regscale-cli 6.21.2.0__py3-none-any.whl → 6.28.2.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- regscale/_version.py +1 -1
- regscale/airflow/hierarchy.py +2 -2
- regscale/core/app/api.py +5 -2
- regscale/core/app/application.py +36 -6
- regscale/core/app/internal/control_editor.py +73 -21
- regscale/core/app/internal/evidence.py +727 -204
- regscale/core/app/internal/login.py +4 -2
- regscale/core/app/internal/model_editor.py +219 -64
- regscale/core/app/utils/app_utils.py +86 -12
- regscale/core/app/utils/catalog_utils/common.py +1 -1
- regscale/core/login.py +21 -4
- regscale/core/utils/async_graphql_client.py +363 -0
- regscale/core/utils/date.py +77 -1
- regscale/dev/cli.py +26 -0
- regscale/dev/code_gen.py +109 -24
- regscale/dev/version.py +72 -0
- regscale/integrations/commercial/__init__.py +30 -2
- regscale/integrations/commercial/aws/audit_manager_compliance.py +3908 -0
- regscale/integrations/commercial/aws/cli.py +3107 -54
- regscale/integrations/commercial/aws/cloudtrail_control_mappings.py +333 -0
- regscale/integrations/commercial/aws/cloudtrail_evidence.py +501 -0
- regscale/integrations/commercial/aws/cloudwatch_control_mappings.py +357 -0
- regscale/integrations/commercial/aws/cloudwatch_evidence.py +490 -0
- regscale/integrations/commercial/{amazon → aws}/common.py +71 -19
- regscale/integrations/commercial/aws/config_compliance.py +914 -0
- regscale/integrations/commercial/aws/conformance_pack_mappings.py +198 -0
- regscale/integrations/commercial/aws/control_compliance_analyzer.py +439 -0
- regscale/integrations/commercial/aws/evidence_generator.py +283 -0
- regscale/integrations/commercial/aws/guardduty_control_mappings.py +340 -0
- regscale/integrations/commercial/aws/guardduty_evidence.py +1053 -0
- regscale/integrations/commercial/aws/iam_control_mappings.py +368 -0
- regscale/integrations/commercial/aws/iam_evidence.py +574 -0
- regscale/integrations/commercial/aws/inventory/__init__.py +338 -22
- regscale/integrations/commercial/aws/inventory/base.py +107 -5
- regscale/integrations/commercial/aws/inventory/resources/analytics.py +390 -0
- regscale/integrations/commercial/aws/inventory/resources/applications.py +234 -0
- regscale/integrations/commercial/aws/inventory/resources/audit_manager.py +513 -0
- regscale/integrations/commercial/aws/inventory/resources/cloudtrail.py +315 -0
- regscale/integrations/commercial/aws/inventory/resources/cloudtrail_logs_metadata.py +476 -0
- regscale/integrations/commercial/aws/inventory/resources/cloudwatch.py +191 -0
- regscale/integrations/commercial/aws/inventory/resources/compute.py +328 -9
- regscale/integrations/commercial/aws/inventory/resources/config.py +464 -0
- regscale/integrations/commercial/aws/inventory/resources/containers.py +74 -9
- regscale/integrations/commercial/aws/inventory/resources/database.py +481 -31
- regscale/integrations/commercial/aws/inventory/resources/developer_tools.py +253 -0
- regscale/integrations/commercial/aws/inventory/resources/guardduty.py +286 -0
- regscale/integrations/commercial/aws/inventory/resources/iam.py +470 -0
- regscale/integrations/commercial/aws/inventory/resources/inspector.py +476 -0
- regscale/integrations/commercial/aws/inventory/resources/integration.py +175 -61
- regscale/integrations/commercial/aws/inventory/resources/kms.py +447 -0
- regscale/integrations/commercial/aws/inventory/resources/machine_learning.py +358 -0
- regscale/integrations/commercial/aws/inventory/resources/networking.py +390 -67
- regscale/integrations/commercial/aws/inventory/resources/s3.py +394 -0
- regscale/integrations/commercial/aws/inventory/resources/security.py +268 -72
- regscale/integrations/commercial/aws/inventory/resources/securityhub.py +473 -0
- regscale/integrations/commercial/aws/inventory/resources/storage.py +288 -29
- regscale/integrations/commercial/aws/inventory/resources/systems_manager.py +657 -0
- regscale/integrations/commercial/aws/inventory/resources/vpc.py +655 -0
- regscale/integrations/commercial/aws/kms_control_mappings.py +288 -0
- regscale/integrations/commercial/aws/kms_evidence.py +879 -0
- regscale/integrations/commercial/aws/ocsf/__init__.py +7 -0
- regscale/integrations/commercial/aws/ocsf/constants.py +115 -0
- regscale/integrations/commercial/aws/ocsf/mapper.py +435 -0
- regscale/integrations/commercial/aws/org_control_mappings.py +286 -0
- regscale/integrations/commercial/aws/org_evidence.py +666 -0
- regscale/integrations/commercial/aws/s3_control_mappings.py +356 -0
- regscale/integrations/commercial/aws/s3_evidence.py +632 -0
- regscale/integrations/commercial/aws/scanner.py +1072 -205
- regscale/integrations/commercial/aws/security_hub.py +319 -0
