diff --git a/.github/ISSUE_TEMPLATE/bug_report.md b/.github/ISSUE_TEMPLATE/bug_report.md index edb3d410751..c4aaef3c5a0 100644 --- a/.github/ISSUE_TEMPLATE/bug_report.md +++ b/.github/ISSUE_TEMPLATE/bug_report.md @@ -15,30 +15,30 @@ PROTIP: record your screen and attach it as a gif to showcase the issue. - How to record and attach gif: https://bit.ly/2Mi8T6K --> -**What happened?** +**What happened?** A clear and concise description of what the bug is or what is not working as expected -**How to reproduce it** +**How to reproduce it** Steps to reproduce the behavior: 1. What command are you running? 2. Environment you have, like single account, multi-account, organizations, etc. 3. See error -**Expected behavior** +**Expected behavior** A clear and concise description of what you expected to happen. -**Screenshots or Logs** +**Screenshots or Logs** If applicable, add screenshots to help explain your problem. Also, you can add logs (anonymize them first!). Here a command that may help to share a log `bash -x ./prowler -options > debug.log 2>&1` then attach here `debug.log` -**From where are you running Prowler?** +**From where are you running Prowler?** Please, complete the following information: - - Resource: [e.g. EC2 instance, Fargate task, Docker container manually, EKS, Cloud9, CodeBuild, workstation, etc.) + - Resource: [e.g. EC2 instance, Fargate task, Docker container manually, EKS, Cloud9, CodeBuild, workstation, etc.) - OS: [e.g. Amazon Linux 2, Mac, Alpine, Windows, etc. ] - AWS-CLI Version [`aws --version`]: - Prowler Version [`./prowler -V`]: diff --git a/.github/pull_request_template.md b/.github/pull_request_template.md index 73692ae0712..1c82e697a2e 100644 --- a/.github/pull_request_template.md +++ b/.github/pull_request_template.md @@ -1,4 +1,4 @@ -### Context +### Context Please include relevant motivation and context for this PR. diff --git a/.github/workflows/build-lint-push-containers.yml b/.github/workflows/build-lint-push-containers.yml index 35ac697aa47..a734ecfa3ff 100644 --- a/.github/workflows/build-lint-push-containers.yml +++ b/.github/workflows/build-lint-push-containers.yml @@ -7,7 +7,7 @@ on: paths-ignore: - '.github/**' - 'README.md' - + release: types: [published] diff --git a/.github/workflows/pull-request.yml b/.github/workflows/pull-request.yml index fe3a8f25580..52ecb5c910a 100644 --- a/.github/workflows/pull-request.yml +++ b/.github/workflows/pull-request.yml @@ -3,14 +3,13 @@ name: Lint & Test on: push: branches: - - 'prowler-3.0-dev' + - "prowler-3.0-dev" pull_request: branches: - - 'prowler-3.0-dev' + - "prowler-3.0-dev" jobs: build: - runs-on: ubuntu-latest strategy: matrix: @@ -36,7 +35,7 @@ jobs: pipenv run black --check . - name: Lint with pylint run: | - pipenv run pylint --disable=W,C,R,E -j 0 providers lib util config + pipenv run pylint --disable=W,C,R,E -j 0 -rn -sn prowler/ - name: Bandit run: | pipenv run bandit -q -lll -x '*_test.py,./contrib/' -r . @@ -48,4 +47,4 @@ jobs: pipenv run vulture --exclude "contrib" --min-confidence 100 . - name: Test with pytest run: | - pipenv run pytest -n auto + pipenv run pytest tests -n auto diff --git a/.github/workflows/refresh_aws_services_regions.yml b/.github/workflows/refresh_aws_services_regions.yml index 1d17c77b857..243f1ba1a51 100644 --- a/.github/workflows/refresh_aws_services_regions.yml +++ b/.github/workflows/refresh_aws_services_regions.yml @@ -44,7 +44,7 @@ jobs: ### Description This PR updates the regions for AWS services. - + ### License By submitting this pull request, I confirm that my contribution is made under the terms of the Apache 2.0 license. diff --git a/.gitignore b/.gitignore index b7f67fa9f54..15936b9bef6 100644 --- a/.gitignore +++ b/.gitignore @@ -8,6 +8,9 @@ # Python code __pycache__ venv/ +build/ +dist/ +*.egg-info/ # Session Session.vim diff --git a/.pre-commit-config.yaml b/.pre-commit-config.yaml index ee56761ce8b..7baa9ceb20c 100644 --- a/.pre-commit-config.yaml +++ b/.pre-commit-config.yaml @@ -57,12 +57,12 @@ repos: hooks: - id: pylint name: pylint - entry: bash -c 'pylint --disable=W,C,R,E -j 0 -rn -sn providers lib util config' + entry: bash -c 'pylint --disable=W,C,R,E -j 0 -rn -sn prowler/' language: system - id: pytest-check name: pytest-check - entry: bash -c 'pytest -n auto' + entry: bash -c 'pytest tests -n auto' language: system - id: bandit diff --git a/LICENSE b/LICENSE index 0903645a6a9..2b1debddd2b 100644 --- a/LICENSE +++ b/LICENSE @@ -198,4 +198,4 @@ Copyright 2018 Netflix, Inc. distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and - limitations under the License. \ No newline at end of file + limitations under the License. diff --git a/Makefile b/Makefile index 3fd9a469663..a8a5eb7c4eb 100644 --- a/Makefile +++ b/Makefile @@ -22,6 +22,18 @@ lint: ## Lint Code @echo "Running pylint..." pylint --disable=W,C,R,E -j 0 providers lib util config +##@ PyPI +pypi-clean: ## Delete the distribution files + rm -rf ./dist && rm -rf ./build && rm -rf prowler_cloud.egg-info + +pypi-build: ## Build package + $(MAKE) pypi-clean && \ + python3 -m build + +pypi-upload: ## Upload package + python3 -m twine upload --repository pypi dist/* + + ##@ Help help: ## Show this help. @echo "Prowler Makefile" diff --git a/Pipfile b/Pipfile index 368062aa5b2..cb767796086 100644 --- a/Pipfile +++ b/Pipfile @@ -28,7 +28,7 @@ flake8 = "5.0.4" bandit = "1.7.4" safety = "2.3.1" vulture = "2.6" -moto = "4.0.9" +moto = "4.0.11" docker = "6.0.0" openapi-spec-validator = "0.5.1" pytest = "7.1.2" diff --git a/Pipfile.lock b/Pipfile.lock index e94f2a0345c..3d458fe9d11 100644 --- a/Pipfile.lock +++ b/Pipfile.lock @@ -1,1508 +1,1500 @@ { - "_meta": { - "hash": { - "sha256": "7860a43544b6af1c974d803ad88cd25d6750e4c72d98b71097baa3d59a260288" - }, - "pipfile-spec": 6, - "requires": { - "python_version": "3.9" - }, - "sources": [ - { - "name": "pypi", - "url": "https://pypi.org/simple", - "verify_ssl": true - } - ] - }, - "default": { - "about-time": { - "hashes": [ - "sha256:586b329450c9387d1ae8c42d2db4f5b4c57a54508d0f1b7bb00322ffd5ce9f9b", - "sha256:96841beb3f9b5de1cbb323d2bdb0fa9abdecbc46f2d546b9b3c2483d23daa17a" - ], - "version": "==3.1.1" - }, - "alive-progress": { - "hashes": [ - "sha256:089757c8197f27ad972ba27e1060f6db92368d83c736884e159034fd74865323", - "sha256:5503ffca0a0607d5f0d24d3b10a718fe50e375470fa07602b246333eb7ec88ee" - ], - "index": "pypi", - "version": "==2.4.1" - }, - "arnparse": { - "hashes": [ - "sha256:b0906734e4b8f19e39b1e32944c6cd6274b6da90c066a83882ac7a11d27553e0", - "sha256:cb87f17200d07121108a9085d4a09cc69a55582647776b9a917b0b1f279db8f8" - ], - "index": "pypi", - "version": "==0.0.2" - }, - "azure-common": { - "hashes": [ - "sha256:4ac0cd3214e36b6a1b6a442686722a5d8cc449603aa833f3f0f40bda836704a3", - "sha256:5c12d3dcf4ec20599ca6b0d3e09e86e146353d443e7fcc050c9a19c1f9df20ad" - ], - "version": "==1.1.28" - }, - "azure-core": { - "hashes": [ - "sha256:223b0e90cbdd1f03c41b195b03239899843f20d00964dbb85e64386873414a2d", - "sha256:726ffd1ded04a2c1cb53f9d9155cbb05ac5c1c2a29af4ef622e93e1c0a8bc92b" - ], - "markers": "python_version >= '3.7'", - "version": "==1.26.1" - }, - "azure-identity": { - "hashes": [ - "sha256:2a58ce4a209a013e37eaccfd5937570ab99e9118b3e1acf875eed3a85d541b92", - "sha256:7f9b1ae7d97ea7af3f38dd09305e19ab81a1e16ab66ea186b6579d85c1ca2347" - ], - "index": "pypi", - "version": "==1.12.0" - }, - "azure-mgmt-authorization": { - "hashes": [ - "sha256:0a5d7f683bf3372236b841cdbd4677f6b08ed7ce41b999c3e644d4286252057d", - "sha256:b3f9e584b87d5cc39d41283211237945e620c0b868394880aeded80a126b2c40" - ], - "index": "pypi", - "version": "==3.0.0" - }, - "azure-mgmt-core": { - "hashes": [ - "sha256:07f4afe823a55d704b048d61edfdc1318c051ed59f244032126350be95e9d501", - "sha256:fd829f67086e5cf6f7eb016c9e80bb0fb293cbbbd4d8738dc90af9aa1055fb7b" - ], - "markers": "python_version >= '3.6'", - "version": "==1.3.2" - }, - "azure-mgmt-security": { - "hashes": [ - "sha256:3b14a236383effdc5e3135b394b7883a183fcc9cdde01b735b2aae227b42e2e9", - "sha256:bcba7cef857f6b02a2d98afeb07f9871b1628fa33d8861ab1387e732e7db3f84" - ], - "index": "pypi", - "version": "==3.0.0" - }, - "azure-mgmt-storage": { - "hashes": [ - "sha256:6eb13eeecf89195b2b5f47be0679e3f27888efd7bd2132eec7ebcbce75cb1377", - "sha256:89d644c6192118b0b097deaa9c4925832d8f7ea4693d38d5fce3f0125b43a1c5" - ], - "index": "pypi", - "version": "==21.0.0" - }, - "azure-mgmt-subscription": { - "hashes": [ - "sha256:38d4574a8d47fa17e3587d756e296cb63b82ad8fb21cd8543bcee443a502bf48", - "sha256:4e255b4ce9b924357bb8c5009b3c88a2014d3203b2495e2256fa027bf84e800e" - ], - "index": "pypi", - "version": "==3.1.1" - }, - "azure-storage-blob": { - "hashes": [ - "sha256:52b84658e8df7853a3cf1c563814655b5028b979b2a87905b92aa6bb30be240e", - "sha256:860d4d82985a4bfc7d3271e71275af330f54f330a754355435a7ba749ccde997" - ], - "index": "pypi", - "version": "==12.14.1" - }, - "boto3": { - "hashes": [ - "sha256:4b4edf893b01c651007d61534c1d248cd2350d311a4e295039bd23fd60bf899a", - "sha256:59aa6c7810a815fb52671f834d10ac4cd80b9c7c01a3cbde670cb41330059464" - ], - "index": "pypi", - "version": "==1.26.19" - }, - "botocore": { - "hashes": [ - "sha256:917807ee4ccca34a2f2848eb4fcf878d9e97a44a911a6965ff556d0830c471fd", - "sha256:a54561e591f5d8e653657ce04dcad09c10ebca9dbefba73471976e522abf038a" - ], - "index": "pypi", - "version": "==1.29.19" - }, - "certifi": { - "hashes": [ - "sha256:0d9c601124e5a6ba9712dbc60d9c53c21e34f5f641fe83002317394311bdce14", - "sha256:90c1a32f1d68f940488354e36370f6cca89f0f106db09518524c88d6ed83f382" - ], - "markers": "python_version >= '3.6'", - "version": "==2022.9.24" - }, - "cffi": { - "hashes": [ - "sha256:00a9ed42e88df81ffae7a8ab6d9356b371399b91dbdf0c3cb1e84c03a13aceb5", - "sha256:03425bdae262c76aad70202debd780501fabeaca237cdfddc008987c0e0f59ef", - "sha256:04ed324bda3cda42b9b695d51bb7d54b680b9719cfab04227cdd1e04e5de3104", - "sha256:0e2642fe3142e4cc4af0799748233ad6da94c62a8bec3a6648bf8ee68b1c7426", - "sha256:173379135477dc8cac4bc58f45db08ab45d228b3363adb7af79436135d028405", - "sha256:198caafb44239b60e252492445da556afafc7d1e3ab7a1fb3f0584ef6d742375", - "sha256:1e74c6b51a9ed6589199c787bf5f9875612ca4a8a0785fb2d4a84429badaf22a", - "sha256:2012c72d854c2d03e45d06ae57f40d78e5770d252f195b93f581acf3ba44496e", - "sha256:21157295583fe8943475029ed5abdcf71eb3911894724e360acff1d61c1d54bc", - "sha256:2470043b93ff09bf8fb1d46d1cb756ce6132c54826661a32d4e4d132e1977adf", - "sha256:285d29981935eb726a4399badae8f0ffdff4f5050eaa6d0cfc3f64b857b77185", - "sha256:30d78fbc8ebf9c92c9b7823ee18eb92f2e6ef79b45ac84db507f52fbe3ec4497", - "sha256:320dab6e7cb2eacdf0e658569d2575c4dad258c0fcc794f46215e1e39f90f2c3", - "sha256:33ab79603146aace82c2427da5ca6e58f2b3f2fb5da893ceac0c42218a40be35", - "sha256:3548db281cd7d2561c9ad9984681c95f7b0e38881201e157833a2342c30d5e8c", - "sha256:3799aecf2e17cf585d977b780ce79ff0dc9b78d799fc694221ce814c2c19db83", - "sha256:39d39875251ca8f612b6f33e6b1195af86d1b3e60086068be9cc053aa4376e21", - "sha256:3b926aa83d1edb5aa5b427b4053dc420ec295a08e40911296b9eb1b6170f6cca", - "sha256:3bcde07039e586f91b45c88f8583ea7cf7a0770df3a1649627bf598332cb6984", - "sha256:3d08afd128ddaa624a48cf2b859afef385b720bb4b43df214f85616922e6a5ac", - "sha256:3eb6971dcff08619f8d91607cfc726518b6fa2a9eba42856be181c6d0d9515fd", - "sha256:40f4774f5a9d4f5e344f31a32b5096977b5d48560c5592e2f3d2c4374bd543ee", - "sha256:4289fc34b2f5316fbb762d75362931e351941fa95fa18789191b33fc4cf9504a", - "sha256:470c103ae716238bbe698d67ad020e1db9d9dba34fa5a899b5e21577e6d52ed2", - "sha256:4f2c9f67e9821cad2e5f480bc8d83b8742896f1242dba247911072d4fa94c192", - "sha256:50a74364d85fd319352182ef59c5c790484a336f6db772c1a9231f1c3ed0cbd7", - "sha256:54a2db7b78338edd780e7ef7f9f6c442500fb0d41a5a4ea24fff1c929d5af585", - "sha256:5635bd9cb9731e6d4a1132a498dd34f764034a8ce60cef4f5319c0541159392f", - "sha256:59c0b02d0a6c384d453fece7566d1c7e6b7bae4fc5874ef2ef46d56776d61c9e", - "sha256:5d598b938678ebf3c67377cdd45e09d431369c3b1a5b331058c338e201f12b27", - "sha256:5df2768244d19ab7f60546d0c7c63ce1581f7af8b5de3eb3004b9b6fc8a9f84b", - "sha256:5ef34d190326c3b1f822a5b7a45f6c4535e2f47ed06fec77d3d799c450b2651e", - "sha256:6975a3fac6bc83c4a65c9f9fcab9e47019a11d3d2cf7f3c0d03431bf145a941e", - "sha256:6c9a799e985904922a4d207a94eae35c78ebae90e128f0c4e521ce339396be9d", - "sha256:70df4e3b545a17496c9b3f41f5115e69a4f2e77e94e1d2a8e1070bc0c38c8a3c", - "sha256:7473e861101c9e72452f9bf8acb984947aa1661a7704553a9f6e4baa5ba64415", - "sha256:8102eaf27e1e448db915d08afa8b41d6c7ca7a04b7d73af6514df10a3e74bd82", - "sha256:87c450779d0914f2861b8526e035c5e6da0a3199d8f1add1a665e1cbc6fc6d02", - "sha256:8b7ee99e510d7b66cdb6c593f21c043c248537a32e0bedf02e01e9553a172314", - "sha256:91fc98adde3d7881af9b59ed0294046f3806221863722ba7d8d120c575314325", - "sha256:94411f22c3985acaec6f83c6df553f2dbe17b698cc7f8ae751ff2237d96b9e3c", - "sha256:98d85c6a2bef81588d9227dde12db8a7f47f639f4a17c9ae08e773aa9c697bf3", - "sha256:9ad5db27f9cabae298d151c85cf2bad1d359a1b9c686a275df03385758e2f914", - "sha256:a0b71b1b8fbf2b96e41c4d990244165e2c9be83d54962a9a1d118fd8657d2045", - "sha256:a0f100c8912c114ff53e1202d0078b425bee3649ae34d7b070e9697f93c5d52d", - "sha256:a591fe9e525846e4d154205572a029f653ada1a78b93697f3b5a8f1f2bc055b9", - "sha256:a5c84c68147988265e60416b57fc83425a78058853509c1b0629c180094904a5", - "sha256:a66d3508133af6e8548451b25058d5812812ec3798c886bf38ed24a98216fab2", - "sha256:a8c4917bd7ad33e8eb21e9a5bbba979b49d9a97acb3a803092cbc1133e20343c", - "sha256:b3bbeb01c2b273cca1e1e0c5df57f12dce9a4dd331b4fa1635b8bec26350bde3", - "sha256:cba9d6b9a7d64d4bd46167096fc9d2f835e25d7e4c121fb2ddfc6528fb0413b2", - "sha256:cc4d65aeeaa04136a12677d3dd0b1c0c94dc43abac5860ab33cceb42b801c1e8", - "sha256:ce4bcc037df4fc5e3d184794f27bdaab018943698f4ca31630bc7f84a7b69c6d", - "sha256:cec7d9412a9102bdc577382c3929b337320c4c4c4849f2c5cdd14d7368c5562d", - "sha256:d400bfb9a37b1351253cb402671cea7e89bdecc294e8016a707f6d1d8ac934f9", - "sha256:d61f4695e6c866a23a21acab0509af1cdfd2c013cf256bbf5b6b5e2695827162", - "sha256:db0fbb9c62743ce59a9ff687eb5f4afbe77e5e8403d6697f7446e5f609976f76", - "sha256:dd86c085fae2efd48ac91dd7ccffcfc0571387fe1193d33b6394db7ef31fe2a4", - "sha256:e00b098126fd45523dd056d2efba6c5a63b71ffe9f2bbe1a4fe1716e1d0c331e", - "sha256:e229a521186c75c8ad9490854fd8bbdd9a0c9aa3a524326b55be83b54d4e0ad9", - "sha256:e263d77ee3dd201c3a142934a086a4450861778baaeeb45db4591ef65550b0a6", - "sha256:ed9cb427ba5504c1dc15ede7d516b84757c3e3d7868ccc85121d9310d27eed0b", - "sha256:fa6693661a4c91757f4412306191b6dc88c1703f780c8234035eac011922bc01", - "sha256:fcd131dd944808b5bdb38e6f5b53013c5aa4f334c5cad0c72742f6eba4b73db0" - ], - "version": "==1.15.1" - }, - "charset-normalizer": { - "hashes": [ - "sha256:5a3d016c7c547f69d6f81fb0db9449ce888b418b5b9952cc5e6e66843e9dd845", - "sha256:83e9a75d1911279afd89352c68b45348559d1fc0506b054b346651b5e7fee29f" - ], - "markers": "python_version >= '3.6'", - "version": "==2.1.1" - }, - "click": { - "hashes": [ - "sha256:7682dc8afb30297001674575ea00d1814d808d6a36af415a82bd481d37ba7b8e", - "sha256:bb4d8133cb15a609f44e8213d9b391b0809795062913b383c62be0ee95b1db48" - ], - "markers": "python_version >= '3.7'", - "version": "==8.1.3" - }, - "click-plugins": { - "hashes": [ - "sha256:46ab999744a9d831159c3411bb0c79346d94a444df9a3a3742e9ed63645f264b", - "sha256:5d262006d3222f5057fd81e1623d4443e41dcda5dc815c06b442aa3c02889fc8" - ], - "version": "==1.1.1" - }, - "colorama": { - "hashes": [ - "sha256:08695f5cb7ed6e0531a20572697297273c47b8cae5a63ffc6d6ed5c201be6e44", - "sha256:4f1d9991f5acc0ca119f9d443620b77f9d6b33703e51011c16baf57afb285fc6" - ], - "index": "pypi", - "version": "==0.4.6" - }, - "cryptography": { - "hashes": [ - "sha256:0e70da4bdff7601b0ef48e6348339e490ebfb0cbe638e083c9c41fb49f00c8bd", - "sha256:10652dd7282de17990b88679cb82f832752c4e8237f0c714be518044269415db", - "sha256:175c1a818b87c9ac80bb7377f5520b7f31b3ef2a0004e2420319beadedb67290", - "sha256:1d7e632804a248103b60b16fb145e8df0bc60eed790ece0d12efe8cd3f3e7744", - "sha256:1f13ddda26a04c06eb57119caf27a524ccae20533729f4b1e4a69b54e07035eb", - "sha256:2ec2a8714dd005949d4019195d72abed84198d877112abb5a27740e217e0ea8d", - "sha256:2fa36a7b2cc0998a3a4d5af26ccb6273f3df133d61da2ba13b3286261e7efb70", - "sha256:2fb481682873035600b5502f0015b664abc26466153fab5c6bc92c1ea69d478b", - "sha256:3178d46f363d4549b9a76264f41c6948752183b3f587666aff0555ac50fd7876", - "sha256:4367da5705922cf7070462e964f66e4ac24162e22ab0a2e9d31f1b270dd78083", - "sha256:4eb85075437f0b1fd8cd66c688469a0c4119e0ba855e3fef86691971b887caf6", - "sha256:50a1494ed0c3f5b4d07650a68cd6ca62efe8b596ce743a5c94403e6f11bf06c1", - "sha256:53049f3379ef05182864d13bb9686657659407148f901f3f1eee57a733fb4b00", - "sha256:6391e59ebe7c62d9902c24a4d8bcbc79a68e7c4ab65863536127c8a9cd94043b", - "sha256:67461b5ebca2e4c2ab991733f8ab637a7265bb582f07c7c88914b5afb88cb95b", - "sha256:78e47e28ddc4ace41dd38c42e6feecfdadf9c3be2af389abbfeef1ff06822285", - "sha256:80ca53981ceeb3241998443c4964a387771588c4e4a5d92735a493af868294f9", - "sha256:8a4b2bdb68a447fadebfd7d24855758fe2d6fecc7fed0b78d190b1af39a8e3b0", - "sha256:8e45653fb97eb2f20b8c96f9cd2b3a0654d742b47d638cf2897afbd97f80fa6d", - "sha256:998cd19189d8a747b226d24c0207fdaa1e6658a1d3f2494541cb9dfbf7dcb6d2", - "sha256:a10498349d4c8eab7357a8f9aa3463791292845b79597ad1b98a543686fb1ec8", - "sha256:b4cad0cea995af760f82820ab4ca54e5471fc782f70a007f31531957f43e9dee", - "sha256:bfe6472507986613dc6cc00b3d492b2f7564b02b3b3682d25ca7f40fa3fd321b", - "sha256:c9e0d79ee4c56d841bd4ac6e7697c8ff3c8d6da67379057f29e66acffcd1e9a7", - "sha256:ca57eb3ddaccd1112c18fc80abe41db443cc2e9dcb1917078e02dfa010a4f353", - "sha256:ce127dd0a6a0811c251a6cddd014d292728484e530d80e872ad9806cfb1c5b3c" - ], - "markers": "python_version >= '3.6'", - "version": "==38.0.4" - }, - "detect-secrets": { - "hashes": [ - "sha256:d08ecabeee8b68c0acb0e8a354fb98d822a653f6ed05e520cead4c6fc1fc02cd", - "sha256:d56787e339758cef48c9ccd6692f7a094b9963c979c9813580b0169e41132833" - ], - "index": "pypi", - "version": "==1.4.0" - }, - "grapheme": { - "hashes": [ - "sha256:44c2b9f21bbe77cfb05835fec230bd435954275267fea1858013b102f8603cca" - ], - "version": "==0.6.0" - }, - "idna": { - "hashes": [ - "sha256:814f528e8dead7d329833b91c5faa87d60bf71824cd12a7530b5526063d02cb4", - "sha256:90b77e79eaa3eba6de819a0c442c0b4ceefc341a7a2ab77d7562bf49f425c5c2" - ], - "markers": "python_version >= '3.5'", - "version": "==3.4" - }, - "isodate": { - "hashes": [ - "sha256:0751eece944162659049d35f4f549ed815792b38793f07cf73381c1c87cbed96", - "sha256:48c5881de7e8b0a0d648cb024c8062dc84e7b840ed81e864c7614fd3c127bde9" - ], - "version": "==0.6.1" - }, - "jmespath": { - "hashes": [ - "sha256:02e2e4cc71b5bcab88332eebf907519190dd9e6e82107fa7f83b1003a6252980", - "sha256:90261b206d6defd58fdd5e85f478bf633a2901798906be2ad389150c5c60edbe" - ], - "markers": "python_version >= '3.7'", - "version": "==1.0.1" - }, - "msal": { - "hashes": [ - "sha256:78344cd4c91d6134a593b5e3e45541e666e37b747ff8a6316c3668dd1e6ab6b2", - "sha256:d2f1c26368ecdc28c8657d457352faa0b81b1845a7b889d8676787721ba86792" - ], - "version": "==1.20.0" - }, - "msal-extensions": { - "hashes": [ - "sha256:91e3db9620b822d0ed2b4d1850056a0f133cba04455e62f11612e40f5502f2ee", - "sha256:c676aba56b0cce3783de1b5c5ecfe828db998167875126ca4b47dc6436451354" - ], - "version": "==1.0.0" - }, - "msgraph-core": { - "hashes": [ - "sha256:147324246788abe8ed7e05534cd9e4e0ec98b33b30e011693b8d014cebf97f63", - "sha256:e297564b9a0ca228493d8851f95cb2de9522143d82efa40ce3a6ad286e21392e" - ], - "index": "pypi", - "version": "==0.2.2" - }, - "msrest": { - "hashes": [ - "sha256:21120a810e1233e5e6cc7fe40b474eeb4ec6f757a15d7cf86702c369f9567c32", - "sha256:6e7661f46f3afd88b75667b7187a92829924446c7ea1d169be8c4bb7eeb788b9" - ], - "markers": "python_version >= '3.6'", - "version": "==0.7.1" - }, - "oauthlib": { - "hashes": [ - "sha256:8139f29aac13e25d502680e9e19963e83f16838d48a0d71c287fe40e7067fbca", - "sha256:9859c40929662bec5d64f34d01c99e093149682a3f38915dc0655d5a633dd918" - ], - "markers": "python_version >= '3.6'", - "version": "==3.2.2" - }, - "portalocker": { - "hashes": [ - "sha256:102ed1f2badd8dec9af3d732ef70e94b215b85ba45a8d7ff3c0003f19b442f4e", - "sha256:964f6830fb42a74b5d32bce99ed37d8308c1d7d44ddf18f3dd89f4680de97b39" - ], - "markers": "python_version >= '3.5' and platform_system != 'Windows'", - "version": "==2.6.0" - }, - "pycparser": { - "hashes": [ - "sha256:8ee45429555515e1f6b185e78100aea234072576aa43ab53aefcae078162fca9", - "sha256:e644fdec12f7872f86c58ff790da456218b10f863970249516d60a5eaca77206" - ], - "version": "==2.21" - }, - "pydantic": { - "hashes": [ - "sha256:05e00dbebbe810b33c7a7362f231893183bcc4251f3f2ff991c31d5c08240c42", - "sha256:06094d18dd5e6f2bbf93efa54991c3240964bb663b87729ac340eb5014310624", - "sha256:0b959f4d8211fc964772b595ebb25f7652da3f22322c007b6fed26846a40685e", - "sha256:19b3b9ccf97af2b7519c42032441a891a5e05c68368f40865a90eb88833c2559", - "sha256:1b6ee725bd6e83ec78b1aa32c5b1fa67a3a65badddde3976bca5fe4568f27709", - "sha256:1ee433e274268a4b0c8fde7ad9d58ecba12b069a033ecc4645bb6303c062d2e9", - "sha256:216f3bcbf19c726b1cc22b099dd409aa371f55c08800bcea4c44c8f74b73478d", - "sha256:2d0567e60eb01bccda3a4df01df677adf6b437958d35c12a3ac3e0f078b0ee52", - "sha256:2e05aed07fa02231dbf03d0adb1be1d79cabb09025dd45aa094aa8b4e7b9dcda", - "sha256:352aedb1d71b8b0736c6d56ad2bd34c6982720644b0624462059ab29bd6e5912", - "sha256:355639d9afc76bcb9b0c3000ddcd08472ae75318a6eb67a15866b87e2efa168c", - "sha256:37c90345ec7dd2f1bcef82ce49b6235b40f282b94d3eec47e801baf864d15525", - "sha256:4b8795290deaae348c4eba0cebb196e1c6b98bdbe7f50b2d0d9a4a99716342fe", - "sha256:5760e164b807a48a8f25f8aa1a6d857e6ce62e7ec83ea5d5c5a802eac81bad41", - "sha256:6eb843dcc411b6a2237a694f5e1d649fc66c6064d02b204a7e9d194dff81eb4b", - "sha256:7b5ba54d026c2bd2cb769d3468885f23f43710f651688e91f5fb1edcf0ee9283", - "sha256:7c2abc4393dea97a4ccbb4ec7d8658d4e22c4765b7b9b9445588f16c71ad9965", - "sha256:81a7b66c3f499108b448f3f004801fcd7d7165fb4200acb03f1c2402da73ce4c", - "sha256:91b8e218852ef6007c2b98cd861601c6a09f1aa32bbbb74fab5b1c33d4a1e410", - "sha256:9300fcbebf85f6339a02c6994b2eb3ff1b9c8c14f502058b5bf349d42447dcf5", - "sha256:9cabf4a7f05a776e7793e72793cd92cc865ea0e83a819f9ae4ecccb1b8aa6116", - "sha256:a1f5a63a6dfe19d719b1b6e6106561869d2efaca6167f84f5ab9347887d78b98", - "sha256:a4c805731c33a8db4b6ace45ce440c4ef5336e712508b4d9e1aafa617dc9907f", - "sha256:ae544c47bec47a86bc7d350f965d8b15540e27e5aa4f55170ac6a75e5f73b644", - "sha256:b97890e56a694486f772d36efd2ba31612739bc6f3caeee50e9e7e3ebd2fdd13", - "sha256:bb6ad4489af1bac6955d38ebcb95079a836af31e4c4f74aba1ca05bb9f6027bd", - "sha256:bedf309630209e78582ffacda64a21f96f3ed2e51fbf3962d4d488e503420254", - "sha256:c1ba1afb396148bbc70e9eaa8c06c1716fdddabaf86e7027c5988bae2a829ab6", - "sha256:c33602f93bfb67779f9c507e4d69451664524389546bacfe1bee13cae6dc7488", - "sha256:c4aac8e7103bf598373208f6299fa9a5cfd1fc571f2d40bf1dd1955a63d6eeb5", - "sha256:c6f981882aea41e021f72779ce2a4e87267458cc4d39ea990729e21ef18f0f8c", - "sha256:cc78cc83110d2f275ec1970e7a831f4e371ee92405332ebfe9860a715f8336e1", - "sha256:d49f3db871575e0426b12e2f32fdb25e579dea16486a26e5a0474af87cb1ab0a", - "sha256:dd3f9a40c16daf323cf913593083698caee97df2804aa36c4b3175d5ac1b92a2", - "sha256:e0bedafe4bc165ad0a56ac0bd7695df25c50f76961da29c050712596cf092d6d", - "sha256:e9069e1b01525a96e6ff49e25876d90d5a563bc31c658289a8772ae186552236" - ], - "index": "pypi", - "version": "==1.10.2" - }, - "pyjwt": { - "extras": [ - "crypto" - ], - "hashes": [ - "sha256:69285c7e31fc44f68a1feb309e948e0df53259d579295e6cfe2b1792329f05fd", - "sha256:d83c3d892a77bbb74d3e1a2cfa90afaadb60945205d1095d9221f04466f64c14" - ], - "markers": "python_version >= '3.7'", - "version": "==2.6.0" - }, - "python-dateutil": { - "hashes": [ - "sha256:0123cacc1627ae19ddf3c27a5de5bd67ee4586fbdd6440d9748f8abb483d3e86", - "sha256:961d03dc3453ebbc59dbdea9e4e11c5651520a876d0f4db161e8674aae935da9" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", - "version": "==2.8.2" - }, - "pyyaml": { - "hashes": [ - "sha256:01b45c0191e6d66c470b6cf1b9531a771a83c1c4208272ead47a3ae4f2f603bf", - "sha256:0283c35a6a9fbf047493e3a0ce8d79ef5030852c51e9d911a27badfde0605293", - "sha256:055d937d65826939cb044fc8c9b08889e8c743fdc6a32b33e2390f66013e449b", - "sha256:07751360502caac1c067a8132d150cf3d61339af5691fe9e87803040dbc5db57", - "sha256:0b4624f379dab24d3725ffde76559cff63d9ec94e1736b556dacdfebe5ab6d4b", - "sha256:0ce82d761c532fe4ec3f87fc45688bdd3a4c1dc5e0b4a19814b9009a29baefd4", - "sha256:1e4747bc279b4f613a09eb64bba2ba602d8a6664c6ce6396a4d0cd413a50ce07", - "sha256:213c60cd50106436cc818accf5baa1aba61c0189ff610f64f4a3e8c6726218ba", - "sha256:231710d57adfd809ef5d34183b8ed1eeae3f76459c18fb4a0b373ad56bedcdd9", - "sha256:277a0ef2981ca40581a47093e9e2d13b3f1fbbeffae064c1d21bfceba2030287", - "sha256:2cd5df3de48857ed0544b34e2d40e9fac445930039f3cfe4bcc592a1f836d513", - "sha256:40527857252b61eacd1d9af500c3337ba8deb8fc298940291486c465c8b46ec0", - "sha256:432557aa2c09802be39460360ddffd48156e30721f5e8d917f01d31694216782", - "sha256:473f9edb243cb1935ab5a084eb238d842fb8f404ed2193a915d1784b5a6b5fc0", - "sha256:48c346915c114f5fdb3ead70312bd042a953a8ce5c7106d5bfb1a5254e47da92", - "sha256:50602afada6d6cbfad699b0c7bb50d5ccffa7e46a3d738092afddc1f9758427f", - "sha256:68fb519c14306fec9720a2a5b45bc9f0c8d1b9c72adf45c37baedfcd949c35a2", - "sha256:77f396e6ef4c73fdc33a9157446466f1cff553d979bd00ecb64385760c6babdc", - "sha256:81957921f441d50af23654aa6c5e5eaf9b06aba7f0a19c18a538dc7ef291c5a1", - "sha256:819b3830a1543db06c4d4b865e70ded25be52a2e0631ccd2f6a47a2822f2fd7c", - "sha256:897b80890765f037df3403d22bab41627ca8811ae55e9a722fd0392850ec4d86", - "sha256:98c4d36e99714e55cfbaaee6dd5badbc9a1ec339ebfc3b1f52e293aee6bb71a4", - "sha256:9df7ed3b3d2e0ecfe09e14741b857df43adb5a3ddadc919a2d94fbdf78fea53c", - "sha256:9fa600030013c4de8165339db93d182b9431076eb98eb40ee068700c9c813e34", - "sha256:a80a78046a72361de73f8f395f1f1e49f956c6be882eed58505a15f3e430962b", - "sha256:afa17f5bc4d1b10afd4466fd3a44dc0e245382deca5b3c353d8b757f9e3ecb8d", - "sha256:b3d267842bf12586ba6c734f89d1f5b871df0273157918b0ccefa29deb05c21c", - "sha256:b5b9eccad747aabaaffbc6064800670f0c297e52c12754eb1d976c57e4f74dcb", - "sha256:bfaef573a63ba8923503d27530362590ff4f576c626d86a9fed95822a8255fd7", - "sha256:c5687b8d43cf58545ade1fe3e055f70eac7a5a1a0bf42824308d868289a95737", - "sha256:cba8c411ef271aa037d7357a2bc8f9ee8b58b9965831d9e51baf703280dc73d3", - "sha256:d15a181d1ecd0d4270dc32edb46f7cb7733c7c508857278d3d378d14d606db2d", - "sha256:d4b0ba9512519522b118090257be113b9468d804b19d63c71dbcf4a48fa32358", - "sha256:d4db7c7aef085872ef65a8fd7d6d09a14ae91f691dec3e87ee5ee0539d516f53", - "sha256:d4eccecf9adf6fbcc6861a38015c2a64f38b9d94838ac1810a9023a0609e1b78", - "sha256:d67d839ede4ed1b28a4e8909735fc992a923cdb84e618544973d7dfc71540803", - "sha256:daf496c58a8c52083df09b80c860005194014c3698698d1a57cbcfa182142a3a", - "sha256:dbad0e9d368bb989f4515da330b88a057617d16b6a8245084f1b05400f24609f", - "sha256:e61ceaab6f49fb8bdfaa0f92c4b57bcfbea54c09277b1b4f7ac376bfb7a7c174", - "sha256:f84fbc98b019fef2ee9a1cb3ce93e3187a6df0b2538a651bfb890254ba9f90b5" - ], - "markers": "python_version >= '3.6'", - "version": "==6.0" - }, - "requests": { - "hashes": [ - "sha256:7c5599b102feddaa661c826c56ab4fee28bfd17f5abca1ebbe3e7f19d7c97983", - "sha256:8fefa2a1a1365bf5520aac41836fbee479da67864514bdb821f31ce07ce65349" - ], - "markers": "python_version >= '3.7' and python_version < '4'", - "version": "==2.28.1" - }, - "requests-oauthlib": { - "hashes": [ - "sha256:2577c501a2fb8d05a304c09d090d6e47c306fef15809d102b327cf8364bddab5", - "sha256:75beac4a47881eeb94d5ea5d6ad31ef88856affe2332b9aafb52c6452ccf0d7a" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", - "version": "==1.3.1" - }, - "s3transfer": { - "hashes": [ - "sha256:06176b74f3a15f61f1b4f25a1fc29a4429040b7647133a463da8fa5bd28d5ecd", - "sha256:2ed07d3866f523cc561bf4a00fc5535827981b117dd7876f036b0c1aca42c947" - ], - "markers": "python_version >= '3.7'", - "version": "==0.6.0" - }, - "shodan": { - "hashes": [ - "sha256:18bd2ae81114b70836e0e3315227325e14398275223998a8c235b099432f4b0b" - ], - "index": "pypi", - "version": "==1.28.0" - }, - "six": { - "hashes": [ - "sha256:1e61c37477a1626458e36f7b1d82aa5c9b094fa4802892072e49de9c60c4c926", - "sha256:8abb2f1d86890a2dfb989f9a77cfcfd3e47c2a354b01111771326f8aa26e0254" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", - "version": "==1.16.0" - }, - "tabulate": { - "hashes": [ - "sha256:0095b12bf5966de529c0feb1fa08671671b3368eec77d7ef7ab114be2c068b3c", - "sha256:024ca478df22e9340661486f85298cff5f6dcdba14f3813e8830015b9ed1948f" - ], - "index": "pypi", - "version": "==0.9.0" - }, - "typing-extensions": { - "hashes": [ - "sha256:1511434bb92bf8dd198c12b1cc812e800d4181cfcb867674e0f8279cc93087aa", - "sha256:16fa4864408f655d35ec496218b85f79b3437c829e93320c7c9215ccfd92489e" - ], - "markers": "python_version >= '3.7'", - "version": "==4.4.0" - }, - "urllib3": { - "hashes": [ - "sha256:47cc05d99aaa09c9e72ed5809b60e7ba354e64b59c9c173ac3018642d8bb41fc", - "sha256:c083dd0dce68dbfbe1129d5271cb90f9447dea7d52097c6e0126120c521ddea8" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3, 3.4, 3.5'", - "version": "==1.26.13" - }, - "xlsxwriter": { - "hashes": [ - "sha256:df0aefe5137478d206847eccf9f114715e42aaea077e6a48d0e8a2152e983010", - "sha256:e89f4a1d2fa2c9ea15cde77de95cd3fd8b0345d0efb3964623f395c8c4988b7f" - ], - "markers": "python_version >= '3.4'", - "version": "==3.0.3" - } - }, - "develop": { - "astroid": { - "hashes": [ - "sha256:10e0ad5f7b79c435179d0d0f0df69998c4eef4597534aae44910db060baeb907", - "sha256:1493fe8bd3dfd73dc35bd53c9d5b6e49ead98497c47b2307662556a5692d29d7" - ], - "markers": "python_full_version >= '3.7.2'", - "version": "==2.12.13" - }, - "attrs": { - "hashes": [ - "sha256:29adc2665447e5191d0e7c568fde78b21f9672d344281d0c6e1ab085429b22b6", - "sha256:86efa402f67bf2df34f51a335487cf46b1ec130d02b8d39fd248abfd30da551c" - ], - "markers": "python_version >= '3.5'", - "version": "==22.1.0" - }, - "bandit": { - "hashes": [ - "sha256:2d63a8c573417bae338962d4b9b06fbc6080f74ecd955a092849e1e65c717bd2", - "sha256:412d3f259dab4077d0e7f0c11f50f650cc7d10db905d98f6520a95a18049658a" - ], - "index": "pypi", - "version": "==1.7.4" - }, - "black": { - "hashes": [ - "sha256:14ff67aec0a47c424bc99b71005202045dc09270da44a27848d534600ac64fc7", - "sha256:197df8509263b0b8614e1df1756b1dd41be6738eed2ba9e9769f3880c2b9d7b6", - "sha256:1e464456d24e23d11fced2bc8c47ef66d471f845c7b7a42f3bd77bf3d1789650", - "sha256:2039230db3c6c639bd84efe3292ec7b06e9214a2992cd9beb293d639c6402edb", - "sha256:21199526696b8f09c3997e2b4db8d0b108d801a348414264d2eb8eb2532e540d", - "sha256:2644b5d63633702bc2c5f3754b1b475378fbbfb481f62319388235d0cd104c2d", - "sha256:432247333090c8c5366e69627ccb363bc58514ae3e63f7fc75c54b1ea80fa7de", - "sha256:444ebfb4e441254e87bad00c661fe32df9969b2bf224373a448d8aca2132b395", - "sha256:5b9b29da4f564ba8787c119f37d174f2b69cdfdf9015b7d8c5c16121ddc054ae", - "sha256:5cc42ca67989e9c3cf859e84c2bf014f6633db63d1cbdf8fdb666dcd9e77e3fa", - "sha256:5d8f74030e67087b219b032aa33a919fae8806d49c867846bfacde57f43972ef", - "sha256:72ef3925f30e12a184889aac03d77d031056860ccae8a1e519f6cbb742736383", - "sha256:819dc789f4498ecc91438a7de64427c73b45035e2e3680c92e18795a839ebb66", - "sha256:915ace4ff03fdfff953962fa672d44be269deb2eaf88499a0f8805221bc68c87", - "sha256:9311e99228ae10023300ecac05be5a296f60d2fd10fff31cf5c1fa4ca4b1988d", - "sha256:974308c58d057a651d182208a484ce80a26dac0caef2895836a92dd6ebd725e0", - "sha256:b8b49776299fece66bffaafe357d929ca9451450f5466e997a7285ab0fe28e3b", - "sha256:c957b2b4ea88587b46cf49d1dc17681c1e672864fd7af32fc1e9664d572b3458", - "sha256:e41a86c6c650bcecc6633ee3180d80a025db041a8e2398dcc059b3afa8382cd4", - "sha256:f513588da599943e0cde4e32cc9879e825d58720d6557062d1098c5ad80080e1", - "sha256:fba8a281e570adafb79f7755ac8721b6cf1bbf691186a287e990c7929c7692ff" - ], - "index": "pypi", - "version": "==22.10.0" - }, - "boto3": { - "hashes": [ - "sha256:4b4edf893b01c651007d61534c1d248cd2350d311a4e295039bd23fd60bf899a", - "sha256:59aa6c7810a815fb52671f834d10ac4cd80b9c7c01a3cbde670cb41330059464" - ], - "index": "pypi", - "version": "==1.26.19" - }, - "botocore": { - "hashes": [ - "sha256:917807ee4ccca34a2f2848eb4fcf878d9e97a44a911a6965ff556d0830c471fd", - "sha256:a54561e591f5d8e653657ce04dcad09c10ebca9dbefba73471976e522abf038a" - ], - "index": "pypi", - "version": "==1.29.19" - }, - "certifi": { - "hashes": [ - "sha256:0d9c601124e5a6ba9712dbc60d9c53c21e34f5f641fe83002317394311bdce14", - "sha256:90c1a32f1d68f940488354e36370f6cca89f0f106db09518524c88d6ed83f382" - ], - "markers": "python_version >= '3.6'", - "version": "==2022.9.24" - }, - "cffi": { - "hashes": [ - "sha256:00a9ed42e88df81ffae7a8ab6d9356b371399b91dbdf0c3cb1e84c03a13aceb5", - "sha256:03425bdae262c76aad70202debd780501fabeaca237cdfddc008987c0e0f59ef", - "sha256:04ed324bda3cda42b9b695d51bb7d54b680b9719cfab04227cdd1e04e5de3104", - "sha256:0e2642fe3142e4cc4af0799748233ad6da94c62a8bec3a6648bf8ee68b1c7426", - "sha256:173379135477dc8cac4bc58f45db08ab45d228b3363adb7af79436135d028405", - "sha256:198caafb44239b60e252492445da556afafc7d1e3ab7a1fb3f0584ef6d742375", - "sha256:1e74c6b51a9ed6589199c787bf5f9875612ca4a8a0785fb2d4a84429badaf22a", - "sha256:2012c72d854c2d03e45d06ae57f40d78e5770d252f195b93f581acf3ba44496e", - "sha256:21157295583fe8943475029ed5abdcf71eb3911894724e360acff1d61c1d54bc", - "sha256:2470043b93ff09bf8fb1d46d1cb756ce6132c54826661a32d4e4d132e1977adf", - "sha256:285d29981935eb726a4399badae8f0ffdff4f5050eaa6d0cfc3f64b857b77185", - "sha256:30d78fbc8ebf9c92c9b7823ee18eb92f2e6ef79b45ac84db507f52fbe3ec4497", - "sha256:320dab6e7cb2eacdf0e658569d2575c4dad258c0fcc794f46215e1e39f90f2c3", - "sha256:33ab79603146aace82c2427da5ca6e58f2b3f2fb5da893ceac0c42218a40be35", - "sha256:3548db281cd7d2561c9ad9984681c95f7b0e38881201e157833a2342c30d5e8c", - "sha256:3799aecf2e17cf585d977b780ce79ff0dc9b78d799fc694221ce814c2c19db83", - "sha256:39d39875251ca8f612b6f33e6b1195af86d1b3e60086068be9cc053aa4376e21", - "sha256:3b926aa83d1edb5aa5b427b4053dc420ec295a08e40911296b9eb1b6170f6cca", - "sha256:3bcde07039e586f91b45c88f8583ea7cf7a0770df3a1649627bf598332cb6984", - "sha256:3d08afd128ddaa624a48cf2b859afef385b720bb4b43df214f85616922e6a5ac", - "sha256:3eb6971dcff08619f8d91607cfc726518b6fa2a9eba42856be181c6d0d9515fd", - "sha256:40f4774f5a9d4f5e344f31a32b5096977b5d48560c5592e2f3d2c4374bd543ee", - "sha256:4289fc34b2f5316fbb762d75362931e351941fa95fa18789191b33fc4cf9504a", - "sha256:470c103ae716238bbe698d67ad020e1db9d9dba34fa5a899b5e21577e6d52ed2", - "sha256:4f2c9f67e9821cad2e5f480bc8d83b8742896f1242dba247911072d4fa94c192", - "sha256:50a74364d85fd319352182ef59c5c790484a336f6db772c1a9231f1c3ed0cbd7", - "sha256:54a2db7b78338edd780e7ef7f9f6c442500fb0d41a5a4ea24fff1c929d5af585", - "sha256:5635bd9cb9731e6d4a1132a498dd34f764034a8ce60cef4f5319c0541159392f", - "sha256:59c0b02d0a6c384d453fece7566d1c7e6b7bae4fc5874ef2ef46d56776d61c9e", - "sha256:5d598b938678ebf3c67377cdd45e09d431369c3b1a5b331058c338e201f12b27", - "sha256:5df2768244d19ab7f60546d0c7c63ce1581f7af8b5de3eb3004b9b6fc8a9f84b", - "sha256:5ef34d190326c3b1f822a5b7a45f6c4535e2f47ed06fec77d3d799c450b2651e", - "sha256:6975a3fac6bc83c4a65c9f9fcab9e47019a11d3d2cf7f3c0d03431bf145a941e", - "sha256:6c9a799e985904922a4d207a94eae35c78ebae90e128f0c4e521ce339396be9d", - "sha256:70df4e3b545a17496c9b3f41f5115e69a4f2e77e94e1d2a8e1070bc0c38c8a3c", - "sha256:7473e861101c9e72452f9bf8acb984947aa1661a7704553a9f6e4baa5ba64415", - "sha256:8102eaf27e1e448db915d08afa8b41d6c7ca7a04b7d73af6514df10a3e74bd82", - "sha256:87c450779d0914f2861b8526e035c5e6da0a3199d8f1add1a665e1cbc6fc6d02", - "sha256:8b7ee99e510d7b66cdb6c593f21c043c248537a32e0bedf02e01e9553a172314", - "sha256:91fc98adde3d7881af9b59ed0294046f3806221863722ba7d8d120c575314325", - "sha256:94411f22c3985acaec6f83c6df553f2dbe17b698cc7f8ae751ff2237d96b9e3c", - "sha256:98d85c6a2bef81588d9227dde12db8a7f47f639f4a17c9ae08e773aa9c697bf3", - "sha256:9ad5db27f9cabae298d151c85cf2bad1d359a1b9c686a275df03385758e2f914", - "sha256:a0b71b1b8fbf2b96e41c4d990244165e2c9be83d54962a9a1d118fd8657d2045", - "sha256:a0f100c8912c114ff53e1202d0078b425bee3649ae34d7b070e9697f93c5d52d", - "sha256:a591fe9e525846e4d154205572a029f653ada1a78b93697f3b5a8f1f2bc055b9", - "sha256:a5c84c68147988265e60416b57fc83425a78058853509c1b0629c180094904a5", - "sha256:a66d3508133af6e8548451b25058d5812812ec3798c886bf38ed24a98216fab2", - "sha256:a8c4917bd7ad33e8eb21e9a5bbba979b49d9a97acb3a803092cbc1133e20343c", - "sha256:b3bbeb01c2b273cca1e1e0c5df57f12dce9a4dd331b4fa1635b8bec26350bde3", - "sha256:cba9d6b9a7d64d4bd46167096fc9d2f835e25d7e4c121fb2ddfc6528fb0413b2", - "sha256:cc4d65aeeaa04136a12677d3dd0b1c0c94dc43abac5860ab33cceb42b801c1e8", - "sha256:ce4bcc037df4fc5e3d184794f27bdaab018943698f4ca31630bc7f84a7b69c6d", - "sha256:cec7d9412a9102bdc577382c3929b337320c4c4c4849f2c5cdd14d7368c5562d", - "sha256:d400bfb9a37b1351253cb402671cea7e89bdecc294e8016a707f6d1d8ac934f9", - "sha256:d61f4695e6c866a23a21acab0509af1cdfd2c013cf256bbf5b6b5e2695827162", - "sha256:db0fbb9c62743ce59a9ff687eb5f4afbe77e5e8403d6697f7446e5f609976f76", - "sha256:dd86c085fae2efd48ac91dd7ccffcfc0571387fe1193d33b6394db7ef31fe2a4", - "sha256:e00b098126fd45523dd056d2efba6c5a63b71ffe9f2bbe1a4fe1716e1d0c331e", - "sha256:e229a521186c75c8ad9490854fd8bbdd9a0c9aa3a524326b55be83b54d4e0ad9", - "sha256:e263d77ee3dd201c3a142934a086a4450861778baaeeb45db4591ef65550b0a6", - "sha256:ed9cb427ba5504c1dc15ede7d516b84757c3e3d7868ccc85121d9310d27eed0b", - "sha256:fa6693661a4c91757f4412306191b6dc88c1703f780c8234035eac011922bc01", - "sha256:fcd131dd944808b5bdb38e6f5b53013c5aa4f334c5cad0c72742f6eba4b73db0" - ], - "version": "==1.15.1" - }, - "charset-normalizer": { - "hashes": [ - "sha256:5a3d016c7c547f69d6f81fb0db9449ce888b418b5b9952cc5e6e66843e9dd845", - "sha256:83e9a75d1911279afd89352c68b45348559d1fc0506b054b346651b5e7fee29f" - ], - "markers": "python_version >= '3.6'", - "version": "==2.1.1" - }, - "click": { - "hashes": [ - "sha256:7682dc8afb30297001674575ea00d1814d808d6a36af415a82bd481d37ba7b8e", - "sha256:bb4d8133cb15a609f44e8213d9b391b0809795062913b383c62be0ee95b1db48" - ], - "markers": "python_version >= '3.7'", - "version": "==8.1.3" - }, - "coverage": { - "hashes": [ - "sha256:027018943386e7b942fa832372ebc120155fd970837489896099f5cfa2890f79", - "sha256:11b990d520ea75e7ee8dcab5bc908072aaada194a794db9f6d7d5cfd19661e5a", - "sha256:12adf310e4aafddc58afdb04d686795f33f4d7a6fa67a7a9d4ce7d6ae24d949f", - "sha256:1431986dac3923c5945271f169f59c45b8802a114c8f548d611f2015133df77a", - "sha256:1ef221513e6f68b69ee9e159506d583d31aa3567e0ae84eaad9d6ec1107dddaa", - "sha256:20c8ac5386253717e5ccc827caad43ed66fea0efe255727b1053a8154d952398", - "sha256:2198ea6fc548de52adc826f62cb18554caedfb1d26548c1b7c88d8f7faa8f6ba", - "sha256:255758a1e3b61db372ec2736c8e2a1fdfaf563977eedbdf131de003ca5779b7d", - "sha256:265de0fa6778d07de30bcf4d9dc471c3dc4314a23a3c6603d356a3c9abc2dfcf", - "sha256:33a7da4376d5977fbf0a8ed91c4dffaaa8dbf0ddbf4c8eea500a2486d8bc4d7b", - "sha256:42eafe6778551cf006a7c43153af1211c3aaab658d4d66fa5fcc021613d02518", - "sha256:4433b90fae13f86fafff0b326453dd42fc9a639a0d9e4eec4d366436d1a41b6d", - "sha256:4a5375e28c5191ac38cca59b38edd33ef4cc914732c916f2929029b4bfb50795", - "sha256:4a8dbc1f0fbb2ae3de73eb0bdbb914180c7abfbf258e90b311dcd4f585d44bd2", - "sha256:59f53f1dc5b656cafb1badd0feb428c1e7bc19b867479ff72f7a9dd9b479f10e", - "sha256:5dbec3b9095749390c09ab7c89d314727f18800060d8d24e87f01fb9cfb40b32", - "sha256:633713d70ad6bfc49b34ead4060531658dc6dfc9b3eb7d8a716d5873377ab745", - "sha256:6b07130585d54fe8dff3d97b93b0e20290de974dc8177c320aeaf23459219c0b", - "sha256:6c4459b3de97b75e3bd6b7d4b7f0db13f17f504f3d13e2a7c623786289dd670e", - "sha256:6d4817234349a80dbf03640cec6109cd90cba068330703fa65ddf56b60223a6d", - "sha256:723e8130d4ecc8f56e9a611e73b31219595baa3bb252d539206f7bbbab6ffc1f", - "sha256:784f53ebc9f3fd0e2a3f6a78b2be1bd1f5575d7863e10c6e12504f240fd06660", - "sha256:7b6be138d61e458e18d8e6ddcddd36dd96215edfe5f1168de0b1b32635839b62", - "sha256:7ccf362abd726b0410bf8911c31fbf97f09f8f1061f8c1cf03dfc4b6372848f6", - "sha256:83516205e254a0cb77d2d7bb3632ee019d93d9f4005de31dca0a8c3667d5bc04", - "sha256:851cf4ff24062c6aec510a454b2584f6e998cada52d4cb58c5e233d07172e50c", - "sha256:8f830ed581b45b82451a40faabb89c84e1a998124ee4212d440e9c6cf70083e5", - "sha256:94e2565443291bd778421856bc975d351738963071e9b8839ca1fc08b42d4bef", - "sha256:95203854f974e07af96358c0b261f1048d8e1083f2de9b1c565e1be4a3a48cfc", - "sha256:97117225cdd992a9c2a5515db1f66b59db634f59d0679ca1fa3fe8da32749cae", - "sha256:98e8a10b7a314f454d9eff4216a9a94d143a7ee65018dd12442e898ee2310578", - "sha256:a1170fa54185845505fbfa672f1c1ab175446c887cce8212c44149581cf2d466", - "sha256:a6b7d95969b8845250586f269e81e5dfdd8ff828ddeb8567a4a2eaa7313460c4", - "sha256:a8fb6cf131ac4070c9c5a3e21de0f7dc5a0fbe8bc77c9456ced896c12fcdad91", - "sha256:af4fffaffc4067232253715065e30c5a7ec6faac36f8fc8d6f64263b15f74db0", - "sha256:b4a5be1748d538a710f87542f22c2cad22f80545a847ad91ce45e77417293eb4", - "sha256:b5604380f3415ba69de87a289a2b56687faa4fe04dbee0754bfcae433489316b", - "sha256:b9023e237f4c02ff739581ef35969c3739445fb059b060ca51771e69101efffe", - "sha256:bc8ef5e043a2af066fa8cbfc6e708d58017024dc4345a1f9757b329a249f041b", - "sha256:c4ed2820d919351f4167e52425e096af41bfabacb1857186c1ea32ff9983ed75", - "sha256:cca4435eebea7962a52bdb216dec27215d0df64cf27fc1dd538415f5d2b9da6b", - "sha256:d900bb429fdfd7f511f868cedd03a6bbb142f3f9118c09b99ef8dc9bf9643c3c", - "sha256:d9ecf0829c6a62b9b573c7bb6d4dcd6ba8b6f80be9ba4fc7ed50bf4ac9aecd72", - "sha256:dbdb91cd8c048c2b09eb17713b0c12a54fbd587d79adcebad543bc0cd9a3410b", - "sha256:de3001a203182842a4630e7b8d1a2c7c07ec1b45d3084a83d5d227a3806f530f", - "sha256:e07f4a4a9b41583d6eabec04f8b68076ab3cd44c20bd29332c6572dda36f372e", - "sha256:ef8674b0ee8cc11e2d574e3e2998aea5df5ab242e012286824ea3c6970580e53", - "sha256:f4f05d88d9a80ad3cac6244d36dd89a3c00abc16371769f1340101d3cb899fc3", - "sha256:f642e90754ee3e06b0e7e51bce3379590e76b7f76b708e1a71ff043f87025c84", - "sha256:fc2af30ed0d5ae0b1abdb4ebdce598eafd5b35397d4d75deb341a614d333d987" - ], - "index": "pypi", - "version": "==6.5.0" - }, - "cryptography": { - "hashes": [ - "sha256:0e70da4bdff7601b0ef48e6348339e490ebfb0cbe638e083c9c41fb49f00c8bd", - "sha256:10652dd7282de17990b88679cb82f832752c4e8237f0c714be518044269415db", - "sha256:175c1a818b87c9ac80bb7377f5520b7f31b3ef2a0004e2420319beadedb67290", - "sha256:1d7e632804a248103b60b16fb145e8df0bc60eed790ece0d12efe8cd3f3e7744", - "sha256:1f13ddda26a04c06eb57119caf27a524ccae20533729f4b1e4a69b54e07035eb", - "sha256:2ec2a8714dd005949d4019195d72abed84198d877112abb5a27740e217e0ea8d", - "sha256:2fa36a7b2cc0998a3a4d5af26ccb6273f3df133d61da2ba13b3286261e7efb70", - "sha256:2fb481682873035600b5502f0015b664abc26466153fab5c6bc92c1ea69d478b", - "sha256:3178d46f363d4549b9a76264f41c6948752183b3f587666aff0555ac50fd7876", - "sha256:4367da5705922cf7070462e964f66e4ac24162e22ab0a2e9d31f1b270dd78083", - "sha256:4eb85075437f0b1fd8cd66c688469a0c4119e0ba855e3fef86691971b887caf6", - "sha256:50a1494ed0c3f5b4d07650a68cd6ca62efe8b596ce743a5c94403e6f11bf06c1", - "sha256:53049f3379ef05182864d13bb9686657659407148f901f3f1eee57a733fb4b00", - "sha256:6391e59ebe7c62d9902c24a4d8bcbc79a68e7c4ab65863536127c8a9cd94043b", - "sha256:67461b5ebca2e4c2ab991733f8ab637a7265bb582f07c7c88914b5afb88cb95b", - "sha256:78e47e28ddc4ace41dd38c42e6feecfdadf9c3be2af389abbfeef1ff06822285", - "sha256:80ca53981ceeb3241998443c4964a387771588c4e4a5d92735a493af868294f9", - "sha256:8a4b2bdb68a447fadebfd7d24855758fe2d6fecc7fed0b78d190b1af39a8e3b0", - "sha256:8e45653fb97eb2f20b8c96f9cd2b3a0654d742b47d638cf2897afbd97f80fa6d", - "sha256:998cd19189d8a747b226d24c0207fdaa1e6658a1d3f2494541cb9dfbf7dcb6d2", - "sha256:a10498349d4c8eab7357a8f9aa3463791292845b79597ad1b98a543686fb1ec8", - "sha256:b4cad0cea995af760f82820ab4ca54e5471fc782f70a007f31531957f43e9dee", - "sha256:bfe6472507986613dc6cc00b3d492b2f7564b02b3b3682d25ca7f40fa3fd321b", - "sha256:c9e0d79ee4c56d841bd4ac6e7697c8ff3c8d6da67379057f29e66acffcd1e9a7", - "sha256:ca57eb3ddaccd1112c18fc80abe41db443cc2e9dcb1917078e02dfa010a4f353", - "sha256:ce127dd0a6a0811c251a6cddd014d292728484e530d80e872ad9806cfb1c5b3c" - ], - "markers": "python_version >= '3.6'", - "version": "==38.0.4" - }, - "dill": { - "hashes": [ - "sha256:a07ffd2351b8c678dfc4a856a3005f8067aea51d6ba6c700796a4d9e280f39f0", - "sha256:e5db55f3687856d8fbdab002ed78544e1c4559a130302693d839dfe8f93f2373" - ], - "markers": "python_version >= '3.7'", - "version": "==0.3.6" - }, - "docker": { - "hashes": [ - "sha256:896c4282e5c7af5c45e8b683b0b0c33932974fe6e50fc6906a0a83616ab3da97", - "sha256:dbcb3bd2fa80dca0788ed908218bf43972772009b881ed1e20dfc29a65e49782" - ], - "index": "pypi", - "version": "==6.0.1" - }, - "dparse": { - "hashes": [ - "sha256:8097076f1dd26c377f30d4745e6ec18fef42f3bf493933b842ac5bafad8c345f", - "sha256:d45255bda21f998bc7ddf2afd5e62505ba6134756ba2d42a84c56b0826614dfe" - ], - "markers": "python_version >= '3.5'", - "version": "==0.6.2" - }, - "exceptiongroup": { - "hashes": [ - "sha256:542adf9dea4055530d6e1279602fa5cb11dab2395fa650b8674eaec35fc4a828", - "sha256:bd14967b79cd9bdb54d97323216f8fdf533e278df937aa2a90089e7d6e06e5ec" - ], - "markers": "python_version < '3.11'", - "version": "==1.0.4" - }, - "execnet": { - "hashes": [ - "sha256:8f694f3ba9cc92cab508b152dcfe322153975c29bda272e2fd7f3f00f36e47c5", - "sha256:a295f7cc774947aac58dde7fdc85f4aa00c42adf5d8f5468fc630c1acf30a142" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3, 3.4'", - "version": "==1.9.0" - }, - "flake8": { - "hashes": [ - "sha256:3833794e27ff64ea4e9cf5d410082a8b97ff1a06c16aa3d2027339cd0f1195c7", - "sha256:c61007e76655af75e6785a931f452915b371dc48f56efd765247c8fe68f2b181" - ], - "index": "pypi", - "version": "==6.0.0" - }, - "freezegun": { - "hashes": [ - "sha256:cd22d1ba06941384410cd967d8a99d5ae2442f57dfafeff2fda5de8dc5c05446", - "sha256:ea1b963b993cb9ea195adbd893a48d573fda951b0da64f60883d7e988b606c9f" - ], - "index": "pypi", - "version": "==1.2.2" - }, - "gitdb": { - "hashes": [ - "sha256:6eb990b69df4e15bad899ea868dc46572c3f75339735663b81de79b06f17eb9a", - "sha256:c286cf298426064079ed96a9e4a9d39e7f3e9bf15ba60701e95f5492f28415c7" - ], - "markers": "python_version >= '3.7'", - "version": "==4.0.10" - }, - "gitpython": { - "hashes": [ - "sha256:41eea0deec2deea139b459ac03656f0dd28fc4a3387240ec1d3c259a2c47850f", - "sha256:cc36bfc4a3f913e66805a28e84703e419d9c264c1077e537b54f0e1af85dbefd" - ], - "markers": "python_version >= '3.7'", - "version": "==3.1.29" - }, - "idna": { - "hashes": [ - "sha256:814f528e8dead7d329833b91c5faa87d60bf71824cd12a7530b5526063d02cb4", - "sha256:90b77e79eaa3eba6de819a0c442c0b4ceefc341a7a2ab77d7562bf49f425c5c2" - ], - "markers": "python_version >= '3.5'", - "version": "==3.4" - }, - "importlib-resources": { - "hashes": [ - "sha256:c01b1b94210d9849f286b86bb51bcea7cd56dde0600d8db721d7b81330711668", - "sha256:ee17ec648f85480d523596ce49eae8ead87d5631ae1551f913c0100b5edd3437" - ], - "markers": "python_version >= '3.7'", - "version": "==5.10.0" - }, - "iniconfig": { - "hashes": [ - "sha256:011e24c64b7f47f6ebd835bb12a743f2fbe9a26d4cecaa7f53bc4f35ee9da8b3", - "sha256:bc3af051d7d14b2ee5ef9969666def0cd1a000e121eaea580d4a313df4b37f32" - ], - "version": "==1.1.1" - }, - "isort": { - "hashes": [ - "sha256:6f62d78e2f89b4500b080fe3a81690850cd254227f27f75c3a0c491a1f351ba7", - "sha256:e8443a5e7a020e9d7f97f1d7d9cd17c88bcb3bc7e218bf9cf5095fe550be2951" - ], - "markers": "python_full_version >= '3.6.1' and python_full_version < '4.0.0'", - "version": "==5.10.1" - }, - "jinja2": { - "hashes": [ - "sha256:31351a702a408a9e7595a8fc6150fc3f43bb6bf7e319770cbc0db9df9437e852", - "sha256:6088930bfe239f0e6710546ab9c19c9ef35e29792895fed6e6e31a023a182a61" - ], - "markers": "python_version >= '3.7'", - "version": "==3.1.2" - }, - "jmespath": { - "hashes": [ - "sha256:02e2e4cc71b5bcab88332eebf907519190dd9e6e82107fa7f83b1003a6252980", - "sha256:90261b206d6defd58fdd5e85f478bf633a2901798906be2ad389150c5c60edbe" - ], - "markers": "python_version >= '3.7'", - "version": "==1.0.1" - }, - "jsonschema": { - "hashes": [ - "sha256:0f864437ab8b6076ba6707453ef8f98a6a0d512a80e93f8abdb676f737ecb60d", - "sha256:a870ad254da1a8ca84b6a2905cac29d265f805acc57af304784962a2aa6508f6" - ], - "markers": "python_version >= '3.7'", - "version": "==4.17.3" - }, - "jsonschema-spec": { - "hashes": [ - "sha256:1e525177574c23ae0f55cd62382632a083a0339928f0ca846a975a4da9851cec", - "sha256:780a22d517cdc857d9714a80d8349c546945063f20853ea32ba7f85bc643ec7d" - ], - "markers": "python_version >= '3.7' and python_full_version < '4.0.0'", - "version": "==0.1.2" - }, - "lazy-object-proxy": { - "hashes": [ - "sha256:0c1c7c0433154bb7c54185714c6929acc0ba04ee1b167314a779b9025517eada", - "sha256:14010b49a2f56ec4943b6cf925f597b534ee2fe1f0738c84b3bce0c1a11ff10d", - "sha256:4e2d9f764f1befd8bdc97673261b8bb888764dfdbd7a4d8f55e4fbcabb8c3fb7", - "sha256:4fd031589121ad46e293629b39604031d354043bb5cdf83da4e93c2d7f3389fe", - "sha256:5b51d6f3bfeb289dfd4e95de2ecd464cd51982fe6f00e2be1d0bf94864d58acd", - "sha256:6850e4aeca6d0df35bb06e05c8b934ff7c533734eb51d0ceb2d63696f1e6030c", - "sha256:6f593f26c470a379cf7f5bc6db6b5f1722353e7bf937b8d0d0b3fba911998858", - "sha256:71d9ae8a82203511a6f60ca5a1b9f8ad201cac0fc75038b2dc5fa519589c9288", - "sha256:7e1561626c49cb394268edd00501b289053a652ed762c58e1081224c8d881cec", - "sha256:8f6ce2118a90efa7f62dd38c7dbfffd42f468b180287b748626293bf12ed468f", - "sha256:ae032743794fba4d171b5b67310d69176287b5bf82a21f588282406a79498891", - "sha256:afcaa24e48bb23b3be31e329deb3f1858f1f1df86aea3d70cb5c8578bfe5261c", - "sha256:b70d6e7a332eb0217e7872a73926ad4fdc14f846e85ad6749ad111084e76df25", - "sha256:c219a00245af0f6fa4e95901ed28044544f50152840c5b6a3e7b2568db34d156", - "sha256:ce58b2b3734c73e68f0e30e4e725264d4d6be95818ec0a0be4bb6bf9a7e79aa8", - "sha256:d176f392dbbdaacccf15919c77f526edf11a34aece58b55ab58539807b85436f", - "sha256:e20bfa6db17a39c706d24f82df8352488d2943a3b7ce7d4c22579cb89ca8896e", - "sha256:eac3a9a5ef13b332c059772fd40b4b1c3d45a3a2b05e33a361dee48e54a4dad0", - "sha256:eb329f8d8145379bf5dbe722182410fe8863d186e51bf034d2075eb8d85ee25b" - ], - "markers": "python_version >= '3.7'", - "version": "==1.8.0" - }, - "markupsafe": { - "hashes": [ - "sha256:0212a68688482dc52b2d45013df70d169f542b7394fc744c02a57374a4207003", - "sha256:089cf3dbf0cd6c100f02945abeb18484bd1ee57a079aefd52cffd17fba910b88", - "sha256:10c1bfff05d95783da83491be968e8fe789263689c02724e0c691933c52994f5", - "sha256:33b74d289bd2f5e527beadcaa3f401e0df0a89927c1559c8566c066fa4248ab7", - "sha256:3799351e2336dc91ea70b034983ee71cf2f9533cdff7c14c90ea126bfd95d65a", - "sha256:3ce11ee3f23f79dbd06fb3d63e2f6af7b12db1d46932fe7bd8afa259a5996603", - "sha256:421be9fbf0ffe9ffd7a378aafebbf6f4602d564d34be190fc19a193232fd12b1", - "sha256:43093fb83d8343aac0b1baa75516da6092f58f41200907ef92448ecab8825135", - "sha256:46d00d6cfecdde84d40e572d63735ef81423ad31184100411e6e3388d405e247", - "sha256:4a33dea2b688b3190ee12bd7cfa29d39c9ed176bda40bfa11099a3ce5d3a7ac6", - "sha256:4b9fe39a2ccc108a4accc2676e77da025ce383c108593d65cc909add5c3bd601", - "sha256:56442863ed2b06d19c37f94d999035e15ee982988920e12a5b4ba29b62ad1f77", - "sha256:671cd1187ed5e62818414afe79ed29da836dde67166a9fac6d435873c44fdd02", - "sha256:694deca8d702d5db21ec83983ce0bb4b26a578e71fbdbd4fdcd387daa90e4d5e", - "sha256:6a074d34ee7a5ce3effbc526b7083ec9731bb3cbf921bbe1d3005d4d2bdb3a63", - "sha256:6d0072fea50feec76a4c418096652f2c3238eaa014b2f94aeb1d56a66b41403f", - "sha256:6fbf47b5d3728c6aea2abb0589b5d30459e369baa772e0f37a0320185e87c980", - "sha256:7f91197cc9e48f989d12e4e6fbc46495c446636dfc81b9ccf50bb0ec74b91d4b", - "sha256:86b1f75c4e7c2ac2ccdaec2b9022845dbb81880ca318bb7a0a01fbf7813e3812", - "sha256:8dc1c72a69aa7e082593c4a203dcf94ddb74bb5c8a731e4e1eb68d031e8498ff", - "sha256:8e3dcf21f367459434c18e71b2a9532d96547aef8a871872a5bd69a715c15f96", - "sha256:8e576a51ad59e4bfaac456023a78f6b5e6e7651dcd383bcc3e18d06f9b55d6d1", - "sha256:96e37a3dc86e80bf81758c152fe66dbf60ed5eca3d26305edf01892257049925", - "sha256:97a68e6ada378df82bc9f16b800ab77cbf4b2fada0081794318520138c088e4a", - "sha256:99a2a507ed3ac881b975a2976d59f38c19386d128e7a9a18b7df6fff1fd4c1d6", - "sha256:a49907dd8420c5685cfa064a1335b6754b74541bbb3706c259c02ed65b644b3e", - "sha256:b09bf97215625a311f669476f44b8b318b075847b49316d3e28c08e41a7a573f", - "sha256:b7bd98b796e2b6553da7225aeb61f447f80a1ca64f41d83612e6139ca5213aa4", - "sha256:b87db4360013327109564f0e591bd2a3b318547bcef31b468a92ee504d07ae4f", - "sha256:bcb3ed405ed3222f9904899563d6fc492ff75cce56cba05e32eff40e6acbeaa3", - "sha256:d4306c36ca495956b6d568d276ac11fdd9c30a36f1b6eb928070dc5360b22e1c", - "sha256:d5ee4f386140395a2c818d149221149c54849dfcfcb9f1debfe07a8b8bd63f9a", - "sha256:dda30ba7e87fbbb7eab1ec9f58678558fd9a6b8b853530e176eabd064da81417", - "sha256:e04e26803c9c3851c931eac40c695602c6295b8d432cbe78609649ad9bd2da8a", - "sha256:e1c0b87e09fa55a220f058d1d49d3fb8df88fbfab58558f1198e08c1e1de842a", - "sha256:e72591e9ecd94d7feb70c1cbd7be7b3ebea3f548870aa91e2732960fa4d57a37", - "sha256:e8c843bbcda3a2f1e3c2ab25913c80a3c5376cd00c6e8c4a86a89a28c8dc5452", - "sha256:efc1913fd2ca4f334418481c7e595c00aad186563bbc1ec76067848c7ca0a933", - "sha256:f121a1420d4e173a5d96e47e9a0c0dcff965afdf1626d28de1460815f7c4ee7a", - "sha256:fc7b548b17d238737688817ab67deebb30e8073c95749d55538ed473130ec0c7" - ], - "markers": "python_version >= '3.7'", - "version": "==2.1.1" - }, - "mccabe": { - "hashes": [ - "sha256:348e0240c33b60bbdf4e523192ef919f28cb2c3d7d5c7794f74009290f236325", - "sha256:6c2d30ab6be0e4a46919781807b4f0d834ebdd6c6e3dca0bda5a15f863427b6e" - ], - "markers": "python_version >= '3.6'", - "version": "==0.7.0" - }, - "mock": { - "hashes": [ - "sha256:122fcb64ee37cfad5b3f48d7a7d51875d7031aaf3d8be7c42e2bee25044eee62", - "sha256:7d3fbbde18228f4ff2f1f119a45cdffa458b4c0dee32eb4d2bb2f82554bac7bc" - ], - "markers": "python_version >= '3.6'", - "version": "==4.0.3" - }, - "moto": { - "hashes": [ - "sha256:356bf792b439228891c910e2a0fafd4264334cf9000b508c732ff43d8694fb6a", - "sha256:9ba96d04a472d5682493cad7fee33337da34ebef18b397af1ea6dfb41efbe148" - ], - "index": "pypi", - "version": "==4.0.10" - }, - "mypy-extensions": { - "hashes": [ - "sha256:090fedd75945a69ae91ce1303b5824f428daf5a028d2f6ab8a299250a846f15d", - "sha256:2d82818f5bb3e369420cb3c4060a7970edba416647068eb4c5343488a6c604a8" - ], - "version": "==0.4.3" - }, - "openapi-schema-validator": { - "hashes": [ - "sha256:34fbd14b7501abe25e64d7b4624a9db02cde1a578d285b3da6f34b290cdf0b3a", - "sha256:7cf27585dd7970b7257cefe48e1a3a10d4e34421831bdb472d96967433bc27bd" - ], - "markers": "python_version >= '3.7' and python_full_version < '4.0.0'", - "version": "==0.3.4" - }, - "openapi-spec-validator": { - "hashes": [ - "sha256:4a8aee1e45b1ac868e07ab25e18828fe9837baddd29a8e20fdb3d3c61c8eea3d", - "sha256:8248634bad1f23cac5d5a34e193ab36e23914057ca69e91a1ede5af75552c465" - ], - "index": "pypi", - "version": "==0.5.1" - }, - "packaging": { - "hashes": [ - "sha256:dd47c42927d89ab911e606518907cc2d3a1f38bbd026385970643f9c5b8ecfeb", - "sha256:ef103e05f519cdc783ae24ea4e2e0f508a9c99b2d4969652eed6a2e1ea5bd522" - ], - "markers": "python_version >= '3.6'", - "version": "==21.3" - }, - "pathable": { - "hashes": [ - "sha256:5c869d315be50776cc8a993f3af43e0c60dc01506b399643f919034ebf4cdcab", - "sha256:cdd7b1f9d7d5c8b8d3315dbf5a86b2596053ae845f056f57d97c0eefff84da14" - ], - "markers": "python_version >= '3.7' and python_full_version < '4.0.0'", - "version": "==0.4.3" - }, - "pathspec": { - "hashes": [ - "sha256:88c2606f2c1e818b978540f73ecc908e13999c6c3a383daf3705652ae79807a5", - "sha256:8f6bf73e5758fd365ef5d58ce09ac7c27d2833a8d7da51712eac6e27e35141b0" - ], - "markers": "python_version >= '3.7'", - "version": "==0.10.2" - }, - "pbr": { - "hashes": [ - "sha256:b97bc6695b2aff02144133c2e7399d5885223d42b7912ffaec2ca3898e673bfe", - "sha256:db2317ff07c84c4c63648c9064a79fe9d9f5c7ce85a9099d4b6258b3db83225a" - ], - "markers": "python_version >= '2.6'", - "version": "==5.11.0" - }, - "platformdirs": { - "hashes": [ - "sha256:1006647646d80f16130f052404c6b901e80ee4ed6bef6792e1f238a8969106f7", - "sha256:af0276409f9a02373d540bf8480021a048711d572745aef4b7842dad245eba10" - ], - "markers": "python_version >= '3.7'", - "version": "==2.5.4" - }, - "pluggy": { - "hashes": [ - "sha256:4224373bacce55f955a878bf9cfa763c1e360858e330072059e10bad68531159", - "sha256:74134bbf457f031a36d68416e1509f34bd5ccc019f0bcc952c7b909d06b37bd3" - ], - "markers": "python_version >= '3.6'", - "version": "==1.0.0" - }, - "pycodestyle": { - "hashes": [ - "sha256:347187bdb476329d98f695c213d7295a846d1152ff4fe9bacb8a9590b8ee7053", - "sha256:8a4eaf0d0495c7395bdab3589ac2db602797d76207242c17d470186815706610" - ], - "markers": "python_version >= '3.6'", - "version": "==2.10.0" - }, - "pycparser": { - "hashes": [ - "sha256:8ee45429555515e1f6b185e78100aea234072576aa43ab53aefcae078162fca9", - "sha256:e644fdec12f7872f86c58ff790da456218b10f863970249516d60a5eaca77206" - ], - "version": "==2.21" - }, - "pyflakes": { - "hashes": [ - "sha256:ec55bf7fe21fff7f1ad2f7da62363d749e2a470500eab1b555334b67aa1ef8cf", - "sha256:ec8b276a6b60bd80defed25add7e439881c19e64850afd9b346283d4165fd0fd" - ], - "markers": "python_version >= '3.6'", - "version": "==3.0.1" - }, - "pylint": { - "hashes": [ - "sha256:1d561d1d3e8be9dd880edc685162fbdaa0409c88b9b7400873c0cf345602e326", - "sha256:91e4776dbcb4b4d921a3e4b6fec669551107ba11f29d9199154a01622e460a57" - ], - "index": "pypi", - "version": "==2.15.7" - }, - "pyparsing": { - "hashes": [ - "sha256:2b020ecf7d21b687f219b71ecad3631f644a47f01403fa1d1036b0c6416d70fb", - "sha256:5026bae9a10eeaefb61dab2f09052b9f4307d44aee4eda64b309723d8d206bbc" - ], - "markers": "python_full_version >= '3.6.8'", - "version": "==3.0.9" - }, - "pyrsistent": { - "hashes": [ - "sha256:055ab45d5911d7cae397dc418808d8802fb95262751872c841c170b0dbf51eed", - "sha256:111156137b2e71f3a9936baf27cb322e8024dac3dc54ec7fb9f0bcf3249e68bb", - "sha256:187d5730b0507d9285a96fca9716310d572e5464cadd19f22b63a6976254d77a", - "sha256:21455e2b16000440e896ab99e8304617151981ed40c29e9507ef1c2e4314ee95", - "sha256:2aede922a488861de0ad00c7630a6e2d57e8023e4be72d9d7147a9fcd2d30712", - "sha256:3ba4134a3ff0fc7ad225b6b457d1309f4698108fb6b35532d015dca8f5abed73", - "sha256:456cb30ca8bff00596519f2c53e42c245c09e1a4543945703acd4312949bfd41", - "sha256:71d332b0320642b3261e9fee47ab9e65872c2bd90260e5d225dabeed93cbd42b", - "sha256:879b4c2f4d41585c42df4d7654ddffff1239dc4065bc88b745f0341828b83e78", - "sha256:9cd3e9978d12b5d99cbdc727a3022da0430ad007dacf33d0bf554b96427f33ab", - "sha256:a178209e2df710e3f142cbd05313ba0c5ebed0a55d78d9945ac7a4e09d923308", - "sha256:b39725209e06759217d1ac5fcdb510e98670af9e37223985f330b611f62e7425", - "sha256:bfa0351be89c9fcbcb8c9879b826f4353be10f58f8a677efab0c017bf7137ec2", - "sha256:bfd880614c6237243ff53a0539f1cb26987a6dc8ac6e66e0c5a40617296a045e", - "sha256:c43bec251bbd10e3cb58ced80609c5c1eb238da9ca78b964aea410fb820d00d6", - "sha256:d690b18ac4b3e3cab73b0b7aa7dbe65978a172ff94970ff98d82f2031f8971c2", - "sha256:d6982b5a0237e1b7d876b60265564648a69b14017f3b5f908c5be2de3f9abb7a", - "sha256:dec3eac7549869365fe263831f576c8457f6c833937c68542d08fde73457d291", - "sha256:e371b844cec09d8dc424d940e54bba8f67a03ebea20ff7b7b0d56f526c71d584", - "sha256:e5d8f84d81e3729c3b506657dddfe46e8ba9c330bf1858ee33108f8bb2adb38a", - "sha256:ea6b79a02a28550c98b6ca9c35b9f492beaa54d7c5c9e9949555893c8a9234d0", - "sha256:f1258f4e6c42ad0b20f9cfcc3ada5bd6b83374516cd01c0960e3cb75fdca6770" - ], - "markers": "python_version >= '3.7'", - "version": "==0.19.2" - }, - "pytest": { - "hashes": [ - "sha256:892f933d339f068883b6fd5a459f03d85bfcb355e4981e146d2c7616c21fef71", - "sha256:c4014eb40e10f11f355ad4e3c2fb2c6c6d1919c73f3b5a433de4708202cade59" - ], - "index": "pypi", - "version": "==7.2.0" - }, - "pytest-xdist": { - "hashes": [ - "sha256:688da9b814370e891ba5de650c9327d1a9d861721a524eb917e620eec3e90291", - "sha256:9feb9a18e1790696ea23e1434fa73b325ed4998b0e9fcb221f16fd1945e6df1b" - ], - "index": "pypi", - "version": "==3.0.2" - }, - "python-dateutil": { - "hashes": [ - "sha256:0123cacc1627ae19ddf3c27a5de5bd67ee4586fbdd6440d9748f8abb483d3e86", - "sha256:961d03dc3453ebbc59dbdea9e4e11c5651520a876d0f4db161e8674aae935da9" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", - "version": "==2.8.2" - }, - "pytz": { - "hashes": [ - "sha256:222439474e9c98fced559f1709d89e6c9cbf8d79c794ff3eb9f8800064291427", - "sha256:e89512406b793ca39f5971bc999cc538ce125c0e51c27941bef4568b460095e2" - ], - "version": "==2022.6" - }, - "pyyaml": { - "hashes": [ - "sha256:01b45c0191e6d66c470b6cf1b9531a771a83c1c4208272ead47a3ae4f2f603bf", - "sha256:0283c35a6a9fbf047493e3a0ce8d79ef5030852c51e9d911a27badfde0605293", - "sha256:055d937d65826939cb044fc8c9b08889e8c743fdc6a32b33e2390f66013e449b", - "sha256:07751360502caac1c067a8132d150cf3d61339af5691fe9e87803040dbc5db57", - "sha256:0b4624f379dab24d3725ffde76559cff63d9ec94e1736b556dacdfebe5ab6d4b", - "sha256:0ce82d761c532fe4ec3f87fc45688bdd3a4c1dc5e0b4a19814b9009a29baefd4", - "sha256:1e4747bc279b4f613a09eb64bba2ba602d8a6664c6ce6396a4d0cd413a50ce07", - "sha256:213c60cd50106436cc818accf5baa1aba61c0189ff610f64f4a3e8c6726218ba", - "sha256:231710d57adfd809ef5d34183b8ed1eeae3f76459c18fb4a0b373ad56bedcdd9", - "sha256:277a0ef2981ca40581a47093e9e2d13b3f1fbbeffae064c1d21bfceba2030287", - "sha256:2cd5df3de48857ed0544b34e2d40e9fac445930039f3cfe4bcc592a1f836d513", - "sha256:40527857252b61eacd1d9af500c3337ba8deb8fc298940291486c465c8b46ec0", - "sha256:432557aa2c09802be39460360ddffd48156e30721f5e8d917f01d31694216782", - "sha256:473f9edb243cb1935ab5a084eb238d842fb8f404ed2193a915d1784b5a6b5fc0", - "sha256:48c346915c114f5fdb3ead70312bd042a953a8ce5c7106d5bfb1a5254e47da92", - "sha256:50602afada6d6cbfad699b0c7bb50d5ccffa7e46a3d738092afddc1f9758427f", - "sha256:68fb519c14306fec9720a2a5b45bc9f0c8d1b9c72adf45c37baedfcd949c35a2", - "sha256:77f396e6ef4c73fdc33a9157446466f1cff553d979bd00ecb64385760c6babdc", - "sha256:81957921f441d50af23654aa6c5e5eaf9b06aba7f0a19c18a538dc7ef291c5a1", - "sha256:819b3830a1543db06c4d4b865e70ded25be52a2e0631ccd2f6a47a2822f2fd7c", - "sha256:897b80890765f037df3403d22bab41627ca8811ae55e9a722fd0392850ec4d86", - "sha256:98c4d36e99714e55cfbaaee6dd5badbc9a1ec339ebfc3b1f52e293aee6bb71a4", - "sha256:9df7ed3b3d2e0ecfe09e14741b857df43adb5a3ddadc919a2d94fbdf78fea53c", - "sha256:9fa600030013c4de8165339db93d182b9431076eb98eb40ee068700c9c813e34", - "sha256:a80a78046a72361de73f8f395f1f1e49f956c6be882eed58505a15f3e430962b", - "sha256:afa17f5bc4d1b10afd4466fd3a44dc0e245382deca5b3c353d8b757f9e3ecb8d", - "sha256:b3d267842bf12586ba6c734f89d1f5b871df0273157918b0ccefa29deb05c21c", - "sha256:b5b9eccad747aabaaffbc6064800670f0c297e52c12754eb1d976c57e4f74dcb", - "sha256:bfaef573a63ba8923503d27530362590ff4f576c626d86a9fed95822a8255fd7", - "sha256:c5687b8d43cf58545ade1fe3e055f70eac7a5a1a0bf42824308d868289a95737", - "sha256:cba8c411ef271aa037d7357a2bc8f9ee8b58b9965831d9e51baf703280dc73d3", - "sha256:d15a181d1ecd0d4270dc32edb46f7cb7733c7c508857278d3d378d14d606db2d", - "sha256:d4b0ba9512519522b118090257be113b9468d804b19d63c71dbcf4a48fa32358", - "sha256:d4db7c7aef085872ef65a8fd7d6d09a14ae91f691dec3e87ee5ee0539d516f53", - "sha256:d4eccecf9adf6fbcc6861a38015c2a64f38b9d94838ac1810a9023a0609e1b78", - "sha256:d67d839ede4ed1b28a4e8909735fc992a923cdb84e618544973d7dfc71540803", - "sha256:daf496c58a8c52083df09b80c860005194014c3698698d1a57cbcfa182142a3a", - "sha256:dbad0e9d368bb989f4515da330b88a057617d16b6a8245084f1b05400f24609f", - "sha256:e61ceaab6f49fb8bdfaa0f92c4b57bcfbea54c09277b1b4f7ac376bfb7a7c174", - "sha256:f84fbc98b019fef2ee9a1cb3ce93e3187a6df0b2538a651bfb890254ba9f90b5" - ], - "markers": "python_version >= '3.6'", - "version": "==6.0" - }, - "requests": { - "hashes": [ - "sha256:7c5599b102feddaa661c826c56ab4fee28bfd17f5abca1ebbe3e7f19d7c97983", - "sha256:8fefa2a1a1365bf5520aac41836fbee479da67864514bdb821f31ce07ce65349" - ], - "markers": "python_version >= '3.7' and python_version < '4'", - "version": "==2.28.1" - }, - "responses": { - "hashes": [ - "sha256:396acb2a13d25297789a5866b4881cf4e46ffd49cc26c43ab1117f40b973102e", - "sha256:dcf294d204d14c436fddcc74caefdbc5764795a40ff4e6a7740ed8ddbf3294be" - ], - "markers": "python_version >= '3.7'", - "version": "==0.22.0" - }, - "ruamel.yaml": { - "hashes": [ - "sha256:742b35d3d665023981bd6d16b3d24248ce5df75fdb4e2924e93a05c1f8b61ca7", - "sha256:8b7ce697a2f212752a35c1ac414471dc16c424c9573be4926b56ff3f5d23b7af" - ], - "markers": "python_version >= '3'", - "version": "==0.17.21" - }, - "ruamel.yaml.clib": { - "hashes": [ - "sha256:045e0626baf1c52e5527bd5db361bc83180faaba2ff586e763d3d5982a876a9e", - "sha256:15910ef4f3e537eea7fe45f8a5d19997479940d9196f357152a09031c5be59f3", - "sha256:184faeaec61dbaa3cace407cffc5819f7b977e75360e8d5ca19461cd851a5fc5", - "sha256:1f08fd5a2bea9c4180db71678e850b995d2a5f4537be0e94557668cf0f5f9497", - "sha256:2aa261c29a5545adfef9296b7e33941f46aa5bbd21164228e833412af4c9c75f", - "sha256:3110a99e0f94a4a3470ff67fc20d3f96c25b13d24c6980ff841e82bafe827cac", - "sha256:3243f48ecd450eddadc2d11b5feb08aca941b5cd98c9b1db14b2fd128be8c697", - "sha256:370445fd795706fd291ab00c9df38a0caed0f17a6fb46b0f607668ecb16ce763", - "sha256:40d030e2329ce5286d6b231b8726959ebbe0404c92f0a578c0e2482182e38282", - "sha256:4a4d8d417868d68b979076a9be6a38c676eca060785abaa6709c7b31593c35d1", - "sha256:4b3a93bb9bc662fc1f99c5c3ea8e623d8b23ad22f861eb6fce9377ac07ad6072", - "sha256:5bc0667c1eb8f83a3752b71b9c4ba55ef7c7058ae57022dd9b29065186a113d9", - "sha256:721bc4ba4525f53f6a611ec0967bdcee61b31df5a56801281027a3a6d1c2daf5", - "sha256:763d65baa3b952479c4e972669f679fe490eee058d5aa85da483ebae2009d231", - "sha256:7bdb4c06b063f6fd55e472e201317a3bb6cdeeee5d5a38512ea5c01e1acbdd93", - "sha256:8831a2cedcd0f0927f788c5bdf6567d9dc9cc235646a434986a852af1cb54b4b", - "sha256:91a789b4aa0097b78c93e3dc4b40040ba55bef518f84a40d4442f713b4094acb", - "sha256:92460ce908546ab69770b2e576e4f99fbb4ce6ab4b245345a3869a0a0410488f", - "sha256:99e77daab5d13a48a4054803d052ff40780278240a902b880dd37a51ba01a307", - "sha256:a234a20ae07e8469da311e182e70ef6b199d0fbeb6c6cc2901204dd87fb867e8", - "sha256:a7b301ff08055d73223058b5c46c55638917f04d21577c95e00e0c4d79201a6b", - "sha256:be2a7ad8fd8f7442b24323d24ba0b56c51219513cfa45b9ada3b87b76c374d4b", - "sha256:bf9a6bc4a0221538b1a7de3ed7bca4c93c02346853f44e1cd764be0023cd3640", - "sha256:c3ca1fbba4ae962521e5eb66d72998b51f0f4d0f608d3c0347a48e1af262efa7", - "sha256:d000f258cf42fec2b1bbf2863c61d7b8918d31ffee905da62dede869254d3b8a", - "sha256:d5859983f26d8cd7bb5c287ef452e8aacc86501487634573d260968f753e1d71", - "sha256:d5e51e2901ec2366b79f16c2299a03e74ba4531ddcfacc1416639c557aef0ad8", - "sha256:debc87a9516b237d0466a711b18b6ebeb17ba9f391eb7f91c649c5c4ec5006c7", - "sha256:df5828871e6648db72d1c19b4bd24819b80a755c4541d3409f0f7acd0f335c80", - "sha256:ecdf1a604009bd35c674b9225a8fa609e0282d9b896c03dd441a91e5f53b534e", - "sha256:efa08d63ef03d079dcae1dfe334f6c8847ba8b645d08df286358b1f5293d24ab", - "sha256:f01da5790e95815eb5a8a138508c01c758e5f5bc0ce4286c4f7028b8dd7ac3d0", - "sha256:f34019dced51047d6f70cb9383b2ae2853b7fc4dce65129a5acd49f4f9256646" - ], - "markers": "python_version < '3.11' and platform_python_implementation == 'CPython'", - "version": "==0.2.7" - }, - "s3transfer": { - "hashes": [ - "sha256:06176b74f3a15f61f1b4f25a1fc29a4429040b7647133a463da8fa5bd28d5ecd", - "sha256:2ed07d3866f523cc561bf4a00fc5535827981b117dd7876f036b0c1aca42c947" - ], - "markers": "python_version >= '3.7'", - "version": "==0.6.0" - }, - "safety": { - "hashes": [ - "sha256:2e17cf127472ca720cdcc65f834008b555a10fe56627646009ab7565dd2459cf", - "sha256:c12b2aaf3495faf42951fdd91d3c5ce6ecffd05efa423a29244408b72c556744" - ], - "index": "pypi", - "version": "==2.3.3" - }, - "setuptools": { - "hashes": [ - "sha256:57f6f22bde4e042978bcd50176fdb381d7c21a9efa4041202288d3737a0c6a54", - "sha256:a7620757bf984b58deaf32fc8a4577a9bbc0850cf92c20e1ce41c38c19e5fb75" - ], - "markers": "python_version >= '3.7'", - "version": "==65.6.3" - }, - "six": { - "hashes": [ - "sha256:1e61c37477a1626458e36f7b1d82aa5c9b094fa4802892072e49de9c60c4c926", - "sha256:8abb2f1d86890a2dfb989f9a77cfcfd3e47c2a354b01111771326f8aa26e0254" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", - "version": "==1.16.0" - }, - "smmap": { - "hashes": [ - "sha256:2aba19d6a040e78d8b09de5c57e96207b09ed71d8e55ce0959eeee6c8e190d94", - "sha256:c840e62059cd3be204b0c9c9f74be2c09d5648eddd4580d9314c3ecde0b30936" - ], - "markers": "python_version >= '3.6'", - "version": "==5.0.0" - }, - "stevedore": { - "hashes": [ - "sha256:7f8aeb6e3f90f96832c301bff21a7eb5eefbe894c88c506483d355565d88cc1a", - "sha256:aa6436565c069b2946fe4ebff07f5041e0c8bf18c7376dd29edf80cf7d524e4e" - ], - "markers": "python_version >= '3.8'", - "version": "==4.1.1" - }, - "sure": { - "hashes": [ - "sha256:34ae88c846046742ef074036bf311dc90ab152b7bc09c342b281cebf676727a2" - ], - "index": "pypi", - "version": "==2.0.0" - }, - "toml": { - "hashes": [ - "sha256:806143ae5bfb6a3c6e736a764057db0e6a0e05e338b5630894a5f779cabb4f9b", - "sha256:b3bda1d108d5dd99f4a20d24d9c348e91c4db7ab1b749200bded2f839ccbe68f" - ], - "markers": "python_version >= '2.6' and python_version not in '3.0, 3.1, 3.2, 3.3'", - "version": "==0.10.2" - }, - "tomli": { - "hashes": [ - "sha256:939de3e7a6161af0c887ef91b7d41a53e7c5a1ca976325f429cb46ea9bc30ecc", - "sha256:de526c12914f0c550d15924c62d72abc48d6fe7364aa87328337a31007fe8a4f" - ], - "markers": "python_full_version < '3.11.0a7'", - "version": "==2.0.1" - }, - "tomlkit": { - "hashes": [ - "sha256:07de26b0d8cfc18f871aec595fda24d95b08fef89d147caa861939f37230bf4b", - "sha256:71b952e5721688937fb02cf9d354dbcf0785066149d2855e44531ebdd2b65d73" - ], - "markers": "python_version >= '3.6'", - "version": "==0.11.6" - }, - "types-toml": { - "hashes": [ - "sha256:171bdb3163d79a520560f24ba916a9fc9bff81659c5448a9fea89240923722be", - "sha256:b7b5c4977f96ab7b5ac06d8a6590d17c0bf252a96efc03b109c2711fb3e0eafd" - ], - "version": "==0.10.8.1" - }, - "typing-extensions": { - "hashes": [ - "sha256:1511434bb92bf8dd198c12b1cc812e800d4181cfcb867674e0f8279cc93087aa", - "sha256:16fa4864408f655d35ec496218b85f79b3437c829e93320c7c9215ccfd92489e" - ], - "markers": "python_version >= '3.7'", - "version": "==4.4.0" - }, - "urllib3": { - "hashes": [ - "sha256:47cc05d99aaa09c9e72ed5809b60e7ba354e64b59c9c173ac3018642d8bb41fc", - "sha256:c083dd0dce68dbfbe1129d5271cb90f9447dea7d52097c6e0126120c521ddea8" - ], - "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3, 3.4, 3.5'", - "version": "==1.26.13" - }, - "vulture": { - "hashes": [ - "sha256:2515fa848181001dc8a73aba6a01a1a17406f5d372f24ec7f7191866f9f4997e", - "sha256:e792e903ccc063ec4873a8979dcf11b51ea3d65a2d3b31c113d47be48f0cdcae" - ], - "index": "pypi", - "version": "==2.6" - }, - "websocket-client": { - "hashes": [ - "sha256:d6b06432f184438d99ac1f456eaf22fe1ade524c3dd16e661142dc54e9cba574", - "sha256:d6e8f90ca8e2dd4e8027c4561adeb9456b54044312dba655e7cae652ceb9ae59" - ], - "markers": "python_version >= '3.7'", - "version": "==1.4.2" - }, - "werkzeug": { - "hashes": [ - "sha256:7ea2d48322cc7c0f8b3a215ed73eabd7b5d75d0b50e31ab006286ccff9e00b8f", - "sha256:f979ab81f58d7318e064e99c4506445d60135ac5cd2e177a2de0089bfd4c9bd5" - ], - "markers": "python_version >= '3.7'", - "version": "==2.2.2" - }, - "wrapt": { - "hashes": [ - "sha256:00b6d4ea20a906c0ca56d84f93065b398ab74b927a7a3dbd470f6fc503f95dc3", - "sha256:01c205616a89d09827986bc4e859bcabd64f5a0662a7fe95e0d359424e0e071b", - "sha256:02b41b633c6261feff8ddd8d11c711df6842aba629fdd3da10249a53211a72c4", - "sha256:07f7a7d0f388028b2df1d916e94bbb40624c59b48ecc6cbc232546706fac74c2", - "sha256:11871514607b15cfeb87c547a49bca19fde402f32e2b1c24a632506c0a756656", - "sha256:1b376b3f4896e7930f1f772ac4b064ac12598d1c38d04907e696cc4d794b43d3", - "sha256:21ac0156c4b089b330b7666db40feee30a5d52634cc4560e1905d6529a3897ff", - "sha256:257fd78c513e0fb5cdbe058c27a0624c9884e735bbd131935fd49e9fe719d310", - "sha256:2b39d38039a1fdad98c87279b48bc5dce2c0ca0d73483b12cb72aa9609278e8a", - "sha256:2cf71233a0ed05ccdabe209c606fe0bac7379fdcf687f39b944420d2a09fdb57", - "sha256:2fe803deacd09a233e4762a1adcea5db5d31e6be577a43352936179d14d90069", - "sha256:3232822c7d98d23895ccc443bbdf57c7412c5a65996c30442ebe6ed3df335383", - "sha256:34aa51c45f28ba7f12accd624225e2b1e5a3a45206aa191f6f9aac931d9d56fe", - "sha256:36f582d0c6bc99d5f39cd3ac2a9062e57f3cf606ade29a0a0d6b323462f4dd87", - "sha256:380a85cf89e0e69b7cfbe2ea9f765f004ff419f34194018a6827ac0e3edfed4d", - "sha256:40e7bc81c9e2b2734ea4bc1aceb8a8f0ceaac7c5299bc5d69e37c44d9081d43b", - "sha256:43ca3bbbe97af00f49efb06e352eae40434ca9d915906f77def219b88e85d907", - "sha256:4fcc4649dc762cddacd193e6b55bc02edca674067f5f98166d7713b193932b7f", - "sha256:5a0f54ce2c092aaf439813735584b9537cad479575a09892b8352fea5e988dc0", - "sha256:5a9a0d155deafd9448baff28c08e150d9b24ff010e899311ddd63c45c2445e28", - "sha256:5b02d65b9ccf0ef6c34cba6cf5bf2aab1bb2f49c6090bafeecc9cd81ad4ea1c1", - "sha256:60db23fa423575eeb65ea430cee741acb7c26a1365d103f7b0f6ec412b893853", - "sha256:642c2e7a804fcf18c222e1060df25fc210b9c58db7c91416fb055897fc27e8cc", - "sha256:6a9a25751acb379b466ff6be78a315e2b439d4c94c1e99cb7266d40a537995d3", - "sha256:6b1a564e6cb69922c7fe3a678b9f9a3c54e72b469875aa8018f18b4d1dd1adf3", - "sha256:6d323e1554b3d22cfc03cd3243b5bb815a51f5249fdcbb86fda4bf62bab9e164", - "sha256:6e743de5e9c3d1b7185870f480587b75b1cb604832e380d64f9504a0535912d1", - "sha256:709fe01086a55cf79d20f741f39325018f4df051ef39fe921b1ebe780a66184c", - "sha256:7b7c050ae976e286906dd3f26009e117eb000fb2cf3533398c5ad9ccc86867b1", - "sha256:7d2872609603cb35ca513d7404a94d6d608fc13211563571117046c9d2bcc3d7", - "sha256:7ef58fb89674095bfc57c4069e95d7a31cfdc0939e2a579882ac7d55aadfd2a1", - "sha256:80bb5c256f1415f747011dc3604b59bc1f91c6e7150bd7db03b19170ee06b320", - "sha256:81b19725065dcb43df02b37e03278c011a09e49757287dca60c5aecdd5a0b8ed", - "sha256:833b58d5d0b7e5b9832869f039203389ac7cbf01765639c7309fd50ef619e0b1", - "sha256:88bd7b6bd70a5b6803c1abf6bca012f7ed963e58c68d76ee20b9d751c74a3248", - "sha256:8ad85f7f4e20964db4daadcab70b47ab05c7c1cf2a7c1e51087bfaa83831854c", - "sha256:8c0ce1e99116d5ab21355d8ebe53d9460366704ea38ae4d9f6933188f327b456", - "sha256:8d649d616e5c6a678b26d15ece345354f7c2286acd6db868e65fcc5ff7c24a77", - "sha256:903500616422a40a98a5a3c4ff4ed9d0066f3b4c951fa286018ecdf0750194ef", - "sha256:9736af4641846491aedb3c3f56b9bc5568d92b0692303b5a305301a95dfd38b1", - "sha256:988635d122aaf2bdcef9e795435662bcd65b02f4f4c1ae37fbee7401c440b3a7", - "sha256:9cca3c2cdadb362116235fdbd411735de4328c61425b0aa9f872fd76d02c4e86", - "sha256:9e0fd32e0148dd5dea6af5fee42beb949098564cc23211a88d799e434255a1f4", - "sha256:9f3e6f9e05148ff90002b884fbc2a86bd303ae847e472f44ecc06c2cd2fcdb2d", - "sha256:a85d2b46be66a71bedde836d9e41859879cc54a2a04fad1191eb50c2066f6e9d", - "sha256:a9a52172be0b5aae932bef82a79ec0a0ce87288c7d132946d645eba03f0ad8a8", - "sha256:aa31fdcc33fef9eb2552cbcbfee7773d5a6792c137b359e82879c101e98584c5", - "sha256:b014c23646a467558be7da3d6b9fa409b2c567d2110599b7cf9a0c5992b3b471", - "sha256:b21bb4c09ffabfa0e85e3a6b623e19b80e7acd709b9f91452b8297ace2a8ab00", - "sha256:b5901a312f4d14c59918c221323068fad0540e34324925c8475263841dbdfe68", - "sha256:b9b7a708dd92306328117d8c4b62e2194d00c365f18eff11a9b53c6f923b01e3", - "sha256:d1967f46ea8f2db647c786e78d8cc7e4313dbd1b0aca360592d8027b8508e24d", - "sha256:d52a25136894c63de15a35bc0bdc5adb4b0e173b9c0d07a2be9d3ca64a332735", - "sha256:d77c85fedff92cf788face9bfa3ebaa364448ebb1d765302e9af11bf449ca36d", - "sha256:d79d7d5dc8a32b7093e81e97dad755127ff77bcc899e845f41bf71747af0c569", - "sha256:dbcda74c67263139358f4d188ae5faae95c30929281bc6866d00573783c422b7", - "sha256:ddaea91abf8b0d13443f6dac52e89051a5063c7d014710dcb4d4abb2ff811a59", - "sha256:dee0ce50c6a2dd9056c20db781e9c1cfd33e77d2d569f5d1d9321c641bb903d5", - "sha256:dee60e1de1898bde3b238f18340eec6148986da0455d8ba7848d50470a7a32fb", - "sha256:e2f83e18fe2f4c9e7db597e988f72712c0c3676d337d8b101f6758107c42425b", - "sha256:e3fb1677c720409d5f671e39bac6c9e0e422584e5f518bfd50aa4cbbea02433f", - "sha256:ee2b1b1769f6707a8a445162ea16dddf74285c3964f605877a20e38545c3c462", - "sha256:ee6acae74a2b91865910eef5e7de37dc6895ad96fa23603d1d27ea69df545015", - "sha256:ef3f72c9666bba2bab70d2a8b79f2c6d2c1a42a7f7e2b0ec83bb2f9e383950af" - ], - "markers": "python_version < '3.11'", - "version": "==1.14.1" - }, - "xmltodict": { - "hashes": [ - "sha256:341595a488e3e01a85a9d8911d8912fd922ede5fecc4dce437eb4b6c8d037e56", - "sha256:aa89e8fd76320154a40d19a0df04a4695fb9dc5ba977cbb68ab3e4eb225e7852" - ], - "markers": "python_version >= '3.4'", - "version": "==0.13.0" - }, - "zipp": { - "hashes": [ - "sha256:83a28fcb75844b5c0cdaf5aa4003c2d728c77e05f5aeabe8e95e56727005fbaa", - "sha256:a7a22e05929290a67401440b39690ae6563279bced5f314609d9d03798f56766" - ], - "markers": "python_version < '3.10'", - "version": "==3.11.0" + "_meta": { + "hash": { + "sha256": "267c2834261b566bdbfe631a063a481e14a0114871d7ca2f02d57a798e33ee56" + }, + "pipfile-spec": 6, + "requires": { + "python_version": "3.9" + }, + "sources": [ + { + "name": "pypi", + "url": "https://pypi.org/simple", + "verify_ssl": true + } + ] + }, + "default": { + "about-time": { + "hashes": [ + "sha256:586b329450c9387d1ae8c42d2db4f5b4c57a54508d0f1b7bb00322ffd5ce9f9b", + "sha256:96841beb3f9b5de1cbb323d2bdb0fa9abdecbc46f2d546b9b3c2483d23daa17a" + ], + "version": "==3.1.1" + }, + "alive-progress": { + "hashes": [ + "sha256:089757c8197f27ad972ba27e1060f6db92368d83c736884e159034fd74865323", + "sha256:5503ffca0a0607d5f0d24d3b10a718fe50e375470fa07602b246333eb7ec88ee" + ], + "index": "pypi", + "version": "==2.4.1" + }, + "arnparse": { + "hashes": [ + "sha256:b0906734e4b8f19e39b1e32944c6cd6274b6da90c066a83882ac7a11d27553e0", + "sha256:cb87f17200d07121108a9085d4a09cc69a55582647776b9a917b0b1f279db8f8" + ], + "index": "pypi", + "version": "==0.0.2" + }, + "azure-common": { + "hashes": [ + "sha256:4ac0cd3214e36b6a1b6a442686722a5d8cc449603aa833f3f0f40bda836704a3", + "sha256:5c12d3dcf4ec20599ca6b0d3e09e86e146353d443e7fcc050c9a19c1f9df20ad" + ], + "version": "==1.1.28" + }, + "azure-core": { + "hashes": [ + "sha256:223b0e90cbdd1f03c41b195b03239899843f20d00964dbb85e64386873414a2d", + "sha256:726ffd1ded04a2c1cb53f9d9155cbb05ac5c1c2a29af4ef622e93e1c0a8bc92b" + ], + "markers": "python_version >= '3.7'", + "version": "==1.26.1" + }, + "azure-identity": { + "hashes": [ + "sha256:2a58ce4a209a013e37eaccfd5937570ab99e9118b3e1acf875eed3a85d541b92", + "sha256:7f9b1ae7d97ea7af3f38dd09305e19ab81a1e16ab66ea186b6579d85c1ca2347" + ], + "index": "pypi", + "version": "==1.12.0" + }, + "azure-mgmt-authorization": { + "hashes": [ + "sha256:0a5d7f683bf3372236b841cdbd4677f6b08ed7ce41b999c3e644d4286252057d", + "sha256:b3f9e584b87d5cc39d41283211237945e620c0b868394880aeded80a126b2c40" + ], + "index": "pypi", + "version": "==3.0.0" + }, + "azure-mgmt-core": { + "hashes": [ + "sha256:07f4afe823a55d704b048d61edfdc1318c051ed59f244032126350be95e9d501", + "sha256:fd829f67086e5cf6f7eb016c9e80bb0fb293cbbbd4d8738dc90af9aa1055fb7b" + ], + "markers": "python_version >= '3.6'", + "version": "==1.3.2" + }, + "azure-mgmt-security": { + "hashes": [ + "sha256:3b14a236383effdc5e3135b394b7883a183fcc9cdde01b735b2aae227b42e2e9", + "sha256:bcba7cef857f6b02a2d98afeb07f9871b1628fa33d8861ab1387e732e7db3f84" + ], + "index": "pypi", + "version": "==3.0.0" + }, + "azure-mgmt-storage": { + "hashes": [ + "sha256:6eb13eeecf89195b2b5f47be0679e3f27888efd7bd2132eec7ebcbce75cb1377", + "sha256:89d644c6192118b0b097deaa9c4925832d8f7ea4693d38d5fce3f0125b43a1c5" + ], + "index": "pypi", + "version": "==21.0.0" + }, + "azure-mgmt-subscription": { + "hashes": [ + "sha256:38d4574a8d47fa17e3587d756e296cb63b82ad8fb21cd8543bcee443a502bf48", + "sha256:4e255b4ce9b924357bb8c5009b3c88a2014d3203b2495e2256fa027bf84e800e" + ], + "index": "pypi", + "version": "==3.1.1" + }, + "azure-storage-blob": { + "hashes": [ + "sha256:52b84658e8df7853a3cf1c563814655b5028b979b2a87905b92aa6bb30be240e", + "sha256:860d4d82985a4bfc7d3271e71275af330f54f330a754355435a7ba749ccde997" + ], + "index": "pypi", + "version": "==12.14.1" + }, + "boto3": { + "hashes": [ + "sha256:53badfc5f145b8a3f9117512b41bc5a64db1cce1b549061d8edba68909e63fdf", + "sha256:548081a0f8854bb2eea1e368ab29945478105f56989546f653c75528dcb07d88" + ], + "index": "pypi", + "version": "==1.26.28" + }, + "botocore": { + "hashes": [ + "sha256:982732e7ed65cb6ed11ea3ce0e32dff2bcd465836c32376154f0802aa0a112c7", + "sha256:f0b8bb976e368dea20a960b47169e31fc0828feb6f0b9f59f1e5be8d08919b10" + ], + "index": "pypi", + "version": "==1.29.28" + }, + "certifi": { + "hashes": [ + "sha256:35824b4c3a97115964b408844d64aa14db1cc518f6562e8d7261699d1350a9e3", + "sha256:4ad3232f5e926d6718ec31cfc1fcadfde020920e278684144551c91769c7bc18" + ], + "markers": "python_version >= '3.6'", + "version": "==2022.12.7" + }, + "cffi": { + "hashes": [ + "sha256:00a9ed42e88df81ffae7a8ab6d9356b371399b91dbdf0c3cb1e84c03a13aceb5", + "sha256:03425bdae262c76aad70202debd780501fabeaca237cdfddc008987c0e0f59ef", + "sha256:04ed324bda3cda42b9b695d51bb7d54b680b9719cfab04227cdd1e04e5de3104", + "sha256:0e2642fe3142e4cc4af0799748233ad6da94c62a8bec3a6648bf8ee68b1c7426", + "sha256:173379135477dc8cac4bc58f45db08ab45d228b3363adb7af79436135d028405", + "sha256:198caafb44239b60e252492445da556afafc7d1e3ab7a1fb3f0584ef6d742375", + "sha256:1e74c6b51a9ed6589199c787bf5f9875612ca4a8a0785fb2d4a84429badaf22a", + "sha256:2012c72d854c2d03e45d06ae57f40d78e5770d252f195b93f581acf3ba44496e", + "sha256:21157295583fe8943475029ed5abdcf71eb3911894724e360acff1d61c1d54bc", + "sha256:2470043b93ff09bf8fb1d46d1cb756ce6132c54826661a32d4e4d132e1977adf", + "sha256:285d29981935eb726a4399badae8f0ffdff4f5050eaa6d0cfc3f64b857b77185", + "sha256:30d78fbc8ebf9c92c9b7823ee18eb92f2e6ef79b45ac84db507f52fbe3ec4497", + "sha256:320dab6e7cb2eacdf0e658569d2575c4dad258c0fcc794f46215e1e39f90f2c3", + "sha256:33ab79603146aace82c2427da5ca6e58f2b3f2fb5da893ceac0c42218a40be35", + "sha256:3548db281cd7d2561c9ad9984681c95f7b0e38881201e157833a2342c30d5e8c", + "sha256:3799aecf2e17cf585d977b780ce79ff0dc9b78d799fc694221ce814c2c19db83", + "sha256:39d39875251ca8f612b6f33e6b1195af86d1b3e60086068be9cc053aa4376e21", + "sha256:3b926aa83d1edb5aa5b427b4053dc420ec295a08e40911296b9eb1b6170f6cca", + "sha256:3bcde07039e586f91b45c88f8583ea7cf7a0770df3a1649627bf598332cb6984", + "sha256:3d08afd128ddaa624a48cf2b859afef385b720bb4b43df214f85616922e6a5ac", + "sha256:3eb6971dcff08619f8d91607cfc726518b6fa2a9eba42856be181c6d0d9515fd", + "sha256:40f4774f5a9d4f5e344f31a32b5096977b5d48560c5592e2f3d2c4374bd543ee", + "sha256:4289fc34b2f5316fbb762d75362931e351941fa95fa18789191b33fc4cf9504a", + "sha256:470c103ae716238bbe698d67ad020e1db9d9dba34fa5a899b5e21577e6d52ed2", + "sha256:4f2c9f67e9821cad2e5f480bc8d83b8742896f1242dba247911072d4fa94c192", + "sha256:50a74364d85fd319352182ef59c5c790484a336f6db772c1a9231f1c3ed0cbd7", + "sha256:54a2db7b78338edd780e7ef7f9f6c442500fb0d41a5a4ea24fff1c929d5af585", + "sha256:5635bd9cb9731e6d4a1132a498dd34f764034a8ce60cef4f5319c0541159392f", + "sha256:59c0b02d0a6c384d453fece7566d1c7e6b7bae4fc5874ef2ef46d56776d61c9e", + "sha256:5d598b938678ebf3c67377cdd45e09d431369c3b1a5b331058c338e201f12b27", + "sha256:5df2768244d19ab7f60546d0c7c63ce1581f7af8b5de3eb3004b9b6fc8a9f84b", + "sha256:5ef34d190326c3b1f822a5b7a45f6c4535e2f47ed06fec77d3d799c450b2651e", + "sha256:6975a3fac6bc83c4a65c9f9fcab9e47019a11d3d2cf7f3c0d03431bf145a941e", + "sha256:6c9a799e985904922a4d207a94eae35c78ebae90e128f0c4e521ce339396be9d", + "sha256:70df4e3b545a17496c9b3f41f5115e69a4f2e77e94e1d2a8e1070bc0c38c8a3c", + "sha256:7473e861101c9e72452f9bf8acb984947aa1661a7704553a9f6e4baa5ba64415", + "sha256:8102eaf27e1e448db915d08afa8b41d6c7ca7a04b7d73af6514df10a3e74bd82", + "sha256:87c450779d0914f2861b8526e035c5e6da0a3199d8f1add1a665e1cbc6fc6d02", + "sha256:8b7ee99e510d7b66cdb6c593f21c043c248537a32e0bedf02e01e9553a172314", + "sha256:91fc98adde3d7881af9b59ed0294046f3806221863722ba7d8d120c575314325", + "sha256:94411f22c3985acaec6f83c6df553f2dbe17b698cc7f8ae751ff2237d96b9e3c", + "sha256:98d85c6a2bef81588d9227dde12db8a7f47f639f4a17c9ae08e773aa9c697bf3", + "sha256:9ad5db27f9cabae298d151c85cf2bad1d359a1b9c686a275df03385758e2f914", + "sha256:a0b71b1b8fbf2b96e41c4d990244165e2c9be83d54962a9a1d118fd8657d2045", + "sha256:a0f100c8912c114ff53e1202d0078b425bee3649ae34d7b070e9697f93c5d52d", + "sha256:a591fe9e525846e4d154205572a029f653ada1a78b93697f3b5a8f1f2bc055b9", + "sha256:a5c84c68147988265e60416b57fc83425a78058853509c1b0629c180094904a5", + "sha256:a66d3508133af6e8548451b25058d5812812ec3798c886bf38ed24a98216fab2", + "sha256:a8c4917bd7ad33e8eb21e9a5bbba979b49d9a97acb3a803092cbc1133e20343c", + "sha256:b3bbeb01c2b273cca1e1e0c5df57f12dce9a4dd331b4fa1635b8bec26350bde3", + "sha256:cba9d6b9a7d64d4bd46167096fc9d2f835e25d7e4c121fb2ddfc6528fb0413b2", + "sha256:cc4d65aeeaa04136a12677d3dd0b1c0c94dc43abac5860ab33cceb42b801c1e8", + "sha256:ce4bcc037df4fc5e3d184794f27bdaab018943698f4ca31630bc7f84a7b69c6d", + "sha256:cec7d9412a9102bdc577382c3929b337320c4c4c4849f2c5cdd14d7368c5562d", + "sha256:d400bfb9a37b1351253cb402671cea7e89bdecc294e8016a707f6d1d8ac934f9", + "sha256:d61f4695e6c866a23a21acab0509af1cdfd2c013cf256bbf5b6b5e2695827162", + "sha256:db0fbb9c62743ce59a9ff687eb5f4afbe77e5e8403d6697f7446e5f609976f76", + "sha256:dd86c085fae2efd48ac91dd7ccffcfc0571387fe1193d33b6394db7ef31fe2a4", + "sha256:e00b098126fd45523dd056d2efba6c5a63b71ffe9f2bbe1a4fe1716e1d0c331e", + "sha256:e229a521186c75c8ad9490854fd8bbdd9a0c9aa3a524326b55be83b54d4e0ad9", + "sha256:e263d77ee3dd201c3a142934a086a4450861778baaeeb45db4591ef65550b0a6", + "sha256:ed9cb427ba5504c1dc15ede7d516b84757c3e3d7868ccc85121d9310d27eed0b", + "sha256:fa6693661a4c91757f4412306191b6dc88c1703f780c8234035eac011922bc01", + "sha256:fcd131dd944808b5bdb38e6f5b53013c5aa4f334c5cad0c72742f6eba4b73db0" + ], + "version": "==1.15.1" + }, + "charset-normalizer": { + "hashes": [ + "sha256:5a3d016c7c547f69d6f81fb0db9449ce888b418b5b9952cc5e6e66843e9dd845", + "sha256:83e9a75d1911279afd89352c68b45348559d1fc0506b054b346651b5e7fee29f" + ], + "markers": "python_version >= '3.6'", + "version": "==2.1.1" + }, + "click": { + "hashes": [ + "sha256:7682dc8afb30297001674575ea00d1814d808d6a36af415a82bd481d37ba7b8e", + "sha256:bb4d8133cb15a609f44e8213d9b391b0809795062913b383c62be0ee95b1db48" + ], + "markers": "python_version >= '3.7'", + "version": "==8.1.3" + }, + "click-plugins": { + "hashes": [ + "sha256:46ab999744a9d831159c3411bb0c79346d94a444df9a3a3742e9ed63645f264b", + "sha256:5d262006d3222f5057fd81e1623d4443e41dcda5dc815c06b442aa3c02889fc8" + ], + "version": "==1.1.1" + }, + "colorama": { + "hashes": [ + "sha256:08695f5cb7ed6e0531a20572697297273c47b8cae5a63ffc6d6ed5c201be6e44", + "sha256:4f1d9991f5acc0ca119f9d443620b77f9d6b33703e51011c16baf57afb285fc6" + ], + "index": "pypi", + "version": "==0.4.6" + }, + "cryptography": { + "hashes": [ + "sha256:0e70da4bdff7601b0ef48e6348339e490ebfb0cbe638e083c9c41fb49f00c8bd", + "sha256:10652dd7282de17990b88679cb82f832752c4e8237f0c714be518044269415db", + "sha256:175c1a818b87c9ac80bb7377f5520b7f31b3ef2a0004e2420319beadedb67290", + "sha256:1d7e632804a248103b60b16fb145e8df0bc60eed790ece0d12efe8cd3f3e7744", + "sha256:1f13ddda26a04c06eb57119caf27a524ccae20533729f4b1e4a69b54e07035eb", + "sha256:2ec2a8714dd005949d4019195d72abed84198d877112abb5a27740e217e0ea8d", + "sha256:2fa36a7b2cc0998a3a4d5af26ccb6273f3df133d61da2ba13b3286261e7efb70", + "sha256:2fb481682873035600b5502f0015b664abc26466153fab5c6bc92c1ea69d478b", + "sha256:3178d46f363d4549b9a76264f41c6948752183b3f587666aff0555ac50fd7876", + "sha256:4367da5705922cf7070462e964f66e4ac24162e22ab0a2e9d31f1b270dd78083", + "sha256:4eb85075437f0b1fd8cd66c688469a0c4119e0ba855e3fef86691971b887caf6", + "sha256:50a1494ed0c3f5b4d07650a68cd6ca62efe8b596ce743a5c94403e6f11bf06c1", + "sha256:53049f3379ef05182864d13bb9686657659407148f901f3f1eee57a733fb4b00", + "sha256:6391e59ebe7c62d9902c24a4d8bcbc79a68e7c4ab65863536127c8a9cd94043b", + "sha256:67461b5ebca2e4c2ab991733f8ab637a7265bb582f07c7c88914b5afb88cb95b", + "sha256:78e47e28ddc4ace41dd38c42e6feecfdadf9c3be2af389abbfeef1ff06822285", + "sha256:80ca53981ceeb3241998443c4964a387771588c4e4a5d92735a493af868294f9", + "sha256:8a4b2bdb68a447fadebfd7d24855758fe2d6fecc7fed0b78d190b1af39a8e3b0", + "sha256:8e45653fb97eb2f20b8c96f9cd2b3a0654d742b47d638cf2897afbd97f80fa6d", + "sha256:998cd19189d8a747b226d24c0207fdaa1e6658a1d3f2494541cb9dfbf7dcb6d2", + "sha256:a10498349d4c8eab7357a8f9aa3463791292845b79597ad1b98a543686fb1ec8", + "sha256:b4cad0cea995af760f82820ab4ca54e5471fc782f70a007f31531957f43e9dee", + "sha256:bfe6472507986613dc6cc00b3d492b2f7564b02b3b3682d25ca7f40fa3fd321b", + "sha256:c9e0d79ee4c56d841bd4ac6e7697c8ff3c8d6da67379057f29e66acffcd1e9a7", + "sha256:ca57eb3ddaccd1112c18fc80abe41db443cc2e9dcb1917078e02dfa010a4f353", + "sha256:ce127dd0a6a0811c251a6cddd014d292728484e530d80e872ad9806cfb1c5b3c" + ], + "markers": "python_version >= '3.6'", + "version": "==38.0.4" + }, + "detect-secrets": { + "hashes": [ + "sha256:d08ecabeee8b68c0acb0e8a354fb98d822a653f6ed05e520cead4c6fc1fc02cd", + "sha256:d56787e339758cef48c9ccd6692f7a094b9963c979c9813580b0169e41132833" + ], + "index": "pypi", + "version": "==1.4.0" + }, + "grapheme": { + "hashes": [ + "sha256:44c2b9f21bbe77cfb05835fec230bd435954275267fea1858013b102f8603cca" + ], + "version": "==0.6.0" + }, + "idna": { + "hashes": [ + "sha256:814f528e8dead7d329833b91c5faa87d60bf71824cd12a7530b5526063d02cb4", + "sha256:90b77e79eaa3eba6de819a0c442c0b4ceefc341a7a2ab77d7562bf49f425c5c2" + ], + "markers": "python_version >= '3.5'", + "version": "==3.4" + }, + "isodate": { + "hashes": [ + "sha256:0751eece944162659049d35f4f549ed815792b38793f07cf73381c1c87cbed96", + "sha256:48c5881de7e8b0a0d648cb024c8062dc84e7b840ed81e864c7614fd3c127bde9" + ], + "version": "==0.6.1" + }, + "jmespath": { + "hashes": [ + "sha256:02e2e4cc71b5bcab88332eebf907519190dd9e6e82107fa7f83b1003a6252980", + "sha256:90261b206d6defd58fdd5e85f478bf633a2901798906be2ad389150c5c60edbe" + ], + "markers": "python_version >= '3.7'", + "version": "==1.0.1" + }, + "msal": { + "hashes": [ + "sha256:78344cd4c91d6134a593b5e3e45541e666e37b747ff8a6316c3668dd1e6ab6b2", + "sha256:d2f1c26368ecdc28c8657d457352faa0b81b1845a7b889d8676787721ba86792" + ], + "version": "==1.20.0" + }, + "msal-extensions": { + "hashes": [ + "sha256:91e3db9620b822d0ed2b4d1850056a0f133cba04455e62f11612e40f5502f2ee", + "sha256:c676aba56b0cce3783de1b5c5ecfe828db998167875126ca4b47dc6436451354" + ], + "version": "==1.0.0" + }, + "msgraph-core": { + "hashes": [ + "sha256:147324246788abe8ed7e05534cd9e4e0ec98b33b30e011693b8d014cebf97f63", + "sha256:e297564b9a0ca228493d8851f95cb2de9522143d82efa40ce3a6ad286e21392e" + ], + "index": "pypi", + "version": "==0.2.2" + }, + "msrest": { + "hashes": [ + "sha256:21120a810e1233e5e6cc7fe40b474eeb4ec6f757a15d7cf86702c369f9567c32", + "sha256:6e7661f46f3afd88b75667b7187a92829924446c7ea1d169be8c4bb7eeb788b9" + ], + "markers": "python_version >= '3.6'", + "version": "==0.7.1" + }, + "oauthlib": { + "hashes": [ + "sha256:8139f29aac13e25d502680e9e19963e83f16838d48a0d71c287fe40e7067fbca", + "sha256:9859c40929662bec5d64f34d01c99e093149682a3f38915dc0655d5a633dd918" + ], + "markers": "python_version >= '3.6'", + "version": "==3.2.2" + }, + "portalocker": { + "hashes": [ + "sha256:102ed1f2badd8dec9af3d732ef70e94b215b85ba45a8d7ff3c0003f19b442f4e", + "sha256:964f6830fb42a74b5d32bce99ed37d8308c1d7d44ddf18f3dd89f4680de97b39" + ], + "markers": "python_version >= '3.5' and platform_system != 'Windows'", + "version": "==2.6.0" + }, + "pycparser": { + "hashes": [ + "sha256:8ee45429555515e1f6b185e78100aea234072576aa43ab53aefcae078162fca9", + "sha256:e644fdec12f7872f86c58ff790da456218b10f863970249516d60a5eaca77206" + ], + "version": "==2.21" + }, + "pydantic": { + "hashes": [ + "sha256:05e00dbebbe810b33c7a7362f231893183bcc4251f3f2ff991c31d5c08240c42", + "sha256:06094d18dd5e6f2bbf93efa54991c3240964bb663b87729ac340eb5014310624", + "sha256:0b959f4d8211fc964772b595ebb25f7652da3f22322c007b6fed26846a40685e", + "sha256:19b3b9ccf97af2b7519c42032441a891a5e05c68368f40865a90eb88833c2559", + "sha256:1b6ee725bd6e83ec78b1aa32c5b1fa67a3a65badddde3976bca5fe4568f27709", + "sha256:1ee433e274268a4b0c8fde7ad9d58ecba12b069a033ecc4645bb6303c062d2e9", + "sha256:216f3bcbf19c726b1cc22b099dd409aa371f55c08800bcea4c44c8f74b73478d", + "sha256:2d0567e60eb01bccda3a4df01df677adf6b437958d35c12a3ac3e0f078b0ee52", + "sha256:2e05aed07fa02231dbf03d0adb1be1d79cabb09025dd45aa094aa8b4e7b9dcda", + "sha256:352aedb1d71b8b0736c6d56ad2bd34c6982720644b0624462059ab29bd6e5912", + "sha256:355639d9afc76bcb9b0c3000ddcd08472ae75318a6eb67a15866b87e2efa168c", + "sha256:37c90345ec7dd2f1bcef82ce49b6235b40f282b94d3eec47e801baf864d15525", + "sha256:4b8795290deaae348c4eba0cebb196e1c6b98bdbe7f50b2d0d9a4a99716342fe", + "sha256:5760e164b807a48a8f25f8aa1a6d857e6ce62e7ec83ea5d5c5a802eac81bad41", + "sha256:6eb843dcc411b6a2237a694f5e1d649fc66c6064d02b204a7e9d194dff81eb4b", + "sha256:7b5ba54d026c2bd2cb769d3468885f23f43710f651688e91f5fb1edcf0ee9283", + "sha256:7c2abc4393dea97a4ccbb4ec7d8658d4e22c4765b7b9b9445588f16c71ad9965", + "sha256:81a7b66c3f499108b448f3f004801fcd7d7165fb4200acb03f1c2402da73ce4c", + "sha256:91b8e218852ef6007c2b98cd861601c6a09f1aa32bbbb74fab5b1c33d4a1e410", + "sha256:9300fcbebf85f6339a02c6994b2eb3ff1b9c8c14f502058b5bf349d42447dcf5", + "sha256:9cabf4a7f05a776e7793e72793cd92cc865ea0e83a819f9ae4ecccb1b8aa6116", + "sha256:a1f5a63a6dfe19d719b1b6e6106561869d2efaca6167f84f5ab9347887d78b98", + "sha256:a4c805731c33a8db4b6ace45ce440c4ef5336e712508b4d9e1aafa617dc9907f", + "sha256:ae544c47bec47a86bc7d350f965d8b15540e27e5aa4f55170ac6a75e5f73b644", + "sha256:b97890e56a694486f772d36efd2ba31612739bc6f3caeee50e9e7e3ebd2fdd13", + "sha256:bb6ad4489af1bac6955d38ebcb95079a836af31e4c4f74aba1ca05bb9f6027bd", + "sha256:bedf309630209e78582ffacda64a21f96f3ed2e51fbf3962d4d488e503420254", + "sha256:c1ba1afb396148bbc70e9eaa8c06c1716fdddabaf86e7027c5988bae2a829ab6", + "sha256:c33602f93bfb67779f9c507e4d69451664524389546bacfe1bee13cae6dc7488", + "sha256:c4aac8e7103bf598373208f6299fa9a5cfd1fc571f2d40bf1dd1955a63d6eeb5", + "sha256:c6f981882aea41e021f72779ce2a4e87267458cc4d39ea990729e21ef18f0f8c", + "sha256:cc78cc83110d2f275ec1970e7a831f4e371ee92405332ebfe9860a715f8336e1", + "sha256:d49f3db871575e0426b12e2f32fdb25e579dea16486a26e5a0474af87cb1ab0a", + "sha256:dd3f9a40c16daf323cf913593083698caee97df2804aa36c4b3175d5ac1b92a2", + "sha256:e0bedafe4bc165ad0a56ac0bd7695df25c50f76961da29c050712596cf092d6d", + "sha256:e9069e1b01525a96e6ff49e25876d90d5a563bc31c658289a8772ae186552236" + ], + "index": "pypi", + "version": "==1.10.2" + }, + "pyjwt": { + "extras": [ + "crypto" + ], + "hashes": [ + "sha256:69285c7e31fc44f68a1feb309e948e0df53259d579295e6cfe2b1792329f05fd", + "sha256:d83c3d892a77bbb74d3e1a2cfa90afaadb60945205d1095d9221f04466f64c14" + ], + "markers": "python_version >= '3.7'", + "version": "==2.6.0" + }, + "python-dateutil": { + "hashes": [ + "sha256:0123cacc1627ae19ddf3c27a5de5bd67ee4586fbdd6440d9748f8abb483d3e86", + "sha256:961d03dc3453ebbc59dbdea9e4e11c5651520a876d0f4db161e8674aae935da9" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", + "version": "==2.8.2" + }, + "pyyaml": { + "hashes": [ + "sha256:01b45c0191e6d66c470b6cf1b9531a771a83c1c4208272ead47a3ae4f2f603bf", + "sha256:0283c35a6a9fbf047493e3a0ce8d79ef5030852c51e9d911a27badfde0605293", + "sha256:055d937d65826939cb044fc8c9b08889e8c743fdc6a32b33e2390f66013e449b", + "sha256:07751360502caac1c067a8132d150cf3d61339af5691fe9e87803040dbc5db57", + "sha256:0b4624f379dab24d3725ffde76559cff63d9ec94e1736b556dacdfebe5ab6d4b", + "sha256:0ce82d761c532fe4ec3f87fc45688bdd3a4c1dc5e0b4a19814b9009a29baefd4", + "sha256:1e4747bc279b4f613a09eb64bba2ba602d8a6664c6ce6396a4d0cd413a50ce07", + "sha256:213c60cd50106436cc818accf5baa1aba61c0189ff610f64f4a3e8c6726218ba", + "sha256:231710d57adfd809ef5d34183b8ed1eeae3f76459c18fb4a0b373ad56bedcdd9", + "sha256:277a0ef2981ca40581a47093e9e2d13b3f1fbbeffae064c1d21bfceba2030287", + "sha256:2cd5df3de48857ed0544b34e2d40e9fac445930039f3cfe4bcc592a1f836d513", + "sha256:40527857252b61eacd1d9af500c3337ba8deb8fc298940291486c465c8b46ec0", + "sha256:432557aa2c09802be39460360ddffd48156e30721f5e8d917f01d31694216782", + "sha256:473f9edb243cb1935ab5a084eb238d842fb8f404ed2193a915d1784b5a6b5fc0", + "sha256:48c346915c114f5fdb3ead70312bd042a953a8ce5c7106d5bfb1a5254e47da92", + "sha256:50602afada6d6cbfad699b0c7bb50d5ccffa7e46a3d738092afddc1f9758427f", + "sha256:68fb519c14306fec9720a2a5b45bc9f0c8d1b9c72adf45c37baedfcd949c35a2", + "sha256:77f396e6ef4c73fdc33a9157446466f1cff553d979bd00ecb64385760c6babdc", + "sha256:81957921f441d50af23654aa6c5e5eaf9b06aba7f0a19c18a538dc7ef291c5a1", + "sha256:819b3830a1543db06c4d4b865e70ded25be52a2e0631ccd2f6a47a2822f2fd7c", + "sha256:897b80890765f037df3403d22bab41627ca8811ae55e9a722fd0392850ec4d86", + "sha256:98c4d36e99714e55cfbaaee6dd5badbc9a1ec339ebfc3b1f52e293aee6bb71a4", + "sha256:9df7ed3b3d2e0ecfe09e14741b857df43adb5a3ddadc919a2d94fbdf78fea53c", + "sha256:9fa600030013c4de8165339db93d182b9431076eb98eb40ee068700c9c813e34", + "sha256:a80a78046a72361de73f8f395f1f1e49f956c6be882eed58505a15f3e430962b", + "sha256:afa17f5bc4d1b10afd4466fd3a44dc0e245382deca5b3c353d8b757f9e3ecb8d", + "sha256:b3d267842bf12586ba6c734f89d1f5b871df0273157918b0ccefa29deb05c21c", + "sha256:b5b9eccad747aabaaffbc6064800670f0c297e52c12754eb1d976c57e4f74dcb", + "sha256:bfaef573a63ba8923503d27530362590ff4f576c626d86a9fed95822a8255fd7", + "sha256:c5687b8d43cf58545ade1fe3e055f70eac7a5a1a0bf42824308d868289a95737", + "sha256:cba8c411ef271aa037d7357a2bc8f9ee8b58b9965831d9e51baf703280dc73d3", + "sha256:d15a181d1ecd0d4270dc32edb46f7cb7733c7c508857278d3d378d14d606db2d", + "sha256:d4b0ba9512519522b118090257be113b9468d804b19d63c71dbcf4a48fa32358", + "sha256:d4db7c7aef085872ef65a8fd7d6d09a14ae91f691dec3e87ee5ee0539d516f53", + "sha256:d4eccecf9adf6fbcc6861a38015c2a64f38b9d94838ac1810a9023a0609e1b78", + "sha256:d67d839ede4ed1b28a4e8909735fc992a923cdb84e618544973d7dfc71540803", + "sha256:daf496c58a8c52083df09b80c860005194014c3698698d1a57cbcfa182142a3a", + "sha256:dbad0e9d368bb989f4515da330b88a057617d16b6a8245084f1b05400f24609f", + "sha256:e61ceaab6f49fb8bdfaa0f92c4b57bcfbea54c09277b1b4f7ac376bfb7a7c174", + "sha256:f84fbc98b019fef2ee9a1cb3ce93e3187a6df0b2538a651bfb890254ba9f90b5" + ], + "markers": "python_version >= '3.6'", + "version": "==6.0" + }, + "requests": { + "hashes": [ + "sha256:7c5599b102feddaa661c826c56ab4fee28bfd17f5abca1ebbe3e7f19d7c97983", + "sha256:8fefa2a1a1365bf5520aac41836fbee479da67864514bdb821f31ce07ce65349" + ], + "markers": "python_version >= '3.7' and python_version < '4'", + "version": "==2.28.1" + }, + "requests-oauthlib": { + "hashes": [ + "sha256:2577c501a2fb8d05a304c09d090d6e47c306fef15809d102b327cf8364bddab5", + "sha256:75beac4a47881eeb94d5ea5d6ad31ef88856affe2332b9aafb52c6452ccf0d7a" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", + "version": "==1.3.1" + }, + "s3transfer": { + "hashes": [ + "sha256:06176b74f3a15f61f1b4f25a1fc29a4429040b7647133a463da8fa5bd28d5ecd", + "sha256:2ed07d3866f523cc561bf4a00fc5535827981b117dd7876f036b0c1aca42c947" + ], + "markers": "python_version >= '3.7'", + "version": "==0.6.0" + }, + "shodan": { + "hashes": [ + "sha256:18bd2ae81114b70836e0e3315227325e14398275223998a8c235b099432f4b0b" + ], + "index": "pypi", + "version": "==1.28.0" + }, + "six": { + "hashes": [ + "sha256:1e61c37477a1626458e36f7b1d82aa5c9b094fa4802892072e49de9c60c4c926", + "sha256:8abb2f1d86890a2dfb989f9a77cfcfd3e47c2a354b01111771326f8aa26e0254" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", + "version": "==1.16.0" + }, + "tabulate": { + "hashes": [ + "sha256:0095b12bf5966de529c0feb1fa08671671b3368eec77d7ef7ab114be2c068b3c", + "sha256:024ca478df22e9340661486f85298cff5f6dcdba14f3813e8830015b9ed1948f" + ], + "index": "pypi", + "version": "==0.9.0" + }, + "typing-extensions": { + "hashes": [ + "sha256:1511434bb92bf8dd198c12b1cc812e800d4181cfcb867674e0f8279cc93087aa", + "sha256:16fa4864408f655d35ec496218b85f79b3437c829e93320c7c9215ccfd92489e" + ], + "markers": "python_version >= '3.7'", + "version": "==4.4.0" + }, + "urllib3": { + "hashes": [ + "sha256:47cc05d99aaa09c9e72ed5809b60e7ba354e64b59c9c173ac3018642d8bb41fc", + "sha256:c083dd0dce68dbfbe1129d5271cb90f9447dea7d52097c6e0126120c521ddea8" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3, 3.4, 3.5'", + "version": "==1.26.13" + }, + "xlsxwriter": { + "hashes": [ + "sha256:df0aefe5137478d206847eccf9f114715e42aaea077e6a48d0e8a2152e983010", + "sha256:e89f4a1d2fa2c9ea15cde77de95cd3fd8b0345d0efb3964623f395c8c4988b7f" + ], + "markers": "python_version >= '3.4'", + "version": "==3.0.3" + } + }, + "develop": { + "astroid": { + "hashes": [ + "sha256:10e0ad5f7b79c435179d0d0f0df69998c4eef4597534aae44910db060baeb907", + "sha256:1493fe8bd3dfd73dc35bd53c9d5b6e49ead98497c47b2307662556a5692d29d7" + ], + "markers": "python_full_version >= '3.7.2'", + "version": "==2.12.13" + }, + "attrs": { + "hashes": [ + "sha256:29adc2665447e5191d0e7c568fde78b21f9672d344281d0c6e1ab085429b22b6", + "sha256:86efa402f67bf2df34f51a335487cf46b1ec130d02b8d39fd248abfd30da551c" + ], + "markers": "python_version >= '3.5'", + "version": "==22.1.0" + }, + "bandit": { + "hashes": [ + "sha256:2d63a8c573417bae338962d4b9b06fbc6080f74ecd955a092849e1e65c717bd2", + "sha256:412d3f259dab4077d0e7f0c11f50f650cc7d10db905d98f6520a95a18049658a" + ], + "index": "pypi", + "version": "==1.7.4" + }, + "black": { + "hashes": [ + "sha256:101c69b23df9b44247bd88e1d7e90154336ac4992502d4197bdac35dd7ee3320", + "sha256:159a46a4947f73387b4d83e87ea006dbb2337eab6c879620a3ba52699b1f4351", + "sha256:1f58cbe16dfe8c12b7434e50ff889fa479072096d79f0a7f25e4ab8e94cd8350", + "sha256:229351e5a18ca30f447bf724d007f890f97e13af070bb6ad4c0a441cd7596a2f", + "sha256:436cc9167dd28040ad90d3b404aec22cedf24a6e4d7de221bec2730ec0c97bcf", + "sha256:559c7a1ba9a006226f09e4916060982fd27334ae1998e7a38b3f33a37f7a2148", + "sha256:7412e75863aa5c5411886804678b7d083c7c28421210180d67dfd8cf1221e1f4", + "sha256:77d86c9f3db9b1bf6761244bc0b3572a546f5fe37917a044e02f3166d5aafa7d", + "sha256:82d9fe8fee3401e02e79767016b4907820a7dc28d70d137eb397b92ef3cc5bfc", + "sha256:9eedd20838bd5d75b80c9f5487dbcb06836a43833a37846cf1d8c1cc01cef59d", + "sha256:c116eed0efb9ff870ded8b62fe9f28dd61ef6e9ddd28d83d7d264a38417dcee2", + "sha256:d30b212bffeb1e252b31dd269dfae69dd17e06d92b87ad26e23890f3efea366f" + ], + "index": "pypi", + "version": "==22.12.0" + }, + "boto3": { + "hashes": [ + "sha256:53badfc5f145b8a3f9117512b41bc5a64db1cce1b549061d8edba68909e63fdf", + "sha256:548081a0f8854bb2eea1e368ab29945478105f56989546f653c75528dcb07d88" + ], + "index": "pypi", + "version": "==1.26.28" + }, + "botocore": { + "hashes": [ + "sha256:982732e7ed65cb6ed11ea3ce0e32dff2bcd465836c32376154f0802aa0a112c7", + "sha256:f0b8bb976e368dea20a960b47169e31fc0828feb6f0b9f59f1e5be8d08919b10" + ], + "index": "pypi", + "version": "==1.29.28" + }, + "certifi": { + "hashes": [ + "sha256:35824b4c3a97115964b408844d64aa14db1cc518f6562e8d7261699d1350a9e3", + "sha256:4ad3232f5e926d6718ec31cfc1fcadfde020920e278684144551c91769c7bc18" + ], + "markers": "python_version >= '3.6'", + "version": "==2022.12.7" + }, + "cffi": { + "hashes": [ + "sha256:00a9ed42e88df81ffae7a8ab6d9356b371399b91dbdf0c3cb1e84c03a13aceb5", + "sha256:03425bdae262c76aad70202debd780501fabeaca237cdfddc008987c0e0f59ef", + "sha256:04ed324bda3cda42b9b695d51bb7d54b680b9719cfab04227cdd1e04e5de3104", + "sha256:0e2642fe3142e4cc4af0799748233ad6da94c62a8bec3a6648bf8ee68b1c7426", + "sha256:173379135477dc8cac4bc58f45db08ab45d228b3363adb7af79436135d028405", + "sha256:198caafb44239b60e252492445da556afafc7d1e3ab7a1fb3f0584ef6d742375", + "sha256:1e74c6b51a9ed6589199c787bf5f9875612ca4a8a0785fb2d4a84429badaf22a", + "sha256:2012c72d854c2d03e45d06ae57f40d78e5770d252f195b93f581acf3ba44496e", + "sha256:21157295583fe8943475029ed5abdcf71eb3911894724e360acff1d61c1d54bc", + "sha256:2470043b93ff09bf8fb1d46d1cb756ce6132c54826661a32d4e4d132e1977adf", + "sha256:285d29981935eb726a4399badae8f0ffdff4f5050eaa6d0cfc3f64b857b77185", + "sha256:30d78fbc8ebf9c92c9b7823ee18eb92f2e6ef79b45ac84db507f52fbe3ec4497", + "sha256:320dab6e7cb2eacdf0e658569d2575c4dad258c0fcc794f46215e1e39f90f2c3", + "sha256:33ab79603146aace82c2427da5ca6e58f2b3f2fb5da893ceac0c42218a40be35", + "sha256:3548db281cd7d2561c9ad9984681c95f7b0e38881201e157833a2342c30d5e8c", + "sha256:3799aecf2e17cf585d977b780ce79ff0dc9b78d799fc694221ce814c2c19db83", + "sha256:39d39875251ca8f612b6f33e6b1195af86d1b3e60086068be9cc053aa4376e21", + "sha256:3b926aa83d1edb5aa5b427b4053dc420ec295a08e40911296b9eb1b6170f6cca", + "sha256:3bcde07039e586f91b45c88f8583ea7cf7a0770df3a1649627bf598332cb6984", + "sha256:3d08afd128ddaa624a48cf2b859afef385b720bb4b43df214f85616922e6a5ac", + "sha256:3eb6971dcff08619f8d91607cfc726518b6fa2a9eba42856be181c6d0d9515fd", + "sha256:40f4774f5a9d4f5e344f31a32b5096977b5d48560c5592e2f3d2c4374bd543ee", + "sha256:4289fc34b2f5316fbb762d75362931e351941fa95fa18789191b33fc4cf9504a", + "sha256:470c103ae716238bbe698d67ad020e1db9d9dba34fa5a899b5e21577e6d52ed2", + "sha256:4f2c9f67e9821cad2e5f480bc8d83b8742896f1242dba247911072d4fa94c192", + "sha256:50a74364d85fd319352182ef59c5c790484a336f6db772c1a9231f1c3ed0cbd7", + "sha256:54a2db7b78338edd780e7ef7f9f6c442500fb0d41a5a4ea24fff1c929d5af585", + "sha256:5635bd9cb9731e6d4a1132a498dd34f764034a8ce60cef4f5319c0541159392f", + "sha256:59c0b02d0a6c384d453fece7566d1c7e6b7bae4fc5874ef2ef46d56776d61c9e", + "sha256:5d598b938678ebf3c67377cdd45e09d431369c3b1a5b331058c338e201f12b27", + "sha256:5df2768244d19ab7f60546d0c7c63ce1581f7af8b5de3eb3004b9b6fc8a9f84b", + "sha256:5ef34d190326c3b1f822a5b7a45f6c4535e2f47ed06fec77d3d799c450b2651e", + "sha256:6975a3fac6bc83c4a65c9f9fcab9e47019a11d3d2cf7f3c0d03431bf145a941e", + "sha256:6c9a799e985904922a4d207a94eae35c78ebae90e128f0c4e521ce339396be9d", + "sha256:70df4e3b545a17496c9b3f41f5115e69a4f2e77e94e1d2a8e1070bc0c38c8a3c", + "sha256:7473e861101c9e72452f9bf8acb984947aa1661a7704553a9f6e4baa5ba64415", + "sha256:8102eaf27e1e448db915d08afa8b41d6c7ca7a04b7d73af6514df10a3e74bd82", + "sha256:87c450779d0914f2861b8526e035c5e6da0a3199d8f1add1a665e1cbc6fc6d02", + "sha256:8b7ee99e510d7b66cdb6c593f21c043c248537a32e0bedf02e01e9553a172314", + "sha256:91fc98adde3d7881af9b59ed0294046f3806221863722ba7d8d120c575314325", + "sha256:94411f22c3985acaec6f83c6df553f2dbe17b698cc7f8ae751ff2237d96b9e3c", + "sha256:98d85c6a2bef81588d9227dde12db8a7f47f639f4a17c9ae08e773aa9c697bf3", + "sha256:9ad5db27f9cabae298d151c85cf2bad1d359a1b9c686a275df03385758e2f914", + "sha256:a0b71b1b8fbf2b96e41c4d990244165e2c9be83d54962a9a1d118fd8657d2045", + "sha256:a0f100c8912c114ff53e1202d0078b425bee3649ae34d7b070e9697f93c5d52d", + "sha256:a591fe9e525846e4d154205572a029f653ada1a78b93697f3b5a8f1f2bc055b9", + "sha256:a5c84c68147988265e60416b57fc83425a78058853509c1b0629c180094904a5", + "sha256:a66d3508133af6e8548451b25058d5812812ec3798c886bf38ed24a98216fab2", + "sha256:a8c4917bd7ad33e8eb21e9a5bbba979b49d9a97acb3a803092cbc1133e20343c", + "sha256:b3bbeb01c2b273cca1e1e0c5df57f12dce9a4dd331b4fa1635b8bec26350bde3", + "sha256:cba9d6b9a7d64d4bd46167096fc9d2f835e25d7e4c121fb2ddfc6528fb0413b2", + "sha256:cc4d65aeeaa04136a12677d3dd0b1c0c94dc43abac5860ab33cceb42b801c1e8", + "sha256:ce4bcc037df4fc5e3d184794f27bdaab018943698f4ca31630bc7f84a7b69c6d", + "sha256:cec7d9412a9102bdc577382c3929b337320c4c4c4849f2c5cdd14d7368c5562d", + "sha256:d400bfb9a37b1351253cb402671cea7e89bdecc294e8016a707f6d1d8ac934f9", + "sha256:d61f4695e6c866a23a21acab0509af1cdfd2c013cf256bbf5b6b5e2695827162", + "sha256:db0fbb9c62743ce59a9ff687eb5f4afbe77e5e8403d6697f7446e5f609976f76", + "sha256:dd86c085fae2efd48ac91dd7ccffcfc0571387fe1193d33b6394db7ef31fe2a4", + "sha256:e00b098126fd45523dd056d2efba6c5a63b71ffe9f2bbe1a4fe1716e1d0c331e", + "sha256:e229a521186c75c8ad9490854fd8bbdd9a0c9aa3a524326b55be83b54d4e0ad9", + "sha256:e263d77ee3dd201c3a142934a086a4450861778baaeeb45db4591ef65550b0a6", + "sha256:ed9cb427ba5504c1dc15ede7d516b84757c3e3d7868ccc85121d9310d27eed0b", + "sha256:fa6693661a4c91757f4412306191b6dc88c1703f780c8234035eac011922bc01", + "sha256:fcd131dd944808b5bdb38e6f5b53013c5aa4f334c5cad0c72742f6eba4b73db0" + ], + "version": "==1.15.1" + }, + "charset-normalizer": { + "hashes": [ + "sha256:5a3d016c7c547f69d6f81fb0db9449ce888b418b5b9952cc5e6e66843e9dd845", + "sha256:83e9a75d1911279afd89352c68b45348559d1fc0506b054b346651b5e7fee29f" + ], + "markers": "python_version >= '3.6'", + "version": "==2.1.1" + }, + "click": { + "hashes": [ + "sha256:7682dc8afb30297001674575ea00d1814d808d6a36af415a82bd481d37ba7b8e", + "sha256:bb4d8133cb15a609f44e8213d9b391b0809795062913b383c62be0ee95b1db48" + ], + "markers": "python_version >= '3.7'", + "version": "==8.1.3" + }, + "coverage": { + "hashes": [ + "sha256:027018943386e7b942fa832372ebc120155fd970837489896099f5cfa2890f79", + "sha256:11b990d520ea75e7ee8dcab5bc908072aaada194a794db9f6d7d5cfd19661e5a", + "sha256:12adf310e4aafddc58afdb04d686795f33f4d7a6fa67a7a9d4ce7d6ae24d949f", + "sha256:1431986dac3923c5945271f169f59c45b8802a114c8f548d611f2015133df77a", + "sha256:1ef221513e6f68b69ee9e159506d583d31aa3567e0ae84eaad9d6ec1107dddaa", + "sha256:20c8ac5386253717e5ccc827caad43ed66fea0efe255727b1053a8154d952398", + "sha256:2198ea6fc548de52adc826f62cb18554caedfb1d26548c1b7c88d8f7faa8f6ba", + "sha256:255758a1e3b61db372ec2736c8e2a1fdfaf563977eedbdf131de003ca5779b7d", + "sha256:265de0fa6778d07de30bcf4d9dc471c3dc4314a23a3c6603d356a3c9abc2dfcf", + "sha256:33a7da4376d5977fbf0a8ed91c4dffaaa8dbf0ddbf4c8eea500a2486d8bc4d7b", + "sha256:42eafe6778551cf006a7c43153af1211c3aaab658d4d66fa5fcc021613d02518", + "sha256:4433b90fae13f86fafff0b326453dd42fc9a639a0d9e4eec4d366436d1a41b6d", + "sha256:4a5375e28c5191ac38cca59b38edd33ef4cc914732c916f2929029b4bfb50795", + "sha256:4a8dbc1f0fbb2ae3de73eb0bdbb914180c7abfbf258e90b311dcd4f585d44bd2", + "sha256:59f53f1dc5b656cafb1badd0feb428c1e7bc19b867479ff72f7a9dd9b479f10e", + "sha256:5dbec3b9095749390c09ab7c89d314727f18800060d8d24e87f01fb9cfb40b32", + "sha256:633713d70ad6bfc49b34ead4060531658dc6dfc9b3eb7d8a716d5873377ab745", + "sha256:6b07130585d54fe8dff3d97b93b0e20290de974dc8177c320aeaf23459219c0b", + "sha256:6c4459b3de97b75e3bd6b7d4b7f0db13f17f504f3d13e2a7c623786289dd670e", + "sha256:6d4817234349a80dbf03640cec6109cd90cba068330703fa65ddf56b60223a6d", + "sha256:723e8130d4ecc8f56e9a611e73b31219595baa3bb252d539206f7bbbab6ffc1f", + "sha256:784f53ebc9f3fd0e2a3f6a78b2be1bd1f5575d7863e10c6e12504f240fd06660", + "sha256:7b6be138d61e458e18d8e6ddcddd36dd96215edfe5f1168de0b1b32635839b62", + "sha256:7ccf362abd726b0410bf8911c31fbf97f09f8f1061f8c1cf03dfc4b6372848f6", + "sha256:83516205e254a0cb77d2d7bb3632ee019d93d9f4005de31dca0a8c3667d5bc04", + "sha256:851cf4ff24062c6aec510a454b2584f6e998cada52d4cb58c5e233d07172e50c", + "sha256:8f830ed581b45b82451a40faabb89c84e1a998124ee4212d440e9c6cf70083e5", + "sha256:94e2565443291bd778421856bc975d351738963071e9b8839ca1fc08b42d4bef", + "sha256:95203854f974e07af96358c0b261f1048d8e1083f2de9b1c565e1be4a3a48cfc", + "sha256:97117225cdd992a9c2a5515db1f66b59db634f59d0679ca1fa3fe8da32749cae", + "sha256:98e8a10b7a314f454d9eff4216a9a94d143a7ee65018dd12442e898ee2310578", + "sha256:a1170fa54185845505fbfa672f1c1ab175446c887cce8212c44149581cf2d466", + "sha256:a6b7d95969b8845250586f269e81e5dfdd8ff828ddeb8567a4a2eaa7313460c4", + "sha256:a8fb6cf131ac4070c9c5a3e21de0f7dc5a0fbe8bc77c9456ced896c12fcdad91", + "sha256:af4fffaffc4067232253715065e30c5a7ec6faac36f8fc8d6f64263b15f74db0", + "sha256:b4a5be1748d538a710f87542f22c2cad22f80545a847ad91ce45e77417293eb4", + "sha256:b5604380f3415ba69de87a289a2b56687faa4fe04dbee0754bfcae433489316b", + "sha256:b9023e237f4c02ff739581ef35969c3739445fb059b060ca51771e69101efffe", + "sha256:bc8ef5e043a2af066fa8cbfc6e708d58017024dc4345a1f9757b329a249f041b", + "sha256:c4ed2820d919351f4167e52425e096af41bfabacb1857186c1ea32ff9983ed75", + "sha256:cca4435eebea7962a52bdb216dec27215d0df64cf27fc1dd538415f5d2b9da6b", + "sha256:d900bb429fdfd7f511f868cedd03a6bbb142f3f9118c09b99ef8dc9bf9643c3c", + "sha256:d9ecf0829c6a62b9b573c7bb6d4dcd6ba8b6f80be9ba4fc7ed50bf4ac9aecd72", + "sha256:dbdb91cd8c048c2b09eb17713b0c12a54fbd587d79adcebad543bc0cd9a3410b", + "sha256:de3001a203182842a4630e7b8d1a2c7c07ec1b45d3084a83d5d227a3806f530f", + "sha256:e07f4a4a9b41583d6eabec04f8b68076ab3cd44c20bd29332c6572dda36f372e", + "sha256:ef8674b0ee8cc11e2d574e3e2998aea5df5ab242e012286824ea3c6970580e53", + "sha256:f4f05d88d9a80ad3cac6244d36dd89a3c00abc16371769f1340101d3cb899fc3", + "sha256:f642e90754ee3e06b0e7e51bce3379590e76b7f76b708e1a71ff043f87025c84", + "sha256:fc2af30ed0d5ae0b1abdb4ebdce598eafd5b35397d4d75deb341a614d333d987" + ], + "index": "pypi", + "version": "==6.5.0" + }, + "cryptography": { + "hashes": [ + "sha256:0e70da4bdff7601b0ef48e6348339e490ebfb0cbe638e083c9c41fb49f00c8bd", + "sha256:10652dd7282de17990b88679cb82f832752c4e8237f0c714be518044269415db", + "sha256:175c1a818b87c9ac80bb7377f5520b7f31b3ef2a0004e2420319beadedb67290", + "sha256:1d7e632804a248103b60b16fb145e8df0bc60eed790ece0d12efe8cd3f3e7744", + "sha256:1f13ddda26a04c06eb57119caf27a524ccae20533729f4b1e4a69b54e07035eb", + "sha256:2ec2a8714dd005949d4019195d72abed84198d877112abb5a27740e217e0ea8d", + "sha256:2fa36a7b2cc0998a3a4d5af26ccb6273f3df133d61da2ba13b3286261e7efb70", + "sha256:2fb481682873035600b5502f0015b664abc26466153fab5c6bc92c1ea69d478b", + "sha256:3178d46f363d4549b9a76264f41c6948752183b3f587666aff0555ac50fd7876", + "sha256:4367da5705922cf7070462e964f66e4ac24162e22ab0a2e9d31f1b270dd78083", + "sha256:4eb85075437f0b1fd8cd66c688469a0c4119e0ba855e3fef86691971b887caf6", + "sha256:50a1494ed0c3f5b4d07650a68cd6ca62efe8b596ce743a5c94403e6f11bf06c1", + "sha256:53049f3379ef05182864d13bb9686657659407148f901f3f1eee57a733fb4b00", + "sha256:6391e59ebe7c62d9902c24a4d8bcbc79a68e7c4ab65863536127c8a9cd94043b", + "sha256:67461b5ebca2e4c2ab991733f8ab637a7265bb582f07c7c88914b5afb88cb95b", + "sha256:78e47e28ddc4ace41dd38c42e6feecfdadf9c3be2af389abbfeef1ff06822285", + "sha256:80ca53981ceeb3241998443c4964a387771588c4e4a5d92735a493af868294f9", + "sha256:8a4b2bdb68a447fadebfd7d24855758fe2d6fecc7fed0b78d190b1af39a8e3b0", + "sha256:8e45653fb97eb2f20b8c96f9cd2b3a0654d742b47d638cf2897afbd97f80fa6d", + "sha256:998cd19189d8a747b226d24c0207fdaa1e6658a1d3f2494541cb9dfbf7dcb6d2", + "sha256:a10498349d4c8eab7357a8f9aa3463791292845b79597ad1b98a543686fb1ec8", + "sha256:b4cad0cea995af760f82820ab4ca54e5471fc782f70a007f31531957f43e9dee", + "sha256:bfe6472507986613dc6cc00b3d492b2f7564b02b3b3682d25ca7f40fa3fd321b", + "sha256:c9e0d79ee4c56d841bd4ac6e7697c8ff3c8d6da67379057f29e66acffcd1e9a7", + "sha256:ca57eb3ddaccd1112c18fc80abe41db443cc2e9dcb1917078e02dfa010a4f353", + "sha256:ce127dd0a6a0811c251a6cddd014d292728484e530d80e872ad9806cfb1c5b3c" + ], + "markers": "python_version >= '3.6'", + "version": "==38.0.4" + }, + "dill": { + "hashes": [ + "sha256:a07ffd2351b8c678dfc4a856a3005f8067aea51d6ba6c700796a4d9e280f39f0", + "sha256:e5db55f3687856d8fbdab002ed78544e1c4559a130302693d839dfe8f93f2373" + ], + "markers": "python_version >= '3.7'", + "version": "==0.3.6" + }, + "docker": { + "hashes": [ + "sha256:896c4282e5c7af5c45e8b683b0b0c33932974fe6e50fc6906a0a83616ab3da97", + "sha256:dbcb3bd2fa80dca0788ed908218bf43972772009b881ed1e20dfc29a65e49782" + ], + "index": "pypi", + "version": "==6.0.1" + }, + "dparse": { + "hashes": [ + "sha256:8097076f1dd26c377f30d4745e6ec18fef42f3bf493933b842ac5bafad8c345f", + "sha256:d45255bda21f998bc7ddf2afd5e62505ba6134756ba2d42a84c56b0826614dfe" + ], + "markers": "python_version >= '3.5'", + "version": "==0.6.2" + }, + "exceptiongroup": { + "hashes": [ + "sha256:542adf9dea4055530d6e1279602fa5cb11dab2395fa650b8674eaec35fc4a828", + "sha256:bd14967b79cd9bdb54d97323216f8fdf533e278df937aa2a90089e7d6e06e5ec" + ], + "markers": "python_version < '3.11'", + "version": "==1.0.4" + }, + "execnet": { + "hashes": [ + "sha256:8f694f3ba9cc92cab508b152dcfe322153975c29bda272e2fd7f3f00f36e47c5", + "sha256:a295f7cc774947aac58dde7fdc85f4aa00c42adf5d8f5468fc630c1acf30a142" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3, 3.4'", + "version": "==1.9.0" + }, + "flake8": { + "hashes": [ + "sha256:3833794e27ff64ea4e9cf5d410082a8b97ff1a06c16aa3d2027339cd0f1195c7", + "sha256:c61007e76655af75e6785a931f452915b371dc48f56efd765247c8fe68f2b181" + ], + "index": "pypi", + "version": "==6.0.0" + }, + "freezegun": { + "hashes": [ + "sha256:cd22d1ba06941384410cd967d8a99d5ae2442f57dfafeff2fda5de8dc5c05446", + "sha256:ea1b963b993cb9ea195adbd893a48d573fda951b0da64f60883d7e988b606c9f" + ], + "index": "pypi", + "version": "==1.2.2" + }, + "gitdb": { + "hashes": [ + "sha256:6eb990b69df4e15bad899ea868dc46572c3f75339735663b81de79b06f17eb9a", + "sha256:c286cf298426064079ed96a9e4a9d39e7f3e9bf15ba60701e95f5492f28415c7" + ], + "markers": "python_version >= '3.7'", + "version": "==4.0.10" + }, + "gitpython": { + "hashes": [ + "sha256:41eea0deec2deea139b459ac03656f0dd28fc4a3387240ec1d3c259a2c47850f", + "sha256:cc36bfc4a3f913e66805a28e84703e419d9c264c1077e537b54f0e1af85dbefd" + ], + "markers": "python_version >= '3.7'", + "version": "==3.1.29" + }, + "idna": { + "hashes": [ + "sha256:814f528e8dead7d329833b91c5faa87d60bf71824cd12a7530b5526063d02cb4", + "sha256:90b77e79eaa3eba6de819a0c442c0b4ceefc341a7a2ab77d7562bf49f425c5c2" + ], + "markers": "python_version >= '3.5'", + "version": "==3.4" + }, + "importlib-resources": { + "hashes": [ + "sha256:32bb095bda29741f6ef0e5278c42df98d135391bee5f932841efc0041f748dc3", + "sha256:c09b067d82e72c66f4f8eb12332f5efbebc9b007c0b6c40818108c9870adc363" + ], + "markers": "python_version >= '3.7'", + "version": "==5.10.1" + }, + "iniconfig": { + "hashes": [ + "sha256:011e24c64b7f47f6ebd835bb12a743f2fbe9a26d4cecaa7f53bc4f35ee9da8b3", + "sha256:bc3af051d7d14b2ee5ef9969666def0cd1a000e121eaea580d4a313df4b37f32" + ], + "version": "==1.1.1" + }, + "isort": { + "hashes": [ + "sha256:7c5bd998504826b6f1e6f2f98b533976b066baba29b8bae83fdeefd0b89c6b70", + "sha256:bf02c95f1fe615ebbe13a619cfed1619ddfe8941274c9e3de3143adca406cb02" + ], + "markers": "python_version >= '3.7'", + "version": "==5.11.1" + }, + "jinja2": { + "hashes": [ + "sha256:31351a702a408a9e7595a8fc6150fc3f43bb6bf7e319770cbc0db9df9437e852", + "sha256:6088930bfe239f0e6710546ab9c19c9ef35e29792895fed6e6e31a023a182a61" + ], + "markers": "python_version >= '3.7'", + "version": "==3.1.2" + }, + "jmespath": { + "hashes": [ + "sha256:02e2e4cc71b5bcab88332eebf907519190dd9e6e82107fa7f83b1003a6252980", + "sha256:90261b206d6defd58fdd5e85f478bf633a2901798906be2ad389150c5c60edbe" + ], + "markers": "python_version >= '3.7'", + "version": "==1.0.1" + }, + "jsonschema": { + "hashes": [ + "sha256:0f864437ab8b6076ba6707453ef8f98a6a0d512a80e93f8abdb676f737ecb60d", + "sha256:a870ad254da1a8ca84b6a2905cac29d265f805acc57af304784962a2aa6508f6" + ], + "markers": "python_version >= '3.7'", + "version": "==4.17.3" + }, + "jsonschema-spec": { + "hashes": [ + "sha256:1e525177574c23ae0f55cd62382632a083a0339928f0ca846a975a4da9851cec", + "sha256:780a22d517cdc857d9714a80d8349c546945063f20853ea32ba7f85bc643ec7d" + ], + "markers": "python_version >= '3.7' and python_full_version < '4.0.0'", + "version": "==0.1.2" + }, + "lazy-object-proxy": { + "hashes": [ + "sha256:0c1c7c0433154bb7c54185714c6929acc0ba04ee1b167314a779b9025517eada", + "sha256:14010b49a2f56ec4943b6cf925f597b534ee2fe1f0738c84b3bce0c1a11ff10d", + "sha256:4e2d9f764f1befd8bdc97673261b8bb888764dfdbd7a4d8f55e4fbcabb8c3fb7", + "sha256:4fd031589121ad46e293629b39604031d354043bb5cdf83da4e93c2d7f3389fe", + "sha256:5b51d6f3bfeb289dfd4e95de2ecd464cd51982fe6f00e2be1d0bf94864d58acd", + "sha256:6850e4aeca6d0df35bb06e05c8b934ff7c533734eb51d0ceb2d63696f1e6030c", + "sha256:6f593f26c470a379cf7f5bc6db6b5f1722353e7bf937b8d0d0b3fba911998858", + "sha256:71d9ae8a82203511a6f60ca5a1b9f8ad201cac0fc75038b2dc5fa519589c9288", + "sha256:7e1561626c49cb394268edd00501b289053a652ed762c58e1081224c8d881cec", + "sha256:8f6ce2118a90efa7f62dd38c7dbfffd42f468b180287b748626293bf12ed468f", + "sha256:ae032743794fba4d171b5b67310d69176287b5bf82a21f588282406a79498891", + "sha256:afcaa24e48bb23b3be31e329deb3f1858f1f1df86aea3d70cb5c8578bfe5261c", + "sha256:b70d6e7a332eb0217e7872a73926ad4fdc14f846e85ad6749ad111084e76df25", + "sha256:c219a00245af0f6fa4e95901ed28044544f50152840c5b6a3e7b2568db34d156", + "sha256:ce58b2b3734c73e68f0e30e4e725264d4d6be95818ec0a0be4bb6bf9a7e79aa8", + "sha256:d176f392dbbdaacccf15919c77f526edf11a34aece58b55ab58539807b85436f", + "sha256:e20bfa6db17a39c706d24f82df8352488d2943a3b7ce7d4c22579cb89ca8896e", + "sha256:eac3a9a5ef13b332c059772fd40b4b1c3d45a3a2b05e33a361dee48e54a4dad0", + "sha256:eb329f8d8145379bf5dbe722182410fe8863d186e51bf034d2075eb8d85ee25b" + ], + "markers": "python_version >= '3.7'", + "version": "==1.8.0" + }, + "markupsafe": { + "hashes": [ + "sha256:0212a68688482dc52b2d45013df70d169f542b7394fc744c02a57374a4207003", + "sha256:089cf3dbf0cd6c100f02945abeb18484bd1ee57a079aefd52cffd17fba910b88", + "sha256:10c1bfff05d95783da83491be968e8fe789263689c02724e0c691933c52994f5", + "sha256:33b74d289bd2f5e527beadcaa3f401e0df0a89927c1559c8566c066fa4248ab7", + "sha256:3799351e2336dc91ea70b034983ee71cf2f9533cdff7c14c90ea126bfd95d65a", + "sha256:3ce11ee3f23f79dbd06fb3d63e2f6af7b12db1d46932fe7bd8afa259a5996603", + "sha256:421be9fbf0ffe9ffd7a378aafebbf6f4602d564d34be190fc19a193232fd12b1", + "sha256:43093fb83d8343aac0b1baa75516da6092f58f41200907ef92448ecab8825135", + "sha256:46d00d6cfecdde84d40e572d63735ef81423ad31184100411e6e3388d405e247", + "sha256:4a33dea2b688b3190ee12bd7cfa29d39c9ed176bda40bfa11099a3ce5d3a7ac6", + "sha256:4b9fe39a2ccc108a4accc2676e77da025ce383c108593d65cc909add5c3bd601", + "sha256:56442863ed2b06d19c37f94d999035e15ee982988920e12a5b4ba29b62ad1f77", + "sha256:671cd1187ed5e62818414afe79ed29da836dde67166a9fac6d435873c44fdd02", + "sha256:694deca8d702d5db21ec83983ce0bb4b26a578e71fbdbd4fdcd387daa90e4d5e", + "sha256:6a074d34ee7a5ce3effbc526b7083ec9731bb3cbf921bbe1d3005d4d2bdb3a63", + "sha256:6d0072fea50feec76a4c418096652f2c3238eaa014b2f94aeb1d56a66b41403f", + "sha256:6fbf47b5d3728c6aea2abb0589b5d30459e369baa772e0f37a0320185e87c980", + "sha256:7f91197cc9e48f989d12e4e6fbc46495c446636dfc81b9ccf50bb0ec74b91d4b", + "sha256:86b1f75c4e7c2ac2ccdaec2b9022845dbb81880ca318bb7a0a01fbf7813e3812", + "sha256:8dc1c72a69aa7e082593c4a203dcf94ddb74bb5c8a731e4e1eb68d031e8498ff", + "sha256:8e3dcf21f367459434c18e71b2a9532d96547aef8a871872a5bd69a715c15f96", + "sha256:8e576a51ad59e4bfaac456023a78f6b5e6e7651dcd383bcc3e18d06f9b55d6d1", + "sha256:96e37a3dc86e80bf81758c152fe66dbf60ed5eca3d26305edf01892257049925", + "sha256:97a68e6ada378df82bc9f16b800ab77cbf4b2fada0081794318520138c088e4a", + "sha256:99a2a507ed3ac881b975a2976d59f38c19386d128e7a9a18b7df6fff1fd4c1d6", + "sha256:a49907dd8420c5685cfa064a1335b6754b74541bbb3706c259c02ed65b644b3e", + "sha256:b09bf97215625a311f669476f44b8b318b075847b49316d3e28c08e41a7a573f", + "sha256:b7bd98b796e2b6553da7225aeb61f447f80a1ca64f41d83612e6139ca5213aa4", + "sha256:b87db4360013327109564f0e591bd2a3b318547bcef31b468a92ee504d07ae4f", + "sha256:bcb3ed405ed3222f9904899563d6fc492ff75cce56cba05e32eff40e6acbeaa3", + "sha256:d4306c36ca495956b6d568d276ac11fdd9c30a36f1b6eb928070dc5360b22e1c", + "sha256:d5ee4f386140395a2c818d149221149c54849dfcfcb9f1debfe07a8b8bd63f9a", + "sha256:dda30ba7e87fbbb7eab1ec9f58678558fd9a6b8b853530e176eabd064da81417", + "sha256:e04e26803c9c3851c931eac40c695602c6295b8d432cbe78609649ad9bd2da8a", + "sha256:e1c0b87e09fa55a220f058d1d49d3fb8df88fbfab58558f1198e08c1e1de842a", + "sha256:e72591e9ecd94d7feb70c1cbd7be7b3ebea3f548870aa91e2732960fa4d57a37", + "sha256:e8c843bbcda3a2f1e3c2ab25913c80a3c5376cd00c6e8c4a86a89a28c8dc5452", + "sha256:efc1913fd2ca4f334418481c7e595c00aad186563bbc1ec76067848c7ca0a933", + "sha256:f121a1420d4e173a5d96e47e9a0c0dcff965afdf1626d28de1460815f7c4ee7a", + "sha256:fc7b548b17d238737688817ab67deebb30e8073c95749d55538ed473130ec0c7" + ], + "markers": "python_version >= '3.7'", + "version": "==2.1.1" + }, + "mccabe": { + "hashes": [ + "sha256:348e0240c33b60bbdf4e523192ef919f28cb2c3d7d5c7794f74009290f236325", + "sha256:6c2d30ab6be0e4a46919781807b4f0d834ebdd6c6e3dca0bda5a15f863427b6e" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==0.7.0" + }, + "mock": { + "hashes": [ + "sha256:122fcb64ee37cfad5b3f48d7a7d51875d7031aaf3d8be7c42e2bee25044eee62", + "sha256:7d3fbbde18228f4ff2f1f119a45cdffa458b4c0dee32eb4d2bb2f82554bac7bc" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==4.0.3" + }, + "moto": { + "hashes": [ + "sha256:704d6d38a4e6fe49e1fe9c6b4127ca46c66aac00368149bc1f1d70a0ceff8846", + "sha256:a6388de4a746e0b509286e1d7e70f86900b4f69ec65f6c92c47e570f95d05b14" + ], + "index": "pypi", + "version": "==4.0.11" + }, + "mypy-extensions": { + "hashes": [ + "sha256:090fedd75945a69ae91ce1303b5824f428daf5a028d2f6ab8a299250a846f15d", + "sha256:2d82818f5bb3e369420cb3c4060a7970edba416647068eb4c5343488a6c604a8" + ], + "version": "==0.4.3" + }, + "openapi-schema-validator": { + "hashes": [ + "sha256:34fbd14b7501abe25e64d7b4624a9db02cde1a578d285b3da6f34b290cdf0b3a", + "sha256:7cf27585dd7970b7257cefe48e1a3a10d4e34421831bdb472d96967433bc27bd" + ], + "markers": "python_version >= '3.7' and python_full_version < '4.0.0'", + "version": "==0.3.4" + }, + "openapi-spec-validator": { + "hashes": [ + "sha256:4a8aee1e45b1ac868e07ab25e18828fe9837baddd29a8e20fdb3d3c61c8eea3d", + "sha256:8248634bad1f23cac5d5a34e193ab36e23914057ca69e91a1ede5af75552c465" + ], + "index": "pypi", + "version": "==0.5.1" + }, + "packaging": { + "hashes": [ + "sha256:dd47c42927d89ab911e606518907cc2d3a1f38bbd026385970643f9c5b8ecfeb", + "sha256:ef103e05f519cdc783ae24ea4e2e0f508a9c99b2d4969652eed6a2e1ea5bd522" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==21.3" + }, + "pathable": { + "hashes": [ + "sha256:5c869d315be50776cc8a993f3af43e0c60dc01506b399643f919034ebf4cdcab", + "sha256:cdd7b1f9d7d5c8b8d3315dbf5a86b2596053ae845f056f57d97c0eefff84da14" + ], + "markers": "python_version >= '3.7' and python_full_version < '4.0.0'", + "version": "==0.4.3" + }, + "pathspec": { + "hashes": [ + "sha256:3c95343af8b756205e2aba76e843ba9520a24dd84f68c22b9f93251507509dd6", + "sha256:56200de4077d9d0791465aa9095a01d421861e405b5096955051deefd697d6f6" + ], + "markers": "python_version >= '3.7'", + "version": "==0.10.3" + }, + "pbr": { + "hashes": [ + "sha256:b97bc6695b2aff02144133c2e7399d5885223d42b7912ffaec2ca3898e673bfe", + "sha256:db2317ff07c84c4c63648c9064a79fe9d9f5c7ce85a9099d4b6258b3db83225a" + ], + "markers": "python_version >= '2.6'", + "version": "==5.11.0" + }, + "platformdirs": { + "hashes": [ + "sha256:1a89a12377800c81983db6be069ec068eee989748799b946cce2a6e80dcc54ca", + "sha256:b46ffafa316e6b83b47489d240ce17173f123a9b9c83282141c3daf26ad9ac2e" + ], + "markers": "python_version >= '3.7'", + "version": "==2.6.0" + }, + "pluggy": { + "hashes": [ + "sha256:4224373bacce55f955a878bf9cfa763c1e360858e330072059e10bad68531159", + "sha256:74134bbf457f031a36d68416e1509f34bd5ccc019f0bcc952c7b909d06b37bd3" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==1.0.0" + }, + "pycodestyle": { + "hashes": [ + "sha256:347187bdb476329d98f695c213d7295a846d1152ff4fe9bacb8a9590b8ee7053", + "sha256:8a4eaf0d0495c7395bdab3589ac2db602797d76207242c17d470186815706610" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==2.10.0" + }, + "pycparser": { + "hashes": [ + "sha256:8ee45429555515e1f6b185e78100aea234072576aa43ab53aefcae078162fca9", + "sha256:e644fdec12f7872f86c58ff790da456218b10f863970249516d60a5eaca77206" + ], + "version": "==2.21" + }, + "pyflakes": { + "hashes": [ + "sha256:ec55bf7fe21fff7f1ad2f7da62363d749e2a470500eab1b555334b67aa1ef8cf", + "sha256:ec8b276a6b60bd80defed25add7e439881c19e64850afd9b346283d4165fd0fd" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==3.0.1" + }, + "pylint": { + "hashes": [ + "sha256:ea82cd6a1e11062dc86d555d07c021b0fb65afe39becbe6fe692efd6c4a67443", + "sha256:ec4a87c33da054ab86a6c79afa6771dc8765cb5631620053e727fcf3ef8cbed7" + ], + "index": "pypi", + "version": "==2.15.8" + }, + "pyparsing": { + "hashes": [ + "sha256:2b020ecf7d21b687f219b71ecad3631f644a47f01403fa1d1036b0c6416d70fb", + "sha256:5026bae9a10eeaefb61dab2f09052b9f4307d44aee4eda64b309723d8d206bbc" + ], + "markers": "python_full_version >= '3.6.8'", + "version": "==3.0.9" + }, + "pyrsistent": { + "hashes": [ + "sha256:055ab45d5911d7cae397dc418808d8802fb95262751872c841c170b0dbf51eed", + "sha256:111156137b2e71f3a9936baf27cb322e8024dac3dc54ec7fb9f0bcf3249e68bb", + "sha256:187d5730b0507d9285a96fca9716310d572e5464cadd19f22b63a6976254d77a", + "sha256:21455e2b16000440e896ab99e8304617151981ed40c29e9507ef1c2e4314ee95", + "sha256:2aede922a488861de0ad00c7630a6e2d57e8023e4be72d9d7147a9fcd2d30712", + "sha256:3ba4134a3ff0fc7ad225b6b457d1309f4698108fb6b35532d015dca8f5abed73", + "sha256:456cb30ca8bff00596519f2c53e42c245c09e1a4543945703acd4312949bfd41", + "sha256:71d332b0320642b3261e9fee47ab9e65872c2bd90260e5d225dabeed93cbd42b", + "sha256:879b4c2f4d41585c42df4d7654ddffff1239dc4065bc88b745f0341828b83e78", + "sha256:9cd3e9978d12b5d99cbdc727a3022da0430ad007dacf33d0bf554b96427f33ab", + "sha256:a178209e2df710e3f142cbd05313ba0c5ebed0a55d78d9945ac7a4e09d923308", + "sha256:b39725209e06759217d1ac5fcdb510e98670af9e37223985f330b611f62e7425", + "sha256:bfa0351be89c9fcbcb8c9879b826f4353be10f58f8a677efab0c017bf7137ec2", + "sha256:bfd880614c6237243ff53a0539f1cb26987a6dc8ac6e66e0c5a40617296a045e", + "sha256:c43bec251bbd10e3cb58ced80609c5c1eb238da9ca78b964aea410fb820d00d6", + "sha256:d690b18ac4b3e3cab73b0b7aa7dbe65978a172ff94970ff98d82f2031f8971c2", + "sha256:d6982b5a0237e1b7d876b60265564648a69b14017f3b5f908c5be2de3f9abb7a", + "sha256:dec3eac7549869365fe263831f576c8457f6c833937c68542d08fde73457d291", + "sha256:e371b844cec09d8dc424d940e54bba8f67a03ebea20ff7b7b0d56f526c71d584", + "sha256:e5d8f84d81e3729c3b506657dddfe46e8ba9c330bf1858ee33108f8bb2adb38a", + "sha256:ea6b79a02a28550c98b6ca9c35b9f492beaa54d7c5c9e9949555893c8a9234d0", + "sha256:f1258f4e6c42ad0b20f9cfcc3ada5bd6b83374516cd01c0960e3cb75fdca6770" + ], + "markers": "python_version >= '3.7'", + "version": "==0.19.2" + }, + "pytest": { + "hashes": [ + "sha256:892f933d339f068883b6fd5a459f03d85bfcb355e4981e146d2c7616c21fef71", + "sha256:c4014eb40e10f11f355ad4e3c2fb2c6c6d1919c73f3b5a433de4708202cade59" + ], + "index": "pypi", + "version": "==7.2.0" + }, + "pytest-xdist": { + "hashes": [ + "sha256:40fdb8f3544921c5dfcd486ac080ce22870e71d82ced6d2e78fa97c2addd480c", + "sha256:70a76f191d8a1d2d6be69fc440cdf85f3e4c03c08b520fd5dc5d338d6cf07d89" + ], + "index": "pypi", + "version": "==3.1.0" + }, + "python-dateutil": { + "hashes": [ + "sha256:0123cacc1627ae19ddf3c27a5de5bd67ee4586fbdd6440d9748f8abb483d3e86", + "sha256:961d03dc3453ebbc59dbdea9e4e11c5651520a876d0f4db161e8674aae935da9" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", + "version": "==2.8.2" + }, + "pytz": { + "hashes": [ + "sha256:222439474e9c98fced559f1709d89e6c9cbf8d79c794ff3eb9f8800064291427", + "sha256:e89512406b793ca39f5971bc999cc538ce125c0e51c27941bef4568b460095e2" + ], + "version": "==2022.6" + }, + "pyyaml": { + "hashes": [ + "sha256:01b45c0191e6d66c470b6cf1b9531a771a83c1c4208272ead47a3ae4f2f603bf", + "sha256:0283c35a6a9fbf047493e3a0ce8d79ef5030852c51e9d911a27badfde0605293", + "sha256:055d937d65826939cb044fc8c9b08889e8c743fdc6a32b33e2390f66013e449b", + "sha256:07751360502caac1c067a8132d150cf3d61339af5691fe9e87803040dbc5db57", + "sha256:0b4624f379dab24d3725ffde76559cff63d9ec94e1736b556dacdfebe5ab6d4b", + "sha256:0ce82d761c532fe4ec3f87fc45688bdd3a4c1dc5e0b4a19814b9009a29baefd4", + "sha256:1e4747bc279b4f613a09eb64bba2ba602d8a6664c6ce6396a4d0cd413a50ce07", + "sha256:213c60cd50106436cc818accf5baa1aba61c0189ff610f64f4a3e8c6726218ba", + "sha256:231710d57adfd809ef5d34183b8ed1eeae3f76459c18fb4a0b373ad56bedcdd9", + "sha256:277a0ef2981ca40581a47093e9e2d13b3f1fbbeffae064c1d21bfceba2030287", + "sha256:2cd5df3de48857ed0544b34e2d40e9fac445930039f3cfe4bcc592a1f836d513", + "sha256:40527857252b61eacd1d9af500c3337ba8deb8fc298940291486c465c8b46ec0", + "sha256:432557aa2c09802be39460360ddffd48156e30721f5e8d917f01d31694216782", + "sha256:473f9edb243cb1935ab5a084eb238d842fb8f404ed2193a915d1784b5a6b5fc0", + "sha256:48c346915c114f5fdb3ead70312bd042a953a8ce5c7106d5bfb1a5254e47da92", + "sha256:50602afada6d6cbfad699b0c7bb50d5ccffa7e46a3d738092afddc1f9758427f", + "sha256:68fb519c14306fec9720a2a5b45bc9f0c8d1b9c72adf45c37baedfcd949c35a2", + "sha256:77f396e6ef4c73fdc33a9157446466f1cff553d979bd00ecb64385760c6babdc", + "sha256:81957921f441d50af23654aa6c5e5eaf9b06aba7f0a19c18a538dc7ef291c5a1", + "sha256:819b3830a1543db06c4d4b865e70ded25be52a2e0631ccd2f6a47a2822f2fd7c", + "sha256:897b80890765f037df3403d22bab41627ca8811ae55e9a722fd0392850ec4d86", + "sha256:98c4d36e99714e55cfbaaee6dd5badbc9a1ec339ebfc3b1f52e293aee6bb71a4", + "sha256:9df7ed3b3d2e0ecfe09e14741b857df43adb5a3ddadc919a2d94fbdf78fea53c", + "sha256:9fa600030013c4de8165339db93d182b9431076eb98eb40ee068700c9c813e34", + "sha256:a80a78046a72361de73f8f395f1f1e49f956c6be882eed58505a15f3e430962b", + "sha256:afa17f5bc4d1b10afd4466fd3a44dc0e245382deca5b3c353d8b757f9e3ecb8d", + "sha256:b3d267842bf12586ba6c734f89d1f5b871df0273157918b0ccefa29deb05c21c", + "sha256:b5b9eccad747aabaaffbc6064800670f0c297e52c12754eb1d976c57e4f74dcb", + "sha256:bfaef573a63ba8923503d27530362590ff4f576c626d86a9fed95822a8255fd7", + "sha256:c5687b8d43cf58545ade1fe3e055f70eac7a5a1a0bf42824308d868289a95737", + "sha256:cba8c411ef271aa037d7357a2bc8f9ee8b58b9965831d9e51baf703280dc73d3", + "sha256:d15a181d1ecd0d4270dc32edb46f7cb7733c7c508857278d3d378d14d606db2d", + "sha256:d4b0ba9512519522b118090257be113b9468d804b19d63c71dbcf4a48fa32358", + "sha256:d4db7c7aef085872ef65a8fd7d6d09a14ae91f691dec3e87ee5ee0539d516f53", + "sha256:d4eccecf9adf6fbcc6861a38015c2a64f38b9d94838ac1810a9023a0609e1b78", + "sha256:d67d839ede4ed1b28a4e8909735fc992a923cdb84e618544973d7dfc71540803", + "sha256:daf496c58a8c52083df09b80c860005194014c3698698d1a57cbcfa182142a3a", + "sha256:dbad0e9d368bb989f4515da330b88a057617d16b6a8245084f1b05400f24609f", + "sha256:e61ceaab6f49fb8bdfaa0f92c4b57bcfbea54c09277b1b4f7ac376bfb7a7c174", + "sha256:f84fbc98b019fef2ee9a1cb3ce93e3187a6df0b2538a651bfb890254ba9f90b5" + ], + "markers": "python_version >= '3.6'", + "version": "==6.0" + }, + "requests": { + "hashes": [ + "sha256:7c5599b102feddaa661c826c56ab4fee28bfd17f5abca1ebbe3e7f19d7c97983", + "sha256:8fefa2a1a1365bf5520aac41836fbee479da67864514bdb821f31ce07ce65349" + ], + "markers": "python_version >= '3.7' and python_version < '4'", + "version": "==2.28.1" + }, + "responses": { + "hashes": [ + "sha256:396acb2a13d25297789a5866b4881cf4e46ffd49cc26c43ab1117f40b973102e", + "sha256:dcf294d204d14c436fddcc74caefdbc5764795a40ff4e6a7740ed8ddbf3294be" + ], + "markers": "python_version >= '3.7'", + "version": "==0.22.0" + }, + "ruamel.yaml": { + "hashes": [ + "sha256:742b35d3d665023981bd6d16b3d24248ce5df75fdb4e2924e93a05c1f8b61ca7", + "sha256:8b7ce697a2f212752a35c1ac414471dc16c424c9573be4926b56ff3f5d23b7af" + ], + "markers": "python_version >= '3'", + "version": "==0.17.21" + }, + "ruamel.yaml.clib": { + "hashes": [ + "sha256:045e0626baf1c52e5527bd5db361bc83180faaba2ff586e763d3d5982a876a9e", + "sha256:15910ef4f3e537eea7fe45f8a5d19997479940d9196f357152a09031c5be59f3", + "sha256:184faeaec61dbaa3cace407cffc5819f7b977e75360e8d5ca19461cd851a5fc5", + "sha256:1f08fd5a2bea9c4180db71678e850b995d2a5f4537be0e94557668cf0f5f9497", + "sha256:2aa261c29a5545adfef9296b7e33941f46aa5bbd21164228e833412af4c9c75f", + "sha256:3110a99e0f94a4a3470ff67fc20d3f96c25b13d24c6980ff841e82bafe827cac", + "sha256:3243f48ecd450eddadc2d11b5feb08aca941b5cd98c9b1db14b2fd128be8c697", + "sha256:370445fd795706fd291ab00c9df38a0caed0f17a6fb46b0f607668ecb16ce763", + "sha256:40d030e2329ce5286d6b231b8726959ebbe0404c92f0a578c0e2482182e38282", + "sha256:41d0f1fa4c6830176eef5b276af04c89320ea616655d01327d5ce65e50575c94", + "sha256:4a4d8d417868d68b979076a9be6a38c676eca060785abaa6709c7b31593c35d1", + "sha256:4b3a93bb9bc662fc1f99c5c3ea8e623d8b23ad22f861eb6fce9377ac07ad6072", + "sha256:5bc0667c1eb8f83a3752b71b9c4ba55ef7c7058ae57022dd9b29065186a113d9", + "sha256:721bc4ba4525f53f6a611ec0967bdcee61b31df5a56801281027a3a6d1c2daf5", + "sha256:763d65baa3b952479c4e972669f679fe490eee058d5aa85da483ebae2009d231", + "sha256:7bdb4c06b063f6fd55e472e201317a3bb6cdeeee5d5a38512ea5c01e1acbdd93", + "sha256:8831a2cedcd0f0927f788c5bdf6567d9dc9cc235646a434986a852af1cb54b4b", + "sha256:91a789b4aa0097b78c93e3dc4b40040ba55bef518f84a40d4442f713b4094acb", + "sha256:92460ce908546ab69770b2e576e4f99fbb4ce6ab4b245345a3869a0a0410488f", + "sha256:99e77daab5d13a48a4054803d052ff40780278240a902b880dd37a51ba01a307", + "sha256:a234a20ae07e8469da311e182e70ef6b199d0fbeb6c6cc2901204dd87fb867e8", + "sha256:a7b301ff08055d73223058b5c46c55638917f04d21577c95e00e0c4d79201a6b", + "sha256:be2a7ad8fd8f7442b24323d24ba0b56c51219513cfa45b9ada3b87b76c374d4b", + "sha256:bf9a6bc4a0221538b1a7de3ed7bca4c93c02346853f44e1cd764be0023cd3640", + "sha256:c3ca1fbba4ae962521e5eb66d72998b51f0f4d0f608d3c0347a48e1af262efa7", + "sha256:d000f258cf42fec2b1bbf2863c61d7b8918d31ffee905da62dede869254d3b8a", + "sha256:d5859983f26d8cd7bb5c287ef452e8aacc86501487634573d260968f753e1d71", + "sha256:d5e51e2901ec2366b79f16c2299a03e74ba4531ddcfacc1416639c557aef0ad8", + "sha256:debc87a9516b237d0466a711b18b6ebeb17ba9f391eb7f91c649c5c4ec5006c7", + "sha256:df5828871e6648db72d1c19b4bd24819b80a755c4541d3409f0f7acd0f335c80", + "sha256:ecdf1a604009bd35c674b9225a8fa609e0282d9b896c03dd441a91e5f53b534e", + "sha256:efa08d63ef03d079dcae1dfe334f6c8847ba8b645d08df286358b1f5293d24ab", + "sha256:f01da5790e95815eb5a8a138508c01c758e5f5bc0ce4286c4f7028b8dd7ac3d0", + "sha256:f34019dced51047d6f70cb9383b2ae2853b7fc4dce65129a5acd49f4f9256646" + ], + "markers": "python_version < '3.11' and platform_python_implementation == 'CPython'", + "version": "==0.2.7" + }, + "s3transfer": { + "hashes": [ + "sha256:06176b74f3a15f61f1b4f25a1fc29a4429040b7647133a463da8fa5bd28d5ecd", + "sha256:2ed07d3866f523cc561bf4a00fc5535827981b117dd7876f036b0c1aca42c947" + ], + "markers": "python_version >= '3.7'", + "version": "==0.6.0" + }, + "safety": { + "hashes": [ + "sha256:2227fcac1b22b53c1615af78872b48348661691450aa25d6704a5504dbd1f7e2", + "sha256:a60c11f8952f412cbb165d70cb1f673a3b43a2ba9a93ce11f97e6a4de834aa3a" + ], + "index": "pypi", + "version": "==2.3.5" + }, + "setuptools": { + "hashes": [ + "sha256:57f6f22bde4e042978bcd50176fdb381d7c21a9efa4041202288d3737a0c6a54", + "sha256:a7620757bf984b58deaf32fc8a4577a9bbc0850cf92c20e1ce41c38c19e5fb75" + ], + "markers": "python_version >= '3.7'", + "version": "==65.6.3" + }, + "six": { + "hashes": [ + "sha256:1e61c37477a1626458e36f7b1d82aa5c9b094fa4802892072e49de9c60c4c926", + "sha256:8abb2f1d86890a2dfb989f9a77cfcfd3e47c2a354b01111771326f8aa26e0254" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3'", + "version": "==1.16.0" + }, + "smmap": { + "hashes": [ + "sha256:2aba19d6a040e78d8b09de5c57e96207b09ed71d8e55ce0959eeee6c8e190d94", + "sha256:c840e62059cd3be204b0c9c9f74be2c09d5648eddd4580d9314c3ecde0b30936" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==5.0.0" + }, + "stevedore": { + "hashes": [ + "sha256:7f8aeb6e3f90f96832c301bff21a7eb5eefbe894c88c506483d355565d88cc1a", + "sha256:aa6436565c069b2946fe4ebff07f5041e0c8bf18c7376dd29edf80cf7d524e4e" + ], + "markers": "python_version >= '3.8'", + "version": "==4.1.1" + }, + "sure": { + "hashes": [ + "sha256:34ae88c846046742ef074036bf311dc90ab152b7bc09c342b281cebf676727a2" + ], + "index": "pypi", + "version": "==2.0.0" + }, + "toml": { + "hashes": [ + "sha256:806143ae5bfb6a3c6e736a764057db0e6a0e05e338b5630894a5f779cabb4f9b", + "sha256:b3bda1d108d5dd99f4a20d24d9c348e91c4db7ab1b749200bded2f839ccbe68f" + ], + "markers": "python_version >= '2.6' and python_version not in '3.0, 3.1, 3.2, 3.3'", + "version": "==0.10.2" + }, + "tomli": { + "hashes": [ + "sha256:939de3e7a6161af0c887ef91b7d41a53e7c5a1ca976325f429cb46ea9bc30ecc", + "sha256:de526c12914f0c550d15924c62d72abc48d6fe7364aa87328337a31007fe8a4f" + ], + "markers": "python_version < '3.11'", + "version": "==2.0.1" + }, + "tomlkit": { + "hashes": [ + "sha256:07de26b0d8cfc18f871aec595fda24d95b08fef89d147caa861939f37230bf4b", + "sha256:71b952e5721688937fb02cf9d354dbcf0785066149d2855e44531ebdd2b65d73" + ], + "markers": "python_full_version >= '3.6.0'", + "version": "==0.11.6" + }, + "types-toml": { + "hashes": [ + "sha256:171bdb3163d79a520560f24ba916a9fc9bff81659c5448a9fea89240923722be", + "sha256:b7b5c4977f96ab7b5ac06d8a6590d17c0bf252a96efc03b109c2711fb3e0eafd" + ], + "version": "==0.10.8.1" + }, + "typing-extensions": { + "hashes": [ + "sha256:1511434bb92bf8dd198c12b1cc812e800d4181cfcb867674e0f8279cc93087aa", + "sha256:16fa4864408f655d35ec496218b85f79b3437c829e93320c7c9215ccfd92489e" + ], + "markers": "python_version >= '3.7'", + "version": "==4.4.0" + }, + "urllib3": { + "hashes": [ + "sha256:47cc05d99aaa09c9e72ed5809b60e7ba354e64b59c9c173ac3018642d8bb41fc", + "sha256:c083dd0dce68dbfbe1129d5271cb90f9447dea7d52097c6e0126120c521ddea8" + ], + "markers": "python_version >= '2.7' and python_version not in '3.0, 3.1, 3.2, 3.3, 3.4, 3.5'", + "version": "==1.26.13" + }, + "vulture": { + "hashes": [ + "sha256:2515fa848181001dc8a73aba6a01a1a17406f5d372f24ec7f7191866f9f4997e", + "sha256:e792e903ccc063ec4873a8979dcf11b51ea3d65a2d3b31c113d47be48f0cdcae" + ], + "index": "pypi", + "version": "==2.6" + }, + "websocket-client": { + "hashes": [ + "sha256:d6b06432f184438d99ac1f456eaf22fe1ade524c3dd16e661142dc54e9cba574", + "sha256:d6e8f90ca8e2dd4e8027c4561adeb9456b54044312dba655e7cae652ceb9ae59" + ], + "markers": "python_version >= '3.7'", + "version": "==1.4.2" + }, + "werkzeug": { + "hashes": [ + "sha256:7ea2d48322cc7c0f8b3a215ed73eabd7b5d75d0b50e31ab006286ccff9e00b8f", + "sha256:f979ab81f58d7318e064e99c4506445d60135ac5cd2e177a2de0089bfd4c9bd5" + ], + "markers": "python_version >= '3.7'", + "version": "==2.2.2" + }, + "wrapt": { + "hashes": [ + "sha256:00b6d4ea20a906c0ca56d84f93065b398ab74b927a7a3dbd470f6fc503f95dc3", + "sha256:01c205616a89d09827986bc4e859bcabd64f5a0662a7fe95e0d359424e0e071b", + "sha256:02b41b633c6261feff8ddd8d11c711df6842aba629fdd3da10249a53211a72c4", + "sha256:07f7a7d0f388028b2df1d916e94bbb40624c59b48ecc6cbc232546706fac74c2", + "sha256:11871514607b15cfeb87c547a49bca19fde402f32e2b1c24a632506c0a756656", + "sha256:1b376b3f4896e7930f1f772ac4b064ac12598d1c38d04907e696cc4d794b43d3", + "sha256:21ac0156c4b089b330b7666db40feee30a5d52634cc4560e1905d6529a3897ff", + "sha256:257fd78c513e0fb5cdbe058c27a0624c9884e735bbd131935fd49e9fe719d310", + "sha256:2b39d38039a1fdad98c87279b48bc5dce2c0ca0d73483b12cb72aa9609278e8a", + "sha256:2cf71233a0ed05ccdabe209c606fe0bac7379fdcf687f39b944420d2a09fdb57", + "sha256:2fe803deacd09a233e4762a1adcea5db5d31e6be577a43352936179d14d90069", + "sha256:3232822c7d98d23895ccc443bbdf57c7412c5a65996c30442ebe6ed3df335383", + "sha256:34aa51c45f28ba7f12accd624225e2b1e5a3a45206aa191f6f9aac931d9d56fe", + "sha256:36f582d0c6bc99d5f39cd3ac2a9062e57f3cf606ade29a0a0d6b323462f4dd87", + "sha256:380a85cf89e0e69b7cfbe2ea9f765f004ff419f34194018a6827ac0e3edfed4d", + "sha256:40e7bc81c9e2b2734ea4bc1aceb8a8f0ceaac7c5299bc5d69e37c44d9081d43b", + "sha256:43ca3bbbe97af00f49efb06e352eae40434ca9d915906f77def219b88e85d907", + "sha256:4fcc4649dc762cddacd193e6b55bc02edca674067f5f98166d7713b193932b7f", + "sha256:5a0f54ce2c092aaf439813735584b9537cad479575a09892b8352fea5e988dc0", + "sha256:5a9a0d155deafd9448baff28c08e150d9b24ff010e899311ddd63c45c2445e28", + "sha256:5b02d65b9ccf0ef6c34cba6cf5bf2aab1bb2f49c6090bafeecc9cd81ad4ea1c1", + "sha256:60db23fa423575eeb65ea430cee741acb7c26a1365d103f7b0f6ec412b893853", + "sha256:642c2e7a804fcf18c222e1060df25fc210b9c58db7c91416fb055897fc27e8cc", + "sha256:6a9a25751acb379b466ff6be78a315e2b439d4c94c1e99cb7266d40a537995d3", + "sha256:6b1a564e6cb69922c7fe3a678b9f9a3c54e72b469875aa8018f18b4d1dd1adf3", + "sha256:6d323e1554b3d22cfc03cd3243b5bb815a51f5249fdcbb86fda4bf62bab9e164", + "sha256:6e743de5e9c3d1b7185870f480587b75b1cb604832e380d64f9504a0535912d1", + "sha256:709fe01086a55cf79d20f741f39325018f4df051ef39fe921b1ebe780a66184c", + "sha256:7b7c050ae976e286906dd3f26009e117eb000fb2cf3533398c5ad9ccc86867b1", + "sha256:7d2872609603cb35ca513d7404a94d6d608fc13211563571117046c9d2bcc3d7", + "sha256:7ef58fb89674095bfc57c4069e95d7a31cfdc0939e2a579882ac7d55aadfd2a1", + "sha256:80bb5c256f1415f747011dc3604b59bc1f91c6e7150bd7db03b19170ee06b320", + "sha256:81b19725065dcb43df02b37e03278c011a09e49757287dca60c5aecdd5a0b8ed", + "sha256:833b58d5d0b7e5b9832869f039203389ac7cbf01765639c7309fd50ef619e0b1", + "sha256:88bd7b6bd70a5b6803c1abf6bca012f7ed963e58c68d76ee20b9d751c74a3248", + "sha256:8ad85f7f4e20964db4daadcab70b47ab05c7c1cf2a7c1e51087bfaa83831854c", + "sha256:8c0ce1e99116d5ab21355d8ebe53d9460366704ea38ae4d9f6933188f327b456", + "sha256:8d649d616e5c6a678b26d15ece345354f7c2286acd6db868e65fcc5ff7c24a77", + "sha256:903500616422a40a98a5a3c4ff4ed9d0066f3b4c951fa286018ecdf0750194ef", + "sha256:9736af4641846491aedb3c3f56b9bc5568d92b0692303b5a305301a95dfd38b1", + "sha256:988635d122aaf2bdcef9e795435662bcd65b02f4f4c1ae37fbee7401c440b3a7", + "sha256:9cca3c2cdadb362116235fdbd411735de4328c61425b0aa9f872fd76d02c4e86", + "sha256:9e0fd32e0148dd5dea6af5fee42beb949098564cc23211a88d799e434255a1f4", + "sha256:9f3e6f9e05148ff90002b884fbc2a86bd303ae847e472f44ecc06c2cd2fcdb2d", + "sha256:a85d2b46be66a71bedde836d9e41859879cc54a2a04fad1191eb50c2066f6e9d", + "sha256:a9a52172be0b5aae932bef82a79ec0a0ce87288c7d132946d645eba03f0ad8a8", + "sha256:aa31fdcc33fef9eb2552cbcbfee7773d5a6792c137b359e82879c101e98584c5", + "sha256:b014c23646a467558be7da3d6b9fa409b2c567d2110599b7cf9a0c5992b3b471", + "sha256:b21bb4c09ffabfa0e85e3a6b623e19b80e7acd709b9f91452b8297ace2a8ab00", + "sha256:b5901a312f4d14c59918c221323068fad0540e34324925c8475263841dbdfe68", + "sha256:b9b7a708dd92306328117d8c4b62e2194d00c365f18eff11a9b53c6f923b01e3", + "sha256:d1967f46ea8f2db647c786e78d8cc7e4313dbd1b0aca360592d8027b8508e24d", + "sha256:d52a25136894c63de15a35bc0bdc5adb4b0e173b9c0d07a2be9d3ca64a332735", + "sha256:d77c85fedff92cf788face9bfa3ebaa364448ebb1d765302e9af11bf449ca36d", + "sha256:d79d7d5dc8a32b7093e81e97dad755127ff77bcc899e845f41bf71747af0c569", + "sha256:dbcda74c67263139358f4d188ae5faae95c30929281bc6866d00573783c422b7", + "sha256:ddaea91abf8b0d13443f6dac52e89051a5063c7d014710dcb4d4abb2ff811a59", + "sha256:dee0ce50c6a2dd9056c20db781e9c1cfd33e77d2d569f5d1d9321c641bb903d5", + "sha256:dee60e1de1898bde3b238f18340eec6148986da0455d8ba7848d50470a7a32fb", + "sha256:e2f83e18fe2f4c9e7db597e988f72712c0c3676d337d8b101f6758107c42425b", + "sha256:e3fb1677c720409d5f671e39bac6c9e0e422584e5f518bfd50aa4cbbea02433f", + "sha256:ee2b1b1769f6707a8a445162ea16dddf74285c3964f605877a20e38545c3c462", + "sha256:ee6acae74a2b91865910eef5e7de37dc6895ad96fa23603d1d27ea69df545015", + "sha256:ef3f72c9666bba2bab70d2a8b79f2c6d2c1a42a7f7e2b0ec83bb2f9e383950af" + ], + "markers": "python_version < '3.11'", + "version": "==1.14.1" + }, + "xmltodict": { + "hashes": [ + "sha256:341595a488e3e01a85a9d8911d8912fd922ede5fecc4dce437eb4b6c8d037e56", + "sha256:aa89e8fd76320154a40d19a0df04a4695fb9dc5ba977cbb68ab3e4eb225e7852" + ], + "markers": "python_version >= '3.4'", + "version": "==0.13.0" + }, + "zipp": { + "hashes": [ + "sha256:83a28fcb75844b5c0cdaf5aa4003c2d728c77e05f5aeabe8e95e56727005fbaa", + "sha256:a7a22e05929290a67401440b39690ae6563279bced5f314609d9d03798f56766" + ], + "markers": "python_version < '3.10'", + "version": "==3.11.0" + } } - } } diff --git a/contrib/cloudshell/README.md b/contrib/cloudshell/README.md index 21c3ac0aae1..48b965d13fc 100644 --- a/contrib/cloudshell/README.md +++ b/contrib/cloudshell/README.md @@ -2,11 +2,11 @@ ### Use Case: -Customers look to use multiple auditing tools in order to provide quick assessments about their AWS environments. These tools allow for reports to be generated for review by the customer and appropriate teams, which in turns helps them begin security remediation efforts. +Customers look to use multiple auditing tools in order to provide quick assessments about their AWS environments. These tools allow for reports to be generated for review by the customer and appropriate teams, which in turns helps them begin security remediation efforts. Prowler and ScoutSuite are two publicly available security auditing tools that provide comprehensive reports for customers using AWS. -ShortCut is a mechanism for customers to use to run both Prowler and ScoutSuite within an AWS account, using AWS CloudShell. When customers use ShortCut, this allows for customers to quickly perform an audit on their environment, without having to provision IAM Access Keys or EC2 instances. +ShortCut is a mechanism for customers to use to run both Prowler and ScoutSuite within an AWS account, using AWS CloudShell. When customers use ShortCut, this allows for customers to quickly perform an audit on their environment, without having to provision IAM Access Keys or EC2 instances. ### Prerequisites: @@ -54,4 +54,4 @@ screen -r scoutsuite 8. In the Download File prompt, use the file path and file name to download the results. -![Alt text](screenshots/download_prompt.png) \ No newline at end of file +![Alt text](screenshots/download_prompt.png) diff --git a/contrib/cloudshell/shortcut.sh b/contrib/cloudshell/shortcut.sh index d3e3a402e4d..c404ea68a9f 100644 --- a/contrib/cloudshell/shortcut.sh +++ b/contrib/cloudshell/shortcut.sh @@ -17,7 +17,7 @@ mkdir ${account}-results cd ~ git clone https://github.com/prowler-cloud/prowler pip3 install detect-secrets --user -cd prowler +cd prowler screen -dmS prowler sh -c "./prowler -M csv,html;cd ~;zip -r ${account}-results/prowler-${account}.zip /home/cloudshell-user/prowler/output" # ScoutSuite diff --git a/contrib/codebuild/codebuild-prowler-audit-account-cfn.yaml b/contrib/codebuild/codebuild-prowler-audit-account-cfn.yaml index f00af6857fb..b8a00a40568 100644 --- a/contrib/codebuild/codebuild-prowler-audit-account-cfn.yaml +++ b/contrib/codebuild/codebuild-prowler-audit-account-cfn.yaml @@ -12,14 +12,14 @@ Parameters: Type: Number Default: 3 AllowedValues: [1, 3, 5, 7, 14, 30, 60, 90, 180, 365] - + ProwlerOptions: Description: 'Options to pass to Prowler command, make sure at least -M junit-xml is used for CodeBuild reports. Use -r for the region to send API queries, -f to filter only one region, -M output formats, -c for comma separated checks, for all checks do not use -c or -g, for more options see -h. For a complete assessment use "-M text,junit-xml,html,csv,json", for SecurityHub integration use "-r region -f region -M text,junit-xml,html,csv,json,json-asff -S -q"' Type: String # Prowler command below runs a set of checks, configure it base on your needs, no options will run all regions all checks. # option -M junit-xml is requirede in order to get the report in CodeBuild. Default: -r eu-west-1 -f eu-west-1 -M text,junit-xml,html,csv,json -c check11,check12,check13,check14 - + ProwlerScheduler: Description: The time when Prowler will run in cron format. Default is daily at 22:00h or 10PM 'cron(0 22 * * ? *)', for every 5 hours also works 'rate(5 hours)'. More info here https://docs.aws.amazon.com/AmazonCloudWatch/latest/events/ScheduledEvents.html. Type: String @@ -297,14 +297,14 @@ Resources: python: 3.9 commands: - echo "Installing Prowler and dependencies..." - - pip3 install detect-secrets + - pip3 install detect-secrets build: commands: - echo "Running Prowler as ./prowler $PROWLER_OPTIONS" - - ./prowler $PROWLER_OPTIONS + - ./prowler $PROWLER_OPTIONS post_build: commands: - - echo "Uploading reports to S3..." + - echo "Uploading reports to S3..." - aws s3 cp --sse AES256 output/ s3://$BUCKET_REPORT/ --recursive - echo "Done!" reports: diff --git a/contrib/html/generate-html-from-csv.sh b/contrib/html/generate-html-from-csv.sh index 5c55d096eb8..0d240dcd7d8 100755 --- a/contrib/html/generate-html-from-csv.sh +++ b/contrib/html/generate-html-from-csv.sh @@ -12,15 +12,15 @@ # specific language governing permissions and limitations under the License. -## This script helps to generate a single html report from a single or multiple csv +## This script helps to generate a single html report from a single or multiple csv # output reports. # I use it when I want to visualize multiple accounts reports in a single view. -# Report information and Assessment Summary will be empty due to the variables +# Report information and Assessment Summary will be empty due to the variables # that are not set here. ## First: Remove the CSV header from each output report. -## Second: If you want to aggretate all csv files in you can do like this: +## Second: If you want to aggretate all csv files in you can do like this: # find . -type f -name '*.csv' -exec cat {} + > prowler-output-unified-csv.file # use .file instead of .csv unless you want to get into an infinite loop ;) @@ -30,7 +30,7 @@ OUTPUT_FILE_NAME="report-unified-csv" EXTENSION_HTML="html" INPUT=$1 -IFS=',' # used inside the while loop for csv delimiter +IFS=',' # used inside the while loop for csv delimiter HTML_LOGO_URL="https://github.com/prowler-cloud/prowler/" HTML_LOGO_IMG="https://raw.githubusercontent.com/prowler-cloud/prowler/master/util/html/prowler-logo-new.png" @@ -41,7 +41,7 @@ addHtmlHeader() { if [[ $PROFILE == "" ]];then PROFILE="ENV" fi - if [[ -z $HTML_REPORT_INIT ]]; then + if [[ -z $HTML_REPORT_INIT ]]; then cat < @@ -112,7 +112,7 @@ addHtmlHeader() { - * Sortable columns are CheckID (default) and Result + * Sortable columns are CheckID (default) and Result
@@ -135,7 +135,7 @@ addHtmlHeader() { EOF -fi +fi } addHtmlFooter() { @@ -170,7 +170,7 @@ unset HTML_REPORT_INIT addHtmlHeader > ${OUTPUT_FILE_NAME}.$EXTENSION_HTML while IFS=, read -r PROFILE ACCOUNT_NUM REPREGION TITLE_ID RESULT SCORED LEVEL TITLE_TEXT NOTES ASFF_COMPLIANCE_TYPE CHECK_SEVERITY CHECK_SERVICENAME;do - if [[ $RESULT == "INFO" ]]; then + if [[ $RESULT == "INFO" ]]; then echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo 'INFO' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML @@ -183,8 +183,8 @@ while IFS=, read -r PROFILE ACCOUNT_NUM REPREGION TITLE_ID RESULT SCORED LEVEL T echo ''$TITLE_TEXT'' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo ''$NOTES'' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML - fi - if [[ $RESULT == "PASS" ]]; then + fi + if [[ $RESULT == "PASS" ]]; then echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo 'PASS' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML @@ -197,8 +197,8 @@ while IFS=, read -r PROFILE ACCOUNT_NUM REPREGION TITLE_ID RESULT SCORED LEVEL T echo ''$TITLE_TEXT'' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo ''$NOTES'' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML - fi - if [[ $RESULT == "FAIL" ]]; then + fi + if [[ $RESULT == "FAIL" ]]; then echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo ' ' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo 'FAIL' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML @@ -212,7 +212,7 @@ while IFS=, read -r PROFILE ACCOUNT_NUM REPREGION TITLE_ID RESULT SCORED LEVEL T echo ''$NOTES'' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML fi - if [[ $RESULT == "WARNING" ]]; then + if [[ $RESULT == "WARNING" ]]; then echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo '' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML echo 'WARN' >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML @@ -228,6 +228,3 @@ while IFS=, read -r PROFILE ACCOUNT_NUM REPREGION TITLE_ID RESULT SCORED LEVEL T fi done < $INPUT addHtmlFooter >> ${OUTPUT_FILE_NAME}.$EXTENSION_HTML - - - diff --git a/contrib/k8s/README.md b/contrib/k8s/README.md index 437d83382d1..f1674a112ee 100644 --- a/contrib/k8s/README.md +++ b/contrib/k8s/README.md @@ -1,9 +1,9 @@ ## K8S - Cronjob Simple instructions to add a cronjob on K8S to execute a prowler and save the results on AWS S3. -### Files: +### Files: cronjob.yml ---> is a **cronjob** for K8S, you must set the frequency and probes from yours scans \ -secret.yml -----> is a **secret** file with AWS ID/Secret and the name of bucket +secret.yml -----> is a **secret** file with AWS ID/Secret and the name of bucket ### To apply: diff --git a/contrib/k8s/cronjob.yml b/contrib/k8s/cronjob.yml index 9705deb147a..dc923dbb4c4 100644 --- a/contrib/k8s/cronjob.yml +++ b/contrib/k8s/cronjob.yml @@ -16,7 +16,7 @@ spec: - name: prowler image: toniblyx/prowler:latest imagePullPolicy: Always - command: + command: - "./prowler" args: [ "-g", "hipaa", "-M", "csv,json,html", "-B", "$(awsS3Bucket)" ] env: @@ -30,11 +30,11 @@ spec: secretKeyRef: name: devsecops-prowler-cronjob-secret key: awsSecretKey - - name: awsS3Bucket + - name: awsS3Bucket valueFrom: secretKeyRef: name: devsecops-prowler-cronjob-secret - key: awsS3Bucket + key: awsS3Bucket imagePullPolicy: IfNotPresent restartPolicy: OnFailure backoffLimit: 3 diff --git a/contrib/multi-account-securityhub/.awsvariables b/contrib/multi-account-securityhub/.awsvariables index e2952c8e419..460c58ae722 100644 --- a/contrib/multi-account-securityhub/.awsvariables +++ b/contrib/multi-account-securityhub/.awsvariables @@ -1,3 +1,3 @@ export ROLE=ProwlerXA-Role export PARALLEL_ACCOUNTS=1 -export REGION=us-east-1 \ No newline at end of file +export REGION=us-east-1 diff --git a/contrib/multi-account-securityhub/Dockerfile b/contrib/multi-account-securityhub/Dockerfile index 96bbb6b63b8..c3088a8aef6 100644 --- a/contrib/multi-account-securityhub/Dockerfile +++ b/contrib/multi-account-securityhub/Dockerfile @@ -42,4 +42,4 @@ RUN \ USER ${USERNAME} # Run script -ENTRYPOINT ["/run-prowler-securityhub.sh"] \ No newline at end of file +ENTRYPOINT ["/run-prowler-securityhub.sh"] diff --git a/contrib/multi-account-securityhub/README.md b/contrib/multi-account-securityhub/README.md index 1cfeea5fe78..dd28e6b9f91 100644 --- a/contrib/multi-account-securityhub/README.md +++ b/contrib/multi-account-securityhub/README.md @@ -15,7 +15,7 @@ Originally based on [org-multi-account](https://github.com/prowler-cloud/prowler The solution is designed to be very simple. Prowler is run via an ECS Task definition that launches a single Fargate container. This Task Definition is executed on a schedule using an EventBridge Rule. ## CloudFormation Templates - + ### CF-Prowler-IAM.yml Creates the following IAM Roles: @@ -33,7 +33,7 @@ Creates the following resources: 5. **ProwlerTaskScheduler**: EventBridge Rule that schedules the execution of the Task Definition. The cron expression is specified as a CloudFormation template parameter. ### CF-Prowler-CrossAccountRole.yml -Creates the cross account IAM Role required for Prowler to run. Deploy it as StackSet in every account in the AWS Organization. +Creates the cross account IAM Role required for Prowler to run. Deploy it as StackSet in every account in the AWS Organization. ## Docker Container @@ -42,7 +42,7 @@ The Dockerfile does the following: 1. Uses amazonlinux:2022 as a base. 2. Downloads required dependencies. 3. Copies the .awsvariables and run-prowler-securityhub.sh files into the root. - 4. Downloads the specified version of Prowler as recommended in the release notes. + 4. Downloads the specified version of Prowler as recommended in the release notes. 5. Assigns permissions to a lower privileged user and then drops to it. 6. Runs the script. @@ -58,10 +58,10 @@ The script gets the list of accounts in AWS Organizations, and then executes Pro The logs that are generated and sent to Cloudwatch are error logs, and assessment start and finish logs. ## Instructions - 1. Create a Private ECR Repository in the account that will host the Prowler container. The Audit account is recommended, but any account can be used. + 1. Create a Private ECR Repository in the account that will host the Prowler container. The Audit account is recommended, but any account can be used. 2. Configure the .awsvariables file. Note the ROLE name chosen as it will be the CrossAccountRole. 3. Follow the steps from "View Push Commands" to build and upload the container image. You need to have Docker and AWS CLI installed, and use the cli to login to the account first. After upload note the Image URI, as it is required for the CF-Prowler-ECS template. - 4. Make sure SecurityHub is enabled in every account in AWS Organizations, and that the SecurityHub integration is enabled as explained in [Prowler - Security Hub Integration](https://github.com/prowler-cloud/prowler#security-hub-integration) + 4. Make sure SecurityHub is enabled in every account in AWS Organizations, and that the SecurityHub integration is enabled as explained in [Prowler - Security Hub Integration](https://github.com/prowler-cloud/prowler#security-hub-integration) 5. Deploy **CF-Prowler-CrossAccountRole.yml** in the Master Account as a single stack. You will have to choose the CrossAccountRole name (ProwlerXA-Role by default) and the ProwlerTaskRoleName (ProwlerECSTask-Role by default) 6. Deploy **CF-Prowler-CrossAccountRole.yml** in every Member Account as a StackSet. Choose the same CrossAccountName and ProwlerTaskRoleName as the previous step. 7. Deploy **CF-Prowler-IAM.yml** in the account that will host the Prowler container (the same from step 1). The following template parameters must be provided: @@ -72,7 +72,7 @@ The logs that are generated and sent to Cloudwatch are error logs, and assessmen 8. Deploy **CF-Prowler-ECS.yml** in the account that will host the Prowler container (the same from step 1). The following template parameters must be provided: - **ProwlerClusterName**: Name for the ECS Cluster (default ProwlerCluster) - **ProwlerContainerName**: Name for the Prowler container (default prowler) - - **ProwlerContainerInfo**: ECR URI from step 1. + - **ProwlerContainerInfo**: ECR URI from step 1. - **ProwlerECSLogGroupName**: CloudWatch Log Group name (default /aws/ecs/SecurityHub-Prowler) - **SecurityGroupVPCId**: VPC ID for the VPC where the container will run. - **ProwlerScheduledSubnet1 and 2**: Subnets IDs from the VPC specified. Choose private subnets if possible. @@ -90,5 +90,5 @@ If you permission find errors in the CloudWatch logs, the culprit might be a [Se --- ## Upgrading Prowler -Prowler version is controlled by the PROWLERVER argument in the Dockerfile, change it to the desired version and follow the ECR Push Commands to update the container image. -Old images can be deleted from the ECR Repository after the new image is confirmed to work. They will show as "untagged" as only one image can hold the "latest" tag. \ No newline at end of file +Prowler version is controlled by the PROWLERVER argument in the Dockerfile, change it to the desired version and follow the ECR Push Commands to update the container image. +Old images can be deleted from the ECR Repository after the new image is confirmed to work. They will show as "untagged" as only one image can hold the "latest" tag. diff --git a/contrib/multi-account-securityhub/templates/CF-Prowler-CrossAccountRole.yml b/contrib/multi-account-securityhub/templates/CF-Prowler-CrossAccountRole.yml index e39e6aac0ab..f7b569a0afe 100644 --- a/contrib/multi-account-securityhub/templates/CF-Prowler-CrossAccountRole.yml +++ b/contrib/multi-account-securityhub/templates/CF-Prowler-CrossAccountRole.yml @@ -94,4 +94,4 @@ Resources: Outputs: ProwlerCrossAccountRole: Description: CrossAccount Role to be used by Prowler to assess AWS Accounts in the AWS Organization. - Value: !Ref ProwlerCrossAccountRole \ No newline at end of file + Value: !Ref ProwlerCrossAccountRole diff --git a/contrib/multi-account-securityhub/templates/CF-Prowler-ECS.yml b/contrib/multi-account-securityhub/templates/CF-Prowler-ECS.yml index 7c4faa965bd..05b476f7385 100644 --- a/contrib/multi-account-securityhub/templates/CF-Prowler-ECS.yml +++ b/contrib/multi-account-securityhub/templates/CF-Prowler-ECS.yml @@ -5,14 +5,14 @@ Parameters: Type: String Description: Name of the ECS Cluster that the Prowler Fargate Task will run in Default: ProwlerCluster - ProwlerContainerName: + ProwlerContainerName: Type: String Description: Name of the Prowler Container Definition within the ECS Task Default: prowler - ProwlerContainerInfo: + ProwlerContainerInfo: Type: String Description: ECR URI of the Prowler container - ProwlerECSLogGroupName: + ProwlerECSLogGroupName: Type: String Description: Name for the log group to be created Default: /aws/ecs/SecurityHub-Prowler @@ -41,17 +41,17 @@ Parameters: Resources: ProwlerECSCloudWatchLogsGroup: Type: AWS::Logs::LogGroup - Properties: + Properties: LogGroupName: !Ref ProwlerECSLogGroupName RetentionInDays: 90 ProwlerECSCluster: Type: AWS::ECS::Cluster - Properties: + Properties: ClusterName: !Ref ProwlerClusterName ProwlerECSTaskDefinition: Type: AWS::ECS::TaskDefinition - Properties: - ContainerDefinitions: + Properties: + ContainerDefinitions: - Image: !Ref ProwlerContainerInfo Name: !Ref ProwlerContainerName LogConfiguration: @@ -99,4 +99,4 @@ Resources: - !Ref ProwlerSecurityGroup Subnets: - !Ref ProwlerScheduledSubnet1 - - !Ref ProwlerScheduledSubnet2 \ No newline at end of file + - !Ref ProwlerScheduledSubnet2 diff --git a/contrib/multi-account-securityhub/templates/CF-Prowler-IAM.yml b/contrib/multi-account-securityhub/templates/CF-Prowler-IAM.yml index 4851561990d..9f9535d26b8 100644 --- a/contrib/multi-account-securityhub/templates/CF-Prowler-IAM.yml +++ b/contrib/multi-account-securityhub/templates/CF-Prowler-IAM.yml @@ -102,4 +102,4 @@ Outputs: Value: !GetAtt ProwlerTaskRole.Arn ECSEventRoleARN: Description: ARN of the Eventbridge Task Role - Value: !GetAtt ECSEventRole.Arn \ No newline at end of file + Value: !GetAtt ECSEventRole.Arn diff --git a/contrib/org-multi-account/serverless_codebuild/README.md b/contrib/org-multi-account/serverless_codebuild/README.md index c4a727ef052..ce107b6ea08 100644 --- a/contrib/org-multi-account/serverless_codebuild/README.md +++ b/contrib/org-multi-account/serverless_codebuild/README.md @@ -32,7 +32,7 @@ For more information on how to use prowler, see [here](https://github.com/prowle - Specify regions : Region to deploy 3. **Audit Account** 1. Go to S3 console, create a bucket, upload [run-prowler-reports.sh.zip](src/run-prowler-reports.sh.zip) - - bucket name : prowler-util-*[Account ID]*-*[region]* + - bucket name : prowler-util-*[Account ID]*-*[region]* ![Untitled](docs/images/s3_screenshot.png) 1. Deploy [ProwlerCodeBuildStack.yaml](templates/ProwlerCodeBuildStack.yaml) which creates CloudWatch Rule to trigger CodeBuild every fixed time, allowing prowler to audit multi-accounts. @@ -45,4 +45,4 @@ For more information on how to use prowler, see [here](https://github.com/prowle - ProwlerReportS3Account : The account where the report S3 bucket resides. 1. If you'd like to change the scheduled time, 1. You can change the cron expression of ScheduleExpression within [ProwlerCodeBuildStack.yaml](templates/ProwlerCodeBuildStack.yaml). - 2. Alternatively, you can make changes directrly from Events > Rules > ProwlerExecuteRule > Actions > Edit in CloudWatch console. \ No newline at end of file + 2. Alternatively, you can make changes directrly from Events > Rules > ProwlerExecuteRule > Actions > Edit in CloudWatch console. diff --git a/contrib/org-multi-account/serverless_codebuild/README_kr.md b/contrib/org-multi-account/serverless_codebuild/README_kr.md index dd96138cecb..c7ed50aa313 100644 --- a/contrib/org-multi-account/serverless_codebuild/README_kr.md +++ b/contrib/org-multi-account/serverless_codebuild/README_kr.md @@ -4,7 +4,7 @@ Langage: [English](README.md) 이 문서는 AWS Organization 내의 multi account 환경에서 prowler 를 적용하기 위해 작성된 문서입니다. 일정 시간마다 CloudWatch는 CodeBuild 를 트리거합니다. -CodeBuild 는 최신의 [prowler](https://github.com/prowler-cloud/prowler) 소스를 클론받고, +CodeBuild 는 최신의 [prowler](https://github.com/prowler-cloud/prowler) 소스를 클론받고, Organization 내의 모든 Account 에 대해 security assessment 를 수행합니다. prowler 의 자세한 사용방법은 [이 곳](https://github.com/prowler-cloud/prowler#usagee) 을 참고합니다. @@ -59,4 +59,4 @@ prowler 의 자세한 사용방법은 [이 곳](https://github.com/prowler-cloud - ProwlerReportS3Account : report 가 저장될 S3 bucket이 위치한 Account 3. 스케줄 된 시간을 변경하고 싶은 경우 1. [ProwlerCodeBuildStack.yaml](templates/ProwlerCodeBuildStack.yaml) 내에서 ScheduleExpression의 크론 표현식을 변경할 수 있습니다. - 2. 또는 CloudWatch console 에서 Events > Rules > ProwlerExecuteRule > Actions > Edit 에서 직접 변경할 수 있습니다. \ No newline at end of file + 2. 또는 CloudWatch console 에서 Events > Rules > ProwlerExecuteRule > Actions > Edit 에서 직접 변경할 수 있습니다. diff --git a/contrib/terraform-kickstarter/data.tf b/contrib/terraform-kickstarter/data.tf index 48105b29ddd..85ba7f259d5 100644 --- a/contrib/terraform-kickstarter/data.tf +++ b/contrib/terraform-kickstarter/data.tf @@ -209,4 +209,4 @@ data "aws_iam_policy" "SecurityAudit" { data "aws_caller_identity" "current" { } data "aws_region" "current" { -} \ No newline at end of file +} diff --git a/contrib/terraform-kickstarter/main.tf b/contrib/terraform-kickstarter/main.tf index c63fe911943..28092bdb7b6 100644 --- a/contrib/terraform-kickstarter/main.tf +++ b/contrib/terraform-kickstarter/main.tf @@ -256,7 +256,7 @@ resource "aws_iam_role" "prowler_event_trigger_role" { } ] }) - + } resource "aws_iam_policy" "prowler_event_trigger_policy" { depends_on = [aws_codebuild_project.prowler_codebuild] @@ -328,7 +328,7 @@ resource "aws_iam_policy" "prowler_kickstarter_iam_policy" { ] Effect = "Allow" Resource = "arn:aws:glue:${data.aws_region.current.name}:${data.aws_caller_identity.current.account_id}:catalog" - + }, { Action = [ @@ -340,19 +340,19 @@ resource "aws_iam_policy" "prowler_kickstarter_iam_policy" { ] Effect = "Allow" Resource = "arn:aws:codebuild:${data.aws_region.current.name}:${data.aws_caller_identity.current.account_id}:report-group/*" - + }, { Action = [ "securityhub:BatchImportFindings"] Effect = "Allow" - Resource = "*" + Resource = "*" }, { Action = [ "securityhub:GetFindings"] Effect = "Allow" - Resource = "*" + Resource = "*" }, - { + { "Action": "codebuild:StartBuild", "Resource": "arn:aws:codebuild:${data.aws_region.current.name}:${data.aws_caller_identity.current.account_id}:project/*", "Effect": "Allow" @@ -416,7 +416,7 @@ resource "aws_s3_bucket_policy" "prowler_report_storage_bucket_policy" { } } } - + ] }) } @@ -474,7 +474,7 @@ resource "aws_codebuild_project" "prowler_codebuild" { -resource "aws_securityhub_account" "securityhub_resource" { +resource "aws_securityhub_account" "securityhub_resource" { } resource "aws_securityhub_product_subscription" "security_hub_enable_prowler_findings" { @@ -496,4 +496,4 @@ resource "aws_cloudwatch_event_target" "run_prowler_scan" { rule = aws_cloudwatch_event_rule.prowler_check_scheduler_event.name role_arn = aws_iam_role.prowler_event_trigger_role.arn - } \ No newline at end of file + } diff --git a/contrib/terraform-kickstarter/outputs.tf b/contrib/terraform-kickstarter/outputs.tf index 4fa74162e81..bc40c325656 100644 --- a/contrib/terraform-kickstarter/outputs.tf +++ b/contrib/terraform-kickstarter/outputs.tf @@ -206,4 +206,4 @@ output "account_id" { value = data.aws_caller_identity.current.account_id -} \ No newline at end of file +} diff --git a/contrib/terraform-kickstarter/prowler_build_spec.yml b/contrib/terraform-kickstarter/prowler_build_spec.yml index f9fe73a167c..063da93771b 100644 --- a/contrib/terraform-kickstarter/prowler_build_spec.yml +++ b/contrib/terraform-kickstarter/prowler_build_spec.yml @@ -5,20 +5,20 @@ phases: python: 3.8 commands: - echo "Installing Prowler and dependencies..." - - pip3 install detect-secrets + - pip3 install detect-secrets - yum -y install jq - curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip" - unzip awscliv2.zip - ./aws/install - git clone https://github.com/prowler-cloud/prowler - cd prowler - + build: commands: - echo "Running Prowler as ./prowler $PROWLER_OPTIONS" - ./prowler $PROWLER_OPTIONS || true post_build: commands: - - echo "Scan Complete" + - echo "Scan Complete" - aws s3 cp --sse AES256 output/ s3://$BUCKET_REPORT/ --recursive - echo "Done!" diff --git a/contrib/terraform-kickstarter/tf_install.sh b/contrib/terraform-kickstarter/tf_install.sh index d3d71ce8c6d..94795c20cc3 100644 --- a/contrib/terraform-kickstarter/tf_install.sh +++ b/contrib/terraform-kickstarter/tf_install.sh @@ -6,4 +6,4 @@ cd prowler git checkout -t origin/terraform-kickstart sudo yum install -y yum-utils sudo yum-config-manager --add-repo https://rpm.releases.hashicorp.com/AmazonLinux/hashicorp.repo -sudo yum -y install terraform \ No newline at end of file +sudo yum -y install terraform diff --git a/contrib/wazuh/README.md b/contrib/wazuh/README.md index 817facdd5d0..2ce82fd09fb 100644 --- a/contrib/wazuh/README.md +++ b/contrib/wazuh/README.md @@ -55,7 +55,7 @@ cp /var/ossec/integrations/prowler/integrations/prowler_rules.xml /var/ossec/etc ``` Edit `/var/ossec/etc/ossec.conf` and add the following wodle configuration. Remember that here `timeout 21600 seconds` is 6 hours, just to allow Prowler runs completely in case of a large account. The interval recommended is 1d: -```xml +```xml no aws-prowler: account1 diff --git a/contrib/wazuh/prowler-wrapper.py b/contrib/wazuh/prowler-wrapper.py index c7482d16d74..a76344a00b5 100644 --- a/contrib/wazuh/prowler-wrapper.py +++ b/contrib/wazuh/prowler-wrapper.py @@ -19,15 +19,15 @@ # 6 - Error sending to socket -import signal -import sys -import socket import argparse -import subprocess import json -from datetime import datetime import os import re +import signal +import socket +import subprocess +import sys +from datetime import datetime ################################################################################ # Constants diff --git a/groups/group10_hipaa b/groups/group10_hipaa deleted file mode 100644 index b38aa23c1de..00000000000 --- a/groups/group10_hipaa +++ /dev/null @@ -1,22 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[10]='hipaa' -GROUP_NUMBER[10]='10.0' -GROUP_TITLE[10]='HIPAA Compliance - ONLY AS REFERENCE - [hipaa] ****************' -GROUP_RUN_BY_DEFAULT[10]='N' # run it when execute_all is called -GROUP_CHECKS[10]='check12,check113,check23,check26,check27,check29,extra718,extra725,extra72,extra75,extra717,extra729,extra734,check38,extra73,extra740,extra735,check112,check13,check15,check16,check17,check18,check19,check21,check24,check28,check31,check310,check311,check312,check313,check314,check32,check33,check34,check35,check36,check37,check39,extra792' - -# Resources: -# https://d0.awsstatic.com/whitepapers/compliance/AWS_HIPAA_Compliance_Whitepaper.pdf -# https://www.slideshare.net/AmazonWebServices/wps301navigating-hipaa-and-hitrustquickstart-guide-to-account-gov-stratpdf diff --git a/groups/group11_secrets b/groups/group11_secrets deleted file mode 100644 index 