6'", - "version": "==2.1.1" - }, - "click": { - "hashes": [ - "sha256:7682dc8afb30297001674575ea00d1814d808d6a36af415a82bd481d37ba7b8e", - "sha256:bb4d8133cb15a609f44e8213d9b391b0809795062913b383c62be0ee95b1db48" - ], - "markers": "python_version >= '3.7'", - "version": "==8.1.3" - }, - "coverage": { - "hashes": [ - "sha256:027018943386e7b942fa832372ebc120155fd970837489896099f5cfa2890f79", - "sha256:11b990d520ea75e7ee8dcab5bc908072aaada194a794db9f6d7d5cfd19661e5a", - "sha256:12adf310e4aafddc58afdb04d686795f33f4d7a6fa67a7a9d4ce7d6ae24d949f", - "sha256:1431986dac3923c5945271f169f59c45b8802a114c8f548d611f2015133df77a", - "sha256:1ef221513e6f68b69ee9e159506d583d31aa3567e0ae84eaad9d6ec1107dddaa", - "sha256:20c8ac5386253717e5ccc827caad43ed66fea0efe255727b1053a8154d952398", - "sha256:2198ea6fc548de52adc826f62cb18554caedfb1d26548c1b7c88d8f7faa8f6ba", - "sha256:255758a1e3b61db372ec2736c8e2a1fdfaf563977eedbdf131de003ca5779b7d", - "sha256:265de0fa6778d07de30bcf4d9dc471c3dc4314a23a3c6603d356a3c9abc2dfcf", - "sha256:33a7da4376d5977fbf0a8ed91c4dffaaa8dbf0ddbf4c8eea500a2486d8bc4d7b", - "sha256:42eafe6778551cf006a7c43153af1211c3aaab658d4d66fa5fcc021613d02518", - "sha256:4433b90fae13f86fafff0b326453dd42fc9a639a0d9e4eec4d366436d1a41b6d", - "sha256:4a5375e28c5191ac38cca59b38edd33ef4cc914732c916f2929029b4bfb50795", - "sha256:4a8dbc1f0fbb2ae3de73eb0bdbb914180c7abfbf258e90b311dcd4f585d44bd2", - "sha256:59f53f1dc5b656cafb1badd0feb428c1e7bc19b867479ff72f7a9dd9b479f10e", - "sha256:5dbec3b9095749390c09ab7c89d314727f18800060d8d24e87f01fb9cfb40b32", - "sha256:633713d70ad6bfc49b34ead4060531658dc6dfc9b3eb7d8a716d5873377ab745", - "sha256:6b07130585d54fe8dff3d97b93b0e20290de974dc8177c320aeaf23459219c0b", - "sha256:6c4459b3de97b75e3bd6b7d4b7f0db13f17f504f3d13e2a7c623786289dd670e", - "sha256:6d4817234349a80dbf03640cec6109cd90cba068330703fa65ddf56b60223a6d", - "sha256:723e8130d4ecc8f56e9a611e73b31219595baa3bb252d539206f7bbbab6ffc1f", - "sha256:784f53ebc9f3fd0e2a3f6a78b2be1bd1f5575d7863e10c6e12504f240fd06660", - "sha256:7b6be138d61e458e18d8e6ddcddd36dd96215edfe5f1168de0b1b32635839b62", - "sha256:7ccf362abd726b0410bf8911c31fbf97f09f8f1061f8c1cf03dfc4b6372848f6", - "sha256:83516205e254a0cb77d2d7bb3632ee019d93d9f4005de31dca0a8c3667d5bc04", - "sha256:851cf4ff24062c6aec510a454b2584f6e998cada52d4cb58c5e233d07172e50c", - "sha256:8f830ed581b45b82451a40faabb89c84e1a998124ee4212d440e9c6cf70083e5", - "sha256:94e2565443291bd778421856bc975d351738963071e9b8839ca1fc08b42d4bef", - "sha256:95203854f974e07af96358c0b261f1048d8e1083f2de9b1c565e1be4a3a48cfc", - "sha256:97117225cdd992a9c2a5515db1f66b59db634f59d0679ca1fa3fe8da32749cae", - "sha256:98e8a10b7a314f454d9eff4216a9a94d143a7ee65018dd12442e898ee2310578", - "sha256:a1170fa54185845505fbfa672f1c1ab175446c887cce8212c44149581cf2d466", - "sha256:a6b7d95969b8845250586f269e81e5dfdd8ff828ddeb8567a4a2eaa7313460c4", - "sha256:a8fb6cf131ac4070c9c5a3e21de0f7dc5a0fbe8bc77c9456ced896c12fcdad91", - "sha256:af4fffaffc4067232253715065e30c5a7ec6faac36f8fc8d6f64263b15f74db0", - "sha256:b4a5be1748d538a710f87542f22c2cad22f80545a847ad91ce45e77417293eb4", - "sha256:b5604380f3415ba69de87a289a2b56687faa4fe04dbee0754bfcae433489316b", - "sha256:b9023e237f4c02ff739581ef35969c3739445fb059b060ca51771e69101efffe", - "sha256:bc8ef5e043a2af066fa8cbfc6e708d58017024dc4345a1f9757b329a249f041b", - "sha256:c4ed2820d919351f4167e52425e096af41bfabacb1857186c1ea32ff9983ed75", - "sha256:cca4435eebea7962a52bdb216dec27215d0df64cf27fc1dd538415f5d2b9da6b", - "sha256:d900bb429fdfd7f511f868cedd03a6bbb142f3f9118c09b99ef8dc9bf9643c3c", - "sha256:d9ecf0829c6a62b9b573c7bb6d4dcd6ba8b6f80be9ba4fc7ed50bf4ac9aecd72", - "sha256:dbdb91cd8c048c2b09eb17713b0c12a54fbd587d79adcebad543bc0cd9a3410b", - "sha256:de3001a203182842a4630e7b8d1a2c7c07ec1b45d3084a83d5d227a3806f530f", - "sha256:e07f4a4a9b41583d6eabec04f8b68076ab3cd44c20bd29332c6572dda36f372e", - "sha256:ef8674b0ee8cc11e2d574e3e2998aea5df5ab242e012286824ea3c6970580e53", - "sha256:f4f05d88d9a80ad3cac6244d36dd89a3c00abc16371769f1340101d3cb899fc3", - "sha256:f642e90754ee3e06b0e7e51bce3379590e76b7f76b708e1a71ff043f87025c84", - "sha256:fc2af30ed0d5ae0b1abdb4ebdce598eafd5b35397d4d75deb341a614d333d987" - ], - "index": "pypi", - "version": "==6.5.0" - }, - "cryptography": { - "hashes": [ - "sha256:0e70da4bdff7601b0ef48e6348339e490ebfb0cbe638e083c9c41fb49f00c8bd", - "sha256:10652dd7282de17990b88679cb82f832752c4e8237f0c714be518044269415db", - "sha256:175c1a818b87c9ac80bb7377f5520b7f31b3ef2a0004e2420319beadedb67290", - "sha256:1d7e632804a248103b60b16fb145e8df0bc60eed790ece0d12efe8cd3f3e7744", - "sha256:1f13ddda26a04c06eb57119caf27a524ccae20533729f4b1e4a69b54e07035eb", - "sha256:2ec2a8714dd005949d4019195d72abed84198d877112abb5a27740e217e0ea8d", - "sha256:2fa36a7b2cc0998a3a4d5af26ccb6273f3df133d61da2ba13b3286261e7efb70", - "sha256:2fb481682873035600b5502f0015b664abc26466153fab5c6bc92c1ea69d478b", - "sha256:3178d46f363d4549b9a76264f41c6948752183b3f587666aff0555ac50fd7876", - "sha256:4367da5705922cf7070462e964f66e4ac24162e22ab0a2e9d31f1b270dd78083", - "sha256:4eb85075437f0b1fd8cd66c688469a0c4119e0ba855e3fef86691971b887caf6", - "sha256:50a1494ed0c3f5b4d07650a68cd6ca62efe8b596ce743a5c94403e6f11bf06c1", - "sha256:53049f3379ef05182864d13bb9686657659407148f901f3f1eee57a733fb4b00", - "sha256:6391e59ebe7c62d9902c24a4d8bcbc79a68e7c4ab65863536127c8a9cd94043b", - "sha256:67461b5ebca2e4c2ab991733f8ab637a7265bb582f07c7c88914b5afb88cb95b", - "sha256:78e47e28ddc4ace41dd38c42e6feecfdadf9c3be2af389abbfeef1ff06822285", - "sha256:80ca53981ceeb3241998443c4964a387771588c4e4a5d92735a493af868294f9", - "sha256:8a4b2bdb68a447fadebfd7d24855758fe2d6fecc7fed0b78d190b1af39a8e3b0", - "sha256:8e45653fb97eb2f20b8c96f9cd2b3a0654d742b47d638cf2897afbd97f80fa6d", - "sha256:998cd19189d8a747b226d24c0207fdaa1e6658a1d3f2494541cb9dfbf7dcb6d2", - "sha256:a10498349d4c8eab7357a8f9aa3463791292845b79597ad1b98a543686fb1ec8", - "sha256:b4cad0cea995af760f82820ab4ca54e5471fc782f70a007f31531957f43e9dee", - "sha256:bfe6472507986613dc6cc00b3d492b2f7564b02b3b3682d25ca7f40fa3fd321b", - "sha256:c9e0d79ee4c56d841bd4ac6e7697c8ff3c8d6da67379057f29e66acffcd1e9a7", - "sha256:ca57eb3ddaccd1112c18fc80abe41db443cc2e9dcb1917078e02dfa010a4f353", - "sha256:ce127dd0a6a0811c251a6cddd014d292728484e530d80e872ad9806cfb1c5b3c" - ], - "markers": "python_version >= '3.6'", - "version": "==38.0.4" - }, - "dill": { - "hashes": [ - "sha256:a07ffd2351b8c678dfc4a856a3005f8067aea51d6ba6c700796a4d9e280f39f0", - "sha256:e5db55f3687856d8fbdab002ed78544e1c4559a130302693d839dfe8f93f2373" - ], - "markers": "python_version >= '3.7'", - "version": "==0.3.6" - }, - "docker": { - "hashes": [ - "sha256:896c4282e5c7af5c45e8b683b0b0c33932974fe6e50fc6906a0a83616ab3da97", - "sha256:dbcb3bd2fa80dca0788ed908218bf43972772009b881ed1e20dfc29a65e49782" - ], - "index": "pypi", - "version": "==6.0.1" - }, - "dparse": { - "hashes": [ - "sha256:8097076f1dd26c377f30d4745e6ec18fef42f3bf493933b842ac5bafad8c345f", - "sha256:d45255bda21f998bc7ddf2afd5e62505ba6134756ba2d42a84c56b0826614dfe" - ], - "markers": "python_version >= '3.5'", - "version": "==0.6.2" - }, - "exceptiongroup": { - "hashes": [ - "sha256:542adf9dea4055530d6e1279602fa5cb11dab2395fa650b8674eaec35fc4a828", - "sha256:bd14967b79cd9bdb54d97323216f8fdf533e278df937aa2a90089e7d6e06e5ec" - ], - "markers": "python_version < '3.11'", - "version": "==1.0.4" - }, - "execnet": { - "hashes": [ - "sha256:8f694f3ba9cc92cab508b152dcfe322153975c29bda272e2fd7f3f00f36e47c5", - "sha256:a295f7cc774947aac58dde7fdc85f4aa00c42adf5d8f5468fc630c1acf30a142" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3, 3.4'", - "version": "==1.9.0" - }, - "flake8": { - "hashes": [ - "sha256:3833794e27ff64ea4e9cf5d410082a8b97ff1a06c16aa3d2027339cd0f1195c7", - "sha256:c61007e76655af75e6785a931f452915b371dc48f56efd765247c8fe68f2b181" - ], - "index": "pypi", - "version": "==6.0.0" - }, - "freezegun": { - "hashes": [ - "sha256:cd22d1ba06941384410cd967d8a99d5ae2442f57dfafeff2fda5de8dc5c05446", - "sha256:ea1b963b993cb9ea195adbd893a48d573fda951b0da64f60883d7e988b606c9f" - ], - "index": "pypi", - "version": "==1.2.2" - }, - "gitdb": { - "hashes": [ - "sha256:6eb990b69df4e15bad899ea868dc46572c3f75339735663b81de79b06f17eb9a", - "sha256:c286cf298426064079ed96a9e4a9d39e7f3e9bf15ba60701e95f5492f28415c7" - ], - "markers": "python_version >= '3.7'", - "version": "==4.0.10" - }, - "gitpython": { - "hashes": [ - "sha256:41eea0deec2deea139b459ac03656f0dd28fc4a3387240ec1d3c259a2c47850f", - "sha256:cc36bfc4a3f913e66805a28e84703e419d9c264c1077e537b54f0e1af85dbefd" - ], - "markers": "python_version >= '3.7'", - "version": "==3.1.29" - }, - "idna": { - "hashes": [ - "sha256:814f528e8dead7d329833b91c5faa87d60bf71824cd12a7530b5526063d02cb4", - "sha256:90b77e79eaa3eba6de819a0c442c0b4ceefc341a7a2ab77d7562bf49f425c5c2" - ], - "markers": "python_version >= '3.5'", - "version": "==3.4" - }, - "importlib-resources": { - "hashes": [ - "sha256:c01b1b94210d9849f286b86bb51bcea7cd56dde0600d8db721d7b81330711668", - "sha256:ee17ec648f85480d523596ce49eae8ead87d5631ae1551f913c0100b5edd3437" - ], - "markers": "python_version >= '3.7'", - "version": "==5.10.0" - }, - "iniconfig": { - "hashes": [ - "sha256:011e24c64b7f47f6ebd835bb12a743f2fbe9a26d4cecaa7f53bc4f35ee9da8b3", - "sha256:bc3af051d7d14b2ee5ef9969666def0cd1a000e121eaea580d4a313df4b37f32" - ], - "version": "==1.1.1" - }, - "isort": { - "hashes": [ - "sha256:6f62d78e2f89b4500b080fe3a81690850cd254227f27f75c3a0c491a1f351ba7", - "sha256:e8443a5e7a020e9d7f97f1d7d9cd17c88bcb3bc7e218bf9cf5095fe550be2951" - ], - "markers": "python_full_version >= '3.6.1' and python_full_version < '4.0.0'", - "version": "==5.10.1" - }, - "jinja2": { - "hashes": [ - "sha256:31351a702a408a9e7595a8fc6150fc3f43bb6bf7e319770cbc0db9df9437e852", - "sha256:6088930bfe239f0e6710546ab9c19c9ef35e29792895fed6e6e31a023a182a61" - ], - "markers": "python_version >= '3.7'", - "version": "==3.1.2" - }, - "jmespath": { - "hashes": [ - "sha256:02e2e4cc71b5bcab88332eebf907519190dd9e6e82107fa7f83b1003a6252980", - "sha256:90261b206d6defd58fdd5e85f478bf633a2901798906be2ad389150c5c60edbe" - ], - "markers": "python_version >= '3.7'", - "version": "==1.0.1" - }, - "jsonschema": { - "hashes": [ - "sha256:0f864437ab8b6076ba6707453ef8f98a6a0d512a80e93f8abdb676f737ecb60d", - "sha256:a870ad254da1a8ca84b6a2905cac29d265f805acc57af304784962a2aa6508f6" - ], - "markers": "python_version >= '3.7'", - "version": "==4.17.3" - }, - "jsonschema-spec": { - "hashes": [ - "sha256:1e525177574c23ae0f55cd62382632a083a0339928f0ca846a975a4da9851cec", - "sha256:780a22d517cdc857d9714a80d8349c546945063f20853ea32ba7f85bc643ec7d" - ], - "markers": "python_version >= '3.7' and python_full_version < '4.0.0'", - "version": "==0.1.2" - }, - "lazy-object-proxy": { - "hashes": [ - "sha256:0c1c7c0433154bb7c54185714c6929acc0ba04ee1b167314a779b9025517eada", - "sha256:14010b49a2f56ec4943b6cf925f597b534ee2fe1f0738c84b3bce0c1a11ff10d", - "sha256:4e2d9f764f1befd8bdc97673261b8bb888764dfdbd7a4d8f55e4fbcabb8c3fb7", - "sha256:4fd031589121ad46e293629b39604031d354043bb5cdf83da4e93c2d7f3389fe", - "sha256:5b51d6f3bfeb289dfd4e95de2ecd464cd51982fe6f00e2be1d0bf94864d58acd", - "sha256:6850e4aeca6d0df35bb06e05c8b934ff7c533734eb51d0ceb2d63696f1e6030c", - "sha256:6f593f26c470a379cf7f5bc6db6b5f1722353e7bf937b8d0d0b3fba911998858", - "sha256:71d9ae8a82203511a6f60ca5a1b9f8ad201cac0fc75038b2dc5fa519589c9288", - "sha256:7e1561626c49cb394268edd00501b289053a652ed762c58e1081224c8d881cec", - "sha256:8f6ce2118a90efa7f62dd38c7dbfffd42f468b180287b748626293bf12ed468f", - "sha256:ae032743794fba4d171b5b67310d69176287b5bf82a21f588282406a79498891", - "sha256:afcaa24e48bb23b3be31e329deb3f1858f1f1df86aea3d70cb5c8578bfe5261c", - "sha256:b70d6e7a332eb0217e7872a73926ad4fdc14f846e85ad6749ad111084e76df25", - "sha256:c219a00245af0f6fa4e95901ed28044544f50152840c5b6a3e7b2568db34d156", - "sha256:ce58b2b3734c73e68f0e30e4e725264d4d6be95818ec0a0be4bb6bf9a7e79aa8", - "sha256:d176f392dbbdaacccf15919c77f526edf11a34aece58b55ab58539807b85436f", - "sha256:e20bfa6db17a39c706d24f82df8352488d2943a3b7ce7d4c22579cb89ca8896e", - "sha256:eac3a9a5ef13b332c059772fd40b4b1c3d45a3a2b05e33a361dee48e54a4dad0", - "sha256:eb329f8d8145379bf5dbe722182410fe8863d186e51bf034d2075eb8d85ee25b" - ], - "markers": "python_version >= '3.7'", - "version": "==1.8.0" - }, - "markupsafe": { - "hashes": [ - "sha256:0212a68688482dc52b2d45013df70d169f542b7394fc744c02a57374a4207003", - "sha256:089cf3dbf0cd6c100f02945abeb18484bd1ee57a079aefd52cffd17fba910b88", - "sha256:10c1bfff05d95783da83491be968e8fe789263689c02724e0c691933c52994f5", - "sha256:33b74d289bd2f5e527beadcaa3f401e0df0a89927c1559c8566c066fa4248ab7", - "sha256:3799351e2336dc91ea70b034983ee71cf2f9533cdff7c14c90ea126bfd95d65a", - "sha256:3ce11ee3f23f79dbd06fb3d63e2f6af7b12db1d46932fe7bd8afa259a5996603", - "sha256:421be9fbf0ffe9ffd7a378aafebbf6f4602d564d34be190fc19a193232fd12b1", - "sha256:43093fb83d8343aac0b1baa75516da6092f58f41200907ef92448ecab8825135", - "sha256:46d00d6cfecdde84d40e572d63735ef81423ad31184100411e6e3388d405e247", - "sha256:4a33dea2b688b3190ee12bd7cfa29d39c9ed176bda40bfa11099a3ce5d3a7ac6", - "sha256:4b9fe39a2ccc108a4accc2676e77da025ce383c108593d65cc909add5c3bd601", - "sha256:56442863ed2b06d19c37f94d999035e15ee982988920e12a5b4ba29b62ad1f77", - "sha256:671cd1187ed5e62818414afe79ed29da836dde67166a9fac6d435873c44fdd02", - "sha256:694deca8d702d5db21ec83983ce0bb4b26a578e71fbdbd4fdcd387daa90e4d5e", - "sha256:6a074d34ee7a5ce3effbc526b7083ec9731bb3cbf921bbe1d3005d4d2bdb3a63", - "sha256:6d0072fea50feec76a4c418096652f2c3238eaa014b2f94aeb1d56a66b41403f", - "sha256:6fbf47b5d3728c6aea2abb0589b5d30459e369baa772e0f37a0320185e87c980", - "sha256:7f91197cc9e48f989d12e4e6fbc46495c446636dfc81b9ccf50bb0ec74b91d4b", - "sha256:86b1f75c4e7c2ac2ccdaec2b9022845dbb81880ca318bb7a0a01fbf7813e3812", - "sha256:8dc1c72a69aa7e082593c4a203dcf94ddb74bb5c8a731e4e1eb68d031e8498ff", - "sha256:8e3dcf21f367459434c18e71b2a9532d96547aef8a871872a5bd69a715c15f96", - "sha256:8e576a51ad59e4bfaac456023a78f6b5e6e7651dcd383bcc3e18d06f9b55d6d1", - "sha256:96e37a3dc86e80bf81758c152fe66dbf60ed5eca3d26305edf01892257049925", - "sha256:97a68e6ada378df82bc9f16b800ab77cbf4b2fada0081794318520138c088e4a", - "sha256:99a2a507ed3ac881b975a2976d59f38c19386d128e7a9a18b7df6fff1fd4c1d6", - "sha256:a49907dd8420c5685cfa064a1335b6754b74541bbb3706c259c02ed65b644b3e", - "sha256:b09bf97215625a311f669476f44b8b318b075847b49316d3e28c08e41a7a573f", - "sha256:b7bd98b796e2b6553da7225aeb61f447f80a1ca64f41d83612e6139ca5213aa4", - "sha256:b87db4360013327109564f0e591bd2a3b318547bcef31b468a92ee504d07ae4f", - "sha256:bcb3ed405ed3222f9904899563d6fc492ff75cce56cba05e32eff40e6acbeaa3", - "sha256:d4306c36ca495956b6d568d276ac11fdd9c30a36f1b6eb928070dc5360b22e1c", - "sha256:d5ee4f386140395a2c818d149221149c54849dfcfcb9f1debfe07a8b8bd63f9a", - "sha256:dda30ba7e87fbbb7eab1ec9f58678558fd9a6b8b853530e176eabd064da81417", - "sha256:e04e26803c9c3851c931eac40c695602c6295b8d432cbe78609649ad9bd2da8a", - "sha256:e1c0b87e09fa55a220f058d1d49d3fb8df88fbfab58558f1198e08c1e1de842a", - "sha256:e72591e9ecd94d7feb70c1cbd7be7b3ebea3f548870aa91e2732960fa4d57a37", - "sha256:e8c843bbcda3a2f1e3c2ab25913c80a3c5376cd00c6e8c4a86a89a28c8dc5452", - "sha256:efc1913fd2ca4f334418481c7e595c00aad186563bbc1ec76067848c7ca0a933", - "sha256:f121a1420d4e173a5d96e47e9a0c0dcff965afdf1626d28de1460815f7c4ee7a", - "sha256:fc7b548b17d238737688817ab67deebb30e8073c95749d55538ed473130ec0c7" - ], - "markers": "python_version >= '3.7'", - "version": "==2.1.1" - }, - "mccabe": { - "hashes": [ - "sha256:348e0240c33b60bbdf4e523192ef919f28cb2c3d7d5c7794f74009290f236325", - "sha256:6c2d30ab6be0e4a46919781807b4f0d834ebdd6c6e3dca0bda5a15f863427b6e" - ], - "markers": "python_version >= '3.6'", - "version": "==0.7.0" - }, - "mock": { - "hashes": [ - "sha256:122fcb64ee37cfad5b3f48d7a7d51875d7031aaf3d8be7c42e2bee25044eee62", - "sha256:7d3fbbde18228f4ff2f1f119a45cdffa458b4c0dee32eb4d2bb2f82554bac7bc" - ], - "markers": "python_version >= '3.6'", - "version": "==4.0.3" - }, - "moto": { - "hashes": [ - "sha256:356bf792b439228891c910e2a0fafd4264334cf9000b508c732ff43d8694fb6a", - "sha256:9ba96d04a472d5682493cad7fee33337da34ebef18b397af1ea6dfb41efbe148" - ], - "index": "pypi", - "version": "==4.0.10" - }, - "mypy-extensions": { - "hashes": [ - "sha256:090fedd75945a69ae91ce1303b5824f428daf5a028d2f6ab8a299250a846f15d", - "sha256:2d82818f5bb3e369420cb3c4060a7970edba416647068eb4c5343488a6c604a8" - ], - "version": "==0.4.3" - }, - "openapi-schema-validator": { - "hashes": [ - "sha256:34fbd14b7501abe25e64d7b4624a9db02cde1a578d285b3da6f34b290cdf0b3a", - "sha256:7cf27585dd7970b7257cefe48e1a3a10d4e34421831bdb472d96967433bc27bd" - ], - "markers": "python_version >= '3.7' and python_full_version < '4.0.0'", - "version": "==0.3.4" - }, - "openapi-spec-validator": { - "hashes": [ - "sha256:4a8aee1e45b1ac868e07ab25e18828fe9837baddd29a8e20fdb3d3c61c8eea3d", - "sha256:8248634bad1f23cac5d5a34e193ab36e23914057ca69e91a1ede5af75552c465" - ], - "index": "pypi", - "version": "==0.5.1" - }, - "packaging": { - "hashes": [ - "sha256:dd47c42927d89ab911e606518907cc2d3a1f38bbd026385970643f9c5b8ecfeb", - "sha256:ef103e05f519cdc783ae24ea4e2e0f508a9c99b2d4969652eed6a2e1ea5bd522" - ], - "markers": "python_version >= '3.6'", - "version": "==21.3" - }, - "pathable": { - "hashes": [ - "sha256:5c869d315be50776cc8a993f3af43e0c60dc01506b399643f919034ebf4cdcab", - "sha256:cdd7b1f9d7d5c8b8d3315dbf5a86b2596053ae845f056f57d97c0eefff84da14" - ], - "markers": "python_version >= '3.7' and python_full_version < '4.0.0'", - "version": "==0.4.3" - }, - "pathspec": { - "hashes": [ - "sha256:88c2606f2c1e818b978540f73ecc908e13999c6c3a383daf3705652ae79807a5", - "sha256:8f6bf73e5758fd365ef5d58ce09ac7c27d2833a8d7da51712eac6e27e35141b0" - ], - "markers": "python_version >= '3.7'", - "version": "==0.10.2" - }, - "pbr": { - "hashes": [ - "sha256:b97bc6695b2aff02144133c2e7399d5885223d42b7912ffaec2ca3898e673bfe", - "sha256:db2317ff07c84c4c63648c9064a79fe9d9f5c7ce85a9099d4b6258b3db83225a" - ], - "markers": "python_version >= '2.6'", - "version": "==5.11.0" - }, - "platformdirs": { - "hashes": [ - "sha256:1006647646d80f16130f052404c6b901e80ee4ed6bef6792e1f238a8969106f7", - "sha256:af0276409f9a02373d540bf8480021a048711d572745aef4b7842dad245eba10" - ], - "markers": "python_version >= '3.7'", - "version": "==2.5.4" - }, - "pluggy": { - "hashes": [ - "sha256:4224373bacce55f955a878bf9cfa763c1e360858e330072059e10bad68531159", - "sha256:74134bbf457f031a36d68416e1509f34bd5ccc019f0bcc952c7b909d06b37bd3" - ], - "markers": "python_version >= '3.6'", - "version": "==1.0.0" - }, - "pycodestyle": { - "hashes": [ - "sha256:347187bdb476329d98f695c213d7295a846d1152ff4fe9bacb8a9590b8ee7053", - "sha256:8a4eaf0d0495c7395bdab3589ac2db602797d76207242c17d470186815706610" - ], - "markers": "python_version >= '3.6'", - "version": "==2.10.0" - }, - "pycparser": { - "hashes": [ - "sha256:8ee45429555515e1f6b185e78100aea234072576aa43ab53aefcae078162fca9", - "sha256:e644fdec12f7872f86c58ff790da456218b10f863970249516d60a5eaca77206" - ], - "version": "==2.21" - }, - "pyflakes": { - "hashes": [ - "sha256:ec55bf7fe21fff7f1ad2f7da62363d749e2a470500eab1b555334b67aa1ef8cf", - "sha256:ec8b276a6b60bd80defed25add7e439881c19e64850afd9b346283d4165fd0fd" - ], - "markers": "python_version >= '3.6'", - "version": "==3.0.1" - }, - "pylint": { - "hashes": [ - "sha256:1d561d1d3e8be9dd880edc685162fbdaa0409c88b9b7400873c0cf345602e326", - "sha256:91e4776dbcb4b4d921a3e4b6fec669551107ba11f29d9199154a01622e460a57" - ], - "index": "pypi", - "version": "==2.15.7" - }, - "pyparsing": { - "hashes": [ - "sha256:2b020ecf7d21b687f219b71ecad3631f644a47f01403fa1d1036b0c6416d70fb", - "sha256:5026bae9a10eeaefb61dab2f09052b9f4307d44aee4eda64b309723d8d206bbc" - ], - "markers": "python_full_version >= '3.6.8'", - "version": "==3.0.9" - }, - "pyrsistent": { - "hashes": [ - "sha256:055ab45d5911d7cae397dc418808d8802fb95262751872c841c170b0dbf51eed", - "sha256:111156137b2e71f3a9936baf27cb322e8024dac3dc54ec7fb9f0bcf3249e68bb", - "sha256:187d5730b0507d9285a96fca9716310d572e5464cadd19f22b63a6976254d77a", - "sha256:21455e2b16000440e896ab99e8304617151981ed40c29e9507ef1c2e4314ee95", - "sha256:2aede922a488861de0ad00c7630a6e2d57e8023e4be72d9d7147a9fcd2d30712", - "sha256:3ba4134a3ff0fc7ad225b6b457d1309f4698108fb6b35532d015dca8f5abed73", - "sha256:456cb30ca8bff00596519f2c53e42c245c09e1a4543945703acd4312949bfd41", - "sha256:71d332b0320642b3261e9fee47ab9e65872c2bd90260e5d225dabeed93cbd42b", - "sha256:879b4c2f4d41585c42df4d7654ddffff1239dc4065bc88b745f0341828b83e78", - "sha256:9cd3e9978d12b5d99cbdc727a3022da0430ad007dacf33d0bf554b96427f33ab", - "sha256:a178209e2df710e3f142cbd05313ba0c5ebed0a55d78d9945ac7a4e09d923308", - "sha256:b39725209e06759217d1ac5fcdb510e98670af9e37223985f330b611f62e7425", - "sha256:bfa0351be89c9fcbcb8c9879b826f4353be10f58f8a677efab0c017bf7137ec2", - "sha256:bfd880614c6237243ff53a0539f1cb26987a6dc8ac6e66e0c5a40617296a045e", - "sha256:c43bec251bbd10e3cb58ced80609c5c1eb238da9ca78b964aea410fb820d00d6", - "sha256:d690b18ac4b3e3cab73b0b7aa7dbe65978a172ff94970ff98d82f2031f8971c2", - "sha256:d6982b5a0237e1b7d876b60265564648a69b14017f3b5f908c5be2de3f9abb7a", - "sha256:dec3eac7549869365fe263831f576c8457f6c833937c68542d08fde73457d291", - "sha256:e371b844cec09d8dc424d940e54bba8f67a03ebea20ff7b7b0d56f526c71d584", - "sha256:e5d8f84d81e3729c3b506657dddfe46e8ba9c330bf1858ee33108f8bb2adb38a", - "sha256:ea6b79a02a28550c98b6ca9c35b9f492beaa54d7c5c9e9949555893c8a9234d0", - "sha256:f1258f4e6c42ad0b20f9cfcc3ada5bd6b83374516cd01c0960e3cb75fdca6770" - ], - "markers": "python_version >= '3.7'", - "version": "==0.19.2" - }, - "pytest": { - "hashes": [ - "sha256:892f933d339f068883b6fd5a459f03d85bfcb355e4981e146d2c7616c21fef71", - "sha256:c4014eb40e10f11f355ad4e3c2fb2c6c6d1919c73f3b5a433de4708202cade59" - ], - "index": "pypi", - "version": "==7.2.0" - }, - "pytest-xdist": { - "hashes": [ - "sha256:688da9b814370e891ba5de650c9327d1a9d861721a524eb917e620eec3e90291", - "sha256:9feb9a18e1790696ea23e1434fa73b325ed4998b0e9fcb221f16fd1945e6df1b" - ], - "index": "pypi", - "version": "==3.0.2" - }, - "python-dateutil": { - "hashes": [ - "sha256:0123cacc1627ae19ddf3c27a5de5bd67ee4586fbdd6440d9748f8abb483d3e86", - "sha256:961d03dc3453ebbc59dbdea9e4e11c5651520a876d0f4db161e8674aae935da9" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", - "version": "==2.8.2" - }, - "pytz": { - "hashes": [ - "sha256:222439474e9c98fced559f1709d89e6c9cbf8d79c794ff3eb9f8800064291427", - "sha256:e89512406b793ca39f5971bc999cc538ce125c0e51c27941bef4568b460095e2" - ], - "version": "==2022.6" - }, - "pyyaml": { - "hashes": [ - "sha256:01b45c0191e6d66c470b6cf1b9531a771a83c1c4208272ead47a3ae4f2f603bf", - "sha256:0283c35a6a9fbf047493e3a0ce8d79ef5030852c51e9d911a27badfde0605293", - "sha256:055d937d65826939cb044fc8c9b08889e8c743fdc6a32b33e2390f66013e449b", - "sha256:07751360502caac1c067a8132d150cf3d61339af5691fe9e87803040dbc5db57", - "sha256:0b4624f379dab24d3725ffde76559cff63d9ec94e1736b556dacdfebe5ab6d4b", - "sha256:0ce82d761c532fe4ec3f87fc45688bdd3a4c1dc5e0b4a19814b9009a29baefd4", - "sha256:1e4747bc279b4f613a09eb64bba2ba602d8a6664c6ce6396a4d0cd413a50ce07", - "sha256:213c60cd50106436cc818accf5baa1aba61c0189ff610f64f4a3e8c6726218ba", - "sha256:231710d57adfd809ef5d34183b8ed1eeae3f76459c18fb4a0b373ad56bedcdd9", - "sha256:277a0ef2981ca40581a47093e9e2d13b3f1fbbeffae064c1d21bfceba2030287", - "sha256:2cd5df3de48857ed0544b34e2d40e9fac445930039f3cfe4bcc592a1f836d513", - "sha256:40527857252b61eacd1d9af500c3337ba8deb8fc298940291486c465c8b46ec0", - "sha256:432557aa2c09802be39460360ddffd48156e30721f5e8d917f01d31694216782", - "sha256:473f9edb243cb1935ab5a084eb238d842fb8f404ed2193a915d1784b5a6b5fc0", - "sha256:48c346915c114f5fdb3ead70312bd042a953a8ce5c7106d5bfb1a5254e47da92", - "sha256:50602afada6d6cbfad699b0c7bb50d5ccffa7e46a3d738092afddc1f9758427f", - "sha256:68fb519c14306fec9720a2a5b45bc9f0c8d1b9c72adf45c37baedfcd949c35a2", - "sha256:77f396e6ef4c73fdc33a9157446466f1cff553d979bd00ecb64385760c6babdc", - "sha256:81957921f441d50af23654aa6c5e5eaf9b06aba7f0a19c18a538dc7ef291c5a1", - "sha256:819b3830a1543db06c4d4b865e70ded25be52a2e0631ccd2f6a47a2822f2fd7c", - "sha256:897b80890765f037df3403d22bab41627ca8811ae55e9a722fd0392850ec4d86", - "sha256:98c4d36e99714e55cfbaaee6dd5badbc9a1ec339ebfc3b1f52e293aee6bb71a4", - "sha256:9df7ed3b3d2e0ecfe09e14741b857df43adb5a3ddadc919a2d94fbdf78fea53c", - "sha256:9fa600030013c4de8165339db93d182b9431076eb98eb40ee068700c9c813e34", - "sha256:a80a78046a72361de73f8f395f1f1e49f956c6be882eed58505a15f3e430962b", - "sha256:afa17f5bc4d1b10afd4466fd3a44dc0e245382deca5b3c353d8b757f9e3ecb8d", - "sha256:b3d267842bf12586ba6c734f89d1f5b871df0273157918b0ccefa29deb05c21c", - "sha256:b5b9eccad747aabaaffbc6064800670f0c297e52c12754eb1d976c57e4f74dcb", - "sha256:bfaef573a63ba8923503d27530362590ff4f576c626d86a9fed95822a8255fd7", - "sha256:c5687b8d43cf58545ade1fe3e055f70eac7a5a1a0bf42824308d868289a95737", - "sha256:cba8c411ef271aa037d7357a2bc8f9ee8b58b9965831d9e51baf703280dc73d3", - "sha256:d15a181d1ecd0d4270dc32edb46f7cb7733c7c508857278d3d378d14d606db2d", - "sha256:d4b0ba9512519522b118090257be113b9468d804b19d63c71dbcf4a48fa32358", - "sha256:d4db7c7aef085872ef65a8fd7d6d09a14ae91f691dec3e87ee5ee0539d516f53", - "sha256:d4eccecf9adf6fbcc6861a38015c2a64f38b9d94838ac1810a9023a0609e1b78", - "sha256:d67d839ede4ed1b28a4e8909735fc992a923cdb84e618544973d7dfc71540803", - "sha256:daf496c58a8c52083df09b80c860005194014c3698698d1a57cbcfa182142a3a", - "sha256:dbad0e9d368bb989f4515da330b88a057617d16b6a8245084f1b05400f24609f", - "sha256:e61ceaab6f49fb8bdfaa0f92c4b57bcfbea54c09277b1b4f7ac376bfb7a7c174", - "sha256:f84fbc98b019fef2ee9a1cb3ce93e3187a6df0b2538a651bfb890254ba9f90b5" - ], - "markers": "python_version >= '3.6'", - "version": "==6.0" - }, - "requests": { - "hashes": [ - "sha256:7c5599b102feddaa661c826c56ab4fee28bfd17f5abca1ebbe3e7f19d7c97983", - "sha256:8fefa2a1a1365bf5520aac41836fbee479da67864514bdb821f31ce07ce65349" - ], - "markers": "python_version >= '3.7' and python_version < '4'", - "version": "==2.28.1" - }, - "responses": { - "hashes": [ - "sha256:396acb2a13d25297789a5866b4881cf4e46ffd49cc26c43ab1117f40b973102e", - "sha256:dcf294d204d14c436fddcc74caefdbc5764795a40ff4e6a7740ed8ddbf3294be" - ], - "markers": "python_version >= '3.7'", - "version": "==0.22.0" - }, - "ruamel.yaml": { - "hashes": [ - "sha256:742b35d3d665023981bd6d16b3d24248ce5df75fdb4e2924e93a05c1f8b61ca7", - "sha256:8b7ce697a2f212752a35c1ac414471dc16c424c9573be4926b56ff3f5d23b7af" - ], - "markers": "python_version >= '3'", - "version": "==0.17.21" - }, - "ruamel.yaml.clib": { - "hashes": [ - "sha256:045e0626baf1c52e5527bd5db361bc83180faaba2ff586e763d3d5982a876a9e", - "sha256:15910ef4f3e537eea7fe45f8a5d19997479940d9196f357152a09031c5be59f3", - "sha256:184faeaec61dbaa3cace407cffc5819f7b977e75360e8d5ca19461cd851a5fc5", - "sha256:1f08fd5a2bea9c4180db71678e850b995d2a5f4537be0e94557668cf0f5f9497", - "sha256:2aa261c29a5545adfef9296b7e33941f46aa5bbd21164228e833412af4c9c75f", - "sha256:3110a99e0f94a4a3470ff67fc20d3f96c25b13d24c6980ff841e82bafe827cac", - "sha256:3243f48ecd450eddadc2d11b5feb08aca941b5cd98c9b1db14b2fd128be8c697", - "sha256:370445fd795706fd291ab00c9df38a0caed0f17a6fb46b0f607668ecb16ce763", - "sha256:40d030e2329ce5286d6b231b8726959ebbe0404c92f0a578c0e2482182e38282", - "sha256:4a4d8d417868d68b979076a9be6a38c676eca060785abaa6709c7b31593c35d1", - "sha256:4b3a93bb9bc662fc1f99c5c3ea8e623d8b23ad22f861eb6fce9377ac07ad6072", - "sha256:5bc0667c1eb8f83a3752b71b9c4ba55ef7c7058ae57022dd9b29065186a113d9", - "sha256:721bc4ba4525f53f6a611ec0967bdcee61b31df5a56801281027a3a6d1c2daf5", - "sha256:763d65baa3b952479c4e972669f679fe490eee058d5aa85da483ebae2009d231", - "sha256:7bdb4c06b063f6fd55e472e201317a3bb6cdeeee5d5a38512ea5c01e1acbdd93", - "sha256:8831a2cedcd0f0927f788c5bdf6567d9dc9cc235646a434986a852af1cb54b4b", - "sha256:91a789b4aa0097b78c93e3dc4b40040ba55bef518f84a40d4442f713b4094acb", - "sha256:92460ce908546ab69770b2e576e4f99fbb4ce6ab4b245345a3869a0a0410488f", - "sha256:99e77daab5d13a48a4054803d052ff40780278240a902b880dd37a51ba01a307", - "sha256:a234a20ae07e8469da311e182e70ef6b199d0fbeb6c6cc2901204dd87fb867e8", - "sha256:a7b301ff08055d73223058b5c46c55638917f04d21577c95e00e0c4d79201a6b", - "sha256:be2a7ad8fd8f7442b24323d24ba0b56c51219513cfa45b9ada3b87b76c374d4b", - "sha256:bf9a6bc4a0221538b1a7de3ed7bca4c93c02346853f44e1cd764be0023cd3640", - "sha256:c3ca1fbba4ae962521e5eb66d72998b51f0f4d0f608d3c0347a48e1af262efa7", - "sha256:d000f258cf42fec2b1bbf2863c61d7b8918d31ffee905da62dede869254d3b8a", - "sha256:d5859983f26d8cd7bb5c287ef452e8aacc86501487634573d260968f753e1d71", - "sha256:d5e51e2901ec2366b79f16c2299a03e74ba4531ddcfacc1416639c557aef0ad8", - "sha256:debc87a9516b237d0466a711b18b6ebeb17ba9f391eb7f91c649c5c4ec5006c7", - "sha256:df5828871e6648db72d1c19b4bd24819b80a755c4541d3409f0f7acd0f335c80", - "sha256:ecdf1a604009bd35c674b9225a8fa609e0282d9b896c03dd441a91e5f53b534e", - "sha256:efa08d63ef03d079dcae1dfe334f6c8847ba8b645d08df286358b1f5293d24ab", - "sha256:f01da5790e95815eb5a8a138508c01c758e5f5bc0ce4286c4f7028b8dd7ac3d0", - "sha256:f34019dced51047d6f70cb9383b2ae2853b7fc4dce65129a5acd49f4f9256646" - ], - "markers": "python_version < '3.11' and platform_python_implementation == 'CPython'", - "version": "==0.2.7" - }, - "s3transfer": { - "hashes": [ - "sha256:06176b74f3a15f61f1b4f25a1fc29a4429040b7647133a463da8fa5bd28d5ecd", - "sha256:2ed07d3866f523cc561bf4a00fc5535827981b117dd7876f036b0c1aca42c947" - ], - "markers": "python_version >= '3.7'", - "version": "==0.6.0" - }, - "safety": { - "hashes": [ - "sha256:2e17cf127472ca720cdcc65f834008b555a10fe56627646009ab7565dd2459cf", - "sha256:c12b2aaf3495faf42951fdd91d3c5ce6ecffd05efa423a29244408b72c556744" - ], - "index": "pypi", - "version": "==2.3.3" - }, - "setuptools": { - "hashes": [ - "sha256:57f6f22bde4e042978bcd50176fdb381d7c21a9efa4041202288d3737a0c6a54", - "sha256:a7620757bf984b58deaf32fc8a4577a9bbc0850cf92c20e1ce41c38c19e5fb75" - ], - "markers": "python_version >= '3.7'", - "version": "==65.6.3" - }, - "six": { - "hashes": [ - "sha256:1e61c37477a1626458e36f7b1d82aa5c9b094fa4802892072e49de9c60c4c926", - "sha256:8abb2f1d86890a2dfb989f9a77cfcfd3e47c2a354b01111771326f8aa26e0254" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", - "version": "==1.16.0" - }, - "smmap": { - "hashes": [ - "sha256:2aba19d6a040e78d8b09de5c57e96207b09ed71d8e55ce0959eeee6c8e190d94", - "sha256:c840e62059cd3be204b0c9c9f74be2c09d5648eddd4580d9314c3ecde0b30936" - ], - "markers": "python_version >= '3.6'", - "version": "==5.0.0" - }, - "stevedore": { - "hashes": [ - "sha256:7f8aeb6e3f90f96832c301bff21a7eb5eefbe894c88c506483d355565d88cc1a", - "sha256:aa6436565c069b2946fe4ebff07f5041e0c8bf18c7376dd29edf80cf7d524e4e" - ], - "markers": "python_version >= '3.8'", - "version": "==4.1.1" - }, - "sure": { - "hashes": [ - "sha256:34ae88c846046742ef074036bf311dc90ab152b7bc09c342b281cebf676727a2" - ], - "index": "pypi", - "version": "==2.0.0" - }, - "toml": { - "hashes": [ - "sha256:806143ae5bfb6a3c6e736a764057db0e6a0e05e338b5630894a5f779cabb4f9b", - "sha256:b3bda1d108d5dd99f4a20d24d9c348e91c4db7ab1b749200bded2f839ccbe68f" - ], - "markers": "python_version >= '2.6' and python_version not in '3.0, 3.1, 3.2, 3.3'", - "version": "==0.10.2" - }, - "tomli": { - "hashes": [ - "sha256:939de3e7a6161af0c887ef91b7d41a53e7c5a1ca976325f429cb46ea9bc30ecc", - "sha256:de526c12914f0c550d15924c62d72abc48d6fe7364aa87328337a31007fe8a4f" - ], - "markers": "python_full_version < '3.11.0a7'", - "version": "==2.0.1" - }, - "tomlkit": { - "hashes": [ - "sha256:07de26b0d8cfc18f871aec595fda24d95b08fef89d147caa861939f37230bf4b", - "sha256:71b952e5721688937fb02cf9d354dbcf0785066149d2855e44531ebdd2b65d73" - ], - "markers": "python_version >= '3.6'", - "version": "==0.11.6" - }, - "types-toml": { - "hashes": [ - "sha256:171bdb3163d79a520560f24ba916a9fc9bff81659c5448a9fea89240923722be", - "sha256:b7b5c4977f96ab7b5ac06d8a6590d17c0bf252a96efc03b109c2711fb3e0eafd" - ], - "version": "==0.10.8.1" - }, - "typing-extensions": { - "hashes": [ - "sha256:1511434bb92bf8dd198c12b1cc812e800d4181cfcb867674e0f8279cc93087aa", - "sha256:16fa4864408f655d35ec496218b85f79b3437c829e93320c7c9215ccfd92489e" - ], - "markers": "python_version >= '3.7'", - "version": "==4.4.0" - }, - "urllib3": { - "hashes": [ - "sha256:47cc05d99aaa09c9e72ed5809b60e7ba354e64b59c9c173ac3018642d8bb41fc", - "sha256:c083dd0dce68dbfbe1129d5271cb90f9447dea7d52097c6e0126120c521ddea8" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3, 3.4, 3.5'", - "version": "==1.26.13" - }, - "vulture": { - "hashes": [ - "sha256:2515fa848181001dc8a73aba6a01a1a17406f5d372f24ec7f7191866f9f4997e", - "sha256:e792e903ccc063ec4873a8979dcf11b51ea3d65a2d3b31c113d47be48f0cdcae" - ], - "index": "pypi", - "version": "==2.6" - }, - "websocket-client": { - "hashes": [ - "sha256:d6b06432f184438d99ac1f456eaf22fe1ade524c3dd16e661142dc54e9cba574", - "sha256:d6e8f90ca8e2dd4e8027c4561adeb9456b54044312dba655e7cae652ceb9ae59" - ], - "markers": "python_version >= '3.7'", - "version": "==1.4.2" - }, - "werkzeug": { - "hashes": [ - "sha256:7ea2d48322cc7c0f8b3a215ed73eabd7b5d75d0b50e31ab006286ccff9e00b8f", - "sha256:f979ab81f58d7318e064e99c4506445d60135ac5cd2e177a2de0089bfd4c9bd5" - ], - "markers": "python_version >= '3.7'", - "version": "==2.2.2" - }, - "wrapt": { - "hashes": [ - "sha256:00b6d4ea20a906c0ca56d84f93065b398ab74b927a7a3dbd470f6fc503f95dc3", - "sha256:01c205616a89d09827986bc4e859bcabd64f5a0662a7fe95e0d359424e0e071b", - "sha256:02b41b633c6261feff8ddd8d11c711df6842aba629fdd3da10249a53211a72c4", - "sha256:07f7a7d0f388028b2df1d916e94bbb40624c59b48ecc6cbc232546706fac74c2", - "sha256:11871514607b15cfeb87c547a49bca19fde402f32e2b1c24a632506c0a756656", - "sha256:1b376b3f4896e7930f1f772ac4b064ac12598d1c38d04907e696cc4d794b43d3", - "sha256:21ac0156c4b089b330b7666db40feee30a5d52634cc4560e1905d6529a3897ff", - "sha256:257fd78c513e0fb5cdbe058c27a0624c9884e735bbd131935fd49e9fe719d310", - "sha256:2b39d38039a1fdad98c87279b48bc5dce2c0ca0d73483b12cb72aa9609278e8a", - "sha256:2cf71233a0ed05ccdabe209c606fe0bac7379fdcf687f39b944420d2a09fdb57", - "sha256:2fe803deacd09a233e4762a1adcea5db5d31e6be577a43352936179d14d90069", - "sha256:3232822c7d98d23895ccc443bbdf57c7412c5a65996c30442ebe6ed3df335383", - "sha256:34aa51c45f28ba7f12accd624225e2b1e5a3a45206aa191f6f9aac931d9d56fe", - "sha256:36f582d0c6bc99d5f39cd3ac2a9062e57f3cf606ade29a0a0d6b323462f4dd87", - "sha256:380a85cf89e0e69b7cfbe2ea9f765f004ff419f34194018a6827ac0e3edfed4d", - "sha256:40e7bc81c9e2b2734ea4bc1aceb8a8f0ceaac7c5299bc5d69e37c44d9081d43b", - "sha256:43ca3bbbe97af00f49efb06e352eae40434ca9d915906f77def219b88e85d907", - "sha256:4fcc4649dc762cddacd193e6b55bc02edca674067f5f98166d7713b193932b7f", - "sha256:5a0f54ce2c092aaf439813735584b9537cad479575a09892b8352fea5e988dc0", - "sha256:5a9a0d155deafd9448baff28c08e150d9b24ff010e899311ddd63c45c2445e28", - "sha256:5b02d65b9ccf0ef6c34cba6cf5bf2aab1bb2f49c6090bafeecc9cd81ad4ea1c1", - "sha256:60db23fa423575eeb65ea430cee741acb7c26a1365d103f7b0f6ec412b893853", - "sha256:642c2e7a804fcf18c222e1060df25fc210b9c58db7c91416fb055897fc27e8cc", - "sha256:6a9a25751acb379b466ff6be78a315e2b439d4c94c1e99cb7266d40a537995d3", - "sha256:6b1a564e6cb69922c7fe3a678b9f9a3c54e72b469875aa8018f18b4d1dd1adf3", - "sha256:6d323e1554b3d22cfc03cd3243b5bb815a51f5249fdcbb86fda4bf62bab9e164", - "sha256:6e743de5e9c3d1b7185870f480587b75b1cb604832e380d64f9504a0535912d1", - "sha256:709fe01086a55cf79d20f741f39325018f4df051ef39fe921b1ebe780a66184c", - "sha256:7b7c050ae976e286906dd3f26009e117eb000fb2cf3533398c5ad9ccc86867b1", - "sha256:7d2872609603cb35ca513d7404a94d6d608fc13211563571117046c9d2bcc3d7", - "sha256:7ef58fb89674095bfc57c4069e95d7a31cfdc0939e2a579882ac7d55aadfd2a1", - "sha256:80bb5c256f1415f747011dc3604b59bc1f91c6e7150bd7db03b19170ee06b320", - "sha256:81b19725065dcb43df02b37e03278c011a09e49757287dca60c5aecdd5a0b8ed", - "sha256:833b58d5d0b7e5b9832869f039203389ac7cbf01765639c7309fd50ef619e0b1", - "sha256:88bd7b6bd70a5b6803c1abf6bca012f7ed963e58c68d76ee20b9d751c74a3248", - "sha256:8ad85f7f4e20964db4daadcab70b47ab05c7c1cf2a7c1e51087bfaa83831854c", - "sha256:8c0ce1e99116d5ab21355d8ebe53d9460366704ea38ae4d9f6933188f327b456", - "sha256:8d649d616e5c6a678b26d15ece345354f7c2286acd6db868e65fcc5ff7c24a77", - "sha256:903500616422a40a98a5a3c4ff4ed9d0066f3b4c951fa286018ecdf0750194ef", - "sha256:9736af4641846491aedb3c3f56b9bc5568d92b0692303b5a305301a95dfd38b1", - "sha256:988635d122aaf2bdcef9e795435662bcd65b02f4f4c1ae37fbee7401c440b3a7", - "sha256:9cca3c2cdadb362116235fdbd411735de4328c61425b0aa9f872fd76d02c4e86", - "sha256:9e0fd32e0148dd5dea6af5fee42beb949098564cc23211a88d799e434255a1f4", - "sha256:9f3e6f9e05148ff90002b884fbc2a86bd303ae847e472f44ecc06c2cd2fcdb2d", - "sha256:a85d2b46be66a71bedde836d9e41859879cc54a2a04fad1191eb50c2066f6e9d", - "sha256:a9a52172be0b5aae932bef82a79ec0a0ce87288c7d132946d645eba03f0ad8a8", - "sha256:aa31fdcc33fef9eb2552cbcbfee7773d5a6792c137b359e82879c101e98584c5", - "sha256:b014c23646a467558be7da3d6b9fa409b2c567d2110599b7cf9a0c5992b3b471", - "sha256:b21bb4c09ffabfa0e85e3a6b623e19b80e7acd709b9f91452b8297ace2a8ab00", - "sha256:b5901a312f4d14c59918c221323068fad0540e34324925c8475263841dbdfe68", - "sha256:b9b7a708dd92306328117d8c4b62e2194d00c365f18eff11a9b53c6f923b01e3", - "sha256:d1967f46ea8f2db647c786e78d8cc7e4313dbd1b0aca360592d8027b8508e24d", - "sha256:d52a25136894c63de15a35bc0bdc5adb4b0e173b9c0d07a2be9d3ca64a332735", - "sha256:d77c85fedff92cf788face9bfa3ebaa364448ebb1d765302e9af11bf449ca36d", - "sha256:d79d7d5dc8a32b7093e81e97dad755127ff77bcc899e845f41bf71747af0c569", - "sha256:dbcda74c67263139358f4d188ae5faae95c30929281bc6866d00573783c422b7", - "sha256:ddaea91abf8b0d13443f6dac52e89051a5063c7d014710dcb4d4abb2ff811a59", - "sha256:dee0ce50c6a2dd9056c20db781e9c1cfd33e77d2d569f5d1d9321c641bb903d5", - "sha256:dee60e1de1898bde3b238f18340eec6148986da0455d8ba7848d50470a7a32fb", - "sha256:e2f83e18fe2f4c9e7db597e988f72712c0c3676d337d8b101f6758107c42425b", - "sha256:e3fb1677c720409d5f671e39bac6c9e0e422584e5f518bfd50aa4cbbea02433f", - "sha256:ee2b1b1769f6707a8a445162ea16dddf74285c3964f605877a20e38545c3c462", - "sha256:ee6acae74a2b91865910eef5e7de37dc6895ad96fa23603d1d27ea69df545015", - "sha256:ef3f72c9666bba2bab70d2a8b79f2c6d2c1a42a7f7e2b0ec83bb2f9e383950af" - ], - "markers": "python_version < '3.11'", - "version": "==1.14.1" - }, - "xmltodict": { - "hashes": [ - "sha256:341595a488e3e01a85a9d8911d8912fd922ede5fecc4dce437eb4b6c8d037e56", - "sha256:aa89e8fd76320154a40d19a0df04a4695fb9dc5ba977cbb68ab3e4eb225e7852" - ], - "markers": "python_version >= '3.4'", - "version": "==0.13.0" - }, - "zipp": { - "hashes": [ - "sha256:83a28fcb75844b5c0cdaf5aa4003c2d728c77e05f5aeabe8e95e56727005fbaa", - "sha256:a7a22e05929290a67401440b39690ae6563279bced5f314609d9d03798f56766" - ], - "markers": "python_version < '3.10'", - "version": "==3.11.0" - } - } } diff --git a/contrib/cloudshell/README.md b/contrib/cloudshell/README.md index 21c3ac0a..48b965d1 100644 --- a/contrib/cloudshell/README.md +++ b/contrib/cloudshell/README.md @@ -2,11 +2,11 @@ ### Use Case: -Customers look to use multiple auditing tools in order to provide quick assessments about their AWS environments. These tools allow for reports to be generated for review by the customer and appropriate teams, which in turns helps them begin security remediation efforts. +Customers look to use multiple auditing tools in order to provide quick assessments about their AWS environments. These tools allow for reports to be generated for review by the customer and appropriate teams, which in turns helps them begin security remediation efforts. Prowler and ScoutSuite are two publicly available security auditing tools that provide comprehensive reports for customers using AWS. -ShortCut is a mechanism for customers to use to run both Prowler and ScoutSuite within an AWS account, using AWS CloudShell. When customers use ShortCut, this allows for customers to quickly perform an audit on their environment, without having to provision IAM Access Keys or EC2 instances. +ShortCut is a mechanism for customers to use to run both Prowler and ScoutSuite within an AWS account, using AWS CloudShell. When customers use ShortCut, this allows for customers to quickly perform an audit on their environment, without having to provision IAM Access Keys or EC2 instances. ### Prerequisites: @@ -54,4 +54,4 @@ screen -r scoutsuite 8. In the Download File prompt, use the file path and file name to download the results. -![Alt text](screenshots/download_prompt.png) \ No newline at end of file +![Alt text](screenshots/download_prompt.png) diff --git a/contrib/cloudshell/shortcut.sh b/contrib/cloudshell/shortcut.sh index d3e3a402..c404ea68 100644 --- a/contrib/cloudshell/shortcut.sh +++ b/contrib/cloudshell/shortcut.sh @@ -17,7 +17,7 @@ mkdir ${account}-results cd ~ git clone https://github.com/prowler-cloud/prowler pip3 install detect-secrets --user -cd prowler +cd prowler screen -dmS prowler sh -c "./prowler -M csv,html;cd ~;zip -r ${account}-results/prowler-${account}.zip /home/cloudshell-user/prowler/output" # ScoutSuite diff --git a/contrib/codebuild/codebuild-prowler-audit-account-cfn.yaml b/contrib/codebuild/codebuild-prowler-audit-account-cfn.yaml index f00af685..b8a00a40 100644 --- a/contrib/codebuild/codebuild-prowler-audit-account-cfn.yaml +++ b/contrib/codebuild/codebuild-prowler-audit-account-cfn.yaml @@ -12,14 +12,14 @@ Parameters: Type: Number Default: 3 AllowedValues: [1, 3, 5, 7, 14, 30, 60, 90, 180, 365] - + ProwlerOptions: Description: 'Options to pass to Prowler command, make sure at least -M junit-xml is used for CodeBuild reports. Use -r for the region to send API queries, -f to filter only one region, -M output formats, -c for comma separated checks, for all checks do not use -c or -g, for more options see -h. For a complete assessment use "-M text,junit-xml,html,csv,json", for SecurityHub integration use "-r region -f region -M text,junit-xml,html,csv,json,json-asff -S -q"' Type: String # Prowler command below runs a set of checks, configure it base on your needs, no options will run all regions all checks. # option -M junit-xml is requirede in order to get the report in CodeBuild. Default: -r eu-west-1 -f eu-west-1 -M text,junit-xml,html,csv,json -c check11,check12,check13,check14 - + ProwlerScheduler: Description: The time when Prowler will run in cron format. Default is daily at 22:00h or 10PM 'cron(0 22 * * ? *)', for every 5 hours also works 'rate(5 hours)'. More info here https://docs.aws.amazon.com/AmazonCloudWatch/latest/events/ScheduledEvents.html. Type: String @@ -297,14 +297,14 @@ Resources: python: 3.9 commands: - echo "Installing Prowler and dependencies..." - - pip3 install detect-secrets + - pip3 install detect-secrets build: commands: - echo "Running Prowler as ./prowler $PROWLER_OPTIONS" - - ./prowler $PROWLER_OPTIONS + - ./prowler $PROWLER_OPTIONS post_build: commands: - - echo "Uploading reports to S3..." + - echo "Uploading reports to S3..." - aws s3 cp --sse AES256 output/ s3://$BUCKET_REPORT/ --recursive - echo "Done!" reports: diff --git a/contrib/html/generate-html-from-csv.sh b/contrib/html/generate-html-from-csv.sh index 5c55d096..0d240dcd 100755 --- a/contrib/html/generate-html-from-csv.sh +++ b/contrib/html/generate-html-from-csv.sh @@ -12,15 +12,15 @@ # specific language governing permissions and limitations under the License. -## This script helps to generate a single html report from a single or multiple csv +## This script helps to generate a single html report from a single or multiple csv # output reports. # I use it when I want to visualize multiple accounts reports in a single view. -# Report information and Assessment Summary will be empty due to the variables +# Report information and Assessment Summary will be empty due to the variables # that are not set here. ## First: Remove the CSV header from each output report. -## Second: If you want to aggretate all csv files in you can do like this: +## Second: If you want to aggretate all csv files in you can do like this: # find . -type f -name '*.csv' -exec cat {} + > prowler-output-unified-csv.file # use .file instead of .csv unless you want to get into an infinite loop ;) @@ -30,7 +30,7 @@ OUTPUT_FILE_NAME="report-unified-csv" EXTENSION_HTML="html" INPUT=$1 -IFS=',' # used inside the while loop for csv delimiter +IFS=',' # used inside the while loop for csv delimiter HTML_LOGO_URL="https://github.com/prowler-cloud/prowler/" HTML_LOGO_IMG="https://raw.githubusercontent.com/prowler-cloud/prowler/master/util/html/prowler-logo-new.png" @@ -41,7 +41,7 @@ addHtmlHeader() { if [[ $PROFILE == "" ]];then PROFILE="ENV" fi - if [[ -z $HTML_REPORT_INIT ]]; then + if [[ -z $HTML_REPORT_INIT ]]; then cat < @@ -112,7 +112,7 @@ addHtmlHeader() { - * Sortable columns are CheckID (default) and Result + * Sortable columns are CheckID (default) and Result
@@ -135,7 +135,7 @@ addHtmlHeader() { EOF -fi +fi } addHtmlFooter() { @@ -170,7 +170,7 @@ unset HTML_REPORT_INIT addHtmlHeader > ${OUTPUT_FILE_NAME}.$EXTENSION_HTML while IFS=, read -r PROFILE ACCOUNT_NUM REPREGION TITLE_ID RESULT SCORED LEVEL TITLE_TEXT NOTES ASFF_COMPLIANCE_TYPE CHECK_SEVERITY CHECK_SERVICENAME;do - if [[ $RESULT == "INFO" ]]; then + if [[ $RESULT == "INFO" ]]; then echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo 'INFO' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML @@ -183,8 +183,8 @@ while IFS=, read -r PROFILE ACCOUNT_NUM REPREGION TITLE_ID RESULT SCORED LEVEL T echo ''$TITLE_TEXT'' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo ''$NOTES'' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML - fi - if [[ $RESULT == "PASS" ]]; then + fi + if [[ $RESULT == "PASS" ]]; then echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo 'PASS' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML @@ -197,8 +197,8 @@ while IFS=, read -r PROFILE ACCOUNT_NUM REPREGION TITLE_ID RESULT SCORED LEVEL T echo ''$TITLE_TEXT'' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo ''$NOTES'' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML - fi - if [[ $RESULT == "FAIL" ]]; then + fi + if [[ $RESULT == "FAIL" ]]; then echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo ' ' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo 'FAIL' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML @@ -212,7 +212,7 @@ while IFS=, read -r PROFILE ACCOUNT_NUM REPREGION TITLE_ID RESULT SCORED LEVEL T echo ''$NOTES'' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML fi - if [[ $RESULT == "WARNING" ]]; then + if [[ $RESULT == "WARNING" ]]; then echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo 'WARN' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML @@ -228,6 +228,3 @@ while IFS=, read -r PROFILE ACCOUNT_NUM REPREGION TITLE_ID RESULT SCORED LEVEL T fi done < $INPUT addHtmlFooter >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML - - - diff --git a/contrib/k8s/README.md b/contrib/k8s/README.md index 437d8338..f1674a11 100644 --- a/contrib/k8s/README.md +++ b/contrib/k8s/README.md @@ -1,9 +1,9 @@ ## K8S - Cronjob Simple instructions to add a cronjob on K8S to execute a prowler and save the results on AWS S3. -### Files: +### Files: cronjob.yml ---> is a **cronjob** for K8S, you must set the frequency and probes from yours scans \ -secret.yml -----> is a **secret** file with AWS ID/Secret and the name of bucket +secret.yml -----> is a **secret** file with AWS ID/Secret and the name of bucket ### To apply: diff --git a/contrib/k8s/cronjob.yml b/contrib/k8s/cronjob.yml index 9705deb1..dc923dbb 100644 --- a/contrib/k8s/cronjob.yml +++ b/contrib/k8s/cronjob.yml @@ -16,7 +16,7 @@ spec: - name: prowler image: toniblyx/prowler:latest imagePullPolicy: Always - command: + command: - "./prowler" args: [ "-g", "hipaa", "-M", "csv,json,html", "-B", "$(awsS3Bucket)" ] env: @@ -30,11 +30,11 @@ spec: secretKeyRef: name: devsecops-prowler-cronjob-secret key: awsSecretKey - - name: awsS3Bucket + - name: awsS3Bucket valueFrom: secretKeyRef: name: devsecops-prowler-cronjob-secret - key: awsS3Bucket + key: awsS3Bucket imagePullPolicy: IfNotPresent restartPolicy: OnFailure backoffLimit: 3 diff --git a/contrib/multi-account-securityhub/.awsvariables b/contrib/multi-account-securityhub/.awsvariables index e2952c8e..460c58ae 100644 --- a/contrib/multi-account-securityhub/.awsvariables +++ b/contrib/multi-account-securityhub/.awsvariables @@ -1,3 +1,3 @@ export ROLE=ProwlerXA-Role export PARALLEL_ACCOUNTS=1 -export REGION=us-east-1 \ No newline at end of file +export REGION=us-east-1 diff --git a/contrib/multi-account-securityhub/Dockerfile b/contrib/multi-account-securityhub/Dockerfile index 96bbb6b6..c3088a8a 100644 --- a/contrib/multi-account-securityhub/Dockerfile +++ b/contrib/multi-account-securityhub/Dockerfile @@ -42,4 +42,4 @@ RUN \ USER ${USERNAME} # Run script -ENTRYPOINT ["/run-prowler-securityhub.sh"] \ No newline at end of file +ENTRYPOINT ["/run-prowler-securityhub.sh"] diff --git a/contrib/multi-account-securityhub/README.md b/contrib/multi-account-securityhub/README.md index 1cfeea5f..dd28e6b9 100644 --- a/contrib/multi-account-securityhub/README.md +++ b/contrib/multi-account-securityhub/README.md @@ -15,7 +15,7 @@ Originally based on [org-multi-account](https://github.com/prowler-cloud/prowler The solution is designed to be very simple. Prowler is run via an ECS Task definition that launches a single Fargate container. This Task Definition is executed on a schedule using an EventBridge Rule. ## CloudFormation Templates - + ### CF-Prowler-IAM.yml Creates the following IAM Roles: @@ -33,7 +33,7 @@ Creates the following resources: 5. **ProwlerTaskScheduler**: EventBridge Rule that schedules the execution of the Task Definition. The cron expression is specified as a CloudFormation template parameter. ### CF-Prowler-CrossAccountRole.yml -Creates the cross account IAM Role required for Prowler to run. Deploy it as StackSet in every account in the AWS Organization. +Creates the cross account IAM Role required for Prowler to run. Deploy it as StackSet in every account in the AWS Organization. ## Docker Container @@ -42,7 +42,7 @@ The Dockerfile does the following: 1. Uses amazonlinux:2022 as a base. 2. Downloads required dependencies. 3. Copies the .awsvariables and run-prowler-securityhub.sh files into the root. - 4. Downloads the specified version of Prowler as recommended in the release notes. + 4. Downloads the specified version of Prowler as recommended in the release notes. 5. Assigns permissions to a lower privileged user and then drops to it. 6. Runs the script. @@ -58,10 +58,10 @@ The script gets the list of accounts in AWS Organizations, and then executes Pro The logs that are generated and sent to Cloudwatch are error logs, and assessment start and finish logs. ## Instructions - 1. Create a Private ECR Repository in the account that will host the Prowler container. The Audit account is recommended, but any account can be used. + 1. Create a Private ECR Repository in the account that will host the Prowler container. The Audit account is recommended, but any account can be used. 2. Configure the .awsvariables file. Note the ROLE name chosen as it will be the CrossAccountRole. 3. Follow the steps from "View Push Commands" to build and upload the container image. You need to have Docker and AWS CLI installed, and use the cli to login to the account first. After upload note the Image URI, as it is required for the CF-Prowler-ECS template. - 4. Make sure SecurityHub is enabled in every account in AWS Organizations, and that the SecurityHub integration is enabled as explained in [Prowler - Security Hub Integration](https://github.com/prowler-cloud/prowler#security-hub-integration) + 4. Make sure SecurityHub is enabled in every account in AWS Organizations, and that the SecurityHub integration is enabled as explained in [Prowler - Security Hub Integration](https://github.com/prowler-cloud/prowler#security-hub-integration) 5. Deploy **CF-Prowler-CrossAccountRole.yml** in the Master Account as a single stack. You will have to choose the CrossAccountRole name (ProwlerXA-Role by default) and the ProwlerTaskRoleName (ProwlerECSTask-Role by default) 6. Deploy **CF-Prowler-CrossAccountRole.yml** in every Member Account as a StackSet. Choose the same CrossAccountName and ProwlerTaskRoleName as the previous step. 7. Deploy **CF-Prowler-IAM.yml** in the account that will host the Prowler container (the same from step 1). The following template parameters must be provided: @@ -72,7 +72,7 @@ The logs that are generated and sent to Cloudwatch are error logs, and assessmen 8. Deploy **CF-Prowler-ECS.yml** in the account that will host the Prowler container (the same from step 1). The following template parameters must be provided: - **ProwlerClusterName**: Name for the ECS Cluster (default ProwlerCluster) - **ProwlerContainerName**: Name for the Prowler container (default prowler) - - **ProwlerContainerInfo**: ECR URI from step 1. + - **ProwlerContainerInfo**: ECR URI from step 1. - **ProwlerECSLogGroupName**: CloudWatch Log Group name (default /aws/ecs/SecurityHub-Prowler) - **SecurityGroupVPCId**: VPC ID for the VPC where the container will run. - **ProwlerScheduledSubnet1 and 2**: Subnets IDs from the VPC specified. Choose private subnets if possible. @@ -90,5 +90,5 @@ If you permission find errors in the CloudWatch logs, the culprit might be a [Se --- ## Upgrading Prowler -Prowler version is controlled by the PROWLERVER argument in the Dockerfile, change it to the desired version and follow the ECR Push Commands to update the container image. -Old images can be deleted from the ECR Repository after the new image is confirmed to work. They will show as "untagged" as only one image can hold the "latest" tag. \ No newline at end of file +Prowler version is controlled by the PROWLERVER argument in the Dockerfile, change it to the desired version and follow the ECR Push Commands to update the container image. +Old images can be deleted from the ECR Repository after the new image is confirmed to work. They will show as "untagged" as only one image can hold the "latest" tag. diff --git a/contrib/multi-account-securityhub/templates/CF-Prowler-CrossAccountRole.yml b/contrib/multi-account-securityhub/templates/CF-Prowler-CrossAccountRole.yml index e39e6aac..f7b569a0 100644 --- a/contrib/multi-account-securityhub/templates/CF-Prowler-CrossAccountRole.yml +++ b/contrib/multi-account-securityhub/templates/CF-Prowler-CrossAccountRole.yml @@ -94,4 +94,4 @@ Resources: Outputs: ProwlerCrossAccountRole: Description: CrossAccount Role to be used by Prowler to assess AWS Accounts in the AWS Organization. - Value: !Ref ProwlerCrossAccountRole \ No newline at end of file + Value: !Ref ProwlerCrossAccountRole diff --git a/contrib/multi-account-securityhub/templates/CF-Prowler-ECS.yml b/contrib/multi-account-securityhub/templates/CF-Prowler-ECS.yml index 7c4faa96..05b476f7 100644 --- a/contrib/multi-account-securityhub/templates/CF-Prowler-ECS.yml +++ b/contrib/multi-account-securityhub/templates/CF-Prowler-ECS.yml @@ -5,14 +5,14 @@ Parameters: Type: String Description: Name of the ECS Cluster that the Prowler Fargate Task will run in Default: ProwlerCluster - ProwlerContainerName: + ProwlerContainerName: Type: String Description: Name of the Prowler Container Definition within the ECS Task Default: prowler - ProwlerContainerInfo: + ProwlerContainerInfo: Type: String Description: ECR URI of the Prowler container - ProwlerECSLogGroupName: + ProwlerECSLogGroupName: Type: String Description: Name for the log group to be created Default: /aws/ecs/SecurityHub-Prowler @@ -41,17 +41,17 @@ Parameters: Resources: ProwlerECSCloudWatchLogsGroup: Type: AWS::Logs::LogGroup - Properties: + Properties: LogGroupName: !Ref ProwlerECSLogGroupName RetentionInDays: 90 ProwlerECSCluster: Type: AWS::ECS::Cluster - Properties: + Properties: ClusterName: !Ref ProwlerClusterName ProwlerECSTaskDefinition: Type: AWS::ECS::TaskDefinition - Properties: - ContainerDefinitions: + Properties: + ContainerDefinitions: - Image: !Ref ProwlerContainerInfo Name: !Ref ProwlerContainerName LogConfiguration: @@ -99,4 +99,4 @@ Resources: - !Ref ProwlerSecurityGroup Subnets: - !Ref ProwlerScheduledSubnet1 - - !Ref ProwlerScheduledSubnet2 \ No newline at end of file + - !Ref ProwlerScheduledSubnet2 diff --git a/contrib/multi-account-securityhub/templates/CF-Prowler-IAM.yml b/contrib/multi-account-securityhub/templates/CF-Prowler-IAM.yml index 48515619..9f9535d2 100644 --- a/contrib/multi-account-securityhub/templates/CF-Prowler-IAM.yml +++ b/contrib/multi-account-securityhub/templates/CF-Prowler-IAM.yml @@ -102,4 +102,4 @@ Outputs: Value: !GetAtt ProwlerTaskRole.Arn ECSEventRoleARN: Description: ARN of the Eventbridge Task Role - Value: !GetAtt ECSEventRole.Arn \ No newline at end of file + Value: !GetAtt ECSEventRole.Arn diff --git a/contrib/org-multi-account/serverless_codebuild/README.md b/contrib/org-multi-account/serverless_codebuild/README.md index c4a727ef..ce107b6e 100644 --- a/contrib/org-multi-account/serverless_codebuild/README.md +++ b/contrib/org-multi-account/serverless_codebuild/README.md @@ -32,7 +32,7 @@ For more information on how to use prowler, see [here](https://github.com/prowle - Specify regions : Region to deploy 3. **Audit Account** 1. Go to S3 console, create a bucket, upload [run-prowler-reports.sh.zip](src/run-prowler-reports.sh.zip) - - bucket name : prowler-util-*[Account ID]*-*[region]* + - bucket name : prowler-util-*[Account ID]*-*[region]* ![Untitled](docs/images/s3_screenshot.png) 1. Deploy [ProwlerCodeBuildStack.yaml](templates/ProwlerCodeBuildStack.yaml) which creates CloudWatch Rule to trigger CodeBuild every fixed time, allowing prowler to audit multi-accounts. @@ -45,4 +45,4 @@ For more information on how to use prowler, see [here](https://github.com/prowle - ProwlerReportS3Account : The account where the report S3 bucket resides. 1. If you'd like to change the scheduled time, 1. You can change the cron expression of ScheduleExpression within [ProwlerCodeBuildStack.yaml](templates/ProwlerCodeBuildStack.yaml). - 2. Alternatively, you can make changes directrly from Events > Rules > ProwlerExecuteRule > Actions > Edit in CloudWatch console. \ No newline at end of file + 2. Alternatively, you can make changes directrly from Events > Rules > ProwlerExecuteRule > Actions > Edit in CloudWatch console. diff --git a/contrib/org-multi-account/serverless_codebuild/README_kr.md b/contrib/org-multi-account/serverless_codebuild/README_kr.md index dd96138c..c7ed50aa 100644 --- a/contrib/org-multi-account/serverless_codebuild/README_kr.md +++ b/contrib/org-multi-account/serverless_codebuild/README_kr.md @@ -4,7 +4,7 @@ Langage: [English](README.md) 이 문서는 AWS Organization 내의 multi account 환경에서 prowler 를 적용하기 위해 작성된 문서입니다. 일정 시간마다 CloudWatch는 CodeBuild 를 트리거합니다. -CodeBuild 는 최신의 [prowler](https://github.com/prowler-cloud/prowler) 소스를 클론받고, +CodeBuild 는 최신의 [prowler](https://github.com/prowler-cloud/prowler) 소스를 클론받고, Organization 내의 모든 Account 에 대해 security assessment 를 수행합니다. prowler 의 자세한 사용방법은 [이 곳](https://github.com/prowler-cloud/prowler#usagee) 을 참고합니다. @@ -59,4 +59,4 @@ prowler 의 자세한 사용방법은 [이 곳](https://github.com/prowler-cloud - ProwlerReportS3Account : report 가 저장될 S3 bucket이 위치한 Account 3. 스케줄 된 시간을 변경하고 싶은 경우 1. [ProwlerCodeBuildStack.yaml](templates/ProwlerCodeBuildStack.yaml) 내에서 ScheduleExpression의 크론 표현식을 변경할 수 있습니다. - 2. 또는 CloudWatch console 에서 Events > Rules > ProwlerExecuteRule > Actions > Edit 에서 직접 변경할 수 있습니다. \ No newline at end of file + 2. 또는 CloudWatch console 에서 Events > Rules > ProwlerExecuteRule > Actions > Edit 에서 직접 변경할 수 있습니다. diff --git a/contrib/terraform-kickstarter/data.tf b/contrib/terraform-kickstarter/data.tf index 48105b29..85ba7f25 100644 --- a/contrib/terraform-kickstarter/data.tf +++ b/contrib/terraform-kickstarter/data.tf @@ -209,4 +209,4 @@ data "aws_iam_policy" "SecurityAudit" { data "aws_caller_identity" "current" { } data "aws_region" "current" { -} \ No newline at end of file +} diff --git a/contrib/terraform-kickstarter/main.tf b/contrib/terraform-kickstarter/main.tf index c63fe911..28092bdb 100644 --- a/contrib/terraform-kickstarter/main.tf +++ b/contrib/terraform-kickstarter/main.tf @@ -256,7 +256,7 @@ resource "aws_iam_role" "prowler_event_trigger_role" { } ] }) - + } resource "aws_iam_policy" "prowler_event_trigger_policy" { depends_on = [aws_codebuild_project.prowler_codebuild] @@ -328,7 +328,7 @@ resource "aws_iam_policy" "prowler_kickstarter_iam_policy" { ] Effect = "Allow" Resource = "arn:aws:glue:${data.aws_region.current.name}:${data.aws_caller_identity.current.account_id}:catalog" - + }, { Action = [ @@ -340,19 +340,19 @@ resource "aws_iam_policy" "prowler_kickstarter_iam_policy" { ] Effect = "Allow" Resource = "arn:aws:codebuild:${data.aws_region.current.name}:${data.aws_caller_identity.current.account_id}:report-group/*" - + }, { Action = [ "securityhub:BatchImportFindings"] Effect = "Allow" - Resource = "*" + Resource = "*" }, { Action = [ "securityhub:GetFindings"] Effect = "Allow" - Resource = "*" + Resource = "*" }, - { + { "Action": "codebuild:StartBuild", "Resource": "arn:aws:codebuild:${data.aws_region.current.name}:${data.aws_caller_identity.current.account_id}:project/*", "Effect": "Allow" @@ -416,7 +416,7 @@ resource "aws_s3_bucket_policy" "prowler_report_storage_bucket_policy" { } } } - + ] }) } @@ -474,7 +474,7 @@ resource "aws_codebuild_project" "prowler_codebuild" { -resource "aws_securityhub_account" "securityhub_resource" { +resource "aws_securityhub_account" "securityhub_resource" { } resource "aws_securityhub_product_subscription" "security_hub_enable_prowler_findings" { @@ -496,4 +496,4 @@ resource "aws_cloudwatch_event_target" "run_prowler_scan" { rule = aws_cloudwatch_event_rule.prowler_check_scheduler_event.name role_arn = aws_iam_role.prowler_event_trigger_role.arn - } \ No newline at end of file + } diff --git a/contrib/terraform-kickstarter/outputs.tf b/contrib/terraform-kickstarter/outputs.tf index 4fa74162..bc40c325 100644 --- a/contrib/terraform-kickstarter/outputs.tf +++ b/contrib/terraform-kickstarter/outputs.tf @@ -206,4 +206,4 @@ output "account_id" { value = data.aws_caller_identity.current.account_id -} \ No newline at end of file +} diff --git a/contrib/terraform-kickstarter/prowler_build_spec.yml b/contrib/terraform-kickstarter/prowler_build_spec.yml index f9fe73a1..063da937 100644 --- a/contrib/terraform-kickstarter/prowler_build_spec.yml +++ b/contrib/terraform-kickstarter/prowler_build_spec.yml @@ -5,20 +5,20 @@ phases: python: 3.8 commands: - echo "Installing Prowler and dependencies..." - - pip3 install detect-secrets + - pip3 install detect-secrets - yum -y install jq - curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip" - unzip awscliv2.zip - ./aws/install - git clone https://github.com/prowler-cloud/prowler - cd prowler - + build: commands: - echo "Running Prowler as ./prowler $PROWLER_OPTIONS" - ./prowler $PROWLER_OPTIONS || true post_build: commands: - - echo "Scan Complete" + - echo "Scan Complete" - aws s3 cp --sse AES256 output/ s3://$BUCKET_REPORT/ --recursive - echo "Done!" diff --git a/contrib/terraform-kickstarter/tf_install.sh b/contrib/terraform-kickstarter/tf_install.sh index d3d71ce8..94795c20 100644 --- a/contrib/terraform-kickstarter/tf_install.sh +++ b/contrib/terraform-kickstarter/tf_install.sh @@ -6,4 +6,4 @@ cd prowler git checkout -t origin/terraform-kickstart sudo yum install -y yum-utils sudo yum-config-manager --add-repo https://rpm.releases.hashicorp.com/AmazonLinux/hashicorp.repo -sudo yum -y install terraform \ No newline at end of file +sudo yum -y install terraform diff --git a/contrib/wazuh/README.md b/contrib/wazuh/README.md index 817facdd..2ce82fd0 100644 --- a/contrib/wazuh/README.md +++ b/contrib/wazuh/README.md @@ -55,7 +55,7 @@ cp /var/ossec/integrations/prowler/integrations/prowler_rules.xml /var/ossec/etc ``` Edit `/var/ossec/etc/ossec.conf` and add the following wodle configuration. Remember that here `timeout 21600 seconds` is 6 hours, just to allow Prowler runs completely in case of a large account. The interval recommended is 1d: -```xml +```xml no aws-prowler: account1 diff --git a/contrib/wazuh/prowler-wrapper.py b/contrib/wazuh/prowler-wrapper.py index c7482d16..a76344a0 100644 --- a/contrib/wazuh/prowler-wrapper.py +++ b/contrib/wazuh/prowler-wrapper.py @@ -19,15 +19,15 @@ # 6 - Error sending to socket -import signal -import sys -import socket import argparse -import subprocess import json -from datetime import datetime import os import re +import signal +import socket +import subprocess +import sys +from datetime import datetime ################################################################################ # Constants diff --git a/groups/group10_hipaa b/groups/group10_hipaa deleted file mode 100644 index b38aa23c..00000000 --- a/groups/group10_hipaa +++ /dev/null @@ -1,22 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[10]='hipaa' -GROUP_NUMBER[10]='10.0' -GROUP_TITLE[10]='HIPAA Compliance - ONLY AS REFERENCE - [hipaa] ****************' -GROUP_RUN_BY_DEFAULT[10]='N' # run it when execute_all is called -GROUP_CHECKS[10]='check12,check113,check23,check26,check27,check29,extra718,extra725,extra72,extra75,extra717,extra729,extra734,check38,extra73,extra740,extra735,check112,check13,check15,check16,check17,check18,check19,check21,check24,check28,check31,check310,check311,check312,check313,check314,check32,check33,check34,check35,check36,check37,check39,extra792' - -# Resources: -# https://d0.awsstatic.com/whitepapers/compliance/AWS_HIPAA_Compliance_Whitepaper.pdf -# https://www.slideshare.net/AmazonWebServices/wps301navigating-hipaa-and-hitrustquickstart-guide-to-account-gov-stratpdf diff --git a/groups/group11_secrets b/groups/group11_secrets deleted file mode 100644 index 76d46056..00000000 --- a/groups/group11_secrets +++ /dev/null @@ -1,22 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2019) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[11]='secrets' -GROUP_NUMBER[11]='11.0' -GROUP_TITLE[11]='Look for keys secrets or passwords around resources - [secrets]' -GROUP_RUN_BY_DEFAULT[11]='N' # but it runs when execute_all is called (default) -GROUP_CHECKS[11]='extra741,extra742,extra759,extra760,extra768,extra775,extra7141' - -# requires https://github.com/Yelp/detect-secrets -# `pip install detect-secrets` - diff --git a/groups/group12_apigateway b/groups/group12_apigateway deleted file mode 100644 index fbecc23c..00000000 --- a/groups/group12_apigateway +++ /dev/null @@ -1,19 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[12]='apigateway' -GROUP_NUMBER[12]='12.0' -GROUP_TITLE[12]='API Gateway security checks - [apigateway] ********************' -GROUP_RUN_BY_DEFAULT[12]='N' # run it when execute_all is called -GROUP_CHECKS[12]='extra722,extra743,extra744,extra745,extra746' - diff --git a/groups/group13_rds b/groups/group13_rds deleted file mode 100644 index d3aad204..00000000 --- a/groups/group13_rds +++ /dev/null @@ -1,18 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[13]='rds' -GROUP_NUMBER[13]='13.0' -GROUP_TITLE[13]='RDS security checks - [rds] ***********************************' -GROUP_RUN_BY_DEFAULT[13]='N' # run it when execute_all is called -GROUP_CHECKS[13]='extra78,extra723,extra735,extra739,extra747,extra7113,extra7131,extra7132,extra7133' diff --git a/groups/group14_elasticsearch b/groups/group14_elasticsearch deleted file mode 100644 index b4cf9b74..00000000 --- a/groups/group14_elasticsearch +++ /dev/null @@ -1,18 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[14]='elasticsearch' -GROUP_NUMBER[14]='14.0' -GROUP_TITLE[14]='Elasticsearch related security checks - [elasticsearch] *******' -GROUP_RUN_BY_DEFAULT[14]='N' # run it when execute_all is called -GROUP_CHECKS[14]='extra715,extra716,extra779,extra780,extra781,extra782,extra783,extra784,extra785,extra787,extra788,extra7101' \ No newline at end of file diff --git a/groups/group15_pci b/groups/group15_pci deleted file mode 100644 index 82f64bb2..00000000 --- a/groups/group15_pci +++ /dev/null @@ -1,133 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[15]='pci' -GROUP_NUMBER[15]='15.0' -GROUP_TITLE[15]='PCI-DSS v3.2.1 Readiness - ONLY AS REFERENCE - [pci] **********' -GROUP_RUN_BY_DEFAULT[15]='N' # run it when execute_all is called -GROUP_CHECKS[15]='check11,check12,check13,check14,check15,check16,check17,check18,check19,check110,check112,check113,check114,check116,check21,check23,check25,check26,check27,check28,check29,check314,check36,check38,check43,extra711,extra713,extra717,extra718,extra72,extra729,extra735,extra738,extra740,extra744,extra748,extra75,extra750,extra751,extra753,extra754,extra755,extra773,extra78,extra780,extra781,extra782,extra783,extra784,extra785,extra787,extra788,extra798' - -# Resources: -# https://github.com/toniblyx/prowler/issues/296 - -# List of checks based on PCI v3.2.1 -# 3.1 Requirement: Install and Maintain a Firewall Configuration to Protect Cardholder Data - -# Ensure no security groups allow ingress from 0.0.0.0/0 to all ports and protocols extra748 -# Ensure no security groups allow ingress from 0.0.0.0/0 to RDP (TCP 3389) check42 -# Ensure no security groups allow ingress from 0.0.0.0/0 to SSH (TCP 22) check41 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Oracle (TCP 1521) extra749 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Oracle (TCP and UDP 2483) extra749 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Oracle (UDP 2483) extra749 -# Ensure no security groups allow ingress from 0.0.0.0/0 to MySQL (TCP 3306) extra750 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Postgres (TCP 5432) extra751 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Redis (TCP 6379)extra752 -# Ensure no security groups allow ingress from 0.0.0.0/0 to MongoDB (TCP 27017 and 27018) extra753 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Cassandra (TCP 7199, 9160 and 8888) extra754 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Memcached (TCP and UDP 11211) extra755 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Elasticsearch ports (TCP 9200/9300/5601) extra779 -# Ensure the default security group restricts all traffic check43 -# Remove unused security groups extra75 -# RDS should not have Public interface open to a public scope extra78 -# Check for Publicly Accessible Redshift Clusters extra711 -# Ensure Lambda Functions are not publicly accessible extra798 - -# 3.2 Requirement 2: Do Not Use Vendor-Supplied Defaults for System Passwords and Other Security Parameters - -# Instance with administrative service: SSH (TCP:22) is exposed to the public Internet check41 -# Instance with administrative service: RDP (TCP:3389) is exposed to the public Internet check42 -# Instance with unencrypted Redis: (TCP:6379) is exposed to the public Internet extra752 - -# 3.3 Requirement 3: Protect Stored Cardholder Data - -# S3 Buckets Server Side encryption at rest extra734 -# Ensure ECS Cluster At-rest encryption TODO -# Ensure DynamoDB -Server Side Encryption DONE (default behavior) -# Check if RDS instances storage is encrypted extra735 -# Ensure there are no EBS Volumes unencrypted extra729 -# Ensure CloudTrail logs are encrypted at rest using KMS CMKs check27 -# Ensure rotation for customer created CMKs is enabled check28 -# Check if EBS snapshots are encrypted extra740 -# Ensure there are no EBS Snapshots set as Public extra72 -# Ensure there is no Fargate containers in use (/aws/containers-roadmap/issues/314) TODO - -# 3.4 Requirement 4: Encrypt Transmission of Cardholder Data Across Open, Public Networks - -# Use encrypted connections between CloudFront and origin server extra738 and TODO -# Ensure that S3 Buckets only allow data transfer using SSL/TLS extra734 -# ELB is setup with SSL for secure communications TODO -# Ensure the access keys are rotated every 90 days or less check14 -# Network Load Balancer with unencrypted service: ElasticSearch (TCP:9200) is exposed to the public Internet TODO? ELB on SSL should be enough extra779 and extra716 -# Network Load Balancer with unencrypted service: ElasticSearch (TCP:9300) is exposed to the public Internet TODO? ELB on SSL should be enough extra779 and extra716 -# Network Load Balancer with unencrypted service: LDAP (UDP:389) is exposed to the public Internet TODO? ELB on SSL should be enough -# Network Load Balancer with unencrypted service: LDAP (TCP:389) is exposed to the public Internet TODO? ELB on SSL should be enough -# Instance with unencrypted service: ElasticSearch (TCP:9200) is exposed to the public Internet extra779 and extra716 -# Instance with unencrypted service: ElasticSearch (TCP:9300) is exposed to the public Internet extra779 and extra716 -# Instance with unencrypted service: LDAP (UDP:389) is exposed to the public Internet -# Instance with unencrypted service: LDAP (TCP:389) is exposed to the public Internet -# Instance with unencrypted Redis: (TCP:6379) is exposed to the public Internet - -# 3.5. Requirement 5: Protect All Systems Against Malware and Regularly Update Anti-Virus Software or Programs - -# N/A -# 3.6. Requirement 6: Develop and Maintain Secure Systems and Applications - -# Ensure Inspector has Assessment Targets TODO -# Ensure Inspector has a Scheduled Assessment Template TODO -# Check for WAF IPSet TODO -# Check for WAF Constraint Sets TODO -# Check for WAF Web ACL extra744,extra773 - -# 3.7. Requirement 7: Restrict Access to Cardholder Data By Business Need To Know - -# Credentials (access keys) unused for 90 days or more should be disabled check13 -# Credentials (password enabled) unused for 90 days or more should be disabled check111 -# Ensure IAM policies are attached only to groups or roles check116 - -# 3.8. Requirement 8: Identify and Authenticate Access to System Components - -# Enforce password policy: IAM (check15, check16, check17, check18, check19, check110, check111) -# Ensure that MFA is enabled for root account check113 -# Ensure MFA is enabled for all IAM users that have a console password check12 -# Ensure no root account access key exist check112 -# Ensure hardware MFA is enabled for the root account check114 -# Avoid the use of root account. check11 - -# 3.9 Requirement 9: Restrict Physical Access to Cardholder Data - -# N/A -# 3.10. Requirement 10: Track and Monitor All Access to Network Resources and Cardholder Data - -# Ensure CloudTrail is enabled in all regions check21 -# Ensure VPC Flow Logging is enabled in all the applicable Regions check29 -# Ensure S3 Buckets access logging is enabled on the CloudTrail S3 bucket check26 -# ELB is created with access logs enabled extra717 -# S3 bucket should have server access logging enabled extra718 -# Ensure AWS Config in all regions check25 -# S3 bucket CloudTrail logs should not have public accessible check23 -# S3 buckets should not be world-listable extra73 -# S3 buckets should not be world-writable extra73 -# S3 buckets should not be world-readable extra73 -# Ensure a log metric filter and alarm exist for S3 bucket policy changes check38 -# Ensure a log metric exist for AWS Management console authentication failures check36 -# Ensure a log metric exist for VPC changes check314 - -# 3.11. Requirement 11: Regularly Test Security Systems and Processes - -# Ensure AWS GuarDduty is enabled extra713 -# Ensure Inspector has Assessment Targets -# Ensure Inspector has a Scheduled Assessment Template - -# Requirement 12: Maintain a Policy That Addresses Information Security For All Personnel - -# N/A diff --git a/groups/group16_trustboundaries b/groups/group16_trustboundaries deleted file mode 100644 index 93aa07ba..00000000 --- a/groups/group16_trustboundaries +++ /dev/null @@ -1,23 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[16]='trustboundaries' -GROUP_NUMBER[16]='16.0' -GROUP_TITLE[16]='Find cross-account trust boundaries - [trustboundaries] *******' -GROUP_RUN_BY_DEFAULT[16]='N' # run it when execute_all is called -GROUP_CHECKS[16]='extra789,extra790' - -# Single account environment: No action required. The AWS account number will be automatically added by the checks. -# Multi account environment: Any additional trusted account number should be added as a space separated list, e.g. -# GROUP_TRUSTBOUNDARIES_TRUSTED_ACCOUNT_IDS="1234567890 0987654321 6789012345" -GROUP_TRUSTBOUNDARIES_TRUSTED_ACCOUNT_IDS='' diff --git a/groups/group17_internetexposed b/groups/group17_internetexposed deleted file mode 100644 index bb482a0f..00000000 --- a/groups/group17_internetexposed +++ /dev/null @@ -1,50 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[17]='internet-exposed' -GROUP_NUMBER[17]='17.0' -GROUP_TITLE[17]='Find resources exposed to the internet - [internet-exposed] ***' -GROUP_RUN_BY_DEFAULT[17]='N' # run it when execute_all is called -GROUP_CHECKS[17]='check41,check42,check45,check46,extra72,extra73,extra74,extra76,extra77,extra78,extra79,extra710,extra711,extra716,extra723,extra727,extra731,extra736,extra738,extra745,extra748,extra749,extra750,extra751,extra752,extra753,extra754,extra755,extra770,extra771,extra778,extra779,extra787,extra788,extra795,extra796,extra798,extra7102,extra7134,extra7135,extra7136,extra7137,extra7138' - -# 4.1 [check41] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to port 22 (Scored) [group4, cislevel1, cislevel2] -# 4.2 [check42] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to port 3389 (Scored) [group4, cislevel1, cislevel2] -# 7.2 [extra72] Ensure there are no EBS Snapshots set as Public [extras, forensics-ready, gdpr, hipaa, apigateway, rds] -# 7.3 [extra73] Ensure there are no S3 buckets open to the Everyone or Any AWS user [extras, gdpr, hipaa, rds] -# 7.4 [extra74] Ensure there are no Security Groups without ingress filtering being used [extras, gdpr, hipaa, secrets, apigateway, rds] -# 7.6 [extra76] Ensure there are no EC2 AMIs set as Public [extras, gdpr, secrets] -# 7.7 [extra77] Ensure there are no ECR repositories set as Public [group1, extras, secrets, elasticsearch] -# 7.8 [extra78] Ensure there are no Public Accessible RDS instances [extras, rds, elasticsearch, trustboundaries] -# 7.9 [extra79] Check for internet facing Elastic Load Balancers [extras, trustboundaries] -# 7.10 [extra710] Check for internet facing EC2 Instances [extras] -# 7.11 [extra711] Check for Publicly Accessible Redshift Clusters [extras] -# 7.16 [extra716] Check if Amazon Elasticsearch Service (ES) domains are set as Public or if it has open policy access [extras, elasticsearch] -# 7.23 [extra723] Check if RDS Snapshots and Cluster Snapshots are public [extras, rds] -# 7.27 [extra727] Check if SQS queues have policy set as Public [extras, gdpr] -# 7.31 [extra731] Check if SNS topics have policy set as Public [extras, gdpr] -# 7.38 [extra738] Check if CloudFront distributions are set to HTTPS [extras, gdpr] -# 7.45 [extra745] Check if API Gateway endpoint is public or private [extras, apigateway] -# 7.48 [extra748] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to any port [extras] -# 7.49 [extra749] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Oracle ports 1521 or 2483 [extras] -# 7.50 [extra750] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to MySQL port 3306 [extras] -# 7.51 [extra751] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Postgres port 5432 [extras] -# 7.52 [extra752] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Redis port 6379 [extras] -# 7.53 [extra753] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to MongoDB ports 27017 and 27018 [extras] -# 7.54 [extra754] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Cassandra ports 7199 or 9160 or 8888 [extras] -# 7.55 [extra755] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Memcached port 11211 [extras] -# 7.70 [extra770] Check for internet facing EC2 instances with Instance Profiles attached [extras] -# 7.78 [extra778] Find VPC security groups with wide-open public IPv4 CIDR ranges (non-RFC1918) [extras] -# 7.79 [extra779] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Elasticsearch/Kibana ports [extras, elasticsearch] -# 7.87 [extra787] Check connection and authentication for Internet exposed Elasticsearch/Kibana ports [extras, elasticsearch] -# 7.88 [extra788] Check connection and authentication for Internet exposed Amazon Elasticsearch Service (ES) domains [extras, elasticsearch] -# 7.71 [extra771] Check if S3 buckets have policies which allow WRITE access [extras] diff --git a/groups/group18_iso27001 b/groups/group18_iso27001 deleted file mode 100644 index fe8ba0ea..00000000 --- a/groups/group18_iso27001 +++ /dev/null @@ -1,174 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[18]='iso27001' -GROUP_NUMBER[18]='18.0' -GROUP_TITLE[18]='ISO 27001:2013 Readiness - ONLY AS REFERENCE - [iso27001] *****' -GROUP_RUN_BY_DEFAULT[18]='N' # run it when execute_all is called -GROUP_CHECKS[18]='check11,check110,check111,check112,check113,check114,check115,check116,check119,check12,check122,check13,check14,check15,check16,check17,check18,check19,check21,check22,check23,check24,check25,check26,check27,check28,check29,check31,check310,check311,check312,check313,check314,check32,check33,check34,check35,check36,check37,check38,check39,check41,check42,check43,check44,extra71,extra710,extra7100,extra711,extra7113,extra7123,extra7125,extra7126,extra7128,extra7129,extra713,extra714,extra7130,extra718,extra719,extra72,extra720,extra721,extra722,extra723,extra724,extra725,extra726,extra727,extra728,extra729,extra731,extra73,extra731,extra735,extra739,extra74,extra741,extra747,extra748,extra75,extra757,extra758,extra759,extra76,extra760,extra761,extra762,extra763,extra764,extra765,extra767,extra768,extra769,extra77,extra771,extra772,extra774,extra776,extra777,extra778,extra78,extra789,extra79,extra790,extra792,extra793,extra794,extra795,extra796,extra798' - -# # Category Objective ID Objective Name Prowler check ID Check Summary -# 1 A.9 Access Control A.9.2 User Access Management check122 Ensure IAM policies that allow full "*:*" administrative privileges are not created. -# 2 A.9 Access Control A.9.2 User Access Management check111 Ensure IAM password policy expires passwords within 90 days or less -# 3 A.9 Access Control A.9.2 User Access Management check110 Ensure IAM password policy prevents password reuse -# 4 A.9 Access Control A.9.2 User Access Management check19 Ensure IAM password policy requires minimum length of 14 or greater -# 5 A.9 Access Control A.9.2 User Access Management check18 Ensure IAM password policy require at least one number -# 6 A.9 Access Control A.9.2 User Access Management check17 Ensure IAM password policy require at least one symbol -# 7 A.9 Access Control A.9.2 User Access Management check16 Ensure IAM password policy require at least one lowercase letter -# 8 A.9 Access Control A.9.2 User Access Management check15 Ensure IAM password policy requires at least one uppercase letter -# 9 A.9 Access Control A.9.2 User Access Management check11 Avoid the use of the 'root' account -# 10 A.9 Access Control A.9.2 User Access Management check116 Ensure IAM policies are attached only to groups or roles -# 11 A.9 Access Control A.9.2 User Access Management check12 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have console access -# 12 A.9 Access Control A.9.2 User Access Management check114 Ensure MFA is enabled for the 'root' account -# 13 A.9 Access Control A.9.2 User Access Management check115 Ensure security questions are registered in the AWS account -# 14 A.9 Access Control A.9.2 User Access Management check14 Ensure access keys are rotated every 90 days or less -# 15 A.9 Access Control A.9.2 User Access Management check13 Ensure credentials unused for 90 days or greater are disabled -# 16 A.9 Access Control A.9.2 User Access Management check112 Ensure no root account access key exists -# 17 A.9 Access Control A.9.2 User Access Management check119 Ensure IAM instance roles are used for AWS resource access from instances -# 18 A.9 Access Control A.9.2 User Access Management extra71 Ensure users of groups with AdministratorAccess policy have MFA tokens enabled -# 19 A.9 Access Control A.9.2 User Access Management extra7100 Ensure that no custom policies exist which allow permissive role assumption (e.g. sts:AssumeRole on *) -# 20 A.9 Access Control A.9.2 User Access Management extra7123 Check if IAM users have two active access keys -# 21 A.9 Access Control A.9.2 User Access Management extra7125 Check if IAM users have Hardware MFA enabled. -# 22 A.9 Access Control A.9.2 User Access Management extra769 Check if IAM Access Analyzer is enabled and its findings -# 23 A.9 Access Control A.9.2 User Access Management extra774 Ensure credentials unused for 30 days or greater are disabled. -# 24 A.9 Access Control A.9.3 User Responsibilities check111 Ensure IAM password policy expires passwords within 90 days or less -# 25 A.9 Access Control A.9.3 User Responsibilities check110 Ensure IAM password policy prevents password reuse -# 26 A.9 Access Control A.9.3 User Responsibilities check19 Ensure IAM password policy requires minimum length of 14 or greater -# 27 A.9 Access Control A.9.3 User Responsibilities check18 Ensure IAM password policy require at least one number -# 28 A.9 Access Control A.9.3 User Responsibilities check17 Ensure IAM password policy require at least one symbol -# 29 A.9 Access Control A.9.3 User Responsibilities check16 Ensure IAM password policy require at least one lowercase letter -# 30 A.9 Access Control A.9.3 User Responsibilities check15 Ensure IAM password policy requires at least one uppercase letter -# 31 A.9 Access Control A.9.3 User Responsibilities check12 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have console access -# 32 A.9 Access Control A.9.3 User Responsibilities check14 Ensure access keys are rotated every 90 days or less -# 33 A.9 Access Control A.9.3 User Responsibilities check13 Ensure credentials unused for 90 days or greater are disabled -# 34 A.9 Access Control A.9.4 System and Application Access Control check122 Ensure IAM policies that allow full "*:*" administrative privileges are not created. -# 35 A.9 Access Control A.9.4 System and Application Access Control check111 Ensure IAM password policy expires passwords within 90 days or less -# 36 A.9 Access Control A.9.4 System and Application Access Control check110 Ensure IAM password policy prevents password reuse -# 37 A.9 Access Control A.9.4 System and Application Access Control check19 Ensure IAM password policy requires minimum length of 14 or greater -# 38 A.9 Access Control A.9.4 System and Application Access Control check18 Ensure IAM password policy require at least one number -# 39 A.9 Access Control A.9.4 System and Application Access Control check17 Ensure IAM password policy require at least one symbol -# 40 A.9 Access Control A.9.4 System and Application Access Control check16 Ensure IAM password policy require at least one lowercase letter -# 41 A.9 Access Control A.9.4 System and Application Access Control check15 Ensure IAM password policy requires at least one uppercase letter -# 42 A.9 Access Control A.9.4 System and Application Access Control check11 Avoid the use of the 'root' account -# 43 A.9 Access Control A.9.4 System and Application Access Control check116 Ensure IAM policies are attached only to groups or roles -# 44 A.9 Access Control A.9.4 System and Application Access Control check12 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have console access -# 45 A.9 Access Control A.9.4 System and Application Access Control check113 Ensure MFA is enabled for the 'root' account -# 46 A.9 Access Control A.9.4 System and Application Access Control check14 Ensure access keys are rotated every 90 days or less -# 47 A.9 Access Control A.9.4 System and Application Access Control check13 Ensure credentials unused for 90 days or greater are disabled -# 48 A.9 Access Control A.9.4 System and Application Access Control check112 Ensure no root account access key exists -# 55 A.9 Access Control A.9.4 System and Application Access Control extra711 Check if Redshift cluster is Public Accessible -# 49 A.9 Access Control A.9.4 System and Application Access Control extra7113 Check if RDS instances have deletion protection enabled -# 50 A.9 Access Control A.9.4 System and Application Access Control extra72 Ensure there are no EBS Snapshots set as Public -# 51 A.9 Access Control A.9.4 System and Application Access Control extra723 Check if RDS Snapshots and Cluster Snapshots are public -# 52 A.9 Access Control A.9.4 System and Application Access Control extra727 Check if SQS queues have policy set as Public -# 53 A.9 Access Control A.9.4 System and Application Access Control extra73 Ensure there are no S3 buckets open to Everyone or Any AWS user -# 54 A.9 Access Control A.9.4 System and Application Access Control extra731 Check if SNS topics have policy set as Public -# 56 A.9 Access Control A.9.4 System and Application Access Control extra76 Ensure there are no EC2 AMIs set as Public -# 57 A.9 Access Control A.9.4 System and Application Access Control extra77 Ensure there are no ECR repositories set as Public -# 58 A.9 Access Control A.9.4 System and Application Access Control extra771 Check if S3 buckets have policies which allow WRITE access -# 59 A.9 Access Control A.9.4 System and Application Access Control extra795 Ensure EKS Clusters are created with Private Endpoint Enabled and Public Access Disabled -# 60 A.9 Access Control A.9.4 System and Application Access Control extra796 Restrict Access to the EKS Control Plane Endpoint -# 61 A.10 Cryptography A.10.1 Cryptographic Controls extra735 Setup Encryption at rest for RDS instances -# 62 A.10 Cryptography A.10.1 Cryptographic Controls extra792 Check if Elastic Load Balancers have insecure SSL ciphers -# 63 A.10 Cryptography A.10.1 Cryptographic Controls check37 Detect Customer Master Keys (CMKs) scheduled for deletion -# 64 A.10 Cryptography A.10.1 Cryptographic Controls check27 Ensure CloudTrail logs are encrypted at rest using KMS CMKs -# 65 A.10 Cryptography A.10.1 Cryptographic Controls check28 Ensure rotation for customer created KMS CMKs is enabled -# 66 A.10 Cryptography A.10.1 Cryptographic Controls extra7126 Check if there are CMK KMS keys not used -# 67 A.10 Cryptography A.10.1 Cryptographic Controls extra7128 Check if DynamoDB table has encryption at rest enabled using CMK KMS -# 68 A.10 Cryptography A.10.1 Cryptographic Controls extra7130 Ensure there are no SNS Topics unencrypted -# 69 A.10 Cryptography A.10.1 Cryptographic Controls extra724 Check if ACM certificates have Certificate Transparency logging enabled -# 70 A.10 Cryptography A.10.1 Cryptographic Controls extra728 Check if SQS queues have Server Side Encryption enabled -# 71 A.10 Cryptography A.10.1 Cryptographic Controls extra729 Ensure there are no EBS Volumes unencrypted -# 72 A.10 Cryptography A.10.1 Cryptographic Controls extra761 Check if EBS Default Encryption is activated -# 73 A.10 Cryptography A.10.1 Cryptographic Controls extra764 Check if S3 buckets have secure transport policy -# 74 A.10 Cryptography A.10.1 Cryptographic Controls extra767 Check if CloudFront distributions have Field Level Encryption enabled -# 75 A.10 Cryptography A.10.1 Cryptographic Controls extra791 Check if CloudFront distributions are using deprecated SSL protocols -# 76 A.10 Cryptography A.10.1 Cryptographic Controls extra793 Check if Elastic Load Balancers have SSL listeners -# 77 A.12 Operations Security A.12.3 Information Backup extra739 Check if RDS instances have backup enabled -# 78 A.12 Operations Security A.12.4 Logging and Monitoring check314 Ensure a log metric filter and alarm exist for VPC changes -# 79 A.12 Operations Security A.12.4 Logging and Monitoring check313 Ensure a log metric filter and alarm exist for route table changes -# 80 A.12 Operations Security A.12.4 Logging and Monitoring check312 Ensure a log metric filter and alarm exist for changes to network gateways -# 81 A.12 Operations Security A.12.4 Logging and Monitoring check311 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) -# 82 A.12 Operations Security A.12.4 Logging and Monitoring check310 Ensure a log metric filter and alarm exist for security group changes -# 83 A.12 Operations Security A.12.4 Logging and Monitoring check39 Ensure a log metric filter and alarm exist for AWS Config configuration changes -# 84 A.12 Operations Security A.12.4 Logging and Monitoring check39 Check if CloudFront distributions have logging enabled -# 85 A.12 Operations Security A.12.4 Logging and Monitoring extra719 Check if Route53 public hosted zones are logging queries to CloudWatch Logs -# 86 A.12 Operations Security A.12.4 Logging and Monitoring extra720 Check if Lambda functions invoke API operations are being recorded by CloudTrail -# 87 A.12 Operations Security A.12.4 Logging and Monitoring extra722 Check if API Gateway has logging enabled -# 88 A.12 Operations Security A.12.4 Logging and Monitoring check38 Ensure a log metric filter and alarm exist for S3 bucket policy changes -# 89 A.12 Operations Security A.12.4 Logging and Monitoring check37 Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs -# 90 A.12 Operations Security A.12.4 Logging and Monitoring check36 Ensure a log metric filter and alarm exist for AWS Management Console authentication failures -# 91 A.12 Operations Security A.12.4 Logging and Monitoring check35 Ensure a log metric filter and alarm exist for CloudTrail configuration changes -# 92 A.12 Operations Security A.12.4 Logging and Monitoring check34 Ensure a log metric filter and alarm exist for IAM policy changes -# 93 A.12 Operations Security A.12.4 Logging and Monitoring check33 Ensure a log metric filter and alarm exist for usage of "root" account -# 94 A.12 Operations Security A.12.4 Logging and Monitoring check32 Ensure a log metric filter and alarm exist for Management Console sign-in without MFA -# 95 A.12 Operations Security A.12.4 Logging and Monitoring check31 Ensure a log metric filter and alarm exist for unauthorized API calls -# 96 A.12 Operations Security A.12.4 Logging and Monitoring check26 Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket -# 97 A.12 Operations Security A.12.4 Logging and Monitoring check25 Ensure AWS Config is enabled in all regions -# 98 A.12 Operations Security A.12.4 Logging and Monitoring check24 Ensure CloudTrail trails are integrated with CloudWatch Logs -# 99 A.12 Operations Security A.12.4 Logging and Monitoring check29 Ensure VPC flow logging is enabled in all VPCs -#100 A.12 Operations Security A.12.4 Logging and Monitoring check23 Ensure the S3 bucket CloudTrail logs to is not publicly accessible -#101 A.12 Operations Security A.12.4 Logging and Monitoring check21 Ensure CloudTrail is enabled in all regions -#102 A.12 Operations Security A.12.4 Logging and Monitoring check21 Ensure CloudTrail is enabled in all regions -#103 A.12 Operations Security A.12.4 Logging and Monitoring extra725 Check if S3 buckets have Object-level logging enabled in CloudTrail -#104 A.12 Operations Security A.12.4 Logging and Monitoring extra794 Ensure EKS Control Plane Audit Logging is enabled for all log types -#105 A.12 Operations Security A.12.4 Logging and Monitoring extra747 Check if RDS instances is integrated with CloudWatch Logs -#106 A.12 Operations Security A.12.4 Logging and Monitoring extra718 Check if S3 buckets have server access logging enabled -#107 A.12 Operations Security A.12.6 Technical Vulnerability Management check43 Ensure the default security group of every VPC restricts all traffic -#108 A.12 Operations Security A.12.6 Technical Vulnerability Management check42 Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389 -#109 A.12 Operations Security A.12.6 Technical Vulnerability Management check41 Ensure no security groups allow ingress from 0.0.0.0/0 to port 22 -#110 A.12 Operations Security A.12.6 Technical Vulnerability Management extra76 Check for publicly shared AMIs -#111 A.12 Operations Security A.12.6 Technical Vulnerability Management extra72 Ensure EBS snapshots are not publicly accessible -#112 A.12 Operations Security A.12.6 Technical Vulnerability Management extra731 Ensure SNS topics do not allow global send or subscribe -#113 A.12 Operations Security A.12.6 Technical Vulnerability Management extra711 Ensure Redshift clusters do not have a public endpoint -#114 A.12 Operations Security A.12.6 Technical Vulnerability Management extra723 Ensure RDS snapshots are not publicly accessible -#115 A.12 Operations Security A.12.6 Technical Vulnerability Management extra78 Ensure RDS instances are not accessible to the world. -#116 A.12 Operations Security A.12.6 Technical Vulnerability Management check23 Ensure the S3 bucket CloudTrail logs to is not publicly accessible -#117 A.12 Operations Security A.12.6 Technical Vulnerability Management extra713 Check if GuardDuty is enabled -#118 A.12 Operations Security A.12.6 Technical Vulnerability Management extra726 Check Trusted Advisor for errors and warnings -#119 A.12 Operations Security A.12.6 Technical Vulnerability Management extra776 Check if ECR image scan found vulnerabilities in the newest image version -#120 A.13 Communications Security A.13.1 Network Security Management check43 Ensure the default security group of every VPC restricts all traffic -#121 A.13 Communications Security A.13.1 Network Security Management check42 Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389 -#122 A.13 Communications Security A.13.1 Network Security Management check41 Ensure no security groups allow ingress from 0.0.0.0/0 to port 22 -#123 A.13 Communications Security A.13.1 Network Security Management extra72 Ensure EBS snapshots are not publicly accessible -#124 A.13 Communications Security A.13.1 Network Security Management extra731 Ensure SNS topics do not allow global send or subscribe -#125 A.13 Communications Security A.13.1 Network Security Management extra711 Ensure Redshift clusters do not have a public endpoint -#126 A.13 Communications Security A.13.1 Network Security Management extra723 Ensure RDS snapshots are not publicly accessible -#127 A.13 Communications Security A.13.1 Network Security Management extra78 Ensure RDS instances are not accessible to the world. -#128 A.13 Communications Security A.13.1 Network Security Management extra798 Ensure Lambda Functions are not publicly accessible -#129 A.13 Communications Security A.13.1 Network Security Management check44 Ensure routing tables for VPC peering are \"least access\" -#130 A.13 Communications Security A.13.1 Network Security Management extra710 Check for internet facing EC2 Instances -#131 A.13 Communications Security A.13.1 Network Security Management extra711 Check for Publicly Accessible Redshift Clusters -#132 A.13 Communications Security A.13.1 Network Security Management extra748 Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to any port -#133 A.13 Communications Security A.13.1 Network Security Management extra7129 Check if Application Load Balancer has a WAF ACL attached -#134 A.13 Communications Security A.13.1 Network Security Management extra74 Ensure there are no Security Groups without ingress filtering being used -#135 A.13 Communications Security A.13.1 Network Security Management extra777 Find VPC security groups with many ingress or egress rules -#136 A.13 Communications Security A.13.1 Network Security Management extra778 Find VPC security groups with wide-open public IPv4 CIDR ranges (non-RFC1918) -#137 A.13 Communications Security A.13.1 Network Security Management extra789 Find trust boundaries in VPC endpoint services connections -#138 A.13 Communications Security A.13.1 Network Security Management extra79 Check for internet facing Elastic Load Balancers -#139 A.13 Communications Security A.13.1 Network Security Management extra790 Find trust boundaries in VPC endpoint services allowlisted principles -#140 A.13 Communications Security A.13.1 Network Security Management extra78 Ensure there are no Public Accessible RDS instances -#141 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra731 Check if SNS topics have policy set as Public -#142 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra741 Find secrets in EC2 User Data -#143 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra75 Ensure there are no Security Groups not being used -#144 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra757 Check EC2 Instances older than 6 months -#145 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra758 Check EC2 Instances older than 12 months -#146 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra759 Find secrets in Lambda functions variables -#147 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra760 Find secrets in Lambda functions code -#148 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra762 Find obsolete Lambda runtimes -#149 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra765 Check if ECR image scan on push is enabled -#150 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra768 Find secrets in ECS task definitions variables -#151 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra772 Check if elastic IPs are unused -#152 A.18 Compliance A.18.1 Compliance with Legal and Regulatory Reqs check22 Ensure CloudTrail log file validation is enabled -#153 A.18 Compliance A.18.1 Compliance with Legal and Regulatory Reqs extra721 Check if Redshift cluster has audit logging enabled -#154 A.18 Compliance A.18.1 Compliance with Legal and Regulatory Reqs extra763 Check if S3 buckets have object versioning enabled diff --git a/groups/group19_eks-cis b/groups/group19_eks-cis deleted file mode 100644 index 8c31932b..00000000 --- a/groups/group19_eks-cis +++ /dev/null @@ -1,15 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (c) by Toni de la Fuente -# -# This Prowler check is licensed under a -# Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. -# -# You should have received a copy of the license along with this -# work. If not, see . - -GROUP_ID[19]='eks-cis' -GROUP_NUMBER[19]='19.0' -GROUP_TITLE[19]='CIS EKS Benchmark - [eks-cis] *********************************' -GROUP_RUN_BY_DEFAULT[19]='N' # run it when execute_all is called -GROUP_CHECKS[19]='extra765,extra794,extra795,extra796,extra797' diff --git a/groups/group1_iam b/groups/group1_iam deleted file mode 100644 index 86da563c..00000000 --- a/groups/group1_iam +++ /dev/null @@ -1,15 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (c) by Toni de la Fuente -# -# This Prowler check is licensed under a -# Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. -# -# You should have received a copy of the license along with this -# work. If not, see . - -GROUP_ID[1]='group1' -GROUP_NUMBER[1]='1.0' -GROUP_TITLE[1]='Identity and Access Management - CIS only - [group1] ***********' -GROUP_RUN_BY_DEFAULT[1]='Y' # run it when execute_all is called -GROUP_CHECKS[1]='check11,check12,check13,check14,check15,check16,check17,check18,check19,check110,check111,check112,check113,check114,check115,check116,check117,check118,check119,check120,check121,check122' diff --git a/groups/group20_ffiec b/groups/group20_ffiec deleted file mode 100644 index 03b35c6f..00000000 --- a/groups/group20_ffiec +++ /dev/null @@ -1,22 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[20]='ffiec' -GROUP_NUMBER[20]='20.0' -GROUP_TITLE[20]='FFIEC Cybersecurity Readiness - ONLY AS REFERENCE - [ffiec] ***' -GROUP_RUN_BY_DEFAULT[20]='N' # run it when execute_all is called -GROUP_CHECKS[20]='check11,check12,check13,check14,check16,check18,check19,check21,check23,check25,check29,check29,check31,check32,check33,check34,check35,check36,check37,check37,check38,check39,check41,check42,check43,check110,check112,check113,check116,check310,check311,check312,check313,check314,extra72,extra76,extra78,extra711,extra723,extra729,extra731,extra734,extra735,extra763,extra792' - -# References: -# 1. https://www.ffiec.gov/pdf/cybersecurity/FFIEC_CAT_May_2017.pdf -# 2. https://ithandbook.ffiec.gov/media/274793/ffiec_itbooklet_informationsecurity.pdf diff --git a/groups/group21_soc2 b/groups/group21_soc2 deleted file mode 100644 index 84f2cac3..00000000 --- a/groups/group21_soc2 +++ /dev/null @@ -1,23 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[21]='soc2' -GROUP_NUMBER[21]='21.0' -GROUP_TITLE[21]='SOC2 Readiness - ONLY AS REFERENCE - [soc2] *******************' -GROUP_RUN_BY_DEFAULT[21]='N' # run it when execute_all is called -GROUP_CHECKS[21]='check110,check111,check113,check12,check122,check13,check15,check16,check17,check18,check19,check21,check31,check310,check32,check33,check34,check35,check36,check37,check38,check39,check41,check42,check43,extra711,extra72,extra723,extra729,extra731,extra734,extra735,extra739,extra76,extra78,extra792' - -# References: -# 1. https://www.aicpa.org/content/dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/trust-services-criteria.pdf -# 2. https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/mappingsrelevanttothesocsuiteofservices.html -# 3. https://www.aicpa.org/content/dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/othermapping/mapping-final-2017-tsc-to-extant-2016-tspc.xlsx diff --git a/groups/group22_sagemaker b/groups/group22_sagemaker deleted file mode 100644 index 7a4d62ab..00000000 --- a/groups/group22_sagemaker +++ /dev/null @@ -1,19 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2222) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[22]='sagemaker' -GROUP_NUMBER[22]='22.0' -GROUP_TITLE[22]='Amazon SageMaker related security checks - [sagemaker] ********' -GROUP_RUN_BY_DEFAULT[22]='N' # run it when execute_all is called -GROUP_CHECKS[22]='extra7103,extra7104,extra7111,extra7112,extra7105,extra7106,extra7107,extra7108,extra7109,extra7110' - diff --git a/groups/group23_ens b/groups/group23_ens deleted file mode 100644 index 098ddc61..00000000 --- a/groups/group23_ens +++ /dev/null @@ -1,83 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[23]='ens' -GROUP_NUMBER[23]='23.0' -GROUP_TITLE[23]='ENS Esquema Nacional de Seguridad security checks - [ens] *****' -GROUP_RUN_BY_DEFAULT[23]='N' # run it when execute_all is called -GROUP_CHECKS[23]='extra733,extra7123,check13,check14,check121,extra7100,check120,check116,extra7124,check12,extra7125,check14,check13,check21,check25,extra7127,check35,check24,check31,check36,check32,check33,check34,check22,extra71,check23,check23,check27,check37,extra736,check28,extra713,check21,check29,extra793,extra792,extra764,extra738,check43,extra74,extra710,extra75,check41,check42,extra749,extra750,extra751,extra752,extra753,extra754,extra755,extra7128,extra729,extra761,extra740,extra735,extra734,extra728,extra781,extra773,extra744,extra7126,extra7129' - -# ENS Control ID for AWS;Prowler checks that apply -# ens-op.acc.1.aws.iam.1;extra733 -# ens-op.acc.1.aws.iam.2;extra7123 -# ens-op.acc.1.aws.iam.3;check13 -# ens-op.acc.1.aws.iam.4;check14 -# ens-op.acc.1.aws.iam.5;check121 -# ens-op.acc.2.aws.iam.1;extra7100 -# ens-op.acc.1.aws.iam.4;check120 -# ens-op.acc.3.aws.iam.1;check116 -# ens-op.acc.4.aws.sys.1;extra7124 -# ens-op.acc.5.aws.iam.1;check12 -# ens-op.acc.5.aws.iam.2;extra7125 -# ens-op.acc.5.aws.iam.3;check14 -# ens-op.acc.5.aws.iam.4;check13 -# ens-op.acc.7.aws.iam.1;check21 -# ens-op.exp.1.aws.cfg.1;check25 -# ens-op.exp.1.aws.sys.1;extra7127 -# ens-op.exp.4.aws.sys.1;extra7127 -# ens-op.exp.8.aws.trail.1;check35 -# ens-op.exp.8.aws.cw.1;check24 -# ens-op.exp.8.aws.trail.2;check31 -# ens-op.exp.8.aws.trail.3;check36 -# ens-op.exp.8.aws.trail.4;check32 -# ens-op.exp.8.aws.trail.5;check33 -# ens-op.exp.8.aws.trail.6;check34 -# ens-op.exp.10.aws.trail.1;check22 -# ens-op.exp.10.aws.trail.2;extra71 -# ens-op.exp.10.aws.trail.3;check23 -# ens-op.exp.10.aws.trail.4;check23 -# ens-op.exp.10.aws.trail.5;check27 -# ens-op.exp.11.aws.kms.1;check37 -# ens-op.exp.11.aws.kms.2;extra736* -# ens-op.exp.11.aws.kms.3;check28 -# ens-op.mon.1.aws.duty.1;extra713 -# ens-op.mon.1.aws.trail.1;check21 -# ens-op.mon.1.aws.flow.1;check29 -# ens-mp.com.2.aws.elb.1;extra793 -# ens-mp.com.2.aws.elb.2;extra792 -# ens-mp.com.2.aws.s3.1;extra764 -# ens-mp.com.2.aws.front.1;extra738 -# ens-mp.com.4.aws.sg.1;check43 -# ens-mp.com.4.aws.sg.2;extra74 -# ens-mp.com.4.aws.vpc.1;extra710 -# ens-mp.com.4.aws.sg.3;extra75 -# ens-mp.com.4.aws.sg.4;check41 -# ens-mp.com.4.aws.sg.5;check42 -# ens-mp.com.4.aws.sg.6;extra749 -# ens-mp.com.4.aws.sg.7;extra750 -# ens-mp.com.4.aws.sg.8;extra751 -# ens-mp.com.4.aws.sg.9;extra752 -# ens-mp.com.4.aws.sg.10;extra753 -# ens-mp.com.4.aws.sg.11;extra754 -# ens-mp.com.4.aws.sg.12;extra755 -# ens-mp.info.3.aws.dyndb.1;extra7128 -# ens-mp.info.3.aws.ebs.1;extra729 -# ens-mp.info.3.aws.ebs.2;extra761 -# ens-mp.info.3.aws.ebs.3;extra740 -# ens-mp.info.3.aws.rds.1;extra735 -# ens-mp.info.3.s3.1;extra734 -# ens-mp.info.3.sns.1;extra728 -# ens-mp.info.3.aws.au.1;extra781 -# ens-mp.s.2.aws.waf.1;extra773 -# ens-mp.s.2.aws.waf.2;extra744 -# ens-mp.s.2.aws.waf.3;extra7129 diff --git a/groups/group24_glue b/groups/group24_glue deleted file mode 100644 index a9b8c313..00000000 --- a/groups/group24_glue +++ /dev/null @@ -1,18 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[24]='glue' -GROUP_NUMBER[24]='24.0' -GROUP_TITLE[24]='Amazon Glue related security checks - [glue] ******************' -GROUP_RUN_BY_DEFAULT[24]='N' # run it when execute_all is called -GROUP_CHECKS[24]='extra7114,extra7115,extra7116,extra7117,extra7118,extra7119,extra7120,extra7121,extra7122' \ No newline at end of file diff --git a/groups/group25_FTR b/groups/group25_FTR deleted file mode 100644 index 501597a3..00000000 --- a/groups/group25_FTR +++ /dev/null @@ -1,46 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[25]='ftr' -GROUP_NUMBER[25]='25.0' -GROUP_TITLE[25]='Amazon FTR related security checks - [ftr] ********************' -GROUP_RUN_BY_DEFAULT[25]='N' # run it when execute_all is called -GROUP_CHECKS[25]='check11,check12,check13,check14,check15,check16,check17,check18,check19,check110,check111,check111,check112,check113,check117,check118,check122,check21,check22,extra759,extra760,extra768,extra775,extra797,extra7141,extra73' - -# Checks from AWS FTR https://apn-checklists.s3.amazonaws.com/foundational/partner-hosted/partner-hosted/CVLHEC5X7.html -# 1.1 [check11] Avoid the use of the root account - iam [High] -# 1.2 [check12] Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password - iam [High] -# 1.3 [check13] Ensure credentials unused for 90 days or greater are disabled - iam [Medium] -# 1.4 [check14] Ensure access keys are rotated every 90 days or less - iam [Medium] -# 1.5 [check15] Ensure IAM password policy requires at least one uppercase letter - iam [Medium] -# 1.6 [check16] Ensure IAM password policy require at least one lowercase letter - iam [Medium] -# 1.7 [check17] Ensure IAM password policy require at least one symbol - iam [Medium] -# 1.8 [check18] Ensure IAM password policy require at least one number - iam [Medium] -# 1.9 [check19] Ensure IAM password policy requires minimum length of 14 or greater - iam [Medium] -# 1.10 [check110] Ensure IAM password policy prevents password reuse: 24 or greater - iam [Medium] -# 1.11 [check111] Ensure IAM password policy expires passwords within 90 days or less - iam [Medium] -# 1.12 [check112] Ensure no root account access key exists - iam [Critical] -# 1.13 [check113] Ensure MFA is enabled for the root account - iam [Critical] -# 1.17 [check117] Maintain current contact details - support [Medium] -# 1.18 [check118] Ensure security contact information is registered - support [Medium] -# 1.22 [check122] Ensure IAM policies that allow full "*:*" administrative privileges are not created - iam [Medium] -# 2.1 [check21] Ensure CloudTrail is enabled in all regions - cloudtrail [High] -# 2.2 [check22] Ensure CloudTrail log file validation is enabled - cloudtrail [Medium] -# 7.59 [extra759] Find secrets in Lambda functions variables - lambda [Critical] -# 7.60 [extra760] Find secrets in Lambda functions code - lambda [Critical] -# 7.68 [extra768] Find secrets in ECS task definitions variables - ecs [Critical] -# 7.75 [extra775] Find secrets in EC2 Auto Scaling Launch Configuration - autoscaling [Critical] -# 7.97 [extra797] Ensure Kubernetes Secrets are encrypted using Customer Master Keys (CMKs) - eks [Medium] -# 7.141 [extra7141] Find secrets in SSM Documents - ssm [Critical] -# 7.3 [extra73] Ensure there are no S3 buckets open to Everyone or Any AWS user - s3 [Critical] - diff --git a/groups/group2_logging b/groups/group2_logging deleted file mode 100644 index a9d4db0b..00000000 --- a/groups/group2_logging +++ /dev/null @@ -1,15 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (c) by Toni de la Fuente -# -# This Prowler check is licensed under a -# Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. -# -# You should have received a copy of the license along with this -# work. If not, see . - -GROUP_ID[2]='group2' -GROUP_NUMBER[2]='2.0' -GROUP_TITLE[2]='Logging - CIS only - [group2] **********************************' -GROUP_RUN_BY_DEFAULT[2]='Y' # run it when execute_all is called -GROUP_CHECKS[2]='check21,check22,check23,check24,check25,check26,check27,check28,check29' diff --git a/groups/group3_monitoring b/groups/group3_monitoring deleted file mode 100644 index 058939a1..00000000 --- a/groups/group3_monitoring +++ /dev/null @@ -1,15 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (c) by Toni de la Fuente -# -# This Prowler check is licensed under a -# Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. -# -# You should have received a copy of the license along with this -# work. If not, see . - -GROUP_ID[3]='group3' -GROUP_NUMBER[3]='3.0' -GROUP_TITLE[3]='Monitoring - CIS only - [group3] *******************************' -GROUP_RUN_BY_DEFAULT[3]='Y' # run it when execute_all is called -GROUP_CHECKS[3]='check31,check32,check33,check34,check35,check36,check37,check38,check39,check310,check311,check312,check313,check314' diff --git a/groups/group4_networking b/groups/group4_networking deleted file mode 100644 index ca124465..00000000 --- a/groups/group4_networking +++ /dev/null @@ -1,15 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (c) by Toni de la Fuente -# -# This Prowler check is licensed under a -# Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. -# -# You should have received a copy of the license along with this -# work. If not, see . - -GROUP_ID[4]='group4' -GROUP_NUMBER[4]='4.0' -GROUP_TITLE[4]='Networking - CIS only - [group4] *******************************' -GROUP_RUN_BY_DEFAULT[4]='Y' # run it when execute_all is called -GROUP_CHECKS[4]='check41,check42,check43,check44,check45,check46' diff --git a/groups/group5_cislevel1 b/groups/group5_cislevel1 deleted file mode 100644 index 3fe3a084..00000000 --- a/groups/group5_cislevel1 +++ /dev/null @@ -1,15 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (c) by Toni de la Fuente -# -# This Prowler check is licensed under a -# Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. -# -# You should have received a copy of the license along with this -# work. If not, see . - -GROUP_ID[5]='cislevel1' -GROUP_NUMBER[5]='5.0' -GROUP_TITLE[5]='CIS Level 1 - CIS only - [cislevel1] ***************************' -GROUP_RUN_BY_DEFAULT[5]='N' # run it when execute_all is called -GROUP_CHECKS[5]='check11,check12,check13,check14,check15,check16,check17,check18,check19,check110,check111,check112,check113,check115,check116,check117,check118,check119,check120,check122,check21,check23,check24,check25,check26,check31,check32,check33,check34,check35,check38,check312,check313,check314,check41,check42' diff --git a/groups/group6_cislevel2 b/groups/group6_cislevel2 deleted file mode 100644 index 67fdc1e1..00000000 --- a/groups/group6_cislevel2 +++ /dev/null @@ -1,15 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (c) by Toni de la Fuente -# -# This Prowler check is licensed under a -# Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. -# -# You should have received a copy of the license along with this -# work. If