- regscale/integrations/commercial/aws/session_manager.py +282 -0
- regscale/integrations/commercial/aws/ssm_control_mappings.py +291 -0
- regscale/integrations/commercial/aws/ssm_evidence.py +492 -0
- regscale/integrations/commercial/jira.py +489 -153
- regscale/integrations/commercial/microsoft_defender/defender.py +326 -5
- regscale/integrations/commercial/microsoft_defender/defender_api.py +348 -14
- regscale/integrations/commercial/microsoft_defender/defender_constants.py +157 -0
- regscale/integrations/commercial/qualys/__init__.py +167 -68
- regscale/integrations/commercial/qualys/scanner.py +305 -39
- regscale/integrations/commercial/sarif/sairf_importer.py +432 -0
- regscale/integrations/commercial/sarif/sarif_converter.py +67 -0
- regscale/integrations/commercial/sicura/api.py +79 -42
- regscale/integrations/commercial/sicura/commands.py +8 -2
- regscale/integrations/commercial/sicura/scanner.py +83 -44
- regscale/integrations/commercial/stigv2/ckl_parser.py +5 -5
- regscale/integrations/commercial/synqly/assets.py +133 -16
- regscale/integrations/commercial/synqly/edr.py +2 -8
- regscale/integrations/commercial/synqly/query_builder.py +536 -0
- regscale/integrations/commercial/synqly/ticketing.py +27 -0
- regscale/integrations/commercial/synqly/vulnerabilities.py +165 -28
- regscale/integrations/commercial/tenablev2/cis_parsers.py +453 -0
- regscale/integrations/commercial/tenablev2/cis_scanner.py +447 -0
- regscale/integrations/commercial/tenablev2/commands.py +146 -5
- regscale/integrations/commercial/tenablev2/scanner.py +1 -3
- regscale/integrations/commercial/tenablev2/stig_parsers.py +113 -57
- regscale/integrations/commercial/wizv2/WizDataMixin.py +1 -1
- regscale/integrations/commercial/wizv2/click.py +191 -76
- regscale/integrations/commercial/wizv2/compliance/__init__.py +15 -0
- regscale/integrations/commercial/wizv2/{policy_compliance_helpers.py → compliance/helpers.py} +78 -60
- regscale/integrations/commercial/wizv2/compliance_report.py +1592 -0
- regscale/integrations/commercial/wizv2/core/__init__.py +133 -0
- regscale/integrations/commercial/wizv2/{async_client.py → core/client.py} +7 -3
- regscale/integrations/commercial/wizv2/{constants.py → core/constants.py} +92 -89
- regscale/integrations/commercial/wizv2/core/file_operations.py +237 -0
- regscale/integrations/commercial/wizv2/fetchers/__init__.py +11 -0
- regscale/integrations/commercial/wizv2/{data_fetcher.py → fetchers/policy_assessment.py} +66 -9
- regscale/integrations/commercial/wizv2/file_cleanup.py +104 -0
- regscale/integrations/commercial/wizv2/issue.py +776 -28
- regscale/integrations/commercial/wizv2/models/__init__.py +0 -0
- regscale/integrations/commercial/wizv2/parsers/__init__.py +34 -0
- regscale/integrations/commercial/wizv2/{parsers.py → parsers/main.py} +1 -1
- regscale/integrations/commercial/wizv2/processors/__init__.py +11 -0
- regscale/integrations/commercial/wizv2/{finding_processor.py → processors/finding.py} +1 -1
- regscale/integrations/commercial/wizv2/reports.py +243 -0
- regscale/integrations/commercial/wizv2/sbom.py +1 -1
- regscale/integrations/commercial/wizv2/scanner.py +1031 -441
- regscale/integrations/commercial/wizv2/utils/__init__.py +48 -0
- regscale/integrations/commercial/wizv2/{utils.py → utils/main.py} +116 -61
- regscale/integrations/commercial/wizv2/variables.py +89 -3
- regscale/integrations/compliance_integration.py +1036 -151
- regscale/integrations/control_matcher.py +432 -0
- regscale/integrations/due_date_handler.py +333 -0
- regscale/integrations/milestone_manager.py +291 -0
- regscale/integrations/public/__init__.py +14 -0
- regscale/integrations/public/cci_importer.py +834 -0
- regscale/integrations/public/csam/__init__.py +0 -0
- regscale/integrations/public/csam/csam.py +938 -0
- regscale/integrations/public/csam/csam_agency_defined.py +179 -0
- regscale/integrations/public/csam/csam_common.py +154 -0
- regscale/integrations/public/csam/csam_controls.py +432 -0
- regscale/integrations/public/csam/csam_poam.py +124 -0
- regscale/integrations/public/fedramp/click.py +77 -6
- regscale/integrations/public/fedramp/docx_parser.py +10 -1
- regscale/integrations/public/fedramp/fedramp_cis_crm.py +675 -289
- regscale/integrations/public/fedramp/fedramp_five.py +1 -1
- regscale/integrations/public/fedramp/poam/scanner.py +75 -7
- regscale/integrations/public/fedramp/poam_export_v5.py +888 -0
- regscale/integrations/scanner_integration.py +1961 -430
- regscale/models/integration_models/CCI_List.xml +1 -0
- regscale/models/integration_models/aqua.py +2 -2
- regscale/models/integration_models/cisa_kev_data.json +805 -11
