prelude-sdk-beta 1435__tar.gz → 1449__tar.gz
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of prelude-sdk-beta might be problematic. Click here for more details.
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/PKG-INFO +1 -1
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/partner_controller.py +1 -13
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/scm_controller.py +71 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/models/codes.py +104 -4
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta.egg-info/PKG-INFO +1 -1
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/setup.cfg +1 -1
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/test_partner.py +1 -30
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/test_scm.py +3 -2
- prelude_sdk_beta-1449/tests/test_scm_build.py +104 -0
- prelude_sdk_beta-1435/tests/test_scm_build.py +0 -55
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/LICENSE +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/README.md +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/__init__.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/__init__.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/build_controller.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/detect_controller.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/export_controller.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/generate_controller.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/http_controller.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/iam_controller.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/jobs_controller.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/probe_controller.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/models/__init__.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/models/account.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta.egg-info/SOURCES.txt +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta.egg-info/dependency_links.txt +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta.egg-info/requires.txt +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta.egg-info/top_level.txt +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/pyproject.toml +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/test_build.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/test_detect.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/test_generate.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/test_iam.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/test_probe.py +0 -0
- {prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/tests/testutils.py +0 -0
{prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/partner_controller.py
RENAMED
|
@@ -45,7 +45,7 @@ class PartnerController(HttpController):
|
|
|
45
45
|
res = self.delete(
|
|
46
46
|
f"{self.account.hq}/partner/{partner.name}/{instance_id}",
|
|
47
47
|
headers=self.account.headers,
|
|
48
|
-
timeout=
|
|
48
|
+
timeout=30,
|
|
49
49
|
)
|
|
50
50