not, see . - -GROUP_ID[6]='cislevel2' -GROUP_NUMBER[6]='6.0' -GROUP_TITLE[6]='CIS Level 2 - CIS only - [cislevel2] ***************************' -GROUP_RUN_BY_DEFAULT[6]='N' # run it when execute_all is called -GROUP_CHECKS[6]='check11,check12,check13,check14,check15,check16,check17,check18,check19,check110,check111,check112,check113,check114,check115,check116,check117,check118,check119,check120,check121,check122,check21,check22,check23,check24,check25,check26,check27,check28,check29,check31,check32,check33,check34,check35,check36,check37,check38,check39,check310,check311,check312,check313,check314,check41,check42,check43,check44' diff --git a/groups/group7_extras b/groups/group7_extras deleted file mode 100644 index 5f6c1661..00000000 --- a/groups/group7_extras +++ /dev/null @@ -1,25 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[7]='extras' -GROUP_NUMBER[7]='7.0' -GROUP_TITLE[7]='Extras - all non CIS specific checks - [extras] ****************' -GROUP_RUN_BY_DEFAULT[7]='Y' # run it when execute_all is called -GROUP_CHECKS[7]='extra71,extra72,extra73,extra74,extra75,extra76,extra77,extra78,extra79,extra710,extra711,extra712,extra713,extra714,extra715,extra716,extra717,extra718,extra719,extra720,extra721,extra722,extra723,extra724,extra725,extra726,extra727,extra728,extra729,extra730,extra731,extra732,extra733,extra734,extra735,extra736,extra738,extra739,extra740,extra741,extra742,extra743,extra744,extra745,extra746,extra747,extra748,extra749,extra750,extra751,extra752,extra753,extra754,extra755,extra757,extra758,extra761,extra762,extra763,extra764,extra765,extra767,extra768,extra769,extra770,extra771,extra772,extra773,extra774,extra775,extra776,extra777,extra778,extra779,extra780,extra781,extra782,extra783,extra784,extra785,extra786,extra787,extra788,extra791,extra792,extra793,extra794,extra795,extra796,extra797,extra798,extra799,extra7100,extra7101,extra7102,extra7103,extra7104,extra7105,extra7106,extra7107,extra7108,extra7109,extra7110,extra7111,extra7112,extra7113,extra7114,extra7115,extra7116,extra7117,extra7118,extra7119,extra7120,extra7121,extra7122,extra7123,extra7124,extra7125,extra7126,extra7127,extra7128,extra7129,extra7130,extra7131,extra7132,extra7133,extra7134,extra7135,extra7136,extra7137,extra7138,extra7139,extra7140,extra7141,extra7142,extra7143,extra7144,extra7145,extra7146,extra7147,extra7148,extra7149,extra7150,extra7151,extra7152,extra7153,extra7154,extra7155,extra7156,extra7157,extra7158,extra7159,extra7160,extra7161,extra7162,extra7163,extra7164,extra7165,extra7166,extra7167,extra7168,extra7169,extra7170,extra7171,extra7172,extra7173,extra7174,extra7175,extra7176,extra7177,extra7178,extra7179,extra7180' - -# Extras 759 and 760 (lambda variables and code secrets finder are not included) -# to run detect-secrets use `./prowler -g secrets` - -# Extras 789 and 790 VPC trust boundaries are not included by default in Extras -# to run trust-boundaries use `./prowler -g trustboundaries` -# read more in https://github.com/toniblyx/prowler/#trust-boundaries-checks diff --git a/groups/group8_forensics b/groups/group8_forensics deleted file mode 100644 index 3e035c89..00000000 --- a/groups/group8_forensics +++ /dev/null @@ -1,18 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[8]='forensics-ready' -GROUP_NUMBER[8]='8.0' -GROUP_TITLE[8]='Forensics Readiness - [forensics-ready] ************************' -GROUP_RUN_BY_DEFAULT[8]='N' # run it when execute_all is called -GROUP_CHECKS[8]='check21,check22,check23,check24,check25,check26,check27,check29,extra712,extra713,extra714,extra715,extra717,extra718,extra719,extra720,extra721,extra722,extra725,extra7101,extra794' diff --git a/groups/group9_gdpr b/groups/group9_gdpr deleted file mode 100644 index cef487f1..00000000 --- a/groups/group9_gdpr +++ /dev/null @@ -1,24 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[9]='gdpr' -GROUP_NUMBER[9]='9.0' -GROUP_TITLE[9]='GDPR Readiness - ONLY AS REFERENCE - [gdpr] ********************' -GROUP_RUN_BY_DEFAULT[9]='N' # run it when execute_all is called -GROUP_CHECKS[9]='extra718,extra725,extra727,check12,check113,check114,extra71,extra731,extra732,extra733,check25,check39,check21,check22,check23,check24,check26,check27,check35,extra726,extra714,extra715,extra717,extra719,extra720,extra721,extra722,check43,check25,extra714,extra729,extra734,extra735,extra736,extra738,extra740,extra761,check11,check110,check111,check112,check116,check120,check122,check13,check14,check15,check16,check17,check18,check19,check28,check29,check31,check310,check311,check312,check313,check314,check32,check33,check34,check36,check37,check38,check41,check42,extra711,extra72,extra723,extra730,extra739,extra76,extra763,extra778,extra78,extra792,extra798' - -# Resources: -# https://d1.awsstatic.com/whitepapers/compliance/GDPR_Compliance_on_AWS.pdf -# https://www.slideshare.net/AmazonWebServices/sid303-navigating-gdpr-compliance-on-aws -# https://aws.amazon.com/compliance/gdpr-center/ -# https://eur-lex.europa.eu/eli/reg/2016/679/2016-05-04 diff --git a/groups/groupN_sample b/groups/groupN_sample deleted file mode 100644 index ceff9702..00000000 --- a/groups/groupN_sample +++ /dev/null @@ -1,18 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[9]='my-custom-group' -GROUP_NUMBER[9]='9.0' -GROUP_TITLE[9]='My Custom Group - [my-custom-group] ****************************' -GROUP_RUN_BY_DEFAULT[9]='N' # run it when execute_all is called -GROUP_CHECKS[9]='checkNN,checkMM' diff --git a/permissions/create_role_to_assume_cfn.yaml b/permissions/create_role_to_assume_cfn.yaml index ee09ad3b..c5f3ef96 100644 --- a/permissions/create_role_to_assume_cfn.yaml +++ b/permissions/create_role_to_assume_cfn.yaml @@ -7,7 +7,7 @@ AWSTemplateFormatVersion: '2010-09-09' # --stack-name "ProwlerExecRole" \ # --parameters "ParameterKey=AuthorisedARN,ParameterValue=arn:aws:iam::123456789012:root" # -Description: | +Description: | This template creates an AWS IAM Role with an inline policy and two AWS managed policies attached. It sets the trust policy on that IAM Role to permit a named ARN in another AWS account to assume that role. The role name and the ARN of the trusted user can all be passed @@ -48,7 +48,7 @@ Resources: - 'arn:aws:iam::aws:policy/SecurityAudit' - 'arn:aws:iam::aws:policy/job-function/ViewOnlyAccess' RoleName: !Sub ${ProwlerRoleName} - Policies: + Policies: - PolicyName: ProwlerExecRoleAdditionalViewPrivileges PolicyDocument: Version : '2012-10-17' diff --git a/permissions/prowler-additions-policy.json b/permissions/prowler-additions-policy.json index b2f02eab..e4f8cd09 100644 --- a/permissions/prowler-additions-policy.json +++ b/permissions/prowler-additions-policy.json @@ -1,26 +1,26 @@ { - "Version": "2012-10-17", - "Statement": [ - { - "Action": [ - "ds:ListAuthorizedApplications", - "ec2:GetEbsEncryptionByDefault", - "ecr:Describe*", - "elasticfilesystem:DescribeBackupPolicy", - "glue:GetConnections", - "glue:GetSecurityConfiguration", - "glue:SearchTables", - "lambda:GetFunction", - "s3:GetAccountPublicAccessBlock", - "shield:DescribeProtection", - "shield:GetSubscriptionState", - "ssm:GetDocument", - "support:Describe*", - "tag:GetTagKeys" - ], - "Resource": "*", - "Effect": "Allow", - "Sid": "AllowMoreReadForProwler" - } - ] + "Version": "2012-10-17", + "Statement": [ + { + "Action": [ + "ds:ListAuthorizedApplications", + "ec2:GetEbsEncryptionByDefault", + "ecr:Describe*", + "elasticfilesystem:DescribeBackupPolicy", + "glue:GetConnections", + "glue:GetSecurityConfiguration", + "glue:SearchTables", + "lambda:GetFunction", + "s3:GetAccountPublicAccessBlock", + "shield:DescribeProtection", + "shield:GetSubscriptionState", + "ssm:GetDocument", + "support:Describe*", + "tag:GetTagKeys" + ], + "Resource": "*", + "Effect": "Allow", + "Sid": "AllowMoreReadForProwler" + } + ] } diff --git a/permissions/prowler-security-hub.json b/permissions/prowler-security-hub.json index be6048df..06e4bfc2 100644 --- a/permissions/prowler-security-hub.json +++ b/permissions/prowler-security-hub.json @@ -1,13 +1,13 @@ { - "Version": "2012-10-17", - "Statement": [ - { - "Action": [ - "securityhub:BatchImportFindings", - "securityhub:GetFindings" - ], - "Effect": "Allow", - "Resource": "*" - } - ] + "Version": "2012-10-17", + "Statement": [ + { + "Action": [ + "securityhub:BatchImportFindings", + "securityhub:GetFindings" + ], + "Effect": "Allow", + "Resource": "*" + } + ] } diff --git a/providers/aws/services/accessanalyzer/accessanalyzer_client.py b/providers/aws/services/accessanalyzer/accessanalyzer_client.py deleted file mode 100644 index 6868b91d..00000000 --- a/providers/aws/services/accessanalyzer/accessanalyzer_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.accessanalyzer.accessanalyzer_service import AccessAnalyzer - -accessanalyzer_client = AccessAnalyzer(current_audit_info) diff --git a/providers/aws/services/account/account_client.py b/providers/aws/services/account/account_client.py deleted file mode 100644 index 4a92ee4b..00000000 --- a/providers/aws/services/account/account_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.account.account_service import Account - -account_client = Account(current_audit_info) diff --git a/providers/aws/services/acm/acm_client.py b/providers/aws/services/acm/acm_client.py deleted file mode 100644 index 3bd6cf0a..00000000 --- a/providers/aws/services/acm/acm_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.acm.acm_service import ACM - -acm_client = ACM(current_audit_info) diff --git a/providers/aws/services/apigateway/apigateway_client.py b/providers/aws/services/apigateway/apigateway_client.py deleted file mode 100644 index 9de6b8af..00000000 --- a/providers/aws/services/apigateway/apigateway_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.apigateway.apigateway_service import APIGateway - -apigateway_client = APIGateway(current_audit_info) diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_client.py b/providers/aws/services/apigatewayv2/apigatewayv2_client.py deleted file mode 100644 index 67a4e528..00000000 --- a/providers/aws/services/apigatewayv2/apigatewayv2_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.apigatewayv2.apigatewayv2_service import ApiGatewayV2 - -apigatewayv2_client = ApiGatewayV2(current_audit_info) diff --git a/providers/aws/services/appstream/appstream_client.py b/providers/aws/services/appstream/appstream_client.py deleted file mode 100644 index 0506543d..00000000 --- a/providers/aws/services/appstream/appstream_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.appstream.appstream_service import AppStream - -appstream_client = AppStream(current_audit_info) diff --git a/providers/aws/services/autoscaling/autoscaling_client.py b/providers/aws/services/autoscaling/autoscaling_client.py deleted file mode 100644 index ea993cd1..00000000 --- a/providers/aws/services/autoscaling/autoscaling_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.autoscaling.autoscaling_service import AutoScaling - -autoscaling_client = AutoScaling(current_audit_info) diff --git a/providers/aws/services/awslambda/awslambda_client.py b/providers/aws/services/awslambda/awslambda_client.py deleted file mode 100644 index d8e6c325..00000000 --- a/providers/aws/services/awslambda/awslambda_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.awslambda.awslambda_service import Lambda - -awslambda_client = Lambda(current_audit_info) diff --git a/providers/aws/services/cloudformation/cloudformation_client.py b/providers/aws/services/cloudformation/cloudformation_client.py deleted file mode 100644 index 7d6de63a..00000000 --- a/providers/aws/services/cloudformation/cloudformation_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.cloudformation.cloudformation_service import CloudFormation - -cloudformation_client = CloudFormation(current_audit_info) diff --git a/providers/aws/services/cloudfront/cloudfront_client.py b/providers/aws/services/cloudfront/cloudfront_client.py deleted file mode 100644 index cba3c58e..00000000 --- a/providers/aws/services/cloudfront/cloudfront_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.cloudfront.cloudfront_service import CloudFront - -cloudfront_client = CloudFront(current_audit_info) diff --git a/providers/aws/services/cloudtrail/cloudtrail_client.py b/providers/aws/services/cloudtrail/cloudtrail_client.py deleted file mode 100644 index c6695748..00000000 --- a/providers/aws/services/cloudtrail/cloudtrail_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail - -cloudtrail_client = Cloudtrail(current_audit_info) diff --git a/providers/aws/services/cloudwatch/cloudwatch_client.py b/providers/aws/services/cloudwatch/cloudwatch_client.py deleted file mode 100644 index 3c67ee3d..00000000 --- a/providers/aws/services/cloudwatch/cloudwatch_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.cloudwatch.cloudwatch_service import CloudWatch - -cloudwatch_client = CloudWatch(current_audit_info) diff --git a/providers/aws/services/cloudwatch/logs_client.py b/providers/aws/services/cloudwatch/logs_client.py deleted file mode 100644 index f022533a..00000000 --- a/providers/aws/services/cloudwatch/logs_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.cloudwatch.cloudwatch_service import Logs - -logs_client = Logs(current_audit_info) diff --git a/providers/aws/services/codeartifact/codeartifact_client.py b/providers/aws/services/codeartifact/codeartifact_client.py deleted file mode 100644 index 9345f6a6..00000000 --- a/providers/aws/services/codeartifact/codeartifact_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.codeartifact.codeartifact_service import CodeArtifact - -codeartifact_client = CodeArtifact(current_audit_info) diff --git a/providers/aws/services/codebuild/codebuild_client.py b/providers/aws/services/codebuild/codebuild_client.py deleted file mode 100644 index 917d2299..00000000 --- a/providers/aws/services/codebuild/codebuild_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.codebuild.codebuild_service import Codebuild - -codebuild_client = Codebuild(current_audit_info) diff --git a/providers/aws/services/config/config_client.py b/providers/aws/services/config/config_client.py deleted file mode 100644 index be7ac5a4..00000000 --- a/providers/aws/services/config/config_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.config.config_service import Config - -config_client = Config(current_audit_info) diff --git a/providers/aws/services/directoryservice/directoryservice_client.py b/providers/aws/services/directoryservice/directoryservice_client.py deleted file mode 100644 index cd14c5bb..00000000 --- a/providers/aws/services/directoryservice/directoryservice_client.py +++ /dev/null @@ -1,6 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.directoryservice.directoryservice_service import ( - DirectoryService, -) - -directoryservice_client = DirectoryService(current_audit_info) diff --git a/providers/aws/services/dynamodb/dax_client.py b/providers/aws/services/dynamodb/dax_client.py deleted file mode 100644 index 6a1fead9..00000000 --- a/providers/aws/services/dynamodb/dax_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.dynamodb.dynamodb_service import DAX - -dax_client = DAX(current_audit_info) diff --git a/providers/aws/services/dynamodb/dynamodb_client.py b/providers/aws/services/dynamodb/dynamodb_client.py deleted file mode 100644 index 794aef8e..00000000 --- a/providers/aws/services/dynamodb/dynamodb_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.dynamodb.dynamodb_service import DynamoDB - -dynamodb_client = DynamoDB(current_audit_info) diff --git a/providers/aws/services/ec2/ec2_client.py b/providers/aws/services/ec2/ec2_client.py deleted file mode 100644 index f51b1fe1..00000000 --- a/providers/aws/services/ec2/ec2_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.ec2.ec2_service import EC2 - -ec2_client = EC2(current_audit_info) diff --git a/providers/aws/services/ecr/ecr_client.py b/providers/aws/services/ecr/ecr_client.py deleted file mode 100644 index a50598df..00000000 --- a/providers/aws/services/ecr/ecr_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.ecr.ecr_service import ECR - -ecr_client = ECR(current_audit_info) diff --git a/providers/aws/services/ecs/ecs_client.py b/providers/aws/services/ecs/ecs_client.py deleted file mode 100644 index dfb611fa..00000000 --- a/providers/aws/services/ecs/ecs_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.ecs.ecs_service import ECS - -ecs_client = ECS(current_audit_info) diff --git a/providers/aws/services/efs/efs_client.py b/providers/aws/services/efs/efs_client.py deleted file mode 100644 index f359a49d..00000000 --- a/providers/aws/services/efs/efs_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.efs.efs_service import EFS - -efs_client = EFS(current_audit_info) diff --git a/providers/aws/services/eks/eks_client.py b/providers/aws/services/eks/eks_client.py deleted file mode 100644 index dd01bd35..00000000 --- a/providers/aws/services/eks/eks_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.eks.eks_service import EKS - -eks_client = EKS(current_audit_info) diff --git a/providers/aws/services/elb/elb_client.py b/providers/aws/services/elb/elb_client.py deleted file mode 100644 index 1e5e4864..00000000 --- a/providers/aws/services/elb/elb_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.elb.elb_service import ELB - -elb_client = ELB(current_audit_info) diff --git a/providers/aws/services/elbv2/elbv2_client.py b/providers/aws/services/elbv2/elbv2_client.py deleted file mode 100644 index fd544dcc..00000000 --- a/providers/aws/services/elbv2/elbv2_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.elbv2.elbv2_service import ELBv2 - -elbv2_client = ELBv2(current_audit_info) diff --git a/providers/aws/services/emr/emr_client.py b/providers/aws/services/emr/emr_client.py deleted file mode 100644 index 3e5084d8..00000000 --- a/providers/aws/services/emr/emr_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.emr.emr_service import EMR - -emr_client = EMR(current_audit_info) diff --git a/providers/aws/services/glacier/glacier_client.py b/providers/aws/services/glacier/glacier_client.py deleted file mode 100644 index 29006933..00000000 --- a/providers/aws/services/glacier/glacier_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.glacier.glacier_service import Glacier - -glacier_client = Glacier(current_audit_info) diff --git a/providers/aws/services/globalaccelerator/globalaccelerator_client.py b/providers/aws/services/globalaccelerator/globalaccelerator_client.py deleted file mode 100644 index 23a026ac..00000000 --- a/providers/aws/services/globalaccelerator/globalaccelerator_client.py +++ /dev/null @@ -1,6 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.globalaccelerator.globalaccelerator_service import ( - GlobalAccelerator, -) - -globalaccelerator_client = GlobalAccelerator(current_audit_info) diff --git a/providers/aws/services/glue/glue_client.py b/providers/aws/services/glue/glue_client.py deleted file mode 100644 index 56bac88e..00000000 --- a/providers/aws/services/glue/glue_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.glue.glue_service import Glue - -glue_client = Glue(current_audit_info) diff --git a/providers/aws/services/guardduty/guardduty_client.py b/providers/aws/services/guardduty/guardduty_client.py deleted file mode 100644 index fce27117..00000000 --- a/providers/aws/services/guardduty/guardduty_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.guardduty.guardduty_service import GuardDuty - -guardduty_client = GuardDuty(current_audit_info) diff --git a/providers/aws/services/iam/iam_client.py b/providers/aws/services/iam/iam_client.py deleted file mode 100644 index 4deb8012..00000000 --- a/providers/aws/services/iam/iam_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.iam.iam_service import IAM - -iam_client = IAM(current_audit_info) diff --git a/providers/aws/services/kms/kms_client.py b/providers/aws/services/kms/kms_client.py deleted file mode 100644 index cf3c08fc..00000000 --- a/providers/aws/services/kms/kms_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.kms.kms_service import KMS - -kms_client = KMS(current_audit_info) diff --git a/providers/aws/services/macie/macie_client.py b/providers/aws/services/macie/macie_client.py deleted file mode 100644 index 68ee1be9..00000000 --- a/providers/aws/services/macie/macie_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.macie.macie_service import Macie - -macie_client = Macie(current_audit_info) diff --git a/providers/aws/services/opensearch/opensearch_client.py b/providers/aws/services/opensearch/opensearch_client.py deleted file mode 100644 index b11bc685..00000000 --- a/providers/aws/services/opensearch/opensearch_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.opensearch.opensearch_service import OpenSearchService - -opensearch_client = OpenSearchService(current_audit_info) diff --git a/providers/aws/services/rds/rds_client.py b/providers/aws/services/rds/rds_client.py deleted file mode 100644 index d8462d27..00000000 --- a/providers/aws/services/rds/rds_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.rds.rds_service import RDS - -rds_client = RDS(current_audit_info) diff --git a/providers/aws/services/redshift/redshift_client.py b/providers/aws/services/redshift/redshift_client.py deleted file mode 100644 index 6c471215..00000000 --- a/providers/aws/services/redshift/redshift_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.redshift.redshift_service import Redshift - -redshift_client = Redshift(current_audit_info) diff --git a/providers/aws/services/route53/route53_client.py b/providers/aws/services/route53/route53_client.py deleted file mode 100644 index 6f222de5..00000000 --- a/providers/aws/services/route53/route53_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.route53.route53_service import Route53 - -route53_client = Route53(current_audit_info) diff --git a/providers/aws/services/route53/route53domains_client.py b/providers/aws/services/route53/route53domains_client.py deleted file mode 100644 index 1aee576f..00000000 --- a/providers/aws/services/route53/route53domains_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.route53.route53_service import Route53Domains - -route53domains_client = Route53Domains(current_audit_info) diff --git a/providers/aws/services/s3/s3_client.py b/providers/aws/services/s3/s3_client.py deleted file mode 100644 index 177def72..00000000 --- a/providers/aws/services/s3/s3_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.s3.s3_service import S3 - -s3_client = S3(current_audit_info) diff --git a/providers/aws/services/s3/s3control_client.py b/providers/aws/services/s3/s3control_client.py deleted file mode 100644 index 6165bb01..00000000 --- a/providers/aws/services/s3/s3control_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.s3.s3_service import S3Control - -s3control_client = S3Control(current_audit_info) diff --git a/providers/aws/services/sagemaker/sagemaker_client.py b/providers/aws/services/sagemaker/sagemaker_client.py deleted file mode 100644 index 395d7b3f..00000000 --- a/providers/aws/services/sagemaker/sagemaker_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.sagemaker.sagemaker_service import SageMaker - -sagemaker_client = SageMaker(current_audit_info) diff --git a/providers/aws/services/secretsmanager/secretsmanager_client.py b/providers/aws/services/secretsmanager/secretsmanager_client.py deleted file mode 100644 index 76a630d7..00000000 --- a/providers/aws/services/secretsmanager/secretsmanager_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.secretsmanager.secretsmanager_service import SecretsManager - -secretsmanager_client = SecretsManager(current_audit_info) diff --git a/providers/aws/services/securityhub/securityhub_client.py b/providers/aws/services/securityhub/securityhub_client.py deleted file mode 100644 index a04f6548..00000000 --- a/providers/aws/services/securityhub/securityhub_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.securityhub.securityhub_service import SecurityHub - -securityhub_client = SecurityHub(current_audit_info) diff --git a/providers/aws/services/shield/shield_client.py b/providers/aws/services/shield/shield_client.py deleted file mode 100644 index c7ad41e5..00000000 --- a/providers/aws/services/shield/shield_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.shield.shield_service import Shield - -shield_client = Shield(current_audit_info) diff --git a/providers/aws/services/sns/sns_client.py b/providers/aws/services/sns/sns_client.py deleted file mode 100644 index d024a6e9..00000000 --- a/providers/aws/services/sns/sns_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.sns.sns_service import SNS - -sns_client = SNS(current_audit_info) diff --git a/providers/aws/services/sqs/sqs_client.py b/providers/aws/services/sqs/sqs_client.py deleted file mode 100644 index eb423cd6..00000000 --- a/providers/aws/services/sqs/sqs_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.sqs.sqs_service import SQS - -sqs_client = SQS(current_audit_info) diff --git a/providers/aws/services/ssm/ssm_client.py b/providers/aws/services/ssm/ssm_client.py deleted file mode 100644 index 2b70ee18..00000000 --- a/providers/aws/services/ssm/ssm_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.ssm.ssm_service import SSM - -ssm_client = SSM(current_audit_info) diff --git a/providers/aws/services/trustedadvisor/trustedadvisor_client.py b/providers/aws/services/trustedadvisor/trustedadvisor_client.py deleted file mode 100644 index 1893aed4..00000000 --- a/providers/aws/services/trustedadvisor/trustedadvisor_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.trustedadvisor.trustedadvisor_service import TrustedAdvisor - -trustedadvisor_client = TrustedAdvisor(current_audit_info) diff --git a/providers/aws/services/vpc/vpc_client.py b/providers/aws/services/vpc/vpc_client.py deleted file mode 100644 index 124abcc9..00000000 --- a/providers/aws/services/vpc/vpc_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.vpc.vpc_service import VPC - -vpc_client = VPC(current_audit_info) diff --git a/providers/aws/services/waf/waf_client.py b/providers/aws/services/waf/waf_client.py deleted file mode 100644 index 781a15c4..00000000 --- a/providers/aws/services/waf/waf_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.waf.waf_service import WAF - -waf_client = WAF(current_audit_info) diff --git a/providers/aws/services/wafv2/wafv2_client.py b/providers/aws/services/wafv2/wafv2_client.py deleted file mode 100644 index ecad1a3f..00000000 --- a/providers/aws/services/wafv2/wafv2_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.wafv2.wafv2_service import WAFv2 - -wafv2_client = WAFv2(current_audit_info) diff --git a/providers/aws/services/workspaces/workspaces_client.py b/providers/aws/services/workspaces/workspaces_client.py deleted file mode 100644 index 530d8dab..00000000 --- a/providers/aws/services/workspaces/workspaces_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.workspaces.workspaces_service import WorkSpaces - -workspaces_client = WorkSpaces(current_audit_info) diff --git a/providers/azure/lib/audit_info/audit_info.py b/providers/azure/lib/audit_info/audit_info.py deleted file mode 100644 index 529f7b15..00000000 --- a/providers/azure/lib/audit_info/audit_info.py +++ /dev/null @@ -1,3 +0,0 @@ -from providers.azure.lib.audit_info.models import Azure_Audit_Info, Azure_Identity_Info - -azure_audit_info = Azure_Audit_Info(credentials=None, identity=Azure_Identity_Info()) diff --git a/providers/azure/services/defender/defender_client.py b/providers/azure/services/defender/defender_client.py deleted file mode 100644 index 54e53797..00000000 --- a/providers/azure/services/defender/defender_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.azure.lib.audit_info.audit_info import azure_audit_info -from providers.azure.services.defender.defender_service import Defender - -defender_client = Defender(azure_audit_info) diff --git a/providers/azure/services/iam/iam_client.py b/providers/azure/services/iam/iam_client.py deleted file mode 100644 index 82d42e4b..00000000 --- a/providers/azure/services/iam/iam_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.azure.lib.audit_info.audit_info import azure_audit_info -from providers.azure.services.iam.iam_service import IAM - -iam_client = IAM(azure_audit_info) diff --git a/providers/azure/services/storage/storage_client.py b/providers/azure/services/storage/storage_client.py deleted file mode 100644 index 22e6ef1e..00000000 --- a/providers/azure/services/storage/storage_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.azure.lib.audit_info.audit_info import azure_audit_info -from providers.azure.services.storage.storage_service import Storage - -storage_client = Storage(azure_audit_info) diff --git a/prowler.py b/prowler.py new file mode 100755 index 00000000..0decd579 --- /dev/null +++ b/prowler.py @@ -0,0 +1,8 @@ +#!/usr/bin/env python3 + +import sys + +from prowler.__main__ import prowler + +if __name__ == "__main__": + sys.exit(prowler()) diff --git a/config/__init__.py b/prowler/__init__.py similarity index 100% rename from config/__init__.py rename to prowler/__init__.py diff --git a/prowler b/prowler/__main__.py old mode 100755 new mode 100644 similarity index 94% rename from prowler rename to prowler/__main__.py index 50e04f08..e2c8e6f6 --- a/prowler +++ b/prowler/__main__.py @@ -6,13 +6,13 @@ import sys from os import mkdir from os.path import isdir -from config.config import ( +from prowler.config.config import ( change_config_var, default_output_directory, output_file_timestamp, ) -from lib.banner import print_banner, print_version -from lib.check.check import ( +from prowler.lib.banner import print_banner, print_version +from prowler.lib.check.check import ( bulk_load_checks_metadata, bulk_load_compliance_frameworks, exclude_checks_to_run, @@ -27,25 +27,26 @@ from lib.check.check import ( print_services, set_output_options, ) -from lib.check.checks_loader import load_checks_to_execute -from lib.check.compliance import update_checks_metadata_with_compliance -from lib.logger import logger, set_logging_config -from lib.outputs.outputs import ( +from prowler.lib.check.checks_loader import load_checks_to_execute +from prowler.lib.check.compliance import update_checks_metadata_with_compliance +from prowler.lib.logger import logger, set_logging_config +from prowler.lib.outputs.outputs import ( add_html_footer, close_json, display_compliance_table, display_summary_table, send_to_s3_bucket, ) -from providers.aws.aws_provider import aws_provider_set_session -from providers.aws.lib.allowlist.allowlist import parse_allowlist_file -from providers.aws.lib.quick_inventory.quick_inventory import quick_inventory -from providers.aws.lib.security_hub.security_hub import ( +from prowler.providers.aws.aws_provider import aws_provider_set_session +from prowler.providers.aws.lib.allowlist.allowlist import parse_allowlist_file +from prowler.providers.aws.lib.quick_inventory.quick_inventory import quick_inventory +from prowler.providers.aws.lib.security_hub.security_hub import ( resolve_security_hub_previous_findings, ) -from providers.azure.azure_provider import azure_provider_set_session +from prowler.providers.azure.azure_provider import azure_provider_set_session -if __name__ == "__main__": + +def prowler(): # CLI Arguments parser = argparse.ArgumentParser() parser.add_argument( @@ -238,7 +239,7 @@ if __name__ == "__main__": "--allowlist-file", nargs="?", default=None, - help="Path for allowlist yaml file, supports local file, S3 URI or DynamoDB ARN. See example yaml in 'providers/allowlist.yaml' for reference and format.", + help="Path for allowlist yaml file. See example prowler/config/allowlist.yaml for reference and format. It also accepts AWS DynamoDB Table ARN or S3 URI, see more in https://docs.prowler.cloud/en/latest/tutorials/allowlist/", ) parser.add_argument( "--verbose", @@ -517,3 +518,7 @@ if __name__ == "__main__": audit_output_options.output_filename, audit_output_options.output_directory, ) + + +if __name__ == "__main__": + prowler() diff --git a/lib/__init__.py b/prowler/compliance/aws/__init__.py similarity index 100% rename from lib/__init__.py rename to prowler/compliance/aws/__init__.py diff --git a/compliance/aws/cis_1.4_aws.json b/prowler/compliance/aws/cis_1.4_aws.json similarity index 100% rename from compliance/aws/cis_1.4_aws.json rename to prowler/compliance/aws/cis_1.4_aws.json diff --git a/compliance/aws/cis_1.5_aws.json b/prowler/compliance/aws/cis_1.5_aws.json similarity index 100% rename from compliance/aws/cis_1.5_aws.json rename to prowler/compliance/aws/cis_1.5_aws.json diff --git a/compliance/aws/ens_rd2022_aws.json b/prowler/compliance/aws/ens_rd2022_aws.json similarity index 100% rename from compliance/aws/ens_rd2022_aws.json rename to prowler/compliance/aws/ens_rd2022_aws.json diff --git a/lib/check/__init__.py b/prowler/compliance/azure/__init__.py similarity index 100% rename from lib/check/__init__.py rename to prowler/compliance/azure/__init__.py diff --git a/lib/outputs/__init__.py b/prowler/config/__init__.py similarity index 100% rename from lib/outputs/__init__.py rename to prowler/config/__init__.py diff --git a/providers/aws/allowlist.yaml b/prowler/config/allowlist.yaml similarity index 100% rename from providers/aws/allowlist.yaml rename to prowler/config/allowlist.yaml diff --git a/config/config.py b/prowler/config/config.py similarity index 86% rename from config/config.py rename to prowler/config/config.py index 02a8e57c..1b3db223 100644 --- a/config/config.py +++ b/prowler/config/config.py @@ -3,7 +3,7 @@ from os import getcwd import yaml -from lib.logger import logger +from prowler.lib.logger import logger timestamp = datetime.today() timestamp_utc = datetime.now(timezone.utc).replace(tzinfo=timezone.utc) @@ -20,17 +20,17 @@ banner_color = "\033[1;92m" compliance_specification_dir = "./compliance" # AWS services-regions matrix json -aws_services_json_file = "providers/aws/aws_regions_by_service.json" +aws_services_json_file = "aws_regions_by_service.json" default_output_directory = getcwd() + "/output" output_file_timestamp = timestamp.strftime("%Y%m%d%H%M%S") -timestamp_iso = timestamp.isoformat() +timestamp_iso = timestamp.isoformat(sep=" ", timespec="seconds") csv_file_suffix = ".csv" json_file_suffix = ".json" json_asff_file_suffix = ".asff.json" html_file_suffix = ".html" -config_yaml = "providers/aws/config.yaml" +config_yaml = "prowler/config/config.yaml" def change_config_var(variable, value): diff --git a/providers/aws/config.yaml b/prowler/config/config.yaml similarity index 100% rename from providers/aws/config.yaml rename to prowler/config/config.yaml diff --git a/lib/utils/__init__.py b/prowler/lib/__init__.py similarity index 100% rename from lib/utils/__init__.py rename to prowler/lib/__init__.py diff --git a/lib/banner.py b/prowler/lib/banner.py similarity index 90% rename from lib/banner.py rename to prowler/lib/banner.py index 78535d85..d6cfec88 100644 --- a/lib/banner.py +++ b/prowler/lib/banner.py @@ -1,6 +1,6 @@ from colorama import Fore, Style -from config.config import banner_color, orange_color, prowler_version, timestamp +from prowler.config.config import banner_color, orange_color, prowler_version, timestamp def print_version(): diff --git a/providers/aws/__init__.py b/prowler/lib/check/__init__.py similarity index 100% rename from providers/aws/__init__.py rename to prowler/lib/check/__init__.py diff --git a/lib/check/check.py b/prowler/lib/check/check.py similarity index 75% rename from lib/check/check.py rename to prowler/lib/check/check.py index 43819606..8369dd6d 100644 --- a/lib/check/check.py +++ b/prowler/lib/check/check.py @@ -8,13 +8,13 @@ from types import ModuleType from alive_progress import alive_bar from colorama import Fore, Style -from config.config import compliance_specification_dir, orange_color -from lib.check.compliance_models import load_compliance_framework -from lib.check.models import Check, Output_From_Options, load_check_metadata -from lib.logger import logger -from lib.outputs.outputs import report -from lib.utils.utils import open_file, parse_json_file -from providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.config.config import orange_color +from prowler.lib.check.compliance_models import load_compliance_framework +from prowler.lib.check.models import Check, Output_From_Options, load_check_metadata +from prowler.lib.logger import logger +from prowler.lib.outputs.outputs import report +from prowler.lib.utils.utils import open_file, parse_json_file +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info # Load all checks metadata @@ -22,11 +22,12 @@ def bulk_load_checks_metadata(provider: str) -> dict: bulk_check_metadata = {} checks = recover_checks_from_provider(provider) # Build list of check's metadata files - for check_name in checks: + for check_info in checks: # Build check path name - check_path_name = check_name.replace(".", "/") + check_name = check_info[0] + check_path = check_info[1] # Append metadata file extension - metadata_file = f"{check_path_name}.metadata.json" + metadata_file = f"{check_path}/{check_name}.metadata.json" # Load metadata check_metadata = load_check_metadata(metadata_file) bulk_check_metadata[check_metadata.CheckID] = check_metadata @@ -37,22 +38,31 @@ def bulk_load_checks_metadata(provider: str) -> dict: # Bulk load all compliance frameworks specification def bulk_load_compliance_frameworks(provider: str) -> dict: """Bulk load all compliance frameworks specification into a dict""" - bulk_compliance_frameworks = {} - compliance_specification_dir_path = f"{compliance_specification_dir}/{provider}" try: - for filename in os.listdir(compliance_specification_dir_path): - file_path = os.path.join(compliance_specification_dir_path, filename) - # Check if it is a file - if os.path.isfile(file_path): - # Open Compliance file in JSON - # cis_v1.4_aws.json --> cis_v1.4_aws - compliance_framework_name = filename.split(".json")[0] - # Store the compliance info - bulk_compliance_frameworks[ - compliance_framework_name - ] = load_compliance_framework(file_path) + bulk_compliance_frameworks = {} + available_compliance_framework_modules = list_compliance_modules() + for compliance_framework in available_compliance_framework_modules: + if provider in compliance_framework.name: + compliance_specification_dir_path = ( + f"{compliance_framework.module_finder.path}/{provider}" + ) + + # for compliance_framework in available_compliance_framework_modules: + for filename in os.listdir(compliance_specification_dir_path): + file_path = os.path.join( + compliance_specification_dir_path, filename + ) + # Check if it is a file and ti size is greater than 0 + if os.path.isfile(file_path) and os.stat(file_path).st_size > 0: + # Open Compliance file in JSON + # cis_v1.4_aws.json --> cis_v1.4_aws + compliance_framework_name = filename.split(".json")[0] + # Store the compliance info + bulk_compliance_frameworks[ + compliance_framework_name + ] = load_compliance_framework(file_path) except Exception as e: - logger.error(f"{e.__class__.__name__} -- {e}") + logger.error(f"{e.__class__.__name__}[{e.__traceback__.tb_lineno}] -- {e}") return bulk_compliance_frameworks @@ -77,7 +87,7 @@ def exclude_services_to_run( for check_module in modules: # Recover check name and module name from import path # Format: "providers.{provider}.services.{service}.{check_name}.{check_name}" - check_name = check_module.split(".")[-1] + check_name = check_module[0].split(".")[-1] # Exclude checks from the input services checks_to_execute.discard(check_name) return checks_to_execute @@ -100,7 +110,7 @@ def list_services(provider: str) -> set(): checks = recover_checks_from_provider(provider) for check_name in checks: # Format: "providers.{provider}.services.{service}.{check_name}.{check_name}" - service_name = check_name.split(".")[3] + service_name = check_name[0].split(".")[3] available_services.add(service_name) return sorted(available_services) @@ -209,30 +219,51 @@ def parse_checks_from_compliance_framework( return checks_to_execute -# Recover all checks from the selected provider and service -def recover_checks_from_provider(provider: str, service: str = None) -> list: +def recover_checks_from_provider(provider: str, service: str = None) -> list[tuple]: + """ + Recover all checks from the selected provider and service + + Returns a list of tuples with the following format (check_name, check_path) + """ try: checks = [] modules = list_modules(provider, service) for module_name in modules: - # Format: "providers.{provider}.services.{service}.{check_name}.{check_name}" - check_name = module_name.name + # Format: "prowler.providers.{provider}.services.{service}.{check_name}.{check_name}" + check_module_name = module_name.name # We need to exclude common shared libraries in services if ( - check_name.count(".") == 5 - and "lib" not in check_name - and "test" not in check_name + check_module_name.count(".") == 6 + and "lib" not in check_module_name + and "test" not in check_module_name ): - checks.append(check_name) + check_path = module_name.module_finder.path + # Check name is the last part of the check_module_name + check_name = check_module_name.split(".")[-1] + check_info = (check_name, check_path) + checks.append(check_info) return checks except Exception as e: logger.critical(f"{e.__class__.__name__}[{e.__traceback__.tb_lineno}]: {e}") sys.exit() +def list_compliance_modules(): + """ + list_compliance_modules returns the available compliance frameworks and returns their path + """ + # This module path requires the full path includig "prowler." + module_path = "prowler.compliance" + return walk_packages( + importlib.import_module(module_path).__path__, + importlib.import_module(module_path).__name__ + ".", + ) + + # List all available modules in the selected provider and service def list_modules(provider: str, service: str): - module_path = f"providers.{provider}.services" + # This module path requires the full path includig "prowler." + module_path = f"prowler.providers.{provider}.services" if service: module_path += f".{service}" return walk_packages( @@ -316,9 +347,7 @@ def execute_checks( bar.title = f"-> Scanning {orange_color}{service}{Style.RESET_ALL} service" try: # Import check module - check_module_path = ( - f"providers.{provider}.services.{service}.{check_name}.{check_name}" - ) + check_module_path = f"prowler.providers.{provider}.services.{service}.{check_name}.{check_name}" lib = import_check(check_module_path) # Recover functions from check check_to_execute = getattr(lib, check_name) diff --git a/lib/check/checks_loader.py b/prowler/lib/check/checks_loader.py similarity index 93% rename from lib/check/checks_loader.py rename to prowler/lib/check/checks_loader.py index 310ec0a2..2e71daea 100644 --- a/lib/check/checks_loader.py +++ b/prowler/lib/check/checks_loader.py @@ -1,9 +1,9 @@ -from lib.check.check import ( +from prowler.lib.check.check import ( parse_checks_from_compliance_framework, parse_checks_from_file, recover_checks_from_provider, ) -from lib.logger import logger +from prowler.lib.logger import logger # Generate the list of checks to execute @@ -52,7 +52,7 @@ def load_checks_to_execute( for check_module in modules: # Recover check name and module name from import path # Format: "providers.{provider}.services.{service}.{check_name}.{check_name}" - check_name = check_module.split(".")[-1] + check_name = check_module[0].split(".")[-1] # If the service is present in the group list passed as parameters # if service_name in group_list: checks_to_execute.add(check_name) checks_to_execute.add(check_name) @@ -82,10 +82,10 @@ def load_checks_to_execute( except Exception as e: logger.error(f"{e.__class__.__name__}[{e.__traceback__.tb_lineno}] -- {e}") else: - for check_name in checks: + for check_info in checks: # Recover check name from import path (last part) # Format: "providers.{provider}.services.{service}.{check_name}.{check_name}" - check_name = check_name.split(".")[-1] + check_name = check_info[0] checks_to_execute.add(check_name) return checks_to_execute diff --git a/lib/check/compliance.py b/prowler/lib/check/compliance.py similarity index 93% rename from lib/check/compliance.py rename to prowler/lib/check/compliance.py index 1ac54611..95e0aa8a 100644 --- a/lib/check/compliance.py +++ b/prowler/lib/check/compliance.py @@ -1,7 +1,10 @@ import sys -from lib.check.compliance_models import Compliance_Base_Model, Compliance_Requirement -from lib.logger import logger +from prowler.lib.check.compliance_models import ( + Compliance_Base_Model, + Compliance_Requirement, +) +from prowler.lib.logger import logger def update_checks_metadata_with_compliance( diff --git a/lib/check/compliance_models.py b/prowler/lib/check/compliance_models.py similarity index 98% rename from lib/check/compliance_models.py rename to prowler/lib/check/compliance_models.py index f019cb15..bd49dcfe 100644 --- a/lib/check/compliance_models.py +++ b/prowler/lib/check/compliance_models.py @@ -4,7 +4,7 @@ from typing import Any, List, Optional, Union from pydantic import BaseModel, ValidationError -from lib.logger import logger +from prowler.lib.logger import logger # ENS - Esquema Nacional de Seguridad - España diff --git a/lib/check/models.py b/prowler/lib/check/models.py similarity index 94% rename from lib/check/models.py rename to prowler/lib/check/models.py index 10d26dc1..de8341ec 100644 --- a/lib/check/models.py +++ b/prowler/lib/check/models.py @@ -1,10 +1,11 @@ +import os import sys from abc import ABC, abstractmethod from dataclasses import dataclass from pydantic import BaseModel, ValidationError -from lib.logger import logger +from prowler.lib.logger import logger @dataclass @@ -76,8 +77,9 @@ class Check(ABC, Check_Metadata_Model): def __init__(self, **data): """Check's init function. Calls the CheckMetadataModel init.""" # Parse the Check's metadata file - check_path_name = self.__class__.__module__.replace(".", "/") - metadata_file = f"{check_path_name}.metadata.json" + metadata_file = os.path.abspath(sys.modules[self.__module__].__file__).replace( + ".py", ".metadata.json" + ) # Store it to validate them with Pydantic data = Check_Metadata_Model.parse_file(metadata_file).dict() # Calls parents init function diff --git a/lib/logger.py b/prowler/lib/logger.py similarity index 100% rename from lib/logger.py rename to prowler/lib/logger.py diff --git a/providers/aws/lib/__init__.py b/prowler/lib/outputs/__init__.py similarity index 100% rename from providers/aws/lib/__init__.py rename to prowler/lib/outputs/__init__.py diff --git a/lib/outputs/models.py b/prowler/lib/outputs/models.py similarity index 98% rename from lib/outputs/models.py rename to prowler/lib/outputs/models.py index b75896c7..a20c24fa 100644 --- a/lib/outputs/models.py +++ b/prowler/lib/outputs/models.py @@ -3,9 +3,9 @@ from typing import List, Optional from pydantic import BaseModel -from config.config import timestamp -from lib.check.models import Check_Report, Remediation -from providers.aws.lib.audit_info.models import AWS_Organizations_Info +from prowler.config.config import timestamp +from prowler.lib.check.models import Check_Report, Remediation +from prowler.providers.aws.lib.audit_info.models import AWS_Organizations_Info @dataclass diff --git a/lib/outputs/outputs.py b/prowler/lib/outputs/outputs.py similarity index 99% rename from lib/outputs/outputs.py rename to prowler/lib/outputs/outputs.py index 0171ded6..a3b06a5c 100644 --- a/lib/outputs/outputs.py +++ b/prowler/lib/outputs/outputs.py @@ -8,7 +8,7 @@ from typing import Any from colorama import Fore, Style from tabulate import tabulate -from config.config import ( +from prowler.config.config import ( csv_file_suffix, html_file_suffix, html_logo_img, @@ -21,9 +21,9 @@ from config.config import ( timestamp_iso, timestamp_utc, ) -from lib.check.models import Output_From_Options -from lib.logger import logger -from lib.outputs.models import ( +from prowler.lib.check.models import Output_From_Options +from prowler.lib.logger import logger +from prowler.lib.outputs.models import ( Check_Output_CSV, Check_Output_CSV_CIS, Check_Output_CSV_ENS_RD2022, @@ -34,10 +34,10 @@ from lib.outputs.models import ( Resource, Severity, ) -from lib.utils.utils import file_exists, hash_sha512, open_file -from providers.aws.lib.allowlist.allowlist import is_allowlisted -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.lib.security_hub.security_hub import send_to_security_hub +from prowler.lib.utils.utils import file_exists, hash_sha512, open_file +from prowler.providers.aws.lib.allowlist.allowlist import is_allowlisted +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.lib.security_hub.security_hub import send_to_security_hub def report(check_findings, output_options, audit_info): diff --git a/providers/aws/lib/allowlist/__init__.py b/prowler/lib/utils/__init__.py similarity index 100% rename from providers/aws/lib/allowlist/__init__.py rename to prowler/lib/utils/__init__.py diff --git a/lib/utils/utils.py b/prowler/lib/utils/utils.py similarity index 96% rename from lib/utils/utils.py rename to prowler/lib/utils/utils.py index 5646000c..65fa9cde 100644 --- a/lib/utils/utils.py +++ b/prowler/lib/utils/utils.py @@ -5,7 +5,7 @@ from io import TextIOWrapper from os.path import exists from typing import Any -from lib.logger import logger +from prowler.lib.logger import logger def open_file(input_file: str, mode: str = "r") -> TextIOWrapper: diff --git a/providers/aws/lib/arn/__init__.py b/prowler/providers/aws/__init__.py similarity index 100% rename from providers/aws/lib/arn/__init__.py rename to prowler/providers/aws/__init__.py diff --git a/providers/aws/aws_provider.py b/prowler/providers/aws/aws_provider.py similarity index 96% rename from providers/aws/aws_provider.py rename to prowler/providers/aws/aws_provider.py index f0993d43..c0a98de2 100644 --- a/providers/aws/aws_provider.py +++ b/prowler/providers/aws/aws_provider.py @@ -1,3 +1,4 @@ +import os import sys from arnparse import arnparse @@ -6,12 +7,12 @@ from botocore.credentials import RefreshableCredentials from botocore.session import get_session from colorama import Fore, Style -from config.config import aws_services_json_file -from lib.logger import logger -from lib.utils.utils import open_file, parse_json_file -from providers.aws.lib.arn.arn import arn_parsing -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.lib.audit_info.models import ( +from prowler.config.config import aws_services_json_file +from prowler.lib.logger import logger +from prowler.lib.utils.utils import open_file, parse_json_file +from prowler.providers.aws.lib.arn.arn import arn_parsing +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.lib.audit_info.models import ( AWS_Audit_Info, AWS_Credentials, AWS_Organizations_Info, @@ -288,7 +289,8 @@ def get_organizations_metadata( def generate_regional_clients(service: str, audit_info: AWS_Audit_Info) -> dict: regional_clients = {} # Get json locally - f = open_file(aws_services_json_file) + actual_directory = os.path.dirname(os.path.realpath(__file__)) + f = open_file(f"{actual_directory}/{aws_services_json_file}") data = parse_json_file(f) # Check if it is a subservice if service == "accessanalyzer": @@ -331,7 +333,6 @@ def generate_regional_clients(service: str, audit_info: AWS_Audit_Info) -> dict: regional_client = audit_info.audit_session.client(service, region_name=region) regional_client.region = region regional_clients[region] = regional_client - # regional_clients.append(regional_client) return regional_clients diff --git a/providers/aws/aws_regions_by_service.json b/prowler/providers/aws/aws_regions_by_service.json similarity index 99% rename from providers/aws/aws_regions_by_service.json rename to prowler/providers/aws/aws_regions_by_service.json index 58f4f933..d1145c2b 100644 --- a/providers/aws/aws_regions_by_service.json +++ b/prowler/providers/aws/aws_regions_by_service.json @@ -5916,4 +5916,4 @@ } } } -} \ No newline at end of file +} diff --git a/providers/aws/lib/quick_inventory/__init__.py b/prowler/providers/aws/lib/__init__.py similarity index 100% rename from providers/aws/lib/quick_inventory/__init__.py rename to prowler/providers/aws/lib/__init__.py diff --git a/providers/aws/lib/security_hub/__init__.py b/prowler/providers/aws/lib/allowlist/__init__.py similarity index 100% rename from providers/aws/lib/security_hub/__init__.py rename to prowler/providers/aws/lib/allowlist/__init__.py diff --git a/providers/aws/lib/allowlist/allowlist.py b/prowler/providers/aws/lib/allowlist/allowlist.py similarity index 65% rename from providers/aws/lib/allowlist/allowlist.py rename to prowler/providers/aws/lib/allowlist/allowlist.py index 88722c26..8fed1c5e 100644 --- a/providers/aws/lib/allowlist/allowlist.py +++ b/prowler/providers/aws/lib/allowlist/allowlist.py @@ -4,7 +4,7 @@ import sys import yaml from boto3.dynamodb.conditions import Attr -from lib.logger import logger +from prowler.lib.logger import logger def parse_allowlist_file(audit_info, allowlist_file): @@ -78,39 +78,53 @@ def is_allowlisted(allowlist, audited_account, check, region, resource): return True return False except Exception as error: - logger.critical(f"{error.__class__.__name__} -- {error}") + logger.critical( + f"{error.__class__.__name__} -- {error}[{error.__traceback__.tb_lineno}]" + ) sys.exit() def is_allowlisted_in_check(allowlist, audited_account, check, region, resource): - # If there is a *, it affects to all checks - if "*" in allowlist["Accounts"][audited_account]["Checks"]: - check = "*" - if is_allowlisted_in_region( - allowlist, audited_account, check, region, resource - ): - return True - # Check if there is the specific check - if check in allowlist["Accounts"][audited_account]["Checks"]: - if is_allowlisted_in_region( - allowlist, audited_account, check, region, resource - ): - return True - return False + try: + # If there is a *, it affects to all checks + if "*" in allowlist["Accounts"][audited_account]["Checks"]: + check = "*" + if is_allowlisted_in_region( + allowlist, audited_account, check, region, resource + ): + return True + # Check if there is the specific check + if check in allowlist["Accounts"][audited_account]["Checks"]: + if is_allowlisted_in_region( + allowlist, audited_account, check, region, resource + ): + return True + return False + except Exception as error: + logger.critical( + f"{error.__class__.__name__} -- {error}[{error.__traceback__.tb_lineno}]" + ) + sys.exit() def is_allowlisted_in_region(allowlist, audited_account, check, region, resource): - # If there is a *, it affects to all regions - if "*" in allowlist["Accounts"][audited_account]["Checks"][check]["Regions"]: - for elem in allowlist["Accounts"][audited_account]["Checks"][check][ - "Resources" - ]: - if re.search(elem, resource): - return True - # Check if there is the specific region - if region in allowlist["Accounts"][audited_account]["Checks"][check]["Regions"]: - for elem in allowlist["Accounts"][audited_account]["Checks"][check][ - "Resources" - ]: - if re.search(elem, resource): - return True + try: + # If there is a *, it affects to all regions + if "*" in allowlist["Accounts"][audited_account]["Checks"][check]["Regions"]: + for elem in allowlist["Accounts"][audited_account]["Checks"][check][ + "Resources" + ]: + if re.search(re.escape(elem), resource): + return True + # Check if there is the specific region + if region in allowlist["Accounts"][audited_account]["Checks"][check]["Regions"]: + for elem in allowlist["Accounts"][audited_account]["Checks"][check][ + "Resources" + ]: + if re.search(elem, resource): + return True + except Exception as error: + logger.critical( + f"{error.__class__.__name__} -- {error}[{error.__traceback__.tb_lineno}]" + ) + sys.exit() diff --git a/providers/aws/services/__init__.py b/prowler/providers/aws/lib/arn/__init__.py similarity index 100% rename from providers/aws/services/__init__.py rename to prowler/providers/aws/lib/arn/__init__.py diff --git a/providers/aws/lib/arn/arn.py b/prowler/providers/aws/lib/arn/arn.py similarity index 96% rename from providers/aws/lib/arn/arn.py rename to prowler/providers/aws/lib/arn/arn.py index 05e0cbcf..5d96b1dd 100644 --- a/providers/aws/lib/arn/arn.py +++ b/prowler/providers/aws/lib/arn/arn.py @@ -1,6 +1,6 @@ from arnparse import arnparse -from providers.aws.lib.arn.error import ( +from prowler.providers.aws.lib.arn.error import ( RoleArnParsingEmptyResource, RoleArnParsingFailedMissingFields, RoleArnParsingIAMRegionNotEmpty, diff --git a/providers/aws/lib/arn/error.py b/prowler/providers/aws/lib/arn/error.py similarity index 100% rename from providers/aws/lib/arn/error.py rename to prowler/providers/aws/lib/arn/error.py diff --git a/providers/aws/lib/audit_info/audit_info.py b/prowler/providers/aws/lib/audit_info/audit_info.py similarity index 86% rename from providers/aws/lib/audit_info/audit_info.py rename to prowler/providers/aws/lib/audit_info/audit_info.py index 5f1efdc0..1da6ab7b 100644 --- a/providers/aws/lib/audit_info/audit_info.py +++ b/prowler/providers/aws/lib/audit_info/audit_info.py @@ -1,6 +1,6 @@ from boto3 import session -from providers.aws.lib.audit_info.models import AWS_Assume_Role, AWS_Audit_Info +from prowler.providers.aws.lib.audit_info.models import AWS_Assume_Role, AWS_Audit_Info # Default Current Audit Info current_audit_info = AWS_Audit_Info( diff --git a/providers/aws/lib/audit_info/models.py b/prowler/providers/aws/lib/audit_info/models.py similarity index 100% rename from providers/aws/lib/audit_info/models.py rename to prowler/providers/aws/lib/audit_info/models.py diff --git a/providers/aws/services/accessanalyzer/__init__.py b/prowler/providers/aws/lib/quick_inventory/__init__.py similarity index 100% rename from providers/aws/services/accessanalyzer/__init__.py rename to prowler/providers/aws/lib/quick_inventory/__init__.py diff --git a/providers/aws/lib/quick_inventory/quick_inventory.py b/prowler/providers/aws/lib/quick_inventory/quick_inventory.py similarity index 98% rename from providers/aws/lib/quick_inventory/quick_inventory.py rename to prowler/providers/aws/lib/quick_inventory/quick_inventory.py index abfbd0c7..e29a718c 100644 --- a/providers/aws/lib/quick_inventory/quick_inventory.py +++ b/prowler/providers/aws/lib/quick_inventory/quick_inventory.py @@ -5,14 +5,14 @@ from alive_progress import alive_bar from colorama import Fore, Style from tabulate import tabulate -from config.config import ( +from prowler.config.config import ( csv_file_suffix, json_file_suffix, orange_color, output_file_timestamp, ) -from lib.logger import logger -from providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.lib.logger import logger +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info def quick_inventory(audit_info: AWS_Audit_Info, output_directory: str): diff --git a/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/__init__.py b/prowler/providers/aws/lib/security_hub/__init__.py similarity index 100% rename from providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/__init__.py rename to prowler/providers/aws/lib/security_hub/__init__.py diff --git a/providers/aws/lib/security_hub/security_hub.py b/prowler/providers/aws/lib/security_hub/security_hub.py similarity index 95% rename from providers/aws/lib/security_hub/security_hub.py rename to prowler/providers/aws/lib/security_hub/security_hub.py index 19c80188..1514fad8 100644 --- a/providers/aws/lib/security_hub/security_hub.py +++ b/prowler/providers/aws/lib/security_hub/security_hub.py @@ -4,10 +4,10 @@ from operator import itemgetter from boto3 import session -from config.config import json_asff_file_suffix, timestamp_utc -from lib.logger import logger -from lib.outputs.models import Check_Output_JSON_ASFF -from providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.config.config import json_asff_file_suffix, timestamp_utc +from prowler.lib.logger import logger +from prowler.lib.outputs.models import Check_Output_JSON_ASFF +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info def send_to_security_hub( diff --git a/providers/aws/services/account/__init__.py b/prowler/providers/aws/services/__init__.py similarity index 100% rename from providers/aws/services/account/__init__.py rename to prowler/providers/aws/services/__init__.py diff --git a/providers/aws/services/account/account_maintain_current_contact_details/__init__.py b/prowler/providers/aws/services/accessanalyzer/__init__.py similarity index 100% rename from providers/aws/services/account/account_maintain_current_contact_details/__init__.py rename to prowler/providers/aws/services/accessanalyzer/__init__.py diff --git a/prowler/providers/aws/services/accessanalyzer/accessanalyzer_client.py b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_client.py new file mode 100644 index 00000000..ad5e94dd --- /dev/null +++ b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.accessanalyzer.accessanalyzer_service import ( + AccessAnalyzer, +) + +accessanalyzer_client = AccessAnalyzer(current_audit_info) diff --git a/providers/aws/services/account/account_security_contact_information_is_registered/__init__.py b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/__init__.py similarity index 100% rename from providers/aws/services/account/account_security_contact_information_is_registered/__init__.py rename to prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/__init__.py diff --git a/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.metadata.json b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.metadata.json similarity index 99% rename from providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.metadata.json rename to prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.metadata.json index 2b7b1cbf..784b2343 100644 --- a/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.metadata.json +++ b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.py b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.py similarity index 91% rename from providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.py rename to prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.py index a6a16073..50d9da4c 100644 --- a/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.py +++ b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.accessanalyzer.accessanalyzer_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.accessanalyzer.accessanalyzer_client import ( accessanalyzer_client, ) diff --git a/providers/aws/services/accessanalyzer/accessanalyzer_service.py b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_service.py similarity index 97% rename from providers/aws/services/accessanalyzer/accessanalyzer_service.py rename to prowler/providers/aws/services/accessanalyzer/accessanalyzer_service.py index 28bf6d24..5294751c 100644 --- a/providers/aws/services/accessanalyzer/accessanalyzer_service.py +++ b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## AccessAnalyzer diff --git a/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/__init__.py b/prowler/providers/aws/services/account/__init__.py similarity index 100% rename from providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/__init__.py rename to prowler/providers/aws/services/account/__init__.py diff --git a/prowler/providers/aws/services/account/account_client.py b/prowler/providers/aws/services/account/account_client.py new file mode 100644 index 00000000..2bf19966 --- /dev/null +++ b/prowler/providers/aws/services/account/account_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.account.account_service import Account + +account_client = Account(current_audit_info) diff --git a/providers/aws/services/acm/__init__.py b/prowler/providers/aws/services/account/account_maintain_current_contact_details/__init__.py similarity index 100% rename from providers/aws/services/acm/__init__.py rename to prowler/providers/aws/services/account/account_maintain_current_contact_details/__init__.py diff --git a/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.metadata.json b/prowler/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.metadata.json similarity index 100% rename from providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.metadata.json rename to prowler/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.metadata.json diff --git a/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.py b/prowler/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.py similarity index 78% rename from providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.py rename to prowler/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.py index b0dbbebd..39cd2927 100644 --- a/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.py +++ b/prowler/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.account.account_client import account_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.account.account_client import account_client # This check has no findings since it is manual diff --git a/providers/aws/services/acm/acm_certificates_expiration_check/__init__.py b/prowler/providers/aws/services/account/account_security_contact_information_is_registered/__init__.py similarity index 100% rename from providers/aws/services/acm/acm_certificates_expiration_check/__init__.py rename to prowler/providers/aws/services/account/account_security_contact_information_is_registered/__init__.py diff --git a/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.metadata.json b/prowler/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.metadata.json similarity index 100% rename from providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.metadata.json rename to prowler/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.metadata.json diff --git a/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.py b/prowler/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.py similarity index 79% rename from providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.py rename to prowler/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.py index 9e33182f..4f646b9a 100644 --- a/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.py +++ b/prowler/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.account.account_client import account_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.account.account_client import account_client # This check has no findings since it is manual diff --git a/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/__init__.py b/prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/__init__.py similarity index 100% rename from providers/aws/services/acm/acm_certificates_transparency_logs_enabled/__init__.py rename to prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/__init__.py diff --git a/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.metadata.json b/prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.metadata.json similarity index 100% rename from providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.metadata.json rename to prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.metadata.json diff --git a/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.py b/prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.py similarity index 80% rename from providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.py rename to prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.py index c1b775ef..89c3bee2 100644 --- a/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.py +++ b/prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.account.account_client import account_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.account.account_client import account_client # This check has no findings since it is manual diff --git a/providers/aws/services/account/account_service.py b/prowler/providers/aws/services/account/account_service.py similarity index 83% rename from providers/aws/services/account/account_service.py rename to prowler/providers/aws/services/account/account_service.py index 8c6c3d9f..88a0f91a 100644 --- a/providers/aws/services/account/account_service.py +++ b/prowler/providers/aws/services/account/account_service.py @@ -1,5 +1,5 @@ ################## Account -from providers.aws.aws_provider import get_region_global_service +from prowler.providers.aws.aws_provider import get_region_global_service class Account: diff --git a/providers/aws/services/apigateway/__init__.py b/prowler/providers/aws/services/acm/__init__.py similarity index 100% rename from providers/aws/services/apigateway/__init__.py rename to prowler/providers/aws/services/acm/__init__.py diff --git a/providers/aws/services/apigateway/apigateway_authorizers_enabled/__init__.py b/prowler/providers/aws/services/acm/acm_certificates_expiration_check/__init__.py similarity index 100% rename from providers/aws/services/apigateway/apigateway_authorizers_enabled/__init__.py rename to prowler/providers/aws/services/acm/acm_certificates_expiration_check/__init__.py diff --git a/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.metadata.json b/prowler/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.metadata.json similarity index 100% rename from providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.metadata.json rename to prowler/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.metadata.json diff --git a/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.py b/prowler/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.py similarity index 88% rename from providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.py rename to prowler/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.py index 54d3611f..ac40cbf0 100644 --- a/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.py +++ b/prowler/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.acm.acm_client import acm_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.acm.acm_client import acm_client DAYS_TO_EXPIRE_THRESHOLD = 7 diff --git a/providers/aws/services/apigateway/apigateway_client_certificate_enabled/__init__.py b/prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/__init__.py similarity index 100% rename from providers/aws/services/apigateway/apigateway_client_certificate_enabled/__init__.py rename to prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/__init__.py diff --git a/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.metadata.json b/prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.metadata.json similarity index 100% rename from providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.metadata.json rename to prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.metadata.json diff --git a/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.py b/prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.py similarity index 91% rename from providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.py rename to prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.py index 3a8a2601..c55e992b 100644 --- a/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.py +++ b/prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.acm.acm_client import acm_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.acm.acm_client import acm_client class acm_certificates_transparency_logs_enabled(Check): diff --git a/prowler/providers/aws/services/acm/acm_client.py b/prowler/providers/aws/services/acm/acm_client.py new file mode 100644 index 00000000..05a3b8bc --- /dev/null +++ b/prowler/providers/aws/services/acm/acm_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.acm.acm_service import ACM + +acm_client = ACM(current_audit_info) diff --git a/providers/aws/services/acm/acm_service.py b/prowler/providers/aws/services/acm/acm_service.py similarity index 95% rename from providers/aws/services/acm/acm_service.py rename to prowler/providers/aws/services/acm/acm_service.py index 6bb50193..56ac98b1 100644 --- a/providers/aws/services/acm/acm_service.py +++ b/prowler/providers/aws/services/acm/acm_service.py @@ -1,9 +1,9 @@ import threading from dataclasses import dataclass -from config.config import timestamp_utc -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.config.config import timestamp_utc +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## ACM diff --git a/providers/aws/services/apigateway/apigateway_endpoint_public/__init__.py b/prowler/providers/aws/services/apigateway/__init__.py similarity index 100% rename from providers/aws/services/apigateway/apigateway_endpoint_public/__init__.py rename to prowler/providers/aws/services/apigateway/__init__.py diff --git a/providers/aws/services/apigateway/apigateway_logging_enabled/__init__.py b/prowler/providers/aws/services/apigateway/apigateway_authorizers_enabled/__init__.py similarity index 100% rename from providers/aws/services/apigateway/apigateway_logging_enabled/__init__.py rename to prowler/providers/aws/services/apigateway/apigateway_authorizers_enabled/__init__.py diff --git a/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.metadata.json b/prowler/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.metadata.json similarity index 100% rename from providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.metadata.json rename to prowler/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.metadata.json diff --git a/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.py b/prowler/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.py similarity index 83% rename from providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.py rename to prowler/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.py index 9a92d58b..81d9dac6 100644 --- a/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.py +++ b/prowler/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.apigateway.apigateway_client import apigateway_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.apigateway.apigateway_client import ( + apigateway_client, +) class apigateway_authorizers_enabled(Check): diff --git a/prowler/providers/aws/services/apigateway/apigateway_client.py b/prowler/providers/aws/services/apigateway/apigateway_client.py new file mode 100644 index 00000000..aafa31cf --- /dev/null +++ b/prowler/providers/aws/services/apigateway/apigateway_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.apigateway.apigateway_service import APIGateway + +apigateway_client = APIGateway(current_audit_info) diff --git a/providers/aws/services/apigateway/apigateway_waf_acl_attached/__init__.py b/prowler/providers/aws/services/apigateway/apigateway_client_certificate_enabled/__init__.py similarity index 100% rename from providers/aws/services/apigateway/apigateway_waf_acl_attached/__init__.py rename to prowler/providers/aws/services/apigateway/apigateway_client_certificate_enabled/__init__.py diff --git a/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.metadata.json b/prowler/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.metadata.json similarity index 100% rename from providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.metadata.json rename to prowler/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.metadata.json diff --git a/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.py b/prowler/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.py similarity index 86% rename from providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.py rename to prowler/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.py index 2dcae406..472dd83c 100644 --- a/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.py +++ b/prowler/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.apigateway.apigateway_client import apigateway_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.apigateway.apigateway_client import ( + apigateway_client, +) class apigateway_client_certificate_enabled(Check): diff --git a/providers/aws/services/apigatewayv2/__init__.py b/prowler/providers/aws/services/apigateway/apigateway_endpoint_public/__init__.py similarity index 100% rename from providers/aws/services/apigatewayv2/__init__.py rename to prowler/providers/aws/services/apigateway/apigateway_endpoint_public/__init__.py diff --git a/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.metadata.json b/prowler/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.metadata.json similarity index 99% rename from providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.metadata.json rename to prowler/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.metadata.json index 6a35e392..f547d1e2 100644 --- a/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.metadata.json +++ b/prowler/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.py b/prowler/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.py similarity index 83% rename from providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.py rename to prowler/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.py index 0ee0b2a1..1562dd11 100644 --- a/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.py +++ b/prowler/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.apigateway.apigateway_client import apigateway_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.apigateway.apigateway_client import ( + apigateway_client, +) class apigateway_endpoint_public(Check): diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/__init__.py b/prowler/providers/aws/services/apigateway/apigateway_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/__init__.py rename to prowler/providers/aws/services/apigateway/apigateway_logging_enabled/__init__.py diff --git a/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.metadata.json b/prowler/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.metadata.json rename to prowler/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.metadata.json index 9040a47f..5e328d57 100644 --- a/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.py b/prowler/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.py similarity index 84% rename from providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.py rename to prowler/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.py index 26e60ba3..b7e1deab 100644 --- a/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.py +++ b/prowler/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.apigateway.apigateway_client import apigateway_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.apigateway.apigateway_client import ( + apigateway_client, +) class apigateway_logging_enabled(Check): diff --git a/providers/aws/services/apigateway/apigateway_service.py b/prowler/providers/aws/services/apigateway/apigateway_service.py similarity index 97% rename from providers/aws/services/apigateway/apigateway_service.py rename to prowler/providers/aws/services/apigateway/apigateway_service.py index 6a4bf0b4..cdccbb58 100644 --- a/providers/aws/services/apigateway/apigateway_service.py +++ b/prowler/providers/aws/services/apigateway/apigateway_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## APIGateway diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/__init__.py b/prowler/providers/aws/services/apigateway/apigateway_waf_acl_attached/__init__.py similarity index 100% rename from providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/__init__.py rename to prowler/providers/aws/services/apigateway/apigateway_waf_acl_attached/__init__.py diff --git a/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.metadata.json b/prowler/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.metadata.json similarity index 100% rename from providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.metadata.json rename to prowler/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.metadata.json diff --git a/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.py b/prowler/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.py similarity index 84% rename from providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.py rename to prowler/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.py index a1e82e04..2b0cfaac 100644 --- a/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.py +++ b/prowler/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.apigateway.apigateway_client import apigateway_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.apigateway.apigateway_client import ( + apigateway_client, +) class apigateway_waf_acl_attached(Check): diff --git a/providers/aws/services/appstream/__init__.py b/prowler/providers/aws/services/apigatewayv2/__init__.py similarity index 100% rename from providers/aws/services/appstream/__init__.py rename to prowler/providers/aws/services/apigatewayv2/__init__.py diff --git a/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/__init__.py b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/__init__.py rename to prowler/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/__init__.py diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.metadata.json b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.metadata.json similarity index 100% rename from providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.metadata.json rename to prowler/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.metadata.json diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.py b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.py similarity index 83% rename from providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.py rename to prowler/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.py index 63ea21d2..f7e11b73 100644 --- a/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.py +++ b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.apigatewayv2.apigatewayv2_client import apigatewayv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.apigatewayv2.apigatewayv2_client import ( + apigatewayv2_client, +) class apigatewayv2_access_logging_enabled(Check): diff --git a/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/__init__.py b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/__init__.py similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_maximum_session_duration/__init__.py rename to prowler/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/__init__.py diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.metadata.json b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.metadata.json similarity index 100% rename from providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.metadata.json rename to prowler/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.metadata.json diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.py b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.py similarity index 82% rename from providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.py rename to prowler/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.py index 8aa82068..ab497eaf 100644 --- a/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.py +++ b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.apigatewayv2.apigatewayv2_client import apigatewayv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.apigatewayv2.apigatewayv2_client import ( + apigatewayv2_client, +) class apigatewayv2_authorizers_enabled(Check): diff --git a/prowler/providers/aws/services/apigatewayv2/apigatewayv2_client.py b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_client.py new file mode 100644 index 00000000..3d88a315 --- /dev/null +++ b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.apigatewayv2.apigatewayv2_service import ( + ApiGatewayV2, +) + +apigatewayv2_client = ApiGatewayV2(current_audit_info) diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_service.py b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_service.py similarity index 96% rename from providers/aws/services/apigatewayv2/apigatewayv2_service.py rename to prowler/providers/aws/services/apigatewayv2/apigatewayv2_service.py index 2441941d..3a825a4b 100644 --- a/providers/aws/services/apigatewayv2/apigatewayv2_service.py +++ b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## ApiGatewayV2 diff --git a/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/__init__.py b/prowler/providers/aws/services/appstream/__init__.py similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/__init__.py rename to prowler/providers/aws/services/appstream/__init__.py diff --git a/prowler/providers/aws/services/appstream/appstream_client.py b/prowler/providers/aws/services/appstream/appstream_client.py new file mode 100644 index 00000000..4f379f28 --- /dev/null +++ b/prowler/providers/aws/services/appstream/appstream_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.appstream.appstream_service import AppStream + +appstream_client = AppStream(current_audit_info) diff --git a/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/__init__.py b/prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/__init__.py similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/__init__.py rename to prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/__init__.py diff --git a/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.metadata.json b/prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.metadata.json similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.metadata.json rename to prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.metadata.json diff --git a/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.py b/prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.py similarity index 88% rename from providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.py rename to prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.py index f6986b49..70e16d37 100644 --- a/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.py +++ b/prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.appstream.appstream_client import appstream_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.appstream.appstream_client import appstream_client # Check if there are AppStream Fleets with the default internet access enabled diff --git a/providers/aws/services/autoscaling/__init__.py b/prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/__init__.py similarity index 100% rename from providers/aws/services/autoscaling/__init__.py rename to prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/__init__.py diff --git a/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.metadata.json b/prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.metadata.json similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.metadata.json rename to prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.metadata.json diff --git a/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.py b/prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.py similarity index 85% rename from providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.py rename to prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.py index a9025969..178831b3 100644 --- a/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.py +++ b/prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.py @@ -1,6 +1,6 @@ -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.appstream.appstream_client import appstream_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.appstream.appstream_client import appstream_client max_session_duration_seconds = get_config_var("max_session_duration_seconds") """max_session_duration_seconds, default: 36000 seconds (10 hours)""" diff --git a/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/__init__.py b/prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/__init__.py similarity index 100% rename from providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/__init__.py rename to prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/__init__.py diff --git a/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.metadata.json b/prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.metadata.json similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.metadata.json rename to prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.metadata.json diff --git a/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.py b/prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.py similarity index 85% rename from providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.py rename to prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.py index 0e22cd14..78774e06 100644 --- a/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.py +++ b/prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.py @@ -1,6 +1,6 @@ -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.appstream.appstream_client import appstream_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.appstream.appstream_client import appstream_client max_disconnect_timeout_in_seconds = get_config_var("max_disconnect_timeout_in_seconds") """max_disconnect_timeout_in_seconds, default: 300 seconds (5 minutes)""" diff --git a/providers/aws/services/awslambda/__init__.py b/prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/__init__.py similarity index 100% rename from providers/aws/services/awslambda/__init__.py rename to prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/__init__.py diff --git a/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.metadata.json b/prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.metadata.json similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.metadata.json rename to prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.metadata.json diff --git a/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.py b/prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.py similarity index 86% rename from providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.py rename to prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.py index f8a48c23..db82997f 100644 --- a/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.py +++ b/prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.py @@ -1,6 +1,6 @@ -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.appstream.appstream_client import appstream_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.appstream.appstream_client import appstream_client max_idle_disconnect_timeout_in_seconds = get_config_var( "max_idle_disconnect_timeout_in_seconds" diff --git a/providers/aws/services/appstream/appstream_service.py b/prowler/providers/aws/services/appstream/appstream_service.py similarity index 96% rename from providers/aws/services/appstream/appstream_service.py rename to prowler/providers/aws/services/appstream/appstream_service.py index 07620a85..18d3e7fa 100644 --- a/providers/aws/services/appstream/appstream_service.py +++ b/prowler/providers/aws/services/appstream/appstream_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## AppStream diff --git a/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/__init__.py b/prowler/providers/aws/services/autoscaling/__init__.py similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/__init__.py rename to prowler/providers/aws/services/autoscaling/__init__.py diff --git a/prowler/providers/aws/services/autoscaling/autoscaling_client.py b/prowler/providers/aws/services/autoscaling/autoscaling_client.py new file mode 100644 index 00000000..9f4d933f --- /dev/null +++ b/prowler/providers/aws/services/autoscaling/autoscaling_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.autoscaling.autoscaling_service import AutoScaling + +autoscaling_client = AutoScaling(current_audit_info) diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/__init__.py b/prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/__init__.py similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/__init__.py rename to prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/__init__.py diff --git a/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.metadata.json b/prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.metadata.json similarity index 100% rename from providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.metadata.json rename to prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.metadata.json diff --git a/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.py b/prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.py similarity index 91% rename from providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.py rename to prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.py index 3c45a116..9b5e6b21 100644 --- a/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.py +++ b/prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.py @@ -5,8 +5,10 @@ from base64 import b64decode from detect_secrets import SecretsCollection from detect_secrets.settings import default_settings -from lib.check.models import Check, Check_Report -from providers.aws.services.autoscaling.autoscaling_client import autoscaling_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.autoscaling.autoscaling_client import ( + autoscaling_client, +) class autoscaling_find_secrets_ec2_launch_configuration(Check): diff --git a/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/fixtures/fixture b/prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/fixtures/fixture similarity index 100% rename from providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/fixtures/fixture rename to prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/fixtures/fixture diff --git a/providers/aws/services/autoscaling/autoscaling_service.py b/prowler/providers/aws/services/autoscaling/autoscaling_service.py similarity index 95% rename from providers/aws/services/autoscaling/autoscaling_service.py rename to prowler/providers/aws/services/autoscaling/autoscaling_service.py index 60d8be80..2c6f9739 100644 --- a/providers/aws/services/autoscaling/autoscaling_service.py +++ b/prowler/providers/aws/services/autoscaling/autoscaling_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## AutoScaling diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/__init__.py b/prowler/providers/aws/services/awslambda/__init__.py similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/__init__.py rename to prowler/providers/aws/services/awslambda/__init__.py diff --git a/prowler/providers/aws/services/awslambda/awslambda_client.py b/prowler/providers/aws/services/awslambda/awslambda_client.py new file mode 100644 index 00000000..355bda1f --- /dev/null +++ b/prowler/providers/aws/services/awslambda/awslambda_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.awslambda.awslambda_service import Lambda + +awslambda_client = Lambda(current_audit_info) diff --git a/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/__init__.py diff --git a/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.metadata.json b/prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.metadata.json rename to prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.metadata.json index 2f0e9ea5..192fc2df 100644 --- a/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.py b/prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.py similarity index 85% rename from providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.py rename to prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.py index 3bdbfd18..12243c9f 100644 --- a/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.py +++ b/prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.py @@ -1,6 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.awslambda.awslambda_client import awslambda_client -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.awslambda.awslambda_client import awslambda_client +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) class awslambda_function_invoke_api_operations_cloudtrail_logging_enabled(Check): diff --git a/providers/aws/services/awslambda/awslambda_function_url_cors_policy/__init__.py b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/__init__.py similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_url_cors_policy/__init__.py rename to prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/__init__.py diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.metadata.json b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.metadata.json similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.metadata.json rename to prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.metadata.json diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.py b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.py similarity index 90% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.py rename to prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.py index 1b899f63..4df25af2 100644 --- a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.py +++ b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.py @@ -1,10 +1,12 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.awslambda.awslambda_client import awslambda_client -import tempfile import os +import tempfile + from detect_secrets import SecretsCollection from detect_secrets.settings import default_settings +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.awslambda.awslambda_client import awslambda_client + class awslambda_function_no_secrets_in_code(Check): def execute(self): diff --git a/providers/aws/services/awslambda/awslambda_function_url_public/__init__.py b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/__init__.py similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_url_public/__init__.py rename to prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/__init__.py diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.metadata.json b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.metadata.json similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.metadata.json rename to prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.metadata.json diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.py b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.py similarity index 90% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.py rename to prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.py index d0da4de4..a9083246 100644 --- a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.py +++ b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.py @@ -1,10 +1,12 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.awslambda.awslambda_client import awslambda_client -import tempfile import json +import os +import tempfile + from detect_secrets import SecretsCollection from detect_secrets.settings import default_settings -import os + +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.awslambda.awslambda_client import awslambda_client class awslambda_function_no_secrets_in_variables(Check): diff --git a/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/__init__.py b/prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/__init__.py rename to prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.metadata.json index 3e94a460..b303c84e 100644 --- a/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.py b/prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.py similarity index 91% rename from providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.py rename to prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.py index d188ed5a..7be6ecc3 100644 --- a/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.py +++ b/prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.awslambda.awslambda_client import awslambda_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.awslambda.awslambda_client import awslambda_client class awslambda_function_not_publicly_accessible(Check): diff --git a/providers/aws/services/cloudformation/__init__.py b/prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/__init__.py similarity index 100% rename from providers/aws/services/cloudformation/__init__.py rename to prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/__init__.py diff --git a/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.metadata.json b/prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.metadata.json similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.metadata.json rename to prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.metadata.json diff --git a/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.py b/prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.py similarity index 85% rename from providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.py rename to prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.py index afbd23b5..e640036c 100644 --- a/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.py +++ b/prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.awslambda.awslambda_client import awslambda_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.awslambda.awslambda_client import awslambda_client class awslambda_function_url_cors_policy(Check): diff --git a/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/__init__.py b/prowler/providers/aws/services/awslambda/awslambda_function_url_public/__init__.py similarity index 100% rename from providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/__init__.py rename to prowler/providers/aws/services/awslambda/awslambda_function_url_public/__init__.py diff --git a/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.metadata.json b/prowler/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.metadata.json similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.metadata.json rename to prowler/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.metadata.json diff --git a/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.py b/prowler/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.py similarity index 79% rename from providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.py rename to prowler/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.py index 556b6c5a..0587cf18 100644 --- a/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.py +++ b/prowler/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.py @@ -1,7 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.awslambda.awslambda_client import awslambda_client - -from providers.aws.services.awslambda.awslambda_service import AuthType +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.awslambda.awslambda_client import awslambda_client +from prowler.providers.aws.services.awslambda.awslambda_service import AuthType class awslambda_function_url_public(Check): diff --git a/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/__init__.py b/prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/__init__.py similarity index 100% rename from providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/__init__.py rename to prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/__init__.py diff --git a/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.metadata.json b/prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.metadata.json similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.metadata.json rename to prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.metadata.json diff --git a/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.py b/prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.py similarity index 81% rename from providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.py rename to prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.py index c53c5e7f..6660f065 100644 --- a/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.py +++ b/prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.awslambda.awslambda_client import awslambda_client -from config.config import get_config_var +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.awslambda.awslambda_client import awslambda_client class awslambda_function_using_supported_runtimes(Check): diff --git a/providers/aws/services/awslambda/awslambda_service.py b/prowler/providers/aws/services/awslambda/awslambda_service.py similarity index 98% rename from providers/aws/services/awslambda/awslambda_service.py rename to prowler/providers/aws/services/awslambda/awslambda_service.py index dc94b0aa..6c76bff9 100644 --- a/providers/aws/services/awslambda/awslambda_service.py +++ b/prowler/providers/aws/services/awslambda/awslambda_service.py @@ -8,8 +8,8 @@ from typing import Any import requests from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## Lambda diff --git a/providers/aws/services/cloudfront/__init__.py b/prowler/providers/aws/services/cloudformation/__init__.py similarity index 100% rename from providers/aws/services/cloudfront/__init__.py rename to prowler/providers/aws/services/cloudformation/__init__.py diff --git a/prowler/providers/aws/services/cloudformation/cloudformation_client.py b/prowler/providers/aws/services/cloudformation/cloudformation_client.py new file mode 100644 index 00000000..47461271 --- /dev/null +++ b/prowler/providers/aws/services/cloudformation/cloudformation_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.cloudformation.cloudformation_service import ( + CloudFormation, +) + +cloudformation_client = CloudFormation(current_audit_info) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/__init__.py b/prowler/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/__init__.py similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/__init__.py rename to prowler/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/__init__.py diff --git a/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.metadata.json b/prowler/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.metadata.json similarity index 100% rename from providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.metadata.json rename to prowler/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.metadata.json diff --git a/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.py b/prowler/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.py similarity index 92% rename from providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.py rename to prowler/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.py index 3b483c2e..4d95627a 100644 --- a/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.py +++ b/prowler/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.py @@ -4,8 +4,8 @@ import tempfile from detect_secrets import SecretsCollection from detect_secrets.settings import default_settings -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudformation.cloudformation_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudformation.cloudformation_client import ( cloudformation_client, ) diff --git a/providers/aws/services/cloudformation/cloudformation_service.py b/prowler/providers/aws/services/cloudformation/cloudformation_service.py similarity index 97% rename from providers/aws/services/cloudformation/cloudformation_service.py rename to prowler/providers/aws/services/cloudformation/cloudformation_service.py index c9318bef..3eccf15d 100644 --- a/providers/aws/services/cloudformation/cloudformation_service.py +++ b/prowler/providers/aws/services/cloudformation/cloudformation_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## CloudFormation diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/__init__.py b/prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/__init__.py rename to prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/__init__.py diff --git a/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.metadata.json b/prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.metadata.json rename to prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.metadata.json diff --git a/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.py b/prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.py similarity index 88% rename from providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.py rename to prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.py index f8ddd3af..3449e68b 100644 --- a/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.py +++ b/prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudformation.cloudformation_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudformation.cloudformation_client import ( cloudformation_client, ) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/__init__.py b/prowler/providers/aws/services/cloudfront/__init__.py similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/__init__.py rename to prowler/providers/aws/services/cloudfront/__init__.py diff --git a/prowler/providers/aws/services/cloudfront/cloudfront_client.py b/prowler/providers/aws/services/cloudfront/cloudfront_client.py new file mode 100644 index 00000000..d33af5df --- /dev/null +++ b/prowler/providers/aws/services/cloudfront/cloudfront_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.cloudfront.cloudfront_service import CloudFront + +cloudfront_client = CloudFront(current_audit_info) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/__init__.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/__init__.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/__init__.py diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.metadata.json b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.metadata.json rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.metadata.json diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.py similarity index 84% rename from providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.py index 0ea759af..58f4a044 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.py +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudfront.cloudfront_client import cloudfront_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudfront.cloudfront_client import ( + cloudfront_client, +) class cloudfront_distributions_field_level_encryption_enabled(Check): diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/__init__.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/__init__.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/__init__.py diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.metadata.json b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.metadata.json rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.metadata.json diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.py similarity index 76% rename from providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.py index 619de02e..ad7b03e8 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.py +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.py @@ -1,6 +1,10 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudfront.cloudfront_client import cloudfront_client -from providers.aws.services.cloudfront.cloudfront_service import GeoRestrictionType +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudfront.cloudfront_client import ( + cloudfront_client, +) +from prowler.providers.aws.services.cloudfront.cloudfront_service import ( + GeoRestrictionType, +) class cloudfront_distributions_geo_restrictions_enabled(Check): diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/__init__.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_waf/__init__.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/__init__.py diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.metadata.json b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.metadata.json rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.metadata.json index 8d5db7db..5b8cebb2 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.py similarity index 84% rename from providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.py index 272439d3..91c991f0 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.py +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.py @@ -1,6 +1,10 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudfront.cloudfront_client import cloudfront_client -from providers.aws.services.cloudfront.cloudfront_service import ViewerProtocolPolicy +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudfront.cloudfront_client import ( + cloudfront_client, +) +from prowler.providers.aws.services.cloudfront.cloudfront_service import ( + ViewerProtocolPolicy, +) class cloudfront_distributions_https_enabled(Check): diff --git a/providers/aws/services/cloudtrail/__init__.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/__init__.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/__init__.py diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.metadata.json b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.metadata.json rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.metadata.json index 6c6c555a..bae9a505 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "Logging and Monitoring" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.py similarity index 86% rename from providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.py index bbec6136..c0215c0b 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.py +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudfront.cloudfront_client import cloudfront_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudfront.cloudfront_client import ( + cloudfront_client, +) class cloudfront_distributions_logging_enabled(Check): diff --git a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/__init__.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/__init__.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/__init__.py diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.metadata.json b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.metadata.json similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.metadata.json rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.metadata.json diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.py similarity index 85% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.py index b4baa046..98f163e5 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.py +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.py @@ -1,6 +1,10 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudfront.cloudfront_client import cloudfront_client -from providers.aws.services.cloudfront.cloudfront_service import OriginsSSLProtocols +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudfront.cloudfront_client import ( + cloudfront_client, +) +from prowler.providers.aws.services.cloudfront.cloudfront_service import ( + OriginsSSLProtocols, +) class cloudfront_distributions_using_deprecated_ssl_protocols(Check): diff --git a/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/__init__.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/__init__.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/__init__.py diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.metadata.json b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.metadata.json similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.metadata.json rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.metadata.json diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.py similarity index 83% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.py index 6bd52882..ce8681a5 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.py +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudfront.cloudfront_client import cloudfront_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudfront.cloudfront_client import ( + cloudfront_client, +) class cloudfront_distributions_using_waf(Check): diff --git a/providers/aws/services/cloudfront/cloudfront_service.py b/prowler/providers/aws/services/cloudfront/cloudfront_service.py similarity index 98% rename from providers/aws/services/cloudfront/cloudfront_service.py rename to prowler/providers/aws/services/cloudfront/cloudfront_service.py index 77802fcd..c4ade26a 100644 --- a/providers/aws/services/cloudfront/cloudfront_service.py +++ b/prowler/providers/aws/services/cloudfront/cloudfront_service.py @@ -1,8 +1,8 @@ from dataclasses import dataclass from enum import Enum -from lib.logger import logger -from providers.aws.aws_provider import get_region_global_service +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import get_region_global_service ################## CloudFront diff --git a/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/__init__.py b/prowler/providers/aws/services/cloudtrail/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/__init__.py rename to prowler/providers/aws/services/cloudtrail/__init__.py diff --git a/prowler/providers/aws/services/cloudtrail/cloudtrail_client.