- regscale/models/integration_models/flat_file_importer/__init__.py +5 -8
- regscale/models/integration_models/nexpose.py +36 -10
- regscale/models/integration_models/qualys.py +3 -4
- regscale/models/integration_models/synqly_models/capabilities.json +1 -1
- regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py +87 -18
- regscale/models/integration_models/synqly_models/filter_parser.py +332 -0
- regscale/models/integration_models/synqly_models/ocsf_mapper.py +124 -25
- regscale/models/integration_models/synqly_models/synqly_model.py +89 -16
- regscale/models/locking.py +12 -8
- regscale/models/platform.py +4 -2
- regscale/models/regscale_models/__init__.py +7 -0
- regscale/models/regscale_models/assessment.py +2 -1
- regscale/models/regscale_models/catalog.py +1 -1
- regscale/models/regscale_models/compliance_settings.py +251 -1
- regscale/models/regscale_models/component.py +1 -0
- regscale/models/regscale_models/control_implementation.py +236 -41
- regscale/models/regscale_models/control_objective.py +74 -5
- regscale/models/regscale_models/file.py +2 -0
- regscale/models/regscale_models/form_field_value.py +5 -3
- regscale/models/regscale_models/inheritance.py +44 -0
- regscale/models/regscale_models/issue.py +301 -102
- regscale/models/regscale_models/milestone.py +33 -14
- regscale/models/regscale_models/organization.py +3 -0
- regscale/models/regscale_models/regscale_model.py +310 -73
- regscale/models/regscale_models/security_plan.py +4 -2
- regscale/models/regscale_models/vulnerability.py +3 -3
- regscale/regscale.py +25 -4
- regscale/templates/__init__.py +0 -0
- regscale/utils/threading/threadhandler.py +20 -15
- regscale/validation/record.py +23 -1
- {regscale_cli-6.21.2.0.dist-info → regscale_cli-6.28.2.1.dist-info}/METADATA +17 -33
- {regscale_cli-6.21.2.0.dist-info → regscale_cli-6.28.2.1.dist-info}/RECORD +310 -111
- tests/core/__init__.py +0 -0
- tests/core/utils/__init__.py +0 -0
- tests/core/utils/test_async_graphql_client.py +472 -0
- tests/fixtures/test_fixture.py +13 -8
- tests/regscale/core/test_login.py +171 -4
- tests/regscale/integrations/commercial/__init__.py +0 -0
- tests/regscale/integrations/commercial/aws/__init__.py +0 -0
- tests/regscale/integrations/commercial/aws/test_audit_manager_compliance.py +1304 -0
- tests/regscale/integrations/commercial/aws/test_audit_manager_evidence_aggregation.py +341 -0
- tests/regscale/integrations/commercial/aws/test_aws_analytics_collector.py +260 -0
- tests/regscale/integrations/commercial/aws/test_aws_applications_collector.py +242 -0
- tests/regscale/integrations/commercial/aws/test_aws_audit_manager_collector.py +1155 -0
- tests/regscale/integrations/commercial/aws/test_aws_cloudtrail_collector.py +534 -0
- tests/regscale/integrations/commercial/aws/test_aws_config_collector.py +400 -0
- tests/regscale/integrations/commercial/aws/test_aws_developer_tools_collector.py +203 -0
- tests/regscale/integrations/commercial/aws/test_aws_guardduty_collector.py +315 -0
- tests/regscale/integrations/commercial/aws/test_aws_iam_collector.py +458 -0
- tests/regscale/integrations/commercial/aws/test_aws_inspector_collector.py +353 -0
- tests/regscale/integrations/commercial/aws/test_aws_inventory_integration.py +530 -0
- tests/regscale/integrations/commercial/aws/test_aws_kms_collector.py +919 -0
- tests/regscale/integrations/commercial/aws/test_aws_machine_learning_collector.py +237 -0
- tests/regscale/integrations/commercial/aws/test_aws_s3_collector.py +722 -0
- tests/regscale/integrations/commercial/aws/test_aws_scanner_integration.py +722 -0
- tests/regscale/integrations/commercial/aws/test_aws_securityhub_collector.py +792 -0
- tests/regscale/integrations/commercial/aws/test_aws_systems_manager_collector.py +918 -0
- tests/regscale/integrations/commercial/aws/test_aws_vpc_collector.py +996 -0
- tests/regscale/integrations/commercial/aws/test_cli_evidence.py +431 -0
- tests/regscale/integrations/commercial/aws/test_cloudtrail_control_mappings.py +452 -0
- tests/regscale/integrations/commercial/aws/test_cloudtrail_evidence.py +788 -0
- tests/regscale/integrations/commercial/aws/test_config_compliance.py +298 -0
- tests/regscale/integrations/commercial/aws/test_conformance_pack_mappings.py +200 -0
- tests/regscale/integrations/commercial/aws/test_control_compliance_analyzer.py +375 -0
- tests/regscale/integrations/commercial/aws/test_datetime_parsing.py +223 -0
- tests/regscale/integrations/commercial/aws/test_evidence_generator.py +386 -0
- tests/regscale/integrations/commercial/aws/test_guardduty_control_mappings.py +564 -0
- tests/regscale/integrations/commercial/aws/test_guardduty_evidence.py +1041 -0
- tests/regscale/integrations/commercial/aws/test_iam_control_mappings.py +718 -0
