Files
prowler/providers/aws/services/efs/efs_service_test.py
Nacho Rivera c87327bb77 feat(EFS): Service and checks (#1469)
Co-authored-by: Sergio Garcia <38561120+sergargar@users.noreply.github.com>
Co-authored-by: sergargar <sergio@verica.io>
2022-11-14 15:05:41 +01:00

111 lines
3.7 KiB
Python

from unittest.mock import patch
import botocore
from boto3 import client, session
from moto import mock_efs
from providers.aws.lib.audit_info.models import AWS_Audit_Info
from providers.aws.services.efs.efs_service import EFS
# Mock Test Region
AWS_REGION = "eu-west-1"
AWS_ACCOUNT_NUMBER = "123456789012"
# Mocking Access Analyzer Calls
make_api_call = botocore.client.BaseClient._make_api_call
file_system_id = "fs-c7a0456e"
creation_token = "console-d215fa78-1f83-4651-b026-facafd8a7da7"
backup_policy_status = "ENABLED"
filesystem_policy = {
"Id": "1",
"Statement": [
{
"Effect": "Allow",
"Action": ["elasticfilesystem:ClientMount"],
"Principal": {"AWS": f"arn:aws:iam::{AWS_ACCOUNT_NUMBER}:root"},
}
],
}
def mock_make_api_call(self, operation_name, kwarg):
if operation_name == "DescribeFileSystemPolicy":
return {"FileSystemId": file_system_id, "Policy": filesystem_policy}
if operation_name == "DescribeBackupPolicy":
return {"BackupPolicy": {"Status": backup_policy_status}}
return make_api_call(self, operation_name, kwarg)
def mock_generate_regional_clients(service, audit_info):
regional_client = audit_info.audit_session.client(service, region_name=AWS_REGION)
regional_client.region = AWS_REGION
return {AWS_REGION: regional_client}
# Patch every AWS call using Boto3 and generate_regional_clients to have 1 client
@patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call)
@patch(
"providers.aws.services.efs.efs_service.generate_regional_clients",
new=mock_generate_regional_clients,
)
class Test_EFS:
def set_mocked_audit_info(self):
audit_info = AWS_Audit_Info(
original_session=None,
audit_session=session.Session(
profile_name=None,
botocore_session=None,
),
audited_account=AWS_ACCOUNT_NUMBER,
audited_user_id=None,
audited_partition="aws",
audited_identity_arn=None,
profile=None,
profile_region=None,
credentials=None,
assumed_role_info=None,
audited_regions=None,
organizations_metadata=None,
)
return audit_info
# Test EFS Session
def test__get_session__(self):
access_analyzer = EFS(self.set_mocked_audit_info())
assert access_analyzer.session.__class__.__name__ == "Session"
# Test EFS Service
def test__get_service__(self):
access_analyzer = EFS(self.set_mocked_audit_info())
assert access_analyzer.service == "efs"
@mock_efs
# Test EFS describe file systems
def test__describe_file_systems__(self):
efs_client = client("efs", AWS_REGION)
efs = efs_client.create_file_system(
CreationToken=creation_token, Encrypted=True
)
filesystem = EFS(self.set_mocked_audit_info())
assert len(filesystem.filesystems) == 1
assert filesystem.filesystems[0].id == efs["FileSystemId"]
assert filesystem.filesystems[0].encrypted == efs["Encrypted"]
@mock_efs
# Test EFS describe file systems
def test__describe_file_system_policies__(self):
efs_client = client("efs", AWS_REGION)
efs = efs_client.create_file_system(
CreationToken=creation_token, Encrypted=True
)
filesystem = EFS(self.set_mocked_audit_info())
assert len(filesystem.filesystems) == 1
assert filesystem.filesystems[0].id == efs["FileSystemId"]
assert filesystem.filesystems[0].encrypted == efs["Encrypted"]
assert filesystem.filesystems[0].backup_policy == backup_policy_status
assert filesystem.filesystems[0].policy == filesystem_policy