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_client.py new file mode 100644 index 00000000..0c22cb6b --- /dev/null +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + +cloudtrail_client = Cloudtrail(current_audit_info) diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.metadata.json index fe89859f..de7f3379 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.py similarity index 92% rename from providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.py index 776b6fcb..b826b1d4 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.py @@ -1,7 +1,9 @@ from datetime import datetime, timedelta, timezone -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) maximum_time_without_logging = 1 diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.metadata.json index e9ea3f90..c8473efb 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.py similarity index 89% rename from providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.py index 8a789da5..c9241016 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) class cloudtrail_kms_encryption_enabled(Check): diff --git a/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.metadata.json index a0b5390c..e8472546 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.py similarity index 88% rename from providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.py index d441311c..c7a0d24e 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) class cloudtrail_log_file_validation_enabled(Check): diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.metadata.json index ec84dc98..43be6ecc 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.py similarity index 86% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.py index 0349bd9e..1869091a 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.py @@ -1,6 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.s3.s3_client import s3_client class cloudtrail_logs_s3_bucket_access_logging_enabled(Check): diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.metadata.json index 9a5808fc..75c56409 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.py similarity index 89% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.py index 0ed332af..a17475b6 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.py @@ -1,6 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.s3.s3_client import s3_client class cloudtrail_logs_s3_bucket_is_not_publicly_accessible(Check): diff --git a/providers/aws/services/cloudwatch/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.metadata.json index 3b692ecf..c8e2e636 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.py similarity index 93% rename from providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.py index 6c237faa..7cde3e34 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) class cloudtrail_multi_region_enabled(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.metadata.json diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.py similarity index 90% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.py index 330530e7..c0892260 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) class cloudtrail_s3_dataevents_read_enabled(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.metadata.json index 656c68e9..1f55be06 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.py similarity index 90% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.py index 25cfeb72..f81fb437 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) class cloudtrail_s3_dataevents_write_enabled(Check): diff --git a/providers/aws/services/cloudtrail/cloudtrail_service.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_service.py similarity index 98% rename from providers/aws/services/cloudtrail/cloudtrail_service.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_service.py index fb1eb61b..998eea30 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_service.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_service.py @@ -2,8 +2,8 @@ import datetime import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import ( +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import ( generate_regional_clients, get_region_global_service, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/__init__.py b/prowler/providers/aws/services/cloudwatch/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/__init__.py rename to prowler/providers/aws/services/cloudwatch/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.py index 44615ec2..5f405699 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_changes_to_network_acls_alarm_configured(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.py index 657b232c..12ad8c0e 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_changes_to_network_gateways_alarm_configured(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.py index cbd6a48d..d02752f4 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_changes_to_network_route_tables_alarm_configured(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.py similarity index 86% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.py index 8977d952..1047592a 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_changes_to_vpcs_alarm_configured(Check): diff --git a/prowler/providers/aws/services/cloudwatch/cloudwatch_client.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_client.py new file mode 100644 index 00000000..33a8c85e --- /dev/null +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.cloudwatch.cloudwatch_service import CloudWatch + +cloudwatch_client = CloudWatch(current_audit_info) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.py index 674f814b..2095cf03 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class cloudwatch_cross_account_sharing_disabled(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.py index 32376eff..b652e6fe 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_group_kms_encryption_enabled(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.py similarity index 84% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.py index 3a4a12f9..28886d5f 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.py @@ -1,6 +1,6 @@ -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_group_retention_policy_specific_days_enabled(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.py index 5dde517c..819b18a8 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled( diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.py index 0726648f..ea736f50 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled( diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.py similarity index 84% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.py index 48626472..96013f5c 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_authentication_failures(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.py similarity index 88% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.py index c12f8659..92b6f012 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_aws_organizations_changes(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.py similarity index 84% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.py index 99927eff..08dcb69b 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.py similarity index 86% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.py index 633674f5..ba7702d5 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_for_s3_bucket_policy_changes(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.py similarity index 87% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.py index b14fc767..77092ecd 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_policy_changes(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.py similarity index 84% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.py index 96a94525..07463054 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_root_usage(Check): diff --git a/providers/aws/services/codeartifact/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/__init__.py similarity index 100% rename from providers/aws/services/codeartifact/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.py index 23f1dc8b..10118078 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_security_group_changes(Check): diff --git a/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/__init__.py similarity index 100% rename from providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.py similarity index 84% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.py index aead862b..e8ebe4c9 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_sign_in_without_mfa(Check): diff --git a/providers/aws/services/codebuild/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/__init__.py similarity index 100% rename from providers/aws/services/codebuild/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.py similarity index 84% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.py index be788b9b..48efb414 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_unauthorized_api_calls(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_service.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_service.py similarity index 98% rename from providers/aws/services/cloudwatch/cloudwatch_service.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_service.py index 1e2e8988..c250db48 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_service.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## CloudWatch diff --git a/prowler/providers/aws/services/cloudwatch/logs_client.py b/prowler/providers/aws/services/cloudwatch/logs_client.py new file mode 100644 index 00000000..a937c903 --- /dev/null +++ b/prowler/providers/aws/services/cloudwatch/logs_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs + +logs_client = Logs(current_audit_info) diff --git a/providers/aws/services/codebuild/codebuild_project_older_90_days/__init__.py b/prowler/providers/aws/services/codeartifact/__init__.py similarity index 100% rename from providers/aws/services/codebuild/codebuild_project_older_90_days/__init__.py rename to prowler/providers/aws/services/codeartifact/__init__.py diff --git a/prowler/providers/aws/services/codeartifact/codeartifact_client.py b/prowler/providers/aws/services/codeartifact/codeartifact_client.py new file mode 100644 index 00000000..3c22918d --- /dev/null +++ b/prowler/providers/aws/services/codeartifact/codeartifact_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.codeartifact.codeartifact_service import ( + CodeArtifact, +) + +codeartifact_client = CodeArtifact(current_audit_info) diff --git a/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/__init__.py b/prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/__init__.py similarity index 100% rename from providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/__init__.py rename to prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/__init__.py diff --git a/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.metadata.json b/prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.metadata.json similarity index 100% rename from providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.metadata.json rename to prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.metadata.json diff --git a/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.py b/prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.py similarity index 84% rename from providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.py rename to prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.py index 465edff7..13462db6 100644 --- a/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.py +++ b/prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.py @@ -1,6 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.codeartifact.codeartifact_client import codeartifact_client -from providers.aws.services.codeartifact.codeartifact_service import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.codeartifact.codeartifact_client import ( + codeartifact_client, +) +from prowler.providers.aws.services.codeartifact.codeartifact_service import ( OriginInformationValues, RestrictionValues, ) diff --git a/providers/aws/services/codeartifact/codeartifact_service.py b/prowler/providers/aws/services/codeartifact/codeartifact_service.py similarity index 98% rename from providers/aws/services/codeartifact/codeartifact_service.py rename to prowler/providers/aws/services/codeartifact/codeartifact_service.py index 0899b50e..d035c9f6 100644 --- a/providers/aws/services/codeartifact/codeartifact_service.py +++ b/prowler/providers/aws/services/codeartifact/codeartifact_service.py @@ -3,8 +3,8 @@ from enum import Enum from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## CodeArtifact diff --git a/providers/aws/services/config/__init__.py b/prowler/providers/aws/services/codebuild/__init__.py similarity index 100% rename from providers/aws/services/config/__init__.py rename to prowler/providers/aws/services/codebuild/__init__.py diff --git a/prowler/providers/aws/services/codebuild/codebuild_client.py b/prowler/providers/aws/services/codebuild/codebuild_client.py new file mode 100644 index 00000000..bfc11384 --- /dev/null +++ b/prowler/providers/aws/services/codebuild/codebuild_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.codebuild.codebuild_service import Codebuild + +codebuild_client = Codebuild(current_audit_info) diff --git a/providers/aws/services/config/config_recorder_all_regions_enabled/__init__.py b/prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/__init__.py similarity index 100% rename from providers/aws/services/config/config_recorder_all_regions_enabled/__init__.py rename to prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/__init__.py diff --git a/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.metadata.json b/prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.metadata.json similarity index 100% rename from providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.metadata.json rename to prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.metadata.json diff --git a/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.py b/prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.py similarity index 88% rename from providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.py rename to prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.py index 2eb227c8..f9a0705e 100644 --- a/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.py +++ b/prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.py @@ -1,7 +1,7 @@ from datetime import datetime, timezone -from lib.check.models import Check, Check_Report -from providers.aws.services.codebuild.codebuild_client import codebuild_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.codebuild.codebuild_client import codebuild_client class codebuild_project_older_90_days(Check): diff --git a/providers/aws/services/directoryservice/__init__.py b/prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/__init__.py similarity index 100% rename from providers/aws/services/directoryservice/__init__.py rename to prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/__init__.py diff --git a/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.metadata.json b/prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.metadata.json similarity index 100% rename from providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.metadata.json rename to prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.metadata.json diff --git a/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.py b/prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.py similarity index 86% rename from providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.py rename to prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.py index a254bef9..b9f043f3 100644 --- a/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.py +++ b/prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.py @@ -1,7 +1,7 @@ from re import search -from lib.check.models import Check, Check_Report -from providers.aws.services.codebuild.codebuild_client import codebuild_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.codebuild.codebuild_client import codebuild_client class codebuild_project_user_controlled_buildspec(Check): diff --git a/providers/aws/services/codebuild/codebuild_service.py b/prowler/providers/aws/services/codebuild/codebuild_service.py similarity index 96% rename from providers/aws/services/codebuild/codebuild_service.py rename to prowler/providers/aws/services/codebuild/codebuild_service.py index 027f5e6e..10c95fff 100644 --- a/providers/aws/services/codebuild/codebuild_service.py +++ b/prowler/providers/aws/services/codebuild/codebuild_service.py @@ -2,8 +2,8 @@ import datetime import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################### Codebuild diff --git a/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/__init__.py b/prowler/providers/aws/services/config/__init__.py similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/__init__.py rename to prowler/providers/aws/services/config/__init__.py diff --git a/prowler/providers/aws/services/config/config_client.py b/prowler/providers/aws/services/config/config_client.py new file mode 100644 index 00000000..05f0fc02 --- /dev/null +++ b/prowler/providers/aws/services/config/config_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.config.config_service import Config + +config_client = Config(current_audit_info) diff --git a/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/__init__.py b/prowler/providers/aws/services/config/config_recorder_all_regions_enabled/__init__.py similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/__init__.py rename to prowler/providers/aws/services/config/config_recorder_all_regions_enabled/__init__.py diff --git a/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.metadata.json b/prowler/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.metadata.json similarity index 99% rename from providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.metadata.json rename to prowler/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.metadata.json index 1895b53e..f0b51d91 100644 --- a/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.metadata.json +++ b/prowler/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.py b/prowler/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.py similarity index 90% rename from providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.py rename to prowler/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.py index d5590f33..3012455b 100644 --- a/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.py +++ b/prowler/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.config.config_client import config_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.config.config_client import config_client class config_recorder_all_regions_enabled(Check): diff --git a/providers/aws/services/config/config_service.py b/prowler/providers/aws/services/config/config_service.py similarity index 96% rename from providers/aws/services/config/config_service.py rename to prowler/providers/aws/services/config/config_service.py index bf557580..3b84c533 100644 --- a/providers/aws/services/config/config_service.py +++ b/prowler/providers/aws/services/config/config_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## Config diff --git a/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/__init__.py b/prowler/providers/aws/services/directoryservice/__init__.py similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/__init__.py rename to prowler/providers/aws/services/directoryservice/__init__.py diff --git a/prowler/providers/aws/services/directoryservice/directoryservice_client.py b/prowler/providers/aws/services/directoryservice/directoryservice_client.py new file mode 100644 index 00000000..42c42b63 --- /dev/null +++ b/prowler/providers/aws/services/directoryservice/directoryservice_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( + DirectoryService, +) + +directoryservice_client = DirectoryService(current_audit_info) diff --git a/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/__init__.py b/prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/__init__.py similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/__init__.py rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/__init__.py diff --git a/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.metadata.json b/prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.metadata.json similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.metadata.json rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.metadata.json diff --git a/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.py b/prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.py similarity index 84% rename from providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.py rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.py index 5cd281c3..086b5670 100644 --- a/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.py +++ b/prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.directoryservice.directoryservice_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.directoryservice.directoryservice_client import ( directoryservice_client, ) diff --git a/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/__init__.py b/prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/__init__.py similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/__init__.py rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/__init__.py diff --git a/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.metadata.json b/prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.metadata.json similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.metadata.json rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.metadata.json diff --git a/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.py b/prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.py similarity index 85% rename from providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.py rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.py index 83359add..6cb9d3c0 100644 --- a/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.py +++ b/prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.directoryservice.directoryservice_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.directoryservice.directoryservice_client import ( directoryservice_client, ) diff --git a/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/__init__.py b/prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/__init__.py similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/__init__.py rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/__init__.py diff --git a/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.metadata.json b/prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.metadata.json similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.metadata.json rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.metadata.json diff --git a/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.py b/prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.py similarity index 92% rename from providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.py rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.py index cf747cb1..ed3f344b 100644 --- a/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.py +++ b/prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.directoryservice.directoryservice_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.directoryservice.directoryservice_client import ( directoryservice_client, ) diff --git a/providers/aws/services/dynamodb/__init__.py b/prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/__init__.py similarity index 100% rename from providers/aws/services/dynamodb/__init__.py rename to prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/__init__.py diff --git a/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.metadata.json b/prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.metadata.json similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.metadata.json rename to prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.metadata.json diff --git a/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.py b/prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.py similarity index 89% rename from providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.py rename to prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.py index 0ec4b95a..e613d382 100644 --- a/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.py +++ b/prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.py @@ -1,7 +1,7 @@ from datetime import datetime -from lib.check.models import Check, Check_Report -from providers.aws.services.directoryservice.directoryservice_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.directoryservice.directoryservice_client import ( directoryservice_client, ) diff --git a/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/__init__.py b/prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/__init__.py similarity index 100% rename from providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/__init__.py rename to prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/__init__.py diff --git a/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.metadata.json b/prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.metadata.json similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.metadata.json rename to prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.metadata.json diff --git a/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.py b/prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.py similarity index 82% rename from providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.py rename to prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.py index bffb3b9d..b1c97fb7 100644 --- a/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.py +++ b/prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.py @@ -1,8 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.directoryservice.directoryservice_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.directoryservice.directoryservice_client import ( directoryservice_client, ) -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( AuthenticationProtocol, ) diff --git a/providers/aws/services/directoryservice/directoryservice_service.py b/prowler/providers/aws/services/directoryservice/directoryservice_service.py similarity index 98% rename from providers/aws/services/directoryservice/directoryservice_service.py rename to prowler/providers/aws/services/directoryservice/directoryservice_service.py index b405b48a..0fc58358 100644 --- a/providers/aws/services/directoryservice/directoryservice_service.py +++ b/prowler/providers/aws/services/directoryservice/directoryservice_service.py @@ -5,8 +5,8 @@ from typing import Union from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## DirectoryService diff --git a/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/__init__.py b/prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/__init__.py similarity index 100% rename from providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/__init__.py rename to prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/__init__.py diff --git a/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.metadata.json b/prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.metadata.json similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.metadata.json rename to prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.metadata.json diff --git a/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.py b/prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.py similarity index 80% rename from providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.py rename to prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.py index f9f9bae6..18666a70 100644 --- a/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.py +++ b/prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.py @@ -1,8 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.directoryservice.directoryservice_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.directoryservice.directoryservice_client import ( directoryservice_client, ) -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( RadiusStatus, ) diff --git a/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/__init__.py b/prowler/providers/aws/services/dynamodb/__init__.py similarity index 100% rename from providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/__init__.py rename to prowler/providers/aws/services/dynamodb/__init__.py diff --git a/prowler/providers/aws/services/dynamodb/dax_client.py b/prowler/providers/aws/services/dynamodb/dax_client.py new file mode 100644 index 00000000..ff3927ab --- /dev/null +++ b/prowler/providers/aws/services/dynamodb/dax_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.dynamodb.dynamodb_service import DAX + +dax_client = DAX(current_audit_info) diff --git a/providers/aws/services/ec2/__init__.py b/prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/ec2/__init__.py rename to prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/__init__.py diff --git a/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.metadata.json b/prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.metadata.json rename to prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.metadata.json diff --git a/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.py b/prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.py similarity index 85% rename from providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.py rename to prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.py index 66f289c1..f8b84374 100644 --- a/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.py +++ b/prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.dynamodb.dax_client import dax_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.dynamodb.dax_client import dax_client class dynamodb_accelerator_cluster_encryption_enabled(Check): diff --git a/prowler/providers/aws/services/dynamodb/dynamodb_client.py b/prowler/providers/aws/services/dynamodb/dynamodb_client.py new file mode 100644 index 00000000..a79f6ba5 --- /dev/null +++ b/prowler/providers/aws/services/dynamodb/dynamodb_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.dynamodb.dynamodb_service import DynamoDB + +dynamodb_client = DynamoDB(current_audit_info) diff --git a/providers/aws/services/dynamodb/dynamodb_service.py b/prowler/providers/aws/services/dynamodb/dynamodb_service.py similarity index 98% rename from providers/aws/services/dynamodb/dynamodb_service.py rename to prowler/providers/aws/services/dynamodb/dynamodb_service.py index d12040ca..ee478bb9 100644 --- a/providers/aws/services/dynamodb/dynamodb_service.py +++ b/prowler/providers/aws/services/dynamodb/dynamodb_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## DynamoDB diff --git a/providers/aws/services/ec2/ec2_ami_public/__init__.py b/prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_ami_public/__init__.py rename to prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/__init__.py diff --git a/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.metadata.json b/prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.metadata.json rename to prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.metadata.json diff --git a/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.py b/prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.py similarity index 84% rename from providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.py rename to prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.py index c25381d3..fd022c28 100644 --- a/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.py +++ b/prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.dynamodb.dynamodb_client import dynamodb_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.dynamodb.dynamodb_client import dynamodb_client class dynamodb_tables_kms_cmk_encryption_enabled(Check): diff --git a/providers/aws/services/ec2/ec2_ebs_default_encryption/__init__.py b/prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_ebs_default_encryption/__init__.py rename to prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/__init__.py diff --git a/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.metadata.json b/prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.metadata.json similarity index 100% rename from providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.metadata.json rename to prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.metadata.json diff --git a/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.py b/prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.py similarity index 83% rename from providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.py rename to prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.py index b5fca8b9..80a0f521 100644 --- a/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.py +++ b/prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.dynamodb.dynamodb_client import dynamodb_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.dynamodb.dynamodb_client import dynamodb_client class dynamodb_tables_pitr_enabled(Check): diff --git a/providers/aws/services/ec2/ec2_ebs_public_snapshot/__init__.py b/prowler/providers/aws/services/ec2/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_ebs_public_snapshot/__init__.py rename to prowler/providers/aws/services/ec2/__init__.py diff --git a/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/__init__.py b/prowler/providers/aws/services/ec2/ec2_ami_public/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/__init__.py rename to prowler/providers/aws/services/ec2/ec2_ami_public/__init__.py diff --git a/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.metadata.json b/prowler/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.metadata.json rename to prowler/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.metadata.json index 8d18c966..0c3f3745 100644 --- a/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.py b/prowler/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.py similarity index 83% rename from providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.py rename to prowler/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.py index 0ba3504e..436be5d2 100644 --- a/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.py +++ b/prowler/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_ami_public(Check): diff --git a/prowler/providers/aws/services/ec2/ec2_client.py b/prowler/providers/aws/services/ec2/ec2_client.py new file mode 100644 index 00000000..2541c7e6 --- /dev/null +++ b/prowler/providers/aws/services/ec2/ec2_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.ec2.ec2_service import EC2 + +ec2_client = EC2(current_audit_info) diff --git a/providers/aws/services/ec2/ec2_ebs_volume_encryption/__init__.py b/prowler/providers/aws/services/ec2/ec2_ebs_default_encryption/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_ebs_volume_encryption/__init__.py rename to prowler/providers/aws/services/ec2/ec2_ebs_default_encryption/__init__.py diff --git a/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.metadata.json b/prowler/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.metadata.json rename to prowler/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.metadata.json diff --git a/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.py b/prowler/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.py similarity index 83% rename from providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.py rename to prowler/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.py index 55eb1c20..c5b7c55c 100644 --- a/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.py +++ b/prowler/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_ebs_default_encryption(Check): diff --git a/providers/aws/services/ec2/ec2_elastic_ip_shodan/__init__.py b/prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_elastic_ip_shodan/__init__.py rename to prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/__init__.py diff --git a/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.metadata.json b/prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.metadata.json rename to prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.metadata.json index 318934bb..2956ea1b 100644 --- a/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.py b/prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.py similarity index 85% rename from providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.py rename to prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.py index 6cccc2fb..6da24557 100644 --- a/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.py +++ b/prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_ebs_public_snapshot(Check): diff --git a/providers/aws/services/ec2/ec2_elastic_ip_unassgined/__init__.py b/prowler/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_elastic_ip_unassgined/__init__.py rename to prowler/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/__init__.py diff --git a/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.metadata.json b/prowler/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.metadata.json rename to prowler/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.metadata.json diff --git a/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.py b/prowler/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.py similarity index 84% rename from providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.py rename to prowler/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.py index de944874..e0b5035e 100644 --- a/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.py +++ b/prowler/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_ebs_snapshots_encrypted(Check): diff --git a/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/__init__.py b/prowler/providers/aws/services/ec2/ec2_ebs_volume_encryption/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_instance_imdsv2_enabled/__init__.py rename to prowler/providers/aws/services/ec2/ec2_ebs_volume_encryption/__init__.py diff --git a/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.metadata.json b/prowler/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.metadata.json rename to prowler/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.metadata.json diff --git a/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.py b/prowler/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.py similarity index 83% rename from providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.py rename to prowler/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.py index 3a8eebdb..f5289115 100644 --- a/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.py +++ b/prowler/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_ebs_volume_encryption(Check): diff --git a/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/__init__.py b/prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/__init__.py rename to prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/__init__.py diff --git a/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.metadata.json b/prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.metadata.json rename to prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.metadata.json index e898ca10..7dab33bb 100644 --- a/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.py b/prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.py similarity index 88% rename from providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.py rename to prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.py index 9f276abf..1d00ed24 100644 --- a/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.py +++ b/prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.py @@ -1,9 +1,9 @@ import shodan -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from lib.logger import logger -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.lib.logger import logger +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_elastic_ip_shodan(Check): diff --git a/providers/aws/services/ec2/ec2_instance_managed_by_ssm/__init__.py b/prowler/providers/aws/services/ec2/ec2_elastic_ip_unassgined/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_instance_managed_by_ssm/__init__.py rename to prowler/providers/aws/services/ec2/ec2_elastic_ip_unassgined/__init__.py diff --git a/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.metadata.json b/prowler/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.metadata.json rename to prowler/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.metadata.json diff --git a/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.py b/prowler/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.py similarity index 85% rename from providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.py rename to prowler/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.py index 306ed1b6..34ad9707 100644 --- a/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.py +++ b/prowler/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_elastic_ip_unassgined(Check): diff --git a/providers/aws/services/ec2/ec2_instance_older_than_specific_days/__init__.py b/prowler/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_instance_older_than_specific_days/__init__.py rename to prowler/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/__init__.py diff --git a/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.metadata.json b/prowler/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.metadata.json rename to prowler/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.metadata.json diff --git a/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.py b/prowler/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.py similarity index 86% rename from providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.py rename to prowler/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.py index d795dc15..dc8ab884 100644 --- a/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.py +++ b/prowler/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_instance_imdsv2_enabled(Check): diff --git a/providers/aws/services/ec2/ec2_instance_profile_attached/__init__.py b/prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_instance_profile_attached/__init__.py rename to prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/__init__.py diff --git a/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.metadata.json b/prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.metadata.json rename to prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.metadata.json index f2427cea..168fb1a3 100644 --- a/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.py b/prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.py similarity index 86% rename from providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.py rename to prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.py index cd23f035..153cf8ac 100644 --- a/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.py +++ b/prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_instance_internet_facing_with_instance_profile(Check): diff --git a/providers/aws/services/ec2/ec2_instance_public_ip/__init__.py b/prowler/providers/aws/services/ec2/ec2_instance_managed_by_ssm/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_instance_public_ip/__init__.py rename to prowler/providers/aws/services/ec2/ec2_instance_managed_by_ssm/__init__.py diff --git a/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.metadata.json b/prowler/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.metadata.json rename to prowler/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.metadata.json diff --git a/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.py b/prowler/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.py similarity index 81% rename from providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.py rename to prowler/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.py index e47890ba..cf1ce06c 100644 --- a/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.py +++ b/prowler/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ssm.ssm_client import ssm_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ssm.ssm_client import ssm_client class ec2_instance_managed_by_ssm(Check): diff --git a/providers/aws/services/ec2/ec2_instance_secrets_user_data/__init__.py b/prowler/providers/aws/services/ec2/ec2_instance_older_than_specific_days/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_instance_secrets_user_data/__init__.py rename to prowler/providers/aws/services/ec2/ec2_instance_older_than_specific_days/__init__.py diff --git a/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.metadata.json b/prowler/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.metadata.json rename to prowler/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.metadata.json diff --git a/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.py b/prowler/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.py similarity index 87% rename from providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.py rename to prowler/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.py index 27bf9f96..7646deb0 100644 --- a/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.py +++ b/prowler/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.py @@ -1,8 +1,8 @@ from datetime import datetime, timezone -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_instance_older_than_specific_days(Check): diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/__init__.py b/prowler/providers/aws/services/ec2/ec2_instance_profile_attached/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/__init__.py rename to prowler/providers/aws/services/ec2/ec2_instance_profile_attached/__init__.py diff --git a/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.metadata.json b/prowler/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.metadata.json rename to prowler/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.metadata.json diff --git a/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.py b/prowler/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.py similarity index 84% rename from providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.py rename to prowler/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.py index 5cf832b7..a2612313 100644 --- a/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.py +++ b/prowler/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_instance_profile_attached(Check): diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/__init__.py b/prowler/providers/aws/services/ec2/ec2_instance_public_ip/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/__init__.py rename to prowler/providers/aws/services/ec2/ec2_instance_public_ip/__init__.py diff --git a/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.metadata.json b/prowler/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.metadata.json rename to prowler/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.metadata.json index af1c4d2a..24bcc133 100644 --- a/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.py b/prowler/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.py similarity index 86% rename from providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.py rename to prowler/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.py index 90ecb3bb..fd481c74 100644 --- a/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.py +++ b/prowler/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_instance_public_ip(Check): diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/__init__.py b/prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/__init__.py rename to prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/__init__.py diff --git a/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.metadata.json b/prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.metadata.json rename to prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.metadata.json diff --git a/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.py b/prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.py similarity index 92% rename from providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.py rename to prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.py index 184c0076..e65211ae 100644 --- a/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.py +++ b/prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.py @@ -5,8 +5,8 @@ from base64 import b64decode from detect_secrets import SecretsCollection from detect_secrets.settings import default_settings -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_instance_secrets_user_data(Check): diff --git a/providers/aws/services/ec2/ec2_instance_secrets_user_data/fixtures/fixture b/prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/fixtures/fixture similarity index 100% rename from providers/aws/services/ec2/ec2_instance_secrets_user_data/fixtures/fixture rename to prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/fixtures/fixture diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/__init__.py b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/__init__.py rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/__init__.py diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.metadata.json b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.metadata.json rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.metadata.json index e90d0b8c..7934331c 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "Infrastructure Security" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.py b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.py similarity index 81% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.py rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.py index b64c27c7..6e277f68 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.py +++ b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.network_acls import check_network_acl +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.network_acls import check_network_acl class ec2_networkacl_allow_ingress_any_port(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/__init__.py b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/__init__.py rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/__init__.py diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.metadata.json b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.metadata.json rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.metadata.json index 51d6ce56..5d6c7584 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.py b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.py similarity index 82% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.py rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.py index a6c13a6a..f59d7a77 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.py +++ b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.network_acls import check_network_acl +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.network_acls import check_network_acl class ec2_networkacl_allow_ingress_tcp_port_22(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/__init__.py b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/__init__.py rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/__init__.py diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.metadata.json b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.metadata.json rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.metadata.json index c79390e7..bb2e27b8 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.py b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.py similarity index 82% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.py rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.py index 0e1d664b..b685f595 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.py +++ b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.network_acls import check_network_acl +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.network_acls import check_network_acl class ec2_networkacl_allow_ingress_tcp_port_3389(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.metadata.json index 86078787..26cd1073 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.py similarity index 82% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.py index 632857d8..3c907eab 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_any_port(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.metadata.json index 18a70182..0db0accd 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.py index d08146e6..55f775a4 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.metadata.json index 3b70ba80..3e9cd7f6 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.py index 15d6a83f..5acb94ac 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.metadata.json index 30513df7..87379727 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.py index 33a5d8f3..64d22c1f 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.metadata.json index 88369cd0..770956dc 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.py index eddbe908..c8361f5d 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.metadata.json index 23e4f760..c2b54c61 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.py index 83c9a250..a8f0bb38 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888( diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.metadata.json index cff99193..f1ccd595 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.py index 9f27cc03..02e95e97 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601( diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.metadata.json index 22a88445..6a5bfa83 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.py index 22c96ac3..730bd6c2 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.metadata.json index 118e9f2a..fa11c0d5 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.py index ae6810de..5e6edc35 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.metadata.json index d7bba222..97cc79c8 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.py index d517d390..945f7d82 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.metadata.json index 8feafe49..bcb6c693 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.py index 27eeccb1..74816ab5 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.metadata.json index abed1cea..7c8e3a52 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.py index 741f2179..c166fd50 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.metadata.json index 78ce0daa..2ec298fe 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.py index 5e88545f..a65d3730 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.metadata.json index 40d38db4..b3e53847 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.py index d8ad9ffb..a69ee876 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434( diff --git a/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.metadata.json index 43437b49..4b06f10d 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.py index 2c71ffa0..fe438c48 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.metadata.json index 18dccfec..daabd4bb 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.py similarity index 94% rename from providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.py index f2d5dec6..324fb66c 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.py @@ -1,7 +1,7 @@ import ipaddress -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_securitygroup_allow_wide_open_public_ipv4(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_not_used/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_not_used/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.metadata.json diff --git a/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.py similarity index 82% rename from providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.py index d93dfaad..7d2eb598 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_default_restrict_traffic(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.metadata.json diff --git a/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.py similarity index 86% rename from providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.py index 65faace5..2b98ce13 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_securitygroup_from_launch_wizard(Check): diff --git a/providers/aws/services/ec2/lib/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/__init__.py similarity index 100% rename from providers/aws/services/ec2/lib/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.metadata.json index 28984c17..b72a05d1 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.py index e36688dc..cd1f11bc 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_in_use_without_ingress_filtering(Check): diff --git a/providers/aws/services/ecr/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_not_used/__init__.py similarity index 100% rename from providers/aws/services/ecr/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_not_used/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.metadata.json diff --git a/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.py similarity index 85% rename from providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.py index b6543384..60295dc0 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_securitygroup_not_used(Check): diff --git a/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/__init__.py similarity index 100% rename from providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.metadata.json diff --git a/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.py index b9101ad5..9f4b20fb 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.py @@ -1,6 +1,6 @@ -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_securitygroup_with_many_ingress_egress_rules(Check): diff --git a/providers/aws/services/ec2/ec2_service.py b/prowler/providers/aws/services/ec2/ec2_service.py similarity index 99% rename from providers/aws/services/ec2/ec2_service.py rename to prowler/providers/aws/services/ec2/ec2_service.py index f19fd6e4..a5db977a 100644 --- a/providers/aws/services/ec2/ec2_service.py +++ b/prowler/providers/aws/services/ec2/ec2_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## EC2 diff --git a/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/ec2/lib/__init__.py similarity index 100% rename from providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/ec2/lib/__init__.py diff --git a/providers/aws/services/ec2/lib/network_acls.py b/prowler/providers/aws/services/ec2/lib/network_acls.py similarity index 100% rename from providers/aws/services/ec2/lib/network_acls.py rename to prowler/providers/aws/services/ec2/lib/network_acls.py diff --git a/providers/aws/services/ec2/lib/security_groups.py b/prowler/providers/aws/services/ec2/lib/security_groups.py similarity index 100% rename from providers/aws/services/ec2/lib/security_groups.py rename to prowler/providers/aws/services/ec2/lib/security_groups.py diff --git a/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/__init__.py b/prowler/providers/aws/services/ecr/__init__.py similarity index 100% rename from providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/__init__.py rename to prowler/providers/aws/services/ecr/__init__.py diff --git a/prowler/providers/aws/services/ecr/ecr_client.py b/prowler/providers/aws/services/ecr/ecr_client.py new file mode 100644 index 00000000..d9775a9c --- /dev/null +++ b/prowler/providers/aws/services/ecr/ecr_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.ecr.ecr_service import ECR + +ecr_client = ECR(current_audit_info) diff --git a/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/__init__.py b/prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/__init__.py similarity index 100% rename from providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/__init__.py rename to prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/__init__.py diff --git a/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.metadata.json b/prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.metadata.json similarity index 100% rename from providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.metadata.json rename to prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.metadata.json diff --git a/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.py b/prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.py similarity index 86% rename from providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.py rename to prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.py index e294c4b6..959e2ca8 100644 --- a/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.py +++ b/prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ecr.ecr_client import ecr_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ecr.ecr_client import ecr_client class ecr_repositories_lifecycle_policy_enabled(Check): diff --git a/providers/aws/services/ecs/__init__.py b/prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/ecs/__init__.py rename to prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.metadata.json index d1affd26..ce687151 100644 --- a/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.metadata.json @@ -36,4 +36,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.py b/prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.py similarity index 90% rename from providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.py rename to prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.py index 197c8310..3596dfdc 100644 --- a/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.py +++ b/prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ecr.ecr_client import ecr_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ecr.ecr_client import ecr_client class ecr_repositories_not_publicly_accessible(Check): diff --git a/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/__init__.py b/prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/__init__.py similarity index 100% rename from providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/__init__.py rename to prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/__init__.py diff --git a/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.metadata.json b/prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.metadata.json similarity index 100% rename from providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.metadata.json rename to prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.metadata.json diff --git a/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.py b/prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.py similarity index 86% rename from providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.py rename to prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.py index 3ea725e8..c880eb3b 100644 --- a/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.py +++ b/prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ecr.ecr_client import ecr_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ecr.ecr_client import ecr_client class ecr_repositories_scan_images_on_push_enabled(Check): diff --git a/providers/aws/services/efs/__init__.py b/prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/__init__.py similarity index 100% rename from providers/aws/services/efs/__init__.py rename to prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/__init__.py diff --git a/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.metadata.json b/prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.metadata.json similarity index 100% rename from providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.metadata.json rename to prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.metadata.json diff --git a/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.py b/prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.py similarity index 93% rename from providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.py rename to prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.py index 5a6e68c0..4335972d 100644 --- a/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.py +++ b/prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ecr.ecr_client import ecr_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ecr.ecr_client import ecr_client class ecr_repositories_scan_vulnerabilities_in_latest_image(Check): diff --git a/providers/aws/services/ecr/ecr_service.py b/prowler/providers/aws/services/ecr/ecr_service.py similarity index 98% rename from providers/aws/services/ecr/ecr_service.py rename to prowler/providers/aws/services/ecr/ecr_service.py index da9fe902..62b01520 100644 --- a/providers/aws/services/ecr/ecr_service.py +++ b/prowler/providers/aws/services/ecr/ecr_service.py @@ -2,8 +2,8 @@ import threading from dataclasses import dataclass from json import loads -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ ECR diff --git a/providers/aws/services/efs/efs_encryption_at_rest_enabled/__init__.py b/prowler/providers/aws/services/ecs/__init__.py similarity index 100% rename from providers/aws/services/efs/efs_encryption_at_rest_enabled/__init__.py rename to prowler/providers/aws/services/ecs/__init__.py diff --git a/prowler/providers/aws/services/ecs/ecs_client.py b/prowler/providers/aws/services/ecs/ecs_client.py new file mode 100644 index 00000000..5f9d59c1 --- /dev/null +++ b/prowler/providers/aws/services/ecs/ecs_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.ecs.ecs_service import ECS + +ecs_client = ECS(current_audit_info) diff --git a/providers/aws/services/ecs/ecs_service.py b/prowler/providers/aws/services/ecs/ecs_service.py similarity index 96% rename from providers/aws/services/ecs/ecs_service.py rename to prowler/providers/aws/services/ecs/ecs_service.py index ebca98d6..d017e933 100644 --- a/providers/aws/services/ecs/ecs_service.py +++ b/prowler/providers/aws/services/ecs/ecs_service.py @@ -3,8 +3,8 @@ from re import sub from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ ECS diff --git a/providers/aws/services/efs/efs_have_backup_enabled/__init__.py b/prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/__init__.py similarity index 100% rename from providers/aws/services/efs/efs_have_backup_enabled/__init__.py rename to prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/__init__.py diff --git a/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.metadata.json b/prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.metadata.json similarity index 100% rename from providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.metadata.json rename to prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.metadata.json diff --git a/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.py b/prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.py similarity index 92% rename from providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.py rename to prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.py index 8cae04d3..0df3cf32 100644 --- a/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.py +++ b/prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.py @@ -5,8 +5,8 @@ from json import dumps from detect_secrets import SecretsCollection from detect_secrets.settings import default_settings -from lib.check.models import Check, Check_Report -from providers.aws.services.ecs.ecs_client import ecs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ecs.ecs_client import ecs_client class ecs_task_definitions_no_environment_secrets(Check): diff --git a/providers/aws/services/efs/efs_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/efs/__init__.py similarity index 100% rename from providers/aws/services/efs/efs_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/efs/__init__.py diff --git a/prowler/providers/aws/services/efs/efs_client.py b/prowler/providers/aws/services/efs/efs_client.py new file mode 100644 index 00000000..00e71cdc --- /dev/null +++ b/prowler/providers/aws/services/efs/efs_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.efs.efs_service import EFS + +efs_client = EFS(current_audit_info) diff --git a/providers/aws/services/eks/__init__.py b/prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/__init__.py similarity index 100% rename from providers/aws/services/eks/__init__.py rename to prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/__init__.py diff --git a/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.metadata.json b/prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.metadata.json similarity index 100% rename from providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.metadata.json rename to prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.metadata.json diff --git a/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.py b/prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.py similarity index 84% rename from providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.py rename to prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.py index cd1ff8b2..20d654fb 100644 --- a/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.py +++ b/prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.efs.efs_client import efs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.efs.efs_client import efs_client class efs_encryption_at_rest_enabled(Check): diff --git a/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/__init__.py b/prowler/providers/aws/services/efs/efs_have_backup_enabled/__init__.py similarity index 100% rename from providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/__init__.py rename to prowler/providers/aws/services/efs/efs_have_backup_enabled/__init__.py diff --git a/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.metadata.json b/prowler/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.metadata.json similarity index 100% rename from providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.metadata.json rename to prowler/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.metadata.json diff --git a/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.py b/prowler/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.py similarity index 84% rename from providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.py rename to prowler/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.py index 1d06b572..7fee9270 100644 --- a/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.py +++ b/prowler/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.efs.efs_client import efs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.efs.efs_client import efs_client class efs_have_backup_enabled(Check): diff --git a/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/__init__.py b/prowler/providers/aws/services/efs/efs_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/__init__.py rename to prowler/providers/aws/services/efs/efs_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.metadata.json similarity index 100% rename from providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.metadata.json diff --git a/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.py b/prowler/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.py similarity index 92% rename from providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.py rename to prowler/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.py index 2427c744..1d721796 100644 --- a/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.py +++ b/prowler/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.efs.efs_client import efs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.efs.efs_client import efs_client class efs_not_publicly_accessible(Check): diff --git a/providers/aws/services/efs/efs_service.py b/prowler/providers/aws/services/efs/efs_service.py similarity index 96% rename from providers/aws/services/efs/efs_service.py rename to prowler/providers/aws/services/efs/efs_service.py index cecc51e8..ec842f75 100644 --- a/providers/aws/services/efs/efs_service.py +++ b/prowler/providers/aws/services/efs/efs_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################### EFS diff --git a/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/__init__.py b/prowler/providers/aws/services/eks/__init__.py similarity index 100% rename from providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/__init__.py rename to prowler/providers/aws/services/eks/__init__.py diff --git a/prowler/providers/aws/services/eks/eks_client.py b/prowler/providers/aws/services/eks/eks_client.py new file mode 100644 index 00000000..4eaad652 --- /dev/null +++ b/prowler/providers/aws/services/eks/eks_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.eks.eks_service import EKS + +eks_client = EKS(current_audit_info) diff --git a/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/__init__.py similarity index 100% rename from providers/aws/services/eks/eks_endpoints_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/__init__.py diff --git a/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.metadata.json b/prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.metadata.json similarity index 100% rename from providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.metadata.json rename to prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.metadata.json diff --git a/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.py b/prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.py similarity index 86% rename from providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.py rename to prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.py index 40290024..ad7dcf68 100644 --- a/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.py +++ b/prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.eks.eks_client import eks_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.eks.eks_client import eks_client class eks_cluster_kms_cmk_encryption_in_secrets_enabled(Check): diff --git a/providers/aws/services/elb/__init__.py b/prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/__init__.py similarity index 100% rename from providers/aws/services/elb/__init__.py rename to prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/__init__.py diff --git a/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.metadata.json b/prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.metadata.json similarity index 99% rename from providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.metadata.json rename to prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.metadata.json index 501da151..f840cf1d 100644 --- a/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.metadata.json +++ b/prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.py b/prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.py similarity index 89% rename from providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.py rename to prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.py index 76e34a19..d7727729 100644 --- a/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.py +++ b/prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.eks.eks_client import eks_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.eks.eks_client import eks_client class eks_control_plane_endpoint_access_restricted(Check): diff --git a/providers/aws/services/elb/elb_insecure_ssl_ciphers/__init__.py b/prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/__init__.py similarity index 100% rename from providers/aws/services/elb/elb_insecure_ssl_ciphers/__init__.py rename to prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/__init__.py diff --git a/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.metadata.json b/prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.metadata.json similarity index 99% rename from providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.metadata.json rename to prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.metadata.json index 9d7b211a..826f8fa9 100644 --- a/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.metadata.json +++ b/prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.py b/prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.py similarity index 91% rename from providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.py rename to prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.py index 55e68be3..11407ce3 100644 --- a/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.py +++ b/prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.eks.eks_client import eks_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.eks.eks_client import eks_client class eks_control_plane_logging_all_types_enabled(Check): diff --git a/providers/aws/services/elb/elb_internet_facing/__init__.py b/prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/elb/elb_internet_facing/__init__.py rename to prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.metadata.json index 0ccef92e..316aeeef 100644 --- a/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.py b/prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.py similarity index 86% rename from providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.py rename to prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.py index 54d86bbc..9ce3f6f2 100644 --- a/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.py +++ b/prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.eks.eks_client import eks_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.eks.eks_client import eks_client class eks_endpoints_not_publicly_accessible(Check): diff --git a/providers/aws/services/eks/eks_service.py b/prowler/providers/aws/services/eks/eks_service.py similarity index 97% rename from providers/aws/services/eks/eks_service.py rename to prowler/providers/aws/services/eks/eks_service.py index b35b37b8..78079594 100644 --- a/providers/aws/services/eks/eks_service.py +++ b/prowler/providers/aws/services/eks/eks_service.py @@ -2,8 +2,8 @@ import threading from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ EKS diff --git a/providers/aws/services/elb/elb_logging_enabled/__init__.py b/prowler/providers/aws/services/elb/__init__.py similarity index 100% rename from providers/aws/services/elb/elb_logging_enabled/__init__.py rename to prowler/providers/aws/services/elb/__init__.py diff --git a/prowler/providers/aws/services/elb/elb_client.py b/prowler/providers/aws/services/elb/elb_client.py new file mode 100644 index 00000000..25c46956 --- /dev/null +++ b/prowler/providers/aws/services/elb/elb_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.elb.elb_service import ELB + +elb_client = ELB(current_audit_info) diff --git a/providers/aws/services/elb/elb_ssl_listeners/__init__.py b/prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/__init__.py similarity index 100% rename from providers/aws/services/elb/elb_ssl_listeners/__init__.py rename to prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/__init__.py diff --git a/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.metadata.json b/prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.metadata.json similarity index 100% rename from providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.metadata.json rename to prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.metadata.json diff --git a/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.py b/prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.py similarity index 88% rename from providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.py rename to prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.py index 5a27cb06..2d07a5e1 100644 --- a/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.py +++ b/prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elb.elb_client import elb_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elb.elb_client import elb_client class elb_insecure_ssl_ciphers(Check): diff --git a/providers/aws/services/elbv2/__init__.py b/prowler/providers/aws/services/elb/elb_internet_facing/__init__.py similarity index 100% rename from providers/aws/services/elbv2/__init__.py rename to prowler/providers/aws/services/elb/elb_internet_facing/__init__.py diff --git a/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.metadata.json b/prowler/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.metadata.json similarity index 100% rename from providers/aws/services/elb/elb_internet_facing/elb_internet_facing.metadata.json rename to prowler/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.metadata.json diff --git a/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.py b/prowler/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.py similarity index 83% rename from providers/aws/services/elb/elb_internet_facing/elb_internet_facing.py rename to prowler/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.py index 94b06c23..b12c2281 100644 --- a/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.py +++ b/prowler/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elb.elb_client import elb_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elb.elb_client import elb_client class elb_internet_facing(Check): diff --git a/providers/aws/services/elbv2/elbv2_deletion_protection/__init__.py b/prowler/providers/aws/services/elb/elb_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_deletion_protection/__init__.py rename to prowler/providers/aws/services/elb/elb_logging_enabled/__init__.py diff --git a/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.metadata.json b/prowler/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.metadata.json rename to prowler/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.metadata.json index 26f3aec0..8876fc47 100644 --- a/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.py b/prowler/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.py similarity index 83% rename from providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.py rename to prowler/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.py index 9bd698ee..f28bfff6 100644 --- a/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.py +++ b/prowler/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elb.elb_client import elb_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elb.elb_client import elb_client class elb_logging_enabled(Check): diff --git a/providers/aws/services/elb/elb_service.py b/prowler/providers/aws/services/elb/elb_service.py similarity index 96% rename from providers/aws/services/elb/elb_service.py rename to prowler/providers/aws/services/elb/elb_service.py index a2c8231a..0f8b6187 100644 --- a/providers/aws/services/elb/elb_service.py +++ b/prowler/providers/aws/services/elb/elb_service.py @@ -3,8 +3,8 @@ from typing import Optional from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################### ELB diff --git a/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/__init__.py b/prowler/providers/aws/services/elb/elb_ssl_listeners/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_desync_mitigation_mode/__init__.py rename to prowler/providers/aws/services/elb/elb_ssl_listeners/__init__.py diff --git a/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.metadata.json b/prowler/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.metadata.json similarity index 100% rename from providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.metadata.json rename to prowler/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.metadata.json diff --git a/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.py b/prowler/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.py similarity index 85% rename from providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.py rename to prowler/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.py index 6db30978..0f37f187 100644 --- a/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.py +++ b/prowler/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elb.elb_client import elb_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elb.elb_client import elb_client class elb_ssl_listeners(Check): diff --git a/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/__init__.py b/prowler/providers/aws/services/elbv2/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/__init__.py rename to prowler/providers/aws/services/elbv2/__init__.py diff --git a/prowler/providers/aws/services/elbv2/elbv2_client.py b/prowler/providers/aws/services/elbv2/elbv2_client.py new file mode 100644 index 00000000..4b4cfe6e --- /dev/null +++ b/prowler/providers/aws/services/elbv2/elbv2_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 + +elbv2_client = ELBv2(current_audit_info) diff --git a/providers/aws/services/elbv2/elbv2_internet_facing/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_deletion_protection/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_internet_facing/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_deletion_protection/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.py b/prowler/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.py similarity index 84% rename from providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.py rename to prowler/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.py index 9d16c649..5c02e272 100644 --- a/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.py +++ b/prowler/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_deletion_protection(Check): diff --git a/providers/aws/services/elbv2/elbv2_listeners_underneath/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_listeners_underneath/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.py b/prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.py similarity index 86% rename from providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.py rename to prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.py index 77878e81..576bb707 100644 --- a/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.py +++ b/prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_desync_mitigation_mode(Check): diff --git a/providers/aws/services/elbv2/elbv2_logging_enabled/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_logging_enabled/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py b/prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py similarity index 91% rename from providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py rename to prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py index fcd47cab..61634ae2 100644 --- a/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py +++ b/prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_insecure_ssl_ciphers(Check): diff --git a/providers/aws/services/elbv2/elbv2_request_smugling/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_internet_facing/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_request_smugling/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_internet_facing/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.metadata.json similarity index 99% rename from providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.metadata.json index 592957cc..11921f8d 100644 --- a/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.metadata.json +++ b/prowler/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.py b/prowler/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.py similarity index 84% rename from providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.py rename to prowler/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.py index 807116b1..e2013439 100644 --- a/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.py +++ b/prowler/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_internet_facing(Check): diff --git a/providers/aws/services/elbv2/elbv2_ssl_listeners/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_ssl_listeners/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.py b/prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.py similarity index 83% rename from providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.py rename to prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.py index e753fac5..f560f9ee 100644 --- a/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.py +++ b/prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_listeners_underneath(Check): diff --git a/providers/aws/services/elbv2/elbv2_waf_acl_attached/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_waf_acl_attached/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_logging_enabled/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.py b/prowler/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.py similarity index 84% rename from providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.py rename to prowler/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.py index 4dd0abfa..4293ce62 100644 --- a/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.py +++ b/prowler/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_logging_enabled(Check): diff --git a/providers/aws/services/emr/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_request_smugling/__init__.py similarity index 100% rename from providers/aws/services/emr/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_request_smugling/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.py b/prowler/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.py similarity index 86% rename from providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.py rename to prowler/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.py index 75e2b8e8..8552fdaf 100644 --- a/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.py +++ b/prowler/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_request_smugling(Check): diff --git a/providers/aws/services/elbv2/elbv2_service.py b/prowler/providers/aws/services/elbv2/elbv2_service.py similarity index 98% rename from providers/aws/services/elbv2/elbv2_service.py rename to prowler/providers/aws/services/elbv2/elbv2_service.py index ddb01d87..f432de06 100644 --- a/providers/aws/services/elbv2/elbv2_service.py +++ b/prowler/providers/aws/services/elbv2/elbv2_service.py @@ -3,8 +3,8 @@ from typing import Optional from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################### ELBv2 diff --git a/providers/aws/services/emr/emr_cluster_account_public_block_enabled/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/__init__.py similarity index 100% rename from providers/aws/services/emr/emr_cluster_account_public_block_enabled/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.py b/prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.py similarity index 91% rename from providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.py rename to prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.py index 4b8b83fb..60b7d7b5 100644 --- a/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.py +++ b/prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_ssl_listeners(Check): diff --git a/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/__init__.py similarity index 100% rename from providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.py b/prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.py similarity index 80% rename from providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.py rename to prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.py index b596f1d4..ace3efb1 100644 --- a/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.py +++ b/prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.py @@ -1,7 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client -from providers.aws.services.waf.waf_client import waf_client -from providers.aws.services.wafv2.wafv2_client import wafv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.providers.aws.services.waf.waf_client import waf_client +from prowler.providers.aws.services.wafv2.wafv2_client import wafv2_client class elbv2_waf_acl_attached(Check): diff --git a/providers/aws/services/emr/emr_cluster_publicly_accesible/__init__.py b/prowler/providers/aws/services/emr/__init__.py similarity index 100% rename from providers/aws/services/emr/emr_cluster_publicly_accesible/__init__.py rename to prowler/providers/aws/services/emr/__init__.py diff --git a/prowler/providers/aws/services/emr/emr_client.py b/prowler/providers/aws/services/emr/emr_client.py new file mode 100644 index 00000000..ce022fee --- /dev/null +++ b/prowler/providers/aws/services/emr/emr_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.emr.emr_service import EMR + +emr_client = EMR(current_audit_info) diff --git a/providers/aws/services/glacier/__init__.py b/prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/__init__.py similarity index 100% rename from providers/aws/services/glacier/__init__.py rename to prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/__init__.py diff --git a/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.metadata.json b/prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.metadata.json similarity index 100% rename from providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.metadata.json rename to prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.metadata.json diff --git a/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.py b/prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.py similarity index 86% rename from providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.py rename to prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.py index 01a216d2..33a94a09 100644 --- a/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.py +++ b/prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.emr.emr_client import emr_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.emr.emr_client import emr_client class emr_cluster_account_public_block_enabled(Check): diff --git a/providers/aws/services/glacier/glacier_vaults_policy_public_access/__init__.py b/prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/__init__.py similarity index 100% rename from providers/aws/services/glacier/glacier_vaults_policy_public_access/__init__.py rename to prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/__init__.py diff --git a/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.metadata.json b/prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.metadata.json similarity index 100% rename from providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.metadata.json rename to prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.metadata.json diff --git a/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.py b/prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.py similarity index 82% rename from providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.py rename to prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.py index b4df38c0..db02f10e 100644 --- a/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.py +++ b/prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.emr.emr_client import emr_client -from providers.aws.services.emr.emr_service import ClusterStatus +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.emr.emr_client import emr_client +from prowler.providers.aws.services.emr.emr_service import ClusterStatus class emr_cluster_master_nodes_no_public_ip(Check): diff --git a/providers/aws/services/globalaccelerator/__init__.py b/prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/__init__.py similarity index 100% rename from providers/aws/services/globalaccelerator/__init__.py rename to prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/__init__.py diff --git a/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.metadata.json b/prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.metadata.json similarity index 100% rename from providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.metadata.json rename to prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.metadata.json diff --git a/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.py b/prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.py similarity index 91% rename from providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.py rename to prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.py index a2673541..6a7d2e06 100644 --- a/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.py +++ b/prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.py @@ -1,10 +1,10 @@ from copy import deepcopy -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group -from providers.aws.services.emr.emr_client import emr_client -from providers.aws.services.emr.emr_service import ClusterStatus +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.providers.aws.services.emr.emr_client import emr_client +from prowler.providers.aws.services.emr.emr_service import ClusterStatus class emr_cluster_publicly_accesible(Check): diff --git a/providers/aws/services/emr/emr_service.py b/prowler/providers/aws/services/emr/emr_service.py similarity index 98% rename from providers/aws/services/emr/emr_service.py rename to prowler/providers/aws/services/emr/emr_service.py index a92f42b3..6826a04f 100644 --- a/providers/aws/services/emr/emr_service.py +++ b/prowler/providers/aws/services/emr/emr_service.py @@ -3,8 +3,8 @@ from enum import Enum from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## EMR diff --git a/providers/aws/services/glue/__init__.py b/prowler/providers/aws/services/glacier/__init__.py similarity index 100% rename from providers/aws/services/glue/__init__.py rename to prowler/providers/aws/services/glacier/__init__.py diff --git a/prowler/providers/aws/services/glacier/glacier_client.py b/prowler/providers/aws/services/glacier/glacier_client.py new file mode 100644 index 00000000..a099cd9c --- /dev/null +++ b/prowler/providers/aws/services/glacier/glacier_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.glacier.glacier_service import Glacier + +glacier_client = Glacier(current_audit_info) diff --git a/providers/aws/services/glacier/glacier_service.py b/prowler/providers/aws/services/glacier/glacier_service.py similarity index 95% rename from providers/aws/services/glacier/glacier_service.py rename to prowler/providers/aws/services/glacier/glacier_service.py index e2726150..4e592c89 100644 --- a/providers/aws/services/glacier/glacier_service.py +++ b/prowler/providers/aws/services/glacier/glacier_service.py @@ -3,8 +3,8 @@ import threading from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## Glacier diff --git a/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/__init__.py b/prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/__init__.py rename to prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/__init__.py diff --git a/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.metadata.json b/prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.metadata.json similarity index 100% rename from providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.metadata.json rename to prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.metadata.json diff --git a/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.py b/prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.py similarity index 92% rename from providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.py rename to prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.py index 62d67f79..a9137100 100644 --- a/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.py +++ b/prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.py @@ -1,7 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glacier.glacier_client import ( - glacier_client, -) +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glacier.glacier_client import glacier_client class glacier_vaults_policy_public_access(Check): diff --git a/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/__init__.py b/prowler/providers/aws/services/globalaccelerator/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/__init__.py rename to prowler/providers/aws/services/globalaccelerator/__init__.py diff --git a/prowler/providers/aws/services/globalaccelerator/globalaccelerator_client.py b/prowler/providers/aws/services/globalaccelerator/globalaccelerator_client.py new file mode 100644 index 00000000..58991d16 --- /dev/null +++ b/prowler/providers/aws/services/globalaccelerator/globalaccelerator_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.globalaccelerator.globalaccelerator_service import ( + GlobalAccelerator, +) + +globalaccelerator_client = GlobalAccelerator(current_audit_info) diff --git a/providers/aws/services/globalaccelerator/globalaccelerator_service.py b/prowler/providers/aws/services/globalaccelerator/globalaccelerator_service.py similarity index 97% rename from providers/aws/services/globalaccelerator/globalaccelerator_service.py rename to prowler/providers/aws/services/globalaccelerator/globalaccelerator_service.py index 47a2d9f9..b0526b8e 100644 --- a/providers/aws/services/globalaccelerator/globalaccelerator_service.py +++ b/prowler/providers/aws/services/globalaccelerator/globalaccelerator_service.py @@ -1,6 +1,6 @@ from pydantic import BaseModel -from lib.logger import logger +from prowler.lib.logger import logger ################### GlobalAccelerator diff --git a/providers/aws/services/glue/glue_database_connections_ssl_enabled/__init__.py b/prowler/providers/aws/services/glue/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_database_connections_ssl_enabled/__init__.py rename to prowler/providers/aws/services/glue/__init__.py diff --git a/prowler/providers/aws/services/glue/glue_client.py b/prowler/providers/aws/services/glue/glue_client.py new file mode 100644 index 00000000..4647967f --- /dev/null +++ b/prowler/providers/aws/services/glue/glue_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.glue.glue_service import Glue + +glue_client = Glue(current_audit_info) diff --git a/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/__init__.py b/prowler/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/__init__.py rename to prowler/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.py similarity index 85% rename from providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.py index 0a7e20d8..9c6f31ea 100644 --- a/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_data_catalogs_connection_passwords_encryption_enabled(Check): diff --git a/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/__init__.py b/prowler/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/__init__.py rename to prowler/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.py similarity index 85% rename from providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.py index 78c44424..9ea333d4 100644 --- a/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_data_catalogs_metadata_encryption_enabled(Check): diff --git a/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/__init__.py b/prowler/providers/aws/services/glue/glue_database_connections_ssl_enabled/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/__init__.py rename to prowler/providers/aws/services/glue/glue_database_connections_ssl_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.py b/prowler/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.py similarity index 85% rename from providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.py rename to prowler/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.py index ad98fce4..0c343c77 100644 --- a/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.py +++ b/prowler/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_database_connections_ssl_enabled(Check): diff --git a/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/__init__.py b/prowler/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/__init__.py rename to prowler/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.py similarity index 90% rename from providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.py index 9b8fa09d..ee70bf4c 100644 --- a/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_development_endpoints_cloudwatch_logs_encryption_enabled(Check): diff --git a/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/__init__.py b/prowler/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/__init__.py rename to prowler/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.py similarity index 90% rename from providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.py index eb7cc997..827d549e 100644 --- a/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_development_endpoints_job_bookmark_encryption_enabled(Check): diff --git a/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/__init__.py b/prowler/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/__init__.py rename to prowler/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.py similarity index 90% rename from providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.py index 06464695..470219cf 100644 --- a/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_development_endpoints_s3_encryption_enabled(Check): diff --git a/providers/aws/services/guardduty/__init__.py b/prowler/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/guardduty/__init__.py rename to prowler/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.py similarity index 92% rename from providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.py index 002d9bda..0712a0dc 100644 --- a/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_etl_jobs_amazon_s3_encryption_enabled(Check): diff --git a/providers/aws/services/guardduty/guardduty_is_enabled/__init__.py b/prowler/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/guardduty/guardduty_is_enabled/__init__.py rename to prowler/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.py similarity index 89% rename from providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.py index d1271073..1807aa5a 100644 --- a/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_etl_jobs_cloudwatch_logs_encryption_enabled(Check): diff --git a/providers/aws/services/guardduty/guardduty_no_high_severity_findings/__init__.py b/prowler/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/guardduty/guardduty_no_high_severity_findings/__init__.py rename to prowler/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.py similarity index 89% rename from providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.py index c1d6ef88..24a7c916 100644 --- a/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_etl_jobs_job_bookmark_encryption_enabled(Check): diff --git a/providers/aws/services/glue/glue_service.py b/prowler/providers/aws/services/glue/glue_service.py similarity index 98% rename from providers/aws/services/glue/glue_service.py rename to prowler/providers/aws/services/glue/glue_service.py index 6efb53a5..c19833c6 100644 --- a/providers/aws/services/glue/glue_service.py +++ b/prowler/providers/aws/services/glue/glue_service.py @@ -3,8 +3,8 @@ from typing import Optional from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## Glue diff --git a/providers/aws/services/iam/__init__.py b/prowler/providers/aws/services/guardduty/__init__.py similarity index 100% rename from providers/aws/services/iam/__init__.py rename to prowler/providers/aws/services/guardduty/__init__.py diff --git a/prowler/providers/aws/services/guardduty/guardduty_client.py b/prowler/providers/aws/services/guardduty/guardduty_client.py new file mode 100644 index 00000000..74320efc --- /dev/null +++ b/prowler/providers/aws/services/guardduty/guardduty_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.guardduty.guardduty_service import GuardDuty + +guardduty_client = GuardDuty(current_audit_info) diff --git a/providers/aws/services/iam/iam_administrator_access_with_mfa/__init__.py b/prowler/providers/aws/services/guardduty/guardduty_is_enabled/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_administrator_access_with_mfa/__init__.py rename to prowler/providers/aws/services/guardduty/guardduty_is_enabled/__init__.py diff --git a/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.metadata.json b/prowler/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.metadata.json similarity index 99% rename from providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.metadata.json rename to prowler/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.metadata.json index 4e066951..e467c27f 100644 --- a/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.metadata.json +++ b/prowler/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.py b/prowler/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.py similarity index 86% rename from providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.py rename to prowler/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.py index c6cfa3c4..e6d3715e 100644 --- a/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.py +++ b/prowler/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.guardduty.guardduty_client import guardduty_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.guardduty.guardduty_client import guardduty_client class guardduty_is_enabled(Check): diff --git a/providers/aws/services/iam/iam_avoid_root_usage/__init__.py b/prowler/providers/aws/services/guardduty/guardduty_no_high_severity_findings/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_avoid_root_usage/__init__.py rename to prowler/providers/aws/services/guardduty/guardduty_no_high_severity_findings/__init__.py diff --git a/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.metadata.json b/prowler/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.metadata.json similarity index 100% rename from providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.metadata.json rename to prowler/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.metadata.json diff --git a/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.py b/prowler/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.py similarity index 84% rename from providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.py rename to prowler/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.py index 9d321adf..4f71aa3d 100644 --- a/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.py +++ b/prowler/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.guardduty.guardduty_client import guardduty_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.guardduty.guardduty_client import guardduty_client class guardduty_no_high_severity_findings(Check): diff --git a/providers/aws/services/guardduty/guardduty_service.py b/prowler/providers/aws/services/guardduty/guardduty_service.py similarity index 97% rename from providers/aws/services/guardduty/guardduty_service.py rename to prowler/providers/aws/services/guardduty/guardduty_service.py index 0516e178..74151d94 100644 --- a/providers/aws/services/guardduty/guardduty_service.py +++ b/prowler/providers/aws/services/guardduty/guardduty_service.py @@ -2,8 +2,8 @@ import threading from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ GuardDuty diff --git a/providers/aws/services/iam/iam_check_saml_providers_sts/__init__.py b/prowler/providers/aws/services/iam/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_check_saml_providers_sts/__init__.py rename to prowler/providers/aws/services/iam/__init__.py diff --git a/providers/aws/services/iam/iam_disable_30_days_credentials/__init__.py b/prowler/providers/aws/services/iam/iam_administrator_access_with_mfa/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_disable_30_days_credentials/__init__.py rename to prowler/providers/aws/services/iam/iam_administrator_access_with_mfa/__init__.py diff --git a/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.metadata.json b/prowler/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.metadata.json rename to prowler/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.metadata.json diff --git a/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.py b/prowler/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.py similarity index 93% rename from providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.py rename to prowler/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.py index bd1e16e4..5b962c36 100644 --- a/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.py +++ b/prowler/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_administrator_access_with_mfa(Check): diff --git a/providers/aws/services/iam/iam_disable_45_days_credentials/__init__.py b/prowler/providers/aws/services/iam/iam_avoid_root_usage/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_disable_45_days_credentials/__init__.py rename to prowler/providers/aws/services/iam/iam_avoid_root_usage/__init__.py diff --git a/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.metadata.json b/prowler/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.metadata.json rename to prowler/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.metadata.json diff --git a/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.py b/prowler/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.py similarity index 95% rename from providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.py rename to prowler/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.py index 3a7c0721..867fc178 100644 --- a/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.py +++ b/prowler/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.py @@ -1,7 +1,7 @@ import datetime -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client maximum_access_days = 1 diff --git a/providers/aws/services/iam/iam_disable_90_days_credentials/__init__.py b/prowler/providers/aws/services/iam/iam_check_saml_providers_sts/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_disable_90_days_credentials/__init__.py rename to prowler/providers/aws/services/iam/iam_check_saml_providers_sts/__init__.py diff --git a/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.metadata.json b/prowler/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.metadata.json rename to prowler/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.metadata.json diff --git a/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.py b/prowler/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.py similarity index 82% rename from providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.py rename to prowler/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.py index 5872273a..a88abb93 100644 --- a/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.py +++ b/prowler/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_check_saml_providers_sts(Check): diff --git a/prowler/providers/aws/services/iam/iam_client.py b/prowler/providers/aws/services/iam/iam_client.py new file mode 100644 index 00000000..2e855bb2 --- /dev/null +++ b/prowler/providers/aws/services/iam/iam_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.iam.iam_service import IAM + +iam_client = IAM(current_audit_info) diff --git a/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/__init__.py b/prowler/providers/aws/services/iam/iam_disable_30_days_credentials/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/__init__.py rename to prowler/providers/aws/services/iam/iam_disable_30_days_credentials/__init__.py diff --git a/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.metadata.json