- tests/regscale/integrations/commercial/aws/test_iam_evidence.py +1375 -0
- tests/regscale/integrations/commercial/aws/test_kms_control_mappings.py +656 -0
- tests/regscale/integrations/commercial/aws/test_kms_evidence.py +1163 -0
- tests/regscale/integrations/commercial/aws/test_ocsf_mapper.py +370 -0
- tests/regscale/integrations/commercial/aws/test_org_control_mappings.py +546 -0
- tests/regscale/integrations/commercial/aws/test_org_evidence.py +1240 -0
- tests/regscale/integrations/commercial/aws/test_s3_control_mappings.py +672 -0
- tests/regscale/integrations/commercial/aws/test_s3_evidence.py +987 -0
- tests/regscale/integrations/commercial/aws/test_scanner_evidence.py +373 -0
- tests/regscale/integrations/commercial/aws/test_security_hub_config_filtering.py +539 -0
- tests/regscale/integrations/commercial/aws/test_session_manager.py +516 -0
- tests/regscale/integrations/commercial/aws/test_ssm_control_mappings.py +588 -0
- tests/regscale/integrations/commercial/aws/test_ssm_evidence.py +735 -0
- tests/regscale/integrations/commercial/conftest.py +28 -0
- tests/regscale/integrations/commercial/microsoft_defender/__init__.py +1 -0
- tests/regscale/integrations/commercial/microsoft_defender/test_defender.py +1517 -0
- tests/regscale/integrations/commercial/microsoft_defender/test_defender_api.py +1748 -0
- tests/regscale/integrations/commercial/microsoft_defender/test_defender_constants.py +327 -0
- tests/regscale/integrations/commercial/microsoft_defender/test_defender_scanner.py +487 -0
- tests/regscale/integrations/commercial/test_aws.py +3742 -0
- tests/regscale/integrations/commercial/test_burp.py +48 -0
- tests/regscale/integrations/commercial/test_crowdstrike.py +49 -0
- tests/regscale/integrations/commercial/test_dependabot.py +341 -0
- tests/regscale/integrations/commercial/test_gcp.py +1543 -0
- tests/regscale/integrations/commercial/test_gitlab.py +549 -0
- tests/regscale/integrations/commercial/test_ip_mac_address_length.py +84 -0
- tests/regscale/integrations/commercial/test_jira.py +2204 -0
- tests/regscale/integrations/commercial/test_npm_audit.py +42 -0
- tests/regscale/integrations/commercial/test_okta.py +1228 -0
- tests/regscale/integrations/commercial/test_sarif_converter.py +251 -0
- tests/regscale/integrations/commercial/test_sicura.py +349 -0
- tests/regscale/integrations/commercial/test_snow.py +423 -0
- tests/regscale/integrations/commercial/test_sonarcloud.py +394 -0
- tests/regscale/integrations/commercial/test_sqlserver.py +186 -0
- tests/regscale/integrations/commercial/test_stig.py +33 -0
- tests/regscale/integrations/commercial/test_stig_mapper.py +153 -0
- tests/regscale/integrations/commercial/test_stigv2.py +406 -0
- tests/regscale/integrations/commercial/test_wiz.py +1365 -0
- tests/regscale/integrations/commercial/test_wiz_inventory.py +256 -0
- tests/regscale/integrations/commercial/wizv2/__init__.py +339 -0
- tests/regscale/integrations/commercial/wizv2/compliance/__init__.py +1 -0
- tests/regscale/integrations/commercial/wizv2/compliance/test_helpers.py +903 -0
- tests/regscale/integrations/commercial/wizv2/core/__init__.py +1 -0
- tests/regscale/integrations/commercial/wizv2/core/test_auth.py +701 -0
- tests/regscale/integrations/commercial/wizv2/core/test_client.py +1037 -0
- tests/regscale/integrations/commercial/wizv2/core/test_file_operations.py +989 -0
- tests/regscale/integrations/commercial/wizv2/fetchers/__init__.py +1 -0
- tests/regscale/integrations/commercial/wizv2/fetchers/test_policy_assessment.py +805 -0
- tests/regscale/integrations/commercial/wizv2/parsers/__init__.py +1 -0
- tests/regscale/integrations/commercial/wizv2/parsers/test_main.py +1153 -0
- tests/regscale/integrations/commercial/wizv2/processors/__init__.py +1 -0
- tests/regscale/integrations/commercial/wizv2/processors/test_finding.py +671 -0
- tests/regscale/integrations/commercial/wizv2/test_WizDataMixin.py +537 -0
- tests/regscale/integrations/commercial/wizv2/test_click_comprehensive.py +851 -0
- tests/regscale/integrations/commercial/wizv2/test_compliance_report_comprehensive.py +910 -0
- tests/regscale/integrations/commercial/wizv2/test_compliance_report_normalization.py +138 -0
- tests/regscale/integrations/commercial/wizv2/test_file_cleanup.py +283 -0
- tests/regscale/integrations/commercial/wizv2/test_file_operations.py +260 -0
- tests/regscale/integrations/commercial/wizv2/test_issue.py +343 -0
- tests/regscale/integrations/commercial/wizv2/test_issue_comprehensive.py +1203 -0
- tests/regscale/integrations/commercial/wizv2/test_reports.py +497 -0
- tests/regscale/integrations/commercial/wizv2/test_sbom.py +643 -0