|
return res.json()
|
|
51
51
|
|
|
@@ -104,18 +104,6 @@ class PartnerController(HttpController):
|
|
|
104
104
|
)
|
|
105
105
|
return res.json()
|
|
106
106
|
|
|
107
|
-
@verify_credentials
|
|
108
|
-
def ioa_stats(self, test_id: str | None = None):
|
|
109
|
-
"""Get IOA stats"""
|
|
110
|
-
params = dict(test_id=test_id) if test_id else dict()
|
|
111
|
-
res = self.get(
|
|
112
|
-
f"{self.account.hq}/partner/ioa_stats",
|
|
113
|
-
headers=self.account.headers,
|
|
114
|
-
json=params,
|
|
115
|
-
timeout=30,
|
|
116
|
-
)
|
|
117
|
-
return res.json()
|
|
118
|
-
|
|
119
107
|
@verify_credentials
|
|
120
108
|
def observed_detected(self, test_id: str | None = None, hours: int | None = None):
|
|
121
109
|
"""Get observed_detected stats"""
|
{prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/scm_controller.py
RENAMED
|
@@ -593,3 +593,74 @@ class ScmController(HttpController):
|
|
|
593
593
|
],
|
|
594
594
|
)
|
|
595
595
|
return history
|
|
596
|
+
|
|
597
|
+
@verify_credentials
|
|
598
|
+
def get_report(self, report_id: str):
|
|
599
|
+
"""Get SCM report by ID"""
|
|
600
|
+
res = self.get(
|
|
601
|
+
f"{self.account.hq}/scm/reports/{report_id}",
|
|
602
|
+
headers=self.account.headers,
|
|
603
|
+
timeout=10,
|
|
604
|
+
)
|
|
605
|
+
return res.json()
|
|
606
|
+
|
|
607
|
+
@verify_credentials
|
|
608
|
+
def list_reports(self):
|
|
609
|
+
"""List SCM reports"""
|
|
610
|
+
res = self.get(
|
|
611
|
+
f"{self.account.hq}/scm/reports",
|
|
612
|
+
headers=self.account.headers,
|
|
613
|
+
timeout=10,
|
|
614
|
+
)
|
|
615
|
+
return res.json()
|
|
616
|
+
|
|
617
|
+
@verify_credentials
|
|
618
|
+
def delete_report(self, report_id: str):
|
|
619
|
+
"""Delete SCM report by ID"""
|
|
620
|
+
res = self.delete(
|
|
621
|
+
f"{self.account.hq}/scm/reports/{report_id}",
|
|
622
|
+
headers=self.account.headers,
|
|
623
|
+
timeout=10,
|
|
624
|
+
)
|
|
625
|
+
return res.json()
|
|
626
|
+
|
|
627
|
+
@verify_credentials
|
|
628
|
+
def put_report(self, report_data: dict, report_id: str = None):
|
|
629
|
+
"""Put SCM report by ID"""
|
|
630
|
+
res = self.put(
|
|
631
|
+
f"{self.account.hq}/scm/reports",
|
|
632
|
+
headers=self.account.headers,
|
|
633
|
+
json=dict(report=report_data, id=report_id),
|
|
634
|
+
timeout=10,
|
|
635
|
+
)
|
|
636
|
+
return res.json()
|
|
637
|
+
|
|
638
|
+
@verify_credentials
|
|
639
|
+
def get_chart_data(
|
|
640
|
+
self,
|
|
641
|
+
scm_category: SCMCategory,
|
|
642
|
+
sort_by: str,
|
|
643
|
+
group_by: str,
|
|
644
|
+
group_limit: int,
|
|
645
|
+
display_overrides: dict = None,
|
|
646
|
+
odata_filter: str = None,
|
|
647
|
+
scopes: dict = None,
|
|
648
|
+
):
|
|
649
|
+
"""Get SCM chart data"""
|
|
650
|
+
body = {
|
|
651
|
+
"category": scm_category.name,
|
|
652
|
+
"display_overrides": display_overrides,
|
|
653
|
+
"group_by": group_by,
|
|
654
|
+
"group_limit": group_limit,
|
|
655
|
+
"scopes": scopes,
|
|
656
|
+
"sort_by": sort_by,
|
|
657
|
+
}
|
|
658
|
+
if odata_filter:
|
|
659