b/prowler/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.metadata.json rename to prowler/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.metadata.json diff --git a/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.py b/prowler/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.py similarity index 91% rename from providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.py rename to prowler/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.py index 3d73dfba..3b79accb 100644 --- a/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.py +++ b/prowler/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.py @@ -1,7 +1,7 @@ import datetime -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client maximum_expiration_days = 30 diff --git a/providers/aws/services/iam/iam_no_expired_server_certificates_stored/__init__.py b/prowler/providers/aws/services/iam/iam_disable_45_days_credentials/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_no_expired_server_certificates_stored/__init__.py rename to prowler/providers/aws/services/iam/iam_disable_45_days_credentials/__init__.py diff --git a/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.metadata.json b/prowler/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.metadata.json rename to prowler/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.metadata.json diff --git a/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.py b/prowler/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.py similarity index 91% rename from providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.py rename to prowler/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.py index 43944ce8..02c1a222 100644 --- a/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.py +++ b/prowler/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.py @@ -1,7 +1,7 @@ import datetime -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client maximum_expiration_days = 45 diff --git a/providers/aws/services/iam/iam_no_root_access_key/__init__.py b/prowler/providers/aws/services/iam/iam_disable_90_days_credentials/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_no_root_access_key/__init__.py rename to prowler/providers/aws/services/iam/iam_disable_90_days_credentials/__init__.py diff --git a/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.metadata.json b/prowler/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.metadata.json rename to prowler/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.metadata.json diff --git a/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.py b/prowler/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.py similarity index 91% rename from providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.py rename to prowler/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.py index 85512650..cf601a8d 100644 --- a/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.py +++ b/prowler/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.py @@ -1,7 +1,7 @@ import datetime -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client maximum_expiration_days = 90 diff --git a/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/__init__.py b/prowler/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/__init__.py rename to prowler/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/__init__.py diff --git a/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.metadata.json b/prowler/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.metadata.json rename to prowler/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.metadata.json diff --git a/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.py b/prowler/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.py similarity index 91% rename from providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.py rename to prowler/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.py index c15e3f2f..bf21e2ad 100644 --- a/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.py +++ b/prowler/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_no_custom_policy_permissive_role_assumption(Check): diff --git a/providers/aws/services/iam/iam_password_policy_lowercase/__init__.py b/prowler/providers/aws/services/iam/iam_no_expired_server_certificates_stored/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_password_policy_lowercase/__init__.py rename to prowler/providers/aws/services/iam/iam_no_expired_server_certificates_stored/__init__.py diff --git a/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.metadata.json b/prowler/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.metadata.json rename to prowler/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.metadata.json diff --git a/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.py b/prowler/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.py similarity index 88% rename from providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.py rename to prowler/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.py index 71e1fdff..56e9925b 100644 --- a/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.py +++ b/prowler/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.py @@ -1,7 +1,7 @@ from datetime import datetime, timezone -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_no_expired_server_certificates_stored(Check): diff --git a/providers/aws/services/iam/iam_password_policy_minimum_length_14/__init__.py b/prowler/providers/aws/services/iam/iam_no_root_access_key/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_password_policy_minimum_length_14/__init__.py rename to prowler/providers/aws/services/iam/iam_no_root_access_key/__init__.py diff --git a/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.metadata.json b/prowler/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.metadata.json rename to prowler/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.metadata.json diff --git a/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.py b/prowler/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.py similarity index 91% rename from providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.py rename to prowler/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.py index 8184d1d3..3e4328a9 100644 --- a/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.py +++ b/prowler/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_no_root_access_key(Check): diff --git a/providers/aws/services/iam/iam_password_policy_number/__init__.py b/prowler/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_password_policy_number/__init__.py rename to prowler/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/__init__.py diff --git a/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.metadata.json b/prowler/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.metadata.json rename to prowler/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.metadata.json diff --git a/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.py b/prowler/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.py similarity index 90% rename from providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.py rename to prowler/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.py index 51710d0d..0d8290da 100644 --- a/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.py +++ b/prowler/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_password_policy_expires_passwords_within_90_days_or_less(Check): diff --git a/providers/aws/services/iam/iam_password_policy_reuse_24/__init__.py b/prowler/providers/aws/services/iam/iam_password_policy_lowercase/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_password_policy_reuse_24/__init__.py rename to prowler/providers/aws/services/iam/iam_password_policy_lowercase/__init__.py diff --git a/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.metadata.json b/prowler/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.metadata.json rename to prowler/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.metadata.json diff --git a/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.py b/prowler/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.py similarity index 88% rename from providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.py rename to prowler/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.py index 9ffa8001..3760176b 100644 --- a/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.py +++ b/prowler/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_password_policy_lowercase(Check): diff --git a/providers/aws/services/iam/iam_password_policy_symbol/__init__.py b/prowler/providers/aws/services/iam/iam_password_policy_minimum_length_14/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_password_policy_symbol/__init__.py rename to prowler/providers/aws/services/iam/iam_password_policy_minimum_length_14/__init__.py diff --git a/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.metadata.json b/prowler/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.metadata.json rename to prowler/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.metadata.json diff --git a/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.py b/prowler/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.py similarity index 89% rename from providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.py rename to prowler/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.py index 11628b5e..1ce11954 100644 --- a/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.py +++ b/prowler/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_password_policy_minimum_length_14(Check): diff --git a/providers/aws/services/iam/iam_password_policy_uppercase/__init__.py b/prowler/providers/aws/services/iam/iam_password_policy_number/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_password_policy_uppercase/__init__.py rename to prowler/providers/aws/services/iam/iam_password_policy_number/__init__.py diff --git a/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.metadata.json b/prowler/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.metadata.json rename to prowler/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.metadata.json diff --git a/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.py b/prowler/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.py similarity index 88% rename from providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.py rename to prowler/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.py index 758a17a3..5ccea158 100644 --- a/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.py +++ b/prowler/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_password_policy_number(Check): diff --git a/providers/aws/services/iam/iam_policy_allows_privilege_escalation/__init__.py b/prowler/providers/aws/services/iam/iam_password_policy_reuse_24/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_policy_allows_privilege_escalation/__init__.py rename to prowler/providers/aws/services/iam/iam_password_policy_reuse_24/__init__.py diff --git a/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.metadata.json b/prowler/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.metadata.json rename to prowler/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.metadata.json diff --git a/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.py b/prowler/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.py similarity index 89% rename from providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.py rename to prowler/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.py index a3c535e5..10efbb23 100644 --- a/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.py +++ b/prowler/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_password_policy_reuse_24(Check): diff --git a/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/__init__.py b/prowler/providers/aws/services/iam/iam_password_policy_symbol/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/__init__.py rename to prowler/providers/aws/services/iam/iam_password_policy_symbol/__init__.py diff --git a/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.metadata.json b/prowler/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.metadata.json rename to prowler/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.metadata.json diff --git a/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.py b/prowler/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.py similarity index 88% rename from providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.py rename to prowler/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.py index 5b15b6ea..265daa45 100644 --- a/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.py +++ b/prowler/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_password_policy_symbol(Check): diff --git a/providers/aws/services/iam/iam_policy_no_administrative_privileges/__init__.py b/prowler/providers/aws/services/iam/iam_password_policy_uppercase/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_policy_no_administrative_privileges/__init__.py rename to prowler/providers/aws/services/iam/iam_password_policy_uppercase/__init__.py diff --git a/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.metadata.json b/prowler/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.metadata.json rename to prowler/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.metadata.json diff --git a/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.py b/prowler/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.py similarity index 88% rename from providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.py rename to prowler/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.py index 08903c69..c5c9c93e 100644 --- a/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.py +++ b/prowler/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_password_policy_uppercase(Check): diff --git a/providers/aws/services/iam/iam_root_hardware_mfa_enabled/__init__.py b/prowler/providers/aws/services/iam/iam_policy_allows_privilege_escalation/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_root_hardware_mfa_enabled/__init__.py rename to prowler/providers/aws/services/iam/iam_policy_allows_privilege_escalation/__init__.py diff --git a/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.metadata.json b/prowler/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.metadata.json rename to prowler/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.metadata.json diff --git a/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.py b/prowler/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.py similarity index 97% rename from providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.py rename to prowler/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.py index 95f96e00..fb2debae 100644 --- a/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.py +++ b/prowler/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client # Does the tool analyze both users and roles, or just one or the other? --> Everything using AttachementCount. # Does the tool take a principal-centric or policy-centric approach? --> Policy-centric approach. diff --git a/providers/aws/services/iam/iam_root_mfa_enabled/__init__.py b/prowler/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_root_mfa_enabled/__init__.py rename to prowler/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/__init__.py diff --git a/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.metadata.json b/prowler/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.metadata.json rename to prowler/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.metadata.json diff --git a/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.py b/prowler/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.py similarity index 93% rename from providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.py rename to prowler/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.py index 8373a072..89918256 100644 --- a/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.py +++ b/prowler/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_policy_attached_only_to_group_or_roles(Check): diff --git a/providers/aws/services/iam/iam_rotate_access_key_90_days/__init__.py b/prowler/providers/aws/services/iam/iam_policy_no_administrative_privileges/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_rotate_access_key_90_days/__init__.py rename to prowler/providers/aws/services/iam/iam_policy_no_administrative_privileges/__init__.py diff --git a/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.metadata.json b/prowler/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.metadata.json rename to prowler/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.metadata.json diff --git a/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.py b/prowler/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.py similarity index 90% rename from providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.py rename to prowler/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.py index 70947abf..c00f57d0 100644 --- a/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.py +++ b/prowler/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_policy_no_administrative_privileges(Check): diff --git a/providers/aws/services/iam/iam_support_role_created/__init__.py b/prowler/providers/aws/services/iam/iam_root_hardware_mfa_enabled/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_support_role_created/__init__.py rename to prowler/providers/aws/services/iam/iam_root_hardware_mfa_enabled/__init__.py diff --git a/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.metadata.json b/prowler/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.metadata.json rename to prowler/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.metadata.json diff --git a/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.py b/prowler/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.py similarity index 89% rename from providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.py rename to prowler/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.py index f2a941eb..1ac81c77 100644 --- a/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.py +++ b/prowler/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_root_hardware_mfa_enabled(Check): diff --git a/providers/aws/services/iam/iam_user_hardware_mfa_enabled/__init__.py b/prowler/providers/aws/services/iam/iam_root_mfa_enabled/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_user_hardware_mfa_enabled/__init__.py rename to prowler/providers/aws/services/iam/iam_root_mfa_enabled/__init__.py diff --git a/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.metadata.json b/prowler/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.metadata.json rename to prowler/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.metadata.json diff --git a/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.py b/prowler/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.py similarity index 86% rename from providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.py rename to prowler/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.py index c67716ca..84eff47e 100644 --- a/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.py +++ b/prowler/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_root_mfa_enabled(Check): diff --git a/providers/aws/services/iam/iam_user_mfa_enabled_console_access/__init__.py b/prowler/providers/aws/services/iam/iam_rotate_access_key_90_days/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_user_mfa_enabled_console_access/__init__.py rename to prowler/providers/aws/services/iam/iam_rotate_access_key_90_days/__init__.py diff --git a/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.metadata.json b/prowler/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.metadata.json rename to prowler/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.metadata.json diff --git a/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.py b/prowler/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.py similarity index 95% rename from providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.py rename to prowler/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.py index 6fce660b..d1dcfceb 100644 --- a/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.py +++ b/prowler/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.py @@ -1,7 +1,7 @@ import datetime -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client maximum_expiration_days = 90 diff --git a/providers/aws/services/iam/iam_service.py b/prowler/providers/aws/services/iam/iam_service.py similarity index 99% rename from providers/aws/services/iam/iam_service.py rename to prowler/providers/aws/services/iam/iam_service.py index 784ea2d4..fd4647a0 100644 --- a/providers/aws/services/iam/iam_service.py +++ b/prowler/providers/aws/services/iam/iam_service.py @@ -2,8 +2,8 @@ import csv from dataclasses import dataclass from datetime import datetime -from lib.logger import logger -from providers.aws.aws_provider import get_region_global_service +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import get_region_global_service ################## IAM diff --git a/providers/aws/services/iam/iam_user_no_setup_initial_access_key/__init__.py b/prowler/providers/aws/services/iam/iam_support_role_created/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_user_no_setup_initial_access_key/__init__.py rename to prowler/providers/aws/services/iam/iam_support_role_created/__init__.py diff --git a/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.metadata.json b/prowler/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_support_role_created/iam_support_role_created.metadata.json rename to prowler/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.metadata.json diff --git a/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.py b/prowler/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.py similarity index 86% rename from providers/aws/services/iam/iam_support_role_created/iam_support_role_created.py rename to prowler/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.py index cea98f28..14d20706 100644 --- a/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.py +++ b/prowler/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_support_role_created(Check): diff --git a/providers/aws/services/iam/iam_user_two_active_access_key/__init__.py b/prowler/providers/aws/services/iam/iam_user_hardware_mfa_enabled/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_user_two_active_access_key/__init__.py rename to prowler/providers/aws/services/iam/iam_user_hardware_mfa_enabled/__init__.py diff --git a/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.metadata.json b/prowler/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.metadata.json rename to prowler/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.metadata.json diff --git a/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.py b/prowler/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.py similarity index 90% rename from providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.py rename to prowler/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.py index a4c23b14..a65f0671 100644 --- a/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.py +++ b/prowler/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_user_hardware_mfa_enabled(Check): diff --git a/providers/aws/services/kms/__init__.py b/prowler/providers/aws/services/iam/iam_user_mfa_enabled_console_access/__init__.py similarity index 100% rename from providers/aws/services/kms/__init__.py rename to prowler/providers/aws/services/iam/iam_user_mfa_enabled_console_access/__init__.py diff --git a/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.metadata.json b/prowler/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.metadata.json rename to prowler/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.metadata.json diff --git a/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.py b/prowler/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.py similarity index 89% rename from providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.py rename to prowler/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.py index ef4f15ad..1bc7a476 100644 --- a/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.py +++ b/prowler/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_user_mfa_enabled_console_access(Check): diff --git a/providers/aws/services/kms/kms_cmk_are_used/__init__.py b/prowler/providers/aws/services/iam/iam_user_no_setup_initial_access_key/__init__.py similarity index 100% rename from providers/aws/services/kms/kms_cmk_are_used/__init__.py rename to prowler/providers/aws/services/iam/iam_user_no_setup_initial_access_key/__init__.py diff --git a/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.metadata.json b/prowler/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.metadata.json rename to prowler/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.metadata.json diff --git a/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.py b/prowler/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.py similarity index 95% rename from providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.py rename to prowler/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.py index 4737b660..ca7ad262 100644 --- a/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.py +++ b/prowler/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_user_no_setup_initial_access_key(Check): diff --git a/providers/aws/services/kms/kms_cmk_rotation_enabled/__init__.py b/prowler/providers/aws/services/iam/iam_user_two_active_access_key/__init__.py similarity index 100% rename from providers/aws/services/kms/kms_cmk_rotation_enabled/__init__.py rename to prowler/providers/aws/services/iam/iam_user_two_active_access_key/__init__.py diff --git a/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.metadata.json b/prowler/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.metadata.json rename to prowler/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.metadata.json diff --git a/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.py b/prowler/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.py similarity index 87% rename from providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.py rename to prowler/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.py index 36ed3f7e..54d39f77 100644 --- a/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.py +++ b/prowler/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from lib.logger import logger -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.lib.logger import logger +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_user_two_active_access_key(Check): diff --git a/providers/aws/services/kms/kms_key_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/kms/__init__.py similarity index 100% rename from providers/aws/services/kms/kms_key_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/kms/__init__.py diff --git a/prowler/providers/aws/services/kms/kms_client.py b/prowler/providers/aws/services/kms/kms_client.py new file mode 100644 index 00000000..4d65227a --- /dev/null +++ b/prowler/providers/aws/services/kms/kms_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.kms.kms_service import KMS + +kms_client = KMS(current_audit_info) diff --git a/providers/aws/services/macie/__init__.py b/prowler/providers/aws/services/kms/kms_cmk_are_used/__init__.py similarity index 100% rename from providers/aws/services/macie/__init__.py rename to prowler/providers/aws/services/kms/kms_cmk_are_used/__init__.py diff --git a/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.metadata.json b/prowler/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.metadata.json similarity index 100% rename from providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.metadata.json rename to prowler/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.metadata.json diff --git a/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.py b/prowler/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.py similarity index 88% rename from providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.py rename to prowler/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.py index 60240727..4ef3a165 100644 --- a/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.py +++ b/prowler/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.kms.kms_client import kms_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.kms.kms_client import kms_client class kms_cmk_are_used(Check): diff --git a/providers/aws/services/macie/macie_is_enabled/__init__.py b/prowler/providers/aws/services/kms/kms_cmk_rotation_enabled/__init__.py similarity index 100% rename from providers/aws/services/macie/macie_is_enabled/__init__.py rename to prowler/providers/aws/services/kms/kms_cmk_rotation_enabled/__init__.py diff --git a/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.metadata.json b/prowler/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.metadata.json similarity index 100% rename from providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.metadata.json rename to prowler/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.metadata.json diff --git a/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.py b/prowler/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.py similarity index 89% rename from providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.py rename to prowler/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.py index 8b9138a4..c7577c38 100644 --- a/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.py +++ b/prowler/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.kms.kms_client import kms_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.kms.kms_client import kms_client class kms_cmk_rotation_enabled(Check): diff --git a/providers/aws/services/opensearch/__init__.py b/prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/opensearch/__init__.py rename to prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.metadata.json index a7748a3e..e9d26fc9 100644 --- a/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.py b/prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.py similarity index 93% rename from providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.py rename to prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.py index 96a65ed5..13337a8e 100644 --- a/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.py +++ b/prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.kms.kms_client import kms_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.kms.kms_client import kms_client class kms_key_not_publicly_accessible(Check): diff --git a/providers/aws/services/kms/kms_service.py b/prowler/providers/aws/services/kms/kms_service.py similarity index 97% rename from providers/aws/services/kms/kms_service.py rename to prowler/providers/aws/services/kms/kms_service.py index 42ed75ae..39f03a08 100644 --- a/providers/aws/services/kms/kms_service.py +++ b/prowler/providers/aws/services/kms/kms_service.py @@ -2,8 +2,8 @@ import json import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## KMS diff --git a/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/__init__.py b/prowler/providers/aws/services/macie/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/__init__.py rename to prowler/providers/aws/services/macie/__init__.py diff --git a/prowler/providers/aws/services/macie/macie_client.py b/prowler/providers/aws/services/macie/macie_client.py new file mode 100644 index 00000000..d1cd34a0 --- /dev/null +++ b/prowler/providers/aws/services/macie/macie_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.macie.macie_service import Macie + +macie_client = Macie(current_audit_info) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/__init__.py b/prowler/providers/aws/services/macie/macie_is_enabled/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/__init__.py rename to prowler/providers/aws/services/macie/macie_is_enabled/__init__.py diff --git a/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.metadata.json b/prowler/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.metadata.json similarity index 99% rename from providers/aws/services/macie/macie_is_enabled/macie_is_enabled.metadata.json rename to prowler/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.metadata.json index e50956bd..5b03e680 100644 --- a/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.metadata.json +++ b/prowler/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.py b/prowler/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.py similarity index 85% rename from providers/aws/services/macie/macie_is_enabled/macie_is_enabled.py rename to prowler/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.py index f620f708..91b3d6e1 100644 --- a/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.py +++ b/prowler/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.macie.macie_client import macie_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.macie.macie_client import macie_client class macie_is_enabled(Check): diff --git a/providers/aws/services/macie/macie_service.py b/prowler/providers/aws/services/macie/macie_service.py similarity index 94% rename from providers/aws/services/macie/macie_service.py rename to prowler/providers/aws/services/macie/macie_service.py index 8eb595d7..4cbc8b27 100644 --- a/providers/aws/services/macie/macie_service.py +++ b/prowler/providers/aws/services/macie/macie_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## Macie diff --git a/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/__init__.py b/prowler/providers/aws/services/opensearch/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/__init__.py rename to prowler/providers/aws/services/opensearch/__init__.py diff --git a/prowler/providers/aws/services/opensearch/opensearch_client.py b/prowler/providers/aws/services/opensearch/opensearch_client.py new file mode 100644 index 00000000..fdd7f8f4 --- /dev/null +++ b/prowler/providers/aws/services/opensearch/opensearch_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchService, +) + +opensearch_client = OpenSearchService(current_audit_info) diff --git a/providers/aws/services/opensearch/opensearch_service.py b/prowler/providers/aws/services/opensearch/opensearch_service.py similarity index 98% rename from providers/aws/services/opensearch/opensearch_service.py rename to prowler/providers/aws/services/opensearch/opensearch_service.py index fbd04254..49741b76 100644 --- a/providers/aws/services/opensearch/opensearch_service.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service.py @@ -3,8 +3,8 @@ from json import loads from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ OpenSearch diff --git a/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.metadata.json index be9ca033..e034545e 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.metadata.json @@ -36,4 +36,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.py similarity index 85% rename from providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.py index 7fafa516..8e903644 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_audit_logging_enabled(Check): diff --git a/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.metadata.json index a75b3d0c..868f019f 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.metadata.json @@ -36,4 +36,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.py similarity index 91% rename from providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.py index 03bada40..48e67b55 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_cloudwatch_logging_enabled(Check): diff --git a/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.metadata.json similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.metadata.json diff --git a/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.py similarity index 83% rename from providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.py index d390619c..fd88e624 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_encryption_at_rest_enabled(Check): diff --git a/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.metadata.json similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.metadata.json diff --git a/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.py similarity index 83% rename from providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.py index b8548630..c265102c 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_https_communications_enforced(Check): diff --git a/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.metadata.json similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.metadata.json diff --git a/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.py similarity index 83% rename from providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.py index c209e0e5..7706a7c7 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_internal_user_database_enabled(Check): diff --git a/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.metadata.json diff --git a/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.py similarity index 83% rename from providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.py index dbb27385..678468e6 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_node_to_node_encryption_enabled(Check): diff --git a/providers/aws/services/rds/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/rds/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.metadata.json index e7c1b46c..19a7641c 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.metadata.json @@ -36,4 +36,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.py similarity index 94% rename from providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.py index 17e5316b..320f8b5c 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_not_publicly_accessible(Check): diff --git a/providers/aws/services/rds/rds_instance_backup_enabled/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_backup_enabled/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.metadata.json similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.metadata.json diff --git a/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.py similarity index 84% rename from providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.py index a1b08235..46e183ba 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_updated_to_the_latest_service_software_version(Check): diff --git a/providers/aws/services/rds/rds_instance_deletion_protection/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_deletion_protection/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.metadata.json similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.metadata.json diff --git a/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.py similarity index 83% rename from providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.py index aefe01ad..d617d879 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_use_cognito_authentication_for_kibana(Check): diff --git a/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/__init__.py b/prowler/providers/aws/services/rds/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/__init__.py rename to prowler/providers/aws/services/rds/__init__.py diff --git a/prowler/providers/aws/services/rds/rds_client.py b/prowler/providers/aws/services/rds/rds_client.py new file mode 100644 index 00000000..6911ab5f --- /dev/null +++ b/prowler/providers/aws/services/rds/rds_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.rds.rds_service import RDS + +rds_client = RDS(current_audit_info) diff --git a/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/__init__.py b/prowler/providers/aws/services/rds/rds_instance_backup_enabled/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_backup_enabled/__init__.py diff --git a/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.metadata.json b/prowler/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.metadata.json similarity index 100% rename from providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.metadata.json diff --git a/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.py b/prowler/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.py similarity index 86% rename from providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.py rename to prowler/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.py index 4e2aae9c..adfd8a82 100644 --- a/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.py +++ b/prowler/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_backup_enabled(Check): diff --git a/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/__init__.py b/prowler/providers/aws/services/rds/rds_instance_deletion_protection/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_deletion_protection/__init__.py diff --git a/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.metadata.json b/prowler/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.metadata.json similarity index 100% rename from providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.metadata.json diff --git a/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.py b/prowler/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.py similarity index 86% rename from providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.py rename to prowler/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.py index 3df4db5c..72dab878 100644 --- a/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.py +++ b/prowler/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_deletion_protection(Check): diff --git a/providers/aws/services/rds/rds_instance_multi_az/__init__.py b/prowler/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_multi_az/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/__init__.py diff --git a/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.metadata.json b/prowler/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.metadata.json similarity index 100% rename from providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.metadata.json diff --git a/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.py b/prowler/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.py similarity index 86% rename from providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.py rename to prowler/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.py index 7fdf03ea..6f7bb5ed 100644 --- a/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.py +++ b/prowler/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_enhanced_monitoring_enabled(Check): diff --git a/providers/aws/services/rds/rds_instance_no_public_access/__init__.py b/prowler/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_no_public_access/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/__init__.py diff --git a/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.metadata.json b/prowler/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.metadata.json similarity index 100% rename from providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.metadata.json diff --git a/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.py b/prowler/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.py similarity index 85% rename from providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.py rename to prowler/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.py index e4af35a6..18233cf1 100644 --- a/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.py +++ b/prowler/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_integration_cloudwatch_logs(Check): diff --git a/providers/aws/services/rds/rds_instance_storage_encrypted/__init__.py b/prowler/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_storage_encrypted/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/__init__.py diff --git a/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.metadata.json b/prowler/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.metadata.json similarity index 100% rename from providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.metadata.json diff --git a/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.py b/prowler/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.py similarity index 86% rename from providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.py rename to prowler/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.py index 449e98fe..77fc6195 100644 --- a/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.py +++ b/prowler/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_minor_version_upgrade_enabled(Check): diff --git a/providers/aws/services/rds/rds_snapshots_public_access/__init__.py b/prowler/providers/aws/services/rds/rds_instance_multi_az/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_snapshots_public_access/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_multi_az/__init__.py diff --git a/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.metadata.json b/prowler/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.metadata.json similarity index 100% rename from providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.metadata.json diff --git a/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.py b/prowler/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.py similarity index 85% rename from providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.py rename to prowler/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.py index b136a17f..02e845e3 100644 --- a/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.py +++ b/prowler/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_multi_az(Check): diff --git a/providers/aws/services/redshift/__init__.py b/prowler/providers/aws/services/rds/rds_instance_no_public_access/__init__.py similarity index 100% rename from providers/aws/services/redshift/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_no_public_access/__init__.py diff --git a/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.metadata.json b/prowler/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.metadata.json similarity index 99% rename from providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.metadata.json index 7b9ef1ab..32e5cd8c 100644 --- a/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.metadata.json +++ b/prowler/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.py b/prowler/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.py similarity index 85% rename from providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.py rename to prowler/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.py index bd046ef9..0b94cf8a 100644 --- a/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.py +++ b/prowler/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_no_public_access(Check): diff --git a/providers/aws/services/redshift/redshift_cluster_audit_logging/__init__.py b/prowler/providers/aws/services/rds/rds_instance_storage_encrypted/__init__.py similarity index 100% rename from providers/aws/services/redshift/redshift_cluster_audit_logging/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_storage_encrypted/__init__.py diff --git a/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.metadata.json b/prowler/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.metadata.json similarity index 100% rename from providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.metadata.json diff --git a/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.py b/prowler/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.py similarity index 84% rename from providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.py rename to prowler/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.py index 68fe0ebb..9d500b94 100644 --- a/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.py +++ b/prowler/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_storage_encrypted(Check): diff --git a/providers/aws/services/rds/rds_service.py b/prowler/providers/aws/services/rds/rds_service.py similarity index 98% rename from providers/aws/services/rds/rds_service.py rename to prowler/providers/aws/services/rds/rds_service.py index 31402e67..989f900d 100644 --- a/providers/aws/services/rds/rds_service.py +++ b/prowler/providers/aws/services/rds/rds_service.py @@ -3,8 +3,8 @@ from typing import Optional from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## RDS diff --git a/providers/aws/services/redshift/redshift_cluster_automated_snapshot/__init__.py b/prowler/providers/aws/services/rds/rds_snapshots_public_access/__init__.py similarity index 100% rename from providers/aws/services/redshift/redshift_cluster_automated_snapshot/__init__.py rename to prowler/providers/aws/services/rds/rds_snapshots_public_access/__init__.py diff --git a/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.metadata.json b/prowler/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.metadata.json similarity index 99% rename from providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.metadata.json rename to prowler/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.metadata.json index ff607670..1be3a444 100644 --- a/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.metadata.json +++ b/prowler/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.py b/prowler/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.py similarity index 91% rename from providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.py rename to prowler/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.py index 1d0d089d..a49627f5 100644 --- a/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.py +++ b/prowler/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_snapshots_public_access(Check): diff --git a/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/__init__.py b/prowler/providers/aws/services/redshift/__init__.py similarity index 100% rename from providers/aws/services/redshift/redshift_cluster_automatic_upgrades/__init__.py rename to prowler/providers/aws/services/redshift/__init__.py diff --git a/prowler/providers/aws/services/redshift/redshift_client.py b/prowler/providers/aws/services/redshift/redshift_client.py new file mode 100644 index 00000000..4743ddb4 --- /dev/null +++ b/prowler/providers/aws/services/redshift/redshift_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.redshift.redshift_service import Redshift + +redshift_client = Redshift(current_audit_info) diff --git a/providers/aws/services/redshift/redshift_cluster_public_access/__init__.py b/prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/__init__.py similarity index 100% rename from providers/aws/services/redshift/redshift_cluster_public_access/__init__.py rename to prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/__init__.py diff --git a/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.metadata.json b/prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.metadata.json similarity index 99% rename from providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.metadata.json rename to prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.metadata.json index 127b4dfc..940d4183 100644 --- a/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.metadata.json +++ b/prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.py b/prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.py similarity index 84% rename from providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.py rename to prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.py index d99e42a3..842804cc 100644 --- a/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.py +++ b/prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.redshift.redshift_client import redshift_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.redshift.redshift_client import redshift_client class redshift_cluster_audit_logging(Check): diff --git a/providers/aws/services/route53/__init__.py b/prowler/providers/aws/services/redshift/redshift_cluster_automated_snapshot/__init__.py similarity index 100% rename from providers/aws/services/route53/__init__.py rename to prowler/providers/aws/services/redshift/redshift_cluster_automated_snapshot/__init__.py diff --git a/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.metadata.json b/prowler/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.metadata.json similarity index 100% rename from providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.metadata.json rename to prowler/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.metadata.json diff --git a/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.py b/prowler/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.py similarity index 84% rename from providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.py rename to prowler/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.py index 86b0690b..fc5bae52 100644 --- a/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.py +++ b/prowler/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.redshift.redshift_client import redshift_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.redshift.redshift_client import redshift_client class redshift_cluster_automated_snapshot(Check): diff --git a/providers/aws/services/route53/route53_domains_privacy_protection_enabled/__init__.py b/prowler/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/__init__.py similarity index 100% rename from providers/aws/services/route53/route53_domains_privacy_protection_enabled/__init__.py rename to prowler/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/__init__.py diff --git a/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.metadata.json b/prowler/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.metadata.json similarity index 100% rename from providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.metadata.json rename to prowler/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.metadata.json diff --git a/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.py b/prowler/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.py similarity index 85% rename from providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.py rename to prowler/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.py index 0cb194b8..85247b02 100644 --- a/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.py +++ b/prowler/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.redshift.redshift_client import redshift_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.redshift.redshift_client import redshift_client class redshift_cluster_automatic_upgrades(Check): diff --git a/providers/aws/services/route53/route53_domains_transferlock_enabled/__init__.py b/prowler/providers/aws/services/redshift/redshift_cluster_public_access/__init__.py similarity index 100% rename from providers/aws/services/route53/route53_domains_transferlock_enabled/__init__.py rename to prowler/providers/aws/services/redshift/redshift_cluster_public_access/__init__.py diff --git a/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.metadata.json b/prowler/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.metadata.json similarity index 100% rename from providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.metadata.json rename to prowler/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.metadata.json diff --git a/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.py b/prowler/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.py similarity index 84% rename from providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.py rename to prowler/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.py index 1f600e10..98ca2933 100644 --- a/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.py +++ b/prowler/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.redshift.redshift_client import redshift_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.redshift.redshift_client import redshift_client class redshift_cluster_public_access(Check): diff --git a/providers/aws/services/redshift/redshift_service.py b/prowler/providers/aws/services/redshift/redshift_service.py similarity index 97% rename from providers/aws/services/redshift/redshift_service.py rename to prowler/providers/aws/services/redshift/redshift_service.py index 276b806e..d6d08155 100644 --- a/providers/aws/services/redshift/redshift_service.py +++ b/prowler/providers/aws/services/redshift/redshift_service.py @@ -2,8 +2,8 @@ import threading from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ Redshift diff --git a/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/__init__.py b/prowler/providers/aws/services/route53/__init__.py similarity index 100% rename from providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/__init__.py rename to prowler/providers/aws/services/route53/__init__.py diff --git a/prowler/providers/aws/services/route53/route53_client.py b/prowler/providers/aws/services/route53/route53_client.py new file mode 100644 index 00000000..321a6000 --- /dev/null +++ b/prowler/providers/aws/services/route53/route53_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.route53.route53_service import Route53 + +route53_client = Route53(current_audit_info) diff --git a/providers/aws/services/s3/__init__.py b/prowler/providers/aws/services/route53/route53_domains_privacy_protection_enabled/__init__.py similarity index 100% rename from providers/aws/services/s3/__init__.py rename to prowler/providers/aws/services/route53/route53_domains_privacy_protection_enabled/__init__.py diff --git a/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.metadata.json b/prowler/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.metadata.json similarity index 100% rename from providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.metadata.json rename to prowler/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.metadata.json diff --git a/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.py b/prowler/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.py similarity index 83% rename from providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.py rename to prowler/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.py index f4f9cc58..e7c01639 100644 --- a/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.py +++ b/prowler/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.route53.route53domains_client import route53domains_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.route53.route53domains_client import ( + route53domains_client, +) class route53_domains_privacy_protection_enabled(Check): diff --git a/providers/aws/services/s3/s3_account_level_public_access_blocks/__init__.py b/prowler/providers/aws/services/route53/route53_domains_transferlock_enabled/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_account_level_public_access_blocks/__init__.py rename to prowler/providers/aws/services/route53/route53_domains_transferlock_enabled/__init__.py diff --git a/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.metadata.json b/prowler/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.metadata.json similarity index 100% rename from providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.metadata.json rename to prowler/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.metadata.json diff --git a/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.py b/prowler/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.py similarity index 83% rename from providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.py rename to prowler/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.py index c38c8c22..c86847f1 100644 --- a/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.py +++ b/prowler/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.route53.route53domains_client import route53domains_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.route53.route53domains_client import ( + route53domains_client, +) class route53_domains_transferlock_enabled(Check): diff --git a/providers/aws/services/s3/s3_bucket_acl_prohibited/__init__.py b/prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_acl_prohibited/__init__.py rename to prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/__init__.py diff --git a/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.metadata.json b/prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.metadata.json rename to prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.metadata.json index e73e7364..93f2547b 100644 --- a/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.py b/prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.py similarity index 88% rename from providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.py rename to prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.py index 8f75139e..250cc883 100644 --- a/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.py +++ b/prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.route53.route53_client import route53_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.route53.route53_client import route53_client class route53_public_hosted_zones_cloudwatch_logging_enabled(Check): diff --git a/providers/aws/services/route53/route53_service.py b/prowler/providers/aws/services/route53/route53_service.py similarity index 97% rename from providers/aws/services/route53/route53_service.py rename to prowler/providers/aws/services/route53/route53_service.py index 0dbbe5a6..f633908a 100644 --- a/providers/aws/services/route53/route53_service.py +++ b/prowler/providers/aws/services/route53/route53_service.py @@ -1,7 +1,7 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import get_region_global_service +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import get_region_global_service ################## Route53 diff --git a/prowler/providers/aws/services/route53/route53domains_client.py b/prowler/providers/aws/services/route53/route53domains_client.py new file mode 100644 index 00000000..d05e7ed8 --- /dev/null +++ b/prowler/providers/aws/services/route53/route53domains_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.route53.route53_service import Route53Domains + +route53domains_client = Route53Domains(current_audit_info) diff --git a/providers/aws/services/s3/s3_bucket_default_encryption/__init__.py b/prowler/providers/aws/services/s3/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_default_encryption/__init__.py rename to prowler/providers/aws/services/s3/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_no_mfa_delete/__init__.py b/prowler/providers/aws/services/s3/s3_account_level_public_access_blocks/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_no_mfa_delete/__init__.py rename to prowler/providers/aws/services/s3/s3_account_level_public_access_blocks/__init__.py diff --git a/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.metadata.json b/prowler/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.metadata.json similarity index 100% rename from providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.metadata.json rename to prowler/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.metadata.json diff --git a/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.py b/prowler/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.py similarity index 80% rename from providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.py rename to prowler/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.py index 7f06b161..93ae88f3 100644 --- a/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.py +++ b/prowler/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client -from providers.aws.services.s3.s3control_client import s3control_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client +from prowler.providers.aws.services.s3.s3control_client import s3control_client class s3_account_level_public_access_blocks(Check): diff --git a/providers/aws/services/s3/s3_bucket_object_versioning/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_acl_prohibited/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_object_versioning/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_acl_prohibited/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.metadata.json similarity index 100% rename from providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.metadata.json diff --git a/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.py b/prowler/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.py similarity index 85% rename from providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.py rename to prowler/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.py index 1bda0e88..3b7591ed 100644 --- a/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.py +++ b/prowler/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client class s3_bucket_acl_prohibited(Check): diff --git a/providers/aws/services/s3/s3_bucket_policy_public_write_access/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_default_encryption/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_policy_public_write_access/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_default_encryption/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.metadata.json similarity index 100% rename from providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.metadata.json diff --git a/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.py b/prowler/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.py similarity index 84% rename from providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.py rename to prowler/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.py index a7e21ce6..829052d8 100644 --- a/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.py +++ b/prowler/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client class s3_bucket_default_encryption(Check): diff --git a/providers/aws/services/s3/s3_bucket_public_access/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_no_mfa_delete/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_public_access/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_no_mfa_delete/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.metadata.json similarity index 100% rename from providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.metadata.json diff --git a/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.py b/prowler/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.py similarity index 85% rename from providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.py rename to prowler/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.py index c32a57b6..f6076c61 100644 --- a/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.py +++ b/prowler/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client class s3_bucket_no_mfa_delete(Check): diff --git a/providers/aws/services/s3/s3_bucket_secure_transport_policy/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_object_versioning/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_secure_transport_policy/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_object_versioning/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.metadata.json similarity index 100% rename from providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.metadata.json diff --git a/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.py b/prowler/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.py similarity index 85% rename from providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.py rename to prowler/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.py index 0839aadb..5f6c2b0f 100644 --- a/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.py +++ b/prowler/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client class s3_bucket_object_versioning(Check): diff --git a/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_server_access_logging_enabled/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.metadata.json similarity index 99% rename from providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.metadata.json index f0b95edc..007aa38a 100644 --- a/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.metadata.json +++ b/prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.py b/prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.py similarity index 92% rename from providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.py rename to prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.py index 4fdaab64..9c23576d 100644 --- a/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.py +++ b/prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client class s3_bucket_policy_public_write_access(Check): diff --git a/providers/aws/services/sagemaker/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_public_access/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_public_access/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.metadata.json similarity index 99% rename from providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.metadata.json index fbb2b6af..494533c4 100644 --- a/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.metadata.json +++ b/prowler/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.py b/prowler/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.py similarity index 94% rename from providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.py rename to prowler/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.py index 30ea123e..ec348d1a 100644 --- a/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.py +++ b/prowler/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client -from providers.aws.services.s3.s3control_client import s3control_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client +from prowler.providers.aws.services.s3.s3control_client import s3control_client class s3_bucket_public_access(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_secure_transport_policy/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_secure_transport_policy/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.metadata.json similarity index 100% rename from providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.metadata.json diff --git a/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.py b/prowler/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.py similarity index 93% rename from providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.py rename to prowler/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.py index 27b751a8..3d070f79 100644 --- a/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.py +++ b/prowler/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client class s3_bucket_secure_transport_policy(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json index 1972995e..ba0d552f 100644 --- a/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.py b/prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.py similarity index 85% rename from providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.py rename to prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.py index 0479b4e8..674630fd 100644 --- a/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.py +++ b/prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client class s3_bucket_server_access_logging_enabled(Check): diff --git a/prowler/providers/aws/services/s3/s3_client.py b/prowler/providers/aws/services/s3/s3_client.py new file mode 100644 index 00000000..2e714f5e --- /dev/null +++ b/prowler/providers/aws/services/s3/s3_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.s3.s3_service import S3 + +s3_client = S3(current_audit_info) diff --git a/providers/aws/services/s3/s3_service.py b/prowler/providers/aws/services/s3/s3_service.py similarity index 99% rename from providers/aws/services/s3/s3_service.py rename to prowler/providers/aws/services/s3/s3_service.py index 44f395fe..5935ceb3 100644 --- a/providers/aws/services/s3/s3_service.py +++ b/prowler/providers/aws/services/s3/s3_service.py @@ -2,8 +2,8 @@ import json import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import ( +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import ( generate_regional_clients, get_region_global_service, ) diff --git a/prowler/providers/aws/services/s3/s3control_client.py b/prowler/providers/aws/services/s3/s3control_client.py new file mode 100644 index 00000000..596ef2b2 --- /dev/null +++ b/prowler/providers/aws/services/s3/s3control_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.s3.s3_service import S3Control + +s3control_client = S3Control(current_audit_info) diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/__init__.py b/prowler/providers/aws/services/sagemaker/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/__init__.py rename to prowler/providers/aws/services/sagemaker/__init__.py diff --git a/prowler/providers/aws/services/sagemaker/sagemaker_client.py b/prowler/providers/aws/services/sagemaker/sagemaker_client.py new file mode 100644 index 00000000..d883f587 --- /dev/null +++ b/prowler/providers/aws/services/sagemaker/sagemaker_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.sagemaker.sagemaker_service import SageMaker + +sagemaker_client = SageMaker(current_audit_info) diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.py b/prowler/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.py similarity index 83% rename from providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.py rename to prowler/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.py index 3bbb7fd3..88d3a5eb 100644 --- a/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_models_network_isolation_enabled(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.py b/prowler/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.py similarity index 84% rename from providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.py rename to prowler/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.py index 503618f6..c3f85fcf 100644 --- a/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_models_vpc_settings_configured(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.py similarity index 85% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.py index 1b4ea933..bbfa5e6f 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_notebook_instance_encryption_enabled(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.py similarity index 85% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.py index d61e6664..07b9374a 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_notebook_instance_root_access_disabled(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.py similarity index 85% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.py index 51d0fe10..8f610ac5 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_notebook_instance_vpc_settings_configured(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.metadata.json similarity index 99% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.metadata.json index 54b76232..21ffbf16 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.metadata.json +++ b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.py similarity index 85% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.py index 82d078f8..99608483 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_notebook_instance_without_direct_internet_access_configured(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_service.py b/prowler/providers/aws/services/sagemaker/sagemaker_service.py similarity index 98% rename from providers/aws/services/sagemaker/sagemaker_service.py rename to prowler/providers/aws/services/sagemaker/sagemaker_service.py index 3aa16be6..77000b89 100644 --- a/providers/aws/services/sagemaker/sagemaker_service.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_service.py @@ -2,8 +2,8 @@ import threading from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ SageMaker diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.py similarity index 85% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.py index 19bb4aac..8bf9679d 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_training_jobs_intercontainer_encryption_enabled(Check): diff --git a/providers/aws/services/secretsmanager/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/__init__.py similarity index 100% rename from providers/aws/services/secretsmanager/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.py similarity index 84% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.py index a48c543e..dba10f28 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_training_jobs_network_isolation_enabled(Check): diff --git a/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.py similarity index 85% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.py index 018f435d..91b8d5d1 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_training_jobs_volume_and_output_encryption_enabled(Check): diff --git a/providers/aws/services/securityhub/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/__init__.py similarity index 100% rename from providers/aws/services/securityhub/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.py similarity index 85% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.py index 7fc5b46d..d9fd9d50 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_training_jobs_vpc_settings_configured(Check): diff --git a/providers/aws/services/securityhub/securityhub_enabled/__init__.py b/prowler/providers/aws/services/secretsmanager/__init__.py similarity index 100% rename from providers/aws/services/securityhub/securityhub_enabled/__init__.py rename to prowler/providers/aws/services/secretsmanager/__init__.py diff --git a/providers/aws/services/shield/__init__.py b/prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/__init__.py similarity index 100% rename from providers/aws/services/shield/__init__.py rename to prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/__init__.py diff --git a/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.metadata.json b/prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.metadata.json similarity index 100% rename from providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.metadata.json rename to prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.metadata.json diff --git a/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.py b/prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.py similarity index 86% rename from providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.py rename to prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.py index b11f1ee7..e016406f 100644 --- a/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.py +++ b/prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.secretsmanager.secretsmanager_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.secretsmanager.secretsmanager_client import ( secretsmanager_client, ) diff --git a/prowler/providers/aws/services/secretsmanager/secretsmanager_client.py b/prowler/providers/aws/services/secretsmanager/secretsmanager_client.py new file mode 100644 index 00000000..09475758 --- /dev/null +++ b/prowler/providers/aws/services/secretsmanager/secretsmanager_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.secretsmanager.secretsmanager_service import ( + SecretsManager, +) + +secretsmanager_client = SecretsManager(current_audit_info) diff --git a/providers/aws/services/secretsmanager/secretsmanager_service.py b/prowler/providers/aws/services/secretsmanager/secretsmanager_service.py similarity index 94% rename from providers/aws/services/secretsmanager/secretsmanager_service.py rename to prowler/providers/aws/services/secretsmanager/secretsmanager_service.py index 07851d36..c5de04a9 100644 --- a/providers/aws/services/secretsmanager/secretsmanager_service.py +++ b/prowler/providers/aws/services/secretsmanager/secretsmanager_service.py @@ -2,8 +2,8 @@ import threading from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## SecretsManager diff --git a/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/__init__.py b/prowler/providers/aws/services/securityhub/__init__.py similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/__init__.py rename to prowler/providers/aws/services/securityhub/__init__.py diff --git a/prowler/providers/aws/services/securityhub/securityhub_client.py b/prowler/providers/aws/services/securityhub/securityhub_client.py new file mode 100644 index 00000000..d7c7c7fe --- /dev/null +++ b/prowler/providers/aws/services/securityhub/securityhub_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.securityhub.securityhub_service import SecurityHub + +securityhub_client = SecurityHub(current_audit_info) diff --git a/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/__init__.py b/prowler/providers/aws/services/securityhub/securityhub_enabled/__init__.py similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/__init__.py rename to prowler/providers/aws/services/securityhub/securityhub_enabled/__init__.py diff --git a/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.metadata.json b/prowler/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.metadata.json similarity index 100% rename from providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.metadata.json rename to prowler/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.metadata.json diff --git a/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.py b/prowler/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.py similarity index 82% rename from providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.py rename to prowler/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.py index 536f914a..6ea9f23b 100644 --- a/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.py +++ b/prowler/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.securityhub.securityhub_client import securityhub_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.securityhub.securityhub_client import ( + securityhub_client, +) class securityhub_enabled(Check): diff --git a/providers/aws/services/securityhub/securityhub_service.py b/prowler/providers/aws/services/securityhub/securityhub_service.py similarity index 96% rename from providers/aws/services/securityhub/securityhub_service.py rename to prowler/providers/aws/services/securityhub/securityhub_service.py index f1c695dc..83958ad2 100644 --- a/providers/aws/services/securityhub/securityhub_service.py +++ b/prowler/providers/aws/services/securityhub/securityhub_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## SecurityHub diff --git a/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/__init__.py b/prowler/providers/aws/services/shield/__init__.py similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/__init__.py rename to prowler/providers/aws/services/shield/__init__.py diff --git a/providers/aws/services/shield/check_extra7170 b/prowler/providers/aws/services/shield/check_extra7170 similarity index 100% rename from providers/aws/services/shield/check_extra7170 rename to prowler/providers/aws/services/shield/check_extra7170 diff --git a/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/__init__.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/__init__.py similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/__init__.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/__init__.py diff --git a/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.metadata.json b/prowler/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.metadata.json similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.metadata.json rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.metadata.json diff --git a/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.py similarity index 82% rename from providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.py index 47f647e8..c745ca93 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.py +++ b/prowler/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.shield.shield_client import shield_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.shield.shield_client import shield_client class shield_advanced_protection_in_associated_elastic_ips(Check): diff --git a/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/__init__.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/__init__.py similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/__init__.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/__init__.py diff --git a/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.metadata.json b/prowler/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.metadata.json similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.metadata.json rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.metadata.json diff --git a/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.py similarity index 83% rename from providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.py index 0c1dc8c5..b5ca63a9 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.py +++ b/prowler/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elb.elb_client import elb_client -from providers.aws.services.shield.shield_client import shield_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elb.elb_client import elb_client +from prowler.providers.aws.services.shield.shield_client import shield_client class shield_advanced_protection_in_classic_load_balancers(Check): diff --git a/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/__init__.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/__init__.py similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/__init__.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/__init__.py diff --git a/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.metadata.json b/prowler/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.metadata.json similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.metadata.json rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.metadata.json diff --git a/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.py similarity index 81% rename from providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.py index b99c65b7..cb571921 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.py +++ b/prowler/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.py @@ -1,6 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudfront.cloudfront_client import cloudfront_client -from providers.aws.services.shield.shield_client import shield_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudfront.cloudfront_client import ( + cloudfront_client, +) +from prowler.providers.aws.services.shield.shield_client import shield_client class shield_advanced_protection_in_cloudfront_distributions(Check): diff --git a/providers/aws/services/sns/__init__.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/__init__.py similarity index 100% rename from providers/aws/services/sns/__init__.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/__init__.py diff --git a/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.metadata.json b/prowler/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.metadata.json similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.metadata.json rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.metadata.json diff --git a/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.py similarity index 82% rename from providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.py index 2303a544..c46bc0e1 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.py +++ b/prowler/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.py @@ -1,8 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.globalaccelerator.globalaccelerator_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.globalaccelerator.globalaccelerator_client import ( globalaccelerator_client, ) -from providers.aws.services.shield.shield_client import shield_client +from prowler.providers.aws.services.shield.shield_client import shield_client class shield_advanced_protection_in_global_accelerators(Check): diff --git a/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/__init__.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/__init__.py similarity index 100% rename from providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/__init__.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/__init__.py diff --git a/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.metadata.json b/prowler/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.metadata.json similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.metadata.json rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.metadata.json diff --git a/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.py similarity index 83% rename from providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.py index 4e4ad71f..de89779e 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.py +++ b/prowler/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client -from providers.aws.services.shield.shield_client import shield_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.providers.aws.services.shield.shield_client import shield_client class shield_advanced_protection_in_internet_facing_load_balancers(Check): diff --git a/providers/aws/services/sns/sns_topics_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/__init__.py similarity index 100% rename from providers/aws/services/sns/sns_topics_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/__init__.py diff --git a/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.metadata.json b/prowler/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.metadata.json similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.metadata.json rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.metadata.json diff --git a/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.py similarity index 82% rename from providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.py index 31feeb59..3f10492a 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.py +++ b/prowler/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.route53.route53_client import route53_client -from providers.aws.services.shield.shield_client import shield_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.route53.route53_client import route53_client +from prowler.providers.aws.services.shield.shield_client import shield_client class shield_advanced_protection_in_route53_hosted_zones(Check): diff --git a/prowler/providers/aws/services/shield/shield_client.py b/prowler/providers/aws/services/shield/shield_client.py new file mode 100644 index 00000000..27724713 --- /dev/null +++ b/prowler/providers/aws/services/shield/shield_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.shield.shield_service import Shield + +shield_client = Shield(current_audit_info) diff --git a/providers/aws/services/shield/shield_service.py b/prowler/providers/aws/services/shield/shield_service.py similarity index 95% rename from providers/aws/services/shield/shield_service.py rename to prowler/providers/aws/services/shield/shield_service.py index e8c5f58b..4d1eb187 100644 --- a/providers/aws/services/shield/shield_service.py +++ b/prowler/providers/aws/services/shield/shield_service.py @@ -1,6 +1,7 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import get_region_global_service + +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import get_region_global_service ################### Shield diff --git a/providers/aws/services/sqs/__init__.py b/prowler/providers/aws/services/sns/__init__.py similarity index 100% rename from providers/aws/services/sqs/__init__.py rename to prowler/providers/aws/services/sns/__init__.py diff --git a/prowler/providers/aws/services/sns/sns_client.py b/prowler/providers/aws/services/sns/sns_client.py new file mode 100644 index 00000000..15684495 --- /dev/null +++ b/prowler/providers/aws/services/sns/sns_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.sns.sns_service import SNS + +sns_client = SNS(current_audit_info) diff --git a/providers/aws/services/sns/sns_service.py b/prowler/providers/aws/services/sns/sns_service.py similarity index 95% rename from providers/aws/services/sns/sns_service.py rename to prowler/providers/aws/services/sns/sns_service.py index 5e89b54d..bea9e316 100644 --- a/providers/aws/services/sns/sns_service.py +++ b/prowler/providers/aws/services/sns/sns_service.py @@ -3,8 +3,8 @@ from json import loads from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ SNS diff --git a/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/__init__.py similarity index 100% rename from providers/aws/services/sqs/sqs_queues_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/__init__.py diff --git a/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.metadata.json b/prowler/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.metadata.json similarity index 100% rename from providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.metadata.json rename to prowler/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.metadata.json diff --git a/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.py b/prowler/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.py similarity index 83% rename from providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.py rename to prowler/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.py index f8b73c22..5288389e 100644 --- a/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.py +++ b/prowler/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sns.sns_client import sns_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sns.sns_client import sns_client class sns_topics_kms_encryption_at_rest_enabled(Check): diff --git a/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/__init__.py b/prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/__init__.py rename to prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.metadata.json index f6a06492..477b3b2a 100644 --- a/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.py b/prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.py similarity index 93% rename from providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.py rename to prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.py index 30dce67e..03790488 100644 --- a/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.py +++ b/prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sns.sns_client import sns_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sns.sns_client import sns_client class sns_topics_not_publicly_accessible(Check): diff --git a/providers/aws/services/ssm/__init__.py b/prowler/providers/aws/services/sqs/__init__.py similarity index 100% rename from providers/aws/services/ssm/__init__.py rename to prowler/providers/aws/services/sqs/__init__.py diff --git a/prowler/providers/aws/services/sqs/sqs_client.py b/prowler/providers/aws/services/sqs/sqs_client.py new file mode 100644 index 00000000..ffbc3977 --- /dev/null +++ b/prowler/providers/aws/services/sqs/sqs_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.sqs.sqs_service import SQS + +sqs_client = SQS(current_audit_info) diff --git a/providers/aws/services/ssm/ssm_document_secrets/__init__.py b/prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/ssm/ssm_document_secrets/__init__.py rename to prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.metadata.json index 79e61ce4..d5d32c37 100644 --- a/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.py b/prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.py similarity index 93% rename from providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.py rename to prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.py index d659e645..d89b7a21 100644 --- a/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.py +++ b/prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sqs.sqs_client import sqs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sqs.sqs_client import sqs_client class sqs_queues_not_publicly_accessible(Check): diff --git a/providers/aws/services/ssm/ssm_documents_set_as_public/__init__.py b/prowler/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/ssm/ssm_documents_set_as_public/__init__.py rename to prowler/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/__init__.py diff --git a/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.metadata.json b/prowler/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.metadata.json rename to prowler/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.metadata.json diff --git a/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.py b/prowler/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.py similarity index 85% rename from providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.py rename to prowler/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.py index e11a76b6..01bd971b 100644 --- a/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.py +++ b/prowler/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sqs.sqs_client import sqs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sqs.sqs_client import sqs_client class sqs_queues_server_side_encryption_enabled(Check): diff --git a/providers/aws/services/sqs/sqs_service.py b/prowler/providers/aws/services/sqs/sqs_service.py similarity index 95% rename from providers/aws/services/sqs/sqs_service.py rename to prowler/providers/aws/services/sqs/sqs_service.py index b74c98c1..cdb38e87 100644 --- a/providers/aws/services/sqs/sqs_service.py +++ b/prowler/providers/aws/services/sqs/sqs_service.py @@ -3,8 +3,8 @@ from json import loads from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ SQS diff --git a/providers/aws/services/ssm/ssm_managed_compliant_patching/__init__.py b/prowler/providers/aws/services/ssm/__init__.py similarity index 100% rename from providers/aws/services/ssm/ssm_managed_compliant_patching/__init__.py rename to prowler/providers/aws/services/ssm/__init__.py diff --git a/prowler/providers/aws/services/ssm/ssm_client.py b/prowler/providers/aws/services/ssm/ssm_client.py new file mode 100644 index 00000000..cce00a8c --- /dev/null +++ b/prowler/providers/aws/services/ssm/ssm_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.ssm.ssm_service import SSM + +ssm_client = SSM(current_audit_info) diff --git a/providers/aws/services/trustedadvisor/__init__.py b/prowler/providers/aws/services/ssm/ssm_document_secrets/__init__.py similarity index 100% rename from providers/aws/services/trustedadvisor/__init__.py rename to prowler/providers/aws/services/ssm/ssm_document_secrets/__init__.py diff --git a/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.metadata.json b/prowler/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.metadata.json similarity index 100% rename from providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.metadata.json rename to prowler/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.metadata.json diff --git a/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.py b/prowler/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.py similarity index 92% rename from providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.py rename to prowler/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.py index f0fe64e2..605362c4 100644 --- a/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.py +++ b/prowler/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.py @@ -5,8 +5,8 @@ import tempfile from detect_secrets import SecretsCollection from detect_secrets.settings import default_settings -from lib.check.models import Check, Check_Report -from providers.aws.services.ssm.ssm_client import ssm_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ssm.ssm_client import ssm_client class ssm_document_secrets(Check): diff --git a/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/__init__.py b/prowler/providers/aws/services/ssm/ssm_documents_set_as_public/__init__.py similarity index 100% rename from providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/__init__.py rename to prowler/providers/aws/services/ssm/ssm_documents_set_as_public/__init__.py diff --git a/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.metadata.json b/prowler/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.metadata.json similarity index 100% rename from providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.metadata.json rename to prowler/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.metadata.json diff --git a/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.py b/prowler/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.py similarity index 86% rename from providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.py rename to prowler/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.py index ac984d60..e1fc77c7 100644 --- a/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.py +++ b/prowler/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ssm.ssm_client import ssm_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ssm.ssm_client import ssm_client class ssm_documents_set_as_public(Check): diff --git a/providers/aws/services/vpc/__init__.py b/prowler/providers/aws/services/ssm/ssm_managed_compliant_patching/__init__.py similarity index 100% rename from providers/aws/services/vpc/__init__.py rename to prowler/providers/aws/services/ssm/ssm_managed_compliant_patching/__init__.py diff --git a/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.metadata.json b/prowler/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.metadata.json similarity index 100% rename from providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.metadata.json rename to prowler/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.metadata.json diff --git a/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.py b/prowler/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.py similarity index 81% rename from providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.py rename to prowler/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.py index 81a98104..799085eb 100644 --- a/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.py +++ b/prowler/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ssm.ssm_client import ssm_client -from providers.aws.services.ssm.ssm_service import ResourceStatus +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ssm.ssm_client import ssm_client +from prowler.providers.aws.services.ssm.ssm_service import ResourceStatus class ssm_managed_compliant_patching(Check): diff --git a/providers/aws/services/ssm/ssm_service.py b/prowler/providers/aws/services/ssm/ssm_service.py similarity index 98% rename from providers/aws/services/ssm/ssm_service.py rename to prowler/providers/aws/services/ssm/ssm_service.py index 6ee5b054..74f444a7 100644 --- a/providers/aws/services/ssm/ssm_service.py +++ b/prowler/providers/aws/services/ssm/ssm_service.py @@ -4,8 +4,8 @@ from enum import Enum from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## SSM diff --git a/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/__init__.py b/prowler/providers/aws/services/trustedadvisor/__init__.py similarity index 100% rename from providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/__init__.py rename to prowler/providers/aws/services/trustedadvisor/__init__.py diff --git a/prowler/providers/aws/services/trustedadvisor/trustedadvisor_client.py b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_client.py new file mode 100644 index 00000000..b037a841 --- /dev/null +++ b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.trustedadvisor.trustedadvisor_service import ( + TrustedAdvisor, +) + +trustedadvisor_client = TrustedAdvisor(current_audit_info) diff --git a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/__init__.py b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/__init__.py similarity index 100% rename from providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/__init__.py rename to prowler/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/__init__.py diff --git a/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.metadata.json b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.metadata.json similarity index 100% rename from providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.metadata.json rename to prowler/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.metadata.json diff --git a/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.py b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.py similarity index 83% rename from providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.py rename to prowler/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.py index b80c4d03..5441ac40 100644 --- a/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.py +++ b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.trustedadvisor.trustedadvisor_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.trustedadvisor.trustedadvisor_client import ( trustedadvisor_client, ) diff --git a/providers/aws/services/trustedadvisor/trustedadvisor_service.py b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_service.py similarity index 95% rename from providers/aws/services/trustedadvisor/trustedadvisor_service.py rename to prowler/providers/aws/services/trustedadvisor/trustedadvisor_service.py index 639db18f..e2601d37 100644 --- a/providers/aws/services/trustedadvisor/trustedadvisor_service.py +++ b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_service.py @@ -3,8 +3,8 @@ from typing import Optional from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ TrustedAdvisor diff --git a/providers/aws/services/vpc/vpc_flow_logs_enabled/__init__.py b/prowler/providers/aws/services/vpc/__init__.py similarity index 100% rename from providers/aws/services/vpc/vpc_flow_logs_enabled/__init__.py rename to prowler/providers/aws/services/vpc/__init__.py diff --git a/prowler/providers/aws/services/vpc/vpc_client.py b/prowler/providers/aws/services/vpc/vpc_client.py new file mode 100644 index 00000000..22d241c4 --- /dev/null +++ b/prowler/providers/aws/services/vpc/vpc_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.vpc.vpc_service import VPC + +vpc_client = VPC(current_audit_info) diff --git a/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/__init__.py b/prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/__init__.py similarity index 100% rename from providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/__init__.py rename to prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/__init__.py diff --git a/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.metadata.json b/prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.metadata.json similarity index 99% rename from providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.metadata.json rename to prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.metadata.json index 70e755e0..ecc60f95 100644 --- a/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.metadata.json +++ b/prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.py b/prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.py similarity index 89% rename from providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.py rename to prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.py index 5513df5d..e7cb5b58 100644 --- a/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.py +++ b/prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.py @@ -1,12 +1,12 @@ -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.vpc.vpc_client import vpc_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.vpc.vpc_client import vpc_client class vpc_endpoint_connections_trust_boundaries(Check): def execute(self): findings = [] - # Get trusted account_ids from config.yaml + # Get trusted account_ids from prowler.config.yaml trusted_account_ids = get_config_var("trusted_account_ids") for endpoint in vpc_client.vpc_endpoints: # Check VPC endpoint policy diff --git a/providers/aws/services/waf/__init__.py b/prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/__init__.py similarity index 100% rename from providers/aws/services/waf/__init__.py rename to prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/__init__.py diff --git a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.metadata.json b/prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.metadata.json similarity index 99% rename from providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.metadata.json rename to prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.metadata.json index c6fbd049..8c0b1920 100644 --- a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.metadata.json +++ b/prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.py b/prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.py similarity index 87% rename from providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.py rename to prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.py index f4e9f6f8..19f6888f 100644 --- a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.py +++ b/prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.py @@ -1,12 +1,12 @@ -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.vpc.vpc_client import vpc_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.vpc.vpc_client import vpc_client class vpc_endpoint_services_allowed_principals_trust_boundaries(Check): def execute(self): findings = [] - # Get trusted account_ids from config.yaml + # Get trusted account_ids from prowler.config.yaml trusted_account_ids = get_config_var("trusted_account_ids") for service in vpc_client.vpc_endpoint_services: if not service.allowed_principals: diff --git a/providers/aws/services/wafv2/__init__.py b/prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/__init__.py similarity index 100% rename from providers/aws/services/wafv2/__init__.py rename to prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/__init__.py diff --git a/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.metadata.json b/prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.metadata.json similarity index 99% rename from providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.metadata.json rename to prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.metadata.json index 92d85218..94e657a1 100644 --- a/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.metadata.json +++ b/prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.py b/prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.py similarity index 83% rename from providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.py rename to prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.py index e12e7b2a..32a90dd8 100644 --- a/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.py +++ b/prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.vpc.vpc_client import vpc_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.vpc.vpc_client import vpc_client class vpc_flow_logs_enabled(Check): diff --git a/providers/aws/services/workspaces/__init__.py b/prowler/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/__init__.py similarity index 100% rename from providers/aws/services/workspaces/__init__.py rename to prowler/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/__init__.py diff --git a/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.metadata.json b/prowler/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.metadata.json similarity index 100% rename from providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.metadata.json rename to prowler/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.metadata.json diff --git a/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.py b/prowler/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.py similarity index 91% rename from providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.py rename to prowler/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.py index 72e04ed8..d2b56344 100644 --- a/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.py +++ b/prowler/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.vpc.vpc_client import vpc_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.vpc.vpc_client import vpc_client class vpc_peering_routing_tables_with_least_privilege(Check): diff --git a/providers/aws/services/vpc/vpc_service.py b/prowler/providers/aws/services/vpc/vpc_service.py similarity index 98% rename from providers/aws/services/vpc/vpc_service.py rename to prowler/providers/aws/services/vpc/vpc_service.py index f3387da0..286a49a9 100644 --- a/providers/aws/services/vpc/vpc_service.py +++ b/prowler/providers/aws/services/vpc/vpc_service.py @@ -2,8 +2,8 @@ import json import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## VPC diff --git a/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/__init__.py b/prowler/providers/aws/services/waf/__init__.py similarity index 100% rename from providers/aws/services/workspaces/workspaces_volume_encryption_enabled/__init__.py rename to prowler/providers/aws/services/waf/__init__.py diff --git a/prowler/providers/aws/services/waf/waf_client.py b/prowler/providers/aws/services/waf/waf_client.py new file mode 100644 index 00000000..7e30b162 --- /dev/null +++ b/prowler/providers/aws/services/waf/waf_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.waf.waf_service import WAF + +waf_client = WAF(current_audit_info) diff --git a/providers/aws/services/waf/waf_service.py b/prowler/providers/aws/services/waf/waf_service.py similarity index 95% rename from providers/aws/services/waf/waf_service.py rename to prowler/providers/aws/services/waf/waf_service.py index 3d0b813d..44dad8ae 100644 --- a/providers/aws/services/waf/waf_service.py +++ b/prowler/providers/aws/services/waf/waf_service.py @@ -2,8 +2,8 @@ import threading from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################### WAF diff --git a/providers/azure/services/defender/__init__.py b/prowler/providers/aws/services/wafv2/__init__.py similarity index 100% rename from providers/azure/services/defender/__init__.py rename to prowler/providers/aws/services/wafv2/__init__.py diff --git a/prowler/providers/aws/services/wafv2/wafv2_client.py b/prowler/providers/aws/services/wafv2/wafv2_client.py new file mode 100644 index 00000000..76832a0e --- /dev/null +++ b/prowler/providers/aws/services/wafv2/wafv2_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.wafv2.wafv2_service import WAFv2 + +wafv2_client = WAFv2(current_audit_info) diff --git a/providers/aws/services/wafv2/wafv2_service.py b/prowler/providers/aws/services/wafv2/wafv2_service.py similarity index 95% rename from providers/aws/services/wafv2/wafv2_service.py rename to prowler/providers/aws/services/wafv2/wafv2_service.py index abd7416a..97c6055f 100644 --- a/providers/aws/services/wafv2/wafv2_service.py +++ b/prowler/providers/aws/services/wafv2/wafv2_service.py @@ -2,8 +2,8 @@ import threading from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################### WAFv2 diff --git a/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/__init__.py b/prowler/providers/aws/services/workspaces/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/__init__.py rename to prowler/providers/aws/services/workspaces/__init__.py diff --git a/prowler/providers/aws/services/workspaces/workspaces_client.py b/prowler/providers/aws/services/workspaces/workspaces_client.py new file mode 100644 index 00000000..9fea9078 --- /dev/null +++ b/prowler/providers/aws/services/workspaces/workspaces_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.workspaces.workspaces_service import WorkSpaces + +workspaces_client = WorkSpaces(current_audit_info) diff --git a/providers/aws/services/workspaces/workspaces_service.py b/prowler/providers/aws/services/workspaces/workspaces_service.py similarity index 95% rename from providers/aws/services/workspaces/workspaces_service.py rename to prowler/providers/aws/services/workspaces/workspaces_service.py index 4ad79cd7..05c725d9 100644 --- a/providers/aws/services/workspaces/workspaces_service.py +++ b/prowler/providers/aws/services/workspaces/workspaces_service.py @@ -2,8 +2,8 @@ import threading from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ WorkSpaces diff --git a/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/__init__.py b/prowler/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/__init__.py rename to prowler/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/__init__.py diff --git a/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.metadata.json b/prowler/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.metadata.json rename to prowler/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.metadata.json diff --git a/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.py b/prowler/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.py similarity index 89% rename from providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.py rename to prowler/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.py index c4095db6..0f6f6465 100644 --- a/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.py +++ b/prowler/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.workspaces.workspaces_client import workspaces_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.workspaces.workspaces_client import ( + workspaces_client, +) class workspaces_volume_encryption_enabled(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/__init__.py b/prowler/providers/azure/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/__init__.py rename to prowler/providers/azure/__init__.py diff --git a/providers/azure/azure_provider.py b/prowler/providers/azure/azure_provider.py similarity index 97% rename from providers/azure/azure_provider.py rename to prowler/providers/azure/azure_provider.py index 53c8ade1..e9f47db2 100644 --- a/providers/azure/azure_provider.py +++ b/prowler/providers/azure/azure_provider.py @@ -5,9 +5,12 @@ from azure.identity import DefaultAzureCredential, InteractiveBrowserCredential from azure.mgmt.subscription import SubscriptionClient from msgraph.core import GraphClient -from lib.logger import logger -from providers.azure.lib.audit_info.audit_info import azure_audit_info -from providers.azure.lib.audit_info.models import Azure_Audit_Info, Azure_Identity_Info +from prowler.lib.logger import logger +from prowler.providers.azure.lib.audit_info.audit_info import azure_audit_info +from prowler.providers.azure.lib.audit_info.models import ( + Azure_Audit_Info, + Azure_Identity_Info, +) class Azure_Provider: diff --git a/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/__init__.py b/prowler/providers/azure/lib/audit_info/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/__init__.py rename to prowler/providers/azure/lib/audit_info/__init__.py diff --git a/prowler/providers/azure/lib/audit_info/audit_info.py b/prowler/providers/azure/lib/audit_info/audit_info.py new file mode 100644 index 00000000..53bf08d8 --- /dev/null +++ b/prowler/providers/azure/lib/audit_info/audit_info.py @@ -0,0 +1,6 @@ +from prowler.providers.azure.lib.audit_info.models import ( + Azure_Audit_Info, + Azure_Identity_Info, +) + +azure_audit_info = Azure_Audit_Info(credentials=None, identity=Azure_Identity_Info()) diff --git a/providers/azure/lib/audit_info/models.py b/prowler/providers/azure/lib/audit_info/models.py similarity index 100% rename from providers/azure/lib/audit_info/models.py rename to prowler/providers/azure/lib/audit_info/models.