- tests/regscale/integrations/commercial/wizv2/test_scanner_comprehensive.py +805 -0
- tests/regscale/integrations/commercial/wizv2/test_wiz_click_client_id.py +165 -0
- tests/regscale/integrations/commercial/wizv2/test_wiz_compliance_report.py +1394 -0
- tests/regscale/integrations/commercial/wizv2/test_wiz_compliance_unit.py +341 -0
- tests/regscale/integrations/commercial/wizv2/test_wiz_control_normalization.py +138 -0
- tests/regscale/integrations/commercial/wizv2/test_wiz_findings_comprehensive.py +364 -0
- tests/regscale/integrations/commercial/wizv2/test_wiz_inventory_comprehensive.py +644 -0
- tests/regscale/integrations/commercial/wizv2/test_wiz_status_mapping.py +149 -0
- tests/regscale/integrations/commercial/wizv2/test_wizv2.py +1218 -0
- tests/regscale/integrations/commercial/wizv2/test_wizv2_utils.py +519 -0
- tests/regscale/integrations/commercial/wizv2/utils/__init__.py +1 -0
- tests/regscale/integrations/commercial/wizv2/utils/test_main.py +1523 -0
- tests/regscale/integrations/public/__init__.py +0 -0
- tests/regscale/integrations/public/fedramp/__init__.py +1 -0
- tests/regscale/integrations/public/fedramp/test_gen_asset_list.py +150 -0
- tests/regscale/integrations/public/fedramp/test_poam_export_v5.py +1293 -0
- tests/regscale/integrations/public/test_alienvault.py +220 -0
- tests/regscale/integrations/public/test_cci.py +1053 -0
- tests/regscale/integrations/public/test_cisa.py +1021 -0
- tests/regscale/integrations/public/test_emass.py +518 -0
- tests/regscale/integrations/public/test_fedramp.py +1152 -0
- tests/regscale/integrations/public/test_fedramp_cis_crm.py +3661 -0
- tests/regscale/integrations/public/test_file_uploads.py +506 -0
- tests/regscale/integrations/public/test_oscal.py +453 -0
- tests/regscale/integrations/test_compliance_status_mapping.py +406 -0
- tests/regscale/integrations/test_control_matcher.py +1421 -0
- tests/regscale/integrations/test_control_matching.py +155 -0
- tests/regscale/integrations/test_milestone_manager.py +408 -0
- tests/regscale/models/test_control_implementation.py +118 -3
- tests/regscale/models/test_form_field_value_integration.py +304 -0
- tests/regscale/models/test_issue.py +378 -1
- tests/regscale/models/test_module_integration.py +582 -0
- tests/regscale/models/test_tenable_integrations.py +811 -105
- regscale/integrations/commercial/wizv2/policy_compliance.py +0 -3057
- regscale/integrations/public/fedramp/mappings/fedramp_r4_parts.json +0 -7388
- regscale/integrations/public/fedramp/mappings/fedramp_r5_parts.json +0 -9605
- regscale/integrations/public/fedramp/parts_mapper.py +0 -107
- /regscale/integrations/commercial/{amazon → sarif}/__init__.py +0 -0
- /regscale/integrations/commercial/wizv2/{wiz_auth.py → core/auth.py} +0 -0
- {regscale_cli-6.21.2.0.dist-info → regscale_cli-6.28.2.1.dist-info}/LICENSE +0 -0
- {regscale_cli-6.21.2.0.dist-info → regscale_cli-6.28.2.1.dist-info}/WHEEL +0 -0
- {regscale_cli-6.21.2.0.dist-info → regscale_cli-6.28.2.1.dist-info}/entry_points.txt +0 -0
- {regscale_cli-6.21.2.0.dist-info → regscale_cli-6.28.2.1.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,315 @@
|
|
|
1
|
+
"""Unit tests for AWS GuardDuty collector."""
|
|
2
|
+
|
|
3
|
+
import unittest
|
|
4
|
+
from unittest.mock import MagicMock, patch
|
|
5
|
+
|
|
6
|
+
import pytest
|
|
7
|
+
from botocore.exceptions import ClientError
|
|
8
|
+
|
|
9
|
+
from regscale.integrations.commercial.aws.inventory.resources.guardduty import GuardDutyCollector
|
|
10
|
+
|
|
11
|
+
|
|
12
|
+
class TestGuardDutyCollector(unittest.TestCase):
|
|
13
|
+
"""Test cases for GuardDutyCollector."""
|
|
14
|
+
|
|
15
|
+
def setUp(self):
|
|
16
|
+
"""Set up test fixtures."""
|
|
17
|
+
self.mock_session = MagicMock()
|
|
18
|
+
self.region = "us-east-1"
|
|
19
|
+
self.account_id = "123456789012"
|
|
20
|
+
self.collector = GuardDutyCollector(self.mock_session, self.region, self.account_id)
|
|
21
|
+
|
|
22
|
+
def test_init(self):
|
|
23
|
+
"""Test GuardDutyCollector initialization."""
|
|
24
|
+
assert self.collector.session == self.mock_session
|
|
25
|
+
assert self.collector.region == self.region
|
|
26
|
+
assert self.collector.account_id == self.account_id
|
|
27
|
+
|
|
28
|
+
def test_init_without_account_id(self):
|
|
29
|
+
"""Test GuardDutyCollector initialization without account ID."""
|
|
30
|
+
collector = GuardDutyCollector(self.mock_session, self.region)
|
|
31
|
+
assert collector.account_id is None
|
|
32
|
+
|
|
33
|
+
@patch("regscale.integrations.commercial.aws.inventory.resources.guardduty.logger")
|
|
34
|
+
def test_collect_success(self, mock_logger):
|
|
35
|
+
"""Test successful collection of GuardDuty resources."""