76d46056111..00000000000 --- a/groups/group11_secrets +++ /dev/null @@ -1,22 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2019) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[11]='secrets' -GROUP_NUMBER[11]='11.0' -GROUP_TITLE[11]='Look for keys secrets or passwords around resources - [secrets]' -GROUP_RUN_BY_DEFAULT[11]='N' # but it runs when execute_all is called (default) -GROUP_CHECKS[11]='extra741,extra742,extra759,extra760,extra768,extra775,extra7141' - -# requires https://github.com/Yelp/detect-secrets -# `pip install detect-secrets` - diff --git a/groups/group12_apigateway b/groups/group12_apigateway deleted file mode 100644 index fbecc23cb86..00000000000 --- a/groups/group12_apigateway +++ /dev/null @@ -1,19 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[12]='apigateway' -GROUP_NUMBER[12]='12.0' -GROUP_TITLE[12]='API Gateway security checks - [apigateway] ********************' -GROUP_RUN_BY_DEFAULT[12]='N' # run it when execute_all is called -GROUP_CHECKS[12]='extra722,extra743,extra744,extra745,extra746' - diff --git a/groups/group13_rds b/groups/group13_rds deleted file mode 100644 index d3aad2040bd..00000000000 --- a/groups/group13_rds +++ /dev/null @@ -1,18 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[13]='rds' -GROUP_NUMBER[13]='13.0' -GROUP_TITLE[13]='RDS security checks - [rds] ***********************************' -GROUP_RUN_BY_DEFAULT[13]='N' # run it when execute_all is called -GROUP_CHECKS[13]='extra78,extra723,extra735,extra739,extra747,extra7113,extra7131,extra7132,extra7133' diff --git a/groups/group14_elasticsearch b/groups/group14_elasticsearch deleted file mode 100644 index b4cf9b744a6..00000000000 --- a/groups/group14_elasticsearch +++ /dev/null @@ -1,18 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[14]='elasticsearch' -GROUP_NUMBER[14]='14.0' -GROUP_TITLE[14]='Elasticsearch related security checks - [elasticsearch] *******' -GROUP_RUN_BY_DEFAULT[14]='N' # run it when execute_all is called -GROUP_CHECKS[14]='extra715,extra716,extra779,extra780,extra781,extra782,extra783,extra784,extra785,extra787,extra788,extra7101' \ No newline at end of file diff --git a/groups/group15_pci b/groups/group15_pci deleted file mode 100644 index 82f64bb2dc2..00000000000 --- a/groups/group15_pci +++ /dev/null @@ -1,133 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[15]='pci' -GROUP_NUMBER[15]='15.0' -GROUP_TITLE[15]='PCI-DSS v3.2.1 Readiness - ONLY AS REFERENCE - [pci] **********' -GROUP_RUN_BY_DEFAULT[15]='N' # run it when execute_all is called -GROUP_CHECKS[15]='check11,check12,check13,check14,check15,check16,check17,check18,check19,check110,check112,check113,check114,check116,check21,check23,check25,check26,check27,check28,check29,check314,check36,check38,check43,extra711,extra713,extra717,extra718,extra72,extra729,extra735,extra738,extra740,extra744,extra748,extra75,extra750,extra751,extra753,extra754,extra755,extra773,extra78,extra780,extra781,extra782,extra783,extra784,extra785,extra787,extra788,extra798' - -# Resources: -# https://github.com/toniblyx/prowler/issues/296 - -# List of checks based on PCI v3.2.1 -# 3.1 Requirement: Install and Maintain a Firewall Configuration to Protect Cardholder Data - -# Ensure no security groups allow ingress from 0.0.0.0/0 to all ports and protocols extra748 -# Ensure no security groups allow ingress from 0.0.0.0/0 to RDP (TCP 3389) check42 -# Ensure no security groups allow ingress from 0.0.0.0/0 to SSH (TCP 22) check41 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Oracle (TCP 1521) extra749 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Oracle (TCP and UDP 2483) extra749 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Oracle (UDP 2483) extra749 -# Ensure no security groups allow ingress from 0.0.0.0/0 to MySQL (TCP 3306) extra750 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Postgres (TCP 5432) extra751 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Redis (TCP 6379)extra752 -# Ensure no security groups allow ingress from 0.0.0.0/0 to MongoDB (TCP 27017 and 27018) extra753 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Cassandra (TCP 7199, 9160 and 8888) extra754 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Memcached (TCP and UDP 11211) extra755 -# Ensure no security groups allow ingress from 0.0.0.0/0 to Elasticsearch ports (TCP 9200/9300/5601) extra779 -# Ensure the default security group restricts all traffic check43 -# Remove unused security groups extra75 -# RDS should not have Public interface open to a public scope extra78 -# Check for Publicly Accessible Redshift Clusters extra711 -# Ensure Lambda Functions are not publicly accessible extra798 - -# 3.2 Requirement 2: Do Not Use Vendor-Supplied Defaults for System Passwords and Other Security Parameters - -# Instance with administrative service: SSH (TCP:22) is exposed to the public Internet check41 -# Instance with administrative service: RDP (TCP:3389) is exposed to the public Internet check42 -# Instance with unencrypted Redis: (TCP:6379) is exposed to the public Internet extra752 - -# 3.3 Requirement 3: Protect Stored Cardholder Data - -# S3 Buckets Server Side encryption at rest extra734 -# Ensure ECS Cluster At-rest encryption TODO -# Ensure DynamoDB -Server Side Encryption DONE (default behavior) -# Check if RDS instances storage is encrypted extra735 -# Ensure there are no EBS Volumes unencrypted extra729 -# Ensure CloudTrail logs are encrypted at rest using KMS CMKs check27 -# Ensure rotation for customer created CMKs is enabled check28 -# Check if EBS snapshots are encrypted extra740 -# Ensure there are no EBS Snapshots set as Public extra72 -# Ensure there is no Fargate containers in use (/aws/containers-roadmap/issues/314) TODO - -# 3.4 Requirement 4: Encrypt Transmission of Cardholder Data Across Open, Public Networks - -# Use encrypted connections between CloudFront and origin server extra738 and TODO -# Ensure that S3 Buckets only allow data transfer using SSL/TLS extra734 -# ELB is setup with SSL for secure communications TODO -# Ensure the access keys are rotated every 90 days or less check14 -# Network Load Balancer with unencrypted service: ElasticSearch (TCP:9200) is exposed to the public Internet TODO? ELB on SSL should be enough extra779 and extra716 -# Network Load Balancer with unencrypted service: ElasticSearch (TCP:9300) is exposed to the public Internet TODO? ELB on SSL should be enough extra779 and extra716 -# Network Load Balancer with unencrypted service: LDAP (UDP:389) is exposed to the public Internet TODO? ELB on SSL should be enough -# Network Load Balancer with unencrypted service: LDAP (TCP:389) is exposed to the public Internet TODO? ELB on SSL should be enough -# Instance with unencrypted service: ElasticSearch (TCP:9200) is exposed to the public Internet extra779 and extra716 -# Instance with unencrypted service: ElasticSearch (TCP:9300) is exposed to the public Internet extra779 and extra716 -# Instance with unencrypted service: LDAP (UDP:389) is exposed to the public Internet -# Instance with unencrypted service: LDAP (TCP:389) is exposed to the public Internet -# Instance with unencrypted Redis: (TCP:6379) is exposed to the public Internet - -# 3.5. Requirement 5: Protect All Systems Against Malware and Regularly Update Anti-Virus Software or Programs - -# N/A -# 3.6. Requirement 6: Develop and Maintain Secure Systems and Applications - -# Ensure Inspector has Assessment Targets TODO -# Ensure Inspector has a Scheduled Assessment Template TODO -# Check for WAF IPSet TODO -# Check for WAF Constraint Sets TODO -# Check for WAF Web ACL extra744,extra773 - -# 3.7. Requirement 7: Restrict Access to Cardholder Data By Business Need To Know - -# Credentials (access keys) unused for 90 days or more should be disabled check13 -# Credentials (password enabled) unused for 90 days or more should be disabled check111 -# Ensure IAM policies are attached only to groups or roles check116 - -# 3.8. Requirement 8: Identify and Authenticate Access to System Components - -# Enforce password policy: IAM (check15, check16, check17, check18, check19, check110, check111) -# Ensure that MFA is enabled for root account check113 -# Ensure MFA is enabled for all IAM users that have a console password check12 -# Ensure no root account access key exist check112 -# Ensure hardware MFA is enabled for the root account check114 -# Avoid the use of root account. check11 - -# 3.9 Requirement 9: Restrict Physical Access to Cardholder Data - -# N/A -# 3.10. Requirement 10: Track and Monitor All Access to Network Resources and Cardholder Data - -# Ensure CloudTrail is enabled in all regions check21 -# Ensure VPC Flow Logging is enabled in all the applicable Regions check29 -# Ensure S3 Buckets access logging is enabled on the CloudTrail S3 bucket check26 -# ELB is created with access logs enabled extra717 -# S3 bucket should have server access logging enabled extra718 -# Ensure AWS Config in all regions check25 -# S3 bucket CloudTrail logs should not have public accessible check23 -# S3 buckets should not be world-listable extra73 -# S3 buckets should not be world-writable extra73 -# S3 buckets should not be world-readable extra73 -# Ensure a log metric filter and alarm exist for S3 bucket policy changes check38 -# Ensure a log metric exist for AWS Management console authentication failures check36 -# Ensure a log metric exist for VPC changes check314 - -# 3.11. Requirement 11: Regularly Test Security Systems and Processes - -# Ensure AWS GuarDduty is enabled extra713 -# Ensure Inspector has Assessment Targets -# Ensure Inspector has a Scheduled Assessment Template - -# Requirement 12: Maintain a Policy That Addresses Information Security For All Personnel - -# N/A diff --git a/groups/group16_trustboundaries b/groups/group16_trustboundaries deleted file mode 100644 index 93aa07baea4..00000000000 --- a/groups/group16_trustboundaries +++ /dev/null @@ -1,23 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[16]='trustboundaries' -GROUP_NUMBER[16]='16.0' -GROUP_TITLE[16]='Find cross-account trust boundaries - [trustboundaries] *******' -GROUP_RUN_BY_DEFAULT[16]='N' # run it when execute_all is called -GROUP_CHECKS[16]='extra789,extra790' - -# Single account environment: No action required. The AWS account number will be automatically added by the checks. -# Multi account environment: Any additional trusted account number should be added as a space separated list, e.g. -# GROUP_TRUSTBOUNDARIES_TRUSTED_ACCOUNT_IDS="1234567890 0987654321 6789012345" -GROUP_TRUSTBOUNDARIES_TRUSTED_ACCOUNT_IDS='' diff --git a/groups/group17_internetexposed b/groups/group17_internetexposed deleted file mode 100644 index bb482a0f166..00000000000 --- a/groups/group17_internetexposed +++ /dev/null @@ -1,50 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[17]='internet-exposed' -GROUP_NUMBER[17]='17.0' -GROUP_TITLE[17]='Find resources exposed to the internet - [internet-exposed] ***' -GROUP_RUN_BY_DEFAULT[17]='N' # run it when execute_all is called -GROUP_CHECKS[17]='check41,check42,check45,check46,extra72,extra73,extra74,extra76,extra77,extra78,extra79,extra710,extra711,extra716,extra723,extra727,extra731,extra736,extra738,extra745,extra748,extra749,extra750,extra751,extra752,extra753,extra754,extra755,extra770,extra771,extra778,extra779,extra787,extra788,extra795,extra796,extra798,extra7102,extra7134,extra7135,extra7136,extra7137,extra7138' - -# 4.1 [check41] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to port 22 (Scored) [group4, cislevel1, cislevel2] -# 4.2 [check42] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to port 3389 (Scored) [group4, cislevel1, cislevel2] -# 7.2 [extra72] Ensure there are no EBS Snapshots set as Public [extras, forensics-ready, gdpr, hipaa, apigateway, rds] -# 7.3 [extra73] Ensure there are no S3 buckets open to the Everyone or Any AWS user [extras, gdpr, hipaa, rds] -# 7.4 [extra74] Ensure there are no Security Groups without ingress filtering being used [extras, gdpr, hipaa, secrets, apigateway, rds] -# 7.6 [extra76] Ensure there are no EC2 AMIs set as Public [extras, gdpr, secrets] -# 7.7 [extra77] Ensure there are no ECR repositories set as Public [group1, extras, secrets, elasticsearch] -# 7.8 [extra78] Ensure there are no Public Accessible RDS instances [extras, rds, elasticsearch, trustboundaries] -# 7.9 [extra79] Check for internet facing Elastic Load Balancers [extras, trustboundaries] -# 7.10 [extra710] Check for internet facing EC2 Instances [extras] -# 7.11 [extra711] Check for Publicly Accessible Redshift Clusters [extras] -# 7.16 [extra716] Check if Amazon Elasticsearch Service (ES) domains are set as Public or if it has open policy access [extras, elasticsearch] -# 7.23 [extra723] Check if RDS Snapshots and Cluster Snapshots are public [extras, rds] -# 7.27 [extra727] Check if SQS queues have policy set as Public [extras, gdpr] -# 7.31 [extra731] Check if SNS topics have policy set as Public [extras, gdpr] -# 7.38 [extra738] Check if CloudFront distributions are set to HTTPS [extras, gdpr] -# 7.45 [extra745] Check if API Gateway endpoint is public or private [extras, apigateway] -# 7.48 [extra748] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to any port [extras] -# 7.49 [extra749] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Oracle ports 1521 or 2483 [extras] -# 7.50 [extra750] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to MySQL port 3306 [extras] -# 7.51 [extra751] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Postgres port 5432 [extras] -# 7.52 [extra752] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Redis port 6379 [extras] -# 7.53 [extra753] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to MongoDB ports 27017 and 27018 [extras] -# 7.54 [extra754] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Cassandra ports 7199 or 9160 or 8888 [extras] -# 7.55 [extra755] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Memcached port 11211 [extras] -# 7.70 [extra770] Check for internet facing EC2 instances with Instance Profiles attached [extras] -# 7.78 [extra778] Find VPC security groups with wide-open public IPv4 CIDR ranges (non-RFC1918) [extras] -# 7.79 [extra779] Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to Elasticsearch/Kibana ports [extras, elasticsearch] -# 7.87 [extra787] Check connection and authentication for Internet exposed Elasticsearch/Kibana ports [extras, elasticsearch] -# 7.88 [extra788] Check connection and authentication for Internet exposed Amazon Elasticsearch Service (ES) domains [extras, elasticsearch] -# 7.71 [extra771] Check if S3 buckets have policies which allow WRITE access [extras] diff --git a/groups/group18_iso27001 b/groups/group18_iso27001 deleted file mode 100644 index fe8ba0eaf6f..00000000000 --- a/groups/group18_iso27001 +++ /dev/null @@ -1,174 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[18]='iso27001' -GROUP_NUMBER[18]='18.0' -GROUP_TITLE[18]='ISO 27001:2013 Readiness - ONLY AS REFERENCE - [iso27001] *****' -GROUP_RUN_BY_DEFAULT[18]='N' # run it when execute_all is called -GROUP_CHECKS[18]='check11,check110,check111,check112,check113,check114,check115,check116,check119,check12,check122,check13,check14,check15,check16,check17,check18,check19,check21,check22,check23,check24,check25,check26,check27,check28,check29,check31,check310,check311,check312,check313,check314,check32,check33,check34,check35,check36,check37,check38,check39,check41,check42,check43,check44,extra71,extra710,extra7100,extra711,extra7113,extra7123,extra7125,extra7126,extra7128,extra7129,extra713,extra714,extra7130,extra718,extra719,extra72,extra720,extra721,extra722,extra723,extra724,extra725,extra726,extra727,extra728,extra729,extra731,extra73,extra731,extra735,extra739,extra74,extra741,extra747,extra748,extra75,extra757,extra758,extra759,extra76,extra760,extra761,extra762,extra763,extra764,extra765,extra767,extra768,extra769,extra77,extra771,extra772,extra774,extra776,extra777,extra778,extra78,extra789,extra79,extra790,extra792,extra793,extra794,extra795,extra796,extra798' - -# # Category Objective ID Objective Name Prowler check ID Check Summary -# 1 A.9 Access Control A.9.2 User Access Management check122 Ensure IAM policies that allow full "*:*" administrative privileges are not created. -# 2 A.9 Access Control A.9.2 User Access Management check111 Ensure IAM password policy expires passwords within 90 days or less -# 3 A.9 Access Control A.9.2 User Access Management check110 Ensure IAM password policy prevents password reuse -# 4 A.9 Access Control A.9.2 User Access Management check19 Ensure IAM password policy requires minimum length of 14 or greater -# 5 A.9 Access Control A.9.2 User Access Management check18 Ensure IAM password policy require at least one number -# 6 A.9 Access Control A.9.2 User Access Management check17 Ensure IAM password policy require at least one symbol -# 7 A.9 Access Control A.9.2 User Access Management check16 Ensure IAM password policy require at least one lowercase letter -# 8 A.9 Access Control A.9.2 User Access Management check15 Ensure IAM password policy requires at least one uppercase letter -# 9 A.9 Access Control A.9.2 User Access Management check11 Avoid the use of the 'root' account -# 10 A.9 Access Control A.9.2 User Access Management check116 Ensure IAM policies are attached only to groups or roles -# 11 A.9 Access Control A.9.2 User Access Management check12 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have console access -# 12 A.9 Access Control A.9.2 User Access Management check114 Ensure MFA is enabled for the 'root' account -# 13 A.9 Access Control A.9.2 User Access Management check115 Ensure security questions are registered in the AWS account -# 14 A.9 Access Control A.9.2 User Access Management check14 Ensure access keys are rotated every 90 days or less -# 15 A.9 Access Control A.9.2 User Access Management check13 Ensure credentials unused for 90 days or greater are disabled -# 16 A.9 Access Control A.9.2 User Access Management check112 Ensure no root account access key exists -# 17 A.9 Access Control A.9.2 User Access Management check119 Ensure IAM instance roles are used for AWS resource access from instances -# 18 A.9 Access Control A.9.2 User Access Management extra71 Ensure users of groups with AdministratorAccess policy have MFA tokens enabled -# 19 A.9 Access Control A.9.2 User Access Management extra7100 Ensure that no custom policies exist which allow permissive role assumption (e.g. sts:AssumeRole on *) -# 20 A.9 Access Control A.9.2 User Access Management extra7123 Check if IAM users have two active access keys -# 21 A.9 Access Control A.9.2 User Access Management extra7125 Check if IAM users have Hardware MFA enabled. -# 22 A.9 Access Control A.9.2 User Access Management extra769 Check if IAM Access Analyzer is enabled and its findings -# 23 A.9 Access Control A.9.2 User Access Management extra774 Ensure credentials unused for 30 days or greater are disabled. -# 24 A.9 Access Control A.9.3 User Responsibilities check111 Ensure IAM password policy expires passwords within 90 days or less -# 25 A.9 Access Control A.9.3 User Responsibilities check110 Ensure IAM password policy prevents password reuse -# 26 A.9 Access Control A.9.3 User Responsibilities check19 Ensure IAM password policy requires minimum length of 14 or greater -# 27 A.9 Access Control A.9.3 User Responsibilities check18 Ensure IAM password policy require at least one number -# 28 A.9 Access Control A.9.3 User Responsibilities check17 Ensure IAM password policy require at least one symbol -# 29 A.9 Access Control A.9.3 User Responsibilities check16 Ensure IAM password policy require at least one lowercase letter -# 30 A.9 Access Control A.9.3 User Responsibilities check15 Ensure IAM password policy requires at least one uppercase letter -# 31 A.9 Access Control A.9.3 User Responsibilities check12 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have console access -# 32 A.9 Access Control A.9.3 User Responsibilities check14 Ensure access keys are rotated every 90 days or less -# 33 A.9 Access Control A.9.3 User Responsibilities check13 Ensure credentials unused for 90 days or greater are disabled -# 34 A.9 Access Control A.9.4 System and Application Access Control check122 Ensure IAM policies that allow full "*:*" administrative privileges are not created. -# 35 A.9 Access Control A.9.4 System and Application Access Control check111 Ensure IAM password policy expires passwords within 90 days or less -# 36 A.9 Access Control A.9.4 System and Application Access Control check110 Ensure IAM password policy prevents password reuse -# 37 A.9 Access Control A.9.4 System and Application Access Control check19 Ensure IAM password policy requires minimum length of 14 or greater -# 38 A.9 Access Control A.9.4 System and Application Access Control check18 Ensure IAM password policy require at least one number -# 39 A.9 Access Control A.9.4 System and Application Access Control check17 Ensure IAM password policy require at least one symbol -# 40 A.9 Access Control A.9.4 System and Application Access Control check16 Ensure IAM password policy require at least one lowercase letter -# 41 A.9 Access Control A.9.4 System and Application Access Control check15 Ensure IAM password policy requires at least one uppercase letter -# 42 A.9 Access Control A.9.4 System and Application Access Control check11 Avoid the use of the 'root' account -# 43 A.9 Access Control A.9.4 System and Application Access Control check116 Ensure IAM policies are attached only to groups or roles -# 44 A.9 Access Control A.9.4 System and Application Access Control check12 Ensure multi-factor authentication (MFA) is enabled for all IAM users that have console access -# 45 A.9 Access Control A.9.4 System and Application Access Control check113 Ensure MFA is enabled for the 'root' account -# 46 A.9 Access Control A.9.4 System and Application Access Control check14 Ensure access keys are rotated every 90 days or less -# 47 A.9 Access Control A.9.4 System and Application Access Control check13 Ensure credentials unused for 90 days or greater are disabled -# 48 A.9 Access Control A.9.4 System and Application Access Control check112 Ensure no root account access key exists -# 55 A.9 Access Control A.9.4 System and Application Access Control extra711 Check if Redshift cluster is Public Accessible -# 49 A.9 Access Control A.9.4 System and Application Access Control extra7113 Check if RDS instances have deletion protection enabled -# 50 A.9 Access Control A.9.4 System and Application Access Control extra72 Ensure there are no EBS Snapshots set as Public -# 51 A.9 Access Control A.9.4 System and Application Access Control extra723 Check if RDS Snapshots and Cluster Snapshots are public -# 52 A.9 Access Control A.9.4 System and Application Access Control extra727 Check if SQS queues have policy set as Public -# 53 A.9 Access Control A.9.4 System and Application Access Control extra73 Ensure there are no S3 buckets open to Everyone or Any AWS user -# 54 A.9 Access Control A.9.4 System and Application Access Control extra731 Check if SNS topics have policy set as Public -# 56 A.9 Access Control A.9.4 System and Application Access Control extra76 Ensure there are no EC2 AMIs set as Public -# 57 A.9 Access Control A.9.4 System and Application Access Control extra77 Ensure there are no ECR repositories set as Public -# 58 A.9 Access Control A.9.4 System and Application Access Control extra771 Check if S3 buckets have policies which allow WRITE access -# 59 A.9 Access Control A.9.4 System and Application Access Control extra795 Ensure EKS Clusters are created with Private Endpoint Enabled and Public Access Disabled -# 60 A.9 Access Control A.9.4 System and Application Access Control extra796 Restrict Access to the EKS Control Plane Endpoint -# 61 A.10 Cryptography A.10.1 Cryptographic Controls extra735 Setup Encryption at rest for RDS instances -# 62 A.10 Cryptography A.10.1 Cryptographic Controls extra792 Check if Elastic Load Balancers have insecure SSL ciphers -# 63 A.10 Cryptography A.10.1 Cryptographic Controls check37 Detect Customer Master Keys (CMKs) scheduled for deletion -# 64 A.10 Cryptography A.10.1 Cryptographic Controls check27 Ensure CloudTrail logs are encrypted at rest using KMS CMKs -# 65 A.10 Cryptography A.10.1 Cryptographic Controls check28 Ensure rotation for customer created KMS CMKs is enabled -# 66 A.10 Cryptography A.10.1 Cryptographic Controls extra7126 Check if there are CMK KMS keys not used -# 67 A.10 Cryptography A.10.1 Cryptographic Controls extra7128 Check if DynamoDB table has encryption at rest enabled using CMK KMS -# 68 A.10 Cryptography A.10.1 Cryptographic Controls extra7130 Ensure there are no SNS Topics unencrypted -# 69 A.10 Cryptography A.10.1 Cryptographic Controls extra724 Check if ACM certificates have Certificate Transparency logging enabled -# 70 A.10 Cryptography A.10.1 Cryptographic Controls extra728 Check if SQS queues have Server Side Encryption enabled -# 71 A.10 Cryptography A.10.1 Cryptographic Controls extra729 Ensure there are no EBS Volumes unencrypted -# 72 A.10 Cryptography A.10.1 Cryptographic Controls extra761 Check if EBS Default Encryption is activated -# 73 A.10 Cryptography A.10.1 Cryptographic Controls extra764 Check if S3 buckets have secure transport policy -# 74 A.10 Cryptography A.10.1 Cryptographic Controls extra767 Check if CloudFront distributions have Field Level Encryption enabled -# 75 A.10 Cryptography A.10.1 Cryptographic Controls extra791 Check if CloudFront distributions are using deprecated SSL protocols -# 76 A.10 Cryptography A.10.1 Cryptographic Controls extra793 Check if Elastic Load Balancers have SSL listeners -# 77 A.12 Operations Security A.12.3 Information Backup extra739 Check if RDS instances have backup enabled -# 78 A.12 Operations Security A.12.4 Logging and Monitoring check314 Ensure a log metric filter and alarm exist for VPC changes -# 79 A.12 Operations Security A.12.4 Logging and Monitoring check313 Ensure a log metric filter and alarm exist for route table changes -# 80 A.12 Operations Security A.12.4 Logging and Monitoring check312 Ensure a log metric filter and alarm exist for changes to network gateways -# 81 A.12 Operations Security A.12.4 Logging and Monitoring check311 Ensure a log metric filter and alarm exist for changes to Network Access Control Lists (NACL) -# 82 A.12 Operations Security A.12.4 Logging and Monitoring check310 Ensure a log metric filter and alarm exist for security group changes -# 83 A.12 Operations Security A.12.4 Logging and Monitoring check39 Ensure a log metric filter and alarm exist for AWS Config configuration changes -# 84 A.12 Operations Security A.12.4 Logging and Monitoring check39 Check if CloudFront distributions have logging enabled -# 85 A.12 Operations Security A.12.4 Logging and Monitoring extra719 Check if Route53 public hosted zones are logging queries to CloudWatch Logs -# 86 A.12 Operations Security A.12.4 Logging and Monitoring extra720 Check if Lambda functions invoke API operations are being recorded by CloudTrail -# 87 A.12 Operations Security A.12.4 Logging and Monitoring extra722 Check if API Gateway has logging enabled -# 88 A.12 Operations Security A.12.4 Logging and Monitoring check38 Ensure a log metric filter and alarm exist for S3 bucket policy changes -# 89 A.12 Operations Security A.12.4 Logging and Monitoring check37 Ensure a log metric filter and alarm exist for disabling or scheduled deletion of customer created CMKs -# 90 A.12 Operations Security A.12.4 Logging and Monitoring check36 Ensure a log metric filter and alarm exist for AWS Management Console authentication failures -# 91 A.12 Operations Security A.12.4 Logging and Monitoring check35 Ensure a log metric filter and alarm exist for CloudTrail configuration changes -# 92 A.12 Operations Security A.12.4 Logging and Monitoring check34 Ensure a log metric filter and alarm exist for IAM policy changes -# 93 A.12 Operations Security A.12.4 Logging and Monitoring check33 Ensure a log metric filter and alarm exist for usage of "root" account -# 94 A.12 Operations Security A.12.4 Logging and Monitoring check32 Ensure a log metric filter and alarm exist for Management Console sign-in without MFA -# 95 A.12 Operations Security A.12.4 Logging and Monitoring check31 Ensure a log metric filter and alarm exist for unauthorized API calls -# 96 A.12 Operations Security A.12.4 Logging and Monitoring check26 Ensure S3 bucket access logging is enabled on the CloudTrail S3 bucket -# 97 A.12 Operations Security A.12.4 Logging and Monitoring check25 Ensure AWS Config is enabled in all regions -# 98 A.12 Operations Security A.12.4 Logging and Monitoring check24 Ensure CloudTrail trails are integrated with CloudWatch Logs -# 99 A.12 Operations Security A.12.4 Logging and Monitoring check29 Ensure VPC flow logging is enabled in all VPCs -#100 A.12 Operations Security A.12.4 Logging and Monitoring check23 Ensure the S3 bucket CloudTrail logs to is not publicly accessible -#101 A.12 Operations Security A.12.4 Logging and Monitoring check21 Ensure CloudTrail is enabled in all regions -#102 A.12 Operations Security A.12.4 Logging and Monitoring check21 Ensure CloudTrail is enabled in all regions -#103 A.12 Operations Security A.12.4 Logging and Monitoring extra725 Check if S3 buckets have Object-level logging enabled in CloudTrail -#104 A.12 Operations Security A.12.4 Logging and Monitoring extra794 Ensure EKS Control Plane Audit Logging is enabled for all log types -#105 A.12 Operations Security A.12.4 Logging and Monitoring extra747 Check if RDS instances is integrated with CloudWatch Logs -#106 A.12 Operations Security A.12.4 Logging and Monitoring extra718 Check if S3 buckets have server access logging enabled -#107 A.12 Operations Security A.12.6 Technical Vulnerability Management check43 Ensure the default security group of every VPC restricts all traffic -#108 A.12 Operations Security A.12.6 Technical Vulnerability Management check42 Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389 -#109 A.12 Operations Security A.12.6 Technical Vulnerability Management check41 Ensure no security groups allow ingress from 0.0.0.0/0 to port 22 -#110 A.12 Operations Security A.12.6 Technical Vulnerability Management extra76 Check for publicly shared AMIs -#111 A.12 Operations Security A.12.6 Technical Vulnerability Management extra72 Ensure EBS snapshots are not publicly accessible -#112 A.12 Operations Security A.12.6 Technical Vulnerability Management extra731 Ensure SNS topics do not allow global send or subscribe -#113 A.12 Operations Security A.12.6 Technical Vulnerability Management extra711 Ensure Redshift clusters do not have a public endpoint -#114 A.12 Operations Security A.12.6 Technical Vulnerability Management extra723 Ensure RDS snapshots are not publicly accessible -#115 A.12 Operations Security A.12.6 Technical Vulnerability Management extra78 Ensure RDS instances are not accessible to the world. -#116 A.12 Operations Security A.12.6 Technical Vulnerability Management check23 Ensure the S3 bucket CloudTrail logs to is not publicly accessible -#117 A.12 Operations Security A.12.6 Technical Vulnerability Management extra713 Check if GuardDuty is enabled -#118 A.12 Operations Security A.12.6 Technical Vulnerability Management extra726 Check Trusted Advisor for errors and warnings -#119 A.12 Operations Security A.12.6 Technical Vulnerability Management extra776 Check if ECR image scan found vulnerabilities in the newest image version -#120 A.13 Communications Security A.13.1 Network Security Management check43 Ensure the default security group of every VPC restricts all traffic -#121 A.13 Communications Security A.13.1 Network Security Management check42 Ensure no security groups allow ingress from 0.0.0.0/0 to port 3389 -#122 A.13 Communications Security A.13.1 Network Security Management check41 Ensure no security groups allow ingress from 0.0.0.0/0 to port 22 -#123 A.13 Communications Security A.13.1 Network Security Management extra72 Ensure EBS snapshots are not publicly accessible -#124 A.13 Communications Security A.13.1 Network Security Management extra731 Ensure SNS topics do not allow global send or subscribe -#125 A.13 Communications Security A.13.1 Network Security Management extra711 Ensure Redshift clusters do not have a public endpoint -#126 A.13 Communications Security A.13.1 Network Security Management extra723 Ensure RDS snapshots are not publicly accessible -#127 A.13 Communications Security A.13.1 Network Security Management extra78 Ensure RDS instances are not accessible to the world. -#128 A.13 Communications Security A.13.1 Network Security Management extra798 Ensure Lambda Functions are not publicly accessible -#129 A.13 Communications Security A.13.1 Network Security Management check44 Ensure routing tables for VPC peering are \"least access\" -#130 A.13 Communications Security A.13.1 Network Security Management extra710 Check for internet facing EC2 Instances -#131 A.13 Communications Security A.13.1 Network Security Management extra711 Check for Publicly Accessible Redshift Clusters -#132 A.13 Communications Security A.13.1 Network Security Management extra748 Ensure no security groups allow ingress from 0.0.0.0/0 or ::/0 to any port -#133 A.13 Communications Security A.13.1 Network Security Management extra7129 Check if Application Load Balancer has a WAF ACL attached -#134 A.13 Communications Security A.13.1 Network Security Management extra74 Ensure there are no Security Groups without ingress filtering being used -#135 A.13 Communications Security A.13.1 Network Security Management extra777 Find VPC security groups with many ingress or egress rules -#136 A.13 Communications Security A.13.1 Network Security Management extra778 Find VPC security groups with wide-open public IPv4 CIDR ranges (non-RFC1918) -#137 A.13 Communications Security A.13.1 Network Security Management extra789 Find trust boundaries in VPC endpoint services connections -#138 A.13 Communications Security A.13.1 Network Security Management extra79 Check for internet facing Elastic Load Balancers -#139 A.13 Communications Security A.13.1 Network Security Management extra790 Find trust boundaries in VPC endpoint services allowlisted principles -#140 A.13 Communications Security A.13.1 Network Security Management extra78 Ensure there are no Public Accessible RDS instances -#141 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra731 Check if SNS topics have policy set as Public -#142 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra741 Find secrets in EC2 User Data -#143 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra75 