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/__init__.py b/prowler/providers/azure/services/defender/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/__init__.py rename to prowler/providers/azure/services/defender/__init__.py diff --git a/prowler/providers/azure/services/defender/defender_client.py b/prowler/providers/azure/services/defender/defender_client.py new file mode 100644 index 00000000..f2f50f1a --- /dev/null +++ b/prowler/providers/azure/services/defender/defender_client.py @@ -0,0 +1,4 @@ +from prowler.providers.azure.lib.audit_info.audit_info import azure_audit_info +from prowler.providers.azure.services.defender.defender_service import Defender + +defender_client = Defender(azure_audit_info) diff --git a/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.py similarity index 85% rename from providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.py index 70bb004c..7fc6eb37 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_app_services_is_on(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.py similarity index 85% rename from providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.py index d507f3fa..9e37c62c 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_arm_is_on(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.py similarity index 86% rename from providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.py index 66b9bee0..6bece7ec 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_azure_sql_databases_is_on(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.py similarity index 85% rename from providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.py index 055af9ad..11352e1d 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_containers_is_on(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_server_is_on/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.py similarity index 85% rename from providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.py index 5bd5e345..c6a5800e 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_cosmosdb_is_on(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.py similarity index 88% rename from providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.py index 5b2418bf..51f95664 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_databases_is_on(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.py similarity index 85% rename from providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.py index b6d5b0ae..6bfae5b8 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_dns_is_on(Check): diff --git a/providers/azure/services/iam/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/__init__.py similarity index 100% rename from providers/azure/services/iam/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.py similarity index 85% rename from providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.py index 2f1bdb04..e7404977 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_keyvault_is_on(Check): diff --git a/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/__init__.py similarity index 100% rename from providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.py similarity index 87% rename from providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.py index ae270738..2b79648d 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_os_relational_databases_is_on(Check): diff --git a/providers/azure/services/storage/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/__init__.py similarity index 100% rename from providers/azure/services/storage/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.py similarity index 85% rename from providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.py index cace2055..082e5094 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_server_is_on(Check): diff --git a/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_blob_public_access_level_is_disabled/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.py similarity index 86% rename from providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.py index b173b51f..2d0adb0f 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_sql_servers_is_on(Check): diff --git a/providers/azure/services/storage/storage_default_network_access_rule_is_denied/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_default_network_access_rule_is_denied/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.py similarity index 86% rename from providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.py index 3e35ea12..0423d919 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_storage_is_on(Check): diff --git a/providers/azure/services/defender/defender_service.py b/prowler/providers/azure/services/defender/defender_service.py similarity index 98% rename from providers/azure/services/defender/defender_service.py rename to prowler/providers/azure/services/defender/defender_service.py index ec822f39..9c281faa 100644 --- a/providers/azure/services/defender/defender_service.py +++ b/prowler/providers/azure/services/defender/defender_service.py @@ -3,7 +3,7 @@ from datetime import timedelta from azure.mgmt.security import SecurityCenter from pydantic import BaseModel -from lib.logger import logger +from prowler.lib.logger import logger ########################## Defender diff --git a/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/__init__.py b/prowler/providers/azure/services/iam/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/__init__.py rename to prowler/providers/azure/services/iam/__init__.py diff --git a/prowler/providers/azure/services/iam/iam_client.py b/prowler/providers/azure/services/iam/iam_client.py new file mode 100644 index 00000000..b4d7fd42 --- /dev/null +++ b/prowler/providers/azure/services/iam/iam_client.py @@ -0,0 +1,4 @@ +from prowler.providers.azure.lib.audit_info.audit_info import azure_audit_info +from prowler.providers.azure.services.iam.iam_service import IAM + +iam_client = IAM(azure_audit_info) diff --git a/providers/azure/services/iam/iam_service.py b/prowler/providers/azure/services/iam/iam_service.py similarity index 98% rename from providers/azure/services/iam/iam_service.py rename to prowler/providers/azure/services/iam/iam_service.py index 42640e45..71f4d2ec 100644 --- a/providers/azure/services/iam/iam_service.py +++ b/prowler/providers/azure/services/iam/iam_service.py @@ -3,7 +3,7 @@ from dataclasses import dataclass from azure.mgmt.authorization import AuthorizationManagementClient from azure.mgmt.authorization.v2022_04_01.models import Permission -from lib.logger import logger +from prowler.lib.logger import logger ########################## IAM diff --git a/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/__init__.py b/prowler/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/__init__.py rename to prowler/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/__init__.py diff --git a/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.metadata.json b/prowler/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.metadata.json similarity index 100% rename from providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.metadata.json rename to prowler/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.metadata.json diff --git a/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.py b/prowler/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.py similarity index 89% rename from providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.py rename to prowler/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.py index 1d0bcf12..a14210e0 100644 --- a/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.py +++ b/prowler/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.py @@ -1,7 +1,7 @@ from re import search -from lib.check.models import Check, Check_Report -from providers.azure.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.iam.iam_client import iam_client class iam_subscription_roles_owner_custom_not_created(Check): diff --git a/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/__init__.py b/prowler/providers/azure/services/storage/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_ensure_minimum_tls_version_12/__init__.py rename to prowler/providers/azure/services/storage/__init__.py diff --git a/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/__init__.py b/prowler/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/__init__.py rename to prowler/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/__init__.py diff --git a/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.metadata.json b/prowler/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.metadata.json similarity index 100% rename from providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.metadata.json rename to prowler/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.metadata.json diff --git a/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.py b/prowler/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.py similarity index 87% rename from providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.py rename to prowler/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.py index bab51203..a9a89929 100644 --- a/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.py +++ b/prowler/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.storage.storage_client import storage_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.storage.storage_client import storage_client class storage_blob_public_access_level_is_disabled(Check): diff --git a/prowler/providers/azure/services/storage/storage_client.py b/prowler/providers/azure/services/storage/storage_client.py new file mode 100644 index 00000000..2a18d2ca --- /dev/null +++ b/prowler/providers/azure/services/storage/storage_client.py @@ -0,0 +1,4 @@ +from prowler.providers.azure.lib.audit_info.audit_info import azure_audit_info +from prowler.providers.azure.services.storage.storage_service import Storage + +storage_client = Storage(azure_audit_info) diff --git a/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/__init__.py b/prowler/providers/azure/services/storage/storage_default_network_access_rule_is_denied/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_secure_transfer_required_is_enabled/__init__.py rename to prowler/providers/azure/services/storage/storage_default_network_access_rule_is_denied/__init__.py diff --git a/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.metadata.json b/prowler/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.metadata.json similarity index 100% rename from providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.metadata.json rename to prowler/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.metadata.json diff --git a/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.py b/prowler/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.py similarity index 87% rename from providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.py rename to prowler/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.py index df4a4a42..95feb93d 100644 --- a/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.py +++ b/prowler/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.storage.storage_client import storage_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.storage.storage_client import storage_client class storage_default_network_access_rule_is_denied(Check): diff --git a/lib/outputs/fixtures/prowler-output-123456789012.csv b/prowler/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/__init__.py similarity index 100% rename from lib/outputs/fixtures/prowler-output-123456789012.csv rename to prowler/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/__init__.py diff --git a/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.metadata.json b/prowler/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.metadata.json similarity index 100% rename from providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.metadata.json rename to prowler/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.metadata.json diff --git a/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.py b/prowler/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.py similarity index 88% rename from providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.py rename to prowler/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.py index 54838209..1e8734e0 100644 --- a/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.py +++ b/prowler/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.storage.storage_client import storage_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.storage.storage_client import storage_client class storage_ensure_azure_services_are_trusted_to_access_is_enabled(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on_test.py b/prowler/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on_test.py rename to prowler/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/__init__.py diff --git a/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.metadata.json b/prowler/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.metadata.json similarity index 100% rename from providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.metadata.json rename to prowler/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.metadata.json diff --git a/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.py b/prowler/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.py similarity index 87% rename from providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.py rename to prowler/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.py index 3fce778e..83b0de55 100644 --- a/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.py +++ b/prowler/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.storage.storage_client import storage_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.storage.storage_client import storage_client class storage_ensure_encryption_with_customer_managed_keys(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on_test.py b/prowler/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on_test.py rename to prowler/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/__init__.py diff --git a/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.metadata.json b/prowler/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.metadata.json similarity index 100% rename from providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.metadata.json rename to prowler/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.metadata.json diff --git a/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.py b/prowler/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.py similarity index 87% rename from providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.py rename to prowler/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.py index 322ec2e9..1161fa04 100644 --- a/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.py +++ b/prowler/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.storage.storage_client import storage_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.storage.storage_client import storage_client class storage_ensure_minimum_tls_version_12(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on_test.py b/prowler/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on_test.py rename to prowler/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/__init__.py diff --git a/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.metadata.json b/prowler/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.metadata.json similarity index 100% rename from providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.metadata.json rename to prowler/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.metadata.json diff --git a/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.py b/prowler/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.py similarity index 87% rename from providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.py rename to prowler/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.py index 13835bdc..95fed930 100644 --- a/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.py +++ b/prowler/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.storage.storage_client import storage_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.storage.storage_client import storage_client class storage_infrastructure_encryption_is_enabled(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on_test.py b/prowler/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on_test.py rename to prowler/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/__init__.py diff --git a/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.metadata.json b/prowler/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.metadata.json similarity index 100% rename from providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.metadata.json rename to prowler/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.metadata.json diff --git a/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.py b/prowler/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.py similarity index 87% rename from providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.py rename to prowler/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.py index 3790d068..ec1a9cb8 100644 --- a/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.py +++ b/prowler/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.storage.storage_client import storage_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.storage.storage_client import storage_client class storage_secure_transfer_required_is_enabled(Check): diff --git a/providers/azure/services/storage/storage_service.py b/prowler/providers/azure/services/storage/storage_service.py similarity index 98% rename from providers/azure/services/storage/storage_service.py rename to prowler/providers/azure/services/storage/storage_service.py index d6ea71a6..2c9d6cc0 100644 --- a/providers/azure/services/storage/storage_service.py +++ b/prowler/providers/azure/services/storage/storage_service.py @@ -3,7 +3,7 @@ from dataclasses import dataclass from azure.mgmt.storage import StorageManagementClient from azure.mgmt.storage.v2022_09_01.models import NetworkRuleSet -from lib.logger import logger +from prowler.lib.logger import logger ########################## Storage diff --git a/pyproject.toml b/pyproject.toml new file mode 100644 index 00000000..96cce0de --- /dev/null +++ b/pyproject.toml @@ -0,0 +1,66 @@ +[build-system] +requires = ["setuptools>=61.0"] +build-backend = "setuptools.build_meta" + +[project] +name = "prowler-cloud" +# https://peps.python.org/pep-0440/ +version = "3.0.0-rc1" +authors = [{ name = "Toni de la Fuente", email = "toni@blyx.com" }] +maintainers = [ + { name = "Sergio Garcia", email = "sergio@verica.io" }, + { name = "Nacho Rivera", email = "nacho@verica.io" }, + { name = "Pepe Fagoaga", email = "pepe@verica.io" }, +] +description = "Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 240 controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks." +readme = "README.md" +requires-python = ">=3.9" +license = { text = "Apache-2.0" } +classifiers = [ + "Programming Language :: Python :: 3", + "Programming Language :: Python :: 3.9", + "License :: OSI Approved :: Apache Software License", +] + +# https://peps.python.org/pep-0631/ +dependencies = [ + "colorama ~=0.4.4", + "boto3 ~=1.26.17", + "arnparse ~=0.0.2", + "botocore ~=1.29.18", + "pydantic ~=1.9.1", + "shodan ~=1.28.0", + "detect-secrets ~=1.4.0", + "alive-progress ~=2.4.1", + "tabulate ~=0.9.0", + "azure-identity ~=1.12.0", + "azure-storage-blob ~=12.14.1", + "msgraph-core ~=0.2.2", + "azure-mgmt-subscription ~=3.1.1", + "azure-mgmt-authorization ~=3.0.0", + "azure-mgmt-security ~=3.0.0", + "azure-mgmt-storage ~=21.0.0", +] + +[project.urls] +"Homepage" = "https://github.com/prowler-cloud/prowler" +"Documentation" = "https://github.com/prowler-cloud/prowler/blob/master/README.md" +"Issue tracker" = "https://github.com/prowler-cloud/prowler/issues" +"Changelog" = "https://github.com/prowler-cloud/prowler/releases" + +# https://setuptools.pypa.io/en/latest/userguide/package_discovery.html +[tool.setuptools] +include-package-data = true +package-dir = { "prowler" = "prowler" } + +[tool.setuptools.package-data] +# We need the above pattern to include our data files +"*" = ["*.yaml", "*.json"] + +[project.scripts] +prowler = "prowler.__main__:prowler" + +[tool.pytest.ini_options] +pythonpath = [ + "." +] diff --git a/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on_test.py b/tests/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on_test.py rename to tests/__init__.py diff --git a/lib/check/check_test.py b/tests/lib/check/check_test.py similarity index 54% rename from lib/check/check_test.py rename to tests/lib/check/check_test.py index 157dedfc..4b4ea80d 100644 --- a/lib/check/check_test.py +++ b/tests/lib/check/check_test.py @@ -1,14 +1,11 @@ import os -from unittest import mock -from lib.check.check import ( - bulk_load_compliance_frameworks, +from prowler.lib.check.check import ( exclude_checks_to_run, exclude_services_to_run, - parse_checks_from_compliance_framework, parse_checks_from_file, ) -from lib.check.models import load_check_metadata +from prowler.lib.check.models import load_check_metadata class Test_Check: @@ -110,74 +107,74 @@ class Test_Check: == test["expected"] ) - def test_parse_checks_from_compliance_framework_two(self): - test_case = { - "input": {"compliance_frameworks": ["cis_v1.4_aws", "ens_v3_aws"]}, - "expected": { - "vpc_flow_logs_enabled", - "ec2_ebs_snapshot_encryption", - "iam_user_mfa_enabled_console_access", - "cloudtrail_multi_region_enabled", - "ec2_elbv2_insecure_ssl_ciphers", - "guardduty_is_enabled", - "s3_bucket_default_encryption", - "cloudfront_distributions_https_enabled", - "iam_avoid_root_usage", - "s3_bucket_secure_transport_policy", - }, - } - with mock.patch( - "lib.check.check.compliance_specification_dir", - new=f"{os.path.dirname(os.path.realpath(__file__))}/fixtures", - ): - provider = "aws" - bulk_compliance_frameworks = bulk_load_compliance_frameworks(provider) - compliance_frameworks = test_case["input"]["compliance_frameworks"] - assert ( - parse_checks_from_compliance_framework( - compliance_frameworks, bulk_compliance_frameworks - ) - == test_case["expected"] - ) + # def test_parse_checks_from_compliance_framework_two(self): + # test_case = { + # "input": {"compliance_frameworks": ["cis_v1.4_aws", "ens_v3_aws"]}, + # "expected": { + # "vpc_flow_logs_enabled", + # "ec2_ebs_snapshot_encryption", + # "iam_user_mfa_enabled_console_access", + # "cloudtrail_multi_region_enabled", + # "ec2_elbv2_insecure_ssl_ciphers", + # "guardduty_is_enabled", + # "s3_bucket_default_encryption", + # "cloudfront_distributions_https_enabled", + # "iam_avoid_root_usage", + # "s3_bucket_secure_transport_policy", + # }, + # } + # with mock.patch( + # "prowler.lib.check.check.compliance_specification_dir_path", + # new=f"{os.path.dirname(os.path.realpath(__file__))}/fixtures", + # ): + # provider = "aws" + # bulk_compliance_frameworks = bulk_load_compliance_frameworks(provider) + # compliance_frameworks = test_case["input"]["compliance_frameworks"] + # assert ( + # parse_checks_from_compliance_framework( + # compliance_frameworks, bulk_compliance_frameworks + # ) + # == test_case["expected"] + # ) - def test_parse_checks_from_compliance_framework_one(self): - test_case = { - "input": {"compliance_frameworks": ["cis_v1.4_aws"]}, - "expected": { - "iam_user_mfa_enabled_console_access", - "s3_bucket_default_encryption", - "iam_avoid_root_usage", - }, - } - with mock.patch( - "lib.check.check.compliance_specification_dir", - new=f"{os.path.dirname(os.path.realpath(__file__))}/fixtures", - ): - provider = "aws" - bulk_compliance_frameworks = bulk_load_compliance_frameworks(provider) - compliance_frameworks = test_case["input"]["compliance_frameworks"] - assert ( - parse_checks_from_compliance_framework( - compliance_frameworks, bulk_compliance_frameworks - ) - == test_case["expected"] - ) + # def test_parse_checks_from_compliance_framework_one(self): + # test_case = { + # "input": {"compliance_frameworks": ["cis_v1.4_aws"]}, + # "expected": { + # "iam_user_mfa_enabled_console_access", + # "s3_bucket_default_encryption", + # "iam_avoid_root_usage", + # }, + # } + # with mock.patch( + # "prowler.lib.check.check.compliance_specification_dir", + # new=f"{os.path.dirname(os.path.realpath(__file__))}/fixtures", + # ): + # provider = "aws" + # bulk_compliance_frameworks = bulk_load_compliance_frameworks(provider) + # compliance_frameworks = test_case["input"]["compliance_frameworks"] + # assert ( + # parse_checks_from_compliance_framework( + # compliance_frameworks, bulk_compliance_frameworks + # ) + # == test_case["expected"] + # ) - def test_parse_checks_from_compliance_framework_no_compliance(self): - test_case = { - "input": {"compliance_frameworks": []}, - "expected": set(), - } - with mock.patch( - "lib.check.check.compliance_specification_dir", - new=f"{os.path.dirname(os.path.realpath(__file__))}/fixtures", - ): - provider = "aws" - bulk_compliance_frameworks = bulk_load_compliance_frameworks(provider) - compliance_frameworks = test_case["input"]["compliance_frameworks"] - assert ( - parse_checks_from_compliance_framework( - compliance_frameworks, bulk_compliance_frameworks - ) - == test_case["expected"] - ) + # def test_parse_checks_from_compliance_framework_no_compliance(self): + # test_case = { + # "input": {"compliance_frameworks": []}, + # "expected": set(), + # } + # with mock.patch( + # "prowler.lib.check.check.compliance_specification_dir", + # new=f"{os.path.dirname(os.path.realpath(__file__))}/fixtures", + # ): + # provider = "aws" + # bulk_compliance_frameworks = bulk_load_compliance_frameworks(provider) + # compliance_frameworks = test_case["input"]["compliance_frameworks"] + # assert ( + # parse_checks_from_compliance_framework( + # compliance_frameworks, bulk_compliance_frameworks + # ) + # == test_case["expected"] + # ) diff --git a/lib/check/fixtures/aws/cis_v1.4_aws.json b/tests/lib/check/fixtures/aws/cis_v1.4_aws.json similarity index 100% rename from lib/check/fixtures/aws/cis_v1.4_aws.json rename to tests/lib/check/fixtures/aws/cis_v1.4_aws.json diff --git a/lib/check/fixtures/aws/ens_v3_aws.json b/tests/lib/check/fixtures/aws/ens_v3_aws.json similarity index 100% rename from lib/check/fixtures/aws/ens_v3_aws.json rename to tests/lib/check/fixtures/aws/ens_v3_aws.json diff --git a/lib/check/fixtures/checklistA.json b/tests/lib/check/fixtures/checklistA.json similarity index 100% rename from lib/check/fixtures/checklistA.json rename to tests/lib/check/fixtures/checklistA.json diff --git a/lib/check/fixtures/groupsA.json b/tests/lib/check/fixtures/groupsA.json similarity index 100% rename from lib/check/fixtures/groupsA.json rename to tests/lib/check/fixtures/groupsA.json diff --git a/lib/check/fixtures/metadata.json b/tests/lib/check/fixtures/metadata.json similarity index 95% rename from lib/check/fixtures/metadata.json rename to tests/lib/check/fixtures/metadata.json index a58137d8..f1b61c48 100644 --- a/lib/check/fixtures/metadata.json +++ b/tests/lib/check/fixtures/metadata.json @@ -5,7 +5,9 @@ ], "CheckID": "iam_disable_30_days_credentials", "CheckTitle": "Ensure credentials unused for 30 days or greater are disabled", - "CheckType": ["Software and Configuration Checks"], + "CheckType": [ + "Software and Configuration Checks" + ], "Compliance": [ { "Control": [ diff --git a/lib/outputs/fixtures/metadata.json b/tests/lib/outputs/fixtures/metadata.json similarity index 95% rename from lib/outputs/fixtures/metadata.json rename to tests/lib/outputs/fixtures/metadata.json index a58137d8..f1b61c48 100644 --- a/lib/outputs/fixtures/metadata.json +++ b/tests/lib/outputs/fixtures/metadata.json @@ -5,7 +5,9 @@ ], "CheckID": "iam_disable_30_days_credentials", "CheckTitle": "Ensure credentials unused for 30 days or greater are disabled", - "CheckType": ["Software and Configuration Checks"], + "CheckType": [ + "Software and Configuration Checks" + ], "Compliance": [ { "Control": [ diff --git a/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on_test.py b/tests/lib/outputs/fixtures/prowler-output-123456789012.csv similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on_test.py rename to tests/lib/outputs/fixtures/prowler-output-123456789012.csv diff --git a/lib/outputs/outputs_test.py b/tests/lib/outputs/outputs_test.py similarity index 97% rename from lib/outputs/outputs_test.py rename to tests/lib/outputs/outputs_test.py index c36f91e0..589ad1bf 100644 --- a/lib/outputs/outputs_test.py +++ b/tests/lib/outputs/outputs_test.py @@ -6,7 +6,7 @@ import pytest from colorama import Fore from moto import mock_s3 -from config.config import ( +from prowler.config.config import ( csv_file_suffix, json_asff_file_suffix, json_file_suffix, @@ -16,8 +16,8 @@ from config.config import ( timestamp_iso, timestamp_utc, ) -from lib.check.models import Check_Report, load_check_metadata -from lib.outputs.models import ( +from prowler.lib.check.models import Check_Report, load_check_metadata +from prowler.lib.outputs.models import ( Check_Output_CSV, Check_Output_JSON, Check_Output_JSON_ASFF, @@ -26,7 +26,7 @@ from lib.outputs.models import ( Resource, Severity, ) -from lib.outputs.outputs import ( +from prowler.lib.outputs.outputs import ( fill_file_descriptors, fill_json, fill_json_asff, @@ -34,8 +34,8 @@ from lib.outputs.outputs import ( send_to_s3_bucket, set_report_color, ) -from lib.utils.utils import hash_sha512, open_file -from providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.lib.utils.utils import hash_sha512, open_file +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info class Test_Outputs: diff --git a/providers/aws/aws_provider_test.py b/tests/providers/aws/aws_provider_test.py similarity index 98% rename from providers/aws/aws_provider_test.py rename to tests/providers/aws/aws_provider_test.py index fabea747..4f573bb4 100644 --- a/providers/aws/aws_provider_test.py +++ b/tests/providers/aws/aws_provider_test.py @@ -4,13 +4,13 @@ import boto3 import sure # noqa from moto import mock_iam, mock_organizations, mock_sts -from providers.aws.aws_provider import ( +from prowler.providers.aws.aws_provider import ( assume_role, get_organizations_metadata, get_region_global_service, validate_credentials, ) -from providers.aws.lib.audit_info.models import AWS_Assume_Role, AWS_Audit_Info +from prowler.providers.aws.lib.audit_info.models import AWS_Assume_Role, AWS_Audit_Info ACCOUNT_ID = 123456789012 diff --git a/providers/aws/lib/allowlist/allowlist_test.py b/tests/providers/aws/lib/allowlist/allowlist_test.py similarity index 92% rename from providers/aws/lib/allowlist/allowlist_test.py rename to tests/providers/aws/lib/allowlist/allowlist_test.py index 607d7f1c..7c79e1a6 100644 --- a/providers/aws/lib/allowlist/allowlist_test.py +++ b/tests/providers/aws/lib/allowlist/allowlist_test.py @@ -2,8 +2,11 @@ import yaml from boto3 import resource, session from moto import mock_dynamodb, mock_s3 -from providers.aws.lib.allowlist.allowlist import is_allowlisted, parse_allowlist_file -from providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.lib.allowlist.allowlist import ( + is_allowlisted, + parse_allowlist_file, +) +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" @@ -41,12 +44,12 @@ class Test_Allowlist: s3_resource.create_bucket(Bucket="test-allowlist") s3_resource.Object("test-allowlist", "allowlist.yaml").put( Body=open( - "providers/aws/lib/allowlist/fixtures/allowlist.yaml", + "tests/providers/aws/lib/allowlist/fixtures/allowlist.yaml", "rb", ) ) - with open("providers/aws/lib/allowlist/fixtures/allowlist.yaml") as f: + with open("tests/providers/aws/lib/allowlist/fixtures/allowlist.yaml") as f: assert yaml.safe_load(f)["Allowlist"] == parse_allowlist_file( audit_info, "s3://test-allowlist/allowlist.yaml" ) diff --git a/providers/aws/lib/allowlist/fixtures/allowlist.yaml b/tests/providers/aws/lib/allowlist/fixtures/allowlist.yaml similarity index 100% rename from providers/aws/lib/allowlist/fixtures/allowlist.yaml rename to tests/providers/aws/lib/allowlist/fixtures/allowlist.yaml diff --git a/providers/aws/lib/arn/arn_test.py b/tests/providers/aws/lib/arn/arn_test.py similarity index 95% rename from providers/aws/lib/arn/arn_test.py rename to tests/providers/aws/lib/arn/arn_test.py index deabb281..df16a58f 100644 --- a/providers/aws/lib/arn/arn_test.py +++ b/tests/providers/aws/lib/arn/arn_test.py @@ -1,6 +1,6 @@ import sure # noqa -from providers.aws.lib.arn.arn import arn_parsing +from prowler.providers.aws.lib.arn.arn import arn_parsing ACCOUNT_ID = "123456789012" RESOURCE_TYPE = "role" diff --git a/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings_test.py b/tests/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings_test.py similarity index 77% rename from providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings_test.py rename to tests/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings_test.py index 4284023f..4f2fd2bf 100644 --- a/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings_test.py +++ b/tests/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings_test.py @@ -1,6 +1,8 @@ from unittest import mock -from providers.aws.services.accessanalyzer.accessanalyzer_service import Analyzer +from prowler.providers.aws.services.accessanalyzer.accessanalyzer_service import ( + Analyzer, +) class Test_accessanalyzer_enabled_without_findings: @@ -8,11 +10,11 @@ class Test_accessanalyzer_enabled_without_findings: accessanalyzer_client = mock.MagicMock accessanalyzer_client.analyzers = [] with mock.patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", new=accessanalyzer_client, ): # Test Check - from providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( + from prowler.providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( accessanalyzer_enabled_without_findings, ) @@ -36,10 +38,10 @@ class Test_accessanalyzer_enabled_without_findings: ) ] with mock.patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", accessanalyzer_client, ): - from providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( + from prowler.providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( accessanalyzer_enabled_without_findings, ) @@ -76,11 +78,11 @@ class Test_accessanalyzer_enabled_without_findings: # Patch AccessAnalyzer Client with mock.patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", new=accessanalyzer_client, ): # Test Check - from providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( + from prowler.providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( accessanalyzer_enabled_without_findings, ) @@ -113,11 +115,11 @@ class Test_accessanalyzer_enabled_without_findings: ] with mock.patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", new=accessanalyzer_client, ): # Test Check - from providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( + from prowler.providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( accessanalyzer_enabled_without_findings, ) @@ -147,11 +149,11 @@ class Test_accessanalyzer_enabled_without_findings: ] # Patch AccessAnalyzer Client with mock.patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", new=accessanalyzer_client, ): # Test Check - from providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( + from prowler.providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( accessanalyzer_enabled_without_findings, ) diff --git a/providers/aws/services/accessanalyzer/accessanalyzer_service_test.py b/tests/providers/aws/services/accessanalyzer/accessanalyzer_service_test.py similarity index 91% rename from providers/aws/services/accessanalyzer/accessanalyzer_service_test.py rename to tests/providers/aws/services/accessanalyzer/accessanalyzer_service_test.py index 812de8d1..42376cc8 100644 --- a/providers/aws/services/accessanalyzer/accessanalyzer_service_test.py +++ b/tests/providers/aws/services/accessanalyzer/accessanalyzer_service_test.py @@ -2,8 +2,10 @@ from unittest.mock import patch import botocore -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.accessanalyzer.accessanalyzer_service import AccessAnalyzer +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.accessanalyzer.accessanalyzer_service import ( + AccessAnalyzer, +) # Mock Test Region AWS_REGION = "eu-west-1" @@ -51,7 +53,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_AccessAnalyzer_Service: diff --git a/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check_test.py b/tests/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check_test.py similarity index 69% rename from providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check_test.py rename to tests/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check_test.py index 408a18b0..f5904d47 100644 --- a/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check_test.py +++ b/tests/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check_test.py @@ -15,17 +15,17 @@ class Test_acm_certificates_expiration_check: certificate = acm_client.request_certificate( DomainName="test.com", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.acm.acm_service import ACM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.acm.acm_service import ACM current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check.acm_client", + "prowler.providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check.acm_client", new=ACM(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check import ( + from prowler.providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check import ( acm_certificates_expiration_check, ) @@ -46,17 +46,17 @@ class Test_acm_certificates_expiration_check: certificate = acm_client.request_certificate( DomainName="test.com", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.acm.acm_service import ACM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.acm.acm_service import ACM current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check.acm_client", + "prowler.providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check.acm_client", new=ACM(current_audit_info), ): # Test Check - from providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check import ( + from prowler.providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check import ( acm_certificates_expiration_check, ) diff --git a/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled_test.py b/tests/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled_test.py similarity index 71% rename from providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled_test.py rename to tests/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled_test.py index 2b4c5eb2..55310729 100644 --- a/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled_test.py +++ b/tests/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled_test.py @@ -16,17 +16,17 @@ class Test_acm_certificates_transparency_logs_enabled: DomainName="test.com", Options={"CertificateTransparencyLoggingPreference": "ENABLED"}, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.acm.acm_service import ACM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.acm.acm_service import ACM current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled.acm_client", + "prowler.providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled.acm_client", new=ACM(current_audit_info), ): # Test Check - from providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled import ( + from prowler.providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled import ( acm_certificates_transparency_logs_enabled, ) @@ -51,17 +51,17 @@ class Test_acm_certificates_transparency_logs_enabled: DomainName="test.com", Options={"CertificateTransparencyLoggingPreference": "ENABLED"}, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.acm.acm_service import ACM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.acm.acm_service import ACM current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled.acm_client", + "prowler.providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled.acm_client", new=ACM(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled import ( + from prowler.providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled import ( acm_certificates_transparency_logs_enabled, ) @@ -86,17 +86,17 @@ class Test_acm_certificates_transparency_logs_enabled: certificate = acm_client.request_certificate( DomainName="test.com", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.acm.acm_service import ACM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.acm.acm_service import ACM current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled.acm_client", + "prowler.providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled.acm_client", new=ACM(current_audit_info), ): # Test Check - from providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled import ( + from prowler.providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled import ( acm_certificates_transparency_logs_enabled, ) diff --git a/providers/aws/services/acm/acm_service_test.py b/tests/providers/aws/services/acm/acm_service_test.py similarity index 95% rename from providers/aws/services/acm/acm_service_test.py rename to tests/providers/aws/services/acm/acm_service_test.py index 123bb826..44b82e48 100644 --- a/providers/aws/services/acm/acm_service_test.py +++ b/tests/providers/aws/services/acm/acm_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, session from moto import mock_acm -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.acm.acm_service import ACM +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.acm.acm_service import ACM AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled_test.py b/tests/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled_test.py similarity index 71% rename from providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled_test.py rename to tests/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled_test.py index b53b11e7..0b15333c 100644 --- a/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled_test.py +++ b/tests/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled_test.py @@ -10,17 +10,19 @@ AWS_REGION = "us-east-1" class Test_apigateway_authorizers_enabled: @mock_apigateway def test_apigateway_no_rest_apis(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled import ( apigateway_authorizers_enabled, ) @@ -60,17 +62,19 @@ class Test_apigateway_authorizers_enabled: type="TOKEN", authorizerUri=f"arn:aws:apigateway:{apigateway_client.meta.region_name}:lambda:path/2015-03-31/functions/arn:aws:lambda:{apigateway_client.meta.region_name}:{ACCOUNT_ID}:function:{authorizer['FunctionName']}/invocations", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled import ( apigateway_authorizers_enabled, ) @@ -93,17 +97,19 @@ class Test_apigateway_authorizers_enabled: rest_api = apigateway_client.create_rest_api( name="test-rest-api", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled import ( apigateway_authorizers_enabled, ) diff --git a/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled_test.py b/tests/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled_test.py similarity index 71% rename from providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled_test.py rename to tests/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled_test.py index 2cab3861..dbdb3026 100644 --- a/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled_test.py +++ b/tests/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled_test.py @@ -3,7 +3,7 @@ from unittest import mock from boto3 import client from moto import mock_apigateway -from providers.aws.services.apigateway.apigateway_service import Stage +from prowler.providers.aws.services.apigateway.apigateway_service import Stage AWS_REGION = "us-east-1" @@ -17,17 +17,19 @@ class Test_apigateway_client_certificate_enabled: apigateway_client.create_rest_api( name="test-rest-api", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled import ( apigateway_client_certificate_enabled, ) @@ -71,17 +73,19 @@ class Test_apigateway_client_certificate_enabled: restApiId=rest_api["id"], stageName="test", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled import ( apigateway_client_certificate_enabled, ) @@ -105,17 +109,19 @@ class Test_apigateway_client_certificate_enabled: rest_api = apigateway_client.create_rest_api( name="test-rest-api", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled.apigateway_client", new=APIGateway(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled import ( apigateway_client_certificate_enabled, ) diff --git a/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public_test.py b/tests/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public_test.py similarity index 66% rename from providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public_test.py rename to tests/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public_test.py index 8f83553d..cf6f8955 100644 --- a/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public_test.py +++ b/tests/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public_test.py @@ -9,17 +9,19 @@ AWS_REGION = "us-east-1" class Test_apigateway_endpoint_public: @mock_apigateway def test_apigateway_no_rest_apis(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public import ( + from prowler.providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public import ( apigateway_endpoint_public, ) @@ -41,17 +43,19 @@ class Test_apigateway_endpoint_public: ] }, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public import ( + from prowler.providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public import ( apigateway_endpoint_public, ) @@ -79,17 +83,19 @@ class Test_apigateway_endpoint_public: ] }, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public import ( + from prowler.providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public import ( apigateway_endpoint_public, ) diff --git a/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled_test.py b/tests/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled_test.py similarity index 77% rename from providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled_test.py rename to tests/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled_test.py index 1560d13b..58a00f0d 100644 --- a/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled_test.py +++ b/tests/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled_test.py @@ -9,17 +9,19 @@ AWS_REGION = "us-east-1" class Test_apigateway_logging_enabled: @mock_apigateway def test_apigateway_no_rest_apis(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled import ( apigateway_logging_enabled, ) @@ -73,17 +75,19 @@ class Test_apigateway_logging_enabled: }, ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled import ( apigateway_logging_enabled, ) @@ -134,17 +138,19 @@ class Test_apigateway_logging_enabled: stageName="test", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled import ( apigateway_logging_enabled, ) diff --git a/providers/aws/services/apigateway/apigateway_service_test.py b/tests/providers/aws/services/apigateway/apigateway_service_test.py similarity index 97% rename from providers/aws/services/apigateway/apigateway_service_test.py rename to tests/providers/aws/services/apigateway/apigateway_service_test.py index 63e424bf..685ca303 100644 --- a/providers/aws/services/apigateway/apigateway_service_test.py +++ b/tests/providers/aws/services/apigateway/apigateway_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, session from moto import mock_apigateway -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.apigateway.apigateway_service import APIGateway +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.apigateway.apigateway_service import APIGateway AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached_test.py b/tests/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached_test.py similarity index 78% rename from providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached_test.py rename to tests/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached_test.py index 7c502107..6cd18cb9 100644 --- a/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached_test.py +++ b/tests/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached_test.py @@ -9,17 +9,19 @@ AWS_REGION = "us-east-1" class Test_apigateway_waf_acl_attached: @mock_apigateway def test_apigateway_no_rest_apis(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached import ( + from prowler.providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached import ( apigateway_waf_acl_attached, ) @@ -79,17 +81,19 @@ class Test_apigateway_waf_acl_attached: ResourceArn=f"arn:aws:apigateway:{apigateway_client.meta.region_name}::/restapis/{rest_api['id']}/stages/test", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached import ( + from prowler.providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached import ( apigateway_waf_acl_attached, ) @@ -140,17 +144,19 @@ class Test_apigateway_waf_acl_attached: stageName="test", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached import ( + from prowler.providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached import ( apigateway_waf_acl_attached, ) diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled_test.py b/tests/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled_test.py similarity index 73% rename from providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled_test.py rename to tests/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled_test.py index d97bbd50..93ca81e8 100644 --- a/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled_test.py +++ b/tests/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled_test.py @@ -38,19 +38,19 @@ def mock_make_api_call(self, operation_name, kwarg): class Test_apigatewayv2_access_logging_enabled: @mock_apigatewayv2 def test_apigateway_no_apis(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigatewayv2.apigatewayv2_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_service import ( ApiGatewayV2, ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled.apigatewayv2_client", + "prowler.providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled.apigatewayv2_client", new=ApiGatewayV2(current_audit_info), ): # Test Check - from providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled import ( + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled import ( apigatewayv2_access_logging_enabled, ) @@ -66,19 +66,19 @@ class Test_apigatewayv2_access_logging_enabled: # Create ApiGatewayV2 API api = apigatewayv2_client.create_api(Name="test-api", ProtocolType="HTTP") # Get stages mock with stage with logging - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigatewayv2.apigatewayv2_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_service import ( ApiGatewayV2, ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled.apigatewayv2_client", + "prowler.providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled.apigatewayv2_client", new=ApiGatewayV2(current_audit_info), ): # Test Check - from providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled import ( + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled import ( apigatewayv2_access_logging_enabled, ) diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled_test.py b/tests/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled_test.py similarity index 75% rename from providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled_test.py rename to tests/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled_test.py index b9b8c231..2838b68b 100644 --- a/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled_test.py +++ b/tests/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled_test.py @@ -38,19 +38,19 @@ def mock_make_api_call(self, operation_name, kwarg): class Test_apigatewayv2_authorizers_enabled: @mock_apigatewayv2 def test_apigateway_no_apis(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigatewayv2.apigatewayv2_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_service import ( ApiGatewayV2, ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled.apigatewayv2_client", + "prowler.providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled.apigatewayv2_client", new=ApiGatewayV2(current_audit_info), ): # Test Check - from providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled import ( + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled import ( apigatewayv2_authorizers_enabled, ) @@ -72,19 +72,19 @@ class Test_apigatewayv2_authorizers_enabled: Name="auth1", AuthorizerPayloadFormatVersion="2.0", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigatewayv2.apigatewayv2_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_service import ( ApiGatewayV2, ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled.apigatewayv2_client", + "prowler.providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled.apigatewayv2_client", new=ApiGatewayV2(current_audit_info), ): # Test Check - from providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled import ( + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled import ( apigatewayv2_authorizers_enabled, ) diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_service_test.py b/tests/providers/aws/services/apigatewayv2/apigatewayv2_service_test.py similarity index 96% rename from providers/aws/services/apigatewayv2/apigatewayv2_service_test.py rename to tests/providers/aws/services/apigatewayv2/apigatewayv2_service_test.py index 59ce6dec..65b2da91 100644 --- a/providers/aws/services/apigatewayv2/apigatewayv2_service_test.py +++ b/tests/providers/aws/services/apigatewayv2/apigatewayv2_service_test.py @@ -3,8 +3,10 @@ from boto3 import client, session from mock import patch from moto import mock_apigatewayv2 -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.apigatewayv2.apigatewayv2_service import ApiGatewayV2 +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.apigatewayv2.apigatewayv2_service import ( + ApiGatewayV2, +) AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled_test.py b/tests/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled_test.py similarity index 82% rename from providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled_test.py rename to tests/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled_test.py index ee9d1b27..dad123e8 100644 --- a/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled_test.py +++ b/tests/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.appstream.appstream_service import Fleet +from prowler.providers.aws.services.appstream.appstream_service import Fleet # Mock Test Region AWS_REGION = "eu-west-1" @@ -11,11 +11,11 @@ class Test_appstream_fleet_default_internet_access_disabled: appstream_client = mock.MagicMock appstream_client.fleets = [] with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( + from prowler.providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( appstream_fleet_default_internet_access_disabled, ) @@ -40,11 +40,11 @@ class Test_appstream_fleet_default_internet_access_disabled: appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( + from prowler.providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( appstream_fleet_default_internet_access_disabled, ) @@ -77,11 +77,11 @@ class Test_appstream_fleet_default_internet_access_disabled: appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( + from prowler.providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( appstream_fleet_default_internet_access_disabled, ) @@ -124,11 +124,11 @@ class Test_appstream_fleet_default_internet_access_disabled: appstream_client.fleets.append(fleet2) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( + from prowler.providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( appstream_fleet_default_internet_access_disabled, ) diff --git a/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration_test.py b/tests/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration_test.py similarity index 84% rename from providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration_test.py rename to tests/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration_test.py index 8742f7d5..9901d804 100644 --- a/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration_test.py +++ b/tests/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.appstream.appstream_service import Fleet +from prowler.providers.aws.services.appstream.appstream_service import Fleet # Mock Test Region AWS_REGION = "eu-west-1" @@ -11,11 +11,11 @@ class Test_appstream_fleet_maximum_session_duration: appstream_client = mock.MagicMock appstream_client.fleets = [] with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( + from prowler.providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( appstream_fleet_maximum_session_duration, ) @@ -41,11 +41,11 @@ class Test_appstream_fleet_maximum_session_duration: appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( + from prowler.providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( appstream_fleet_maximum_session_duration, ) @@ -79,11 +79,11 @@ class Test_appstream_fleet_maximum_session_duration: appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( + from prowler.providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( appstream_fleet_maximum_session_duration, ) @@ -130,11 +130,11 @@ class Test_appstream_fleet_maximum_session_duration: appstream_client.fleets.append(fleet2) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( + from prowler.providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( appstream_fleet_maximum_session_duration, ) diff --git a/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout_test.py b/tests/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout_test.py similarity index 84% rename from providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout_test.py rename to tests/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout_test.py index aaedf89d..b380e592 100644 --- a/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout_test.py +++ b/tests/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.appstream.appstream_service import Fleet +from prowler.providers.aws.services.appstream.appstream_service import Fleet # Mock Test Region AWS_REGION = "eu-west-1" @@ -11,11 +11,11 @@ class Test_appstream_fleet_session_disconnect_timeout: appstream_client = mock.MagicMock appstream_client.fleets = [] with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( appstream_fleet_session_disconnect_timeout, ) @@ -41,11 +41,11 @@ class Test_appstream_fleet_session_disconnect_timeout: appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( appstream_fleet_session_disconnect_timeout, ) @@ -79,11 +79,11 @@ class Test_appstream_fleet_session_disconnect_timeout: appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( appstream_fleet_session_disconnect_timeout, ) @@ -130,11 +130,11 @@ class Test_appstream_fleet_session_disconnect_timeout: appstream_client.fleets.append(fleet2) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( appstream_fleet_session_disconnect_timeout, ) diff --git a/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout_test.py b/tests/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout_test.py similarity index 83% rename from providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout_test.py rename to tests/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout_test.py index c6e6fbbf..a96b193e 100644 --- a/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout_test.py +++ b/tests/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.appstream.appstream_service import Fleet +from prowler.providers.aws.services.appstream.appstream_service import Fleet # Mock Test Region AWS_REGION = "eu-west-1" @@ -11,11 +11,11 @@ class Test_appstream_fleet_session_idle_disconnect_timeout: appstream_client = mock.MagicMock appstream_client.fleets = [] with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( appstream_fleet_session_idle_disconnect_timeout, ) @@ -41,11 +41,11 @@ class Test_appstream_fleet_session_idle_disconnect_timeout: appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( appstream_fleet_session_idle_disconnect_timeout, ) @@ -79,11 +79,11 @@ class Test_appstream_fleet_session_idle_disconnect_timeout: appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( appstream_fleet_session_idle_disconnect_timeout, ) @@ -130,11 +130,11 @@ class Test_appstream_fleet_session_idle_disconnect_timeout: appstream_client.fleets.append(fleet2) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( appstream_fleet_session_idle_disconnect_timeout, ) diff --git a/providers/aws/services/appstream/appstream_service_test.py b/tests/providers/aws/services/appstream/appstream_service_test.py similarity index 94% rename from providers/aws/services/appstream/appstream_service_test.py rename to tests/providers/aws/services/appstream/appstream_service_test.py index f1144c84..0d3b2508 100644 --- a/providers/aws/services/appstream/appstream_service_test.py +++ b/tests/providers/aws/services/appstream/appstream_service_test.py @@ -3,8 +3,8 @@ from unittest.mock import patch import botocore from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.appstream.appstream_service import AppStream +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.appstream.appstream_service import AppStream # Mock Test Region AWS_REGION = "eu-west-1" @@ -56,7 +56,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.appstream.appstream_service.generate_regional_clients", + "prowler.providers.aws.services.appstream.appstream_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_AppStream_Service: diff --git a/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration_test.py b/tests/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration_test.py similarity index 64% rename from providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration_test.py rename to tests/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration_test.py index 8737b86a..28495cae 100644 --- a/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration_test.py +++ b/tests/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration_test.py @@ -12,17 +12,19 @@ class Test_autoscaling_find_secrets_ec2_launch_configuration: autoscaling_client = client("autoscaling", region_name=AWS_REGION) autoscaling_client.launch_configurations = [] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.autoscaling.autoscaling_service import AutoScaling + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.autoscaling.autoscaling_service import ( + AutoScaling, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", + "prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", new=AutoScaling(current_audit_info), ): # Test Check - from providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( + from prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( autoscaling_find_secrets_ec2_launch_configuration, ) @@ -44,16 +46,18 @@ class Test_autoscaling_find_secrets_ec2_launch_configuration: UserData="This is some user_data", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.autoscaling.autoscaling_service import AutoScaling + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.autoscaling.autoscaling_service import ( + AutoScaling, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", + "prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", new=AutoScaling(current_audit_info), ): - from providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( + from prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( autoscaling_find_secrets_ec2_launch_configuration, ) @@ -81,16 +85,18 @@ class Test_autoscaling_find_secrets_ec2_launch_configuration: UserData="DB_PASSWORD=foobar123", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.autoscaling.autoscaling_service import AutoScaling + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.autoscaling.autoscaling_service import ( + AutoScaling, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", + "prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", new=AutoScaling(current_audit_info), ): - from providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( + from prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( autoscaling_find_secrets_ec2_launch_configuration, ) @@ -109,7 +115,7 @@ class Test_autoscaling_find_secrets_ec2_launch_configuration: def test_one_autoscaling_file_with_secrets(self): # Include launch_configurations to check f = open( - "providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/fixtures/fixture", + "prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/fixtures/fixture", "r", ) secrets = f.read() @@ -123,16 +129,18 @@ class Test_autoscaling_find_secrets_ec2_launch_configuration: UserData=secrets, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.autoscaling.autoscaling_service import AutoScaling + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.autoscaling.autoscaling_service import ( + AutoScaling, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", + "prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", new=AutoScaling(current_audit_info), ): - from providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( + from prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( autoscaling_find_secrets_ec2_launch_configuration, ) @@ -159,16 +167,18 @@ class Test_autoscaling_find_secrets_ec2_launch_configuration: SecurityGroups=["default", "default2"], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.autoscaling.autoscaling_service import AutoScaling + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.autoscaling.autoscaling_service import ( + AutoScaling, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", + "prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", new=AutoScaling(current_audit_info), ): - from providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( + from prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( autoscaling_find_secrets_ec2_launch_configuration, ) diff --git a/providers/aws/services/autoscaling/autoscaling_service_test.py b/tests/providers/aws/services/autoscaling/autoscaling_service_test.py similarity index 95% rename from providers/aws/services/autoscaling/autoscaling_service_test.py rename to tests/providers/aws/services/autoscaling/autoscaling_service_test.py index 9513df36..1566b7a0 100644 --- a/providers/aws/services/autoscaling/autoscaling_service_test.py +++ b/tests/providers/aws/services/autoscaling/autoscaling_service_test.py @@ -3,8 +3,8 @@ from base64 import b64decode from boto3 import client, session from moto import mock_autoscaling -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.autoscaling.autoscaling_service import AutoScaling +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.autoscaling.autoscaling_service import AutoScaling AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled_test.py b/tests/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled_test.py similarity index 72% rename from providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled_test.py rename to tests/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled_test.py index 75b0dc81..d05a958d 100644 --- a/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled_test.py @@ -5,8 +5,8 @@ from mock import patch from moto import mock_cloudtrail, mock_s3 from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import AWS_Audit_Info -from providers.aws.services.awslambda.awslambda_service import Function +from prowler.providers.aws.lib.audit_info.audit_info import AWS_Audit_Info +from prowler.providers.aws.services.awslambda.awslambda_service import Function AWS_REGION = "us-east-1" @@ -20,7 +20,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_awslambda_function_invoke_api_operations_cloudtrail_logging_enabled: @@ -50,20 +50,22 @@ class Test_awslambda_function_invoke_api_operations_cloudtrail_logging_enabled: lambda_client = mock.MagicMock lambda_client.functions = {} - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.cloudtrail_client", new=Cloudtrail(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled import ( + from prowler.providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled import ( awslambda_function_invoke_api_operations_cloudtrail_logging_enabled, ) @@ -103,21 +105,23 @@ class Test_awslambda_function_invoke_api_operations_cloudtrail_logging_enabled: Name=trail_name, S3BucketName=bucket_name, IsMultiRegionTrail=False ) - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.cloudtrail_client", new=Cloudtrail(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled import ( + from prowler.providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled import ( awslambda_function_invoke_api_operations_cloudtrail_logging_enabled, ) @@ -177,21 +181,23 @@ class Test_awslambda_function_invoke_api_operations_cloudtrail_logging_enabled: ], ) - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.cloudtrail_client", new=Cloudtrail(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled import ( + from prowler.providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled import ( awslambda_function_invoke_api_operations_cloudtrail_logging_enabled, ) diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code_test.py b/tests/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code_test.py similarity index 81% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code_test.py rename to tests/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code_test.py index ee994d4f..f8a68669 100644 --- a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code_test.py @@ -1,10 +1,13 @@ import zipfile from unittest import mock +from awslambda_service_test import create_zip_file from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.awslambda.awslambda_service import Function, LambdaCode -from providers.aws.services.awslambda.awslambda_service_test import create_zip_file +from prowler.providers.aws.services.awslambda.awslambda_service import ( + Function, + LambdaCode, +) AWS_REGION = "us-east-1" @@ -15,11 +18,11 @@ class Test_awslambda_function_no_secrets_in_code: lambda_client.functions = {} with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_no_secrets_in_code.awslambda_function_no_secrets_in_code import ( + from prowler.providers.aws.services.awslambda.awslambda_function_no_secrets_in_code.awslambda_function_no_secrets_in_code import ( awslambda_function_no_secrets_in_code, ) @@ -55,11 +58,11 @@ class Test_awslambda_function_no_secrets_in_code: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_no_secrets_in_code.awslambda_function_no_secrets_in_code import ( + from prowler.providers.aws.services.awslambda.awslambda_function_no_secrets_in_code.awslambda_function_no_secrets_in_code import ( awslambda_function_no_secrets_in_code, ) @@ -102,11 +105,11 @@ class Test_awslambda_function_no_secrets_in_code: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_no_secrets_in_code.awslambda_function_no_secrets_in_code import ( + from prowler.providers.aws.services.awslambda.awslambda_function_no_secrets_in_code.awslambda_function_no_secrets_in_code import ( awslambda_function_no_secrets_in_code, ) diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables_test.py b/tests/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables_test.py similarity index 81% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables_test.py rename to tests/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables_test.py index 40e4139f..7025f957 100644 --- a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.awslambda.awslambda_service import Function +from prowler.providers.aws.services.awslambda.awslambda_service import Function AWS_REGION = "us-east-1" @@ -13,11 +13,11 @@ class Test_awslambda_function_no_secrets_in_variables: lambda_client.functions = {} with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( + from prowler.providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( awslambda_function_no_secrets_in_variables, ) @@ -44,11 +44,11 @@ class Test_awslambda_function_no_secrets_in_variables: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( + from prowler.providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( awslambda_function_no_secrets_in_variables, ) @@ -84,11 +84,11 @@ class Test_awslambda_function_no_secrets_in_variables: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( + from prowler.providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( awslambda_function_no_secrets_in_variables, ) @@ -124,11 +124,11 @@ class Test_awslambda_function_no_secrets_in_variables: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( + from prowler.providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( awslambda_function_no_secrets_in_variables, ) diff --git a/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible_test.py b/tests/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible_test.py similarity index 84% rename from providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible_test.py rename to tests/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible_test.py index a606f093..1086aef7 100644 --- a/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.awslambda.awslambda_service import Function +from prowler.providers.aws.services.awslambda.awslambda_service import Function AWS_REGION = "us-east-1" @@ -13,11 +13,11 @@ class Test_awslambda_function_not_publicly_accessible: lambda_client.functions = {} with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( + from prowler.providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( awslambda_function_not_publicly_accessible, ) @@ -59,11 +59,11 @@ class Test_awslambda_function_not_publicly_accessible: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( + from prowler.providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( awslambda_function_not_publicly_accessible, ) @@ -113,11 +113,11 @@ class Test_awslambda_function_not_publicly_accessible: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( + from prowler.providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( awslambda_function_not_publicly_accessible, ) @@ -167,11 +167,11 @@ class Test_awslambda_function_not_publicly_accessible: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( + from prowler.providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( awslambda_function_not_publicly_accessible, ) diff --git a/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy_test.py b/tests/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy_test.py similarity index 83% rename from providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy_test.py rename to tests/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy_test.py index ce6d01c3..942d9d05 100644 --- a/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.awslambda.awslambda_service import ( +from prowler.providers.aws.services.awslambda.awslambda_service import ( AuthType, Function, URLConfig, @@ -18,11 +18,11 @@ class Test_awslambda_function_url_cors_policy: lambda_client.functions = {} with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( + from prowler.providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( awslambda_function_url_cors_policy, ) @@ -53,11 +53,11 @@ class Test_awslambda_function_url_cors_policy: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( + from prowler.providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( awslambda_function_url_cors_policy, ) @@ -96,11 +96,11 @@ class Test_awslambda_function_url_cors_policy: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( + from prowler.providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( awslambda_function_url_cors_policy, ) @@ -141,11 +141,11 @@ class Test_awslambda_function_url_cors_policy: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( + from prowler.providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( awslambda_function_url_cors_policy, ) diff --git a/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public_test.py b/tests/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public_test.py similarity index 82% rename from providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public_test.py rename to tests/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public_test.py index 13c63554..4b3d0a26 100644 --- a/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.awslambda.awslambda_service import ( +from prowler.providers.aws.services.awslambda.awslambda_service import ( AuthType, Function, URLConfig, @@ -18,11 +18,11 @@ class Test_awslambda_function_url_public: lambda_client.functions = {} with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_url_public.awslambda_function_url_public import ( + from prowler.providers.aws.services.awslambda.awslambda_function_url_public.awslambda_function_url_public import ( awslambda_function_url_public, ) @@ -53,11 +53,11 @@ class Test_awslambda_function_url_public: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_url_public.awslambda_function_url_public import ( + from prowler.providers.aws.services.awslambda.awslambda_function_url_public.awslambda_function_url_public import ( awslambda_function_url_public, ) @@ -96,11 +96,11 @@ class Test_awslambda_function_url_public: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_url_public.awslambda_function_url_public import ( + from prowler.providers.aws.services.awslambda.awslambda_function_url_public.awslambda_function_url_public import ( awslambda_function_url_public, ) diff --git a/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes_test.py b/tests/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes_test.py similarity index 75% rename from providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes_test.py rename to tests/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes_test.py index c9293a3f..a16d2512 100644 --- a/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.awslambda.awslambda_service import Function +from prowler.providers.aws.services.awslambda.awslambda_service import Function AWS_REGION = "us-east-1" @@ -30,11 +30,11 @@ class Test_awslambda_function_using_supported_runtimes: lambda_client.functions = {} with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes import ( + from prowler.providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes import ( awslambda_function_using_supported_runtimes, ) @@ -60,14 +60,14 @@ class Test_awslambda_function_using_supported_runtimes: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ), mock.patch( - "providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes.get_config_var", + "prowler.providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes.get_config_var", new=mock_get_config_var, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes import ( + from prowler.providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes import ( awslambda_function_using_supported_runtimes, ) @@ -101,14 +101,14 @@ class Test_awslambda_function_using_supported_runtimes: } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ), mock.patch( - "providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes.get_config_var", + "prowler.providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes.get_config_var", new=mock_get_config_var, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes import ( + from prowler.providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes import ( awslambda_function_using_supported_runtimes, ) diff --git a/providers/aws/services/awslambda/awslambda_service_test.py b/tests/providers/aws/services/awslambda/awslambda_service_test.py similarity index 94% rename from providers/aws/services/awslambda/awslambda_service_test.py rename to tests/providers/aws/services/awslambda/awslambda_service_test.py index c4835cf8..beb353c8 100644 --- a/providers/aws/services/awslambda/awslambda_service_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_service_test.py @@ -1,16 +1,18 @@ -from unittest.mock import patch -from moto.core import DEFAULT_ACCOUNT_ID -from boto3 import client, resource, session -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.awslambda.awslambda_service import Lambda, AuthType -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from moto import mock_lambda, mock_iam, mock_s3 -import zipfile import io -import mock -from re import search -import tempfile import os +import tempfile +import zipfile +from re import search +from unittest.mock import patch + +import mock +from boto3 import client, resource, session +from moto import mock_iam, mock_lambda, mock_s3 +from moto.core import DEFAULT_ACCOUNT_ID + +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.awslambda.awslambda_service import AuthType, Lambda # Mock Test Region AWS_REGION = "eu-west-1" @@ -51,7 +53,7 @@ def mock_generate_regional_clients(service, audit_info): @patch( - "providers.aws.services.awslambda.awslambda_service.generate_regional_clients", + "prowler.providers.aws.services.awslambda.awslambda_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_Lambda_Service: @@ -171,7 +173,7 @@ class Test_Lambda_Service: lambda_arn = resp["FunctionArn"] with mock.patch( - "providers.aws.services.awslambda.awslambda_service.requests.get", + "prowler.providers.aws.services.awslambda.awslambda_service.requests.get", new=mock_request_get, ): awslambda = Lambda(self.set_mocked_audit_info()) @@ -215,7 +217,6 @@ class Test_Lambda_Service: assert files_in_zip[0] == "lambda_function.py" with open(f"{tmp_dir_name}/{files_in_zip[0]}", "r") as lambda_code_file: _ = lambda_code_file - pass # assert ( # lambda_code_file.read() # == """ diff --git a/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets_test.py b/tests/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets_test.py similarity index 79% rename from providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets_test.py rename to tests/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets_test.py index 4c7a54c7..5ac1e3f4 100644 --- a/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets_test.py +++ b/tests/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.cloudformation.cloudformation_service import Stack +from prowler.providers.aws.services.cloudformation.cloudformation_service import Stack # Mock Test Region AWS_REGION = "eu-west-1" @@ -11,11 +11,11 @@ class Test_cloudformation_outputs_find_secrets: cloudformation_client = mock.MagicMock cloudformation_client.stacks = [] with mock.patch( - "providers.aws.services.cloudformation.cloudformation_service.CloudFormation", + "prowler.providers.aws.services.cloudformation.cloudformation_service.CloudFormation", new=cloudformation_client, ): # Test Check - from providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( + from prowler.providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( cloudformation_outputs_find_secrets, ) @@ -37,10 +37,10 @@ class Test_cloudformation_outputs_find_secrets: ] with mock.patch( - "providers.aws.services.cloudformation.cloudformation_service.CloudFormation", + "prowler.providers.aws.services.cloudformation.cloudformation_service.CloudFormation", cloudformation_client, ): - from providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( + from prowler.providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( cloudformation_outputs_find_secrets, ) @@ -73,10 +73,10 @@ class Test_cloudformation_outputs_find_secrets: ] with mock.patch( - "providers.aws.services.cloudformation.cloudformation_service.CloudFormation", + "prowler.providers.aws.services.cloudformation.cloudformation_service.CloudFormation", cloudformation_client, ): - from providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( + from prowler.providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( cloudformation_outputs_find_secrets, ) @@ -109,10 +109,10 @@ class Test_cloudformation_outputs_find_secrets: ] with mock.patch( - "providers.aws.services.cloudformation.cloudformation_service.CloudFormation", + "prowler.providers.aws.services.cloudformation.cloudformation_service.CloudFormation", cloudformation_client, ): - from providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( + from prowler.providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( cloudformation_outputs_find_secrets, ) diff --git a/providers/aws/services/cloudformation/cloudformation_service_test.py b/tests/providers/aws/services/cloudformation/cloudformation_service_test.py similarity index 96% rename from providers/aws/services/cloudformation/cloudformation_service_test.py rename to tests/providers/aws/services/cloudformation/cloudformation_service_test.py index 470ff4cc..d035ca1d 100644 --- a/providers/aws/services/cloudformation/cloudformation_service_test.py +++ b/tests/providers/aws/services/cloudformation/cloudformation_service_test.py @@ -9,8 +9,10 @@ from dateutil.tz import tzutc from moto import mock_cloudformation from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import AWS_Audit_Info -from providers.aws.services.cloudformation.cloudformation_service import CloudFormation +from prowler.providers.aws.lib.audit_info.audit_info import AWS_Audit_Info +from prowler.providers.aws.services.cloudformation.cloudformation_service import ( + CloudFormation, +) # Mock Test Region AWS_REGION = "eu-west-1" @@ -127,7 +129,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.cloudformation.cloudformation_service.generate_regional_clients", + "prowler.providers.aws.services.cloudformation.cloudformation_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_CloudFormation_Service: diff --git a/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled_test.py b/tests/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled_test.py similarity index 78% rename from providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled_test.py rename to tests/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled_test.py index 2307615b..a40bce4b 100644 --- a/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled_test.py +++ b/tests/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.cloudformation.cloudformation_service import Stack +from prowler.providers.aws.services.cloudformation.cloudformation_service import Stack # Mock Test Region AWS_REGION = "eu-west-1" @@ -11,11 +11,11 @@ class Test_cloudformation_stacks_termination_protection_enabled: cloudformation_client = mock.MagicMock cloudformation_client.stacks = [] with mock.patch( - "providers.aws.services.cloudformation.cloudformation_service.CloudFormation", + "prowler.providers.aws.services.cloudformation.cloudformation_service.CloudFormation", new=cloudformation_client, ): # Test Check - from providers.aws.services.cloudformation.cloudformation_stacks_termination_protection_enabled.cloudformation_stacks_termination_protection_enabled import ( + from prowler.providers.aws.services.cloudformation.cloudformation_stacks_termination_protection_enabled.cloudformation_stacks_termination_protection_enabled import ( cloudformation_stacks_termination_protection_enabled, ) @@ -38,10 +38,10 @@ class Test_cloudformation_stacks_termination_protection_enabled: cloudformation_client.stacks[0].enable_termination_protection = True with mock.patch( - "providers.aws.services.cloudformation.cloudformation_service.CloudFormation", + "prowler.providers.aws.services.cloudformation.cloudformation_service.CloudFormation", cloudformation_client, ): - from providers.aws.services.cloudformation.cloudformation_stacks_termination_protection_enabled.cloudformation_stacks_termination_protection_enabled import ( + from prowler.providers.aws.services.cloudformation.cloudformation_stacks_termination_protection_enabled.cloudformation_stacks_termination_protection_enabled import ( cloudformation_stacks_termination_protection_enabled, ) @@ -75,10 +75,10 @@ class Test_cloudformation_stacks_termination_protection_enabled: cloudformation_client.stacks[0].enable_termination_protection = False with mock.patch( - "providers.aws.services.cloudformation.cloudformation_service.CloudFormation", + "prowler.providers.aws.services.cloudformation.cloudformation_service.CloudFormation", cloudformation_client, ): - from providers.aws.services.cloudformation.cloudformation_stacks_termination_protection_enabled.cloudformation_stacks_termination_protection_enabled import ( + from prowler.providers.aws.services.cloudformation.cloudformation_stacks_termination_protection_enabled.cloudformation_stacks_termination_protection_enabled import ( cloudformation_stacks_termination_protection_enabled, ) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled_test.py b/tests/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled_test.py similarity index 80% rename from providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled_test.py rename to tests/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled_test.py index 5f228fd4..c96f3223 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled_test.py +++ b/tests/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.cloudfront.cloudfront_service import ( +from prowler.providers.aws.services.cloudfront.cloudfront_service import ( DefaultCacheConfigBehaviour, Distribution, ViewerProtocolPolicy, @@ -20,11 +20,11 @@ class Test_cloudfront_distributions_field_level_encryption_enabled: cloudfront_client = mock.MagicMock cloudfront_client.distributions = {} with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_field_level_encryption_enabled.cloudfront_distributions_field_level_encryption_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_field_level_encryption_enabled.cloudfront_distributions_field_level_encryption_enabled import ( cloudfront_distributions_field_level_encryption_enabled, ) @@ -50,11 +50,11 @@ class Test_cloudfront_distributions_field_level_encryption_enabled: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_field_level_encryption_enabled.cloudfront_distributions_field_level_encryption_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_field_level_encryption_enabled.cloudfront_distributions_field_level_encryption_enabled import ( cloudfront_distributions_field_level_encryption_enabled, ) @@ -88,11 +88,11 @@ class Test_cloudfront_distributions_field_level_encryption_enabled: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_field_level_encryption_enabled.cloudfront_distributions_field_level_encryption_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_field_level_encryption_enabled.cloudfront_distributions_field_level_encryption_enabled import ( cloudfront_distributions_field_level_encryption_enabled, ) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled_test.py b/tests/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled_test.py similarity index 79% rename from providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled_test.py rename to tests/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled_test.py index 3b71e4e1..42f89f99 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled_test.py +++ b/tests/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.cloudfront.cloudfront_service import ( +from prowler.providers.aws.services.cloudfront.cloudfront_service import ( Distribution, GeoRestrictionType, ) @@ -19,11 +19,11 @@ class Test_cloudfront_distributions_geo_restrictions_enabled: cloudfront_client = mock.MagicMock cloudfront_client.distributions = {} with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( cloudfront_distributions_geo_restrictions_enabled, ) @@ -45,11 +45,11 @@ class Test_cloudfront_distributions_geo_restrictions_enabled: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( cloudfront_distributions_geo_restrictions_enabled, ) @@ -79,11 +79,11 @@ class Test_cloudfront_distributions_geo_restrictions_enabled: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( cloudfront_distributions_geo_restrictions_enabled, ) @@ -113,11 +113,11 @@ class Test_cloudfront_distributions_geo_restrictions_enabled: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( cloudfront_distributions_geo_restrictions_enabled, ) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled_test.py b/tests/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled_test.py similarity index 82% rename from providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled_test.py rename to tests/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled_test.py index a2e5ccba..b9e5b53c 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled_test.py +++ b/tests/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.cloudfront.cloudfront_service import ( +from prowler.providers.aws.services.cloudfront.cloudfront_service import ( DefaultCacheConfigBehaviour, Distribution, ViewerProtocolPolicy, @@ -20,11 +20,11 @@ class Test_cloudfront_distributions_https_enabled: cloudfront_client = mock.MagicMock cloudfront_client.distributions = {} with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( cloudfront_distributions_https_enabled, ) @@ -50,11 +50,11 @@ class Test_cloudfront_distributions_https_enabled: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( cloudfront_distributions_https_enabled, ) @@ -88,11 +88,11 @@ class Test_cloudfront_distributions_https_enabled: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( cloudfront_distributions_https_enabled, ) @@ -126,11 +126,11 @@ class Test_cloudfront_distributions_https_enabled: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( cloudfront_distributions_https_enabled, ) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled_test.py b/tests/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled_test.py similarity index 82% rename from providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled_test.py rename to tests/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled_test.py index 95bfd8f2..f866f333 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled_test.py +++ b/tests/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.cloudfront.cloudfront_service import ( +from prowler.providers.aws.services.cloudfront.cloudfront_service import ( DefaultCacheConfigBehaviour, Distribution, ViewerProtocolPolicy, @@ -20,11 +20,11 @@ class Test_cloudfront_distributions_logging_enabled: cloudfront_client = mock.MagicMock cloudfront_client.distributions = {} with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( cloudfront_distributions_logging_enabled, ) @@ -46,11 +46,11 @@ class Test_cloudfront_distributions_logging_enabled: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( cloudfront_distributions_logging_enabled, ) @@ -85,11 +85,11 @@ class Test_cloudfront_distributions_logging_enabled: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( cloudfront_distributions_logging_enabled, ) @@ -124,11 +124,11 @@ class Test_cloudfront_distributions_logging_enabled: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( cloudfront_distributions_logging_enabled, ) @@ -163,11 +163,11 @@ class Test_cloudfront_distributions_logging_enabled: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( cloudfront_distributions_logging_enabled, ) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols_test.py b/tests/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols_test.py similarity index 88% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols_test.py rename to tests/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols_test.py index eabffdcf..97dd5cca 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols_test.py +++ b/tests/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.cloudfront.cloudfront_service import Distribution +from prowler.providers.aws.services.cloudfront.cloudfront_service import Distribution DISTRIBUTION_ID = "E27LVI50CSW06W" DISTRIBUTION_ARN = ( @@ -16,11 +16,11 @@ class Test_cloudfront_distributions_using_deprecated_ssl_protocols: cloudfront_client = mock.MagicMock cloudfront_client.distributions = {} with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( cloudfront_distributions_using_deprecated_ssl_protocols, ) @@ -77,11 +77,11 @@ class Test_cloudfront_distributions_using_deprecated_ssl_protocols: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( cloudfront_distributions_using_deprecated_ssl_protocols, ) @@ -147,11 +147,11 @@ class Test_cloudfront_distributions_using_deprecated_ssl_protocols: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( cloudfront_distributions_using_deprecated_ssl_protocols, ) @@ -217,11 +217,11 @@ class Test_cloudfront_distributions_using_deprecated_ssl_protocols: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( cloudfront_distributions_using_deprecated_ssl_protocols, ) @@ -284,11 +284,11 @@ class Test_cloudfront_distributions_using_deprecated_ssl_protocols: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( cloudfront_distributions_using_deprecated_ssl_protocols, ) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf_test.py b/tests/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf_test.py similarity index 78% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf_test.py rename to tests/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf_test.py index a2fd0a83..7432034b 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf_test.py +++ b/tests/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.cloudfront.cloudfront_service import Distribution +from prowler.providers.aws.services.cloudfront.cloudfront_service import Distribution DISTRIBUTION_ID = "E27LVI50CSW06W" DISTRIBUTION_ARN = ( @@ -16,11 +16,11 @@ class Test_cloudfront_distributions_using_waf: cloudfront_client = mock.MagicMock cloudfront_client.distributions = {} with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_waf.cloudfront_distributions_using_waf import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_waf.cloudfront_distributions_using_waf import ( cloudfront_distributions_using_waf, ) @@ -43,11 +43,11 @@ class Test_cloudfront_distributions_using_waf: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_waf.cloudfront_distributions_using_waf import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_waf.cloudfront_distributions_using_waf import ( cloudfront_distributions_using_waf, ) @@ -76,11 +76,11 @@ class Test_cloudfront_distributions_using_waf: } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_waf.cloudfront_distributions_using_waf import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_waf.cloudfront_distributions_using_waf import ( cloudfront_distributions_using_waf, ) diff --git a/providers/aws/services/cloudfront/cloudfront_service_test.py b/tests/providers/aws/services/cloudfront/cloudfront_service_test.py similarity index 98% rename from providers/aws/services/cloudfront/cloudfront_service_test.py rename to tests/providers/aws/services/cloudfront/cloudfront_service_test.py index 4c941120..d71157b1 100644 --- a/providers/aws/services/cloudfront/cloudfront_service_test.py +++ b/tests/providers/aws/services/cloudfront/cloudfront_service_test.py @@ -5,8 +5,8 @@ from boto3 import client, session from moto import mock_cloudfront from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.cloudfront.cloudfront_service import CloudFront +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.cloudfront.cloudfront_service import CloudFront # Mock Test Region AWS_REGION = "eu-west-1" diff --git a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py similarity index 86% rename from providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py index a86daf78..921392d7 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py @@ -30,17 +30,19 @@ class Test_cloudtrail_cloudwatch_logging_enabled: Name=trail_name_eu, S3BucketName=bucket_name_eu, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled import ( cloudtrail_cloudwatch_logging_enabled, ) @@ -103,17 +105,19 @@ class Test_cloudtrail_cloudwatch_logging_enabled: Name=trail_name_eu, S3BucketName=bucket_name_eu, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled import ( cloudtrail_cloudwatch_logging_enabled, ) @@ -176,17 +180,19 @@ class Test_cloudtrail_cloudwatch_logging_enabled: Name=trail_name_eu, S3BucketName=bucket_name_eu, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled import ( cloudtrail_cloudwatch_logging_enabled, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled_test.py similarity index 73% rename from providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled_test.py index e2f45ce2..e1d2b7ce 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled_test.py @@ -18,17 +18,19 @@ class Test_cloudtrail_kms_encryption_enabled: Name=trail_name_us, S3BucketName=bucket_name_us, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled import ( cloudtrail_kms_encryption_enabled, ) @@ -62,17 +64,19 @@ class Test_cloudtrail_kms_encryption_enabled: KmsKeyId=key_arn, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled import ( cloudtrail_kms_encryption_enabled, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled_test.py similarity index 78% rename from providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled_test.py index 2919ae80..644dc12e 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled_test.py @@ -17,17 +17,19 @@ class Test_cloudtrail_log_file_validation_enabled: trail_us = cloudtrail_client_us_east_1.create_trail( Name=trail_name_us, S3BucketName=bucket_name_us, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled import ( cloudtrail_log_file_validation_enabled, ) @@ -66,17 +68,19 @@ class Test_cloudtrail_log_file_validation_enabled: Name=trail_name_eu, S3BucketName=bucket_name_eu, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled import ( cloudtrail_log_file_validation_enabled, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled_test.py similarity index 72% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled_test.py index 99caae69..f9f513c2 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled_test.py @@ -18,22 +18,24 @@ class Test_cloudtrail_logs_s3_bucket_access_logging_enabled: Name=trail_name_us, S3BucketName=bucket_name_us, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.s3_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled import ( cloudtrail_logs_s3_bucket_access_logging_enabled, ) @@ -81,22 +83,24 @@ class Test_cloudtrail_logs_s3_bucket_access_logging_enabled: }, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.s3_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled import ( cloudtrail_logs_s3_bucket_access_logging_enabled, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible_test.py similarity index 73% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible_test.py index 72a8c94c..2d8103f1 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible_test.py @@ -17,22 +17,24 @@ class Test_cloudtrail_logs_s3_bucket_is_not_publicly_accessible: trail_us = cloudtrail_client.create_trail( Name=trail_name_us, S3BucketName=bucket_name_us, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_client", new=Cloudtrail(current_audit_info), ): with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.s3_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible import ( cloudtrail_logs_s3_bucket_is_not_publicly_accessible, ) @@ -79,22 +81,24 @@ class Test_cloudtrail_logs_s3_bucket_is_not_publicly_accessible: Name=trail_name_us, S3BucketName=bucket_name_us, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_client", new=Cloudtrail(current_audit_info), ): with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.s3_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible import ( cloudtrail_logs_s3_bucket_is_not_publicly_accessible, ) @@ -140,17 +144,19 @@ class Test_cloudtrail_logs_s3_bucket_is_not_publicly_accessible: }, Bucket=bucket_name_us, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible import ( cloudtrail_logs_s3_bucket_is_not_publicly_accessible, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled_test.py similarity index 79% rename from providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled_test.py index 939f5ebf..8f7a40ca 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled_test.py @@ -8,17 +8,19 @@ from moto import mock_cloudtrail, mock_s3 class Test_cloudtrail_multi_region_enabled: @mock_cloudtrail def test_no_trails(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled import ( cloudtrail_multi_region_enabled, ) @@ -61,17 +63,19 @@ class Test_cloudtrail_multi_region_enabled: Name=trail_name_eu, S3BucketName=bucket_name_eu, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled import ( cloudtrail_multi_region_enabled, ) @@ -116,17 +120,19 @@ class Test_cloudtrail_multi_region_enabled: _ = cloudtrail_client_us_east_1.start_logging(Name=trail_name_us) _ = cloudtrail_client_us_east_1.get_trail_status(Name=trail_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled import ( cloudtrail_multi_region_enabled, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled_test.py similarity index 76% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled_test.py index a219382b..0c465e71 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled_test.py @@ -18,17 +18,19 @@ class Test_cloudtrail_s3_dataevents_read_enabled: Name=trail_name_us, S3BucketName=bucket_name_us, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled import ( cloudtrail_s3_dataevents_read_enabled, ) @@ -67,17 +69,19 @@ class Test_cloudtrail_s3_dataevents_read_enabled: } ], )["EventSelectors"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled import ( cloudtrail_s3_dataevents_read_enabled, ) @@ -116,17 +120,19 @@ class Test_cloudtrail_s3_dataevents_read_enabled: } ], )["EventSelectors"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled import ( cloudtrail_s3_dataevents_read_enabled, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled_test.py similarity index 76% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled_test.py index c3b23a63..0d43a76b 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled_test.py @@ -18,17 +18,19 @@ class Test_cloudtrail_s3_dataevents_write_enabled: Name=trail_name_us, S3BucketName=bucket_name_us, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled import ( cloudtrail_s3_dataevents_write_enabled, ) @@ -67,17 +69,19 @@ class Test_cloudtrail_s3_dataevents_write_enabled: } ], )["EventSelectors"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled import ( cloudtrail_s3_dataevents_write_enabled, ) @@ -116,17 +120,19 @@ class Test_cloudtrail_s3_dataevents_write_enabled: } ], )["EventSelectors"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled import ( cloudtrail_s3_dataevents_write_enabled, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_service_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_service_test.py similarity index 98% rename from providers/aws/services/cloudtrail/cloudtrail_service_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_service_test.py index 263e3027..a0d9d453 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_service_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, session from moto import mock_cloudtrail, mock_s3 -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail AWS_ACCOUNT_NUMBER = 123456789012 diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured_test.py similarity index 63% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured_test.py index 633d2045..f51c8302 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( cloudwatch_changes_to_network_acls_alarm_configured, ) @@ -57,27 +59,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( cloudwatch_changes_to_network_acls_alarm_configured, ) @@ -108,27 +112,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( cloudwatch_changes_to_network_acls_alarm_configured, ) @@ -171,27 +177,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( cloudwatch_changes_to_network_acls_alarm_configured, ) @@ -246,27 +254,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( cloudwatch_changes_to_network_acls_alarm_configured, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured_test.py similarity index 63% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured_test.py index bd47a58e..0f0bcdc1 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( cloudwatch_changes_to_network_gateways_alarm_configured, ) @@ -57,27 +59,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( cloudwatch_changes_to_network_gateways_alarm_configured, ) @@ -108,27 +112,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( cloudwatch_changes_to_network_gateways_alarm_configured, ) @@ -171,27 +177,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( cloudwatch_changes_to_network_gateways_alarm_configured, ) @@ -246,27 +254,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( cloudwatch_changes_to_network_gateways_alarm_configured, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured_test.py similarity index 62% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured_test.py index f47cab81..5a016dda 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( cloudwatch_changes_to_network_route_tables_alarm_configured, ) @@ -57,27 +59,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( cloudwatch_changes_to_network_route_tables_alarm_configured, ) @@ -108,27 +112,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( cloudwatch_changes_to_network_route_tables_alarm_configured, ) @@ -171,27 +177,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( cloudwatch_changes_to_network_route_tables_alarm_configured, ) @@ -246,27 +254,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( cloudwatch_changes_to_network_route_tables_alarm_configured, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured_test.py similarity index 66% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured_test.py index 0541f37c..af7dc1b2 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( cloudwatch_changes_to_vpcs_alarm_configured, ) @@ -57,27 +59,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( cloudwatch_changes_to_vpcs_alarm_configured, ) @@ -108,27 +112,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( cloudwatch_changes_to_vpcs_alarm_configured, ) @@ -171,27 +177,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( cloudwatch_changes_to_vpcs_alarm_configured, ) @@ -246,27 +254,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( cloudwatch_changes_to_vpcs_alarm_configured, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled_test.py similarity index 66% rename from providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled_test.py index 75a98be6..a93b8997 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled_test.py @@ -9,17 +9,17 @@ AWS_REGION = "us-east-1" class Test_cloudwatch_cross_account_sharing_disabled: @mock_iam def test_cloudwatch_without_cross_account_role(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled.iam_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled import ( cloudwatch_cross_account_sharing_disabled, ) @@ -42,17 +42,17 @@ class Test_cloudwatch_cross_account_sharing_disabled: iam_client.create_role( RoleName="CloudWatch-CrossAccountSharingRole", AssumeRolePolicyDocument="{}" ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled.iam_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled import ( cloudwatch_cross_account_sharing_disabled, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled_test.py similarity index 62% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled_test.py index 66357237..0c273d77 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled_test.py @@ -8,17 +8,17 @@ AWS_REGION = "us-east-1" class Test_cloudwatch_log_group_kms_encryption_enabled: def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import Logs + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client", new=Logs(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled import ( cloudwatch_log_group_kms_encryption_enabled, ) @@ -35,17 +35,17 @@ class Test_cloudwatch_log_group_kms_encryption_enabled: logs_client.create_log_group( logGroupName="test", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import Logs + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client", new=Logs(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled import ( cloudwatch_log_group_kms_encryption_enabled, ) @@ -66,17 +66,17 @@ class Test_cloudwatch_log_group_kms_encryption_enabled: logs_client = client("logs", region_name=AWS_REGION) # Request Logs group logs_client.create_log_group(logGroupName="test", kmsKeyId="test_kms_id") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import