|
+
body["$filter"] = odata_filter
|
|
660
|
+
res = self.post(
|
|
661
|
+
f"{self.account.hq}/scm/reports/data",
|
|
662
|
+
headers=self.account.headers,
|
|
663
|
+
json=body,
|
|
664
|
+
timeout=30,
|
|
665
|
+
)
|
|
666
|
+
return res.json()
|
|
@@ -206,10 +206,6 @@ class Control(Enum, metaclass=MissingItem):
|
|
|
206
206
|
return k
|
|
207
207
|
return SCMCategory.NONE
|
|
208
208
|
|
|
209
|
-
@property
|
|
210
|
-
def policy_types(self):
|
|
211
|
-
return [k for k, v in PolicyType.control_mapping().items() if self in v]
|
|
212
|
-
|
|
213
209
|
@property
|
|
214
210
|
def parent(self):
|
|
215
211
|
match self:
|
|
@@ -240,6 +236,68 @@ class Control(Enum, metaclass=MissingItem):
|
|
|
240
236
|
case _:
|
|
241
237
|
return []
|
|
242
238
|
|
|
239
|
+
@property
|
|
240
|
+
def display_name(self):
|
|
241
|
+
match self:
|
|
242
|
+
case Control.CROWDSTRIKE:
|
|
243
|
+
return "CrowdStrike"
|
|
244
|
+
case Control.DEFENDER:
|
|
245
|
+
return "Microsoft Defender"
|
|
246
|
+
case Control.SPLUNK:
|
|
247
|
+
return "Splunk"
|
|
248
|
+
case Control.SENTINELONE:
|
|
249
|
+
return "SentinelOne"
|
|
250
|
+
case Control.VECTR:
|
|
251
|
+
return "VECTR"
|
|
252
|
+
case Control.S3:
|
|
253
|
+
return "Amazon S3"
|
|
254
|
+
case Control.INTUNE:
|
|
255
|
+
return "Microsoft Intune"
|
|
256
|
+
case Control.SERVICENOW:
|
|
257
|
+
return "ServiceNow"
|
|
258
|
+
case Control.OKTA:
|
|
259
|
+
return "Okta"
|
|
260
|
+
case Control.M365:
|
|
261
|
+
return "Microsoft 365"
|
|
262
|
+
case Control.ENTRA:
|
|
263
|
+
return "Microsoft Entra ID"
|
|
264
|
+
case Control.JAMF:
|
|
265
|
+
return "Jamf"
|
|
266
|
+
case Control.GMAIL:
|
|
267
|
+
return "Gmail"
|
|
268
|
+
case Control.GOOGLE_IDENTITY:
|
|
269
|
+
return "Google Cloud Identity Platform"
|
|
270
|
+
case Control.DEFENDER_DISCOVERY:
|
|
271
|
+
return "Microsoft Defender Discovery"
|
|
272
|
+
case Control.TENABLE:
|
|
273
|
+
return "Tenable"
|
|
274
|
+
case Control.EC2:
|
|
275
|
+
return "Amazon EC2"
|
|
276
|
+
case Control.AWS_SSM:
|
|
277
|
+
return "Amazon SSM"
|
|
278
|
+
case Control.AZURE_VM:
|
|
279
|
+
return "Azure VM"
|
|
280
|
+
case Control.GITHUB:
|
|
281
|
+
return "GitHub"
|
|
282
|
+
case Control.TENABLE_DISCOVERY:
|
|
283
|
+
return "Tenable Discovery"
|
|
284
|
+
case Control.QUALYS:
|
|
285
|
+
return "Qualys"
|
|
286
|
+
case Control.QUALYS_DISCOVERY:
|
|
287
|
+
return "Qualys Discovery"
|
|
288
|
+
case Control.RAPID7:
|
|
289
|
+
return "Rapid7"
|
|
290
|
+
case Control.RAPID7_DISCOVERY:
|
|
291
|
+
return "Rapid7 Discovery"
|
|
292
|
+
case Control.INTEL_INTUNE:
|
|
293
|
+
return "Intel"
|
|
294
|
+
case Control.CISCO_MERAKI:
|
|
295
|
+
return "Cisco Meraki"
|
|
296
|
+
case Control.CISCO_MERAKI_IDENTITY:
|
|
297
|
+
return "Cisco Meraki Identity"
|
|
298
|
+
case _:
|
|
299
|
+
return "Unknown Control"
|
|
300
|
+
|
|
243
301
|
|
|
244
302
|
class ControlCategory(Enum, metaclass=MissingItem):
|
|
245
303
|
INVALID = -1
|
|
@@ -312,6 +370,34 @@ class ControlCategory(Enum, metaclass=MissingItem):