|
|
36
|
+
# Setup mock client
|
|
37
|
+
mock_client = MagicMock()
|
|
38
|
+
self.mock_session.client.return_value = mock_client
|
|
39
|
+
|
|
40
|
+
detector_id = "test-detector-123"
|
|
41
|
+
mock_client.list_detectors.return_value = {"DetectorIds": [detector_id]}
|
|
42
|
+
|
|
43
|
+
mock_client.get_detector.return_value = {
|
|
44
|
+
"Status": "ENABLED",
|
|
45
|
+
"ServiceRole": "arn:aws:iam::123456789012:role/service-role",
|
|
46
|
+
"AccountId": self.account_id,
|
|
47
|
+
"ResponseMetadata": {"RequestId": "test"},
|
|
48
|
+
}
|
|
49
|
+
|
|
50
|
+
mock_client.list_findings.return_value = {"FindingIds": ["finding-1", "finding-2"]}
|
|
51
|
+
|
|
52
|
+
mock_client.get_findings.return_value = {
|
|
53
|
+
"Findings": [
|
|
54
|
+
{
|
|
55
|
+
"Id": "finding-1",
|
|
56
|
+
"Type": "UnauthorizedAccess:IAMUser/MaliciousIPCaller.Custom",
|
|
57
|
+
"Severity": 8.0,
|
|
58
|
+
"AccountId": self.account_id,
|
|
59
|
+
},
|
|
60
|
+
{"Id": "finding-2", "Type": "Recon:EC2/PortProbeUnprotectedPort", "Severity": 5.0},
|
|
61
|
+
]
|
|
62
|
+
}
|
|
63
|
+
|
|
64
|
+
mock_client.list_members.return_value = {"Members": []}
|
|
65
|
+
|
|
66
|
+
# Execute
|
|
67
|
+
result = self.collector.collect()
|
|
68
|
+
|
|
69
|
+
# Verify
|
|
70
|
+
assert "Detectors" in result
|
|
71
|
+
assert "Findings" in result
|
|
72
|
+
assert "Members" in result
|
|
73
|
+
assert len(result["Detectors"]) == 1
|
|
74
|
+
assert len(result["Findings"]) == 2
|
|
75
|
+
assert result["Detectors"][0]["DetectorId"] == detector_id
|
|
76
|
+
assert result["Detectors"][0]["Region"] == self.region
|
|
77
|
+
assert "ResponseMetadata" not in result["Detectors"][0]
|
|
78
|
+
|
|
79
|
+
@patch("regscale.integrations.commercial.aws.inventory.resources.guardduty.logger")
|
|
80
|
+
def test_collect_filters_by_account_id(self, mock_logger):
|
|
81
|
+
"""Test that collection filters detectors by account ID."""
|
|
82
|
+
# Setup mock client
|
|
83
|
+
mock_client = MagicMock()
|
|
84
|
+
self.mock_session.client.return_value = mock_client
|
|
85
|
+
|
|
86
|
+
mock_client.list_detectors.return_value = {"DetectorIds": ["detector-1", "detector-2"]}
|
|
87
|
+
|
|
88
|
+
# Return different account IDs for each detector
|
|
89
|
+
mock_client.get_detector.side_effect = [
|
|
90
|
+
{"Status": "ENABLED", "AccountId": self.account_id, "ServiceRole": "arn"},
|
|
91
|
+
{"Status": "ENABLED", "AccountId": "999999999999", "ServiceRole": "arn"},
|
|
92
|
+
]
|
|
93
|
+
|
|
94
|
+
mock_client.list_findings.return_value = {"FindingIds": []}
|
|
95
|
+
mock_client.list_members.return_value = {"Members": []}
|
|
96
|
+
|
|
97
|
+
# Execute
|
|
98
|
+
result = self.collector.collect()
|
|
99
|
+
|
|
100
|
+
# Verify - should only have one detector (the matching account)
|
|
101
|
+
assert len(result["Detectors"]) == 1
|
|
102
|
+
assert result["Detectors"][0]["AccountId"] == self.account_id
|
|
103
|
+
|
|
104
|
+
@patch("regscale.integrations.commercial.aws.inventory.resources.guardduty.logger")
|
|
105
|
+
def test_collect_no_account_filter(self, mock_logger):
|
|
106
|
+
"""Test collection without account ID filter."""
|
|
107
|
+
# Create collector without account ID
|
|
108
|
+
collector = GuardDutyCollector(self.mock_session, self.region)
|
|
109
|
+
|
|
110
|
+
# Setup mock client
|
|
111
|
+
mock_client = MagicMock()
|
|
112
|
+
self.mock_session.client.return_value = mock_client
|
|
113
|
+
|
|
114
|
+
mock_client.list_detectors.return_value = {"DetectorIds": ["detector-1", "detector-2"]}
|
|
115
|
+
|
|
116
|
+
mock_client.get_detector.side_effect = [
|
|
117
|
+
{"Status": "ENABLED", "AccountId": "111111111111"},
|
|
118
|
+
{"Status": "ENABLED", "AccountId": "222222222222"},
|
|
119
|
+
]
|
|
120
|
+
|
|
121
|
+
mock_client.list_findings.return_value = {"FindingIds": []}
|
|
122
|
+
mock_client.list_members.return_value = {"Members": []}
|
|
123
|
+
|
|
124
|
+
# Execute
|
|
125
|
+
result = collector.collect()
|
|
126
|
+
|
|
127
|
+
# Verify - should have both detectors
|
|
128
|
+
assert len(result["Detectors"]) == 2
|
|
129
|
+
|
|
130
|
+
@patch("regscale.integrations.commercial.aws.inventory.resources.guardduty.logger")
|
|
131
|
+
def test_collect_handles_client_error(self, mock_logger):
|
|
132
|
+
"""Test collection handles ClientError."""
