Files
prowler/tests/providers/aws/services/kms/kms_service_test.py
Sergio Garcia 3ac4dc8392 feat(scanner): Tag-based scan (#1751)
Co-authored-by: Toni de la Fuente <toni@blyx.com>
Co-authored-by: Pepe Fagoaga <pepe@verica.io>
2023-01-31 12:19:29 +01:00

164 lines
5.5 KiB
Python

import json
from boto3 import client, session
from moto import mock_kms
from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info
from prowler.providers.aws.services.kms.kms_service import KMS
AWS_ACCOUNT_NUMBER = 123456789012
AWS_REGION = "us-east-1"
class Test_ACM_Service:
# Mocked Audit Info
def set_mocked_audit_info(self):
audit_info = AWS_Audit_Info(
original_session=None,
audit_session=session.Session(
profile_name=None,
botocore_session=None,
),
audited_account=AWS_ACCOUNT_NUMBER,
audited_user_id=None,
audited_partition="aws",
audited_identity_arn=None,
profile=None,
profile_region=None,
credentials=None,
assumed_role_info=None,
audited_regions=None,
organizations_metadata=None,
audit_resources=None,
)
return audit_info
# Test KMS Service
@mock_kms
def test_service(self):
# KMS client for this test class
audit_info = self.set_mocked_audit_info()
kms = KMS(audit_info)
assert kms.service == "kms"
# Test KMS Client
@mock_kms
def test_client(self):
# KMS client for this test class
audit_info = self.set_mocked_audit_info()
kms = KMS(audit_info)
for regional_client in kms.regional_clients.values():
assert regional_client.__class__.__name__ == "KMS"
# Test KMS Session
@mock_kms
def test__get_session__(self):
# KMS client for this test class
audit_info = self.set_mocked_audit_info()
kms = KMS(audit_info)
assert kms.session.__class__.__name__ == "Session"
# Test KMS Session
@mock_kms
def test_audited_account(self):
# KMS client for this test class
audit_info = self.set_mocked_audit_info()
kms = KMS(audit_info)
assert kms.audited_account == AWS_ACCOUNT_NUMBER
# Test KMS List Keys
@mock_kms
def test__list_keys__(self):
# Generate KMS Client
kms_client = client("kms", region_name=AWS_REGION)
# Create KMS keys
key1 = kms_client.create_key()["KeyMetadata"]
key2 = kms_client.create_key()["KeyMetadata"]
# KMS client for this test class
audit_info = self.set_mocked_audit_info()
kms = KMS(audit_info)
assert len(kms.keys) == 2
assert kms.keys[0].arn == key1["Arn"]
assert kms.keys[1].arn == key2["Arn"]
# Test KMS Describe Keys
@mock_kms
def test__describe_key__(self):
# Generate KMS Client
kms_client = client("kms", region_name=AWS_REGION)
# Create KMS keys
key1 = kms_client.create_key()["KeyMetadata"]
# KMS client for this test class
audit_info = self.set_mocked_audit_info()
kms = KMS(audit_info)
assert len(kms.keys) == 1
assert kms.keys[0].arn == key1["Arn"]
assert kms.keys[0].state == key1["KeyState"]
assert kms.keys[0].origin == key1["Origin"]
assert kms.keys[0].manager == key1["KeyManager"]
# Test KMS Get rotation status
@mock_kms
def test__get_key_rotation_status__(self):
# Generate KMS Client
kms_client = client("kms", region_name=AWS_REGION)
# Create KMS keys
key1 = kms_client.create_key()["KeyMetadata"]
key2 = kms_client.create_key()["KeyMetadata"]
kms_client.enable_key_rotation(KeyId=key2["KeyId"])
# KMS client for this test class
audit_info = self.set_mocked_audit_info()
kms = KMS(audit_info)
assert len(kms.keys) == 2
assert kms.keys[0].arn == key1["Arn"]
assert kms.keys[0].rotation_enabled is False
assert kms.keys[1].arn == key2["Arn"]
assert kms.keys[1].rotation_enabled is True
# Test KMS Key policy
@mock_kms
def test__get_key_policy__(self):
public_policy = json.dumps(
{
"Version": "2012-10-17",
"Id": "key-default-1",
"Statement": [
{
"Sid": "Enable IAM User Permissions",
"Effect": "Allow",
"Principal": "*",
"Action": "kms:*",
"Resource": "*",
}
],
}
)
default_policy = json.dumps(
{
"Version": "2012-10-17",
"Id": "key-default-1",
"Statement": [
{
"Sid": "Enable IAM User Permissions",
"Effect": "Allow",
"Principal": {"AWS": "arn:aws:iam::123456789012:root"},
"Action": "kms:*",
"Resource": "*",
}
],
}
)
# Generate KMS Client
kms_client = client("kms", region_name=AWS_REGION)
# Create KMS keys
key1 = kms_client.create_key(Policy=default_policy)["KeyMetadata"]
key2 = kms_client.create_key(Policy=public_policy)["KeyMetadata"]
# KMS client for this test class
audit_info = self.set_mocked_audit_info()
kms = KMS(audit_info)
assert len(kms.keys) == 2
assert kms.keys[0].arn == key1["Arn"]
assert kms.keys[0].policy == json.loads(default_policy)
assert kms.keys[1].arn == key2["Arn"]
assert kms.keys[1].policy == json.loads(public_policy)