|
|
|
312
370
|
],
|
|
313
371
|
}
|
|
314
372
|
|
|
373
|
+
@property
|
|
374
|
+
def display_name(self):
|
|
375
|
+
match self:
|
|
376
|
+
case ControlCategory.CLOUD:
|
|
377
|
+
return "Cloud"
|
|
378
|
+
case ControlCategory.EMAIL:
|
|
379
|
+
return "Email"
|
|
380
|
+
case ControlCategory.IDENTITY:
|
|
381
|
+
return "Identity Provider"
|
|
382
|
+
case ControlCategory.NETWORK:
|
|
383
|
+
return "Network"
|
|
384
|
+
case ControlCategory.XDR:
|
|
385
|
+
return "EDR"
|
|
386
|
+
case ControlCategory.ASSET_MANAGER:
|
|
387
|
+
return "Endpoint Management"
|
|
388
|
+
case ControlCategory.DISCOVERED_DEVICES:
|
|
389
|
+
return "Discovered Devices"
|
|
390
|
+
case ControlCategory.VULN_MANAGER:
|
|
391
|
+
return "Vulnerability Management"
|
|
392
|
+
case ControlCategory.SIEM:
|
|
393
|
+
return "SIEM"
|
|
394
|
+
case ControlCategory.PRIVATE_REPO:
|
|
395
|
+
return "Private Repository"
|
|
396
|
+
case ControlCategory.HARDWARE:
|
|
397
|
+
return "Client Hardware Security"
|
|
398
|
+
case _:
|
|
399
|
+
return "Unknown Control Category"
|
|
400
|
+
|
|
315
401
|
|
|
316
402
|
class SCMCategory(Enum, metaclass=MissingItem):
|
|
317
403
|
INVALID = -1
|
|
@@ -523,6 +609,7 @@ class PolicyType(Enum, metaclass=MissingItem):
|
|
|
523
609
|
def _missing_(cls, value):
|
|
524
610
|
return PolicyType.INVALID
|
|
525
611
|
|
|
612
|
+
|
|
526
613
|
class Platform(Enum, metaclass=MissingItem):
|
|
527
614
|
INVALID = 0
|
|
528
615
|
WINDOWS = 1
|
|
@@ -553,3 +640,16 @@ class NotationType(Enum, metaclass=MissingItem):
|
|
|
553
640
|
@classmethod
|
|
554
641
|
def _missing_(cls, value):
|
|
555
642
|
return NotationType.INVALID
|
|
643
|
+
|
|
644
|
+
|
|
645
|
+
class ChartType(Enum, metaclass=MissingItem):
|
|
646
|
+
INVALID = -1
|
|
647
|
+
NUMBER = 1
|
|
648
|
+
COLUMN = 2
|
|
649
|
+
BAR = 3
|
|
650
|
+
PIE = 4
|
|
651
|
+
PERCENT = 5
|
|
652
|
+
|
|
653
|
+
@classmethod
|
|
654
|
+
def _missing_(cls, value):
|
|
655
|
+
return ChartType.INVALID
|
|
@@ -100,7 +100,7 @@ class TestPartnerAttach:
|
|
|
100
100
|
),
|
|
101
101
|
)
|
|
102
102
|
for c in Control
|
|
103
|
-
if c.value > 0
|
|
103
|
+
if c.value > 0 and not c.parent
|
|
104
104
|
]
|
|
105
105
|
|
|
106
106
|
def setup_class(self):
|
|
@@ -431,11 +431,8 @@ class TestPartner:
|
|
|
431
431
|
)
|
|
432
432
|
assert 1 == len(res)
|
|
433
433
|
expected = dict(
|
|
434
|
-
blocked=0,
|
|
435
|
-
detected=0,
|
|
436
434
|
detection_id=pytest.detection_id,
|
|
437
435
|
group_id=group_id,
|
|
438
|
-
monitored=0,
|
|
439
436
|
platform=pytest.expected_detection["rule"]["logsource"]["product"],
|
|
440
437
|
test_id=pytest.test_id,
|
|
441
438
|
)
|
|
@@ -471,32 +468,6 @@ class TestPartner:
|
|
|
471
468
|
res[control.name][0]["account_id"] == pytest.expected_account["account_id"]
|
|
472
469
|
)
|
|
473
470
|
|
|
474
|
-
def test_ioa_stats(
|
|
475
|
-
self,
|
|
476
|
-
unwrap,
|
|
477
|
-
host,
|
|
478
|
-
edr_id,
|
|
479
|
-
control,
|
|
480
|
-
os,
|
|
481
|
-
platform,
|
|
482