|
|
133
|
+
# Setup mock client
|
|
134
|
+
mock_client = MagicMock()
|
|
135
|
+
self.mock_session.client.return_value = mock_client
|
|
136
|
+
|
|
137
|
+
# Simulate ClientError
|
|
138
|
+
error_response = {"Error": {"Code": "InternalError", "Message": "Internal error"}}
|
|
139
|
+
mock_client.list_detectors.side_effect = ClientError(error_response, "list_detectors")
|
|
140
|
+
|
|
141
|
+
# Execute
|
|
142
|
+
result = self.collector.collect()
|
|
143
|
+
|
|
144
|
+
# Verify
|
|
145
|
+
assert result["Detectors"] == []
|
|
146
|
+
|
|
147
|
+
@patch("regscale.integrations.commercial.aws.inventory.resources.guardduty.logger")
|
|
148
|
+
def test_collect_handles_unexpected_error(self, mock_logger):
|
|
149
|
+
"""Test collection handles unexpected errors."""
|
|
150
|
+
# Setup mock client
|
|
151
|
+
mock_client = MagicMock()
|
|
152
|
+
self.mock_session.client.return_value = mock_client
|
|
153
|
+
|
|
154
|
+
# Simulate unexpected error
|
|
155
|
+
mock_client.list_detectors.side_effect = Exception("Unexpected error")
|
|
156
|
+
|
|
157
|
+
# Execute
|
|
158
|
+
result = self.collector.collect()
|
|
159
|
+
|
|
160
|
+
# Verify
|
|
161
|
+
assert result["Detectors"] == []
|
|
162
|
+
mock_logger.error.assert_called()
|
|
163
|
+
|
|
164
|
+
def test_list_detectors_success(self):
|
|
165
|
+
"""Test successful listing of detectors."""
|
|
166
|
+
mock_client = MagicMock()
|
|
167
|
+
mock_client.list_detectors.return_value = {"DetectorIds": ["detector-1", "detector-2"]}
|
|
168
|
+
|
|
169
|
+
result = self.collector._list_detectors(mock_client)
|
|
170
|
+
|
|
171
|
+
assert len(result) == 2
|
|
172
|
+
assert "detector-1" in result
|
|
173
|
+
|
|
174
|
+
def test_list_detectors_access_denied(self):
|
|
175
|
+
"""Test listing detectors with access denied."""
|
|
176
|
+
mock_client = MagicMock()
|
|
177
|
+
error_response = {"Error": {"Code": "AccessDeniedException", "Message": "Access denied"}}
|
|
178
|
+
mock_client.list_detectors.side_effect = ClientError(error_response, "list_detectors")
|
|
179
|
+
|
|
180
|
+
result = self.collector._list_detectors(mock_client)
|
|
181
|
+
|
|
182
|
+
assert result == []
|
|
183
|
+
|
|
184
|
+
def test_get_detector_success(self):
|
|
185
|
+
"""Test successful detector retrieval."""
|
|
186
|
+
mock_client = MagicMock()
|
|
187
|
+
detector_id = "test-detector"
|
|
188
|
+
mock_client.get_detector.return_value = {
|
|
189
|
+
"Status": "ENABLED",
|
|
190
|
+
"ServiceRole": "arn:aws:iam::123456789012:role/service-role",
|
|
191
|
+
"ResponseMetadata": {"RequestId": "test"},
|
|
192
|
+
}
|
|
193
|
+
|
|
194
|
+
result = self.collector._get_detector(mock_client, detector_id)
|
|
195
|
+
|
|
196
|
+
assert result is not None
|
|
197
|
+
assert result["Status"] == "ENABLED"
|
|
198
|
+
assert "ResponseMetadata" not in result
|
|
199
|
+
|
|
200
|
+
def test_get_detector_error(self):
|
|
201
|
+
"""Test detector retrieval with error."""
|
|
202
|
+
mock_client = MagicMock()
|
|
203
|
+
detector_id = "test-detector"
|
|
204
|
+
error_response = {"Error": {"Code": "BadRequestException", "Message": "Bad request"}}
|
|
205
|
+
mock_client.get_detector.side_effect = ClientError(error_response, "get_detector")
|
|
206
|
+
|
|
207
|
+
result = self.collector._get_detector(mock_client, detector_id)
|
|
208
|
+
|
|
209
|
+
assert result is None
|
|
210
|
+
|
|
211
|
+
def test_list_and_get_findings_success(self):
|
|
212
|
+
"""Test successful findings retrieval."""
|
|
213
|
+
mock_client = MagicMock()
|
|
214
|
+
detector_id = "test-detector"
|
|
215
|
+
|
|
216
|
+
mock_client.list_findings.return_value = {"FindingIds": ["finding-1", "finding-2"]}
|
|
217
|
+
mock_client.get_findings.return_value = {
|
|
218
|
+
"Findings": [{"Id": "finding-1", "Severity": 8.0}, {"Id": "finding-2", "Severity": 5.0}]
|
|
219
|
+
}
|
|
220
|
+
|
|
221
|
+
result = self.collector._list_and_get_findings(mock_client, detector_id)
|
|
222
|
+
|
|
223
|
+
assert len(result) == 2
|
|
224
|
+
assert result[0]["Region"] == self.region
|
|
225
|
+
assert result[0]["DetectorId"] == detector_id
|
|
226
|
+
|
|
227
|
+
def test_list_and_get_findings_no_findings(self):
|
|
228
|
+
"""Test findings retrieval with no findings."""