Logs + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client", new=Logs(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled import ( cloudwatch_log_group_kms_encryption_enabled, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled_test.py similarity index 62% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled_test.py index b6951b9c..26802a97 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled_test.py @@ -8,17 +8,17 @@ AWS_REGION = "us-east-1" class Test_cloudwatch_log_group_retention_policy_specific_days_enabled: def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import Logs + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", new=Logs(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( cloudwatch_log_group_retention_policy_specific_days_enabled, ) @@ -35,17 +35,17 @@ class Test_cloudwatch_log_group_retention_policy_specific_days_enabled: logs_client.create_log_group( logGroupName="test", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import Logs + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", new=Logs(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( cloudwatch_log_group_retention_policy_specific_days_enabled, ) @@ -69,17 +69,17 @@ class Test_cloudwatch_log_group_retention_policy_specific_days_enabled: logGroupName="test", ) logs_client.put_retention_policy(logGroupName="test", retentionInDays=400) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import Logs + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", new=Logs(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( cloudwatch_log_group_retention_policy_specific_days_enabled, ) @@ -103,17 +103,17 @@ class Test_cloudwatch_log_group_retention_policy_specific_days_enabled: logGroupName="test", ) logs_client.put_retention_policy(logGroupName="test", retentionInDays=7) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import Logs + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", new=Logs(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( cloudwatch_log_group_retention_policy_specific_days_enabled, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled_test.py similarity index 59% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled_test.py index 0129da7f..9bbf7297 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled, ) @@ -59,27 +61,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled, ) @@ -112,27 +116,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled, ) @@ -177,27 +183,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled, ) @@ -254,27 +262,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled_test.py similarity index 59% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled_test.py index a4c1a1c4..8830df8a 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled, ) @@ -59,27 +61,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled, ) @@ -112,27 +116,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled, ) @@ -177,27 +183,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled, ) @@ -254,27 +262,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures_test.py similarity index 62% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures_test.py index abbfa561..8c800b1e 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( cloudwatch_log_metric_filter_authentication_failures, ) @@ -57,27 +59,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( cloudwatch_log_metric_filter_authentication_failures, ) @@ -108,27 +112,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( cloudwatch_log_metric_filter_authentication_failures, ) @@ -171,27 +177,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( cloudwatch_log_metric_filter_authentication_failures, ) @@ -246,27 +254,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( cloudwatch_log_metric_filter_authentication_failures, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes_test.py similarity index 66% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes_test.py index 094dfab3..de96c7dd 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_aws_organizations_changes: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( cloudwatch_log_metric_filter_aws_organizations_changes, ) @@ -57,27 +59,29 @@ class Test_cloudwatch_log_metric_filter_aws_organizations_changes: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( cloudwatch_log_metric_filter_aws_organizations_changes, ) @@ -108,27 +112,29 @@ class Test_cloudwatch_log_metric_filter_aws_organizations_changes: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( cloudwatch_log_metric_filter_aws_organizations_changes, ) @@ -171,27 +177,29 @@ class Test_cloudwatch_log_metric_filter_aws_organizations_changes: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( cloudwatch_log_metric_filter_aws_organizations_changes, ) @@ -246,27 +254,29 @@ class Test_cloudwatch_log_metric_filter_aws_organizations_changes: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( cloudwatch_log_metric_filter_aws_organizations_changes, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk_test.py similarity index 60% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk_test.py index 7b15af94..abf4b5b8 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk, ) @@ -59,27 +61,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk, ) @@ -112,27 +116,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk, ) @@ -177,27 +183,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk, ) @@ -254,27 +262,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes_test.py similarity index 63% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes_test.py index 069eac24..7c60372d 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( cloudwatch_log_metric_filter_for_s3_bucket_policy_changes, ) @@ -57,27 +59,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( cloudwatch_log_metric_filter_for_s3_bucket_policy_changes, ) @@ -108,27 +112,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( cloudwatch_log_metric_filter_for_s3_bucket_policy_changes, ) @@ -171,27 +177,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( cloudwatch_log_metric_filter_for_s3_bucket_policy_changes, ) @@ -246,27 +254,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( cloudwatch_log_metric_filter_for_s3_bucket_policy_changes, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes_test.py similarity index 66% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes_test.py index 0ef5e1d8..3e285152 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( cloudwatch_log_metric_filter_policy_changes, ) @@ -57,27 +59,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( cloudwatch_log_metric_filter_policy_changes, ) @@ -108,27 +112,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( cloudwatch_log_metric_filter_policy_changes, ) @@ -171,27 +177,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( cloudwatch_log_metric_filter_policy_changes, ) @@ -246,27 +254,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( cloudwatch_log_metric_filter_policy_changes, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage_test.py similarity index 65% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage_test.py index 1033d00a..f62f37d9 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( cloudwatch_log_metric_filter_root_usage, ) @@ -57,27 +59,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( cloudwatch_log_metric_filter_root_usage, ) @@ -108,27 +112,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( cloudwatch_log_metric_filter_root_usage, ) @@ -171,27 +177,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( cloudwatch_log_metric_filter_root_usage, ) @@ -246,27 +254,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( cloudwatch_log_metric_filter_root_usage, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes_test.py similarity index 64% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes_test.py index 3bd6c9d2..f35f193f 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( cloudwatch_log_metric_filter_security_group_changes, ) @@ -57,27 +59,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( cloudwatch_log_metric_filter_security_group_changes, ) @@ -108,27 +112,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( cloudwatch_log_metric_filter_security_group_changes, ) @@ -171,27 +177,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( cloudwatch_log_metric_filter_security_group_changes, ) @@ -246,27 +254,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( cloudwatch_log_metric_filter_security_group_changes, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa_test.py similarity index 63% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa_test.py index a0d5d6b6..a9866fb3 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( cloudwatch_log_metric_filter_sign_in_without_mfa, ) @@ -57,27 +59,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( cloudwatch_log_metric_filter_sign_in_without_mfa, ) @@ -108,27 +112,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( cloudwatch_log_metric_filter_sign_in_without_mfa, ) @@ -171,27 +177,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( cloudwatch_log_metric_filter_sign_in_without_mfa, ) @@ -246,27 +254,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( cloudwatch_log_metric_filter_sign_in_without_mfa, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls_test.py similarity index 63% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls_test.py index 2769a04e..95e3459e 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( cloudwatch_log_metric_filter_unauthorized_api_calls, ) @@ -57,27 +59,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( cloudwatch_log_metric_filter_unauthorized_api_calls, ) @@ -108,27 +112,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( cloudwatch_log_metric_filter_unauthorized_api_calls, ) @@ -171,27 +177,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( cloudwatch_log_metric_filter_unauthorized_api_calls, ) @@ -246,27 +254,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( cloudwatch_log_metric_filter_unauthorized_api_calls, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_service_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_service_test.py similarity index 92% rename from providers/aws/services/cloudwatch/cloudwatch_service_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_service_test.py index c051f3be..3a086454 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_service_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_service_test.py @@ -1,8 +1,8 @@ from boto3 import session from moto import mock_cloudwatch -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.cloudwatch.cloudwatch_service import CloudWatch +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.cloudwatch.cloudwatch_service import CloudWatch AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled_test.py b/tests/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled_test.py similarity index 83% rename from providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled_test.py rename to tests/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled_test.py index 129b7f42..1290ed3a 100644 --- a/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled_test.py +++ b/tests/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.codeartifact.codeartifact_service import ( +from prowler.providers.aws.services.codeartifact.codeartifact_service import ( LatestPackageVersion, LatestPackageVersionStatus, OriginConfiguration, @@ -22,11 +22,11 @@ class Test_codeartifact_packages_external_public_publishing_disabled: codeartifact_client = mock.MagicMock codeartifact_client.repositories = {} with mock.patch( - "providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", + "prowler.providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", new=codeartifact_client, ): # Test Check - from providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( + from prowler.providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( codeartifact_packages_external_public_publishing_disabled, ) @@ -48,11 +48,11 @@ class Test_codeartifact_packages_external_public_publishing_disabled: ) } with mock.patch( - "providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", + "prowler.providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", new=codeartifact_client, ): # Test Check - from providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( + from prowler.providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( codeartifact_packages_external_public_publishing_disabled, ) @@ -96,11 +96,11 @@ class Test_codeartifact_packages_external_public_publishing_disabled: ) } with mock.patch( - "providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", + "prowler.providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", new=codeartifact_client, ): # Test Check - from providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( + from prowler.providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( codeartifact_packages_external_public_publishing_disabled, ) @@ -151,11 +151,11 @@ class Test_codeartifact_packages_external_public_publishing_disabled: ) } with mock.patch( - "providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", + "prowler.providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", new=codeartifact_client, ): # Test Check - from providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( + from prowler.providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( codeartifact_packages_external_public_publishing_disabled, ) diff --git a/providers/aws/services/codeartifact/codeartifact_service_test.py b/tests/providers/aws/services/codeartifact/codeartifact_service_test.py similarity index 95% rename from providers/aws/services/codeartifact/codeartifact_service_test.py rename to tests/providers/aws/services/codeartifact/codeartifact_service_test.py index c342466a..be01c1d4 100644 --- a/providers/aws/services/codeartifact/codeartifact_service_test.py +++ b/tests/providers/aws/services/codeartifact/codeartifact_service_test.py @@ -3,8 +3,8 @@ from unittest.mock import patch import botocore from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.codeartifact.codeartifact_service import ( +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.codeartifact.codeartifact_service import ( CodeArtifact, LatestPackageVersionStatus, OriginInformationValues, @@ -85,7 +85,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.codeartifact.codeartifact_service.generate_regional_clients", + "prowler.providers.aws.services.codeartifact.codeartifact_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_CodeArtifact_Service: diff --git a/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days_test.py b/tests/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days_test.py similarity index 78% rename from providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days_test.py rename to tests/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days_test.py index 5035783f..065ebb03 100644 --- a/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days_test.py +++ b/tests/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days_test.py @@ -2,7 +2,7 @@ from datetime import datetime, timedelta, timezone from re import search from unittest import mock -from providers.aws.services.codebuild.codebuild_service import CodebuildProject +from prowler.providers.aws.services.codebuild.codebuild_service import CodebuildProject class Test_codebuild_project_older_90_days: @@ -17,10 +17,10 @@ class Test_codebuild_project_older_90_days: ) ] with mock.patch( - "providers.aws.services.codebuild.codebuild_service.Codebuild", + "prowler.providers.aws.services.codebuild.codebuild_service.Codebuild", codebuild_client, ): - from providers.aws.services.codebuild.codebuild_project_older_90_days.codebuild_project_older_90_days import ( + from prowler.providers.aws.services.codebuild.codebuild_project_older_90_days.codebuild_project_older_90_days import ( codebuild_project_older_90_days, ) @@ -43,10 +43,10 @@ class Test_codebuild_project_older_90_days: ) ] with mock.patch( - "providers.aws.services.codebuild.codebuild_service.Codebuild", + "prowler.providers.aws.services.codebuild.codebuild_service.Codebuild", codebuild_client, ): - from providers.aws.services.codebuild.codebuild_project_older_90_days.codebuild_project_older_90_days import ( + from prowler.providers.aws.services.codebuild.codebuild_project_older_90_days.codebuild_project_older_90_days import ( codebuild_project_older_90_days, ) @@ -70,10 +70,10 @@ class Test_codebuild_project_older_90_days: ) ] with mock.patch( - "providers.aws.services.codebuild.codebuild_service.Codebuild", + "prowler.providers.aws.services.codebuild.codebuild_service.Codebuild", codebuild_client, ): - from providers.aws.services.codebuild.codebuild_project_older_90_days.codebuild_project_older_90_days import ( + from prowler.providers.aws.services.codebuild.codebuild_project_older_90_days.codebuild_project_older_90_days import ( codebuild_project_older_90_days, ) diff --git a/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec_test.py b/tests/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec_test.py similarity index 78% rename from providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec_test.py rename to tests/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec_test.py index 2b1c901e..436a4390 100644 --- a/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec_test.py +++ b/tests/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.codebuild.codebuild_service import CodebuildProject +from prowler.providers.aws.services.codebuild.codebuild_service import CodebuildProject class Test_codebuild_project_user_controlled_buildspec: @@ -16,10 +16,10 @@ class Test_codebuild_project_user_controlled_buildspec: ) ] with mock.patch( - "providers.aws.services.codebuild.codebuild_service.Codebuild", + "prowler.providers.aws.services.codebuild.codebuild_service.Codebuild", codebuild_client, ): - from providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( + from prowler.providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( codebuild_project_user_controlled_buildspec, ) @@ -46,10 +46,10 @@ class Test_codebuild_project_user_controlled_buildspec: ) ] with mock.patch( - "providers.aws.services.codebuild.codebuild_service.Codebuild", + "prowler.providers.aws.services.codebuild.codebuild_service.Codebuild", codebuild_client, ): - from providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( + from prowler.providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( codebuild_project_user_controlled_buildspec, ) @@ -76,10 +76,10 @@ class Test_codebuild_project_user_controlled_buildspec: ) ] with mock.patch( - "providers.aws.services.codebuild.codebuild_service.Codebuild", + "prowler.providers.aws.services.codebuild.codebuild_service.Codebuild", codebuild_client, ): - from providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( + from prowler.providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( codebuild_project_user_controlled_buildspec, ) @@ -103,10 +103,10 @@ class Test_codebuild_project_user_controlled_buildspec: ) ] with mock.patch( - "providers.aws.services.codebuild.codebuild_service.Codebuild", + "prowler.providers.aws.services.codebuild.codebuild_service.Codebuild", codebuild_client, ): - from providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( + from prowler.providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( codebuild_project_user_controlled_buildspec, ) diff --git a/providers/aws/services/codebuild/codebuild_service_test.py b/tests/providers/aws/services/codebuild/codebuild_service_test.py similarity index 90% rename from providers/aws/services/codebuild/codebuild_service_test.py rename to tests/providers/aws/services/codebuild/codebuild_service_test.py index de30d166..8f572682 100644 --- a/providers/aws/services/codebuild/codebuild_service_test.py +++ b/tests/providers/aws/services/codebuild/codebuild_service_test.py @@ -4,9 +4,9 @@ from unittest.mock import patch import botocore from boto3 import session -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.codebuild.codebuild_service import Codebuild +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.codebuild.codebuild_service import Codebuild # Mock Test Region AWS_REGION = "eu-west-1" @@ -49,7 +49,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.codebuild.codebuild_service.generate_regional_clients", + "prowler.providers.aws.services.codebuild.codebuild_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_Codebuild_Service: diff --git a/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py b/tests/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py similarity index 70% rename from providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py rename to tests/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py index a5d7c4c9..a674d386 100644 --- a/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py +++ b/tests/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py @@ -9,17 +9,17 @@ AWS_REGION = "us-east-1" class Test_config_recorder_all_regions_enabled: @mock_config def test_config_no_recorders(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.config.config_service import Config + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.config.config_service import Config current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled.config_client", + "prowler.providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled.config_client", new=Config(current_audit_info), ): # Test Check - from providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled import ( + from prowler.providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled import ( config_recorder_all_regions_enabled, ) @@ -39,17 +39,17 @@ class Test_config_recorder_all_regions_enabled: config_client.put_configuration_recorder( ConfigurationRecorder={"name": "default", "roleARN": "somearn"} ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.config.config_service import Config + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.config.config_service import Config current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled.config_client", + "prowler.providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled.config_client", new=Config(current_audit_info), ): # Test Check - from providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled import ( + from prowler.providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled import ( config_recorder_all_regions_enabled, ) @@ -79,17 +79,17 @@ class Test_config_recorder_all_regions_enabled: DeliveryChannel={"name": "testchannel", "s3BucketName": "somebucket"} ) config_client.start_configuration_recorder(ConfigurationRecorderName="default") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.config.config_service import Config + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.config.config_service import Config current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled.config_client", + "prowler.providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled.config_client", new=Config(current_audit_info), ): # Test Check - from providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled import ( + from prowler.providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled import ( config_recorder_all_regions_enabled, ) diff --git a/providers/aws/services/config/config_service_test.py b/tests/providers/aws/services/config/config_service_test.py similarity index 95% rename from providers/aws/services/config/config_service_test.py rename to tests/providers/aws/services/config/config_service_test.py index c47c7b91..880fa439 100644 --- a/providers/aws/services/config/config_service_test.py +++ b/tests/providers/aws/services/config/config_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, session from moto import mock_config -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.config.config_service import Config +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.config.config_service import Config AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled_test.py b/tests/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled_test.py similarity index 77% rename from providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled_test.py rename to tests/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled_test.py index 12739bc5..c92db982 100644 --- a/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled_test.py +++ b/tests/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled_test.py @@ -1,7 +1,7 @@ from datetime import datetime from unittest import mock -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( Directory, DirectoryType, LogSubscriptions, @@ -15,11 +15,11 @@ class Test_directoryservice_directory_log_forwarding_enabled: directoryservice_client = mock.MagicMock directoryservice_client.directories = {} with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_log_forwarding_enabled.directoryservice_directory_log_forwarding_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_log_forwarding_enabled.directoryservice_directory_log_forwarding_enabled import ( directoryservice_directory_log_forwarding_enabled, ) @@ -42,11 +42,11 @@ class Test_directoryservice_directory_log_forwarding_enabled: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_log_forwarding_enabled.directoryservice_directory_log_forwarding_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_log_forwarding_enabled.directoryservice_directory_log_forwarding_enabled import ( directoryservice_directory_log_forwarding_enabled, ) @@ -82,11 +82,11 @@ class Test_directoryservice_directory_log_forwarding_enabled: } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_log_forwarding_enabled.directoryservice_directory_log_forwarding_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_log_forwarding_enabled.directoryservice_directory_log_forwarding_enabled import ( directoryservice_directory_log_forwarding_enabled, ) diff --git a/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications_test.py b/tests/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications_test.py similarity index 78% rename from providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications_test.py rename to tests/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications_test.py index 6554747c..44679816 100644 --- a/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications_test.py +++ b/tests/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications_test.py @@ -3,7 +3,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( Directory, DirectoryType, EventTopics, @@ -18,11 +18,11 @@ class Test_directoryservice_directory_monitor_notifications: directoryservice_client = mock.MagicMock directoryservice_client.directories = {} with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_monitor_notifications.directoryservice_directory_monitor_notifications import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_monitor_notifications.directoryservice_directory_monitor_notifications import ( directoryservice_directory_monitor_notifications, ) @@ -45,11 +45,11 @@ class Test_directoryservice_directory_monitor_notifications: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_monitor_notifications.directoryservice_directory_monitor_notifications import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_monitor_notifications.directoryservice_directory_monitor_notifications import ( directoryservice_directory_monitor_notifications, ) @@ -86,11 +86,11 @@ class Test_directoryservice_directory_monitor_notifications: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_monitor_notifications.directoryservice_directory_monitor_notifications import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_monitor_notifications.directoryservice_directory_monitor_notifications import ( directoryservice_directory_monitor_notifications, ) diff --git a/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit_test.py b/tests/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit_test.py similarity index 82% rename from providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit_test.py rename to tests/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit_test.py index ef023237..8efae8c5 100644 --- a/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit_test.py +++ b/tests/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( Directory, DirectoryType, SnapshotLimit, @@ -14,11 +14,11 @@ class Test_directoryservice_directory_snapshots_limit: directoryservice_client = mock.MagicMock directoryservice_client.directories = {} with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( directoryservice_directory_snapshots_limit, ) @@ -48,11 +48,11 @@ class Test_directoryservice_directory_snapshots_limit: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( directoryservice_directory_snapshots_limit, ) @@ -89,11 +89,11 @@ class Test_directoryservice_directory_snapshots_limit: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( directoryservice_directory_snapshots_limit, ) @@ -130,11 +130,11 @@ class Test_directoryservice_directory_snapshots_limit: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( directoryservice_directory_snapshots_limit, ) @@ -171,11 +171,11 @@ class Test_directoryservice_directory_snapshots_limit: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( directoryservice_directory_snapshots_limit, ) diff --git a/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration_test.py b/tests/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration_test.py similarity index 81% rename from providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration_test.py rename to tests/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration_test.py index 5c31a10f..05dd2be0 100644 --- a/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration_test.py +++ b/tests/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration_test.py @@ -3,7 +3,7 @@ from unittest import mock from freezegun import freeze_time -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( Certificate, CertificateState, CertificateType, @@ -21,11 +21,11 @@ class Test_directoryservice_ldap_certificate_expiration: directoryservice_client = mock.MagicMock directoryservice_client.directories = {} with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( + from prowler.providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( directoryservice_ldap_certificate_expiration, ) @@ -48,11 +48,11 @@ class Test_directoryservice_ldap_certificate_expiration: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( + from prowler.providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( directoryservice_ldap_certificate_expiration, ) @@ -87,11 +87,11 @@ class Test_directoryservice_ldap_certificate_expiration: } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( + from prowler.providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( directoryservice_ldap_certificate_expiration, ) @@ -133,11 +133,11 @@ class Test_directoryservice_ldap_certificate_expiration: } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( + from prowler.providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( directoryservice_ldap_certificate_expiration, ) @@ -179,11 +179,11 @@ class Test_directoryservice_ldap_certificate_expiration: } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( + from prowler.providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( directoryservice_ldap_certificate_expiration, ) diff --git a/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol_test.py b/tests/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol_test.py similarity index 77% rename from providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol_test.py rename to tests/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol_test.py index bf6e90f1..3846829b 100644 --- a/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol_test.py +++ b/tests/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( AuthenticationProtocol, Directory, DirectoryType, @@ -16,11 +16,11 @@ class Test_directoryservice_radius_server_security_protocol: directoryservice_client = mock.MagicMock directoryservice_client.directories = {} with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( + from prowler.providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( directoryservice_radius_server_security_protocol, ) @@ -43,11 +43,11 @@ class Test_directoryservice_radius_server_security_protocol: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( + from prowler.providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( directoryservice_radius_server_security_protocol, ) @@ -73,11 +73,11 @@ class Test_directoryservice_radius_server_security_protocol: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( + from prowler.providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( directoryservice_radius_server_security_protocol, ) @@ -110,11 +110,11 @@ class Test_directoryservice_radius_server_security_protocol: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( + from prowler.providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( directoryservice_radius_server_security_protocol, ) diff --git a/providers/aws/services/directoryservice/directoryservice_service_test.py b/tests/providers/aws/services/directoryservice/directoryservice_service_test.py similarity index 96% rename from providers/aws/services/directoryservice/directoryservice_service_test.py rename to tests/providers/aws/services/directoryservice/directoryservice_service_test.py index 36686804..3163a9cd 100644 --- a/providers/aws/services/directoryservice/directoryservice_service_test.py +++ b/tests/providers/aws/services/directoryservice/directoryservice_service_test.py @@ -5,8 +5,8 @@ import botocore from moto import mock_ds from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( AuthenticationProtocol, CertificateState, CertificateType, @@ -106,7 +106,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.directoryservice.directoryservice_service.generate_regional_clients", + "prowler.providers.aws.services.directoryservice.directoryservice_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_DirectoryService_Service: diff --git a/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled_test.py b/tests/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled_test.py similarity index 78% rename from providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled_test.py rename to tests/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled_test.py index 26a040cf..4d593284 100644 --- a/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled_test.py +++ b/tests/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( AuthenticationProtocol, Directory, DirectoryType, @@ -16,11 +16,11 @@ class Test_directoryservice_supported_mfa_radius_enabled: directoryservice_client = mock.MagicMock directoryservice_client.directories = {} with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( directoryservice_supported_mfa_radius_enabled, ) @@ -43,11 +43,11 @@ class Test_directoryservice_supported_mfa_radius_enabled: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( directoryservice_supported_mfa_radius_enabled, ) @@ -73,11 +73,11 @@ class Test_directoryservice_supported_mfa_radius_enabled: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( directoryservice_supported_mfa_radius_enabled, ) @@ -110,11 +110,11 @@ class Test_directoryservice_supported_mfa_radius_enabled: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( directoryservice_supported_mfa_radius_enabled, ) @@ -147,11 +147,11 @@ class Test_directoryservice_supported_mfa_radius_enabled: ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( directoryservice_supported_mfa_radius_enabled, ) diff --git a/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled_test.py b/tests/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled_test.py similarity index 66% rename from providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled_test.py rename to tests/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled_test.py index 79be81cd..1b30bfdf 100644 --- a/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled_test.py +++ b/tests/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled_test.py @@ -11,17 +11,17 @@ AWS_REGION = "us-east-1" class Test_dynamodb_accelerator_cluster_encryption_enabled: @mock_dax def test_dax_no_clusters(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DAX + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DAX current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled.dax_client", + "prowler.providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled.dax_client", new=DAX(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled import ( dynamodb_accelerator_cluster_encryption_enabled, ) @@ -40,17 +40,17 @@ class Test_dynamodb_accelerator_cluster_encryption_enabled: ReplicationFactor=3, IamRoleArn=iam_role_arn, )["Cluster"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DAX + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DAX current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled.dax_client", + "prowler.providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled.dax_client", new=DAX(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled import ( dynamodb_accelerator_cluster_encryption_enabled, ) @@ -77,17 +77,17 @@ class Test_dynamodb_accelerator_cluster_encryption_enabled: IamRoleArn=iam_role_arn, SSESpecification={"Enabled": True}, )["Cluster"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DAX + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DAX current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled.dax_client", + "prowler.providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled.dax_client", new=DAX(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled import ( dynamodb_accelerator_cluster_encryption_enabled, ) diff --git a/providers/aws/services/dynamodb/dynamodb_service_test.py b/tests/providers/aws/services/dynamodb/dynamodb_service_test.py similarity index 97% rename from providers/aws/services/dynamodb/dynamodb_service_test.py rename to tests/providers/aws/services/dynamodb/dynamodb_service_test.py index 23a3ec46..099e3961 100644 --- a/providers/aws/services/dynamodb/dynamodb_service_test.py +++ b/tests/providers/aws/services/dynamodb/dynamodb_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, session from moto import mock_dax, mock_dynamodb -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.dynamodb.dynamodb_service import DAX, DynamoDB +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.dynamodb.dynamodb_service import DAX, DynamoDB AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled_test.py b/tests/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled_test.py similarity index 69% rename from providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled_test.py rename to tests/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled_test.py index 885b58db..533bdc4e 100644 --- a/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled_test.py +++ b/tests/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled_test.py @@ -10,17 +10,17 @@ AWS_REGION = "us-east-1" class Test_dynamodb_tables_kms_cmk_encryption_enabled: @mock_dynamodb def test_dynamodb_no_tables(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DynamoDB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DynamoDB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_client", + "prowler.providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_client", new=DynamoDB(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled import ( dynamodb_tables_kms_cmk_encryption_enabled, ) @@ -45,17 +45,17 @@ class Test_dynamodb_tables_kms_cmk_encryption_enabled: BillingMode="PAY_PER_REQUEST", SSESpecification={"Enabled": True, "KMSMasterKeyId": "/custom-kms-key"}, )["TableDescription"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DynamoDB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DynamoDB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_client", + "prowler.providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_client", new=DynamoDB(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled import ( dynamodb_tables_kms_cmk_encryption_enabled, ) @@ -83,17 +83,17 @@ class Test_dynamodb_tables_kms_cmk_encryption_enabled: ], BillingMode="PAY_PER_REQUEST", )["TableDescription"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DynamoDB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DynamoDB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_client", + "prowler.providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_client", new=DynamoDB(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled import ( dynamodb_tables_kms_cmk_encryption_enabled, ) diff --git a/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled_test.py b/tests/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled_test.py similarity index 72% rename from providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled_test.py rename to tests/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled_test.py index dbea2374..cfb2f5b2 100644 --- a/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled_test.py +++ b/tests/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled_test.py @@ -10,17 +10,17 @@ AWS_REGION = "us-east-1" class Test_dynamodb_tables_pitr_enabled: @mock_dynamodb def test_dynamodb_no_tables(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DynamoDB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DynamoDB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled.dynamodb_client", + "prowler.providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled.dynamodb_client", new=DynamoDB(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled import ( dynamodb_tables_pitr_enabled, ) @@ -44,17 +44,17 @@ class Test_dynamodb_tables_pitr_enabled: ], BillingMode="PAY_PER_REQUEST", )["TableDescription"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DynamoDB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DynamoDB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled.dynamodb_client", + "prowler.providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled.dynamodb_client", new=DynamoDB(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled import ( dynamodb_tables_pitr_enabled, ) @@ -89,17 +89,17 @@ class Test_dynamodb_tables_pitr_enabled: TableName="test1", PointInTimeRecoverySpecification={"PointInTimeRecoveryEnabled": True}, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DynamoDB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DynamoDB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled.dynamodb_client", + "prowler.providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled.dynamodb_client", new=DynamoDB(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled import ( dynamodb_tables_pitr_enabled, ) diff --git a/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public_test.py b/tests/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public_test.py similarity index 72% rename from providers/aws/services/ec2/ec2_ami_public/ec2_ami_public_test.py rename to tests/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public_test.py index ba06374f..5a5e71d0 100644 --- a/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public_test.py +++ b/tests/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public_test.py @@ -11,17 +11,17 @@ class Test_ec2_ami_public: @mock_ec2 def test_no_amis(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ami_public.ec2_ami_public.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ami_public.ec2_ami_public.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ami_public.ec2_ami_public import ( + from prowler.providers.aws.services.ec2.ec2_ami_public.ec2_ami_public import ( ec2_ami_public, ) @@ -43,16 +43,16 @@ class Test_ec2_ami_public: InstanceId=instance_id, Name="test-ami", Description="this is a test ami" )["ImageId"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ami_public.ec2_ami_public.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ami_public.ec2_ami_public.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_ami_public.ec2_ami_public import ( + from prowler.providers.aws.services.ec2.ec2_ami_public.ec2_ami_public import ( ec2_ami_public, ) @@ -86,16 +86,16 @@ class Test_ec2_ami_public: } image.modify_attribute(**ADD_GROUP_ARGS) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ami_public.ec2_ami_public.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ami_public.ec2_ami_public.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_ami_public.ec2_ami_public import ( + from prowler.providers.aws.services.ec2.ec2_ami_public.ec2_ami_public import ( ec2_ami_public, ) diff --git a/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py b/tests/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py similarity index 68% rename from providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py rename to tests/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py index f8ab2322..404c31f9 100644 --- a/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py +++ b/tests/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py @@ -15,17 +15,17 @@ class Test_ec2_ebs_default_encryption: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.enable_ebs_encryption_by_default() - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption import ( + from prowler.providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption import ( ec2_ebs_default_encryption, ) @@ -45,17 +45,17 @@ class Test_ec2_ebs_default_encryption: @mock_ec2 def test_ec2_ebs_encryption_disabled(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption import ( + from prowler.providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption import ( ec2_ebs_default_encryption, ) diff --git a/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py b/tests/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py similarity index 68% rename from providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py rename to tests/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py index c1f23d6a..3374277a 100644 --- a/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py +++ b/tests/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py @@ -10,17 +10,17 @@ class Test_ec2_ebs_public_snapshot: @mock_ec2 def test_ec2_default_snapshots(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot import ( + from prowler.providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot import ( ec2_ebs_public_snapshot, ) @@ -28,7 +28,7 @@ class Test_ec2_ebs_public_snapshot: result = check.execute() # Default snapshots - assert len(result) == 1433 + assert len(result) == 1485 @mock_ec2 def test_ec2_public_snapshot(self): @@ -43,17 +43,17 @@ class Test_ec2_ebs_public_snapshot: OperationType="add", GroupNames=["all"], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot import ( + from prowler.providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot import ( ec2_ebs_public_snapshot, ) @@ -61,7 +61,7 @@ class Test_ec2_ebs_public_snapshot: results = check.execute() # Default snapshots + 1 created - assert len(results) == 1434 + assert len(results) == 1486 for snap in results: if snap.resource_id == snapshot.id: @@ -79,17 +79,17 @@ class Test_ec2_ebs_public_snapshot: Size=80, AvailabilityZone=f"{AWS_REGION}a", Encrypted=True ) snapshot = volume.create_snapshot(Description="testsnap") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot import ( + from prowler.providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot import ( ec2_ebs_public_snapshot, ) @@ -97,7 +97,7 @@ class Test_ec2_ebs_public_snapshot: results = check.execute() # Default snapshots + 1 created - assert len(results) == 1434 + assert len(results) == 1486 for snap in results: if snap.resource_id == snapshot.id: diff --git a/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py b/tests/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py similarity index 65% rename from providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py rename to tests/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py index d7e95a9b..0285efd0 100644 --- a/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py +++ b/tests/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py @@ -10,17 +10,17 @@ class Test_ec2_ebs_snapshots_encrypted: @mock_ec2 def test_ec2_default_snapshots(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted import ( + from prowler.providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted import ( ec2_ebs_snapshots_encrypted, ) @@ -28,7 +28,7 @@ class Test_ec2_ebs_snapshots_encrypted: result = check.execute() # Default snapshots - assert len(result) == 1433 + assert len(result) == 1485 @mock_ec2 def test_ec2_unencrypted_snapshot(self): @@ -37,17 +37,17 @@ class Test_ec2_ebs_snapshots_encrypted: volume = ec2.create_volume(Size=80, AvailabilityZone=f"{AWS_REGION}a") snapshot = volume.create_snapshot(Description="testsnap") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted import ( + from prowler.providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted import ( ec2_ebs_snapshots_encrypted, ) @@ -55,7 +55,7 @@ class Test_ec2_ebs_snapshots_encrypted: results = check.execute() # Default snapshots + 1 created - assert len(results) == 1434 + assert len(results) == 1486 for snap in results: if snap.resource_id == snapshot.id: @@ -73,17 +73,17 @@ class Test_ec2_ebs_snapshots_encrypted: Size=80, AvailabilityZone=f"{AWS_REGION}a", Encrypted=True ) snapshot = volume.create_snapshot(Description="testsnap") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted import ( + from prowler.providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted import ( ec2_ebs_snapshots_encrypted, ) @@ -91,7 +91,7 @@ class Test_ec2_ebs_snapshots_encrypted: results = check.execute() # Default snapshots + 1 created - assert len(results) == 1434 + assert len(results) == 1486 for snap in results: if snap.resource_id == snapshot.id: diff --git a/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption_test.py b/tests/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption_test.py similarity index 63% rename from providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption_test.py rename to tests/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption_test.py index 0bba7c0f..0633c310 100644 --- a/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption_test.py +++ b/tests/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption_test.py @@ -10,17 +10,17 @@ class Test_ec2_ebs_volume_encryption: @mock_ec2 def test_ec2_no_volumes(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption import ( + from prowler.providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption import ( ec2_ebs_volume_encryption, ) @@ -35,17 +35,17 @@ class Test_ec2_ebs_volume_encryption: ec2 = resource("ec2", region_name=AWS_REGION) volume = ec2.create_volume(Size=80, AvailabilityZone=f"{AWS_REGION}a") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption import ( + from prowler.providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption import ( ec2_ebs_volume_encryption, ) @@ -67,17 +67,17 @@ class Test_ec2_ebs_volume_encryption: Size=80, AvailabilityZone=f"{AWS_REGION}a", Encrypted=True ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption import ( + from prowler.providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption import ( ec2_ebs_volume_encryption, ) diff --git a/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan_test.py b/tests/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan_test.py similarity index 64% rename from providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan_test.py rename to tests/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan_test.py index 8313d3d6..9459f08c 100644 --- a/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan_test.py +++ b/tests/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan_test.py @@ -3,7 +3,7 @@ from unittest import mock from boto3 import client from moto import mock_ec2 -from config.config import get_config_var +from prowler.config.config import get_config_var EXAMPLE_AMI_ID = "ami-12c6146b" shodan_api_key = get_config_var("shodan_api_key") @@ -19,17 +19,19 @@ class Test_ec2_elastic_ip_shodan: # Create EC2 Instance ec2_client.run_instances(ImageId=EXAMPLE_AMI_ID, MinCount=1, MaxCount=1) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import ( + current_audit_info, + ) + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan.ec2_client", + "prowler.providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan import ( + from prowler.providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan import ( ec2_elastic_ip_shodan, ) @@ -45,17 +47,19 @@ class Test_ec2_elastic_ip_shodan: # Create EC2 Instance ec2_client.allocate_address(Domain="vpc") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import ( + current_audit_info, + ) + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan.ec2_client", + "prowler.providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan import ( + from prowler.providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan import ( ec2_elastic_ip_shodan, ) @@ -78,17 +82,19 @@ class Test_ec2_elastic_ip_shodan: InstanceId=instance["Instances"][0]["InstanceId"], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import ( + current_audit_info, + ) + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan.ec2_client", + "prowler.providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan import ( + from prowler.providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan import ( ec2_elastic_ip_shodan, ) diff --git a/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined_test.py b/tests/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined_test.py similarity index 68% rename from providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined_test.py rename to tests/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined_test.py index be732125..b2ea562a 100644 --- a/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined_test.py +++ b/tests/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined_test.py @@ -12,17 +12,17 @@ class Test_ec2_elastic_ip_unassgined: @mock_ec2 def test_no_eips(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined.ec2_client", + "prowler.providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined import ( + from prowler.providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined import ( ec2_elastic_ip_unassgined, ) @@ -37,17 +37,17 @@ class Test_ec2_elastic_ip_unassgined: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.allocate_address(Domain="vpc", Address="127.38.43.222") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined.ec2_client", + "prowler.providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined import ( + from prowler.providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined import ( ec2_elastic_ip_unassgined, ) @@ -80,17 +80,17 @@ class Test_ec2_elastic_ip_unassgined: InstanceId=instance.id, AllocationId=eip.allocation_id ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined.ec2_client", + "prowler.providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined import ( + from prowler.providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined import ( ec2_elastic_ip_unassgined, ) diff --git a/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled_test.py b/tests/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled_test.py rename to tests/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled_test.py index 26bf92d2..c2190b2d 100644 --- a/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled_test.py +++ b/tests/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled_test.py @@ -12,17 +12,17 @@ class Test_ec2_instance_imdsv2_enabled: @mock_ec2 def test_ec2_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled import ( + from prowler.providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled import ( ec2_instance_imdsv2_enabled, ) @@ -45,16 +45,16 @@ class Test_ec2_instance_imdsv2_enabled: }, )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled.ec2_client", new=EC2(current_audit_info), ) as service_client: - from providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled import ( + from prowler.providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled import ( ec2_instance_imdsv2_enabled, ) @@ -86,16 +86,16 @@ class Test_ec2_instance_imdsv2_enabled: }, )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled.ec2_client", new=EC2(current_audit_info), ) as service_client: - from providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled import ( + from prowler.providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled import ( ec2_instance_imdsv2_enabled, ) diff --git a/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile_test.py b/tests/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile_test.py similarity index 71% rename from providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile_test.py rename to tests/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile_test.py index 2f86fedc..e0e97f75 100644 --- a/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile_test.py +++ b/tests/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile_test.py @@ -12,17 +12,17 @@ class Test_ec2_instance_internet_facing_with_instance_profile: @mock_ec2 def test_ec2_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile import ( + from prowler.providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile import ( ec2_instance_internet_facing_with_instance_profile, ) @@ -56,16 +56,16 @@ class Test_ec2_instance_internet_facing_with_instance_profile: ], )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile import ( + from prowler.providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile import ( ec2_instance_internet_facing_with_instance_profile, ) @@ -105,16 +105,16 @@ class Test_ec2_instance_internet_facing_with_instance_profile: ], )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile import ( + from prowler.providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile import ( ec2_instance_internet_facing_with_instance_profile, ) diff --git a/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days_test.py b/tests/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days_test.py similarity index 66% rename from providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days_test.py rename to tests/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days_test.py index 090bfb18..d22a19b1 100644 --- a/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days_test.py +++ b/tests/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days_test.py @@ -14,17 +14,17 @@ class Test_ec2_instance_older_than_specific_days: @mock_ec2 def test_ec2_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days import ( + from prowler.providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days import ( ec2_instance_older_than_specific_days, ) @@ -44,16 +44,16 @@ class Test_ec2_instance_older_than_specific_days: UserData="This is some user_data", )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days import ( + from prowler.providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days import ( ec2_instance_older_than_specific_days, ) @@ -78,16 +78,16 @@ class Test_ec2_instance_older_than_specific_days: UserData="This is some user_data", )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days.ec2_client", new=EC2(current_audit_info), ) as service_client: - from providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days import ( + from prowler.providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days import ( ec2_instance_older_than_specific_days, ) diff --git a/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached_test.py b/tests/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached_test.py similarity index 72% rename from providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached_test.py rename to tests/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached_test.py index 2893e89b..d4aadc98 100644 --- a/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached_test.py +++ b/tests/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached_test.py @@ -12,17 +12,17 @@ class Test_ec2_instance_profile_attached: @mock_ec2 def test_ec2_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached import ( + from prowler.providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached import ( ec2_instance_profile_attached, ) @@ -56,16 +56,16 @@ class Test_ec2_instance_profile_attached: ], )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached import ( + from prowler.providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached import ( ec2_instance_profile_attached, ) @@ -98,16 +98,16 @@ class Test_ec2_instance_profile_attached: ], )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached import ( + from prowler.providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached import ( ec2_instance_profile_attached, ) diff --git a/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip_test.py b/tests/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip_test.py similarity index 71% rename from providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip_test.py rename to tests/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip_test.py index e4c9729d..7381286e 100644 --- a/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip_test.py +++ b/tests/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip_test.py @@ -12,17 +12,17 @@ class Test_ec2_instance_public_ip: @mock_ec2 def test_ec2_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip import ( + from prowler.providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip import ( ec2_instance_public_ip, ) @@ -50,16 +50,16 @@ class Test_ec2_instance_public_ip: ], )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip import ( + from prowler.providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip import ( ec2_instance_public_ip, ) @@ -93,16 +93,16 @@ class Test_ec2_instance_public_ip: ], )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip import ( + from prowler.providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip import ( ec2_instance_public_ip, ) diff --git a/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data_test.py b/tests/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data_test.py similarity index 66% rename from providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data_test.py rename to tests/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data_test.py index 990321f4..86876cd1 100644 --- a/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data_test.py +++ b/tests/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data_test.py @@ -11,17 +11,17 @@ class Test_ec2_instance_secrets_user_data: @mock_ec2 def test_no_ec2(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( + from prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( ec2_instance_secrets_user_data, ) @@ -41,16 +41,16 @@ class Test_ec2_instance_secrets_user_data: UserData="This is some user_data", )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( + from prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( ec2_instance_secrets_user_data, ) @@ -76,16 +76,16 @@ class Test_ec2_instance_secrets_user_data: UserData="DB_PASSWORD=foobar123", )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( + from prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( ec2_instance_secrets_user_data, ) @@ -104,7 +104,7 @@ class Test_ec2_instance_secrets_user_data: def test_one_ec2_file_with_secrets(self): # Include launch_configurations to check f = open( - "providers/aws/services/ec2/ec2_instance_secrets_user_data/fixtures/fixture", + "prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/fixtures/fixture", "r", ) secrets = f.read() @@ -113,16 +113,16 @@ class Test_ec2_instance_secrets_user_data: ImageId=EXAMPLE_AMI_ID, MinCount=1, MaxCount=1, UserData=secrets )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( + from prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( ec2_instance_secrets_user_data, ) @@ -145,16 +145,16 @@ class Test_ec2_instance_secrets_user_data: ImageId=EXAMPLE_AMI_ID, MinCount=1, MaxCount=1, UserData="" )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( + from prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( ec2_instance_secrets_user_data, ) diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port_test.py b/tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port_test.py rename to tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port_test.py index 11c5f4da..d3bf22b8 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port_test.py +++ b/tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port_test.py @@ -10,17 +10,17 @@ class ec2_networkacl_allow_ingress_any_port: @mock_ec2 def test_ec2_default_nacls(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( ec2_networkacl_allow_ingress_any_port, ) @@ -33,17 +33,17 @@ class ec2_networkacl_allow_ingress_any_port: @mock_ec2 def test_ec2_non_default_compliant_nacl(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( ec2_networkacl_allow_ingress_any_port, ) @@ -77,17 +77,17 @@ class ec2_networkacl_allow_ingress_any_port: CidrBlock="0.0.0.0/0", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( ec2_networkacl_allow_ingress_any_port, ) @@ -122,17 +122,17 @@ class ec2_networkacl_allow_ingress_any_port: CidrBlock="10.0.0.2/32", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( ec2_networkacl_allow_ingress_any_port, ) diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py b/tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py rename to tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py index f7ab0cd3..b3e72215 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py +++ b/tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py @@ -10,17 +10,17 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_22: @mock_ec2 def test_ec2_default_nacls(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( ec2_networkacl_allow_ingress_tcp_port_22, ) @@ -33,17 +33,17 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_22: @mock_ec2 def test_ec2_non_default_compliant_nacl(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( ec2_networkacl_allow_ingress_tcp_port_22, ) @@ -78,17 +78,17 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_22: CidrBlock="0.0.0.0/0", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( ec2_networkacl_allow_ingress_tcp_port_22, ) @@ -124,17 +124,17 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_22: CidrBlock="10.0.0.2/32", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( ec2_networkacl_allow_ingress_tcp_port_22, ) diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py b/tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py rename to tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py index b732c752..313664de 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py +++ b/tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py @@ -10,17 +10,17 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_3389: @mock_ec2 def test_ec2_default_nacls(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( ec2_networkacl_allow_ingress_tcp_port_3389, ) @@ -33,17 +33,17 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_3389: @mock_ec2 def test_ec2_non_default_compliant_nacl(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( ec2_networkacl_allow_ingress_tcp_port_3389, ) @@ -78,17 +78,17 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_3389: CidrBlock="0.0.0.0/0", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( ec2_networkacl_allow_ingress_tcp_port_3389, ) @@ -124,17 +124,17 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_3389: CidrBlock="10.0.0.2/32", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( ec2_networkacl_allow_ingress_tcp_port_3389, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py index 60b10952..58129049 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_any_port: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port import ( ec2_securitygroup_allow_ingress_from_internet_to_any_port, ) @@ -54,17 +54,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_any_port: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port import ( ec2_securitygroup_allow_ingress_from_internet_to_any_port, ) @@ -100,17 +100,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_any_port: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port import ( ec2_securitygroup_allow_ingress_from_internet_to_any_port, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py index 22122903..383b2a67 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_2 ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018 import ( ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018, ) @@ -58,17 +58,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_2 ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018 import ( ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018, ) @@ -108,17 +108,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_2 ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018 import ( ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py similarity index 71% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py index 4e93b7a5..b8360128 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21, ) @@ -58,17 +58,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21, ) @@ -108,17 +108,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py similarity index 71% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py index 86258195..3b34ecc6 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22, ) @@ -56,17 +56,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22, ) @@ -104,17 +104,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py similarity index 71% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py index 13e2eaac..e72121b8 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389, ) @@ -56,17 +56,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389, ) @@ -104,17 +104,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py similarity index 69% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py index 08a3a654..8bdeb896 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7 ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888, ) @@ -58,17 +58,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7 ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888, ) @@ -108,17 +108,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7 ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py similarity index 68% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py index 704d8c69..0f726d6d 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsear ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601, ) @@ -58,17 +58,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsear ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601, ) @@ -108,17 +108,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsear ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py index ccb82eee..aba5ad6d 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092, ) @@ -58,17 +58,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092, ) @@ -107,17 +107,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py index 3bb2f68b..bd6d6ffe 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_1 ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211, ) @@ -58,17 +58,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_1 ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211, ) @@ -108,17 +108,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_1 ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py index 68c41ba1..5c6528c7 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306, ) @@ -58,17 +58,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306, ) @@ -108,17 +108,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py index 775ac1eb..a54443a0 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521 ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483, ) @@ -58,17 +58,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521 ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483, ) @@ -108,17 +108,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521 ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py index 8a14347b..665da2ed 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_54 ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432, ) @@ -58,17 +58,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_54 ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432, ) @@ -108,17 +108,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_54 ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py index 7d1998b2..f60ccfb3 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379, ) @@ -58,17 +58,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379, ) @@ -107,17 +107,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py index 63e333ba..37efa7a8 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py @@ -14,17 +14,17 @@ class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_ ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434, ) @@ -58,17 +58,17 @@ class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_ ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434, ) @@ -108,17 +108,17 @@ class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_ ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py index 37074927..8e11596f 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23, ) @@ -58,17 +58,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23, ) @@ -107,17 +107,17 @@ class Test_ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py similarity index 72% rename from providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py index 57448c93..bc7e3565 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_allow_wide_open_public_ipv4: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4 import ( ec2_securitygroup_allow_wide_open_public_ipv4, ) @@ -54,17 +54,17 @@ class Test_ec2_securitygroup_allow_wide_open_public_ipv4: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4 import ( ec2_securitygroup_allow_wide_open_public_ipv4, ) @@ -100,17 +100,17 @@ class Test_ec2_securitygroup_allow_wide_open_public_ipv4: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4 import ( ec2_securitygroup_allow_wide_open_public_ipv4, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py similarity index 72% rename from providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py index 7e8e33c5..5c524c0e 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py @@ -13,17 +13,17 @@ class Test_ec2_securitygroup_default_restrict_traffic: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic import ( ec2_securitygroup_default_restrict_traffic, ) @@ -48,17 +48,17 @@ class Test_ec2_securitygroup_default_restrict_traffic: IpPermissions=[{"IpProtocol": "-1", "IpRanges": [{"CidrIp": "0.0.0.0/0"}]}], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic import ( ec2_securitygroup_default_restrict_traffic, ) @@ -91,17 +91,17 @@ class Test_ec2_securitygroup_default_restrict_traffic: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic import ( ec2_securitygroup_default_restrict_traffic, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py similarity index 72% rename from providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py index 0a88ec48..5c61267a 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py @@ -15,17 +15,17 @@ class Test_ec2_securitygroup_from_launch_wizard: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard import ( ec2_securitygroup_from_launch_wizard, ) @@ -46,17 +46,17 @@ class Test_ec2_securitygroup_from_launch_wizard: GroupName="launch-wizard-1", Description="launch wizard sg" )["GroupId"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard import ( ec2_securitygroup_from_launch_wizard, ) @@ -92,17 +92,17 @@ class Test_ec2_securitygroup_from_launch_wizard: default_sg_id, ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard import ( ec2_securitygroup_from_launch_wizard, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py similarity index 72% rename from providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py index b4d56ba5..dfef038e 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py @@ -15,17 +15,17 @@ class Test_ec2_securitygroup_in_use_without_ingress_filtering: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( ec2_securitygroup_in_use_without_ingress_filtering, ) @@ -55,17 +55,17 @@ class Test_ec2_securitygroup_in_use_without_ingress_filtering: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( ec2_securitygroup_in_use_without_ingress_filtering, ) @@ -109,17 +109,17 @@ class Test_ec2_securitygroup_in_use_without_ingress_filtering: default_sg_id, ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( ec2_securitygroup_in_use_without_ingress_filtering, ) @@ -146,17 +146,17 @@ class Test_ec2_securitygroup_in_use_without_ingress_filtering: "SecurityGroups" ][0]["GroupId"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( ec2_securitygroup_in_use_without_ingress_filtering, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py similarity index 73% rename from providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py index 056c6f6d..a8e3bb88 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py @@ -15,17 +15,17 @@ class Test_ec2_securitygroup_not_used: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used import ( ec2_securitygroup_not_used, ) @@ -46,17 +46,17 @@ class Test_ec2_securitygroup_not_used: "SecurityGroups" ][0]["GroupId"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used import ( ec2_securitygroup_not_used, ) @@ -92,17 +92,17 @@ class Test_ec2_securitygroup_not_used: default_sg_id, ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used import ( ec2_securitygroup_not_used, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py similarity index 73% rename from providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py index 4cda309a..9216607c 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py @@ -14,17 +14,17 @@ class Test_ec2_securitygroup_with_many_ingress_egress_rules: ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules import ( ec2_securitygroup_with_many_ingress_egress_rules, ) @@ -57,17 +57,17 @@ class Test_ec2_securitygroup_with_many_ingress_egress_rules: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules import ( ec2_securitygroup_with_many_ingress_egress_rules, ) @@ -104,17 +104,17 @@ class Test_ec2_securitygroup_with_many_ingress_egress_rules: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules import ( ec2_securitygroup_with_many_ingress_egress_rules, ) diff --git a/providers/aws/services/ec2/ec2_service_test.py b/tests/providers/aws/services/ec2/ec2_service_test.py similarity index 98% rename from providers/aws/services/ec2/ec2_service_test.py rename to tests/providers/aws/services/ec2/ec2_service_test.py index 591edb07..19e5bec6 100644 --- a/providers/aws/services/ec2/ec2_service_test.py +++ b/tests/providers/aws/services/ec2/ec2_service_test.py @@ -3,8 +3,8 @@ from base64 import b64decode from boto3 import client, resource, session from moto import mock_ec2 -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.ec2.ec2_service import EC2 +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.ec2.ec2_service import EC2 AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/ec2/lib/network_acls_test.py b/tests/providers/aws/services/ec2/lib/network_acls_test.py similarity index 99% rename from providers/aws/services/ec2/lib/network_acls_test.py rename to tests/providers/aws/services/ec2/lib/network_acls_test.py index 3e0104d3..226f7850 100644 --- a/providers/aws/services/ec2/lib/network_acls_test.py +++ b/tests/providers/aws/services/ec2/lib/network_acls_test.py @@ -1,4 +1,4 @@ -from providers.aws.services.ec2.lib.network_acls import check_network_acl +from prowler.providers.aws.services.ec2.lib.network_acls import check_network_acl default_deny_entry_ingress_IPv4 = { "CidrBlock": "0.0.0.0/0", diff --git a/providers/aws/services/ec2/lib/security_groups_test.py b/tests/providers/aws/services/ec2/lib/security_groups_test.py similarity index 86% rename from providers/aws/services/ec2/lib/security_groups_test.py rename to tests/providers/aws/services/ec2/lib/security_groups_test.py index 0dd63cbb..3d78c51e 100644 --- a/providers/aws/services/ec2/lib/security_groups_test.py +++ b/tests/providers/aws/services/ec2/lib/security_groups_test.py @@ -1,6 +1,6 @@ import pytest -from providers.aws.services.ec2.lib.security_groups import _is_cidr_public +from prowler.providers.aws.services.ec2.lib.security_groups import _is_cidr_public class Test_security_groups: diff --git a/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled_test.py b/tests/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled_test.py similarity index 84% rename from providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled_test.py rename to tests/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled_test.py index 4b046fd4..50d914fd 100644 --- a/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled_test.py +++ b/tests/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.ecr.ecr_service import Repository +from prowler.providers.aws.services.ecr.ecr_service import Repository # Mock Test Region AWS_REGION = "eu-west-1" @@ -40,10 +40,10 @@ class Test_ecr_repositories_lifecycle_policy_enabled: ) with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_lifecycle_policy_enabled.ecr_repositories_lifecycle_policy_enabled import ( + from prowler.providers.aws.services.ecr.ecr_repositories_lifecycle_policy_enabled.ecr_repositories_lifecycle_policy_enabled import ( ecr_repositories_lifecycle_policy_enabled, ) @@ -71,10 +71,10 @@ class Test_ecr_repositories_lifecycle_policy_enabled: ) with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_lifecycle_policy_enabled.ecr_repositories_lifecycle_policy_enabled import ( + from prowler.providers.aws.services.ecr.ecr_repositories_lifecycle_policy_enabled.ecr_repositories_lifecycle_policy_enabled import ( ecr_repositories_lifecycle_policy_enabled, ) diff --git a/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible_test.py b/tests/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible_test.py similarity index 85% rename from providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible_test.py rename to tests/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible_test.py index 29b3b1a2..a9f0636c 100644 --- a/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.ecr.ecr_service import Repository +from prowler.providers.aws.services.ecr.ecr_service import Repository # Mock Test Region AWS_REGION = "eu-west-1" @@ -52,10 +52,10 @@ class Test_ecr_repositories_not_publicly_accessible: ) with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_not_publicly_accessible.ecr_repositories_not_publicly_accessible import ( + from prowler.providers.aws.services.ecr.ecr_repositories_not_publicly_accessible.ecr_repositories_not_publicly_accessible import ( ecr_repositories_not_publicly_accessible, ) @@ -83,10 +83,10 @@ class Test_ecr_repositories_not_publicly_accessible: ) with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_not_publicly_accessible.ecr_repositories_not_publicly_accessible import ( + from prowler.providers.aws.services.ecr.ecr_repositories_not_publicly_accessible.ecr_repositories_not_publicly_accessible import ( ecr_repositories_not_publicly_accessible, ) diff --git a/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled_test.py b/tests/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled_test.py similarity index 83% rename from providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled_test.py rename to tests/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled_test.py index 743effac..b6f63f65 100644 --- a/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled_test.py +++ b/tests/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.ecr.ecr_service import Repository +from prowler.providers.aws.services.ecr.ecr_service import Repository # Mock Test Region AWS_REGION = "eu-west-1" @@ -40,10 +40,10 @@ class Test_ecr_repositories_scan_images_on_push_enabled: ) with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_scan_images_on_push_enabled.ecr_repositories_scan_images_on_push_enabled import ( + from prowler.providers.aws.services.ecr.ecr_repositories_scan_images_on_push_enabled.ecr_repositories_scan_images_on_push_enabled import ( ecr_repositories_scan_images_on_push_enabled, ) @@ -71,10 +71,10 @@ class Test_ecr_repositories_scan_images_on_push_enabled: ) with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_scan_images_on_push_enabled.ecr_repositories_scan_images_on_push_enabled import ( + from prowler.providers.aws.services.ecr.ecr_repositories_scan_images_on_push_enabled.ecr_repositories_scan_images_on_push_enabled import ( ecr_repositories_scan_images_on_push_enabled, ) diff --git a/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image_test.py b/tests/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image_test.py similarity index 86% rename from providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image_test.py rename to tests/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image_test.py index d72d91a6..2df47e01 100644 --- a/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image_test.py +++ b/tests/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.ecr.ecr_service import ( +from prowler.providers.aws.services.ecr.ecr_service import ( FindingSeverityCounts, ImageDetails, Repository, @@ -53,10 +53,10 @@ class Test_ecr_repositories_scan_vulnerabilities_in_latest_image: ), ), with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( + from prowler.providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( ecr_repositories_scan_vulnerabilities_in_latest_image, ) @@ -93,10 +93,10 @@ class Test_ecr_repositories_scan_vulnerabilities_in_latest_image: ), ), with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( + from prowler.providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( ecr_repositories_scan_vulnerabilities_in_latest_image, ) @@ -133,10 +133,10 @@ class Test_ecr_repositories_scan_vulnerabilities_in_latest_image: ), ), with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( + from prowler.providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( ecr_repositories_scan_vulnerabilities_in_latest_image, ) @@ -173,10 +173,10 @@ class Test_ecr_repositories_scan_vulnerabilities_in_latest_image: ), ), with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( + from prowler.providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( ecr_repositories_scan_vulnerabilities_in_latest_image, ) diff --git a/providers/aws/services/ecr/ecr_service_test.py b/tests/providers/aws/services/ecr/ecr_service_test.py similarity index 97% rename from providers/aws/services/ecr/ecr_service_test.py rename to tests/providers/aws/services/ecr/ecr_service_test.py index eb5b1cd9..cdf3349c 100644 --- a/providers/aws/services/ecr/ecr_service_test.py +++ b/tests/providers/aws/services/ecr/ecr_service_test.py @@ -4,8 +4,8 @@ import botocore from boto3 import client, session from moto import mock_ecr -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.ecr.ecr_service import ECR +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.ecr.ecr_service import ECR AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -65,7 +65,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.ecr.ecr_service.generate_regional_clients", + "prowler.providers.aws.services.ecr.ecr_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_ECR_Service: diff --git a/providers/aws/services/ecs/ecs_service_test.py b/tests/providers/aws/services/ecs/ecs_service_test.py similarity index 95% rename from providers/aws/services/ecs/ecs_service_test.py rename to tests/providers/aws/services/ecs/ecs_service_test.py index a900d774..82b26dd3 100644 --- a/providers/aws/services/ecs/ecs_service_test.py +++ b/tests/providers/aws/services/ecs/ecs_service_test.py @@ -3,8 +3,8 @@ from unittest.mock import patch from boto3 import client, session from moto import mock_ecs -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.ecs.ecs_service import ECS +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.ecs.ecs_service import ECS AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -17,7 +17,7 @@ def mock_generate_regional_clients(service, audit_info): @patch( - "providers.aws.services.ecs.ecs_service.generate_regional_clients", + "prowler.providers.aws.services.ecs.ecs_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_ECS_Service: diff --git a/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets_test.py b/tests/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets_test.py similarity index 81% rename from providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets_test.py rename to tests/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets_test.py index 8c3653db..a8da2b65 100644 --- a/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets_test.py +++ b/tests/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets_test.py @@ -1,7 +1,10 @@ from re import search from unittest import mock -from providers.aws.services.ecs.ecs_service import ContainerEnvVariable, TaskDefinition +from prowler.providers.aws.services.ecs.ecs_service import ( + ContainerEnvVariable, + TaskDefinition, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -18,10 +21,10 @@ class Test_ecs_task_definitions_no_environment_secrets: ecs_client.task_definitions = [] with mock.patch( - "providers.aws.services.ecs.ecs_service.ECS", + "prowler.providers.aws.services.ecs.ecs_service.ECS", ecs_client, ): - from providers.aws.services.ecs.ecs_task_definitions_no_environment_secrets.ecs_task_definitions_no_environment_secrets import ( + from prowler.providers.aws.services.ecs.ecs_task_definitions_no_environment_secrets.ecs_task_definitions_no_environment_secrets import ( ecs_task_definitions_no_environment_secrets, ) @@ -46,10 +49,10 @@ class Test_ecs_task_definitions_no_environment_secrets: ) with mock.patch( - "providers.aws.services.ecs.ecs_service.ECS", + "prowler.providers.aws.services.ecs.ecs_service.ECS", ecs_client, ): - from providers.aws.services.ecs.ecs_task_definitions_no_environment_secrets.ecs_task_definitions_no_environment_secrets import ( + from prowler.providers.aws.services.ecs.ecs_task_definitions_no_environment_secrets.ecs_task_definitions_no_environment_secrets import ( ecs_task_definitions_no_environment_secrets, ) @@ -83,10 +86,10 @@ class Test_ecs_task_definitions_no_environment_secrets: ) with mock.patch( - "providers.aws.services.ecs.ecs_service.ECS", + "prowler.providers.aws.services.ecs.ecs_service.ECS", ecs_client, ): - from providers.aws.services.ecs.ecs_task_definitions_no_environment_secrets.ecs_task_definitions_no_environment_secrets import ( + from prowler.providers.aws.services.ecs.ecs_task_definitions_no_environment_secrets.ecs_task_definitions_no_environment_secrets import ( ecs_task_definitions_no_environment_secrets, ) diff --git a/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled_test.py b/tests/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled_test.py similarity index 81% rename from providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled_test.py rename to tests/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled_test.py index 087dcfc8..c07eae0f 100644 --- a/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled_test.py +++ b/tests/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.efs.efs_service import FileSystem +from prowler.providers.aws.services.efs.efs_service import FileSystem # Mock Test Region AWS_REGION = "eu-west-1" @@ -25,10 +25,10 @@ class Test_efs_encryption_at_rest_enabled: ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_encryption_at_rest_enabled.efs_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.efs.efs_encryption_at_rest_enabled.efs_encryption_at_rest_enabled import ( efs_encryption_at_rest_enabled, ) @@ -52,10 +52,10 @@ class Test_efs_encryption_at_rest_enabled: ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_encryption_at_rest_enabled.efs_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.efs.efs_encryption_at_rest_enabled.efs_encryption_at_rest_enabled import ( efs_encryption_at_rest_enabled, ) diff --git a/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled_test.py b/tests/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled_test.py similarity index 82% rename from providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled_test.py rename to tests/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled_test.py index bbb4e74d..c7940c15 100644 --- a/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled_test.py +++ b/tests/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.efs.efs_service import FileSystem +from prowler.providers.aws.services.efs.efs_service import FileSystem # Mock Test Region AWS_REGION = "eu-west-1" @@ -27,10 +27,10 @@ class Test_efs_have_backup_enabled: ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_have_backup_enabled.efs_have_backup_enabled import ( + from prowler.providers.aws.services.efs.efs_have_backup_enabled.efs_have_backup_enabled import ( efs_have_backup_enabled, ) @@ -54,10 +54,10 @@ class Test_efs_have_backup_enabled: ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_have_backup_enabled.efs_have_backup_enabled import ( + from prowler.providers.aws.services.efs.efs_have_backup_enabled.efs_have_backup_enabled import ( efs_have_backup_enabled, ) @@ -81,10 +81,10 @@ class Test_efs_have_backup_enabled: ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_have_backup_enabled.efs_have_backup_enabled import ( + from prowler.providers.aws.services.efs.efs_have_backup_enabled.efs_have_backup_enabled import ( efs_have_backup_enabled, ) diff --git a/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible_test.py b/tests/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible_test.py similarity index 84% rename from providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible_test.py rename to tests/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible_test.py index 0009d25b..10359841 100644 --- a/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.efs.efs_service import FileSystem +from prowler.providers.aws.services.efs.efs_service import FileSystem # Mock Test Region AWS_REGION = "eu-west-1" @@ -46,10 +46,10 @@ class Test_efs_not_publicly_accessible: ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_not_publicly_accessible.efs_not_publicly_accessible import ( + from prowler.providers.aws.services.efs.efs_not_publicly_accessible.efs_not_publicly_accessible import ( efs_not_publicly_accessible, ) @@ -76,10 +76,10 @@ class Test_efs_not_publicly_accessible: ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_not_publicly_accessible.efs_not_publicly_accessible import ( + from prowler.providers.aws.services.efs.efs_not_publicly_accessible.efs_not_publicly_accessible import ( efs_not_publicly_accessible, ) @@ -105,10 +105,10 @@ class Test_efs_not_publicly_accessible: ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_not_publicly_accessible.efs_not_publicly_accessible import ( + from prowler.providers.aws.services.efs.efs_not_publicly_accessible.efs_not_publicly_accessible import ( efs_not_publicly_accessible, ) diff --git a/providers/aws/services/efs/efs_service_test.py b/tests/providers/aws/services/efs/efs_service_test.py similarity index 94% rename from providers/aws/services/efs/efs_service_test.py rename to tests/providers/aws/services/efs/efs_service_test.py index f6292c14..e88325bd 100644 --- a/providers/aws/services/efs/efs_service_test.py +++ b/tests/providers/aws/services/efs/efs_service_test.py @@ -4,8 +4,8 @@ import botocore from boto3 import client, session from moto import mock_efs -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.efs.efs_service import EFS +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.efs.efs_service import EFS # Mock Test Region AWS_REGION = "eu-west-1" @@ -49,7 +49,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.efs.efs_service.generate_regional_clients", + "prowler.providers.aws.services.efs.efs_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_EFS: diff --git a/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled_test.py b/tests/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled_test.py similarity index 76% rename from providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled_test.py rename to tests/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled_test.py index 396e9273..3b84a7f2 100644 --- a/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled_test.py +++ b/tests/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.eks.eks_service import EKSCluster +from prowler.providers.aws.services.eks.eks_service import EKSCluster AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ class Test_eks_cluster_kms_cmk_encryption_in_secrets_enabled: eks_client = mock.MagicMock eks_client.clusters = [] with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_cluster_kms_cmk_encryption_in_secrets_enabled.eks_cluster_kms_cmk_encryption_in_secrets_enabled import ( + from prowler.providers.aws.services.eks.eks_cluster_kms_cmk_encryption_in_secrets_enabled.eks_cluster_kms_cmk_encryption_in_secrets_enabled import ( eks_cluster_kms_cmk_encryption_in_secrets_enabled, ) @@ -39,10 +39,10 @@ class Test_eks_cluster_kms_cmk_encryption_in_secrets_enabled: ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_cluster_kms_cmk_encryption_in_secrets_enabled.eks_cluster_kms_cmk_encryption_in_secrets_enabled import ( + from prowler.providers.aws.services.eks.eks_cluster_kms_cmk_encryption_in_secrets_enabled.eks_cluster_kms_cmk_encryption_in_secrets_enabled import ( eks_cluster_kms_cmk_encryption_in_secrets_enabled, ) @@ -69,10 +69,10 @@ class Test_eks_cluster_kms_cmk_encryption_in_secrets_enabled: ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_cluster_kms_cmk_encryption_in_secrets_enabled.eks_cluster_kms_cmk_encryption_in_secrets_enabled import ( + from prowler.providers.aws.services.eks.eks_cluster_kms_cmk_encryption_in_secrets_enabled.eks_cluster_kms_cmk_encryption_in_secrets_enabled import ( eks_cluster_kms_cmk_encryption_in_secrets_enabled, ) diff --git a/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted_test.py b/tests/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted_test.py similarity index 80% rename from providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted_test.py rename to tests/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted_test.py index a3a40812..e4392c4e 100644 --- a/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted_test.py +++ b/tests/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.eks.eks_service import EKSCluster +from prowler.providers.aws.services.eks.eks_service import EKSCluster AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ class Test_eks_control_plane_endpoint_access_restricted: eks_client = mock.MagicMock eks_client.clusters = [] with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( + from prowler.providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( eks_control_plane_endpoint_access_restricted, ) @@ -42,10 +42,10 @@ class Test_eks_control_plane_endpoint_access_restricted: ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( + from prowler.providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( eks_control_plane_endpoint_access_restricted, ) @@ -76,10 +76,10 @@ class Test_eks_control_plane_endpoint_access_restricted: ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( + from prowler.providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( eks_control_plane_endpoint_access_restricted, ) @@ -110,10 +110,10 @@ class Test_eks_control_plane_endpoint_access_restricted: ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( + from prowler.providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( eks_control_plane_endpoint_access_restricted, ) diff --git a/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled_test.py b/tests/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled_test.py similarity index 80% rename from providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled_test.py rename to tests/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled_test.py index dbc49611..601213aa 100644 --- a/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled_test.py +++ b/tests/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled_test.py @@ -1,7 +1,10 @@ from re import search from unittest import mock -from providers.aws.services.eks.eks_service import EKSCluster, EKSClusterLoggingEntity +from prowler.providers.aws.services.eks.eks_service import ( + EKSCluster, + EKSClusterLoggingEntity, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +18,10 @@ class Test_eks_control_plane_logging_all_types_enabled: eks_client = mock.MagicMock eks_client.clusters = [] with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( + from prowler.providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( eks_control_plane_logging_all_types_enabled, ) @@ -39,10 +42,10 @@ class Test_eks_control_plane_logging_all_types_enabled: ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( + from prowler.providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( eks_control_plane_logging_all_types_enabled, ) @@ -73,10 +76,10 @@ class Test_eks_control_plane_logging_all_types_enabled: ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( + from prowler.providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( eks_control_plane_logging_all_types_enabled, ) @@ -113,10 +116,10 @@ class Test_eks_control_plane_logging_all_types_enabled: ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( + from prowler.providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( eks_control_plane_logging_all_types_enabled, ) diff --git a/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible_test.py b/tests/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible_test.py similarity index 79% rename from providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible_test.py rename to tests/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible_test.py index 95b27d6e..5ad7dba1 100644 --- a/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.eks.eks_service import EKSCluster +from prowler.providers.aws.services.eks.eks_service import EKSCluster AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ class Test_eks_endpoints_not_publicly_accessible: eks_client = mock.MagicMock eks_client.clusters = [] with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_endpoints_not_publicly_accessible.eks_endpoints_not_publicly_accessible import ( + from prowler.providers.aws.services.eks.eks_endpoints_not_publicly_accessible.eks_endpoints_not_publicly_accessible import ( eks_endpoints_not_publicly_accessible, ) @@ -41,10 +41,10 @@ class Test_eks_endpoints_not_publicly_accessible: ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_endpoints_not_publicly_accessible.eks_endpoints_not_publicly_accessible import ( + from prowler.providers.aws.services.eks.eks_endpoints_not_publicly_accessible.eks_endpoints_not_publicly_accessible import ( eks_endpoints_not_publicly_accessible, ) @@ -74,10 +74,10 @@ class Test_eks_endpoints_not_publicly_accessible: ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_endpoints_not_publicly_accessible.eks_endpoints_not_publicly_accessible import ( + from prowler.providers.aws.services.eks.eks_endpoints_not_publicly_accessible.eks_endpoints_not_publicly_accessible import ( eks_endpoints_not_publicly_accessible, ) diff --git a/providers/aws/services/eks/eks_service_test.py b/tests/providers/aws/services/eks/eks_service_test.py similarity index 96% rename from providers/aws/services/eks/eks_service_test.py rename to tests/providers/aws/services/eks/eks_service_test.py index bb62395d..6cfdc519 100644 --- a/providers/aws/services/eks/eks_service_test.py +++ b/tests/providers/aws/services/eks/eks_service_test.py @@ -3,8 +3,8 @@ from unittest.mock import patch from boto3 import client, session from moto import mock_ec2, mock_eks -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.eks.eks_service import EKS +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.eks.eks_service import EKS AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -22,7 +22,7 @@ def mock_generate_regional_clients(service, audit_info): @patch( - "providers.aws.services.eks.eks_service.generate_regional_clients", + "prowler.providers.aws.services.eks.eks_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_EKS_Service: diff --git a/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers_test.py b/tests/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers_test.py similarity index 75% rename from providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers_test.py rename to tests/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers_test.py index e4ebeaa3..aacbd1cb 100644 --- a/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers_test.py +++ b/tests/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers_test.py @@ -12,17 +12,17 @@ class Test_elb_insecure_ssl_ciphers: @mock_elb def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers.elb_client", + "prowler.providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers.elb_client", new=ELB(current_audit_info), ): # Test Check - from providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers import ( + from prowler.providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers import ( elb_insecure_ssl_ciphers, ) @@ -59,16 +59,16 @@ class Test_elb_insecure_ssl_ciphers: ) elb.describe_load_balancer_policies(LoadBalancerName="my-lb") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers.elb_client", + "prowler.providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers import ( + from prowler.providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers import ( elb_insecure_ssl_ciphers, ) @@ -104,16 +104,16 @@ class Test_elb_insecure_ssl_ciphers: SecurityGroups=[security_group.id], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers.elb_client", + "prowler.providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers import ( + from prowler.providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers import ( elb_insecure_ssl_ciphers, ) diff --git a/providers/aws/services/elb/elb_internet_facing/elb_internet_facing_test.py b/tests/providers/aws/services/elb/elb_internet_facing/elb_internet_facing_test.py similarity index 74% rename from providers/aws/services/elb/elb_internet_facing/elb_internet_facing_test.py rename to tests/providers/aws/services/elb/elb_internet_facing/elb_internet_facing_test.py index 118b0226..31d9f4ad 100644 --- a/providers/aws/services/elb/elb_internet_facing/elb_internet_facing_test.py +++ b/tests/providers/aws/services/elb/elb_internet_facing/elb_internet_facing_test.py @@ -12,17 +12,17 @@ class Test_elb_request_smugling: @mock_elb def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_internet_facing.elb_internet_facing.elb_client", + "prowler.providers.aws.services.elb.elb_internet_facing.elb_internet_facing.elb_client", new=ELB(current_audit_info), ): # Test Check - from providers.aws.services.elb.elb_internet_facing.elb_internet_facing import ( + from prowler.providers.aws.services.elb.elb_internet_facing.elb_internet_facing import ( elb_internet_facing, ) @@ -52,16 +52,16 @@ class Test_elb_request_smugling: SecurityGroups=[security_group.id], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_internet_facing.elb_internet_facing.elb_client", + "prowler.providers.aws.services.elb.elb_internet_facing.elb_internet_facing.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_internet_facing.elb_internet_facing import ( + from prowler.providers.aws.services.elb.elb_internet_facing.elb_internet_facing import ( elb_internet_facing, ) @@ -97,16 +97,16 @@ class Test_elb_request_smugling: SecurityGroups=[security_group.id], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_internet_facing.elb_internet_facing.elb_client", + "prowler.providers.aws.services.elb.elb_internet_facing.elb_internet_facing.