|
-
policy,
|
|
483
|
-
policy_name,
|
|
484
|
-
webhook_keys,
|
|
485
|
-
group_id,
|
|
486
|
-
):
|
|
487
|
-
try:
|
|
488
|
-
if control != Control.CROWDSTRIKE:
|
|
489
|
-
pytest.skip("IOA stats only supported for CROWDSTRIKE")
|
|
490
|
-
if not pytest.expected_account["features"]["observed_detected"]:
|
|
491
|
-
pytest.skip("OBSERVED_DETECTED feature not enabled")
|
|
492
|
-
|
|
493
|
-
res = unwrap(self.partner.ioa_stats)(self.partner)
|
|
494
|
-
assert 0 == len(res)
|
|
495
|
-
finally:
|
|
496
|
-
unwrap(self.detect.delete_endpoint)(
|
|
497
|
-
self.detect, ident=pytest.endpoint["endpoint_id"]
|
|
498
|
-
)
|
|
499
|
-
|
|
500
471
|
def test_list_advisories(
|
|
501
472
|
self,
|
|
502
473
|
unwrap,
|
|
@@ -116,7 +116,7 @@ class TestScmAcrossControls:
|
|
|
116
116
|
job_id = unwrap(self.export.export_scm)(
|
|
117
117
|
self.export,
|
|
118
118
|
SCMCategory.ENDPOINT,
|
|
119
|
-
filter="contains(hostname, '
|
|
119
|
+
filter="contains(hostname, 'i')",
|
|
120
120
|
top=1,
|
|
121
121
|
)["job_id"]
|
|
122
122
|
while (result := unwrap(self.jobs.job_status)(self.jobs, job_id))[
|
|
@@ -131,7 +131,8 @@ class TestScmAcrossControls:
|
|
|
131
131
|
@pytest.mark.order(9)
|
|
132
132
|
@pytest.mark.usefixtures("setup_account")
|
|
133
133
|
@pytest.mark.parametrize(
|
|
134
|
-
"control",
|
|
134
|
+
"control",
|
|
135
|
+
[c for c in Control if c.scm_category != SCMCategory.NONE and not c.parent],
|
|
135
136
|
)
|
|
136
137
|
class TestScmPerControl:
|
|
137
138
|
def setup_class(self):
|
|
@@ -0,0 +1,104 @@
|
|
|
1
|
+
import pytest
|
|
2
|
+
import uuid
|
|
3
|
+
|
|
4
|
+
from prelude_sdk_beta.controllers.scm_controller import ScmController
|
|
5
|
+
from prelude_sdk_beta.models.codes import ControlCategory
|
|
6
|
+
|
|
7
|
+
|
|
8
|
+
@pytest.mark.order(8)
|
|
9
|
+
@pytest.mark.usefixtures("setup_account")
|
|
10
|
+
class TestScmBuild:
|
|
11
|
+
def setup_class(self):
|
|
12
|
+
if not pytest.expected_account["features"]["policy_evaluator"]:
|
|
13
|
+
pytest.skip("POLICY_EVALUATOR feature not enabled")
|
|
14
|
+
self.scm = ScmController(pytest.account)
|
|
15
|
+
|
|
16
|
+
def test_create_object_exception(self, unwrap):
|
|
17
|
+
res = unwrap(self.scm.create_object_exception)(
|
|
18
|
+
self.scm,
|
|
19
|
+
ControlCategory.ASSET_MANAGER,
|
|
20
|
+
"hostname eq 'host1'",
|
|
21
|
+
name="filter me",
|
|
22
|
+
expires="5555-05-05",
|
|
23
|
+
)
|
|
24
|
+
assert res["exception_id"]
|
|
25
|
+
pytest.exception_id = res["exception_id"]
|
|
26
|
+
|
|
27
|
+
def test_update_object_exception(self, unwrap):
|
|
28
|
+
res = unwrap(self.scm.update_object_exception)(
|
|
29
|
+
self.scm,
|
|
30
|
+
pytest.exception_id,
|
|
31
|
+
filter="hostname eq 'host2'",
|
|
32
|
+
expires=None,
|
|
33
|
+
)
|
|
34
|
+
assert res["status"]
|
|
35
|
+
|
|
36
|
+
def test_list_object_exceptions(self, unwrap):
|
|
37
|
+
res = unwrap(self.scm.list_object_exceptions)(self.scm)
|
|
38
|
+
exception = [x for x in res if x["id"] == pytest.exception_id]
|
|
39
|
+