|
|
229
|
+
mock_client = MagicMock()
|
|
230
|
+
detector_id = "test-detector"
|
|
231
|
+
mock_client.list_findings.return_value = {"FindingIds": []}
|
|
232
|
+
|
|
233
|
+
result = self.collector._list_and_get_findings(mock_client, detector_id)
|
|
234
|
+
|
|
235
|
+
assert result == []
|
|
236
|
+
mock_client.get_findings.assert_not_called()
|
|
237
|
+
|
|
238
|
+
def test_list_and_get_findings_access_denied(self):
|
|
239
|
+
"""Test findings retrieval with access denied."""
|
|
240
|
+
mock_client = MagicMock()
|
|
241
|
+
detector_id = "test-detector"
|
|
242
|
+
error_response = {"Error": {"Code": "AccessDeniedException", "Message": "Access denied"}}
|
|
243
|
+
mock_client.list_findings.side_effect = ClientError(error_response, "list_findings")
|
|
244
|
+
|
|
245
|
+
result = self.collector._list_and_get_findings(mock_client, detector_id)
|
|
246
|
+
|
|
247
|
+
assert result == []
|
|
248
|
+
|
|
249
|
+
def test_list_and_get_findings_with_max_limit(self):
|
|
250
|
+
"""Test findings retrieval respects max_findings parameter."""
|
|
251
|
+
mock_client = MagicMock()
|
|
252
|
+
detector_id = "test-detector"
|
|
253
|
+
max_findings = 10
|
|
254
|
+
|
|
255
|
+
mock_client.list_findings.return_value = {"FindingIds": ["finding-1"]}
|
|
256
|
+
mock_client.get_findings.return_value = {"Findings": [{"Id": "finding-1"}]}
|
|
257
|
+
|
|
258
|
+
self.collector._list_and_get_findings(mock_client, detector_id, max_findings=max_findings)
|
|
259
|
+
|
|
260
|
+
# Verify MaxResults was passed
|
|
261
|
+
call_args = mock_client.list_findings.call_args[1]
|
|
262
|
+
assert call_args["MaxResults"] == max_findings
|
|
263
|
+
|
|
264
|
+
def test_list_members_success(self):
|
|
265
|
+
"""Test successful members listing."""
|
|
266
|
+
mock_client = MagicMock()
|
|
267
|
+
detector_id = "test-detector"
|
|
268
|
+
mock_client.list_members.return_value = {
|
|
269
|
+
"Members": [{"AccountId": "111111111111", "Email": "test@example.com"}]
|
|
270
|
+
}
|
|
271
|
+
|
|
272
|
+
result = self.collector._list_members(mock_client, detector_id)
|
|
273
|
+
|
|
274
|
+
assert len(result) == 1
|
|
275
|
+
assert result[0]["Region"] == self.region
|
|
276
|
+
assert result[0]["DetectorId"] == detector_id
|
|
277
|
+
|
|
278
|
+
def test_list_members_access_denied(self):
|
|
279
|
+
"""Test members listing with access denied."""
|
|
280
|
+
mock_client = MagicMock()
|
|
281
|
+
detector_id = "test-detector"
|
|
282
|
+
error_response = {"Error": {"Code": "AccessDeniedException", "Message": "Access denied"}}
|
|
283
|
+
mock_client.list_members.side_effect = ClientError(error_response, "list_members")
|
|
284
|
+
|
|
285
|
+
result = self.collector._list_members(mock_client, detector_id)
|
|
286
|
+
|
|
287
|
+
assert result == []
|
|
288
|
+
|
|
289
|
+
def test_list_members_other_error(self):
|
|
290
|
+
"""Test members listing with other error."""
|
|
291
|
+
mock_client = MagicMock()
|
|
292
|
+
detector_id = "test-detector"
|
|
293
|
+
error_response = {"Error": {"Code": "InternalError", "Message": "Internal error"}}
|
|
294
|
+
mock_client.list_members.side_effect = ClientError(error_response, "list_members")
|
|
295
|
+
|
|
296
|
+
result = self.collector._list_members(mock_client, detector_id)
|
|
297
|
+
|
|
298
|
+
assert result == []
|
|
299
|
+
|
|
300
|
+
def test_matches_account_id_with_matching_id(self):
|
|
301
|
+
"""Test account ID matching with matching ID."""
|
|
302
|
+
assert self.collector._matches_account_id(self.account_id) is True
|
|
303
|
+
|
|
304
|
+
def test_matches_account_id_with_non_matching_id(self):
|
|
305
|
+
"""Test account ID matching with non-matching ID."""
|
|
306
|
+
assert self.collector._matches_account_id("999999999999") is False
|
|
307
|
+
|
|
308
|
+
def test_matches_account_id_without_filter(self):
|
|
309
|
+
"""Test account ID matching without account filter."""
|
|
310
|
+
collector = GuardDutyCollector(self.mock_session, self.region)
|
|
311
|
+
assert collector._matches_account_id("999999999999") is True
|
|
312
|
+
|
|
313
|
+
|
|
314
|
+
if __name__ == "__main__":
|
|
315
|
+
pytest.main([__file__, "-v"])
|