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_internet_facing.elb_internet_facing import ( + from prowler.providers.aws.services.elb.elb_internet_facing.elb_internet_facing import ( elb_internet_facing, ) diff --git a/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled_test.py b/tests/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled_test.py similarity index 76% rename from providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled_test.py rename to tests/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled_test.py index 7bb89c9e..732c227a 100644 --- a/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled_test.py +++ b/tests/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled_test.py @@ -12,17 +12,17 @@ class Test_elb_logging_enabled: @mock_elb def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled.elb_client", + "prowler.providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled.elb_client", new=ELB(current_audit_info), ): # Test Check - from providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled import ( + from prowler.providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled import ( elb_logging_enabled, ) @@ -52,16 +52,16 @@ class Test_elb_logging_enabled: SecurityGroups=[security_group.id], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled.elb_client", + "prowler.providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled import ( + from prowler.providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled import ( elb_logging_enabled, ) @@ -109,16 +109,16 @@ class Test_elb_logging_enabled: }, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled.elb_client", + "prowler.providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled import ( + from prowler.providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled import ( elb_logging_enabled, ) diff --git a/providers/aws/services/elb/elb_service_test.py b/tests/providers/aws/services/elb/elb_service_test.py similarity index 97% rename from providers/aws/services/elb/elb_service_test.py rename to tests/providers/aws/services/elb/elb_service_test.py index 84c3bab2..993847c6 100644 --- a/providers/aws/services/elb/elb_service_test.py +++ b/tests/providers/aws/services/elb/elb_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, resource, session from moto import mock_ec2, mock_elb -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.elb.elb_service import ELB +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.elb.elb_service import ELB AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners_test.py b/tests/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners_test.py similarity index 74% rename from providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners_test.py rename to tests/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners_test.py index d468dadd..9cefe61d 100644 --- a/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners_test.py +++ b/tests/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners_test.py @@ -12,17 +12,17 @@ class Test_elb_ssl_listeners: @mock_elb def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners.elb_client", + "prowler.providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners.elb_client", new=ELB(current_audit_info), ): # Test Check - from providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners import ( + from prowler.providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners import ( elb_ssl_listeners, ) @@ -52,16 +52,16 @@ class Test_elb_ssl_listeners: SecurityGroups=[security_group.id], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners.elb_client", + "prowler.providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners import ( + from prowler.providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners import ( elb_ssl_listeners, ) @@ -95,16 +95,16 @@ class Test_elb_ssl_listeners: Scheme="internal", SecurityGroups=[security_group.id], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners.elb_client", + "prowler.providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners import ( + from prowler.providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners import ( elb_ssl_listeners, ) diff --git a/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection_test.py b/tests/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection_test.py similarity index 77% rename from providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection_test.py rename to tests/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection_test.py index 6809dbac..baa92028 100644 --- a/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection_test.py @@ -12,17 +12,17 @@ class Test_elbv2_deletion_protection: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection import ( + from prowler.providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection import ( elbv2_deletion_protection, ) @@ -63,16 +63,16 @@ class Test_elbv2_deletion_protection: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection import ( + from prowler.providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection import ( elbv2_deletion_protection, ) @@ -119,16 +119,16 @@ class Test_elbv2_deletion_protection: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection import ( + from prowler.providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection import ( elbv2_deletion_protection, ) diff --git a/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode_test.py b/tests/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode_test.py similarity index 77% rename from providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode_test.py rename to tests/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode_test.py index 07453da8..ff213233 100644 --- a/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode_test.py @@ -12,17 +12,17 @@ class Test_elbv2_desync_mitigation_mode: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode import ( + from prowler.providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode import ( elbv2_desync_mitigation_mode, ) @@ -63,16 +63,16 @@ class Test_elbv2_desync_mitigation_mode: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode import ( + from prowler.providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode import ( elbv2_desync_mitigation_mode, ) @@ -119,16 +119,16 @@ class Test_elbv2_desync_mitigation_mode: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode import ( + from prowler.providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode import ( elbv2_desync_mitigation_mode, ) diff --git a/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers_test.py b/tests/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers_test.py similarity index 81% rename from providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers_test.py rename to tests/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers_test.py index 30b90c3a..3f237995 100644 --- a/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers_test.py @@ -12,17 +12,17 @@ class Test_elbv2_insecure_ssl_ciphers: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers import ( + from prowler.providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers import ( elbv2_insecure_ssl_ciphers, ) @@ -80,16 +80,16 @@ class Test_elbv2_insecure_ssl_ciphers: DefaultActions=[{"Type": "forward", "TargetGroupArn": target_group_arn}], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers import ( + from prowler.providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers import ( elbv2_insecure_ssl_ciphers, ) @@ -152,16 +152,16 @@ class Test_elbv2_insecure_ssl_ciphers: DefaultActions=[{"Type": "forward", "TargetGroupArn": target_group_arn}], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers import ( + from prowler.providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers import ( elbv2_insecure_ssl_ciphers, ) diff --git a/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing_test.py b/tests/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing_test.py similarity index 76% rename from providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing_test.py rename to tests/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing_test.py index b354b399..e2871c01 100644 --- a/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing_test.py @@ -12,17 +12,17 @@ class Test_elbv2_request_smugling: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing import ( + from prowler.providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing import ( elbv2_internet_facing, ) @@ -56,16 +56,16 @@ class Test_elbv2_request_smugling: Type="application", )["LoadBalancers"][0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing import ( + from prowler.providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing import ( elbv2_internet_facing, ) @@ -105,16 +105,16 @@ class Test_elbv2_request_smugling: Scheme="internet-facing", )["LoadBalancers"][0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing import ( + from prowler.providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing import ( elbv2_internet_facing, ) diff --git a/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath_test.py b/tests/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath_test.py similarity index 78% rename from providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath_test.py rename to tests/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath_test.py index 572214fb..b82f61e3 100644 --- a/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath_test.py @@ -12,17 +12,17 @@ class Test_elbv2_listeners_underneath: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath import ( + from prowler.providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath import ( elbv2_listeners_underneath, ) @@ -56,16 +56,16 @@ class Test_elbv2_listeners_underneath: Type="application", )["LoadBalancers"][0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath import ( + from prowler.providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath import ( elbv2_listeners_underneath, ) @@ -127,16 +127,16 @@ class Test_elbv2_listeners_underneath: DefaultActions=[{"Type": "forward", "TargetGroupArn": target_group_arn}], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath import ( + from prowler.providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath import ( elbv2_listeners_underneath, ) diff --git a/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled_test.py b/tests/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled_test.py similarity index 78% rename from providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled_test.py rename to tests/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled_test.py index bb5ae984..e0c9e1cd 100644 --- a/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled_test.py @@ -12,17 +12,17 @@ class Test_elbv2_logging_enabled: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled import ( + from prowler.providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled import ( elbv2_logging_enabled, ) @@ -66,16 +66,16 @@ class Test_elbv2_logging_enabled: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled import ( + from prowler.providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled import ( elbv2_logging_enabled, ) @@ -125,16 +125,16 @@ class Test_elbv2_logging_enabled: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled import ( + from prowler.providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled import ( elbv2_logging_enabled, ) diff --git a/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling_test.py b/tests/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling_test.py similarity index 78% rename from providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling_test.py rename to tests/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling_test.py index 08b98df9..1cd6acee 100644 --- a/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling_test.py @@ -12,17 +12,17 @@ class Test_elbv2_request_smugling: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling import ( + from prowler.providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling import ( elbv2_request_smugling, ) @@ -66,16 +66,16 @@ class Test_elbv2_request_smugling: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling import ( + from prowler.providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling import ( elbv2_request_smugling, ) @@ -125,16 +125,16 @@ class Test_elbv2_request_smugling: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling import ( + from prowler.providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling import ( elbv2_request_smugling, ) diff --git a/providers/aws/services/elbv2/elbv2_service_test.py b/tests/providers/aws/services/elbv2/elbv2_service_test.py similarity index 98% rename from providers/aws/services/elbv2/elbv2_service_test.py rename to tests/providers/aws/services/elbv2/elbv2_service_test.py index 22856a0f..33b49ad7 100644 --- a/providers/aws/services/elbv2/elbv2_service_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, resource, session from moto import mock_ec2, mock_elbv2 -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.elbv2.elbv2_service import ELBv2 +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners_test.py b/tests/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners_test.py similarity index 82% rename from providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners_test.py rename to tests/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners_test.py index dbc2f973..68739b53 100644 --- a/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners_test.py @@ -12,17 +12,17 @@ class Test_elbv2_ssl_listeners: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( + from prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( elbv2_ssl_listeners, ) @@ -78,16 +78,16 @@ class Test_elbv2_ssl_listeners: DefaultActions=[{"Type": "forward", "TargetGroupArn": target_group_arn}], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( + from prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( elbv2_ssl_listeners, ) @@ -149,16 +149,16 @@ class Test_elbv2_ssl_listeners: DefaultActions=[{"Type": "forward", "TargetGroupArn": target_group_arn}], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( + from prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( elbv2_ssl_listeners, ) @@ -213,16 +213,16 @@ class Test_elbv2_ssl_listeners: ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( + from prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( elbv2_ssl_listeners, ) diff --git a/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached_test.py b/tests/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached_test.py similarity index 72% rename from providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached_test.py rename to tests/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached_test.py index 382e8a41..5b8bd7f7 100644 --- a/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached_test.py @@ -35,27 +35,27 @@ class Test_elbv2_waf_acl_attached: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 - from providers.aws.services.waf.waf_service import WAF - from providers.aws.services.wafv2.wafv2_service import WAFv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.waf.waf_service import WAF + from prowler.providers.aws.services.wafv2.wafv2_service import WAFv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.elbv2_client", new=ELBv2(current_audit_info), ): with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.wafv2_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.wafv2_client", new=WAFv2(current_audit_info), ): with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.waf_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.waf_client", new=WAF(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached import ( + from prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached import ( elbv2_waf_acl_attached, ) @@ -100,27 +100,27 @@ class Test_elbv2_waf_acl_attached: Type="application", )["LoadBalancers"][0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 - from providers.aws.services.waf.waf_service import WAF - from providers.aws.services.wafv2.wafv2_service import WAFv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.waf.waf_service import WAF + from prowler.providers.aws.services.wafv2.wafv2_service import WAFv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.elbv2_client", new=ELBv2(current_audit_info), ): with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.wafv2_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.wafv2_client", new=WAFv2(current_audit_info), ): with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.waf_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.waf_client", new=WAF(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached import ( + from prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached import ( elbv2_waf_acl_attached, ) @@ -174,27 +174,27 @@ class Test_elbv2_waf_acl_attached: wafv2.associate_web_acl(WebACLArn=waf["ARN"], ResourceArn=lb["LoadBalancerArn"]) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 - from providers.aws.services.waf.waf_service import WAF - from providers.aws.services.wafv2.wafv2_service import WAFv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.waf.waf_service import WAF + from prowler.providers.aws.services.wafv2.wafv2_service import WAFv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.elbv2_client", new=ELBv2(current_audit_info), ): with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.wafv2_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.wafv2_client", new=WAFv2(current_audit_info), ) as service_client: with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.waf_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.waf_client", new=WAF(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached import ( + from prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached import ( elbv2_waf_acl_attached, ) diff --git a/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled_test.py b/tests/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled_test.py similarity index 79% rename from providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled_test.py rename to tests/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled_test.py index 5a77a6a7..90eeb2be 100644 --- a/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled_test.py +++ b/tests/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled_test.py @@ -2,7 +2,9 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.emr.emr_service import BlockPublicAccessConfiguration +from prowler.providers.aws.services.emr.emr_service import ( + BlockPublicAccessConfiguration, +) AWS_REGION = "eu-west-1" @@ -17,11 +19,11 @@ class Test_emr_cluster_account_public_block_enabled: ) } with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_account_public_block_enabled.emr_cluster_account_public_block_enabled import ( + from prowler.providers.aws.services.emr.emr_cluster_account_public_block_enabled.emr_cluster_account_public_block_enabled import ( emr_cluster_account_public_block_enabled, ) @@ -46,11 +48,11 @@ class Test_emr_cluster_account_public_block_enabled: ) } with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_account_public_block_enabled.emr_cluster_account_public_block_enabled import ( + from prowler.providers.aws.services.emr.emr_cluster_account_public_block_enabled.emr_cluster_account_public_block_enabled import ( emr_cluster_account_public_block_enabled, ) diff --git a/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip_test.py b/tests/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip_test.py similarity index 82% rename from providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip_test.py rename to tests/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip_test.py index c5bfad85..f328c28b 100644 --- a/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip_test.py +++ b/tests/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.emr.emr_service import Cluster, ClusterStatus +from prowler.providers.aws.services.emr.emr_service import Cluster, ClusterStatus AWS_REGION = "eu-west-1" @@ -12,11 +12,11 @@ class Test_emr_cluster_master_nodes_no_public_ip: emr_client = mock.MagicMock emr_client.clusters = {} with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( + from prowler.providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( emr_cluster_master_nodes_no_public_ip, ) @@ -42,11 +42,11 @@ class Test_emr_cluster_master_nodes_no_public_ip: ) } with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( + from prowler.providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( emr_cluster_master_nodes_no_public_ip, ) @@ -79,11 +79,11 @@ class Test_emr_cluster_master_nodes_no_public_ip: ) } with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( + from prowler.providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( emr_cluster_master_nodes_no_public_ip, ) @@ -117,11 +117,11 @@ class Test_emr_cluster_master_nodes_no_public_ip: ) } with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( + from prowler.providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( emr_cluster_master_nodes_no_public_ip, ) @@ -147,11 +147,11 @@ class Test_emr_cluster_master_nodes_no_public_ip: ) } with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( + from prowler.providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( emr_cluster_master_nodes_no_public_ip, ) diff --git a/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible_test.py b/tests/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible_test.py similarity index 82% rename from providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible_test.py rename to tests/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible_test.py index ed623c51..c19a14f1 100644 --- a/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible_test.py +++ b/tests/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible_test.py @@ -5,8 +5,8 @@ from boto3 import resource, session from moto import mock_ec2 from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import AWS_Audit_Info -from providers.aws.services.emr.emr_service import Cluster, ClusterStatus, Node +from prowler.providers.aws.lib.audit_info.audit_info import AWS_Audit_Info +from prowler.providers.aws.services.emr.emr_service import Cluster, ClusterStatus, Node AWS_REGION = "eu-west-1" @@ -41,14 +41,14 @@ class Test_emr_cluster_publicly_accesible: ec2_client = mock.MagicMock with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ), mock.patch( - "providers.aws.services.ec2.ec2_service.EC2", + "prowler.providers.aws.services.ec2.ec2_service.EC2", new=ec2_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( + from prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( emr_cluster_publicly_accesible, ) @@ -95,20 +95,20 @@ class Test_emr_cluster_publicly_accesible: master_expected_public_sgs = [master_security_group.id] - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", + "prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( + from prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( emr_cluster_publicly_accesible, ) @@ -161,20 +161,20 @@ class Test_emr_cluster_publicly_accesible: ) } - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", + "prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( + from prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( emr_cluster_publicly_accesible, ) @@ -244,20 +244,20 @@ class Test_emr_cluster_publicly_accesible: slave_expected_public_sgs = [slave_security_group.id] - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", + "prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( + from prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( emr_cluster_publicly_accesible, ) @@ -330,20 +330,20 @@ class Test_emr_cluster_publicly_accesible: master_security_group.id, ] - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", + "prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( + from prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( emr_cluster_publicly_accesible, ) diff --git a/providers/aws/services/emr/emr_service_test.py b/tests/providers/aws/services/emr/emr_service_test.py similarity index 95% rename from providers/aws/services/emr/emr_service_test.py rename to tests/providers/aws/services/emr/emr_service_test.py index f30b21d9..1c4b0116 100644 --- a/providers/aws/services/emr/emr_service_test.py +++ b/tests/providers/aws/services/emr/emr_service_test.py @@ -6,8 +6,8 @@ from boto3 import client, session from moto import mock_emr from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.emr.emr_service import EMR, ClusterStatus +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.emr.emr_service import EMR, ClusterStatus # Mock Test Region AWS_REGION = "eu-west-1" @@ -44,7 +44,7 @@ def mock_generate_regional_clients(service, audit_info): @patch( - "providers.aws.services.emr.emr_service.generate_regional_clients", + "prowler.providers.aws.services.emr.emr_service.generate_regional_clients", new=mock_generate_regional_clients, ) @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) diff --git a/providers/aws/services/glacier/glacier_service_test.py b/tests/providers/aws/services/glacier/glacier_service_test.py similarity index 94% rename from providers/aws/services/glacier/glacier_service_test.py rename to tests/providers/aws/services/glacier/glacier_service_test.py index cca64111..78551a77 100644 --- a/providers/aws/services/glacier/glacier_service_test.py +++ b/tests/providers/aws/services/glacier/glacier_service_test.py @@ -4,8 +4,8 @@ from unittest.mock import patch import botocore from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.glacier.glacier_service import Glacier +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.glacier.glacier_service import Glacier # Mock Test Region AWS_REGION = "eu-west-1" @@ -67,7 +67,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.glacier.glacier_service.generate_regional_clients", + "prowler.providers.aws.services.glacier.glacier_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_Glacier_Service: diff --git a/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access_test.py b/tests/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access_test.py similarity index 87% rename from providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access_test.py rename to tests/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access_test.py index afe730d7..58ecf778 100644 --- a/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access_test.py +++ b/tests/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.glacier.glacier_service import Vault +from prowler.providers.aws.services.glacier.glacier_service import Vault AWS_REGION = "eu-west-1" @@ -12,11 +12,11 @@ class Test_glacier_vaults_policy_public_access: glacier_client = mock.MagicMock glacier_client.vaults = {} with mock.patch( - "providers.aws.services.glacier.glacier_service.Glacier", + "prowler.providers.aws.services.glacier.glacier_service.Glacier", new=glacier_client, ): # Test Check - from providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( + from prowler.providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( glacier_vaults_policy_public_access, ) @@ -40,11 +40,11 @@ class Test_glacier_vaults_policy_public_access: ) } with mock.patch( - "providers.aws.services.glacier.glacier_service.Glacier", + "prowler.providers.aws.services.glacier.glacier_service.Glacier", new=glacier_client, ): # Test Check - from providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( + from prowler.providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( glacier_vaults_policy_public_access, ) @@ -94,11 +94,11 @@ class Test_glacier_vaults_policy_public_access: ) } with mock.patch( - "providers.aws.services.glacier.glacier_service.Glacier", + "prowler.providers.aws.services.glacier.glacier_service.Glacier", new=glacier_client, ): # Test Check - from providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( + from prowler.providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( glacier_vaults_policy_public_access, ) @@ -148,11 +148,11 @@ class Test_glacier_vaults_policy_public_access: ) } with mock.patch( - "providers.aws.services.glacier.glacier_service.Glacier", + "prowler.providers.aws.services.glacier.glacier_service.Glacier", new=glacier_client, ): # Test Check - from providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( + from prowler.providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( glacier_vaults_policy_public_access, ) @@ -202,11 +202,11 @@ class Test_glacier_vaults_policy_public_access: ) } with mock.patch( - "providers.aws.services.glacier.glacier_service.Glacier", + "prowler.providers.aws.services.glacier.glacier_service.Glacier", new=glacier_client, ): # Test Check - from providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( + from prowler.providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( glacier_vaults_policy_public_access, ) @@ -260,11 +260,11 @@ class Test_glacier_vaults_policy_public_access: ) } with mock.patch( - "providers.aws.services.glacier.glacier_service.Glacier", + "prowler.providers.aws.services.glacier.glacier_service.Glacier", new=glacier_client, ): # Test Check - from providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( + from prowler.providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( glacier_vaults_policy_public_access, ) diff --git a/providers/aws/services/globalaccelerator/globalaccelerator_service_test.py b/tests/providers/aws/services/globalaccelerator/globalaccelerator_service_test.py similarity index 96% rename from providers/aws/services/globalaccelerator/globalaccelerator_service_test.py rename to tests/providers/aws/services/globalaccelerator/globalaccelerator_service_test.py index 0534eca6..43b4390e 100644 --- a/providers/aws/services/globalaccelerator/globalaccelerator_service_test.py +++ b/tests/providers/aws/services/globalaccelerator/globalaccelerator_service_test.py @@ -3,8 +3,8 @@ from boto3 import session from mock import patch from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.globalaccelerator.globalaccelerator_service import ( +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.globalaccelerator.globalaccelerator_service import ( GlobalAccelerator, ) diff --git a/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled_test.py similarity index 75% rename from providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled_test.py index d93bcf7a..a620debd 100644 --- a/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import CatalogEncryptionSetting +from prowler.providers.aws.services.glue.glue_service import CatalogEncryptionSetting AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ class Test_glue_data_catalogs_connection_passwords_encryption_enabled: glue_client.catalog_encryption_settings = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_data_catalogs_connection_passwords_encryption_enabled.glue_data_catalogs_connection_passwords_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_data_catalogs_connection_passwords_encryption_enabled.glue_data_catalogs_connection_passwords_encryption_enabled import ( glue_data_catalogs_connection_passwords_encryption_enabled, ) @@ -39,11 +39,11 @@ class Test_glue_data_catalogs_connection_passwords_encryption_enabled: glue_client.audited_account = "12345678912" with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_data_catalogs_connection_passwords_encryption_enabled.glue_data_catalogs_connection_passwords_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_data_catalogs_connection_passwords_encryption_enabled.glue_data_catalogs_connection_passwords_encryption_enabled import ( glue_data_catalogs_connection_passwords_encryption_enabled, ) @@ -71,11 +71,11 @@ class Test_glue_data_catalogs_connection_passwords_encryption_enabled: glue_client.audited_account = "12345678912" with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_data_catalogs_connection_passwords_encryption_enabled.glue_data_catalogs_connection_passwords_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_data_catalogs_connection_passwords_encryption_enabled.glue_data_catalogs_connection_passwords_encryption_enabled import ( glue_data_catalogs_connection_passwords_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled_test.py similarity index 77% rename from providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled_test.py index 541315f0..a27b7871 100644 --- a/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import CatalogEncryptionSetting +from prowler.providers.aws.services.glue.glue_service import CatalogEncryptionSetting AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ class Test_glue_data_catalogs_metadata_encryption_enabled: glue_client.catalog_encryption_settings = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_data_catalogs_metadata_encryption_enabled.glue_data_catalogs_metadata_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_data_catalogs_metadata_encryption_enabled.glue_data_catalogs_metadata_encryption_enabled import ( glue_data_catalogs_metadata_encryption_enabled, ) @@ -39,11 +39,11 @@ class Test_glue_data_catalogs_metadata_encryption_enabled: glue_client.audited_account = "12345678912" with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_data_catalogs_metadata_encryption_enabled.glue_data_catalogs_metadata_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_data_catalogs_metadata_encryption_enabled.glue_data_catalogs_metadata_encryption_enabled import ( glue_data_catalogs_metadata_encryption_enabled, ) @@ -72,11 +72,11 @@ class Test_glue_data_catalogs_metadata_encryption_enabled: glue_client.audited_account = "12345678912" with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_data_catalogs_metadata_encryption_enabled.glue_data_catalogs_metadata_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_data_catalogs_metadata_encryption_enabled.glue_data_catalogs_metadata_encryption_enabled import ( glue_data_catalogs_metadata_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled_test.py b/tests/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled_test.py similarity index 79% rename from providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled_test.py rename to tests/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled_test.py index c9227166..16a5388e 100644 --- a/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import Connection +from prowler.providers.aws.services.glue.glue_service import Connection AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ class Test_glue_database_connections_ssl_enabled: glue_client.connections = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_database_connections_ssl_enabled.glue_database_connections_ssl_enabled import ( + from prowler.providers.aws.services.glue.glue_database_connections_ssl_enabled.glue_database_connections_ssl_enabled import ( glue_database_connections_ssl_enabled, ) @@ -42,11 +42,11 @@ class Test_glue_database_connections_ssl_enabled: ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_database_connections_ssl_enabled.glue_database_connections_ssl_enabled import ( + from prowler.providers.aws.services.glue.glue_database_connections_ssl_enabled.glue_database_connections_ssl_enabled import ( glue_database_connections_ssl_enabled, ) @@ -79,11 +79,11 @@ class Test_glue_database_connections_ssl_enabled: ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_database_connections_ssl_enabled.glue_database_connections_ssl_enabled import ( + from prowler.providers.aws.services.glue.glue_database_connections_ssl_enabled.glue_database_connections_ssl_enabled import ( glue_database_connections_ssl_enabled, ) diff --git a/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled_test.py similarity index 77% rename from providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled_test.py index 37ae8b8b..5978a631 100644 --- a/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import DevEndpoint, SecurityConfig +from prowler.providers.aws.services.glue.glue_service import DevEndpoint, SecurityConfig AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ class Test_glue_development_endpoints_cloudwatch_logs_encryption_enabled: glue_client.dev_endpoints = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( glue_development_endpoints_cloudwatch_logs_encryption_enabled, ) @@ -46,11 +46,11 @@ class Test_glue_development_endpoints_cloudwatch_logs_encryption_enabled: ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( glue_development_endpoints_cloudwatch_logs_encryption_enabled, ) @@ -85,11 +85,11 @@ class Test_glue_development_endpoints_cloudwatch_logs_encryption_enabled: ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( glue_development_endpoints_cloudwatch_logs_encryption_enabled, ) @@ -116,11 +116,11 @@ class Test_glue_development_endpoints_cloudwatch_logs_encryption_enabled: glue_client.security_configs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( glue_development_endpoints_cloudwatch_logs_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled_test.py similarity index 77% rename from providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled_test.py index e5ec74d8..5f2026cf 100644 --- a/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import DevEndpoint, SecurityConfig +from prowler.providers.aws.services.glue.glue_service import DevEndpoint, SecurityConfig AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ class Test_glue_development_endpoints_job_bookmark_encryption_enabled: glue_client.dev_endpoints = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( glue_development_endpoints_job_bookmark_encryption_enabled, ) @@ -46,11 +46,11 @@ class Test_glue_development_endpoints_job_bookmark_encryption_enabled: ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( glue_development_endpoints_job_bookmark_encryption_enabled, ) @@ -85,11 +85,11 @@ class Test_glue_development_endpoints_job_bookmark_encryption_enabled: ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( glue_development_endpoints_job_bookmark_encryption_enabled, ) @@ -116,11 +116,11 @@ class Test_glue_development_endpoints_job_bookmark_encryption_enabled: glue_client.security_configs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( glue_development_endpoints_job_bookmark_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled_test.py similarity index 78% rename from providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled_test.py index 73da6e85..4ed18ea4 100644 --- a/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import DevEndpoint, SecurityConfig +from prowler.providers.aws.services.glue.glue_service import DevEndpoint, SecurityConfig AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ class Test_glue_development_endpoints_s3_encryption_enabled: glue_client.dev_endpoints = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( glue_development_endpoints_s3_encryption_enabled, ) @@ -46,11 +46,11 @@ class Test_glue_development_endpoints_s3_encryption_enabled: ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( glue_development_endpoints_s3_encryption_enabled, ) @@ -85,11 +85,11 @@ class Test_glue_development_endpoints_s3_encryption_enabled: ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( glue_development_endpoints_s3_encryption_enabled, ) @@ -116,11 +116,11 @@ class Test_glue_development_endpoints_s3_encryption_enabled: glue_client.security_configs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( glue_development_endpoints_s3_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled_test.py similarity index 79% rename from providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled_test.py index 364da1ed..53e8030f 100644 --- a/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import Job, SecurityConfig +from prowler.providers.aws.services.glue.glue_service import Job, SecurityConfig AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ class Test_glue_etl_jobs_amazon_s3_encryption_enabled: glue_client.jobs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( glue_etl_jobs_amazon_s3_encryption_enabled, ) @@ -47,11 +47,11 @@ class Test_glue_etl_jobs_amazon_s3_encryption_enabled: ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( glue_etl_jobs_amazon_s3_encryption_enabled, ) @@ -87,11 +87,11 @@ class Test_glue_etl_jobs_amazon_s3_encryption_enabled: ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( glue_etl_jobs_amazon_s3_encryption_enabled, ) @@ -118,11 +118,11 @@ class Test_glue_etl_jobs_amazon_s3_encryption_enabled: glue_client.security_configs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( glue_etl_jobs_amazon_s3_encryption_enabled, ) @@ -153,11 +153,11 @@ class Test_glue_etl_jobs_amazon_s3_encryption_enabled: glue_client.security_configs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( glue_etl_jobs_amazon_s3_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled_test.py similarity index 78% rename from providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled_test.py index 19a9355b..715b6f52 100644 --- a/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import Job, SecurityConfig +from prowler.providers.aws.services.glue.glue_service import Job, SecurityConfig AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ class Test_glue_etl_jobs_cloudwatch_logs_encryption_enabled: glue_client.jobs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( glue_etl_jobs_cloudwatch_logs_encryption_enabled, ) @@ -47,11 +47,11 @@ class Test_glue_etl_jobs_cloudwatch_logs_encryption_enabled: ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( glue_etl_jobs_cloudwatch_logs_encryption_enabled, ) @@ -87,11 +87,11 @@ class Test_glue_etl_jobs_cloudwatch_logs_encryption_enabled: ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( glue_etl_jobs_cloudwatch_logs_encryption_enabled, ) @@ -118,11 +118,11 @@ class Test_glue_etl_jobs_cloudwatch_logs_encryption_enabled: glue_client.security_configs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( glue_etl_jobs_cloudwatch_logs_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled_test.py similarity index 79% rename from providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled_test.py index 7ccaf351..4f9b03d0 100644 --- a/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import Job, SecurityConfig +from prowler.providers.aws.services.glue.glue_service import Job, SecurityConfig AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ class Test_glue_etl_jobs_job_bookmark_encryption_enabled: glue_client.jobs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( glue_etl_jobs_job_bookmark_encryption_enabled, ) @@ -47,11 +47,11 @@ class Test_glue_etl_jobs_job_bookmark_encryption_enabled: ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( glue_etl_jobs_job_bookmark_encryption_enabled, ) @@ -87,11 +87,11 @@ class Test_glue_etl_jobs_job_bookmark_encryption_enabled: ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( glue_etl_jobs_job_bookmark_encryption_enabled, ) @@ -118,11 +118,11 @@ class Test_glue_etl_jobs_job_bookmark_encryption_enabled: glue_client.security_configs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( glue_etl_jobs_job_bookmark_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_service_test.py b/tests/providers/aws/services/glue/glue_service_test.py similarity index 97% rename from providers/aws/services/glue/glue_service_test.py rename to tests/providers/aws/services/glue/glue_service_test.py index 2590c955..4f3420a0 100644 --- a/providers/aws/services/glue/glue_service_test.py +++ b/tests/providers/aws/services/glue/glue_service_test.py @@ -4,8 +4,8 @@ import botocore from boto3 import session from moto import mock_glue -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.glue.glue_service import Glue +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.glue.glue_service import Glue AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" @@ -113,7 +113,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.glue.glue_service.generate_regional_clients", + "prowler.providers.aws.services.glue.glue_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_Glue_Service: diff --git a/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled_test.py b/tests/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled_test.py similarity index 76% rename from providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled_test.py rename to tests/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled_test.py index ae11db69..d2924eb7 100644 --- a/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled_test.py +++ b/tests/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.guardduty.guardduty_service import Detector +from prowler.providers.aws.services.guardduty.guardduty_service import Detector AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ class Test_guardduty_is_enabled: guardduty_client = mock.MagicMock guardduty_client.detectors = [] with mock.patch( - "providers.aws.services.guardduty.guardduty_service.GuardDuty", + "prowler.providers.aws.services.guardduty.guardduty_service.GuardDuty", guardduty_client, ): - from providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( + from prowler.providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( guardduty_is_enabled, ) @@ -37,10 +37,10 @@ class Test_guardduty_is_enabled: ) ) with mock.patch( - "providers.aws.services.guardduty.guardduty_service.GuardDuty", + "prowler.providers.aws.services.guardduty.guardduty_service.GuardDuty", guardduty_client, ): - from providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( + from prowler.providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( guardduty_is_enabled, ) @@ -63,10 +63,10 @@ class Test_guardduty_is_enabled: ) ) with mock.patch( - "providers.aws.services.guardduty.guardduty_service.GuardDuty", + "prowler.providers.aws.services.guardduty.guardduty_service.GuardDuty", guardduty_client, ): - from providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( + from prowler.providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( guardduty_is_enabled, ) @@ -88,10 +88,10 @@ class Test_guardduty_is_enabled: ) ) with mock.patch( - "providers.aws.services.guardduty.guardduty_service.GuardDuty", + "prowler.providers.aws.services.guardduty.guardduty_service.GuardDuty", guardduty_client, ): - from providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( + from prowler.providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( guardduty_is_enabled, ) diff --git a/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings_test.py b/tests/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings_test.py similarity index 74% rename from providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings_test.py rename to tests/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings_test.py index 2d4aa638..a61aa8f9 100644 --- a/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings_test.py +++ b/tests/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.guardduty.guardduty_service import Detector +from prowler.providers.aws.services.guardduty.guardduty_service import Detector AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ class Test_guardduty_no_high_severity_findings: guardduty_client = mock.MagicMock guardduty_client.detectors = [] with mock.patch( - "providers.aws.services.guardduty.guardduty_service.GuardDuty", + "prowler.providers.aws.services.guardduty.guardduty_service.GuardDuty", guardduty_client, ): - from providers.aws.services.guardduty.guardduty_no_high_severity_findings.guardduty_no_high_severity_findings import ( + from prowler.providers.aws.services.guardduty.guardduty_no_high_severity_findings.guardduty_no_high_severity_findings import ( guardduty_no_high_severity_findings, ) @@ -36,10 +36,10 @@ class Test_guardduty_no_high_severity_findings: ) ) with mock.patch( - "providers.aws.services.guardduty.guardduty_service.GuardDuty", + "prowler.providers.aws.services.guardduty.guardduty_service.GuardDuty", guardduty_client, ): - from providers.aws.services.guardduty.guardduty_no_high_severity_findings.guardduty_no_high_severity_findings import ( + from prowler.providers.aws.services.guardduty.guardduty_no_high_severity_findings.guardduty_no_high_severity_findings import ( guardduty_no_high_severity_findings, ) @@ -62,10 +62,10 @@ class Test_guardduty_no_high_severity_findings: ) ) with mock.patch( - "providers.aws.services.guardduty.guardduty_service.GuardDuty", + "prowler.providers.aws.services.guardduty.guardduty_service.GuardDuty", guardduty_client, ): - from providers.aws.services.guardduty.guardduty_no_high_severity_findings.guardduty_no_high_severity_findings import ( + from prowler.providers.aws.services.guardduty.guardduty_no_high_severity_findings.guardduty_no_high_severity_findings import ( guardduty_no_high_severity_findings, ) diff --git a/providers/aws/services/guardduty/guardduty_service_test.py b/tests/providers/aws/services/guardduty/guardduty_service_test.py similarity index 93% rename from providers/aws/services/guardduty/guardduty_service_test.py rename to tests/providers/aws/services/guardduty/guardduty_service_test.py index 89dd26f2..698f96ad 100644 --- a/providers/aws/services/guardduty/guardduty_service_test.py +++ b/tests/providers/aws/services/guardduty/guardduty_service_test.py @@ -4,8 +4,8 @@ import botocore from boto3 import client, session from moto import mock_guardduty -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.guardduty.guardduty_service import GuardDuty +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.guardduty.guardduty_service import GuardDuty AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -27,7 +27,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.guardduty.guardduty_service.generate_regional_clients", + "prowler.providers.aws.services.guardduty.guardduty_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_GuardDuty_Service: diff --git a/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa_test.py b/tests/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa_test.py similarity index 75% rename from providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa_test.py rename to tests/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa_test.py index a25a0e53..731099ce 100644 --- a/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa_test.py +++ b/tests/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa_test.py @@ -14,14 +14,14 @@ class Test_iam_administrator_access_with_mfa_test: arn = iam.create_group(GroupName=group_name)["Group"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", + "prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( + from prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( iam_administrator_access_with_mfa, ) @@ -52,14 +52,14 @@ class Test_iam_administrator_access_with_mfa_test: arn = iam.create_group(GroupName=group_name)["Group"]["Arn"] iam.attach_group_policy(GroupName=group_name, PolicyArn=policy_arn) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", + "prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( + from prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( iam_administrator_access_with_mfa, ) @@ -85,14 +85,14 @@ class Test_iam_administrator_access_with_mfa_test: PolicyArn="arn:aws:iam::aws:policy/AdministratorAccess", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", + "prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( + from prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( iam_administrator_access_with_mfa, ) @@ -120,14 +120,14 @@ class Test_iam_administrator_access_with_mfa_test: ) iam.add_user_to_group(GroupName=group_name, UserName=user_name) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", + "prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( + from prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( iam_administrator_access_with_mfa, ) @@ -179,14 +179,14 @@ class Test_iam_administrator_access_with_mfa_test: iam.add_user_to_group(GroupName=group_name, UserName=user_name_no_mfa) iam.add_user_to_group(GroupName=group_name, UserName=user_name_mfa) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", + "prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( + from prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( iam_administrator_access_with_mfa, ) diff --git a/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage_test.py b/tests/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage_test.py similarity index 82% rename from providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage_test.py rename to tests/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage_test.py index 776c898f..e93ada74 100644 --- a/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage_test.py +++ b/tests/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage_test.py @@ -15,14 +15,14 @@ class Test_iam_avoid_root_usage: csv_reader = DictReader(credential_lines, delimiter=",") credential_list = list(csv_reader) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", + "prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( + from prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( iam_avoid_root_usage, ) @@ -48,14 +48,14 @@ class Test_iam_avoid_root_usage: csv_reader = DictReader(credential_lines, delimiter=",") credential_list = list(csv_reader) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", + "prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( + from prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( iam_avoid_root_usage, ) @@ -80,14 +80,14 @@ class Test_iam_avoid_root_usage: csv_reader = DictReader(credential_lines, delimiter=",") credential_list = list(csv_reader) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", + "prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( + from prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( iam_avoid_root_usage, ) @@ -112,14 +112,14 @@ class Test_iam_avoid_root_usage: csv_reader = DictReader(credential_lines, delimiter=",") credential_list = list(csv_reader) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", + "prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( + from prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( iam_avoid_root_usage, ) diff --git a/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts_test.py b/tests/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts_test.py similarity index 84% rename from providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts_test.py rename to tests/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts_test.py index 88bd94c0..0b80f879 100644 --- a/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts_test.py +++ b/tests/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts_test.py @@ -41,15 +41,15 @@ nTTxU4a7x1naFxzYXK1iQ1vMARKMjDb19QEJIEJKZlDK4uS7yMlf1nFS SAMLMetadataDocument=xml_template, Name=saml_provider_name ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_check_saml_providers_sts.iam_check_saml_providers_sts.iam_client", + "prowler.providers.aws.services.iam.iam_check_saml_providers_sts.iam_check_saml_providers_sts.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_check_saml_providers_sts.iam_check_saml_providers_sts import ( + from prowler.providers.aws.services.iam.iam_check_saml_providers_sts.iam_check_saml_providers_sts import ( iam_check_saml_providers_sts, ) diff --git a/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials_test.py b/tests/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials_test.py similarity index 70% rename from providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials_test.py rename to tests/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials_test.py index 3221f1dd..21e9c668 100644 --- a/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials_test.py +++ b/tests/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials_test.py @@ -15,14 +15,14 @@ class Test_iam_disable_30_days_credentials_test: iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials import ( iam_disable_30_days_credentials, ) @@ -45,14 +45,14 @@ class Test_iam_disable_30_days_credentials_test: iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials import ( iam_disable_30_days_credentials, ) @@ -72,14 +72,14 @@ class Test_iam_disable_30_days_credentials_test: iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials import ( iam_disable_30_days_credentials, ) diff --git a/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials_test.py b/tests/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials_test.py similarity index 70% rename from providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials_test.py rename to tests/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials_test.py index 9eb02f00..5861dd25 100644 --- a/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials_test.py +++ b/tests/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials_test.py @@ -15,14 +15,14 @@ class Test_iam_disable_45_days_credentials_test: iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials import ( iam_disable_45_days_credentials, ) @@ -45,14 +45,14 @@ class Test_iam_disable_45_days_credentials_test: iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials import ( iam_disable_45_days_credentials, ) @@ -72,14 +72,14 @@ class Test_iam_disable_45_days_credentials_test: iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials import ( iam_disable_45_days_credentials, ) diff --git a/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials_test.py b/tests/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials_test.py similarity index 70% rename from providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials_test.py rename to tests/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials_test.py index 1d92de68..4763b2eb 100644 --- a/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials_test.py +++ b/tests/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials_test.py @@ -15,14 +15,14 @@ class Test_iam_disable_90_days_credentials_test: iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials import ( iam_disable_90_days_credentials, ) @@ -45,14 +45,14 @@ class Test_iam_disable_90_days_credentials_test: iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials import ( iam_disable_90_days_credentials, ) @@ -72,14 +72,14 @@ class Test_iam_disable_90_days_credentials_test: iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials import ( iam_disable_90_days_credentials, ) diff --git a/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption_test.py b/tests/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption_test.py similarity index 73% rename from providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption_test.py rename to tests/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption_test.py index 36a06db5..b49b2f64 100644 --- a/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption_test.py +++ b/tests/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption_test.py @@ -21,14 +21,14 @@ class Test_iam_no_custom_policy_permissive_role_assumption: PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", + "prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( + from prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( iam_no_custom_policy_permissive_role_assumption, ) @@ -56,14 +56,14 @@ class Test_iam_no_custom_policy_permissive_role_assumption: PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", + "prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( + from prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( iam_no_custom_policy_permissive_role_assumption, ) @@ -94,14 +94,14 @@ class Test_iam_no_custom_policy_permissive_role_assumption: arn = iam_client.create_policy( PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", + "prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( + from prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( iam_no_custom_policy_permissive_role_assumption, ) @@ -129,14 +129,14 @@ class Test_iam_no_custom_policy_permissive_role_assumption: PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", + "prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( + from prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( iam_no_custom_policy_permissive_role_assumption, ) @@ -176,14 +176,14 @@ class Test_iam_no_custom_policy_permissive_role_assumption: PolicyDocument=dumps(policy_document_permissive), )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", + "prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( + from prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( iam_no_custom_policy_permissive_role_assumption, ) diff --git a/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored_test.py b/tests/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored_test.py similarity index 61% rename from providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored_test.py rename to tests/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored_test.py index 06452462..1ed415ec 100644 --- a/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored_test.py +++ b/tests/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored_test.py @@ -8,14 +8,14 @@ from moto import mock_iam class Test_iam_no_expired_server_certificates_stored_test: @mock_iam def test_no_certificates(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored.iam_client", + "prowler.providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored import ( + from prowler.providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored import ( iam_no_expired_server_certificates_stored, ) @@ -33,14 +33,14 @@ class Test_iam_no_expired_server_certificates_stored_test: CertificateBody="certbody", PrivateKey="privatekey", )["ServerCertificateMetadata"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored.iam_client", + "prowler.providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored import ( + from prowler.providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored import ( iam_no_expired_server_certificates_stored, ) diff --git a/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key_test.py b/tests/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key_test.py similarity index 76% rename from providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key_test.py rename to tests/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key_test.py index b4eaf79a..e54f9175 100644 --- a/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key_test.py +++ b/tests/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key_test.py @@ -12,14 +12,14 @@ class Test_iam_no_root_access_key_test: user = "test" iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( + from prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( iam_no_root_access_key, ) @@ -50,14 +50,14 @@ class Test_iam_no_root_access_key_test: user = "test" iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( + from prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( iam_no_root_access_key, ) @@ -88,14 +88,14 @@ class Test_iam_no_root_access_key_test: user = "test" iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( + from prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( iam_no_root_access_key, ) @@ -126,14 +126,14 @@ class Test_iam_no_root_access_key_test: user = "test" iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( + from prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( iam_no_root_access_key, ) diff --git a/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less_test.py b/tests/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less_test.py similarity index 67% rename from providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less_test.py rename to tests/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less_test.py index 73ecfb86..21654999 100644 --- a/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less_test.py +++ b/tests/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less_test.py @@ -7,14 +7,14 @@ from moto import mock_iam class Test_iam_password_policy_expires_passwords_within_90_days_or_less: @mock_iam def test_password_expiration_lower_90(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM, PasswordPolicy + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM, PasswordPolicy with mock.patch( - "providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less import ( + from prowler.providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less import ( iam_password_policy_expires_passwords_within_90_days_or_less, ) @@ -41,14 +41,14 @@ class Test_iam_password_policy_expires_passwords_within_90_days_or_less: @mock_iam def test_password_expiration_greater_90(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM, PasswordPolicy + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM, PasswordPolicy with mock.patch( - "providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less import ( + from prowler.providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less import ( iam_password_policy_expires_passwords_within_90_days_or_less, ) diff --git a/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase_test.py b/tests/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase_test.py similarity index 59% rename from providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase_test.py rename to tests/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase_test.py index edb06eb2..61b86e39 100644 --- a/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase_test.py +++ b/tests/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase_test.py @@ -11,15 +11,15 @@ class Test_iam_password_policy_lowercase: # update password policy iam_client.update_account_password_policy(RequireLowercaseCharacters=False) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase import ( + from prowler.providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase import ( iam_password_policy_lowercase, ) @@ -33,15 +33,15 @@ class Test_iam_password_policy_lowercase: # update password policy iam_client.update_account_password_policy(RequireLowercaseCharacters=True) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase import ( + from prowler.providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase import ( iam_password_policy_lowercase, ) diff --git a/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14_test.py b/tests/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14_test.py similarity index 57% rename from providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14_test.py rename to tests/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14_test.py index 21888b50..d145e6b1 100644 --- a/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14_test.py +++ b/tests/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14_test.py @@ -11,15 +11,15 @@ class Test_iam_password_policy_minimum_length_14: # update password policy iam_client.update_account_password_policy(MinimumPasswordLength=14) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14 import ( + from prowler.providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14 import ( iam_password_policy_minimum_length_14, ) @@ -33,15 +33,15 @@ class Test_iam_password_policy_minimum_length_14: # update password policy iam_client.update_account_password_policy(MinimumPasswordLength=20) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14 import ( + from prowler.providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14 import ( iam_password_policy_minimum_length_14, ) @@ -55,15 +55,15 @@ class Test_iam_password_policy_minimum_length_14: # update password policy iam_client.update_account_password_policy(MinimumPasswordLength=10) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14 import ( + from prowler.providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14 import ( iam_password_policy_minimum_length_14, ) diff --git a/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number_test.py b/tests/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number_test.py similarity index 59% rename from providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number_test.py rename to tests/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number_test.py index 0e02bdbb..7a2580bd 100644 --- a/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number_test.py +++ b/tests/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number_test.py @@ -11,15 +11,15 @@ class Test_iam_password_policy_number: # update password policy iam_client.update_account_password_policy(RequireNumbers=False) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number import ( + from prowler.providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number import ( iam_password_policy_number, ) @@ -33,15 +33,15 @@ class Test_iam_password_policy_number: # update password policy iam_client.update_account_password_policy(RequireNumbers=True) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number import ( + from prowler.providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number import ( iam_password_policy_number, ) diff --git a/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24_test.py b/tests/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24_test.py similarity index 59% rename from providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24_test.py rename to tests/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24_test.py index 7eff03d4..f6441b63 100644 --- a/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24_test.py +++ b/tests/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24_test.py @@ -11,15 +11,15 @@ class Test_iam_password_policy_reuse_24: # update password policy iam_client.update_account_password_policy(PasswordReusePrevention=24) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24 import ( + from prowler.providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24 import ( iam_password_policy_reuse_24, ) @@ -33,15 +33,15 @@ class Test_iam_password_policy_reuse_24: # update password policy iam_client.update_account_password_policy(PasswordReusePrevention=20) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24 import ( + from prowler.providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24 import ( iam_password_policy_reuse_24, ) diff --git a/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol_test.py b/tests/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol_test.py similarity index 59% rename from providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol_test.py rename to tests/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol_test.py index 92963bab..ccabf270 100644 --- a/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol_test.py +++ b/tests/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol_test.py @@ -11,15 +11,15 @@ class Test_iam_password_policy_symbol: # update password policy iam_client.update_account_password_policy(RequireSymbols=False) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol import ( + from prowler.providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol import ( iam_password_policy_symbol, ) @@ -33,15 +33,15 @@ class Test_iam_password_policy_symbol: # update password policy iam_client.update_account_password_policy(RequireSymbols=True) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol import ( + from prowler.providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol import ( iam_password_policy_symbol, ) diff --git a/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase_test.py b/tests/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase_test.py similarity index 59% rename from providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase_test.py rename to tests/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase_test.py index 99d3a10f..79e4d595 100644 --- a/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase_test.py +++ b/tests/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase_test.py @@ -11,15 +11,15 @@ class Test_iam_password_policy_uppercase: # update password policy iam_client.update_account_password_policy(RequireUppercaseCharacters=False) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase import ( + from prowler.providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase import ( iam_password_policy_uppercase, ) @@ -33,15 +33,15 @@ class Test_iam_password_policy_uppercase: # update password policy iam_client.update_account_password_policy(RequireUppercaseCharacters=True) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase import ( + from prowler.providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase import ( iam_password_policy_uppercase, ) diff --git a/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation_test.py b/tests/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation_test.py similarity index 77% rename from providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation_test.py rename to tests/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation_test.py index a9c044d3..2a3b82b8 100644 --- a/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation_test.py +++ b/tests/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation_test.py @@ -22,15 +22,15 @@ class Test_iam_policy_allows_privilege_escalation: PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", + "prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( + from prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( iam_policy_allows_privilege_escalation, ) @@ -62,15 +62,15 @@ class Test_iam_policy_allows_privilege_escalation: PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", + "prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( + from prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( iam_policy_allows_privilege_escalation, ) @@ -106,15 +106,15 @@ class Test_iam_policy_allows_privilege_escalation: PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", + "prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( + from prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( iam_policy_allows_privilege_escalation, ) @@ -161,15 +161,15 @@ class Test_iam_policy_allows_privilege_escalation: PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", + "prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( + from prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( iam_policy_allows_privilege_escalation, ) diff --git a/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles_test.py b/tests/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles_test.py similarity index 68% rename from providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles_test.py rename to tests/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles_test.py index f8dfd7bf..1439763a 100644 --- a/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles_test.py +++ b/tests/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles_test.py @@ -25,14 +25,14 @@ class Test_iam_policy_attached_only_to_group_or_roles: )["Policy"]["Arn"] iam_client.attach_user_policy(UserName=user, PolicyArn=policyArn) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", + "prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( + from prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( iam_policy_attached_only_to_group_or_roles, ) @@ -61,14 +61,14 @@ class Test_iam_policy_attached_only_to_group_or_roles: )["Policy"]["Arn"] iam_client.attach_user_policy(UserName=user, PolicyArn=policyArn) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", + "prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( + from prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( iam_policy_attached_only_to_group_or_roles, ) @@ -103,14 +103,14 @@ class Test_iam_policy_attached_only_to_group_or_roles: UserName=user, PolicyName=policyName, PolicyDocument=dumps(policyDocument) ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", + "prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( + from prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( iam_policy_attached_only_to_group_or_roles, ) @@ -125,14 +125,14 @@ class Test_iam_policy_attached_only_to_group_or_roles: user = "test_no_policies" iam_client.create_user(UserName=user) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", + "prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( + from prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( iam_policy_attached_only_to_group_or_roles, ) diff --git a/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges_test.py b/tests/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges_test.py similarity index 75% rename from providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges_test.py rename to tests/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges_test.py index e7a1203c..f7ddcf08 100644 --- a/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges_test.py +++ b/tests/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges_test.py @@ -22,14 +22,14 @@ class Test_iam_policy_no_administrative_privileges_test: PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges.iam_client", + "prowler.providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges import ( + from prowler.providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges import ( iam_policy_no_administrative_privileges, ) @@ -55,14 +55,14 @@ class Test_iam_policy_no_administrative_privileges_test: PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges.iam_client", + "prowler.providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges import ( + from prowler.providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges import ( iam_policy_no_administrative_privileges, ) @@ -102,14 +102,14 @@ class Test_iam_policy_no_administrative_privileges_test: PolicyDocument=dumps(policy_document_administrative), )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges.iam_client", + "prowler.providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges import ( + from prowler.providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges import ( iam_policy_no_administrative_privileges, ) diff --git a/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled_test.py b/tests/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled_test.py similarity index 71% rename from providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled_test.py rename to tests/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled_test.py index 6d81bfa0..8126f48f 100644 --- a/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled_test.py +++ b/tests/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled_test.py @@ -11,14 +11,14 @@ class Test_iam_root_hardware_mfa_enabled_test: iam = client("iam") mfa_device_name = "mfa-test" iam.create_virtual_mfa_device(VirtualMFADeviceName=mfa_device_name) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled.iam_client", + "prowler.providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled import ( + from prowler.providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled import ( iam_root_hardware_mfa_enabled, ) @@ -39,14 +39,14 @@ class Test_iam_root_hardware_mfa_enabled_test: iam = client("iam") mfa_device_name = "mfa-test" iam.create_virtual_mfa_device(VirtualMFADeviceName=mfa_device_name) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled.iam_client", + "prowler.providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled import ( + from prowler.providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled import ( iam_root_hardware_mfa_enabled, ) diff --git a/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled_test.py b/tests/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled_test.py similarity index 74% rename from providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled_test.py rename to tests/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled_test.py index 7ce1984e..7eeddfcb 100644 --- a/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled_test.py +++ b/tests/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled_test.py @@ -11,14 +11,14 @@ class Test_iam_root_mfa_enabled_test: iam_client = client("iam") user = "test-user" iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled.iam_client", + "prowler.providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled import ( + from prowler.providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled import ( iam_root_mfa_enabled, ) @@ -42,14 +42,14 @@ class Test_iam_root_mfa_enabled_test: iam_client = client("iam") user = "test-user" iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled.iam_client", + "prowler.providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled import ( + from prowler.providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled import ( iam_root_mfa_enabled, ) diff --git a/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days_test.py b/tests/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days_test.py similarity index 71% rename from providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days_test.py rename to tests/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days_test.py index 48c1e52b..e5169d12 100644 --- a/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days_test.py +++ b/tests/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days_test.py @@ -12,14 +12,14 @@ class Test_iam_rotate_access_key_90_days_test: user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days.iam_client", + "prowler.providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days import ( + from prowler.providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days import ( iam_rotate_access_key_90_days, ) @@ -42,14 +42,14 @@ class Test_iam_rotate_access_key_90_days_test: user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days.iam_client", + "prowler.providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days import ( + from prowler.providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days import ( iam_rotate_access_key_90_days, ) @@ -76,14 +76,14 @@ class Test_iam_rotate_access_key_90_days_test: user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days.iam_client", + "prowler.providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days import ( + from prowler.providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days import ( iam_rotate_access_key_90_days, ) diff --git a/providers/aws/services/iam/iam_service_test.py b/tests/providers/aws/services/iam/iam_service_test.py similarity index 99% rename from providers/aws/services/iam/iam_service_test.py rename to tests/providers/aws/services/iam/iam_service_test.py index 1d4399a5..d96b2d33 100644 --- a/providers/aws/services/iam/iam_service_test.py +++ b/tests/providers/aws/services/iam/iam_service_test.py @@ -4,8 +4,8 @@ from json import dumps from boto3 import client, session from moto import mock_iam -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.iam.iam_service import IAM +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.iam.iam_service import IAM AWS_ACCOUNT_NUMBER = 123456789012 diff --git a/providers/aws/services/iam/iam_support_role_created/iam_support_role_created_test.py b/tests/providers/aws/services/iam/iam_support_role_created/iam_support_role_created_test.py similarity index 74% rename from providers/aws/services/iam/iam_support_role_created/iam_support_role_created_test.py rename to tests/providers/aws/services/iam/iam_support_role_created/iam_support_role_created_test.py index d4e6bd1d..92b1c806 100644 --- a/providers/aws/services/iam/iam_support_role_created/iam_support_role_created_test.py +++ b/tests/providers/aws/services/iam/iam_support_role_created/iam_support_role_created_test.py @@ -29,14 +29,14 @@ class Test_iam_support_role_created: PolicyArn="arn:aws:iam::aws:policy/aws-service-role/AWSSupportServiceRolePolicy", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_support_role_created.iam_support_role_created.iam_client", + "prowler.providers.aws.services.iam.iam_support_role_created.iam_support_role_created.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_support_role_created.iam_support_role_created import ( + from prowler.providers.aws.services.iam.iam_support_role_created.iam_support_role_created import ( iam_support_role_created, ) @@ -56,14 +56,14 @@ class Test_iam_support_role_created: @mock_iam def test_no_support_role_created(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_support_role_created.iam_support_role_created.iam_client", + "prowler.providers.aws.services.iam.iam_support_role_created.iam_support_role_created.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_support_role_created.iam_support_role_created import ( + from prowler.providers.aws.services.iam.iam_support_role_created.iam_support_role_created import ( iam_support_role_created, ) diff --git a/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled_test.py b/tests/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled_test.py similarity index 70% rename from providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled_test.py rename to tests/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled_test.py index cb380e87..6c95dedc 100644 --- a/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled_test.py +++ b/tests/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled_test.py @@ -11,14 +11,14 @@ class Test_iam_user_hardware_mfa_enabled_test: iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled.iam_client", + "prowler.providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled import ( + from prowler.providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled import ( iam_user_hardware_mfa_enabled, ) @@ -39,14 +39,14 @@ class Test_iam_user_hardware_mfa_enabled_test: iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM, MFADevice + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM, MFADevice with mock.patch( - "providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled.iam_client", + "prowler.providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled import ( + from prowler.providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled import ( iam_user_hardware_mfa_enabled, ) @@ -73,14 +73,14 @@ class Test_iam_user_hardware_mfa_enabled_test: iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM, MFADevice + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM, MFADevice with mock.patch( - "providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled.iam_client", + "prowler.providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled import ( + from prowler.providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled import ( iam_user_hardware_mfa_enabled, ) diff --git a/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access_test.py b/tests/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access_test.py similarity index 68% rename from providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access_test.py rename to tests/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access_test.py index fe3f0be1..66dc530b 100644 --- a/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access_test.py +++ b/tests/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access_test.py @@ -11,14 +11,14 @@ class Test_iam_user_mfa_enabled_console_access_test: user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access.iam_client", + "prowler.providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access import ( + from prowler.providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access import ( iam_user_mfa_enabled_console_access, ) @@ -41,14 +41,14 @@ class Test_iam_user_mfa_enabled_console_access_test: user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access.iam_client", + "prowler.providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access import ( + from prowler.providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access import ( iam_user_mfa_enabled_console_access, ) @@ -72,14 +72,14 @@ class Test_iam_user_mfa_enabled_console_access_test: user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access.iam_client", + "prowler.providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access import ( + from prowler.providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access import ( iam_user_mfa_enabled_console_access, ) diff --git a/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key_test.py b/tests/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key_test.py similarity index 77% rename from providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key_test.py rename to tests/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key_test.py index 4c0a5419..a36343a9 100644 --- a/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key_test.py +++ b/tests/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key_test.py @@ -14,14 +14,14 @@ test_false_access_key_1,arn:aws:iam::123456789012:test_false_access_key_1,2022-0 csv_reader = DictReader(credential_lines, delimiter=",") credential_list = list(csv_reader) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key import ( + from prowler.providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key import ( iam_user_no_setup_initial_access_key, ) @@ -40,14 +40,14 @@ test_false_access_key_2,arn:aws:iam::123456789012:test_false_access_key_2,2022-0 csv_reader = DictReader(credential_lines, delimiter=",") credential_list = list(csv_reader) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key import ( + from prowler.providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key import ( iam_user_no_setup_initial_access_key, ) @@ -66,14 +66,14 @@ test_pass,arn:aws:iam::123456789012:test_pass,2022-02-17T14:59:38+00:00,not_supp csv_reader = DictReader(credential_lines, delimiter=",") credential_list = list(csv_reader) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key import ( + from prowler.providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key import ( iam_user_no_setup_initial_access_key, ) diff --git a/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key_test.py b/tests/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key_test.py similarity index 65% rename from providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key_test.py rename to tests/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key_test.py index e0752b3c..1cb8fa5e 100644 --- a/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key_test.py +++ b/tests/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key_test.py @@ -17,15 +17,15 @@ class Test_iam_user_two_active_access_key: # Create Access Key 2 iam_client.create_access_key(UserName=user) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( + from prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( iam_user_two_active_access_key, ) @@ -49,15 +49,15 @@ class Test_iam_user_two_active_access_key: # Create Access Key 1 iam_client.create_access_key(UserName=user) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( + from prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( iam_user_two_active_access_key, ) @@ -79,15 +79,15 @@ class Test_iam_user_two_active_access_key: user = "test1" user_arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( + from prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( iam_user_two_active_access_key, ) @@ -104,15 +104,15 @@ class Test_iam_user_two_active_access_key: @mock_iam def test_iam_no_users(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( + from prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( iam_user_two_active_access_key, ) diff --git a/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used_test.py b/tests/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used_test.py similarity index 69% rename from providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used_test.py rename to tests/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used_test.py index fe94e29b..109d7bed 100644 --- a/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used_test.py +++ b/tests/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used_test.py @@ -9,17 +9,17 @@ AWS_REGION = "us-east-1" class Test_kms_cmk_are_used: @mock_kms def test_kms_no_keys(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", + "prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( + from prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( kms_cmk_are_used, ) @@ -34,17 +34,17 @@ class Test_kms_cmk_are_used: kms_client = client("kms", region_name=AWS_REGION) # Create enabled KMS key key = kms_client.create_key()["KeyMetadata"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", + "prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( + from prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( kms_cmk_are_used, ) @@ -64,17 +64,17 @@ class Test_kms_cmk_are_used: # Creaty KMS key with deletion key = kms_client.create_key()["KeyMetadata"] kms_client.schedule_key_deletion(KeyId=key["KeyId"]) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", + "prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( + from prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( kms_cmk_are_used, ) @@ -97,17 +97,17 @@ class Test_kms_cmk_are_used: # Creaty KMS key with deletion key = kms_client.create_key()["KeyMetadata"] kms_client.disable_key(KeyId=key["KeyId"]) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", + "prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( + from prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( kms_cmk_are_used, ) diff --git a/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled_test.py b/tests/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled_test.py similarity index 67% rename from providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled_test.py rename to tests/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled_test.py index bd0c81ae..5d3c1734 100644 --- a/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled_test.py +++ b/tests/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled_test.py @@ -9,17 +9,17 @@ AWS_REGION = "us-east-1" class Test_kms_cmk_rotation_enabled: @mock_kms def test_kms_no_key(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled.kms_client", + "prowler.providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled import ( + from prowler.providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled import ( kms_cmk_rotation_enabled, ) @@ -35,17 +35,17 @@ class Test_kms_cmk_rotation_enabled: # Creaty KMS key with rotation key = kms_client.create_key()["KeyMetadata"] kms_client.enable_key_rotation(KeyId=key["KeyId"]) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled.kms_client", + "prowler.providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled import ( + from prowler.providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled import ( kms_cmk_rotation_enabled, ) @@ -67,17 +67,17 @@ class Test_kms_cmk_rotation_enabled: kms_client = client("kms", region_name=AWS_REGION) # Creaty KMS key without rotation key = kms_client.create_key()["KeyMetadata"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled.kms_client", + "prowler.providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled import ( + from prowler.providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled import ( kms_cmk_rotation_enabled, ) diff --git a/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible_test.py b/tests/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible_test.py similarity index 70% rename from providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible_test.py rename to tests/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible_test.py index b222bc66..bd1bcce7 100644 --- a/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible_test.py @@ -10,17 +10,17 @@ AWS_REGION = "us-east-1" class Test_kms_key_not_publicly_accessible: @mock_kms def test_no_kms_keys(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible.kms_client", + "prowler.providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible import ( + from prowler.providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible import ( kms_key_not_publicly_accessible, ) @@ -35,17 +35,17 @@ class Test_kms_key_not_publicly_accessible: kms_client = client("kms", region_name=AWS_REGION) # Creaty KMS key without policy key = kms_client.create_key()["KeyMetadata"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible.kms_client", + "prowler.providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible import ( + from prowler.providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible import ( kms_key_not_publicly_accessible, ) @@ -83,17 +83,17 @@ class Test_kms_key_not_publicly_accessible: } ) )["KeyMetadata"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible.kms_client", + "prowler.providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible import ( + from prowler.providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible import ( kms_key_not_publicly_accessible, ) diff --git a/providers/aws/services/kms/kms_service_test.py b/tests/providers/aws/services/kms/kms_service_test.py similarity index 97% rename from providers/aws/services/kms/kms_service_test.py rename to tests/providers/aws/services/kms/kms_service_test.py index 09ca59fb..5485620e 100644 --- a/providers/aws/services/kms/kms_service_test.py +++ b/tests/providers/aws/services/kms/kms_service_test.py @@ -3,8 +3,8 @@ import json from boto3 import client, session from moto import mock_kms -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.kms.kms_service import KMS +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.kms.kms_service import KMS AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/macie/macie_is_enabled/macie_is_enabled_test.py b/tests/providers/aws/services/macie/macie_is_enabled/macie_is_enabled_test.py similarity index 77% rename from providers/aws/services/macie/macie_is_enabled/macie_is_enabled_test.py rename to tests/providers/aws/services/macie/macie_is_enabled/macie_is_enabled_test.py index 635e4bec..d270aed4 100644 --- a/providers/aws/services/macie/macie_is_enabled/macie_is_enabled_test.py +++ b/tests/providers/aws/services/macie/macie_is_enabled/macie_is_enabled_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.macie.macie_service import Session +from prowler.providers.aws.services.macie.macie_service import Session class Test_macie_is_enabled: @@ -13,11 +13,11 @@ class Test_macie_is_enabled: ) ] with mock.patch( - "providers.aws.services.macie.macie_service.Macie", + "prowler.providers.aws.services.macie.macie_service.Macie", new=macie_client, ): # Test Check - from providers.aws.services.macie.macie_is_enabled.macie_is_enabled import ( + from prowler.providers.aws.services.macie.macie_is_enabled.macie_is_enabled import ( macie_is_enabled, ) @@ -38,11 +38,11 @@ class Test_macie_is_enabled: ) ] with mock.patch( - "providers.aws.services.macie.macie_service.Macie", + "prowler.providers.aws.services.macie.macie_service.Macie", new=macie_client, ): # Test Check - from providers.aws.services.macie.macie_is_enabled.macie_is_enabled import ( + from prowler.providers.aws.services.macie.macie_is_enabled.macie_is_enabled import ( macie_is_enabled, ) @@ -63,11 +63,11 @@ class Test_macie_is_enabled: ) ] with mock.patch( - "providers.aws.services.macie.macie_service.Macie", + "prowler.providers.aws.services.macie.macie_service.Macie", new=macie_client, ): # Test Check - from providers.aws.services.macie.macie_is_enabled.macie_is_enabled import ( + from prowler.providers.aws.services.macie.macie_is_enabled.macie_is_enabled import ( macie_is_enabled, ) diff --git a/providers/aws/services/macie/macie_service_test.py b/tests/providers/aws/services/macie/macie_service_test.py similarity index 90% rename from providers/aws/services/macie/macie_service_test.py rename to tests/providers/aws/services/macie/macie_service_test.py index 0c664fd4..e505ea06 100644 --- a/providers/aws/services/macie/macie_service_test.py +++ b/tests/providers/aws/services/macie/macie_service_test.py @@ -3,8 +3,8 @@ from unittest.mock import patch import botocore -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.macie.macie_service import Macie, Session +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.macie.macie_service import Macie, Session # Mock Test Region AWS_REGION = "eu-west-1" @@ -41,7 +41,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.macie.macie_service.generate_regional_clients", + "prowler.providers.aws.services.macie.macie_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_Macie_Service: diff --git a/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled_test.py similarity index 75% rename from providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled_test.py index 0a84fb33..72436e9c 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import ( +from prowler.providers.aws.services.opensearch.opensearch_service import ( OpenSearchDomain, PublishingLoggingOption, ) @@ -18,10 +18,10 @@ class Test_opensearch_service_domains_audit_logging_enabled: opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_audit_logging_enabled.opensearch_service_domains_audit_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_audit_logging_enabled.opensearch_service_domains_audit_logging_enabled import ( opensearch_service_domains_audit_logging_enabled, ) @@ -38,10 +38,10 @@ class Test_opensearch_service_domains_audit_logging_enabled: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_audit_logging_enabled.opensearch_service_domains_audit_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_audit_logging_enabled.opensearch_service_domains_audit_logging_enabled import ( opensearch_service_domains_audit_logging_enabled, ) @@ -65,10 +65,10 @@ class Test_opensearch_service_domains_audit_logging_enabled: ) with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_audit_logging_enabled.opensearch_service_domains_audit_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_audit_logging_enabled.opensearch_service_domains_audit_logging_enabled import ( opensearch_service_domains_audit_logging_enabled, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled_test.py similarity index 78% rename from providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled_test.py index f53e076a..41de6229 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import ( +from prowler.providers.aws.services.opensearch.opensearch_service import ( OpenSearchDomain, PublishingLoggingOption, ) @@ -18,10 +18,10 @@ class Test_opensearch_service_domains_cloudwatch_logging_enabled: opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( opensearch_service_domains_cloudwatch_logging_enabled, ) @@ -38,10 +38,10 @@ class Test_opensearch_service_domains_cloudwatch_logging_enabled: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( opensearch_service_domains_cloudwatch_logging_enabled, ) @@ -68,10 +68,10 @@ class Test_opensearch_service_domains_cloudwatch_logging_enabled: ) with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( opensearch_service_domains_cloudwatch_logging_enabled, ) @@ -98,10 +98,10 @@ class Test_opensearch_service_domains_cloudwatch_logging_enabled: ) with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( opensearch_service_domains_cloudwatch_logging_enabled, ) @@ -130,10 +130,10 @@ class Test_opensearch_service_domains_cloudwatch_logging_enabled: opensearch_client.opensearch_domains[0].logging.extend(logging_options) with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( opensearch_service_domains_cloudwatch_logging_enabled, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled_test.py similarity index 75% rename from providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled_test.py index ed2514ed..c8bce4ce 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled_test.py @@ -1,7 +1,9 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import OpenSearchDomain +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchDomain, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +17,10 @@ class Test_opensearch_service_domains_encryption_at_rest_enabled: opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_encryption_at_rest_enabled.opensearch_service_domains_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_encryption_at_rest_enabled.opensearch_service_domains_encryption_at_rest_enabled import ( opensearch_service_domains_encryption_at_rest_enabled, ) @@ -40,10 +42,10 @@ class Test_opensearch_service_domains_encryption_at_rest_enabled: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_encryption_at_rest_enabled.opensearch_service_domains_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_encryption_at_rest_enabled.opensearch_service_domains_encryption_at_rest_enabled import ( opensearch_service_domains_encryption_at_rest_enabled, ) @@ -71,10 +73,10 @@ class Test_opensearch_service_domains_encryption_at_rest_enabled: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_encryption_at_rest_enabled.opensearch_service_domains_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_encryption_at_rest_enabled.opensearch_service_domains_encryption_at_rest_enabled import ( opensearch_service_domains_encryption_at_rest_enabled, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced_test.py similarity index 73% rename from providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced_test.py index cccf68fb..07816e06 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced_test.py @@ -1,7 +1,9 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import OpenSearchDomain +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchDomain, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +17,10 @@ class Test_opensearch_service_domains_https_communications_enforced: opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_https_communications_enforced.opensearch_service_domains_https_communications_enforced import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_https_communications_enforced.opensearch_service_domains_https_communications_enforced import ( opensearch_service_domains_https_communications_enforced, ) @@ -37,10 +39,10 @@ class Test_opensearch_service_domains_https_communications_enforced: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_https_communications_enforced.opensearch_service_domains_https_communications_enforced import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_https_communications_enforced.opensearch_service_domains_https_communications_enforced import ( opensearch_service_domains_https_communications_enforced, ) @@ -65,10 +67,10 @@ class Test_opensearch_service_domains_https_communications_enforced: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_https_communications_enforced.opensearch_service_domains_https_communications_enforced import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_https_communications_enforced.opensearch_service_domains_https_communications_enforced import ( opensearch_service_domains_https_communications_enforced, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled_test.py similarity index 75% rename from providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled_test.py index e878faa1..0d205022 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled_test.py @@ -1,7 +1,9 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import OpenSearchDomain +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchDomain, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +17,10 @@ class Test_opensearch_service_domains_internal_user_database_enabled: opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_internal_user_database_enabled.opensearch_service_domains_internal_user_database_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_internal_user_database_enabled.opensearch_service_domains_internal_user_database_enabled import ( opensearch_service_domains_internal_user_database_enabled, ) @@ -40,10 +42,10 @@ class Test_opensearch_service_domains_internal_user_database_enabled: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_internal_user_database_enabled.opensearch_service_domains_internal_user_database_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_internal_user_database_enabled.opensearch_service_domains_internal_user_database_enabled import ( opensearch_service_domains_internal_user_database_enabled, ) @@ -72,10 +74,10 @@ class Test_opensearch_service_domains_internal_user_database_enabled: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_internal_user_database_enabled.opensearch_service_domains_internal_user_database_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_internal_user_database_enabled.opensearch_service_domains_internal_user_database_enabled import ( opensearch_service_domains_internal_user_database_enabled, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled_test.py similarity index 75% rename from providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled_test.py index d7d3272a..018d96d3 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled_test.py @@ -1,7 +1,9 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import OpenSearchDomain +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchDomain, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +17,10 @@ class Test_opensearch_service_domains_node_to_node_encryption_enabled: opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_node_to_node_encryption_enabled.opensearch_service_domains_node_to_node_encryption_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_node_to_node_encryption_enabled.opensearch_service_domains_node_to_node_encryption_enabled import ( opensearch_service_domains_node_to_node_encryption_enabled, ) @@ -40,10 +42,10 @@ class Test_opensearch_service_domains_node_to_node_encryption_enabled: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_node_to_node_encryption_enabled.opensearch_service_domains_node_to_node_encryption_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_node_to_node_encryption_enabled.opensearch_service_domains_node_to_node_encryption_enabled import ( opensearch_service_domains_node_to_node_encryption_enabled, ) @@ -72,10 +74,10 @@ class Test_opensearch_service_domains_node_to_node_encryption_enabled: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_node_to_node_encryption_enabled.opensearch_service_domains_node_to_node_encryption_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_node_to_node_encryption_enabled.opensearch_service_domains_node_to_node_encryption_enabled import ( opensearch_service_domains_node_to_node_encryption_enabled, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible_test.py similarity index 82% rename from providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible_test.py index d41e547c..8238d6a7 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible_test.py @@ -1,6 +1,8 @@ from unittest import mock -from providers.aws.services.opensearch.opensearch_service import OpenSearchDomain +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchDomain, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -76,10 +78,10 @@ class Test_opensearch_service_domains_not_publicly_accessible: opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( opensearch_service_domains_not_publicly_accessible, ) @@ -101,10 +103,10 @@ class Test_opensearch_service_domains_not_publicly_accessible: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( opensearch_service_domains_not_publicly_accessible, ) @@ -133,10 +135,10 @@ class Test_opensearch_service_domains_not_publicly_accessible: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( opensearch_service_domains_not_publicly_accessible, ) @@ -165,10 +167,10 @@ class Test_opensearch_service_domains_not_publicly_accessible: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( opensearch_service_domains_not_publicly_accessible, ) @@ -197,10 +199,10 @@ class Test_opensearch_service_domains_not_publicly_accessible: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( opensearch_service_domains_not_publicly_accessible, ) @@ -229,10 +231,10 @@ class Test_opensearch_service_domains_not_publicly_accessible: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( opensearch_service_domains_not_publicly_accessible, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version_test.py similarity index 74% rename from providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version_test.py index 01f21238..96fd387d 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version_test.py @@ -1,7 +1,9 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import OpenSearchDomain +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchDomain, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +17,10 @@ class Test_opensearch_service_domains_updated_to_the_latest_service_software_ver opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_updated_to_the_latest_service_software_version.opensearch_service_domains_updated_to_the_latest_service_software_version import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_updated_to_the_latest_service_software_version.opensearch_service_domains_updated_to_the_latest_service_software_version import ( opensearch_service_domains_updated_to_the_latest_service_software_version, ) @@ -42,10 +44,10 @@ class Test_opensearch_service_domains_updated_to_the_latest_service_software_ver opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_updated_to_the_latest_service_software_version.opensearch_service_domains_updated_to_the_latest_service_software_version import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_updated_to_the_latest_service_software_version.opensearch_service_domains_updated_to_the_latest_service_software_version import ( opensearch_service_domains_updated_to_the_latest_service_software_version, ) @@ -75,10 +77,10 @@ class Test_opensearch_service_domains_updated_to_the_latest_service_software_ver opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_updated_to_the_latest_service_software_version.opensearch_service_domains_updated_to_the_latest_service_software_version import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_updated_to_the_latest_service_software_version.opensearch_service_domains_updated_to_the_latest_service_software_version import ( opensearch_service_domains_updated_to_the_latest_service_software_version, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana_test.py similarity index 74% rename from providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana_test.py index 1600021c..49393b22 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana_test.py @@ -1,7 +1,9 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import OpenSearchDomain +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchDomain, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +17,10 @@ class Test_opensearch_service_domains_use_cognito_authentication_for_kibana: opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_use_cognito_authentication_for_kibana.opensearch_service_domains_use_cognito_authentication_for_kibana import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_use_cognito_authentication_for_kibana.opensearch_service_domains_use_cognito_authentication_for_kibana import ( opensearch_service_domains_use_cognito_authentication_for_kibana, ) @@ -40,10 +42,10 @@ class Test_opensearch_service_domains_use_cognito_authentication_for_kibana: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_use_cognito_authentication_for_kibana.opensearch_service_domains_use_cognito_authentication_for_kibana import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_use_cognito_authentication_for_kibana.opensearch_service_domains_use_cognito_authentication_for_kibana import ( opensearch_service_domains_use_cognito_authentication_for_kibana, ) @@ -72,10 +74,10 @@ class Test_opensearch_service_domains_use_cognito_authentication_for_kibana: opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_use_cognito_authentication_for_kibana.opensearch_service_domains_use_cognito_authentication_for_kibana import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_use_cognito_authentication_for_kibana.opensearch_service_domains_use_cognito_authentication_for_kibana import ( opensearch_service_domains_use_cognito_authentication_for_kibana, ) diff --git a/providers/aws/services/opensearch/opensearch_service_test.py b/tests/providers/aws/services/opensearch/opensearch_service_test.py similarity index 96% rename from providers/aws/services/opensearch/opensearch_service_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_test.py index 79b34e9a..84a4b1d0 100644 --- a/providers/aws/services/opensearch/opensearch_service_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_test.py @@ -4,8 +4,10 @@ from unittest.mock import patch import botocore from boto3 import session -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.opensearch.opensearch_service import OpenSearchService +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchService, +) AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -91,7 +93,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.opensearch.opensearch_service.generate_regional_clients", + "prowler.providers.aws.services.opensearch.opensearch_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_OpenSearchService_Service: diff --git a/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled_test.py b/tests/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled_test.py similarity index 68% rename from providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled_test.py rename to tests/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled_test.py index db4a21de..9cfd1670 100644 --- a/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled_test.py +++ b/tests/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled_test.py @@ -10,17 +10,17 @@ AWS_REGION = "us-east-1" class Test_rds_instance_backup_enabled: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled import ( rds_instance_backup_enabled, ) @@ -39,17 +39,17 @@ class Test_rds_instance_backup_enabled: DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled.rds_client", new=RDS(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled import ( rds_instance_backup_enabled, ) @@ -77,17 +77,17 @@ class Test_rds_instance_backup_enabled: DBInstanceClass="db.m1.small", BackupRetentionPeriod=10, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled import ( rds_instance_backup_enabled, ) diff --git a/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection_test.py b/tests/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection_test.py similarity index 66% rename from providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection_test.py rename to tests/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection_test.py index c38ae37d..b6361a52 100644 --- a/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection_test.py +++ b/tests/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection_test.py @@ -10,17 +10,17 @@ AWS_REGION = "us-east-1" class Test_rds_instance_deletion_protection: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection.rds_client", + "prowler.providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection import ( + from prowler.providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection import ( rds_instance_deletion_protection, ) @@ -39,17 +39,17 @@ class Test_rds_instance_deletion_protection: DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection.rds_client", + "prowler.providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection import ( + from prowler.providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection import ( rds_instance_deletion_protection, ) @@ -75,17 +75,17 @@ class Test_rds_instance_deletion_protection: DBInstanceClass="db.m1.small", DeletionProtection=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection.rds_client", + "prowler.providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection import ( + from prowler.providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection import ( rds_instance_deletion_protection, ) diff --git a/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled_test.py b/tests/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled_test.py similarity index 66% rename from providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled_test.py rename to tests/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled_test.py index 1081b9a2..ce693b03 100644 --- a/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled_test.py +++ b/tests/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled_test.py @@ -10,17 +10,17 @@ AWS_REGION = "us-east-1" class Test_rds_instance_enhanced_monitoring_enabled: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled import ( rds_instance_enhanced_monitoring_enabled, ) @@ -39,17 +39,17 @@ class Test_rds_instance_enhanced_monitoring_enabled: DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled import ( rds_instance_enhanced_monitoring_enabled, ) @@ -74,17 +74,17 @@ class Test_rds_instance_enhanced_monitoring_enabled: DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled.rds_client", new=RDS(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled import ( rds_instance_enhanced_monitoring_enabled, ) diff --git a/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs_test.py b/tests/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs_test.py similarity index 65% rename from providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs_test.py rename to tests/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs_test.py index 3a2b4081..7818689a 100644 --- a/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs_test.py +++ b/tests/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs_test.py @@ -10,17 +10,17 @@ AWS_REGION = "us-east-1" class Test_rds_instance_integration_cloudwatch_logs: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs.rds_client", + "prowler.providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs import ( + from prowler.providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs import ( rds_instance_integration_cloudwatch_logs, ) @@ -39,17 +39,17 @@ class Test_rds_instance_integration_cloudwatch_logs: DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs.rds_client", + "prowler.providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs import ( + from prowler.providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs import ( rds_instance_integration_cloudwatch_logs, ) @@ -75,17 +75,17 @@ class Test_rds_instance_integration_cloudwatch_logs: DBInstanceClass="db.m1.small", EnableCloudwatchLogsExports=["audit", "error"], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs.rds_client", + "prowler.providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs import ( + from prowler.providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs import ( rds_instance_integration_cloudwatch_logs, ) diff --git a/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled_test.py b/tests/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled_test.py similarity index 65% rename from providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled_test.py rename to tests/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled_test.py index 7bc4d2d4..5f9d0f59 100644 --- a/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled_test.py +++ b/tests/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled_test.py @@ -10,17 +10,17 @@ AWS_REGION = "us-east-1" class Test_rds_instance_minor_version_upgrade_enabled: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled import ( rds_instance_minor_version_upgrade_enabled, ) @@ -39,17 +39,17 @@ class Test_rds_instance_minor_version_upgrade_enabled: DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled import ( rds_instance_minor_version_upgrade_enabled, ) @@ -75,17 +75,17 @@ class Test_rds_instance_minor_version_upgrade_enabled: DBInstanceClass="db.m1.small", AutoMinorVersionUpgrade=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled import ( rds_instance_minor_version_upgrade_enabled, ) diff --git a/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az_test.py b/tests/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az_test.py similarity index 68% rename from providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az_test.py rename to tests/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az_test.py index 5168963c..ee53e8ae 100644 --- a/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az_test.py +++ b/tests/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az_test.py @@ -10,17 +10,17 @@ AWS_REGION = "us-east-1" class Test_rds_instance_multi_az: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az.rds_client", + "prowler.providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az import ( + from prowler.providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az import ( rds_instance_multi_az, ) @@ -39,17 +39,17 @@ class Test_rds_instance_multi_az: DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az.rds_client", + "prowler.providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az import ( + from prowler.providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az import ( rds_instance_multi_az, ) @@ -75,17 +75,17 @@ class Test_rds_instance_multi_az: DBInstanceClass="db.m1.small", MultiAZ=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az.rds_client", + "prowler.providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az import ( + from prowler.providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az import ( rds_instance_multi_az, ) diff --git a/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access_test.py b/tests/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access_test.py similarity index 67% rename from providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access_test.py rename to tests/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access_test.py index d9b678cb..bfd857eb 100644 --- a/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access_test.py +++ b/tests/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access_test.py @@ -10,17 +10,17 @@ AWS_REGION = "us-east-1" class Test_rds_instance_no_public_access: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access import ( + from prowler.providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access import ( rds_instance_no_public_access, ) @@ -39,17 +39,17 @@ class Test_rds_instance_no_public_access: DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access import ( + from prowler.providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access import ( rds_instance_no_public_access, ) @@ -75,17 +75,17 @@ class Test_rds_instance_no_public_access: DBInstanceClass="db.m1.small", PubliclyAccessible=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access import ( + from prowler.providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access import ( rds_instance_no_public_access, ) diff --git a/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted_test.py b/tests/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted_test.py similarity index 66% rename from providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted_test.py rename to tests/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted_test.py index 7d3bae30..ecac6dcd 100644 --- a/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted_test.py +++ b/tests/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted_test.py @@ -10,17 +10,17 @@ AWS_REGION = "us-east-1" class Test_rds_instance_storage_encrypted: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted.rds_client", + "prowler.providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted import ( + from prowler.providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted import ( rds_instance_storage_encrypted, ) @@ -39,17 +39,17 @@ class Test_rds_instance_storage_encrypted: DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted.rds_client", + "prowler.providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted import ( + from prowler.providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted import ( rds_instance_storage_encrypted, ) @@ -75,17 +75,17 @@ class Test_rds_instance_storage_encrypted: DBInstanceClass="db.m1.small", StorageEncrypted=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted.rds_client", + "prowler.providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted import ( + from prowler.providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted import ( rds_instance_storage_encrypted, ) diff --git a/providers/aws/services/rds/rds_service_test.py b/tests/providers/aws/services/rds/rds_service_test.py similarity index 97% rename from providers/aws/services/rds/rds_service_test.py rename to tests/providers/aws/services/rds/rds_service_test.py index 409479db..f701f532 100644 --- a/providers/aws/services/rds/rds_service_test.py +++ b/tests/providers/aws/services/rds/rds_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, session from moto import mock_rds -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.rds.rds_service import RDS +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.rds.rds_service import RDS AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access_test.py b/tests/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access_test.py similarity index 71% rename from providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access_test.py rename to tests/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access_test.py index 78227a71..0cc4deef 100644 --- a/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access_test.py +++ b/tests/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access_test.py @@ -10,17 +10,17 @@ AWS_REGION = "us-east-1" class Test_rds_snapshots_public_access: @mock_rds def test_rds_no_snapshots(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( + from prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( rds_snapshots_public_access, ) @@ -43,17 +43,17 @@ class Test_rds_snapshots_public_access: conn.create_db_snapshot( DBInstanceIdentifier="db-primary-1", DBSnapshotIdentifier="snapshot-1" ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( + from prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( rds_snapshots_public_access, ) @@ -82,17 +82,17 @@ class Test_rds_snapshots_public_access: conn.create_db_snapshot( DBInstanceIdentifier="db-primary-1", DBSnapshotIdentifier="snapshot-1" ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", new=RDS(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( + from prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( rds_snapshots_public_access, ) @@ -123,17 +123,17 @@ class Test_rds_snapshots_public_access: conn.create_db_cluster_snapshot( DBClusterIdentifier="db-primary-1", DBClusterSnapshotIdentifier="snapshot-1" ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( + from prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( rds_snapshots_public_access, ) @@ -163,17 +163,17 @@ class Test_rds_snapshots_public_access: conn.create_db_cluster_snapshot( DBClusterIdentifier="db-primary-1", DBClusterSnapshotIdentifier="snapshot-1" ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", new=RDS(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( + from prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( rds_snapshots_public_access, ) diff --git a/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging_test.py b/tests/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging_test.py similarity index 75% rename from providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging_test.py rename to tests/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging_test.py index 7143cb41..0c405ad8 100644 --- a/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging_test.py +++ b/tests/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.redshift.redshift_service import Cluster +from prowler.providers.aws.services.redshift.redshift_service import Cluster AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ class Test_redshift_cluster_audit_logging: redshift_client = mock.MagicMock redshift_client.clusters = [] with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_audit_logging.redshift_cluster_audit_logging import ( + from prowler.providers.aws.services.redshift.redshift_cluster_audit_logging.redshift_cluster_audit_logging import ( redshift_cluster_audit_logging, ) @@ -37,10 +37,10 @@ class Test_redshift_cluster_audit_logging: ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_audit_logging.redshift_cluster_audit_logging import ( + from prowler.providers.aws.services.redshift.redshift_cluster_audit_logging.redshift_cluster_audit_logging import ( redshift_cluster_audit_logging, ) @@ -63,10 +63,10 @@ class Test_redshift_cluster_audit_logging: ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_audit_logging.redshift_cluster_audit_logging import ( + from prowler.providers.aws.services.redshift.redshift_cluster_audit_logging.redshift_cluster_audit_logging import ( redshift_cluster_audit_logging, ) diff --git a/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot_test.py b/tests/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot_test.py similarity index 74% rename from providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot_test.py rename to tests/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot_test.py index 6b778d22..f96126f0 100644 --- a/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot_test.py +++ b/tests/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.redshift.redshift_service import Cluster +from prowler.providers.aws.services.redshift.redshift_service import Cluster AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ class Test_redshift_cluster_automated_snapshot: redshift_client = mock.MagicMock redshift_client.clusters = [] with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_automated_snapshot.redshift_cluster_automated_snapshot import ( + from prowler.providers.aws.services.redshift.redshift_cluster_automated_snapshot.redshift_cluster_automated_snapshot import ( redshift_cluster_automated_snapshot, ) @@ -37,10 +37,10 @@ class Test_redshift_cluster_automated_snapshot: ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_automated_snapshot.redshift_cluster_automated_snapshot import ( + from prowler.providers.aws.services.redshift.redshift_cluster_automated_snapshot.redshift_cluster_automated_snapshot import ( redshift_cluster_automated_snapshot, ) @@ -62,10 +62,10 @@ class Test_redshift_cluster_automated_snapshot: ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_automated_snapshot.redshift_cluster_automated_snapshot import ( + from prowler.providers.aws.services.redshift.redshift_cluster_automated_snapshot.redshift_cluster_automated_snapshot import ( redshift_cluster_automated_snapshot, ) diff --git a/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades_test.py b/tests/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades_test.py similarity index 74% rename from providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades_test.py rename to tests/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades_test.py index f9a661e7..c3dac377 100644 --- a/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades_test.py +++ b/tests/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.redshift.redshift_service import Cluster +from prowler.providers.aws.services.redshift.redshift_service import Cluster AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ class Test_redshift_cluster_automatic_upgrades: redshift_client = mock.MagicMock redshift_client.clusters = [] with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_automatic_upgrades.redshift_cluster_automatic_upgrades import ( + from prowler.providers.aws.services.redshift.redshift_cluster_automatic_upgrades.redshift_cluster_automatic_upgrades import ( redshift_cluster_automatic_upgrades, ) @@ -37,10 +37,10 @@ class Test_redshift_cluster_automatic_upgrades: ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_automatic_upgrades.redshift_cluster_automatic_upgrades import ( + from prowler.providers.aws.services.redshift.redshift_cluster_automatic_upgrades.redshift_cluster_automatic_upgrades import ( redshift_cluster_automatic_upgrades, ) @@ -58,10 +58,10 @@ class Test_redshift_cluster_automatic_upgrades: Cluster(id=cluster_id, region=AWS_REGION, allow_version_upgrade=True) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_automatic_upgrades.redshift_cluster_automatic_upgrades import ( + from prowler.providers.aws.services.redshift.redshift_cluster_automatic_upgrades.redshift_cluster_automatic_upgrades import ( redshift_cluster_automatic_upgrades, ) diff --git a/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access_test.py b/tests/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access_test.py similarity index 76% rename from providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access_test.py rename to tests/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access_test.py index 8c2b9b12..eab2bd96 100644 --- a/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access_test.py +++ b/tests/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.redshift.redshift_service import Cluster +from prowler.providers.aws.services.redshift.redshift_service import Cluster AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ class Test_redshift_cluster_public_access: redshift_client = mock.MagicMock redshift_client.clusters = [] with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( + from prowler.providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( redshift_cluster_public_access, ) @@ -38,10 +38,10 @@ class Test_redshift_cluster_public_access: ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( + from prowler.providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( redshift_cluster_public_access, ) @@ -64,10 +64,10 @@ class Test_redshift_cluster_public_access: ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( + from prowler.providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( redshift_cluster_public_access, ) @@ -89,10 +89,10 @@ class Test_redshift_cluster_public_access: ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( + from prowler.providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( redshift_cluster_public_access, ) diff --git a/providers/aws/services/redshift/redshift_service_test.py b/tests/providers/aws/services/redshift/redshift_service_test.py similarity index 96% rename from providers/aws/services/redshift/redshift_service_test.py rename to tests/providers/aws/services/redshift/redshift_service_test.py index cd44a763..6fc5ba15 100644 --- a/providers/aws/services/redshift/redshift_service_test.py +++ b/tests/providers/aws/services/redshift/redshift_service_test.py @@ -5,8 +5,8 @@ import botocore from boto3 import client, session from moto import mock_redshift -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.redshift.redshift_service import Redshift +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.redshift.redshift_service import Redshift AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -53,7 +53,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.redshift.redshift_service.generate_regional_clients", + "prowler.providers.aws.services.redshift.redshift_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_Redshift_Service: diff --git a/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled_test.py b/tests/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled_test.py similarity index 74% rename from providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled_test.py rename to tests/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled_test.py index 751cb494..f7620712 100644 --- a/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled_test.py +++ b/tests/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.route53.route53_service import Domain +from prowler.providers.aws.services.route53.route53_service import Domain AWS_REGION = "us-east-1" @@ -11,11 +11,11 @@ class Test_route53_domains_privacy_protection_enabled: route53domains.domains = {} with mock.patch( - "providers.aws.services.route53.route53_service.Route53Domains", + "prowler.providers.aws.services.route53.route53_service.Route53Domains", new=route53domains, ): # Test Check - from providers.aws.services.route53.route53_domains_privacy_protection_enabled.route53_domains_privacy_protection_enabled import ( + from prowler.providers.aws.services.route53.route53_domains_privacy_protection_enabled.route53_domains_privacy_protection_enabled import ( route53_domains_privacy_protection_enabled, ) @@ -34,11 +34,11 @@ class Test_route53_domains_privacy_protection_enabled: } with mock.patch( - "providers.aws.services.route53.route53_service.Route53Domains", + "prowler.providers.aws.services.route53.route53_service.Route53Domains", new=route53domains, ): # Test Check - from providers.aws.services.route53.route53_domains_privacy_protection_enabled.route53_domains_privacy_protection_enabled import ( + from prowler.providers.aws.services.route53.route53_domains_privacy_protection_enabled.route53_domains_privacy_protection_enabled import ( route53_domains_privacy_protection_enabled, ) @@ -62,11 +62,11 @@ class Test_route53_domains_privacy_protection_enabled: } with mock.patch( - "providers.aws.services.route53.route53_service.Route53Domains", + "prowler.providers.aws.services.route53.route53_service.Route53Domains", new=route53domains, ): # Test Check - from providers.aws.services.route53.route53_domains_privacy_protection_enabled.route53_domains_privacy_protection_enabled import ( + from prowler.providers.aws.services.route53.route53_domains_privacy_protection_enabled.route53_domains_privacy_protection_enabled import ( route53_domains_privacy_protection_enabled, ) diff --git a/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled_test.py b/tests/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled_test.py similarity index 76% rename from providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled_test.py rename to tests/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled_test.py index c68f89bd..7ca8c934 100644 --- a/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled_test.py +++ b/tests/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.route53.route53_service import Domain +from prowler.providers.aws.services.route53.route53_service import Domain AWS_REGION = "us-east-1" @@ -11,11 +11,11 @@ class Test_route53_domains_transferlock_enabled: route53domains.domains = {} with mock.patch( - "providers.aws.services.route53.route53_service.Route53Domains", + "prowler.providers.aws.services.route53.route53_service.Route53Domains", new=route53domains, ): # Test Check - from providers.aws.services.route53.route53_domains_transferlock_enabled.route53_domains_transferlock_enabled import ( + from prowler.providers.aws.services.route53.route53_domains_transferlock_enabled.route53_domains_transferlock_enabled import ( route53_domains_transferlock_enabled, ) @@ -37,11 +37,11 @@ class Test_route53_domains_transferlock_enabled: } with mock.patch( - "providers.aws.services.route53.route53_service.Route53Domains", + "prowler.providers.aws.services.route53.route53_service.Route53Domains", new=route53domains, ): # Test Check - from providers.aws.services.route53.route53_domains_transferlock_enabled.route53_domains_transferlock_enabled import ( + from prowler.providers.aws.services.route53.route53_domains_transferlock_enabled.route53_domains_transferlock_enabled import ( route53_domains_transferlock_enabled, ) @@ -70,11 +70,11 @@ class Test_route53_domains_transferlock_enabled: } with mock.patch( - "providers.aws.services.route53.route53_service.Route53Domains", + "prowler.providers.aws.services.route53.route53_service.Route53Domains", new=route53domains, ): # Test Check - from providers.aws.services.route53.route53_domains_transferlock_enabled.route53_domains_transferlock_enabled import ( + from prowler.providers.aws.services.route53.route53_domains_transferlock_enabled.route53_domains_transferlock_enabled import ( route53_domains_transferlock_enabled, ) diff --git a/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled_test.py b/tests/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled_test.py similarity index 77% rename from providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled_test.py rename to tests/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled_test.py index 587393bd..8e2c5a69 100644 --- a/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled_test.py +++ b/tests/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled_test.py @@ -2,7 +2,10 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.route53.route53_service import HostedZone, LoggingConfig +from prowler.providers.aws.services.route53.route53_service import ( + HostedZone, + LoggingConfig, +) AWS_REGION = "us-east-1" @@ -13,11 +16,11 @@ class Test_route53_public_hosted_zones_cloudwatch_logging_enabled: route53.hosted_zones = {} with mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53, ): # Test Check - from providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( route53_public_hosted_zones_cloudwatch_logging_enabled, ) @@ -46,11 +49,11 @@ class Test_route53_public_hosted_zones_cloudwatch_logging_enabled: } with mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53, ): # Test Check - from providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( route53_public_hosted_zones_cloudwatch_logging_enabled, ) @@ -81,11 +84,11 @@ class Test_route53_public_hosted_zones_cloudwatch_logging_enabled: } with mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53, ): # Test Check - from providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( route53_public_hosted_zones_cloudwatch_logging_enabled, ) @@ -116,11 +119,11 @@ class Test_route53_public_hosted_zones_cloudwatch_logging_enabled: } with mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53, ): # Test Check - from providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( route53_public_hosted_zones_cloudwatch_logging_enabled, ) diff --git a/providers/aws/services/route53/route53_service_test.py b/tests/providers/aws/services/route53/route53_service_test.py similarity index 98% rename from providers/aws/services/route53/route53_service_test.py rename to tests/providers/aws/services/route53/route53_service_test.py index 96a4ef55..b661f8f8 100644 --- a/providers/aws/services/route53/route53_service_test.py +++ b/tests/providers/aws/services/route53/route53_service_test.py @@ -4,8 +4,8 @@ import botocore from boto3 import client, session from moto import mock_logs, mock_route53 -from providers.aws.lib.audit_info.audit_info import AWS_Audit_Info -from providers.aws.services.route53.route53_service import Route53 +from prowler.providers.aws.lib.audit_info.audit_info import AWS_Audit_Info +from prowler.providers.aws.services.route53.route53_service import Route53 # Mock Test Region AWS_REGION = "us-east-1" diff --git a/providers/aws/services/route53/route53domains_service_test.py b/tests/providers/aws/services/route53/route53domains_service_test.py similarity index 96% rename from providers/aws/services/route53/route53domains_service_test.py rename to tests/providers/aws/services/route53/route53domains_service_test.py index 7f1de4b0..75d5616d 100644 --- a/providers/aws/services/route53/route53domains_service_test.py +++ b/tests/providers/aws/services/route53/route53domains_service_test.py @@ -4,8 +4,8 @@ from unittest.mock import patch import botocore from boto3 import session -from providers.aws.lib.audit_info.audit_info import AWS_Audit_Info -from providers.aws.services.route53.route53_service import Route53Domains +from prowler.providers.aws.lib.audit_info.audit_info import AWS_Audit_Info +from prowler.providers.aws.services.route53.route53_service import Route53Domains # Mock Test Region AWS_REGION = "us-east-1" diff --git a/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks_test.py b/tests/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks_test.py similarity index 74% rename from providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks_test.py rename to tests/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks_test.py index d007da43..2f7304b1 100644 --- a/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks_test.py +++ b/tests/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks_test.py @@ -3,7 +3,7 @@ from unittest import mock from boto3 import client, session from moto import mock_s3, mock_s3control -from providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info AWS_ACCOUNT_NUMBER = "123456789012" AWS_REGION = "us-east-1" @@ -46,23 +46,24 @@ class Test_s3_account_level_public_access_blocks: "RestrictPublicBuckets": True, }, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3_client", + "prowler.providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3control_client", + "prowler.providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks import ( + from prowler.providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks import ( s3_account_level_public_access_blocks, ) @@ -92,23 +93,24 @@ class Test_s3_account_level_public_access_blocks: "RestrictPublicBuckets": False, }, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3_client", + "prowler.providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3control_client", + "prowler.providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks import ( + from prowler.providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks import ( s3_account_level_public_access_blocks, ) diff --git a/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited_test.py b/tests/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited_test.py similarity index 70% rename from providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited_test.py rename to tests/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited_test.py index b4ce0fdc..13374aea 100644 --- a/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited_test.py @@ -12,17 +12,17 @@ class Test_s3_bucket_acl_prohibited: bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited import ( + from prowler.providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited import ( s3_bucket_acl_prohibited, ) @@ -44,17 +44,17 @@ class Test_s3_bucket_acl_prohibited: bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited import ( + from prowler.providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited import ( s3_bucket_acl_prohibited, ) @@ -78,17 +78,17 @@ class Test_s3_bucket_acl_prohibited: Bucket=bucket_name_us, ObjectOwnership="BucketOwnerEnforced" ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited import ( + from prowler.providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited import ( s3_bucket_acl_prohibited, ) diff --git a/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption_test.py b/tests/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption_test.py similarity index 75% rename from providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption_test.py rename to tests/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption_test.py index a6463eaf..9fc0761b 100644 --- a/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption_test.py @@ -12,17 +12,17 @@ class Test_s3_bucket_default_encryption: bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption import ( + from prowler.providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption import ( s3_bucket_default_encryption, ) @@ -59,17 +59,17 @@ class Test_s3_bucket_default_encryption: s3_client_us_east_1.put_bucket_encryption( Bucket=bucket_name_us, ServerSideEncryptionConfiguration=sse_config ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption import ( + from prowler.providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption import ( s3_bucket_default_encryption, ) diff --git a/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete_test.py b/tests/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete_test.py similarity index 68% rename from providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete_test.py rename to tests/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete_test.py index 2b57c0f4..37473358 100644 --- a/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete_test.py @@ -11,17 +11,17 @@ class Test_s3_bucket_no_mfa_delete: @mock_s3 def test_no_buckets(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete import ( + from prowler.providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete import ( s3_bucket_no_mfa_delete, ) @@ -36,17 +36,17 @@ class Test_s3_bucket_no_mfa_delete: bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete import ( + from prowler.providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete import ( s3_bucket_no_mfa_delete, ) @@ -70,17 +70,17 @@ class Test_s3_bucket_no_mfa_delete: Bucket=bucket_name_us, VersioningConfiguration={"MFADelete": "Enabled", "Status": "Enabled"}, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete.s3_client", new=S3(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete import ( + from prowler.providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete import ( s3_bucket_no_mfa_delete, ) diff --git a/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning_test.py b/tests/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning_test.py similarity index 72% rename from providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning_test.py rename to tests/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning_test.py index 8498c077..cd07b15b 100644 --- a/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning_test.py @@ -12,17 +12,17 @@ class Test_s3_bucket_object_versioning: bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning import ( + from prowler.providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning import ( s3_bucket_object_versioning, ) @@ -49,17 +49,17 @@ class Test_s3_bucket_object_versioning: Bucket=bucket_name_us, VersioningConfiguration={"Status": "Enabled"}, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning import ( + from prowler.providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning import ( s3_bucket_object_versioning, ) diff --git a/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access_test.py b/tests/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access_test.py similarity index 74% rename from providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access_test.py rename to tests/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access_test.py index 72d0d753..8b6b6ce9 100644 --- a/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access_test.py @@ -12,17 +12,17 @@ class Test_s3_bucket_policy_public_write_access: bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access import ( + from prowler.providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access import ( s3_bucket_policy_public_write_access, ) @@ -51,17 +51,17 @@ class Test_s3_bucket_policy_public_write_access: Bucket=bucket_name_us, Policy=encryption_policy, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access import ( + from prowler.providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access import ( s3_bucket_policy_public_write_access, ) @@ -89,17 +89,17 @@ class Test_s3_bucket_policy_public_write_access: Bucket=bucket_name_us, Policy=public_write_policy, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access import ( + from prowler.providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access import ( s3_bucket_policy_public_write_access, ) diff --git a/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access_test.py b/tests/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access_test.py similarity index 76% rename from providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access_test.py rename to tests/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access_test.py index d25e26bd..22479674 100644 --- a/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access_test.py @@ -4,7 +4,7 @@ from unittest import mock from boto3 import client, session from moto import mock_s3, mock_s3control -from providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info AWS_ACCOUNT_NUMBER = "123456789012" AWS_REGION = "us-east-1" @@ -36,23 +36,24 @@ class Test_s3_bucket_public_access: @mock_s3 @mock_s3control def test_no_buckets(self): - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( + from prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( s3_bucket_public_access, ) @@ -75,23 +76,24 @@ class Test_s3_bucket_public_access: "RestrictPublicBuckets": True, }, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( + from prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( s3_bucket_public_access, ) @@ -124,23 +126,24 @@ class Test_s3_bucket_public_access: "RestrictPublicBuckets": True, }, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( + from prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( s3_bucket_public_access, ) @@ -182,23 +185,24 @@ class Test_s3_bucket_public_access: "RestrictPublicBuckets": True, }, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( + from prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( s3_bucket_public_access, ) @@ -256,23 +260,24 @@ class Test_s3_bucket_public_access: "Owner": bucket_owner, }, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( + from prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( s3_bucket_public_access, ) @@ -319,23 +324,24 @@ class Test_s3_bucket_public_access: Bucket=bucket_name_us, Policy=public_write_policy, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( + from prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( s3_bucket_public_access, ) @@ -366,23 +372,24 @@ class Test_s3_bucket_public_access: "RestrictPublicBuckets": True, }, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( + from prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( s3_bucket_public_access, ) diff --git a/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy_test.py b/tests/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy_test.py similarity index 75% rename from providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy_test.py rename to tests/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy_test.py index 30d9bf95..ef875b82 100644 --- a/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy_test.py @@ -12,17 +12,17 @@ class Test_s3_bucket_secure_transport_policy: bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy import ( + from prowler.providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy import ( s3_bucket_secure_transport_policy, ) @@ -68,17 +68,17 @@ class Test_s3_bucket_secure_transport_policy: Bucket=bucket_name_us, Policy=ssl_policy, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy import ( + from prowler.providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy import ( s3_bucket_secure_transport_policy, ) @@ -124,17 +124,17 @@ class Test_s3_bucket_secure_transport_policy: Bucket=bucket_name_us, Policy=ssl_policy, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy import ( + from prowler.providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy import ( s3_bucket_secure_transport_policy, ) diff --git a/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled_test.py b/tests/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled_test.py similarity index 82% rename from providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled_test.py rename to tests/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled_test.py index c1d894e9..bb9c50d0 100644 --- a/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled_test.py @@ -14,17 +14,17 @@ class Test_s3_bucket_server_access_logging_enabled: bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled import ( + from prowler.providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled import ( s3_bucket_server_access_logging_enabled, ) @@ -99,17 +99,17 @@ class Test_s3_bucket_server_access_logging_enabled: } }, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled import ( + from prowler.providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled import ( s3_bucket_server_access_logging_enabled, ) diff --git a/providers/aws/services/s3/s3_service_test.py b/tests/providers/aws/services/s3/s3_service_test.py similarity index 98% rename from providers/aws/services/s3/s3_service_test.py rename to tests/providers/aws/services/s3/s3_service_test.py index b762eaee..5b5c25ed 100644 --- a/providers/aws/services/s3/s3_service_test.py +++ b/tests/providers/aws/services/s3/s3_service_test.py @@ -3,8 +3,8 @@ import json from boto3 import client, session from moto import mock_s3, mock_s3control -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.s3.s3_service import S3, S3Control +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.s3.s3_service import S3, S3Control AWS_ACCOUNT_NUMBER = "123456789012" AWS_REGION = "us-east-1" diff --git a/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled_test.py b/tests/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled_test.py similarity index 77% rename from providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled_test.py index e8bb645a..0f147e92 100644 --- a/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.sagemaker.sagemaker_service import Model +from prowler.providers.aws.services.sagemaker.sagemaker_service import Model AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ class Test_sagemaker_models_network_isolation_enabled: sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_models = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_models_network_isolation_enabled.sagemaker_models_network_isolation_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_models_network_isolation_enabled.sagemaker_models_network_isolation_enabled import ( sagemaker_models_network_isolation_enabled, ) @@ -40,10 +40,10 @@ class Test_sagemaker_models_network_isolation_enabled: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_models_network_isolation_enabled.sagemaker_models_network_isolation_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_models_network_isolation_enabled.sagemaker_models_network_isolation_enabled import ( sagemaker_models_network_isolation_enabled, ) @@ -67,10 +67,10 @@ class Test_sagemaker_models_network_isolation_enabled: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_models_network_isolation_enabled.sagemaker_models_network_isolation_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_models_network_isolation_enabled.sagemaker_models_network_isolation_enabled import ( sagemaker_models_network_isolation_enabled, ) diff --git a/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured_test.py b/tests/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured_test.py similarity index 77% rename from providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured_test.py index 293c3a1b..0c501782 100644 --- a/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.sagemaker.sagemaker_service import Model +from prowler.providers.aws.services.sagemaker.sagemaker_service import Model AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ class Test_sagemaker_models_vpc_settings_configured: sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_models = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_models_vpc_settings_configured.sagemaker_models_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_models_vpc_settings_configured.sagemaker_models_vpc_settings_configured import ( sagemaker_models_vpc_settings_configured, ) @@ -40,10 +40,10 @@ class Test_sagemaker_models_vpc_settings_configured: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_models_vpc_settings_configured.sagemaker_models_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_models_vpc_settings_configured.sagemaker_models_vpc_settings_configured import ( sagemaker_models_vpc_settings_configured, ) @@ -66,10 +66,10 @@ class Test_sagemaker_models_vpc_settings_configured: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_models_vpc_settings_configured.sagemaker_models_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_models_vpc_settings_configured.sagemaker_models_vpc_settings_configured import ( sagemaker_models_vpc_settings_configured, ) diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled_test.py b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled_test.py similarity index 76% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled_test.py index 01bfccfb..8c0ff7b5 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.sagemaker.sagemaker_service import NotebookInstance +from prowler.providers.aws.services.sagemaker.sagemaker_service import NotebookInstance AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ class Test_sagemaker_notebook_instance_encryption_enabled: sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_notebook_instances = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_encryption_enabled.sagemaker_notebook_instance_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_encryption_enabled.sagemaker_notebook_instance_encryption_enabled import ( sagemaker_notebook_instance_encryption_enabled, ) @@ -40,10 +40,10 @@ class Test_sagemaker_notebook_instance_encryption_enabled: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_encryption_enabled.sagemaker_notebook_instance_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_encryption_enabled.sagemaker_notebook_instance_encryption_enabled import ( sagemaker_notebook_instance_encryption_enabled, ) @@ -66,10 +66,10 @@ class Test_sagemaker_notebook_instance_encryption_enabled: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_encryption_enabled.sagemaker_notebook_instance_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_encryption_enabled.sagemaker_notebook_instance_encryption_enabled import ( sagemaker_notebook_instance_encryption_enabled, ) diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled_test.py b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled_test.py similarity index 76% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled_test.py index e44cfcef..8939fc1a 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.sagemaker.sagemaker_service import NotebookInstance +from prowler.providers.aws.services.sagemaker.sagemaker_service import NotebookInstance AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ class Test_sagemaker_notebook_instance_root_access_disabled: sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_notebook_instances = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_root_access_disabled.sagemaker_notebook_instance_root_access_disabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_root_access_disabled.sagemaker_notebook_instance_root_access_disabled import ( sagemaker_notebook_instance_root_access_disabled, ) @@ -38,10 +38,10 @@ class Test_sagemaker_notebook_instance_root_access_disabled: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_root_access_disabled.sagemaker_notebook_instance_root_access_disabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_root_access_disabled.sagemaker_notebook_instance_root_access_disabled import ( sagemaker_notebook_instance_root_access_disabled, ) @@ -65,10 +65,10 @@ class Test_sagemaker_notebook_instance_root_access_disabled: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_root_access_disabled.sagemaker_notebook_instance_root_access_disabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_root_access_disabled.sagemaker_notebook_instance_root_access_disabled import ( sagemaker_notebook_instance_root_access_disabled, ) diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured_test.py b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured_test.py similarity index 76% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured_test.py index ca2a0244..5eb49a9b 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.sagemaker.sagemaker_service import NotebookInstance +from prowler.providers.aws.services.sagemaker.sagemaker_service import NotebookInstance AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ class Test_sagemaker_notebook_instance_vpc_settings_configured: sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_notebook_instances = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_vpc_settings_configured.sagemaker_notebook_instance_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_vpc_settings_configured.sagemaker_notebook_instance_vpc_settings_configured import ( sagemaker_notebook_instance_vpc_settings_configured, ) @@ -40,10 +40,10 @@ class Test_sagemaker_notebook_instance_vpc_settings_configured: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_vpc_settings_configured.sagemaker_notebook_instance_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_vpc_settings_configured.sagemaker_notebook_instance_vpc_settings_configured import ( sagemaker_notebook_instance_vpc_settings_configured, ) @@ -67,10 +67,10 @@ class Test_sagemaker_notebook_instance_vpc_settings_configured: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_vpc_settings_configured.sagemaker_notebook_instance_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_vpc_settings_configured.sagemaker_notebook_instance_vpc_settings_configured import ( sagemaker_notebook_instance_vpc_settings_configured, ) diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured_test.py b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured_test.py similarity index 76% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured_test.py index 383cef31..dbebcfa6 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.sagemaker.sagemaker_service import NotebookInstance +from prowler.providers.aws.services.sagemaker.sagemaker_service import NotebookInstance AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ class Test_sagemaker_notebook_instance_without_direct_internet_access_configured sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_notebook_instances = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_without_direct_internet_access_configured.sagemaker_notebook_instance_without_direct_internet_access_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_without_direct_internet_access_configured.sagemaker_notebook_instance_without_direct_internet_access_configured import ( sagemaker_notebook_instance_without_direct_internet_access_configured, ) @@ -40,10 +40,10 @@ class Test_sagemaker_notebook_instance_without_direct_internet_access_configured ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_without_direct_internet_access_configured.sagemaker_notebook_instance_without_direct_internet_access_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_without_direct_internet_access_configured.sagemaker_notebook_instance_without_direct_internet_access_configured import ( sagemaker_notebook_instance_without_direct_internet_access_configured, ) @@ -71,10 +71,10 @@ class Test_sagemaker_notebook_instance_without_direct_internet_access_configured ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_without_direct_internet_access_configured.sagemaker_notebook_instance_without_direct_internet_access_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_without_direct_internet_access_configured.sagemaker_notebook_instance_without_direct_internet_access_configured import ( sagemaker_notebook_instance_without_direct_internet_access_configured, ) diff --git a/providers/aws/services/sagemaker/sagemaker_service_test.py b/tests/providers/aws/services/sagemaker/sagemaker_service_test.py similarity index 96% rename from providers/aws/services/sagemaker/sagemaker_service_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_service_test.py index f0b231f9..f1cb8dae 100644 --- a/providers/aws/services/sagemaker/sagemaker_service_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_service_test.py @@ -4,8 +4,8 @@ from uuid import uuid4 import botocore from boto3 import session -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.sagemaker.sagemaker_service import SageMaker +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.sagemaker.sagemaker_service import SageMaker AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -94,7 +94,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.sagemaker.sagemaker_service.generate_regional_clients", + "prowler.providers.aws.services.sagemaker.sagemaker_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_SageMaker_Service: diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled_test.py b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled_test.py similarity index 75% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled_test.py index 27d3d4e2..9c3d48d7 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.sagemaker.sagemaker_service import TrainingJob +from prowler.providers.aws.services.sagemaker.sagemaker_service import TrainingJob AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ class Test_sagemaker_training_jobs_intercontainer_encryption_enabled: sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_training_jobs = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_intercontainer_encryption_enabled.sagemaker_training_jobs_intercontainer_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_intercontainer_encryption_enabled.sagemaker_training_jobs_intercontainer_encryption_enabled import ( sagemaker_training_jobs_intercontainer_encryption_enabled, ) @@ -38,10 +38,10 @@ class Test_sagemaker_training_jobs_intercontainer_encryption_enabled: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_intercontainer_encryption_enabled.sagemaker_training_jobs_intercontainer_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_intercontainer_encryption_enabled.sagemaker_training_jobs_intercontainer_encryption_enabled import ( sagemaker_training_jobs_intercontainer_encryption_enabled, ) @@ -66,10 +66,10 @@ class Test_sagemaker_training_jobs_intercontainer_encryption_enabled: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_intercontainer_encryption_enabled.sagemaker_training_jobs_intercontainer_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_intercontainer_encryption_enabled.sagemaker_training_jobs_intercontainer_encryption_enabled import ( sagemaker_training_jobs_intercontainer_encryption_enabled, ) diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled_test.py b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled_test.py similarity index 76% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled_test.py index c5272dc5..e070b783 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.sagemaker.sagemaker_service import TrainingJob +from prowler.providers.aws.services.sagemaker.sagemaker_service import TrainingJob AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ class Test_sagemaker_training_jobs_network_isolation_enabled: sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_training_jobs = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_network_isolation_enabled.sagemaker_training_jobs_network_isolation_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_network_isolation_enabled.sagemaker_training_jobs_network_isolation_enabled import ( sagemaker_training_jobs_network_isolation_enabled, ) @@ -40,10 +40,10 @@ class Test_sagemaker_training_jobs_network_isolation_enabled: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_network_isolation_enabled.sagemaker_training_jobs_network_isolation_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_network_isolation_enabled.sagemaker_training_jobs_network_isolation_enabled import ( sagemaker_training_jobs_network_isolation_enabled, ) @@ -66,10 +66,10 @@ class Test_sagemaker_training_jobs_network_isolation_enabled: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_network_isolation_enabled.sagemaker_training_jobs_network_isolation_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_network_isolation_enabled.sagemaker_training_jobs_network_isolation_enabled import ( sagemaker_training_jobs_network_isolation_enabled, ) diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled_test.py b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled_test.py similarity index 75% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled_test.py index 43d1ac64..f9df2fe5 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.sagemaker.sagemaker_service import TrainingJob +from prowler.providers.aws.services.sagemaker.sagemaker_service import TrainingJob AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ class Test_sagemaker_training_jobs_volume_and_output_encryption_enabled: sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_training_jobs = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_volume_and_output_encryption_enabled.sagemaker_training_jobs_volume_and_output_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_volume_and_output_encryption_enabled.sagemaker_training_jobs_volume_and_output_encryption_enabled import ( sagemaker_training_jobs_volume_and_output_encryption_enabled, ) @@ -40,10 +40,10 @@ class Test_sagemaker_training_jobs_volume_and_output_encryption_enabled: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_volume_and_output_encryption_enabled.sagemaker_training_jobs_volume_and_output_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_volume_and_output_encryption_enabled.sagemaker_training_jobs_volume_and_output_encryption_enabled import ( sagemaker_training_jobs_volume_and_output_encryption_enabled, ) @@ -66,10 +66,10 @@ class Test_sagemaker_training_jobs_volume_and_output_encryption_enabled: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_volume_and_output_encryption_enabled.sagemaker_training_jobs_volume_and_output_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_volume_and_output_encryption_enabled.sagemaker_training_jobs_volume_and_output_encryption_enabled import ( sagemaker_training_jobs_volume_and_output_encryption_enabled, ) diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured_test.py b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured_test.py similarity index 77% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured_test.py index f473909e..45bdf3d5 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.sagemaker.sagemaker_service import TrainingJob +from prowler.providers.aws.services.sagemaker.sagemaker_service import TrainingJob AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ class Test_sagemaker_training_jobs_vpc_settings_configured: sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_training_jobs = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_vpc_settings_configured.sagemaker_training_jobs_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_vpc_settings_configured.sagemaker_training_jobs_vpc_settings_configured import ( sagemaker_training_jobs_vpc_settings_configured, ) @@ -40,10 +40,10 @@ class Test_sagemaker_training_jobs_vpc_settings_configured: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_vpc_settings_configured.sagemaker_training_jobs_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_vpc_settings_configured.sagemaker_training_jobs_vpc_settings_configured import ( sagemaker_training_jobs_vpc_settings_configured, ) @@ -69,10 +69,10 @@ class Test_sagemaker_training_jobs_vpc_settings_configured: ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_vpc_settings_configured.sagemaker_training_jobs_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_vpc_settings_configured.sagemaker_training_jobs_vpc_settings_configured import ( sagemaker_training_jobs_vpc_settings_configured, ) diff --git a/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled_test.py b/tests/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled_test.py similarity index 77% rename from providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled_test.py rename to tests/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled_test.py index 5e91945d..ad1f6c1e 100644 --- a/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled_test.py +++ b/tests/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.secretsmanager.secretsmanager_service import Secret +from prowler.providers.aws.services.secretsmanager.secretsmanager_service import Secret # Mock Test Region AWS_REGION = "eu-west-1" @@ -13,11 +13,11 @@ class Test_secretsmanager_automatic_rotation_enabled: secretsmanager_client = mock.MagicMock secretsmanager_client.secrets = {} with mock.patch( - "providers.aws.services.secretsmanager.secretsmanager_service.SecretsManager", + "prowler.providers.aws.services.secretsmanager.secretsmanager_service.SecretsManager", new=secretsmanager_client, ): # Test Check - from providers.aws.services.secretsmanager.secretsmanager_automatic_rotation_enabled.secretsmanager_automatic_rotation_enabled import ( + from prowler.providers.aws.services.secretsmanager.secretsmanager_automatic_rotation_enabled.secretsmanager_automatic_rotation_enabled import ( secretsmanager_automatic_rotation_enabled, ) @@ -39,11 +39,11 @@ class Test_secretsmanager_automatic_rotation_enabled: ) } with mock.patch( - "providers.aws.services.secretsmanager.secretsmanager_service.SecretsManager", + "prowler.providers.aws.services.secretsmanager.secretsmanager_service.SecretsManager", new=secretsmanager_client, ): # Test Check - from providers.aws.services.secretsmanager.secretsmanager_automatic_rotation_enabled.secretsmanager_automatic_rotation_enabled import ( + from prowler.providers.aws.services.secretsmanager.secretsmanager_automatic_rotation_enabled.secretsmanager_automatic_rotation_enabled import ( secretsmanager_automatic_rotation_enabled, ) @@ -73,11 +73,11 @@ class Test_secretsmanager_automatic_rotation_enabled: ) } with mock.patch( - "providers.aws.services.secretsmanager.secretsmanager_service.SecretsManager", + "prowler.providers.aws.services.secretsmanager.secretsmanager_service.SecretsManager", new=secretsmanager_client, ): # Test Check - from providers.aws.services.secretsmanager.secretsmanager_automatic_rotation_enabled.secretsmanager_automatic_rotation_enabled import ( + from prowler.providers.aws.services.secretsmanager.secretsmanager_automatic_rotation_enabled.secretsmanager_automatic_rotation_enabled import ( secretsmanager_automatic_rotation_enabled, ) diff --git a/providers/aws/services/secretsmanager/secretsmanager_service_test.py b/tests/providers/aws/services/secretsmanager/secretsmanager_service_test.py similarity index 94% rename from providers/aws/services/secretsmanager/secretsmanager_service_test.py rename to tests/providers/aws/services/secretsmanager/secretsmanager_service_test.py index 92475fc4..5a73592f 100644 --- a/providers/aws/services/secretsmanager/secretsmanager_service_test.py +++ b/tests/providers/aws/services/secretsmanager/secretsmanager_service_test.py @@ -6,8 +6,10 @@ from boto3 import client, resource, session from moto import mock_ec2, mock_iam, mock_lambda, mock_s3, mock_secretsmanager from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.secretsmanager.secretsmanager_service import SecretsManager +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.secretsmanager.secretsmanager_service import ( + SecretsManager, +) # Mock Test Region AWS_REGION = "eu-west-1" @@ -22,7 +24,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch( - "providers.aws.services.secretsmanager.secretsmanager_service.generate_regional_clients", + "prowler.providers.aws.services.secretsmanager.secretsmanager_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_SecretsManager_Service: diff --git a/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled_test.py b/tests/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled_test.py similarity index 77% rename from providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled_test.py rename to tests/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled_test.py index 575882d0..5254cf83 100644 --- a/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled_test.py +++ b/tests/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled_test.py @@ -1,6 +1,8 @@ from unittest import mock -from providers.aws.services.securityhub.securityhub_service import SecurityHubHub +from prowler.providers.aws.services.securityhub.securityhub_service import ( + SecurityHubHub, +) class Test_accessanalyzer_enabled_without_findings: @@ -16,11 +18,11 @@ class Test_accessanalyzer_enabled_without_findings: ) ] with mock.patch( - "providers.aws.services.securityhub.securityhub_service.SecurityHub", + "prowler.providers.aws.services.securityhub.securityhub_service.SecurityHub", new=securityhub_client, ): # Test Check - from providers.aws.services.securityhub.securityhub_enabled.securityhub_enabled import ( + from prowler.providers.aws.services.securityhub.securityhub_enabled.securityhub_enabled import ( securityhub_enabled, ) @@ -43,11 +45,11 @@ class Test_accessanalyzer_enabled_without_findings: ) ] with mock.patch( - "providers.aws.services.securityhub.securityhub_service.SecurityHub", + "prowler.providers.aws.services.securityhub.securityhub_service.SecurityHub", new=securityhub_client, ): # Test Check - from providers.aws.services.securityhub.securityhub_enabled.securityhub_enabled import ( + from prowler.providers.aws.services.securityhub.securityhub_enabled.securityhub_enabled import ( securityhub_enabled, ) diff --git a/providers/aws/services/securityhub/securityhub_service_test.py b/tests/providers/aws/services/securityhub/securityhub_service_test.py similarity index 91% rename from providers/aws/services/securityhub/securityhub_service_test.py rename to tests/providers/aws/services/securityhub/securityhub_service_test.py index eb049be0..5715715c 100644 --- a/providers/aws/services/securityhub/securityhub_service_test.py +++ b/tests/providers/aws/services/securityhub/securityhub_service_test.py @@ -2,8 +2,8 @@ from unittest.mock import patch import botocore -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.securityhub.securityhub_service import SecurityHub +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.securityhub.securityhub_service import SecurityHub # Mock Test Region AWS_REGION = "eu-west-1" @@ -47,7 +47,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.securityhub.securityhub_service.generate_regional_clients", + "prowler.providers.aws.services.securityhub.securityhub_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_SecurityHub_Service: diff --git a/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips_test.py b/tests/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips_test.py similarity index 70% rename from providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips_test.py rename to tests/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips_test.py index c3cf0e27..d16f898f 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips_test.py +++ b/tests/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips_test.py @@ -5,8 +5,8 @@ from mock import patch from moto import mock_ec2 from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.shield.shield_service import Protection +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.shield.shield_service import Protection AWS_REGION = "eu-west-1" @@ -20,7 +20,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_shield_advanced_protection_in_associated_elastic_ips: @@ -51,20 +51,20 @@ class Test_shield_advanced_protection_in_associated_elastic_ips: shield_client = mock.MagicMock shield_client.enabled = False - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( shield_advanced_protection_in_associated_elastic_ips, ) @@ -96,20 +96,20 @@ class Test_shield_advanced_protection_in_associated_elastic_ips: ) } - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( shield_advanced_protection_in_associated_elastic_ips, ) @@ -140,20 +140,20 @@ class Test_shield_advanced_protection_in_associated_elastic_ips: shield_client.region = AWS_REGION shield_client.protections = {} - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( shield_advanced_protection_in_associated_elastic_ips, ) @@ -184,20 +184,20 @@ class Test_shield_advanced_protection_in_associated_elastic_ips: shield_client.region = AWS_REGION shield_client.protections = {} - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( shield_advanced_protection_in_associated_elastic_ips, ) diff --git a/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers_test.py b/tests/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers_test.py similarity index 74% rename from providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers_test.py rename to tests/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers_test.py index 175c42d0..fbb53920 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers_test.py +++ b/tests/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers_test.py @@ -4,8 +4,8 @@ from boto3 import client, resource, session from moto import mock_ec2, mock_elb from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.shield.shield_service import Protection +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.shield.shield_service import Protection AWS_REGION = "eu-west-1" @@ -39,20 +39,20 @@ class Test_shield_advanced_protection_in_classic_load_balancers: shield_client = mock.MagicMock shield_client.enabled = False - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.services.elb.elb_service import ELB with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", new=ELB(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( shield_advanced_protection_in_classic_load_balancers, ) @@ -99,20 +99,20 @@ class Test_shield_advanced_protection_in_classic_load_balancers: ) } - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.services.elb.elb_service import ELB with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", new=ELB(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( shield_advanced_protection_in_classic_load_balancers, ) @@ -158,20 +158,20 @@ class Test_shield_advanced_protection_in_classic_load_balancers: shield_client.region = AWS_REGION shield_client.protections = {} - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.services.elb.elb_service import ELB with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", new=ELB(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( shield_advanced_protection_in_classic_load_balancers, ) @@ -217,20 +217,20 @@ class Test_shield_advanced_protection_in_classic_load_balancers: shield_client.region = AWS_REGION shield_client.protections = {} - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.services.elb.elb_service import ELB with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", new=ELB(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( shield_advanced_protection_in_classic_load_balancers, ) diff --git a/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions_test.py b/tests/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions_test.py similarity index 77% rename from providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions_test.py rename to tests/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions_test.py index 2f789935..24f7ae71 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions_test.py +++ b/tests/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions_test.py @@ -1,8 +1,9 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.cloudfront.cloudfront_service import Distribution -from providers.aws.services.shield.shield_service import Protection + +from prowler.providers.aws.services.cloudfront.cloudfront_service import Distribution +from prowler.providers.aws.services.shield.shield_service import Protection AWS_REGION = "eu-west-1" @@ -15,14 +16,14 @@ class Test_shield_advanced_protection_in_cloudfront_distributions: # CloudFront Client cloudfront_client = mock.MagicMock with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( shield_advanced_protection_in_cloudfront_distributions, ) @@ -60,14 +61,14 @@ class Test_shield_advanced_protection_in_cloudfront_distributions: } with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( shield_advanced_protection_in_cloudfront_distributions, ) @@ -104,14 +105,14 @@ class Test_shield_advanced_protection_in_cloudfront_distributions: shield_client.protections = {} with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( shield_advanced_protection_in_cloudfront_distributions, ) @@ -148,14 +149,14 @@ class Test_shield_advanced_protection_in_cloudfront_distributions: shield_client.protections = {} with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( shield_advanced_protection_in_cloudfront_distributions, ) diff --git a/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators_test.py b/tests/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators_test.py similarity index 77% rename from providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators_test.py rename to tests/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators_test.py index f3a4842e..45436e6b 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators_test.py +++ b/tests/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators_test.py @@ -1,10 +1,11 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.globalaccelerator.globalaccelerator_service import ( + +from prowler.providers.aws.services.globalaccelerator.globalaccelerator_service import ( Accelerator, ) -from providers.aws.services.shield.shield_service import Protection +from prowler.providers.aws.services.shield.shield_service import Protection AWS_REGION = "eu-west-1" @@ -17,14 +18,14 @@ class Test_shield_advanced_protection_in_global_accelerators: # GlobalAccelerator Client globalaccelerator_client = mock.MagicMock with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", + "prowler.providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", new=globalaccelerator_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( shield_advanced_protection_in_global_accelerators, ) @@ -64,14 +65,14 @@ class Test_shield_advanced_protection_in_global_accelerators: } with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", + "prowler.providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", new=globalaccelerator_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( shield_advanced_protection_in_global_accelerators, ) @@ -110,14 +111,14 @@ class Test_shield_advanced_protection_in_global_accelerators: shield_client.protections = {} with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", + "prowler.providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", new=globalaccelerator_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( shield_advanced_protection_in_global_accelerators, ) @@ -156,14 +157,14 @@ class Test_shield_advanced_protection_in_global_accelerators: shield_client.protections = {} with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", + "prowler.providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", new=globalaccelerator_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( shield_advanced_protection_in_global_accelerators, ) diff --git a/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers_test.py b/tests/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers_test.py similarity index 75% rename from providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers_test.py rename to tests/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers_test.py index 0e4740ad..5f6e73b7 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers_test.py +++ b/tests/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers_test.py @@ -5,8 +5,8 @@ from mock import patch from moto import mock_ec2, mock_elbv2 from moto.core import DEFAULT_ACCOUNT_ID as AWS_ACCOUNT_NUMBER -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.shield.shield_service import Protection +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.shield.shield_service import Protection AWS_REGION = "eu-west-1" @@ -20,7 +20,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_shield_advanced_protection_in_internet_facing_load_balancers: @@ -52,20 +52,20 @@ class Test_shield_advanced_protection_in_internet_facing_load_balancers: shield_client = mock.MagicMock shield_client.enabled = False - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", new=ELBv2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( shield_advanced_protection_in_internet_facing_load_balancers, ) @@ -120,20 +120,20 @@ class Test_shield_advanced_protection_in_internet_facing_load_balancers: ) } - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", new=ELBv2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( shield_advanced_protection_in_internet_facing_load_balancers, ) @@ -196,20 +196,20 @@ class Test_shield_advanced_protection_in_internet_facing_load_balancers: ) } - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", new=ELBv2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( shield_advanced_protection_in_internet_facing_load_balancers, ) @@ -251,20 +251,20 @@ class Test_shield_advanced_protection_in_internet_facing_load_balancers: shield_client.region = AWS_REGION shield_client.protections = {} - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", new=ELBv2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( shield_advanced_protection_in_internet_facing_load_balancers, ) @@ -314,20 +314,20 @@ class Test_shield_advanced_protection_in_internet_facing_load_balancers: shield_client.region = AWS_REGION shield_client.protections = {} - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", new=ELBv2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( shield_advanced_protection_in_internet_facing_load_balancers, ) diff --git a/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones_test.py b/tests/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones_test.py similarity index 78% rename from providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones_test.py rename to tests/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones_test.py index 6f326eb9..7d389abb 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones_test.py +++ b/tests/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones_test.py @@ -1,9 +1,7 @@ from unittest import mock -from providers.aws.services.route53.route53_service import ( - HostedZone, -) -from providers.aws.services.shield.shield_service import Protection +from prowler.providers.aws.services.route53.route53_service import HostedZone +from prowler.providers.aws.services.shield.shield_service import Protection AWS_REGION = "eu-west-1" @@ -16,14 +14,14 @@ class Test_shield_advanced_protection_in_route53_hosted_zones: # Route53 Client route53_client = mock.MagicMock with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( shield_advanced_protection_in_route53_hosted_zones, ) @@ -66,14 +64,14 @@ class Test_shield_advanced_protection_in_route53_hosted_zones: } with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( shield_advanced_protection_in_route53_hosted_zones, ) @@ -115,14 +113,14 @@ class Test_shield_advanced_protection_in_route53_hosted_zones: shield_client.protections = {} with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( shield_advanced_protection_in_route53_hosted_zones, ) @@ -164,14 +162,14 @@ class Test_shield_advanced_protection_in_route53_hosted_zones: shield_client.protections = {} with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( shield_advanced_protection_in_route53_hosted_zones, ) diff --git a/providers/aws/services/shield/shield_service_test.py b/tests/providers/aws/services/shield/shield_service_test.py similarity index 96% rename from providers/aws/services/shield/shield_service_test.py rename to tests/providers/aws/services/shield/shield_service_test.py index b9ac7c67..9a6e7fa6 100644 --- a/providers/aws/services/shield/shield_service_test.py +++ b/tests/providers/aws/services/shield/shield_service_test.py @@ -1,9 +1,10 @@ -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.shield.shield_service import Shield -from mock import patch -from moto.core import DEFAULT_ACCOUNT_ID import botocore from boto3 import session +from mock import patch +from moto.core import DEFAULT_ACCOUNT_ID + +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.shield.shield_service import Shield # Mock Test Region AWS_REGION = "eu-west-1" diff --git a/providers/aws/services/sns/sns_service_test.py b/tests/providers/aws/services/sns/sns_service_test.py similarity index 94% rename from providers/aws/services/sns/sns_service_test.py rename to tests/providers/aws/services/sns/sns_service_test.py index 8f024edc..ef24b9ae 100644 --- a/providers/aws/services/sns/sns_service_test.py +++ b/tests/providers/aws/services/sns/sns_service_test.py @@ -6,8 +6,8 @@ import botocore from boto3 import client, session from moto import mock_sns -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.sns.sns_service import SNS +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.sns.sns_service import SNS AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -44,7 +44,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.sns.sns_service.generate_regional_clients", + "prowler.providers.aws.services.sns.sns_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_SNS_Service: diff --git a/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled_test.py b/tests/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled_test.py similarity index 76% rename from providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled_test.py rename to tests/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled_test.py index 623224e3..4d0eea1e 100644 --- a/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled_test.py +++ b/tests/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.sns.sns_service import Topic +from prowler.providers.aws.services.sns.sns_service import Topic AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ class Test_sns_topics_kms_encryption_at_rest_enabled: sns_client = mock.MagicMock sns_client.topics = [] with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_kms_encryption_at_rest_enabled.sns_topics_kms_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.sns.sns_topics_kms_encryption_at_rest_enabled.sns_topics_kms_encryption_at_rest_enabled import ( sns_topics_kms_encryption_at_rest_enabled, ) @@ -40,10 +40,10 @@ class Test_sns_topics_kms_encryption_at_rest_enabled: ) ) with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_kms_encryption_at_rest_enabled.sns_topics_kms_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.sns.sns_topics_kms_encryption_at_rest_enabled.sns_topics_kms_encryption_at_rest_enabled import ( sns_topics_kms_encryption_at_rest_enabled, ) @@ -62,10 +62,10 @@ class Test_sns_topics_kms_encryption_at_rest_enabled: Topic(arn=topic_arn, name=topic_name, region=AWS_REGION) ) with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_kms_encryption_at_rest_enabled.sns_topics_kms_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.sns.sns_topics_kms_encryption_at_rest_enabled.sns_topics_kms_encryption_at_rest_enabled import ( sns_topics_kms_encryption_at_rest_enabled, ) diff --git a/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible_test.py b/tests/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible_test.py similarity index 81% rename from providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible_test.py rename to tests/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible_test.py index d1c942ee..951df40d 100644 --- a/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.sns.sns_service import Topic +from prowler.providers.aws.services.sns.sns_service import Topic AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -50,10 +50,10 @@ class Test_sns_topics_not_publicly_accessible: sns_client = mock.MagicMock sns_client.topics = [] with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( + from prowler.providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( sns_topics_not_publicly_accessible, ) @@ -73,10 +73,10 @@ class Test_sns_topics_not_publicly_accessible: ) ) with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( + from prowler.providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( sns_topics_not_publicly_accessible, ) @@ -95,10 +95,10 @@ class Test_sns_topics_not_publicly_accessible: Topic(arn=topic_arn, name=topic_name, region=AWS_REGION) ) with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( + from prowler.providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( sns_topics_not_publicly_accessible, ) @@ -122,10 +122,10 @@ class Test_sns_topics_not_publicly_accessible: ) ) with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( + from prowler.providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( sns_topics_not_publicly_accessible, ) @@ -149,10 +149,10 @@ class Test_sns_topics_not_publicly_accessible: ) ) with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( + from prowler.providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( sns_topics_not_publicly_accessible, ) diff --git a/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible_test.py b/tests/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible_test.py similarity index 82% rename from providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible_test.py rename to tests/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible_test.py index 78eeecb3..061d4086 100644 --- a/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.sqs.sqs_service import Queue +from prowler.providers.aws.services.sqs.sqs_service import Queue AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -62,10 +62,10 @@ class Test_sqs_queues_not_publicly_accessible: sqs_client = mock.MagicMock sqs_client.queues = [] with mock.patch( - "providers.aws.services.sqs.sqs_service.SQS", + "prowler.providers.aws.services.sqs.sqs_service.SQS", sqs_client, ): - from providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( + from prowler.providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( sqs_queues_not_publicly_accessible, ) @@ -80,10 +80,10 @@ class Test_sqs_queues_not_publicly_accessible: Queue(id=queue_id, region=AWS_REGION, policy=test_restricted_policy) ) with mock.patch( - "providers.aws.services.sqs.sqs_service.SQS", + "prowler.providers.aws.services.sqs.sqs_service.SQS", sqs_client, ): - from providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( + from prowler.providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( sqs_queues_not_publicly_accessible, ) @@ -102,10 +102,10 @@ class Test_sqs_queues_not_publicly_accessible: Queue(id=queue_id, region=AWS_REGION, policy=test_public_policy) ) with mock.patch( - "providers.aws.services.sqs.sqs_service.SQS", + "prowler.providers.aws.services.sqs.sqs_service.SQS", sqs_client, ): - from providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( + from prowler.providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( sqs_queues_not_publicly_accessible, ) @@ -126,10 +126,10 @@ class Test_sqs_queues_not_publicly_accessible: ) ) with mock.patch( - "providers.aws.services.sqs.sqs_service.SQS", + "prowler.providers.aws.services.sqs.sqs_service.SQS", sqs_client, ): - from providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( + from prowler.providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( sqs_queues_not_publicly_accessible, ) diff --git a/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled_test.py b/tests/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled_test.py similarity index 76% rename from providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled_test.py rename to tests/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled_test.py index 7225e691..caeb9f53 100644 --- a/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled_test.py +++ b/tests/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.sqs.sqs_service import Queue +from prowler.providers.aws.services.sqs.sqs_service import Queue AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ class Test_sqs_queues_server_side_encryption_enabled: sqs_client = mock.MagicMock sqs_client.queues = [] with mock.patch( - "providers.aws.services.sqs.sqs_service.SQS", + "prowler.providers.aws.services.sqs.sqs_service.SQS", sqs_client, ): - from providers.aws.services.sqs.sqs_queues_server_side_encryption_enabled.sqs_queues_server_side_encryption_enabled import ( + from prowler.providers.aws.services.sqs.sqs_queues_server_side_encryption_enabled.sqs_queues_server_side_encryption_enabled import ( sqs_queues_server_side_encryption_enabled, ) @@ -35,10 +35,10 @@ class Test_sqs_queues_server_side_encryption_enabled: Queue(id=queue_id, region=AWS_REGION, kms_key_id=test_kms_key_id) ) with mock.patch( - "providers.aws.services.sqs.sqs_service.SQS", + "prowler.providers.aws.services.sqs.sqs_service.SQS", sqs_client, ): - from providers.aws.services.sqs.sqs_queues_server_side_encryption_enabled.sqs_queues_server_side_encryption_enabled import ( + from prowler.providers.aws.services.sqs.sqs_queues_server_side_encryption_enabled.sqs_queues_server_side_encryption_enabled import ( sqs_queues_server_side_encryption_enabled, ) @@ -60,10 +60,10 @@ class Test_sqs_queues_server_side_encryption_enabled: ) ) with mock.patch( - "providers.aws.services.sqs.sqs_service.SQS", + "prowler.providers.aws.services.sqs.sqs_service.SQS", sqs_client, ): - from providers.aws.services.sqs.sqs_queues_server_side_encryption_enabled.sqs_queues_server_side_encryption_enabled import ( + from prowler.providers.aws.services.sqs.sqs_queues_server_side_encryption_enabled.sqs_queues_server_side_encryption_enabled import ( sqs_queues_server_side_encryption_enabled, ) diff --git a/providers/aws/services/sqs/sqs_service_test.py b/tests/providers/aws/services/sqs/sqs_service_test.py similarity index 94% rename from providers/aws/services/sqs/sqs_service_test.py rename to tests/providers/aws/services/sqs/sqs_service_test.py index 7505c997..4341b329 100644 --- a/providers/aws/services/sqs/sqs_service_test.py +++ b/tests/providers/aws/services/sqs/sqs_service_test.py @@ -6,8 +6,8 @@ import botocore from boto3 import client, session from moto import mock_sqs -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.sqs.sqs_service import SQS +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.sqs.sqs_service import SQS AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -46,7 +46,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.sqs.sqs_service.generate_regional_clients", + "prowler.providers.aws.services.sqs.sqs_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_SQS_Service: diff --git a/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets_test.py b/tests/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets_test.py similarity index 83% rename from providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets_test.py rename to tests/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets_test.py index f1b4a012..374fc957 100644 --- a/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets_test.py +++ b/tests/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.ssm.ssm_service import Document +from prowler.providers.aws.services.ssm.ssm_service import Document AWS_REGION = "eu-west-1" @@ -12,11 +12,11 @@ class Test_ssm_documents_secrets: ssm_client = mock.MagicMock ssm_client.documents = {} with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_document_secrets.ssm_document_secrets import ( + from prowler.providers.aws.services.ssm.ssm_document_secrets.ssm_document_secrets import ( ssm_document_secrets, ) @@ -41,11 +41,11 @@ class Test_ssm_documents_secrets: ) } with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_document_secrets.ssm_document_secrets import ( + from prowler.providers.aws.services.ssm.ssm_document_secrets.ssm_document_secrets import ( ssm_document_secrets, ) @@ -78,11 +78,11 @@ class Test_ssm_documents_secrets: ) } with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_document_secrets.ssm_document_secrets import ( + from prowler.providers.aws.services.ssm.ssm_document_secrets.ssm_document_secrets import ( ssm_document_secrets, ) diff --git a/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public_test.py b/tests/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public_test.py similarity index 82% rename from providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public_test.py rename to tests/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public_test.py index 1979be7f..65a5de26 100644 --- a/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public_test.py +++ b/tests/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public_test.py @@ -2,7 +2,7 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.ssm.ssm_service import Document +from prowler.providers.aws.services.ssm.ssm_service import Document AWS_REGION = "eu-west-1" @@ -12,11 +12,11 @@ class Test_ssm_documents_set_as_public: ssm_client = mock.MagicMock ssm_client.documents = {} with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_documents_set_as_public.ssm_documents_set_as_public import ( + from prowler.providers.aws.services.ssm.ssm_documents_set_as_public.ssm_documents_set_as_public import ( ssm_documents_set_as_public, ) @@ -41,11 +41,11 @@ class Test_ssm_documents_set_as_public: ) } with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_documents_set_as_public.ssm_documents_set_as_public import ( + from prowler.providers.aws.services.ssm.ssm_documents_set_as_public.ssm_documents_set_as_public import ( ssm_documents_set_as_public, ) @@ -77,11 +77,11 @@ class Test_ssm_documents_set_as_public: ) } with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_documents_set_as_public.ssm_documents_set_as_public import ( + from prowler.providers.aws.services.ssm.ssm_documents_set_as_public.ssm_documents_set_as_public import ( ssm_documents_set_as_public, ) diff --git a/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching_test.py b/tests/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching_test.py similarity index 81% rename from providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching_test.py rename to tests/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching_test.py index 7ea0a6c1..b4f5fc33 100644 --- a/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching_test.py +++ b/tests/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching_test.py @@ -2,7 +2,10 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.ssm.ssm_service import ComplianceResource, ResourceStatus +from prowler.providers.aws.services.ssm.ssm_service import ( + ComplianceResource, + ResourceStatus, +) AWS_REGION = "eu-west-1" @@ -12,11 +15,11 @@ class Test_ssm_managed_compliant_patching: ssm_client = mock.MagicMock ssm_client.compliance_resources = {} with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_managed_compliant_patching.ssm_managed_compliant_patching import ( + from prowler.providers.aws.services.ssm.ssm_managed_compliant_patching.ssm_managed_compliant_patching import ( ssm_managed_compliant_patching, ) @@ -41,11 +44,11 @@ class Test_ssm_managed_compliant_patching: } with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_managed_compliant_patching.ssm_managed_compliant_patching import ( + from prowler.providers.aws.services.ssm.ssm_managed_compliant_patching.ssm_managed_compliant_patching import ( ssm_managed_compliant_patching, ) @@ -78,11 +81,11 @@ class Test_ssm_managed_compliant_patching: } with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_managed_compliant_patching.ssm_managed_compliant_patching import ( + from prowler.providers.aws.services.ssm.ssm_managed_compliant_patching.ssm_managed_compliant_patching import ( ssm_managed_compliant_patching, ) diff --git a/providers/aws/services/ssm/ssm_service_test.py b/tests/providers/aws/services/ssm/ssm_service_test.py similarity index 96% rename from providers/aws/services/ssm/ssm_service_test.py rename to tests/providers/aws/services/ssm/ssm_service_test.py index ebf899f9..3080fa5e 100644 --- a/providers/aws/services/ssm/ssm_service_test.py +++ b/tests/providers/aws/services/ssm/ssm_service_test.py @@ -6,8 +6,8 @@ from boto3 import client, session from moto import mock_ssm from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import AWS_Audit_Info -from providers.aws.services.ssm.ssm_service import SSM, ResourceStatus +from prowler.providers.aws.lib.audit_info.audit_info import AWS_Audit_Info +from prowler.providers.aws.services.ssm.ssm_service import SSM, ResourceStatus # Mock Test Region AWS_REGION = "eu-west-1" @@ -119,7 +119,7 @@ mainSteps: # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.ssm.ssm_service.generate_regional_clients", + "prowler.providers.aws.services.ssm.ssm_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_SSM_Service: diff --git a/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings_test.py b/tests/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings_test.py similarity index 72% rename from providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings_test.py rename to tests/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings_test.py index 62f1f762..e484ead3 100644 --- a/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings_test.py +++ b/tests/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.trustedadvisor.trustedadvisor_service import Check +from prowler.providers.aws.services.trustedadvisor.trustedadvisor_service import Check AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ class Test_trustedadvisor_errors_and_warnings: trustedadvisor_client = mock.MagicMock trustedadvisor_client.checks = [] with mock.patch( - "providers.aws.services.trustedadvisor.trustedadvisor_service.TrustedAdvisor", + "prowler.providers.aws.services.trustedadvisor.trustedadvisor_service.TrustedAdvisor", trustedadvisor_client, ): - from providers.aws.services.trustedadvisor.trustedadvisor_errors_and_warnings.trustedadvisor_errors_and_warnings import ( + from prowler.providers.aws.services.trustedadvisor.trustedadvisor_errors_and_warnings.trustedadvisor_errors_and_warnings import ( trustedadvisor_errors_and_warnings, ) @@ -38,10 +38,10 @@ class Test_trustedadvisor_errors_and_warnings: ) ) with mock.patch( - "providers.aws.services.trustedadvisor.trustedadvisor_service.TrustedAdvisor", + "prowler.providers.aws.services.trustedadvisor.trustedadvisor_service.TrustedAdvisor", trustedadvisor_client, ): - from providers.aws.services.trustedadvisor.trustedadvisor_errors_and_warnings.trustedadvisor_errors_and_warnings import ( + from prowler.providers.aws.services.trustedadvisor.trustedadvisor_errors_and_warnings.trustedadvisor_errors_and_warnings import ( trustedadvisor_errors_and_warnings, ) @@ -64,10 +64,10 @@ class Test_trustedadvisor_errors_and_warnings: ) ) with mock.patch( - "providers.aws.services.trustedadvisor.trustedadvisor_service.TrustedAdvisor", + "prowler.providers.aws.services.trustedadvisor.trustedadvisor_service.TrustedAdvisor", trustedadvisor_client, ): - from providers.aws.services.trustedadvisor.trustedadvisor_errors_and_warnings.trustedadvisor_errors_and_warnings import ( + from prowler.providers.aws.services.trustedadvisor.trustedadvisor_errors_and_warnings.trustedadvisor_errors_and_warnings import ( trustedadvisor_errors_and_warnings, ) diff --git a/providers/aws/services/trustedadvisor/trustedadvisor_service_test.py b/tests/providers/aws/services/trustedadvisor/trustedadvisor_service_test.py similarity index 90% rename from providers/aws/services/trustedadvisor/trustedadvisor_service_test.py rename to tests/providers/aws/services/trustedadvisor/trustedadvisor_service_test.py index 9e32331d..24bfeb71 100644 --- a/providers/aws/services/trustedadvisor/trustedadvisor_service_test.py +++ b/tests/providers/aws/services/trustedadvisor/trustedadvisor_service_test.py @@ -4,8 +4,10 @@ import botocore from boto3 import session from moto import mock_support -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.trustedadvisor.trustedadvisor_service import TrustedAdvisor +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.trustedadvisor.trustedadvisor_service import ( + TrustedAdvisor, +) AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" @@ -27,7 +29,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.trustedadvisor.trustedadvisor_service.generate_regional_clients", + "prowler.providers.aws.services.trustedadvisor.trustedadvisor_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_TrustedAdvisor_Service: diff --git a/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries_test.py b/tests/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries_test.py similarity index 77% rename from providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries_test.py rename to tests/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries_test.py index f8612653..8dc0dc5a 100644 --- a/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries_test.py +++ b/tests/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries_test.py @@ -17,17 +17,17 @@ def mock_get_config_var(config_var): class Test_vpc_endpoint_connections_trust_boundaries: @mock_ec2 def test_vpc_no_endpoints(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", + "prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( + from prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( vpc_endpoint_connections_trust_boundaries, ) @@ -62,17 +62,17 @@ class Test_vpc_endpoint_connections_trust_boundaries: } ), ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", + "prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( + from prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( vpc_endpoint_connections_trust_boundaries, ) @@ -114,18 +114,18 @@ class Test_vpc_endpoint_connections_trust_boundaries: } ), ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" current_audit_info.audited_account = ACCOUNT_ID with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", + "prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( + from prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( vpc_endpoint_connections_trust_boundaries, ) @@ -167,18 +167,18 @@ class Test_vpc_endpoint_connections_trust_boundaries: } ), ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" current_audit_info.audited_account = ACCOUNT_ID with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", + "prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( + from prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( vpc_endpoint_connections_trust_boundaries, ) @@ -219,22 +219,22 @@ class Test_vpc_endpoint_connections_trust_boundaries: } ), ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" current_audit_info.audited_account = ACCOUNT_ID with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", + "prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", new=VPC(current_audit_info), ): with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.get_config_var", + "prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.get_config_var", new=mock_get_config_var, ): # Test Check - from providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( + from prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( vpc_endpoint_connections_trust_boundaries, ) diff --git a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py b/tests/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py similarity index 77% rename from providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py rename to tests/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py index 2a5bab29..3c4c569a 100644 --- a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py +++ b/tests/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py @@ -36,17 +36,17 @@ def mock_make_api_call(self, operation_name, kwarg): class Test_vpc_endpoint_services_allowed_principals_trust_boundaries: @mock_ec2 def test_vpc_no_endpoint_services(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_client", + "prowler.providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries import ( + from prowler.providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries import ( vpc_endpoint_services_allowed_principals_trust_boundaries, ) @@ -83,17 +83,17 @@ class Test_vpc_endpoint_services_allowed_principals_trust_boundaries: # NetworkLoadBalancerArns=[lb_arn] # ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_client", + "prowler.providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries import ( + from prowler.providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries import ( vpc_endpoint_services_allowed_principals_trust_boundaries, ) diff --git a/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py b/tests/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py similarity index 72% rename from providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py rename to tests/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py index e602c5f2..30912b2a 100644 --- a/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py +++ b/tests/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py @@ -10,17 +10,17 @@ ACCOUNT_ID = "123456789012" class Test_vpc_flow_logs_enabled: @mock_ec2 def test_vpc_only_default_vpcs(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled.vpc_client", + "prowler.providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled import ( + from prowler.providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled import ( vpc_flow_logs_enabled, ) @@ -47,17 +47,17 @@ class Test_vpc_flow_logs_enabled: DeliverLogsPermissionArn="arn:aws:iam::" + ACCOUNT_ID + ":role/test-role", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled.vpc_client", + "prowler.providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled import ( + from prowler.providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled import ( vpc_flow_logs_enabled, ) @@ -81,17 +81,17 @@ class Test_vpc_flow_logs_enabled: vpc = ec2_client.create_vpc(CidrBlock="10.0.0.0/16")["Vpc"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled.vpc_client", + "prowler.providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled import ( + from prowler.providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled import ( vpc_flow_logs_enabled, ) diff --git a/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege_test.py b/tests/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege_test.py similarity index 78% rename from providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege_test.py rename to tests/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege_test.py index 0c670772..e1543094 100644 --- a/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege_test.py +++ b/tests/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege_test.py @@ -10,17 +10,17 @@ ACCOUNT_ID = "123456789012" class Test_vpc_peering_routing_tables_with_least_privilege: @mock_ec2 def test_vpc_no_peering_connections(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege.vpc_client", + "prowler.providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege import ( + from prowler.providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege import ( vpc_peering_routing_tables_with_least_privilege, ) @@ -57,17 +57,17 @@ class Test_vpc_peering_routing_tables_with_least_privilege: DestinationCidrBlock="10.0.0.4/24", VpcPeeringConnectionId=vpc_pcx_id ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC, Route + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC, Route current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege.vpc_client", + "prowler.providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege.vpc_client", new=VPC(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege import ( + from prowler.providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege import ( vpc_peering_routing_tables_with_least_privilege, ) @@ -119,17 +119,17 @@ class Test_vpc_peering_routing_tables_with_least_privilege: DestinationCidrBlock="10.0.0.0/16", VpcPeeringConnectionId=vpc_pcx_id ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC, Route + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC, Route current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege.vpc_client", + "prowler.providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege.vpc_client", new=VPC(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege import ( + from prowler.providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege import ( vpc_peering_routing_tables_with_least_privilege, ) diff --git a/providers/aws/services/vpc/vpc_service_test.py b/tests/providers/aws/services/vpc/vpc_service_test.py similarity index 98% rename from providers/aws/services/vpc/vpc_service_test.py rename to tests/providers/aws/services/vpc/vpc_service_test.py index e4411595..685c9b0e 100644 --- a/providers/aws/services/vpc/vpc_service_test.py +++ b/tests/providers/aws/services/vpc/vpc_service_test.py @@ -3,8 +3,8 @@ import json from boto3 import client, resource, session from moto import mock_ec2, mock_elbv2 -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.vpc.vpc_service import VPC, Route +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.vpc.vpc_service import VPC, Route AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/waf/waf_service_test.py b/tests/providers/aws/services/waf/waf_service_test.py similarity index 94% rename from providers/aws/services/waf/waf_service_test.py rename to tests/providers/aws/services/waf/waf_service_test.py index 8a8aacc0..6e175248 100644 --- a/providers/aws/services/waf/waf_service_test.py +++ b/tests/providers/aws/services/waf/waf_service_test.py @@ -3,8 +3,8 @@ from unittest.mock import patch import botocore from boto3 import session -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.waf.waf_service import WAF +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.waf.waf_service import WAF AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" @@ -41,7 +41,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.waf.waf_service.generate_regional_clients", + "prowler.providers.aws.services.waf.waf_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_WAF_Service: diff --git a/providers/aws/services/wafv2/wafv2_service_test.py b/tests/providers/aws/services/wafv2/wafv2_service_test.py similarity index 96% rename from providers/aws/services/wafv2/wafv2_service_test.py rename to tests/providers/aws/services/wafv2/wafv2_service_test.py index ee9d7fdc..7e46f952 100644 --- a/providers/aws/services/wafv2/wafv2_service_test.py +++ b/tests/providers/aws/services/wafv2/wafv2_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, resource, session from moto import mock_ec2, mock_elbv2, mock_wafv2 -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.wafv2.wafv2_service import WAFv2 +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.wafv2.wafv2_service import WAFv2 AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/workspaces/workspaces_service_test.py b/tests/providers/aws/services/workspaces/workspaces_service_test.py similarity index 92% rename from providers/aws/services/workspaces/workspaces_service_test.py rename to tests/providers/aws/services/workspaces/workspaces_service_test.py index f85448ce..07e598d9 100644 --- a/providers/aws/services/workspaces/workspaces_service_test.py +++ b/tests/providers/aws/services/workspaces/workspaces_service_test.py @@ -4,8 +4,8 @@ from uuid import uuid4 import botocore from boto3 import session -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.workspaces.workspaces_service import WorkSpaces +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.workspaces.workspaces_service import WorkSpaces AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -38,7 +38,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.workspaces.workspaces_service.generate_regional_clients", + "prowler.providers.aws.services.workspaces.workspaces_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_WorkSpaces_Service: diff --git a/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled_test.py b/tests/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled_test.py similarity index 77% rename from providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled_test.py rename to tests/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled_test.py index d144479d..70e7b4a8 100644 --- a/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled_test.py +++ b/tests/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock from uuid import uuid4 -from providers.aws.services.workspaces.workspaces_service import WorkSpace +from prowler.providers.aws.services.workspaces.workspaces_service import WorkSpace AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ class Test_workspaces_volume_encryption_enabled: workspaces_client = mock.MagicMock workspaces_client.workspaces = [] with mock.patch( - "providers.aws.services.workspaces.workspaces_service.WorkSpaces", + "prowler.providers.aws.services.workspaces.workspaces_service.WorkSpaces", workspaces_client, ): - from providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( + from prowler.providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( workspaces_volume_encryption_enabled, ) @@ -38,10 +38,10 @@ class Test_workspaces_volume_encryption_enabled: ) ) with mock.patch( - "providers.aws.services.workspaces.workspaces_service.WorkSpaces", + "prowler.providers.aws.services.workspaces.workspaces_service.WorkSpaces", workspaces_client, ): - from providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( + from prowler.providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( workspaces_volume_encryption_enabled, ) @@ -67,10 +67,10 @@ class Test_workspaces_volume_encryption_enabled: ) ) with mock.patch( - "providers.aws.services.workspaces.workspaces_service.WorkSpaces", + "prowler.providers.aws.services.workspaces.workspaces_service.WorkSpaces", workspaces_client, ): - from providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( + from prowler.providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( workspaces_volume_encryption_enabled, ) @@ -94,10 +94,10 @@ class Test_workspaces_volume_encryption_enabled: ) ) with mock.patch( - "providers.aws.services.workspaces.workspaces_service.WorkSpaces", + "prowler.providers.aws.services.workspaces.workspaces_service.WorkSpaces", workspaces_client, ): - from providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( + from prowler.providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( workspaces_volume_encryption_enabled, ) @@ -121,10 +121,10 @@ class Test_workspaces_volume_encryption_enabled: ) ) with mock.patch( - "providers.aws.services.workspaces.workspaces_service.WorkSpaces", + "prowler.providers.aws.services.workspaces.workspaces_service.WorkSpaces", workspaces_client, ): - from providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( + from prowler.providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( workspaces_volume_encryption_enabled, ) diff --git a/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on_test.py b/tests/providers/azure/azure_provider_test.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on_test.py rename to tests/providers/azure/azure_provider_test.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on_test.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on_test.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on_test.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on_test.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on_test.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on_test.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on_test.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on_test.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on_test.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on_test.py diff --git a/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on_test.py similarity index 100% rename from providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on_test.py diff --git a/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on_test.py similarity index 100% rename from providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on_test.py diff --git a/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on_test.py similarity index 100% rename from providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on_test.py diff --git a/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on_test.py similarity index 100% rename from providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on_test.py diff --git a/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on_test.py similarity index 100% rename from providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on_test.py diff --git a/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on_test.py similarity index 100% rename from providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on_test.py diff --git a/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on_test.py similarity index 100% rename from providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on_test.py diff --git a/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled_test.py b/tests/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled_test.py rename to tests/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/__init__.py diff --git a/tests/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created_test.py b/tests/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created_test.py new file mode 100644 index 00000000..e69de29b diff --git a/tests/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled_test.py b/tests/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled_test.py new file mode 100644 index 00000000..e69de29b diff --git a/tests/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied_test.py b/tests/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied_test.py new file mode 100644 index 00000000..e69de29b diff --git a/tests/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled_test.py b/tests/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled_test.py new file mode 100644 index 00000000..e69de29b diff --git a/tests/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys_test.py b/tests/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys_test.py new file mode 100644 index 00000000..e69de29b diff --git a/tests/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12_test.py b/tests/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12_test.py new file mode 100644 index 00000000..e69de29b diff --git a/tests/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled_test.py b/tests/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled_test.py new file mode 100644 index 00000000..e69de29b diff --git a/tests/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled_test.py b/tests/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled_test.py new file mode 100644 index 00000000..e69de29b diff --git a/util/generate_compliance_json_from_csv_for_ens.py b/util/generate_compliance_json_from_csv_for_ens.py index 7cd8559a..18cd38f0 100644 --- a/util/generate_compliance_json_from_csv_for_ens.py +++ b/util/generate_compliance_json_from_csv_for_ens.py @@ -1,6 +1,6 @@ import csv -import sys import json +import sys # Convert a CSV file following the Spanish ENS - Esquema Nacional de Seguridad - RD2022 benchmark into a Prowler v3.0 Compliance JSON file # CSV fields: diff --git a/util/update_aws_services_regions.py b/util/update_aws_services_regions.py index 0fccd77e..46516189 100644 --- a/util/update_aws_services_regions.py +++ b/util/update_aws_services_regions.py @@ -20,7 +20,7 @@ logging.basicConfig( with request.urlopen(aws_services_json_url) as url: # Get the AWS regions matrix online logging.info(f"Downloading JSON from {aws_services_json_url}") original_matrix_regions_aws = json.loads(url.read().decode()) -parsed__matrix_regions_aws = f"{os.path.dirname(os.path.realpath(__name__))}/providers/aws/aws_regions_by_service.json" +parsed__matrix_regions_aws = f"{os.path.dirname(os.path.realpath(__name__))}/prowler/providers/aws/aws_regions_by_service.json" # JSON objects regions_by_service = {}