assert len(exception) == 1
|
|
40
|
+
exception = exception[0]
|
|
41
|
+
del exception["author"]
|
|
42
|
+
del exception["created"]
|
|
43
|
+
assert exception == {
|
|
44
|
+
"category": ControlCategory.ASSET_MANAGER.value,
|
|
45
|
+
"expires": None,
|
|
46
|
+
"filter": "hostname eq 'host2'",
|
|
47
|
+
"id": pytest.exception_id,
|
|
48
|
+
"name": "filter me",
|
|
49
|
+
}
|
|
50
|
+
|
|
51
|
+
def test_delete_object_exception(self, unwrap):
|
|
52
|
+
res = unwrap(self.scm.delete_object_exception)(self.scm, pytest.exception_id)
|
|
53
|
+
assert res["status"]
|
|
54
|
+
res = unwrap(self.scm.list_object_exceptions)(self.scm)
|
|
55
|
+
assert not any(x["id"] == pytest.exception_id for x in res)
|
|
56
|
+
|
|
57
|
+
def test_put_report(self, unwrap):
|
|
58
|
+
report_blob = {
|
|
59
|
+
"name": "test report",
|
|
60
|
+
"sections": [
|
|
61
|
+
{
|
|
62
|
+
"name": "test section",
|
|
63
|
+
"charts": [
|
|
64
|
+
{
|
|
65
|
+
"name": "test chart",
|
|
66
|
+
"columns": ["platforms"],
|
|
67
|
+
"type": "PIE",
|
|
68
|
+
"filter": "instances/any(i: i/control eq 1)",
|
|
69
|
+
"group_by": "platforms",
|
|
70
|
+
"scm_category": "ENDPOINT",
|
|
71
|
+
}
|
|
72
|
+
],
|
|
73
|
+
}
|
|
74
|
+
],
|
|
75
|
+
}
|
|
76
|
+
res = unwrap(self.scm.put_report)(self.scm, report_data=report_blob)
|
|
77
|
+
pytest.report_id = res["report_id"]
|
|
78
|
+
for section in res["report"]["sections"]:
|
|
79
|
+
assert "id" in section
|
|
80
|
+
for chart in res["report"]["sections"][0]["charts"]:
|
|
81
|
+
assert "id" in chart
|
|
82
|
+
assert "ignore" in chart
|
|
83
|
+
|
|
84
|
+
def test_list_reports(self, unwrap):
|
|
85
|
+
res = unwrap(self.scm.list_reports)(self.scm)
|
|
86
|
+
report = [r for r in res if r["report_id"] == pytest.report_id]
|
|
87
|
+
assert len(report) == 1
|
|
88
|
+
assert report[0]["name"] == "test report"
|
|
89
|
+
assert "report" not in report[0]
|
|
90
|
+
|
|
91
|
+
def test_get_report(self, unwrap):
|
|
92
|
+
res = unwrap(self.scm.get_report)(self.scm, pytest.report_id)
|
|
93
|
+
assert res["report_id"] == pytest.report_id
|
|
94
|
+
for section in res["report"]["sections"]:
|
|
95
|
+
assert "id" in section
|
|
96
|
+
for chart in res["report"]["sections"][0]["charts"]:
|
|
97
|
+
assert "id" in chart
|
|
98
|
+
assert "ignore" in chart
|
|
99
|
+
|
|
100
|
+
def test_delete_report(self, unwrap):
|
|
101
|
+
res = unwrap(self.scm.delete_report)(self.scm, pytest.report_id)
|
|
102
|
+
assert res["status"]
|
|
103
|
+
res = unwrap(self.scm.list_reports)(self.scm)
|
|
104
|
+
assert not any(r["report_id"] == pytest.report_id for r in res)
|
|
@@ -1,55 +0,0 @@
|
|
|
1
|
-
import pytest
|
|
2
|
-
from datetime import datetime, timezone, timedelta
|
|
3
|
-
|
|
4
|
-
from prelude_sdk_beta.controllers.scm_controller import ScmController
|
|
5
|
-
from prelude_sdk_beta.models.codes import Control, ControlCategory
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
@pytest.mark.order(8)
|
|
9
|
-
@pytest.mark.usefixtures("setup_account")
|
|
10
|
-
class TestScmBuild:
|
|
11
|
-
def setup_class(self):
|
|
12
|
-
if not pytest.expected_account["features"]["policy_evaluator"]:
|
|
13
|
-
pytest.skip("POLICY_EVALUATOR feature not enabled")
|
|
14
|
-
self.scm = ScmController(pytest.account)
|
|
15
|
-
|
|
16
|
-
def test_create_object_exception(self, unwrap):
|
|
17
|
-
res = unwrap(self.scm.create_object_exception)(
|
|
18
|
-
self.scm,
|
|
19
|
-
ControlCategory.ASSET_MANAGER,
|
|
20
|
-
"hostname eq 'host1'",
|
|
21
|
-
name="filter me",
|
|
22
|
-
expires="5555-05-05",
|
|
23
|
-
)
|
|
24
|
-
assert res["exception_id"]
|
|
25
|
-
pytest.exception_id = res["exception_id"]
|
|
26
|
-
|
|
27
|
-
def test_update_object_exception(self, unwrap):
|
|
28
|
-
res = unwrap(self.scm.update_object_exception)(
|
|
29
|
-
self.scm,
|
|
30
|
-
pytest.exception_id,
|
|
31
|
-
filter="hostname eq 'host2'",
|
|
32
|
-
expires=None,
|
|
33
|
-
)
|
|
34
|
-
assert res["status"]
|
|
35
|
-
|
|
36
|
-
def test_list_object_exceptions(self, unwrap):
|
|
37
|
-
res = unwrap(self.scm.list_object_exceptions)(self.scm)
|
|
38
|
-
exception = [x for x in res if x["id"] == pytest.exception_id]
|
|
39
|
-
assert len(exception) == 1
|
|
40
|
-
exception = exception[0]
|
|
41
|
-
del exception["author"]
|
|
42
|
-
del exception["created"]
|
|
43
|
-
assert exception == {
|
|
44
|
-
"category": ControlCategory.ASSET_MANAGER.value,
|
|
45
|
-
"expires": None,
|
|
46
|
-
"filter": "hostname eq 'host2'",
|
|
47
|
-
"id": pytest.exception_id,
|
|
48
|
-
"name": "filter me",
|
|
49
|
-
}
|
|
50
|
-
|
|
51
|
-
def test_delete_object_exception(self, unwrap):
|
|
52
|
-
res = unwrap(self.scm.delete_object_exception)(self.scm, pytest.exception_id)
|
|
53
|
-
assert res["status"]
|
|
54
|
-
res = unwrap(self.scm.list_object_exceptions)(self.scm)
|
|
55
|
-
assert not any(x["id"] == pytest.exception_id for x in res)
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
{prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/build_controller.py
RENAMED
|
File without changes
|
{prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/detect_controller.py
RENAMED
|
File without changes
|
{prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/export_controller.py
RENAMED
|
File without changes
|
{prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/generate_controller.py
RENAMED
|
File without changes
|
{prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/http_controller.py
RENAMED
|
File without changes
|
{prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/iam_controller.py
RENAMED
|
File without changes
|
{prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/jobs_controller.py
RENAMED
|
File without changes
|
{prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta/controllers/probe_controller.py
RENAMED
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
{prelude_sdk_beta-1435 → prelude_sdk_beta-1449}/prelude_sdk_beta.egg-info/dependency_links.txt
RENAMED
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|
|
File without changes
|