Ensure there are no Security Groups not being used -#144 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra757 Check EC2 Instances older than 6 months -#145 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra758 Check EC2 Instances older than 12 months -#146 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra759 Find secrets in Lambda functions variables -#147 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra760 Find secrets in Lambda functions code -#148 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra762 Find obsolete Lambda runtimes -#149 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra765 Check if ECR image scan on push is enabled -#150 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra768 Find secrets in ECS task definitions variables -#151 A.14 System acquisition, dev & maintenance A.14.2 Security in Dev & Support extra772 Check if elastic IPs are unused -#152 A.18 Compliance A.18.1 Compliance with Legal and Regulatory Reqs check22 Ensure CloudTrail log file validation is enabled -#153 A.18 Compliance A.18.1 Compliance with Legal and Regulatory Reqs extra721 Check if Redshift cluster has audit logging enabled -#154 A.18 Compliance A.18.1 Compliance with Legal and Regulatory Reqs extra763 Check if S3 buckets have object versioning enabled diff --git a/groups/group19_eks-cis b/groups/group19_eks-cis deleted file mode 100644 index 8c31932b0a5..00000000000 --- a/groups/group19_eks-cis +++ /dev/null @@ -1,15 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (c) by Toni de la Fuente -# -# This Prowler check is licensed under a -# Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. -# -# You should have received a copy of the license along with this -# work. If not, see . - -GROUP_ID[19]='eks-cis' -GROUP_NUMBER[19]='19.0' -GROUP_TITLE[19]='CIS EKS Benchmark - [eks-cis] *********************************' -GROUP_RUN_BY_DEFAULT[19]='N' # run it when execute_all is called -GROUP_CHECKS[19]='extra765,extra794,extra795,extra796,extra797' diff --git a/groups/group1_iam b/groups/group1_iam deleted file mode 100644 index 86da563c6b5..00000000000 --- a/groups/group1_iam +++ /dev/null @@ -1,15 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (c) by Toni de la Fuente -# -# This Prowler check is licensed under a -# Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. -# -# You should have received a copy of the license along with this -# work. If not, see . - -GROUP_ID[1]='group1' -GROUP_NUMBER[1]='1.0' -GROUP_TITLE[1]='Identity and Access Management - CIS only - [group1] ***********' -GROUP_RUN_BY_DEFAULT[1]='Y' # run it when execute_all is called -GROUP_CHECKS[1]='check11,check12,check13,check14,check15,check16,check17,check18,check19,check110,check111,check112,check113,check114,check115,check116,check117,check118,check119,check120,check121,check122' diff --git a/groups/group20_ffiec b/groups/group20_ffiec deleted file mode 100644 index 03b35c6f625..00000000000 --- a/groups/group20_ffiec +++ /dev/null @@ -1,22 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[20]='ffiec' -GROUP_NUMBER[20]='20.0' -GROUP_TITLE[20]='FFIEC Cybersecurity Readiness - ONLY AS REFERENCE - [ffiec] ***' -GROUP_RUN_BY_DEFAULT[20]='N' # run it when execute_all is called -GROUP_CHECKS[20]='check11,check12,check13,check14,check16,check18,check19,check21,check23,check25,check29,check29,check31,check32,check33,check34,check35,check36,check37,check37,check38,check39,check41,check42,check43,check110,check112,check113,check116,check310,check311,check312,check313,check314,extra72,extra76,extra78,extra711,extra723,extra729,extra731,extra734,extra735,extra763,extra792' - -# References: -# 1. https://www.ffiec.gov/pdf/cybersecurity/FFIEC_CAT_May_2017.pdf -# 2. https://ithandbook.ffiec.gov/media/274793/ffiec_itbooklet_informationsecurity.pdf diff --git a/groups/group21_soc2 b/groups/group21_soc2 deleted file mode 100644 index 84f2cac3a7e..00000000000 --- a/groups/group21_soc2 +++ /dev/null @@ -1,23 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[21]='soc2' -GROUP_NUMBER[21]='21.0' -GROUP_TITLE[21]='SOC2 Readiness - ONLY AS REFERENCE - [soc2] *******************' -GROUP_RUN_BY_DEFAULT[21]='N' # run it when execute_all is called -GROUP_CHECKS[21]='check110,check111,check113,check12,check122,check13,check15,check16,check17,check18,check19,check21,check31,check310,check32,check33,check34,check35,check36,check37,check38,check39,check41,check42,check43,extra711,extra72,extra723,extra729,extra731,extra734,extra735,extra739,extra76,extra78,extra792' - -# References: -# 1. https://www.aicpa.org/content/dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/trust-services-criteria.pdf -# 2. https://www.aicpa.org/interestareas/frc/assuranceadvisoryservices/mappingsrelevanttothesocsuiteofservices.html -# 3. https://www.aicpa.org/content/dam/aicpa/interestareas/frc/assuranceadvisoryservices/downloadabledocuments/othermapping/mapping-final-2017-tsc-to-extant-2016-tspc.xlsx diff --git a/groups/group22_sagemaker b/groups/group22_sagemaker deleted file mode 100644 index 7a4d62abe13..00000000000 --- a/groups/group22_sagemaker +++ /dev/null @@ -1,19 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2222) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[22]='sagemaker' -GROUP_NUMBER[22]='22.0' -GROUP_TITLE[22]='Amazon SageMaker related security checks - [sagemaker] ********' -GROUP_RUN_BY_DEFAULT[22]='N' # run it when execute_all is called -GROUP_CHECKS[22]='extra7103,extra7104,extra7111,extra7112,extra7105,extra7106,extra7107,extra7108,extra7109,extra7110' - diff --git a/groups/group23_ens b/groups/group23_ens deleted file mode 100644 index 098ddc61a8e..00000000000 --- a/groups/group23_ens +++ /dev/null @@ -1,83 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[23]='ens' -GROUP_NUMBER[23]='23.0' -GROUP_TITLE[23]='ENS Esquema Nacional de Seguridad security checks - [ens] *****' -GROUP_RUN_BY_DEFAULT[23]='N' # run it when execute_all is called -GROUP_CHECKS[23]='extra733,extra7123,check13,check14,check121,extra7100,check120,check116,extra7124,check12,extra7125,check14,check13,check21,check25,extra7127,check35,check24,check31,check36,check32,check33,check34,check22,extra71,check23,check23,check27,check37,extra736,check28,extra713,check21,check29,extra793,extra792,extra764,extra738,check43,extra74,extra710,extra75,check41,check42,extra749,extra750,extra751,extra752,extra753,extra754,extra755,extra7128,extra729,extra761,extra740,extra735,extra734,extra728,extra781,extra773,extra744,extra7126,extra7129' - -# ENS Control ID for AWS;Prowler checks that apply -# ens-op.acc.1.aws.iam.1;extra733 -# ens-op.acc.1.aws.iam.2;extra7123 -# ens-op.acc.1.aws.iam.3;check13 -# ens-op.acc.1.aws.iam.4;check14 -# ens-op.acc.1.aws.iam.5;check121 -# ens-op.acc.2.aws.iam.1;extra7100 -# ens-op.acc.1.aws.iam.4;check120 -# ens-op.acc.3.aws.iam.1;check116 -# ens-op.acc.4.aws.sys.1;extra7124 -# ens-op.acc.5.aws.iam.1;check12 -# ens-op.acc.5.aws.iam.2;extra7125 -# ens-op.acc.5.aws.iam.3;check14 -# ens-op.acc.5.aws.iam.4;check13 -# ens-op.acc.7.aws.iam.1;check21 -# ens-op.exp.1.aws.cfg.1;check25 -# ens-op.exp.1.aws.sys.1;extra7127 -# ens-op.exp.4.aws.sys.1;extra7127 -# ens-op.exp.8.aws.trail.1;check35 -# ens-op.exp.8.aws.cw.1;check24 -# ens-op.exp.8.aws.trail.2;check31 -# ens-op.exp.8.aws.trail.3;check36 -# ens-op.exp.8.aws.trail.4;check32 -# ens-op.exp.8.aws.trail.5;check33 -# ens-op.exp.8.aws.trail.6;check34 -# ens-op.exp.10.aws.trail.1;check22 -# ens-op.exp.10.aws.trail.2;extra71 -# ens-op.exp.10.aws.trail.3;check23 -# ens-op.exp.10.aws.trail.4;check23 -# ens-op.exp.10.aws.trail.5;check27 -# ens-op.exp.11.aws.kms.1;check37 -# ens-op.exp.11.aws.kms.2;extra736* -# ens-op.exp.11.aws.kms.3;check28 -# ens-op.mon.1.aws.duty.1;extra713 -# ens-op.mon.1.aws.trail.1;check21 -# ens-op.mon.1.aws.flow.1;check29 -# ens-mp.com.2.aws.elb.1;extra793 -# ens-mp.com.2.aws.elb.2;extra792 -# ens-mp.com.2.aws.s3.1;extra764 -# ens-mp.com.2.aws.front.1;extra738 -# ens-mp.com.4.aws.sg.1;check43 -# ens-mp.com.4.aws.sg.2;extra74 -# ens-mp.com.4.aws.vpc.1;extra710 -# ens-mp.com.4.aws.sg.3;extra75 -# ens-mp.com.4.aws.sg.4;check41 -# ens-mp.com.4.aws.sg.5;check42 -# ens-mp.com.4.aws.sg.6;extra749 -# ens-mp.com.4.aws.sg.7;extra750 -# ens-mp.com.4.aws.sg.8;extra751 -# ens-mp.com.4.aws.sg.9;extra752 -# ens-mp.com.4.aws.sg.10;extra753 -# ens-mp.com.4.aws.sg.11;extra754 -# ens-mp.com.4.aws.sg.12;extra755 -# ens-mp.info.3.aws.dyndb.1;extra7128 -# ens-mp.info.3.aws.ebs.1;extra729 -# ens-mp.info.3.aws.ebs.2;extra761 -# ens-mp.info.3.aws.ebs.3;extra740 -# ens-mp.info.3.aws.rds.1;extra735 -# ens-mp.info.3.s3.1;extra734 -# ens-mp.info.3.sns.1;extra728 -# ens-mp.info.3.aws.au.1;extra781 -# ens-mp.s.2.aws.waf.1;extra773 -# ens-mp.s.2.aws.waf.2;extra744 -# ens-mp.s.2.aws.waf.3;extra7129 diff --git a/groups/group24_glue b/groups/group24_glue deleted file mode 100644 index a9b8c31329a..00000000000 --- a/groups/group24_glue +++ /dev/null @@ -1,18 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2020) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[24]='glue' -GROUP_NUMBER[24]='24.0' -GROUP_TITLE[24]='Amazon Glue related security checks - [glue] ******************' -GROUP_RUN_BY_DEFAULT[24]='N' # run it when execute_all is called -GROUP_CHECKS[24]='extra7114,extra7115,extra7116,extra7117,extra7118,extra7119,extra7120,extra7121,extra7122' \ No newline at end of file diff --git a/groups/group25_FTR b/groups/group25_FTR deleted file mode 100644 index 501597a355e..00000000000 --- a/groups/group25_FTR +++ /dev/null @@ -1,46 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[25]='ftr' -GROUP_NUMBER[25]='25.0' -GROUP_TITLE[25]='Amazon FTR related security checks - [ftr] ********************' -GROUP_RUN_BY_DEFAULT[25]='N' # run it when execute_all is called -GROUP_CHECKS[25]='check11,check12,check13,check14,check15,check16,check17,check18,check19,check110,check111,check111,check112,check113,check117,check118,check122,check21,check22,extra759,extra760,extra768,extra775,extra797,extra7141,extra73' - -# Checks from AWS FTR https://apn-checklists.s3.amazonaws.com/foundational/partner-hosted/partner-hosted/CVLHEC5X7.html -# 1.1 [check11] Avoid the use of the root account - iam [High] -# 1.2 [check12] Ensure multi-factor authentication (MFA) is enabled for all IAM users that have a console password - iam [High] -# 1.3 [check13] Ensure credentials unused for 90 days or greater are disabled - iam [Medium] -# 1.4 [check14] Ensure access keys are rotated every 90 days or less - iam [Medium] -# 1.5 [check15] Ensure IAM password policy requires at least one uppercase letter - iam [Medium] -# 1.6 [check16] Ensure IAM password policy require at least one lowercase letter - iam [Medium] -# 1.7 [check17] Ensure IAM password policy require at least one symbol - iam [Medium] -# 1.8 [check18] Ensure IAM password policy require at least one number - iam [Medium] -# 1.9 [check19] Ensure IAM password policy requires minimum length of 14 or greater - iam [Medium] -# 1.10 [check110] Ensure IAM password policy prevents password reuse: 24 or greater - iam [Medium] -# 1.11 [check111] Ensure IAM password policy expires passwords within 90 days or less - iam [Medium] -# 1.12 [check112] Ensure no root account access key exists - iam [Critical] -# 1.13 [check113] Ensure MFA is enabled for the root account - iam [Critical] -# 1.17 [check117] Maintain current contact details - support [Medium] -# 1.18 [check118] Ensure security contact information is registered - support [Medium] -# 1.22 [check122] Ensure IAM policies that allow full "*:*" administrative privileges are not created - iam [Medium] -# 2.1 [check21] Ensure CloudTrail is enabled in all regions - cloudtrail [High] -# 2.2 [check22] Ensure CloudTrail log file validation is enabled - cloudtrail [Medium] -# 7.59 [extra759] Find secrets in Lambda functions variables - lambda [Critical] -# 7.60 [extra760] Find secrets in Lambda functions code - lambda [Critical] -# 7.68 [extra768] Find secrets in ECS task definitions variables - ecs [Critical] -# 7.75 [extra775] Find secrets in EC2 Auto Scaling Launch Configuration - autoscaling [Critical] -# 7.97 [extra797] Ensure Kubernetes Secrets are encrypted using Customer Master Keys (CMKs) - eks [Medium] -# 7.141 [extra7141] Find secrets in SSM Documents - ssm [Critical] -# 7.3 [extra73] Ensure there are no S3 buckets open to Everyone or Any AWS user - s3 [Critical] - diff --git a/groups/group2_logging b/groups/group2_logging deleted file mode 100644 index a9d4db0b3de..00000000000 --- a/groups/group2_logging +++ /dev/null @@ -1,15 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (c) by Toni de la Fuente -# -# This Prowler check is licensed under a -# Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. -# -# You should have received a copy of the license along with this -# work. If not, see . - -GROUP_ID[2]='group2' -GROUP_NUMBER[2]='2.0' -GROUP_TITLE[2]='Logging - CIS only - [group2] **********************************' -GROUP_RUN_BY_DEFAULT[2]='Y' # run it when execute_all is called -GROUP_CHECKS[2]='check21,check22,check23,check24,check25,check26,check27,check28,check29' diff --git a/groups/group3_monitoring b/groups/group3_monitoring deleted file mode 100644 index 058939a1a8a..00000000000 --- a/groups/group3_monitoring +++ /dev/null @@ -1,15 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (c) by Toni de la Fuente -# -# This Prowler check is licensed under a -# Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. -# -# You should have received a copy of the license along with this -# work. If not, see . - -GROUP_ID[3]='group3' -GROUP_NUMBER[3]='3.0' -GROUP_TITLE[3]='Monitoring - CIS only - [group3] *******************************' -GROUP_RUN_BY_DEFAULT[3]='Y' # run it when execute_all is called -GROUP_CHECKS[3]='check31,check32,check33,check34,check35,check36,check37,check38,check39,check310,check311,check312,check313,check314' diff --git a/groups/group4_networking b/groups/group4_networking deleted file mode 100644 index ca1244658a3..00000000000 --- a/groups/group4_networking +++ /dev/null @@ -1,15 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (c) by Toni de la Fuente -# -# This Prowler check is licensed under a -# Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. -# -# You should have received a copy of the license along with this -# work. If not, see . - -GROUP_ID[4]='group4' -GROUP_NUMBER[4]='4.0' -GROUP_TITLE[4]='Networking - CIS only - [group4] *******************************' -GROUP_RUN_BY_DEFAULT[4]='Y' # run it when execute_all is called -GROUP_CHECKS[4]='check41,check42,check43,check44,check45,check46' diff --git a/groups/group5_cislevel1 b/groups/group5_cislevel1 deleted file mode 100644 index 3fe3a084a95..00000000000 --- a/groups/group5_cislevel1 +++ /dev/null @@ -1,15 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (c) by Toni de la Fuente -# -# This Prowler check is licensed under a -# Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. -# -# You should have received a copy of the license along with this -# work. If not, see . - -GROUP_ID[5]='cislevel1' -GROUP_NUMBER[5]='5.0' -GROUP_TITLE[5]='CIS Level 1 - CIS only - [cislevel1] ***************************' -GROUP_RUN_BY_DEFAULT[5]='N' # run it when execute_all is called -GROUP_CHECKS[5]='check11,check12,check13,check14,check15,check16,check17,check18,check19,check110,check111,check112,check113,check115,check116,check117,check118,check119,check120,check122,check21,check23,check24,check25,check26,check31,check32,check33,check34,check35,check38,check312,check313,check314,check41,check42' diff --git a/groups/group6_cislevel2 b/groups/group6_cislevel2 deleted file mode 100644 index 67fdc1e1413..00000000000 --- a/groups/group6_cislevel2 +++ /dev/null @@ -1,15 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (c) by Toni de la Fuente -# -# This Prowler check is licensed under a -# Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. -# -# You should have received a copy of the license along with this -# work. If not, see . - -GROUP_ID[6]='cislevel2' -GROUP_NUMBER[6]='6.0' -GROUP_TITLE[6]='CIS Level 2 - CIS only - [cislevel2] ***************************' -GROUP_RUN_BY_DEFAULT[6]='N' # run it when execute_all is called -GROUP_CHECKS[6]='check11,check12,check13,check14,check15,check16,check17,check18,check19,check110,check111,check112,check113,check114,check115,check116,check117,check118,check119,check120,check121,check122,check21,check22,check23,check24,check25,check26,check27,check28,check29,check31,check32,check33,check34,check35,check36,check37,check38,check39,check310,check311,check312,check313,check314,check41,check42,check43,check44' diff --git a/groups/group7_extras b/groups/group7_extras deleted file mode 100644 index 5f6c1661e11..00000000000 --- a/groups/group7_extras +++ /dev/null @@ -1,25 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[7]='extras' -GROUP_NUMBER[7]='7.0' -GROUP_TITLE[7]='Extras - all non CIS specific checks - [extras] ****************' -GROUP_RUN_BY_DEFAULT[7]='Y' # run it when execute_all is called -GROUP_CHECKS[7]='extra71,extra72,extra73,extra74,extra75,extra76,extra77,extra78,extra79,extra710,extra711,extra712,extra713,extra714,extra715,extra716,extra717,extra718,extra719,extra720,extra721,extra722,extra723,extra724,extra725,extra726,extra727,extra728,extra729,extra730,extra731,extra732,extra733,extra734,extra735,extra736,extra738,extra739,extra740,extra741,extra742,extra743,extra744,extra745,extra746,extra747,extra748,extra749,extra750,extra751,extra752,extra753,extra754,extra755,extra757,extra758,extra761,extra762,extra763,extra764,extra765,extra767,extra768,extra769,extra770,extra771,extra772,extra773,extra774,extra775,extra776,extra777,extra778,extra779,extra780,extra781,extra782,extra783,extra784,extra785,extra786,extra787,extra788,extra791,extra792,extra793,extra794,extra795,extra796,extra797,extra798,extra799,extra7100,extra7101,extra7102,extra7103,extra7104,extra7105,extra7106,extra7107,extra7108,extra7109,extra7110,extra7111,extra7112,extra7113,extra7114,extra7115,extra7116,extra7117,extra7118,extra7119,extra7120,extra7121,extra7122,extra7123,extra7124,extra7125,extra7126,extra7127,extra7128,extra7129,extra7130,extra7131,extra7132,extra7133,extra7134,extra7135,extra7136,extra7137,extra7138,extra7139,extra7140,extra7141,extra7142,extra7143,extra7144,extra7145,extra7146,extra7147,extra7148,extra7149,extra7150,extra7151,extra7152,extra7153,extra7154,extra7155,extra7156,extra7157,extra7158,extra7159,extra7160,extra7161,extra7162,extra7163,extra7164,extra7165,extra7166,extra7167,extra7168,extra7169,extra7170,extra7171,extra7172,extra7173,extra7174,extra7175,extra7176,extra7177,extra7178,extra7179,extra7180' - -# Extras 759 and 760 (lambda variables and code secrets finder are not included) -# to run detect-secrets use `./prowler -g secrets` - -# Extras 789 and 790 VPC trust boundaries are not included by default in Extras -# to run trust-boundaries use `./prowler -g trustboundaries` -# read more in https://github.com/toniblyx/prowler/#trust-boundaries-checks diff --git a/groups/group8_forensics b/groups/group8_forensics deleted file mode 100644 index 3e035c89b38..00000000000 --- a/groups/group8_forensics +++ /dev/null @@ -1,18 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[8]='forensics-ready' -GROUP_NUMBER[8]='8.0' -GROUP_TITLE[8]='Forensics Readiness - [forensics-ready] ************************' -GROUP_RUN_BY_DEFAULT[8]='N' # run it when execute_all is called -GROUP_CHECKS[8]='check21,check22,check23,check24,check25,check26,check27,check29,extra712,extra713,extra714,extra715,extra717,extra718,extra719,extra720,extra721,extra722,extra725,extra7101,extra794' diff --git a/groups/group9_gdpr b/groups/group9_gdpr deleted file mode 100644 index cef487f1f24..00000000000 --- a/groups/group9_gdpr +++ /dev/null @@ -1,24 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[9]='gdpr' -GROUP_NUMBER[9]='9.0' -GROUP_TITLE[9]='GDPR Readiness - ONLY AS REFERENCE - [gdpr] ********************' -GROUP_RUN_BY_DEFAULT[9]='N' # run it when execute_all is called -GROUP_CHECKS[9]='extra718,extra725,extra727,check12,check113,check114,extra71,extra731,extra732,extra733,check25,check39,check21,check22,check23,check24,check26,check27,check35,extra726,extra714,extra715,extra717,extra719,extra720,extra721,extra722,check43,check25,extra714,extra729,extra734,extra735,extra736,extra738,extra740,extra761,check11,check110,check111,check112,check116,check120,check122,check13,check14,check15,check16,check17,check18,check19,check28,check29,check31,check310,check311,check312,check313,check314,check32,check33,check34,check36,check37,check38,check41,check42,extra711,extra72,extra723,extra730,extra739,extra76,extra763,extra778,extra78,extra792,extra798' - -# Resources: -# https://d1.awsstatic.com/whitepapers/compliance/GDPR_Compliance_on_AWS.pdf -# https://www.slideshare.net/AmazonWebServices/sid303-navigating-gdpr-compliance-on-aws -# https://aws.amazon.com/compliance/gdpr-center/ -# https://eur-lex.europa.eu/eli/reg/2016/679/2016-05-04 diff --git a/groups/groupN_sample b/groups/groupN_sample deleted file mode 100644 index ceff97025c5..00000000000 --- a/groups/groupN_sample +++ /dev/null @@ -1,18 +0,0 @@ -#!/usr/bin/env bash - -# Prowler - the handy cloud security tool (copyright 2018) by Toni de la Fuente -# -# Licensed under the Apache License, Version 2.0 (the "License"); you may not -# use this file except in compliance with the License. You may obtain a copy -# of the License at http://www.apache.org/licenses/LICENSE-2.0 -# -# Unless required by applicable law or agreed to in writing, software distributed -# under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR -# CONDITIONS OF ANY KIND, either express or implied. See the License for the -# specific language governing permissions and limitations under the License. - -GROUP_ID[9]='my-custom-group' -GROUP_NUMBER[9]='9.0' -GROUP_TITLE[9]='My Custom Group - [my-custom-group] ****************************' -GROUP_RUN_BY_DEFAULT[9]='N' # run it when execute_all is called -GROUP_CHECKS[9]='checkNN,checkMM' diff --git a/permissions/create_role_to_assume_cfn.yaml b/permissions/create_role_to_assume_cfn.yaml index ee09ad3bf41..c5f3ef962ad 100644 --- a/permissions/create_role_to_assume_cfn.yaml +++ b/permissions/create_role_to_assume_cfn.yaml @@ -7,7 +7,7 @@ AWSTemplateFormatVersion: '2010-09-09' # --stack-name "ProwlerExecRole" \ # --parameters "ParameterKey=AuthorisedARN,ParameterValue=arn:aws:iam::123456789012:root" # -Description: | +Description: | This template creates an AWS IAM Role with an inline policy and two AWS managed policies attached. It sets the trust policy on that IAM Role to permit a named ARN in another AWS account to assume that role. The role name and the ARN of the trusted user can all be passed @@ -48,7 +48,7 @@ Resources: - 'arn:aws:iam::aws:policy/SecurityAudit' - 'arn:aws:iam::aws:policy/job-function/ViewOnlyAccess' RoleName: !Sub ${ProwlerRoleName} - Policies: + Policies: - PolicyName: ProwlerExecRoleAdditionalViewPrivileges PolicyDocument: Version : '2012-10-17' diff --git a/permissions/prowler-additions-policy.json b/permissions/prowler-additions-policy.json index b2f02eab259..e4f8cd096ee 100644 --- a/permissions/prowler-additions-policy.json +++ b/permissions/prowler-additions-policy.json @@ -1,26 +1,26 @@ { - "Version": "2012-10-17", - "Statement": [ - { - "Action": [ - "ds:ListAuthorizedApplications", - "ec2:GetEbsEncryptionByDefault", - "ecr:Describe*", - "elasticfilesystem:DescribeBackupPolicy", - "glue:GetConnections", - "glue:GetSecurityConfiguration", - "glue:SearchTables", - "lambda:GetFunction", - "s3:GetAccountPublicAccessBlock", - "shield:DescribeProtection", - "shield:GetSubscriptionState", - "ssm:GetDocument", - "support:Describe*", - "tag:GetTagKeys" - ], - "Resource": "*", - "Effect": "Allow", - "Sid": "AllowMoreReadForProwler" - } - ] + "Version": "2012-10-17", + "Statement": [ + { + "Action": [ + "ds:ListAuthorizedApplications", + "ec2:GetEbsEncryptionByDefault", + "ecr:Describe*", + "elasticfilesystem:DescribeBackupPolicy", + "glue:GetConnections", + "glue:GetSecurityConfiguration", + "glue:SearchTables", + "lambda:GetFunction", + "s3:GetAccountPublicAccessBlock", + "shield:DescribeProtection", + "shield:GetSubscriptionState", + "ssm:GetDocument", + "support:Describe*", + "tag:GetTagKeys" + ], + "Resource": "*", + "Effect": "Allow", + "Sid": "AllowMoreReadForProwler" + } + ] } diff --git a/permissions/prowler-security-hub.json b/permissions/prowler-security-hub.json index be6048df023..06e4bfc290f 100644 --- a/permissions/prowler-security-hub.json +++ b/permissions/prowler-security-hub.json @@ -1,13 +1,13 @@ { - "Version": "2012-10-17", - "Statement": [ - { - "Action": [ - "securityhub:BatchImportFindings", - "securityhub:GetFindings" - ], - "Effect": "Allow", - "Resource": "*" - } - ] + "Version": "2012-10-17", + "Statement": [ + { + "Action": [ + "securityhub:BatchImportFindings", + "securityhub:GetFindings" + ], + "Effect": "Allow", + "Resource": "*" + } + ] } diff --git a/providers/aws/services/accessanalyzer/accessanalyzer_client.py b/providers/aws/services/accessanalyzer/accessanalyzer_client.py deleted file mode 100644 index 6868b91dbd6..00000000000 --- a/providers/aws/services/accessanalyzer/accessanalyzer_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.accessanalyzer.accessanalyzer_service import AccessAnalyzer - -accessanalyzer_client = AccessAnalyzer(current_audit_info) diff --git a/providers/aws/services/account/account_client.py b/providers/aws/services/account/account_client.py deleted file mode 100644 index 4a92ee4ba88..00000000000 --- a/providers/aws/services/account/account_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.account.account_service import Account - -account_client = Account(current_audit_info) diff --git a/providers/aws/services/acm/acm_client.py b/providers/aws/services/acm/acm_client.py deleted file mode 100644 index 3bd6cf0a8fc..00000000000 --- a/providers/aws/services/acm/acm_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.acm.acm_service import ACM - -acm_client = ACM(current_audit_info) diff --git a/providers/aws/services/apigateway/apigateway_client.py b/providers/aws/services/apigateway/apigateway_client.py deleted file mode 100644 index 9de6b8af1c6..00000000000 --- a/providers/aws/services/apigateway/apigateway_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.apigateway.apigateway_service import APIGateway - -apigateway_client = APIGateway(current_audit_info) diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_client.py b/providers/aws/services/apigatewayv2/apigatewayv2_client.py deleted file mode 100644 index 67a4e528d7f..00000000000 --- a/providers/aws/services/apigatewayv2/apigatewayv2_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.apigatewayv2.apigatewayv2_service import ApiGatewayV2 - -apigatewayv2_client = ApiGatewayV2(current_audit_info) diff --git a/providers/aws/services/appstream/appstream_client.py b/providers/aws/services/appstream/appstream_client.py deleted file mode 100644 index 0506543d364..00000000000 --- a/providers/aws/services/appstream/appstream_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.appstream.appstream_service import AppStream - -appstream_client = AppStream(current_audit_info) diff --git a/providers/aws/services/autoscaling/autoscaling_client.py b/providers/aws/services/autoscaling/autoscaling_client.py deleted file mode 100644 index ea993cd1581..00000000000 --- a/providers/aws/services/autoscaling/autoscaling_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.autoscaling.autoscaling_service import AutoScaling - -autoscaling_client = AutoScaling(current_audit_info) diff --git a/providers/aws/services/awslambda/awslambda_client.py b/providers/aws/services/awslambda/awslambda_client.py deleted file mode 100644 index d8e6c325c8d..00000000000 --- a/providers/aws/services/awslambda/awslambda_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.awslambda.awslambda_service import Lambda - -awslambda_client = Lambda(current_audit_info) diff --git a/providers/aws/services/cloudformation/cloudformation_client.py b/providers/aws/services/cloudformation/cloudformation_client.py deleted file mode 100644 index 7d6de63ae47..00000000000 --- a/providers/aws/services/cloudformation/cloudformation_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.cloudformation.cloudformation_service import CloudFormation - -cloudformation_client = CloudFormation(current_audit_info) diff --git a/providers/aws/services/cloudfront/cloudfront_client.py b/providers/aws/services/cloudfront/cloudfront_client.py deleted file mode 100644 index cba3c58ec17..00000000000 --- a/providers/aws/services/cloudfront/cloudfront_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.cloudfront.cloudfront_service import CloudFront - -cloudfront_client = CloudFront(current_audit_info) diff --git a/providers/aws/services/cloudtrail/cloudtrail_client.py b/providers/aws/services/cloudtrail/cloudtrail_client.py deleted file mode 100644 index c6695748246..00000000000 --- a/providers/aws/services/cloudtrail/cloudtrail_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail - -cloudtrail_client = Cloudtrail(current_audit_info) diff --git a/providers/aws/services/cloudwatch/cloudwatch_client.py b/providers/aws/services/cloudwatch/cloudwatch_client.py deleted file mode 100644 index 3c67ee3d639..00000000000 --- a/providers/aws/services/cloudwatch/cloudwatch_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.cloudwatch.cloudwatch_service import CloudWatch - -cloudwatch_client = CloudWatch(current_audit_info) diff --git a/providers/aws/services/cloudwatch/logs_client.py b/providers/aws/services/cloudwatch/logs_client.py deleted file mode 100644 index f022533ab75..00000000000 --- a/providers/aws/services/cloudwatch/logs_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.cloudwatch.cloudwatch_service import Logs - -logs_client = Logs(current_audit_info) diff --git a/providers/aws/services/codeartifact/codeartifact_client.py b/providers/aws/services/codeartifact/codeartifact_client.py deleted file mode 100644 index 9345f6a62e6..00000000000 --- a/providers/aws/services/codeartifact/codeartifact_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.codeartifact.codeartifact_service import CodeArtifact - -codeartifact_client = CodeArtifact(current_audit_info) diff --git a/providers/aws/services/codebuild/codebuild_client.py b/providers/aws/services/codebuild/codebuild_client.py deleted file mode 100644 index 917d2299162..00000000000 --- a/providers/aws/services/codebuild/codebuild_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.codebuild.codebuild_service import Codebuild - -codebuild_client = Codebuild(current_audit_info) diff --git a/providers/aws/services/config/config_client.py b/providers/aws/services/config/config_client.py deleted file mode 100644 index be7ac5a4081..00000000000 --- a/providers/aws/services/config/config_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.config.config_service import Config - -config_client = Config(current_audit_info) diff --git a/providers/aws/services/directoryservice/directoryservice_client.py b/providers/aws/services/directoryservice/directoryservice_client.py deleted file mode 100644 index cd14c5bb442..00000000000 --- a/providers/aws/services/directoryservice/directoryservice_client.py +++ /dev/null @@ -1,6 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.directoryservice.directoryservice_service import ( - DirectoryService, -) - -directoryservice_client = DirectoryService(current_audit_info) diff --git a/providers/aws/services/dynamodb/dax_client.py b/providers/aws/services/dynamodb/dax_client.py deleted file mode 100644 index 6a1fead9eff..00000000000 --- a/providers/aws/services/dynamodb/dax_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.dynamodb.dynamodb_service import DAX - -dax_client = DAX(current_audit_info) diff --git a/providers/aws/services/dynamodb/dynamodb_client.py b/providers/aws/services/dynamodb/dynamodb_client.py deleted file mode 100644 index 794aef8ede3..00000000000 --- a/providers/aws/services/dynamodb/dynamodb_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.dynamodb.dynamodb_service import DynamoDB - -dynamodb_client = DynamoDB(current_audit_info) diff --git a/providers/aws/services/ec2/ec2_client.py b/providers/aws/services/ec2/ec2_client.py deleted file mode 100644 index f51b1fe1c98..00000000000 --- a/providers/aws/services/ec2/ec2_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.ec2.ec2_service import EC2 - -ec2_client = EC2(current_audit_info) diff --git a/providers/aws/services/ecr/ecr_client.py b/providers/aws/services/ecr/ecr_client.py deleted file mode 100644 index a50598df073..00000000000 --- a/providers/aws/services/ecr/ecr_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.ecr.ecr_service import ECR - -ecr_client = ECR(current_audit_info) diff --git a/providers/aws/services/ecs/ecs_client.py b/providers/aws/services/ecs/ecs_client.py deleted file mode 100644 index dfb611fac45..00000000000 --- a/providers/aws/services/ecs/ecs_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.ecs.ecs_service import ECS - -ecs_client = ECS(current_audit_info) diff --git a/providers/aws/services/efs/efs_client.py b/providers/aws/services/efs/efs_client.py deleted file mode 100644 index f359a49daf4..00000000000 --- a/providers/aws/services/efs/efs_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.efs.efs_service import EFS - -efs_client = EFS(current_audit_info) diff --git a/providers/aws/services/eks/eks_client.py b/providers/aws/services/eks/eks_client.py deleted file mode 100644 index dd01bd35ed8..00000000000 --- a/providers/aws/services/eks/eks_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.eks.eks_service import EKS - -eks_client = EKS(current_audit_info) diff --git a/providers/aws/services/elb/elb_client.py b/providers/aws/services/elb/elb_client.py deleted file mode 100644 index 1e5e4864ac2..00000000000 --- a/providers/aws/services/elb/elb_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.elb.elb_service import ELB - -elb_client = ELB(current_audit_info) diff --git a/providers/aws/services/elbv2/elbv2_client.py b/providers/aws/services/elbv2/elbv2_client.py deleted file mode 100644 index fd544dccf4f..00000000000 --- a/providers/aws/services/elbv2/elbv2_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.elbv2.elbv2_service import ELBv2 - -elbv2_client = ELBv2(current_audit_info) diff --git a/providers/aws/services/emr/emr_client.py b/providers/aws/services/emr/emr_client.py deleted file mode 100644 index 3e5084d8de7..00000000000 --- a/providers/aws/services/emr/emr_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.emr.emr_service import EMR - -emr_client = EMR(current_audit_info) diff --git a/providers/aws/services/glacier/glacier_client.py b/providers/aws/services/glacier/glacier_client.py deleted file mode 100644 index 290069339e0..00000000000 --- a/providers/aws/services/glacier/glacier_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.glacier.glacier_service import Glacier - -glacier_client = Glacier(current_audit_info) diff --git a/providers/aws/services/globalaccelerator/globalaccelerator_client.py b/providers/aws/services/globalaccelerator/globalaccelerator_client.py deleted file mode 100644 index 23a026acd3d..00000000000 --- a/providers/aws/services/globalaccelerator/globalaccelerator_client.py +++ /dev/null @@ -1,6 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.globalaccelerator.globalaccelerator_service import ( - GlobalAccelerator, -) - -globalaccelerator_client = GlobalAccelerator(current_audit_info) diff --git a/providers/aws/services/glue/glue_client.py b/providers/aws/services/glue/glue_client.py deleted file mode 100644 index 56bac88ee79..00000000000 --- a/providers/aws/services/glue/glue_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.glue.glue_service import Glue - -glue_client = Glue(current_audit_info) diff --git a/providers/aws/services/guardduty/guardduty_client.py b/providers/aws/services/guardduty/guardduty_client.py deleted file mode 100644 index fce2711781e..00000000000 --- a/providers/aws/services/guardduty/guardduty_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.guardduty.guardduty_service import GuardDuty - -guardduty_client = GuardDuty(current_audit_info) diff --git a/providers/aws/services/iam/iam_client.py b/providers/aws/services/iam/iam_client.py deleted file mode 100644 index 4deb8012721..00000000000 --- a/providers/aws/services/iam/iam_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.iam.iam_service import IAM - -iam_client = IAM(current_audit_info) diff --git a/providers/aws/services/kms/kms_client.py b/providers/aws/services/kms/kms_client.py deleted file mode 100644 index cf3c08fce6a..00000000000 --- a/providers/aws/services/kms/kms_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.kms.kms_service import KMS - -kms_client = KMS(current_audit_info) diff --git a/providers/aws/services/macie/macie_client.py b/providers/aws/services/macie/macie_client.py deleted file mode 100644 index 68ee1be96a9..00000000000 --- a/providers/aws/services/macie/macie_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.macie.macie_service import Macie - -macie_client = Macie(current_audit_info) diff --git a/providers/aws/services/opensearch/opensearch_client.py b/providers/aws/services/opensearch/opensearch_client.py deleted file mode 100644 index b11bc68509f..00000000000 --- a/providers/aws/services/opensearch/opensearch_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.opensearch.opensearch_service import OpenSearchService - -opensearch_client = OpenSearchService(current_audit_info) diff --git a/providers/aws/services/rds/rds_client.py b/providers/aws/services/rds/rds_client.py deleted file mode 100644 index d8462d27bcd..00000000000 --- a/providers/aws/services/rds/rds_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.rds.rds_service import RDS - -rds_client = RDS(current_audit_info) diff --git a/providers/aws/services/redshift/redshift_client.py b/providers/aws/services/redshift/redshift_client.py deleted file mode 100644 index 6c47121529c..00000000000 --- a/providers/aws/services/redshift/redshift_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.redshift.redshift_service import Redshift - -redshift_client = Redshift(current_audit_info) diff --git a/providers/aws/services/route53/route53_client.py b/providers/aws/services/route53/route53_client.py deleted file mode 100644 index 6f222de5661..00000000000 --- a/providers/aws/services/route53/route53_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.route53.route53_service import Route53 - -route53_client = Route53(current_audit_info) diff --git a/providers/aws/services/route53/route53domains_client.py b/providers/aws/services/route53/route53domains_client.py deleted file mode 100644 index 1aee576f50c..00000000000 --- a/providers/aws/services/route53/route53domains_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.route53.route53_service import Route53Domains - -route53domains_client = Route53Domains(current_audit_info) diff --git a/providers/aws/services/s3/s3_client.py b/providers/aws/services/s3/s3_client.py deleted file mode 100644 index 177def72a44..00000000000 --- a/providers/aws/services/s3/s3_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.s3.s3_service import S3 - -s3_client = S3(current_audit_info) diff --git a/providers/aws/services/s3/s3control_client.py b/providers/aws/services/s3/s3control_client.py deleted file mode 100644 index 6165bb0123e..00000000000 --- a/providers/aws/services/s3/s3control_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.s3.s3_service import S3Control - -s3control_client = S3Control(current_audit_info) diff --git a/providers/aws/services/sagemaker/sagemaker_client.py b/providers/aws/services/sagemaker/sagemaker_client.py deleted file mode 100644 index 395d7b3ff6f..00000000000 --- a/providers/aws/services/sagemaker/sagemaker_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.sagemaker.sagemaker_service import SageMaker - -sagemaker_client = SageMaker(current_audit_info) diff --git a/providers/aws/services/secretsmanager/secretsmanager_client.py b/providers/aws/services/secretsmanager/secretsmanager_client.py deleted file mode 100644 index 76a630d731d..00000000000 --- a/providers/aws/services/secretsmanager/secretsmanager_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.secretsmanager.secretsmanager_service import SecretsManager - -secretsmanager_client = SecretsManager(current_audit_info) diff --git a/providers/aws/services/securityhub/securityhub_client.py b/providers/aws/services/securityhub/securityhub_client.py deleted file mode 100644 index a04f65489d3..00000000000 --- a/providers/aws/services/securityhub/securityhub_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.securityhub.securityhub_service import SecurityHub - -securityhub_client = SecurityHub(current_audit_info) diff --git a/providers/aws/services/shield/shield_client.py b/providers/aws/services/shield/shield_client.py deleted file mode 100644 index c7ad41e5a21..00000000000 --- a/providers/aws/services/shield/shield_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.shield.shield_service import Shield - -shield_client = Shield(current_audit_info) diff --git a/providers/aws/services/sns/sns_client.py b/providers/aws/services/sns/sns_client.py deleted file mode 100644 index d024a6e9916..00000000000 --- a/providers/aws/services/sns/sns_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.sns.sns_service import SNS - -sns_client = SNS(current_audit_info) diff --git a/providers/aws/services/sqs/sqs_client.py b/providers/aws/services/sqs/sqs_client.py deleted file mode 100644 index eb423cd61fe..00000000000 --- a/providers/aws/services/sqs/sqs_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.sqs.sqs_service import SQS - -sqs_client = SQS(current_audit_info) diff --git a/providers/aws/services/ssm/ssm_client.py b/providers/aws/services/ssm/ssm_client.py deleted file mode 100644 index 2b70ee181f2..00000000000 --- a/providers/aws/services/ssm/ssm_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.ssm.ssm_service import SSM - -ssm_client = SSM(current_audit_info) diff --git a/providers/aws/services/trustedadvisor/trustedadvisor_client.py b/providers/aws/services/trustedadvisor/trustedadvisor_client.py deleted file mode 100644 index 1893aed450b..00000000000 --- a/providers/aws/services/trustedadvisor/trustedadvisor_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.trustedadvisor.trustedadvisor_service import TrustedAdvisor - -trustedadvisor_client = TrustedAdvisor(current_audit_info) diff --git a/providers/aws/services/vpc/vpc_client.py b/providers/aws/services/vpc/vpc_client.py deleted file mode 100644 index 124abcc9f94..00000000000 --- a/providers/aws/services/vpc/vpc_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.vpc.vpc_service import VPC - -vpc_client = VPC(current_audit_info) diff --git a/providers/aws/services/waf/waf_client.py b/providers/aws/services/waf/waf_client.py deleted file mode 100644 index 781a15c4c5b..00000000000 --- a/providers/aws/services/waf/waf_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.waf.waf_service import WAF - -waf_client = WAF(current_audit_info) diff --git a/providers/aws/services/wafv2/wafv2_client.py b/providers/aws/services/wafv2/wafv2_client.py deleted file mode 100644 index ecad1a3f7bf..00000000000 --- a/providers/aws/services/wafv2/wafv2_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.wafv2.wafv2_service import WAFv2 - -wafv2_client = WAFv2(current_audit_info) diff --git a/providers/aws/services/workspaces/workspaces_client.py b/providers/aws/services/workspaces/workspaces_client.py deleted file mode 100644 index 530d8dabd23..00000000000 --- a/providers/aws/services/workspaces/workspaces_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.workspaces.workspaces_service import WorkSpaces - -workspaces_client = WorkSpaces(current_audit_info) diff --git a/providers/azure/lib/audit_info/audit_info.py b/providers/azure/lib/audit_info/audit_info.py deleted file mode 100644 index 529f7b154f9..00000000000 --- a/providers/azure/lib/audit_info/audit_info.py +++ /dev/null @@ -1,3 +0,0 @@ -from providers.azure.lib.audit_info.models import Azure_Audit_Info, Azure_Identity_Info - -azure_audit_info = Azure_Audit_Info(credentials=None, identity=Azure_Identity_Info()) diff --git a/providers/azure/services/defender/defender_client.py b/providers/azure/services/defender/defender_client.py deleted file mode 100644 index 54e53797b6b..00000000000 --- a/providers/azure/services/defender/defender_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.azure.lib.audit_info.audit_info import azure_audit_info -from providers.azure.services.defender.defender_service import Defender - -defender_client = Defender(azure_audit_info) diff --git a/providers/azure/services/iam/iam_client.py b/providers/azure/services/iam/iam_client.py deleted file mode 100644 index 82d42e4b31e..00000000000 --- a/providers/azure/services/iam/iam_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.azure.lib.audit_info.audit_info import azure_audit_info -from providers.azure.services.iam.iam_service import IAM - -iam_client = IAM(azure_audit_info) diff --git a/providers/azure/services/storage/storage_client.py b/providers/azure/services/storage/storage_client.py deleted file mode 100644 index 22e6ef1ef27..00000000000 --- a/providers/azure/services/storage/storage_client.py +++ /dev/null @@ -1,4 +0,0 @@ -from providers.azure.lib.audit_info.audit_info import azure_audit_info -from providers.azure.services.storage.storage_service import Storage - -storage_client = Storage(azure_audit_info) diff --git a/prowler.py b/prowler.py new file mode 100755 index 00000000000..0decd5797ce --- /dev/null +++ b/prowler.py @@ -0,0 +1,8 @@ +#!/usr/bin/env python3 + +import sys + +from prowler.__main__ import prowler + +if __name__ == "__main__": + sys.exit(prowler()) diff --git a/config/__init__.py b/prowler/__init__.py similarity index 100% rename from config/__init__.py rename to prowler/__init__.py diff --git a/prowler b/prowler/__main__.py old mode 100755 new mode 100644 similarity index 94% rename from prowler rename to prowler/__main__.py index 50e04f083ca..e2c8e6f677f --- a/prowler +++ b/prowler/__main__.py @@ -6,13 +6,13 @@ from os import mkdir from os.path import isdir -from config.config import ( +from prowler.config.config import ( change_config_var, default_output_directory, output_file_timestamp, ) -from lib.banner import print_banner, print_version -from lib.check.check import ( +from prowler.lib.banner import print_banner, print_version +from prowler.lib.check.check import ( bulk_load_checks_metadata, bulk_load_compliance_frameworks, exclude_checks_to_run, @@ -27,25 +27,26 @@ print_services, set_output_options, ) -from lib.check.checks_loader import load_checks_to_execute -from lib.check.compliance import update_checks_metadata_with_compliance -from lib.logger import logger, set_logging_config -from lib.outputs.outputs import ( +from prowler.lib.check.checks_loader import load_checks_to_execute +from prowler.lib.check.compliance import update_checks_metadata_with_compliance +from prowler.lib.logger import logger, set_logging_config +from prowler.lib.outputs.outputs import ( add_html_footer, close_json, display_compliance_table, display_summary_table, send_to_s3_bucket, ) -from providers.aws.aws_provider import aws_provider_set_session -from providers.aws.lib.allowlist.allowlist import parse_allowlist_file -from providers.aws.lib.quick_inventory.quick_inventory import quick_inventory -from providers.aws.lib.security_hub.security_hub import ( +from prowler.providers.aws.aws_provider import aws_provider_set_session +from prowler.providers.aws.lib.allowlist.allowlist import parse_allowlist_file +from prowler.providers.aws.lib.quick_inventory.quick_inventory import quick_inventory +from prowler.providers.aws.lib.security_hub.security_hub import ( resolve_security_hub_previous_findings, ) -from providers.azure.azure_provider import azure_provider_set_session +from prowler.providers.azure.azure_provider import azure_provider_set_session -if __name__ == "__main__": + +def prowler(): # CLI Arguments parser = argparse.ArgumentParser() parser.add_argument( @@ -238,7 +239,7 @@ "--allowlist-file", nargs="?", default=None, - help="Path for allowlist yaml file, supports local file, S3 URI or DynamoDB ARN. See example yaml in 'providers/allowlist.yaml' for reference and format.", + help="Path for allowlist yaml file. See example prowler/config/allowlist.yaml for reference and format. It also accepts AWS DynamoDB Table ARN or S3 URI, see more in https://docs.prowler.cloud/en/latest/tutorials/allowlist/", ) parser.add_argument( "--verbose", @@ -517,3 +518,7 @@ audit_output_options.output_filename, audit_output_options.output_directory, ) + + +if __name__ == "__main__": + prowler() diff --git a/lib/__init__.py b/prowler/compliance/aws/__init__.py similarity index 100% rename from lib/__init__.py rename to prowler/compliance/aws/__init__.py diff --git a/compliance/aws/cis_1.4_aws.json b/prowler/compliance/aws/cis_1.4_aws.json similarity index 100% rename from compliance/aws/cis_1.4_aws.json rename to prowler/compliance/aws/cis_1.4_aws.json diff --git a/compliance/aws/cis_1.5_aws.json b/prowler/compliance/aws/cis_1.5_aws.json similarity index 100% rename from compliance/aws/cis_1.5_aws.json rename to prowler/compliance/aws/cis_1.5_aws.json diff --git a/compliance/aws/ens_rd2022_aws.json b/prowler/compliance/aws/ens_rd2022_aws.json similarity index 100% rename from compliance/aws/ens_rd2022_aws.json rename to prowler/compliance/aws/ens_rd2022_aws.json diff --git a/lib/check/__init__.py b/prowler/compliance/azure/__init__.py similarity index 100% rename from lib/check/__init__.py rename to prowler/compliance/azure/__init__.py diff --git a/lib/outputs/__init__.py b/prowler/config/__init__.py similarity index 100% rename from lib/outputs/__init__.py rename to prowler/config/__init__.py diff --git a/providers/aws/allowlist.yaml b/prowler/config/allowlist.yaml similarity index 100% rename from providers/aws/allowlist.yaml rename to prowler/config/allowlist.yaml diff --git a/config/config.py b/prowler/config/config.py similarity index 86% rename from config/config.py rename to prowler/config/config.py index 02a8e57c9d2..1b3db223e1d 100644 --- a/config/config.py +++ b/prowler/config/config.py @@ -3,7 +3,7 @@ import yaml -from lib.logger import logger +from prowler.lib.logger import logger timestamp = datetime.today() timestamp_utc = datetime.now(timezone.utc).replace(tzinfo=timezone.utc) @@ -20,17 +20,17 @@ compliance_specification_dir = "./compliance" # AWS services-regions matrix json -aws_services_json_file = "providers/aws/aws_regions_by_service.json" +aws_services_json_file = "aws_regions_by_service.json" default_output_directory = getcwd() + "/output" output_file_timestamp = timestamp.strftime("%Y%m%d%H%M%S") -timestamp_iso = timestamp.isoformat() +timestamp_iso = timestamp.isoformat(sep=" ", timespec="seconds") csv_file_suffix = ".csv" json_file_suffix = ".json" json_asff_file_suffix = ".asff.json" html_file_suffix = ".html" -config_yaml = "providers/aws/config.yaml" +config_yaml = "prowler/config/config.yaml" def change_config_var(variable, value): diff --git a/providers/aws/config.yaml b/prowler/config/config.yaml similarity index 100% rename from providers/aws/config.yaml rename to prowler/config/config.yaml diff --git a/lib/utils/__init__.py b/prowler/lib/__init__.py similarity index 100% rename from lib/utils/__init__.py rename to prowler/lib/__init__.py diff --git a/lib/banner.py b/prowler/lib/banner.py similarity index 90% rename from lib/banner.py rename to prowler/lib/banner.py index 78535d85cda..d6cfec88779 100644 --- a/lib/banner.py +++ b/prowler/lib/banner.py @@ -1,6 +1,6 @@ from colorama import Fore, Style -from config.config import banner_color, orange_color, prowler_version, timestamp +from prowler.config.config import banner_color, orange_color, prowler_version, timestamp def print_version(): diff --git a/providers/aws/__init__.py b/prowler/lib/check/__init__.py similarity index 100% rename from providers/aws/__init__.py rename to prowler/lib/check/__init__.py diff --git a/lib/check/check.py b/prowler/lib/check/check.py similarity index 75% rename from lib/check/check.py rename to prowler/lib/check/check.py index 43819606b66..8369dd6db55 100644 --- a/lib/check/check.py +++ b/prowler/lib/check/check.py @@ -8,13 +8,13 @@ from alive_progress import alive_bar from colorama import Fore, Style -from config.config import compliance_specification_dir, orange_color -from lib.check.compliance_models import load_compliance_framework -from lib.check.models import Check, Output_From_Options, load_check_metadata -from lib.logger import logger -from lib.outputs.outputs import report -from lib.utils.utils import open_file, parse_json_file -from providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.config.config import orange_color +from prowler.lib.check.compliance_models import load_compliance_framework +from prowler.lib.check.models import Check, Output_From_Options, load_check_metadata +from prowler.lib.logger import logger +from prowler.lib.outputs.outputs import report +from prowler.lib.utils.utils import open_file, parse_json_file +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info # Load all checks metadata @@ -22,11 +22,12 @@ def bulk_load_checks_metadata(provider: str) -> dict: bulk_check_metadata = {} checks = recover_checks_from_provider(provider) # Build list of check's metadata files - for check_name in checks: + for check_info in checks: # Build check path name - check_path_name = check_name.replace(".", "/") + check_name = check_info[0] + check_path = check_info[1] # Append metadata file extension - metadata_file = f"{check_path_name}.metadata.json" + metadata_file = f"{check_path}/{check_name}.metadata.json" # Load metadata check_metadata = load_check_metadata(metadata_file) bulk_check_metadata[check_metadata.CheckID] = check_metadata @@ -37,22 +38,31 @@ def bulk_load_checks_metadata(provider: str) -> dict: # Bulk load all compliance frameworks specification def bulk_load_compliance_frameworks(provider: str) -> dict: """Bulk load all compliance frameworks specification into a dict""" - bulk_compliance_frameworks = {} - compliance_specification_dir_path = f"{compliance_specification_dir}/{provider}" try: - for filename in os.listdir(compliance_specification_dir_path): - file_path = os.path.join(compliance_specification_dir_path, filename) - # Check if it is a file - if os.path.isfile(file_path): - # Open Compliance file in JSON - # cis_v1.4_aws.json --> cis_v1.4_aws - compliance_framework_name = filename.split(".json")[0] - # Store the compliance info - bulk_compliance_frameworks[ - compliance_framework_name - ] = load_compliance_framework(file_path) + bulk_compliance_frameworks = {} + available_compliance_framework_modules = list_compliance_modules() + for compliance_framework in available_compliance_framework_modules: + if provider in compliance_framework.name: + compliance_specification_dir_path = ( + f"{compliance_framework.module_finder.path}/{provider}" + ) + + # for compliance_framework in available_compliance_framework_modules: + for filename in os.listdir(compliance_specification_dir_path): + file_path = os.path.join( + compliance_specification_dir_path, filename + ) + # Check if it is a file and ti size is greater than 0 + if os.path.isfile(file_path) and os.stat(file_path).st_size > 0: + # Open Compliance file in JSON + # cis_v1.4_aws.json --> cis_v1.4_aws + compliance_framework_name = filename.split(".json")[0] + # Store the compliance info + bulk_compliance_frameworks[ + compliance_framework_name + ] = load_compliance_framework(file_path) except Exception as e: - logger.error(f"{e.__class__.__name__} -- {e}") + logger.error(f"{e.__class__.__name__}[{e.__traceback__.tb_lineno}] -- {e}") return bulk_compliance_frameworks @@ -77,7 +87,7 @@ def exclude_services_to_run( for check_module in modules: # Recover check name and module name from import path # Format: "providers.{provider}.services.{service}.{check_name}.{check_name}" - check_name = check_module.split(".")[-1] + check_name = check_module[0].split(".")[-1] # Exclude checks from the input services checks_to_execute.discard(check_name) return checks_to_execute @@ -100,7 +110,7 @@ def list_services(provider: str) -> set(): checks = recover_checks_from_provider(provider) for check_name in checks: # Format: "providers.{provider}.services.{service}.{check_name}.{check_name}" - service_name = check_name.split(".")[3] + service_name = check_name[0].split(".")[3] available_services.add(service_name) return sorted(available_services) @@ -209,30 +219,51 @@ def parse_checks_from_compliance_framework( return checks_to_execute -# Recover all checks from the selected provider and service -def recover_checks_from_provider(provider: str, service: str = None) -> list: +def recover_checks_from_provider(provider: str, service: str = None) -> list[tuple]: + """ + Recover all checks from the selected provider and service + + Returns a list of tuples with the following format (check_name, check_path) + """ try: checks = [] modules = list_modules(provider, service) for module_name in modules: - # Format: "providers.{provider}.services.{service}.{check_name}.{check_name}" - check_name = module_name.name + # Format: "prowler.providers.{provider}.services.{service}.{check_name}.{check_name}" + check_module_name = module_name.name # We need to exclude common shared libraries in services if ( - check_name.count(".") == 5 - and "lib" not in check_name - and "test" not in check_name + check_module_name.count(".") == 6 + and "lib" not in check_module_name + and "test" not in check_module_name ): - checks.append(check_name) + check_path = module_name.module_finder.path + # Check name is the last part of the check_module_name + check_name = check_module_name.split(".")[-1] + check_info = (check_name, check_path) + checks.append(check_info) return checks except Exception as e: logger.critical(f"{e.__class__.__name__}[{e.__traceback__.tb_lineno}]: {e}") sys.exit() +def list_compliance_modules(): + """ + list_compliance_modules returns the available compliance frameworks and returns their path + """ + # This module path requires the full path includig "prowler." + module_path = "prowler.compliance" + return walk_packages( + importlib.import_module(module_path).__path__, + importlib.import_module(module_path).__name__ + ".", + ) + + # List all available modules in the selected provider and service def list_modules(provider: str, service: str): - module_path = f"providers.{provider}.services" + # This module path requires the full path includig "prowler." + module_path = f"prowler.providers.{provider}.services" if service: module_path += f".{service}" return walk_packages( @@ -316,9 +347,7 @@ def execute_checks( bar.title = f"-> Scanning {orange_color}{service}{Style.RESET_ALL} service" try: # Import check module - check_module_path = ( - f"providers.{provider}.services.{service}.{check_name}.{check_name}" - ) + check_module_path = f"prowler.providers.{provider}.services.{service}.{check_name}.{check_name}" lib = import_check(check_module_path) # Recover functions from check check_to_execute = getattr(lib, check_name) diff --git a/lib/check/checks_loader.py b/prowler/lib/check/checks_loader.py similarity index 93% rename from lib/check/checks_loader.py rename to prowler/lib/check/checks_loader.py index 310ec0a22f9..2e71daeaf4c 100644 --- a/lib/check/checks_loader.py +++ b/prowler/lib/check/checks_loader.py @@ -1,9 +1,9 @@ -from lib.check.check import ( +from prowler.lib.check.check import ( parse_checks_from_compliance_framework, parse_checks_from_file, recover_checks_from_provider, ) -from lib.logger import logger +from prowler.lib.logger import logger # Generate the list of checks to execute @@ -52,7 +52,7 @@ def load_checks_to_execute( for check_module in modules: # Recover check name and module name from import path # Format: "providers.{provider}.services.{service}.{check_name}.{check_name}" - check_name = check_module.split(".")[-1] + check_name = check_module[0].split(".")[-1] # If the service is present in the group list passed as parameters # if service_name in group_list: checks_to_execute.add(check_name) checks_to_execute.add(check_name) @@ -82,10 +82,10 @@ def load_checks_to_execute( except Exception as e: logger.error(f"{e.__class__.__name__}[{e.__traceback__.tb_lineno}] -- {e}") else: - for check_name in checks: + for check_info in checks: # Recover check name from import path (last part) # Format: "providers.{provider}.services.{service}.{check_name}.{check_name}" - check_name = check_name.split(".")[-1] + check_name = check_info[0] checks_to_execute.add(check_name) return checks_to_execute diff --git a/lib/check/compliance.py b/prowler/lib/check/compliance.py similarity index 93% rename from lib/check/compliance.py rename to prowler/lib/check/compliance.py index 1ac5461112c..95e0aa8abb8 100644 --- a/lib/check/compliance.py +++ b/prowler/lib/check/compliance.py @@ -1,7 +1,10 @@ import sys -from lib.check.compliance_models import Compliance_Base_Model, Compliance_Requirement -from lib.logger import logger +from prowler.lib.check.compliance_models import ( + Compliance_Base_Model, + Compliance_Requirement, +) +from prowler.lib.logger import logger def update_checks_metadata_with_compliance( diff --git a/lib/check/compliance_models.py b/prowler/lib/check/compliance_models.py similarity index 98% rename from lib/check/compliance_models.py rename to prowler/lib/check/compliance_models.py index f019cb15cda..bd49dcfee45 100644 --- a/lib/check/compliance_models.py +++ b/prowler/lib/check/compliance_models.py @@ -4,7 +4,7 @@ from pydantic import BaseModel, ValidationError -from lib.logger import logger +from prowler.lib.logger import logger # ENS - Esquema Nacional de Seguridad - España diff --git a/lib/check/models.py b/prowler/lib/check/models.py similarity index 94% rename from lib/check/models.py rename to prowler/lib/check/models.py index 10d26dc14c8..de8341ec47b 100644 --- a/lib/check/models.py +++ b/prowler/lib/check/models.py @@ -1,10 +1,11 @@ +import os import sys from abc import ABC, abstractmethod from dataclasses import dataclass from pydantic import BaseModel, ValidationError -from lib.logger import logger +from prowler.lib.logger import logger @dataclass @@ -76,8 +77,9 @@ class Check(ABC, Check_Metadata_Model): def __init__(self, **data): """Check's init function. Calls the CheckMetadataModel init.""" # Parse the Check's metadata file - check_path_name = self.__class__.__module__.replace(".", "/") - metadata_file = f"{check_path_name}.metadata.json" + metadata_file = os.path.abspath(sys.modules[self.__module__].__file__).replace( + ".py", ".metadata.json" + ) # Store it to validate them with Pydantic data = Check_Metadata_Model.parse_file(metadata_file).dict() # Calls parents init function diff --git a/lib/logger.py b/prowler/lib/logger.py similarity index 100% rename from lib/logger.py rename to prowler/lib/logger.py diff --git a/providers/aws/lib/__init__.py b/prowler/lib/outputs/__init__.py similarity index 100% rename from providers/aws/lib/__init__.py rename to prowler/lib/outputs/__init__.py diff --git a/lib/outputs/models.py b/prowler/lib/outputs/models.py similarity index 98% rename from lib/outputs/models.py rename to prowler/lib/outputs/models.py index b75896c7c64..a20c24fa9b4 100644 --- a/lib/outputs/models.py +++ b/prowler/lib/outputs/models.py @@ -3,9 +3,9 @@ from pydantic import BaseModel -from config.config import timestamp -from lib.check.models import Check_Report, Remediation -from providers.aws.lib.audit_info.models import AWS_Organizations_Info +from prowler.config.config import timestamp +from prowler.lib.check.models import Check_Report, Remediation +from prowler.providers.aws.lib.audit_info.models import AWS_Organizations_Info @dataclass diff --git a/lib/outputs/outputs.py b/prowler/lib/outputs/outputs.py similarity index 99% rename from lib/outputs/outputs.py rename to prowler/lib/outputs/outputs.py index 0171ded6919..a3b06a5c526 100644 --- a/lib/outputs/outputs.py +++ b/prowler/lib/outputs/outputs.py @@ -8,7 +8,7 @@ from colorama import Fore, Style from tabulate import tabulate -from config.config import ( +from prowler.config.config import ( csv_file_suffix, html_file_suffix, html_logo_img, @@ -21,9 +21,9 @@ timestamp_iso, timestamp_utc, ) -from lib.check.models import Output_From_Options -from lib.logger import logger -from lib.outputs.models import ( +from prowler.lib.check.models import Output_From_Options +from prowler.lib.logger import logger +from prowler.lib.outputs.models import ( Check_Output_CSV, Check_Output_CSV_CIS, Check_Output_CSV_ENS_RD2022, @@ -34,10 +34,10 @@ Resource, Severity, ) -from lib.utils.utils import file_exists, hash_sha512, open_file -from providers.aws.lib.allowlist.allowlist import is_allowlisted -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.lib.security_hub.security_hub import send_to_security_hub +from prowler.lib.utils.utils import file_exists, hash_sha512, open_file +from prowler.providers.aws.lib.allowlist.allowlist import is_allowlisted +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.lib.security_hub.security_hub import send_to_security_hub def report(check_findings, output_options, audit_info): diff --git a/providers/aws/lib/allowlist/__init__.py b/prowler/lib/utils/__init__.py similarity index 100% rename from providers/aws/lib/allowlist/__init__.py rename to prowler/lib/utils/__init__.py diff --git a/lib/utils/utils.py b/prowler/lib/utils/utils.py similarity index 96% rename from lib/utils/utils.py rename to prowler/lib/utils/utils.py index 5646000c163..65fa9cde5dc 100644 --- a/lib/utils/utils.py +++ b/prowler/lib/utils/utils.py @@ -5,7 +5,7 @@ from os.path import exists from typing import Any -from lib.logger import logger +from prowler.lib.logger import logger def open_file(input_file: str, mode: str = "r") -> TextIOWrapper: diff --git a/providers/aws/lib/arn/__init__.py b/prowler/providers/aws/__init__.py similarity index 100% rename from providers/aws/lib/arn/__init__.py rename to prowler/providers/aws/__init__.py diff --git a/providers/aws/aws_provider.py b/prowler/providers/aws/aws_provider.py similarity index 96% rename from providers/aws/aws_provider.py rename to prowler/providers/aws/aws_provider.py index f0993d43ce6..c0a98de2793 100644 --- a/providers/aws/aws_provider.py +++ b/prowler/providers/aws/aws_provider.py @@ -1,3 +1,4 @@ +import os import sys from arnparse import arnparse @@ -6,12 +7,12 @@ from botocore.session import get_session from colorama import Fore, Style -from config.config import aws_services_json_file -from lib.logger import logger -from lib.utils.utils import open_file, parse_json_file -from providers.aws.lib.arn.arn import arn_parsing -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.lib.audit_info.models import ( +from prowler.config.config import aws_services_json_file +from prowler.lib.logger import logger +from prowler.lib.utils.utils import open_file, parse_json_file +from prowler.providers.aws.lib.arn.arn import arn_parsing +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.lib.audit_info.models import ( AWS_Audit_Info, AWS_Credentials, AWS_Organizations_Info, @@ -288,7 +289,8 @@ def get_organizations_metadata( def generate_regional_clients(service: str, audit_info: AWS_Audit_Info) -> dict: regional_clients = {} # Get json locally - f = open_file(aws_services_json_file) + actual_directory = os.path.dirname(os.path.realpath(__file__)) + f = open_file(f"{actual_directory}/{aws_services_json_file}") data = parse_json_file(f) # Check if it is a subservice if service == "accessanalyzer": @@ -331,7 +333,6 @@ def generate_regional_clients(service: str, audit_info: AWS_Audit_Info) -> dict: regional_client = audit_info.audit_session.client(service, region_name=region) regional_client.region = region regional_clients[region] = regional_client - # regional_clients.append(regional_client) return regional_clients diff --git a/providers/aws/aws_regions_by_service.json b/prowler/providers/aws/aws_regions_by_service.json similarity index 99% rename from providers/aws/aws_regions_by_service.json rename to prowler/providers/aws/aws_regions_by_service.json index 58f4f93307f..d1145c2b2f3 100644 --- a/providers/aws/aws_regions_by_service.json +++ b/prowler/providers/aws/aws_regions_by_service.json @@ -5916,4 +5916,4 @@ } } } -} \ No newline at end of file +} diff --git a/providers/aws/lib/quick_inventory/__init__.py b/prowler/providers/aws/lib/__init__.py similarity index 100% rename from providers/aws/lib/quick_inventory/__init__.py rename to prowler/providers/aws/lib/__init__.py diff --git a/providers/aws/lib/security_hub/__init__.py b/prowler/providers/aws/lib/allowlist/__init__.py similarity index 100% rename from providers/aws/lib/security_hub/__init__.py rename to prowler/providers/aws/lib/allowlist/__init__.py diff --git a/providers/aws/lib/allowlist/allowlist.py b/prowler/providers/aws/lib/allowlist/allowlist.py similarity index 65% rename from providers/aws/lib/allowlist/allowlist.py rename to prowler/providers/aws/lib/allowlist/allowlist.py index 88722c26928..8fed1c5e378 100644 --- a/providers/aws/lib/allowlist/allowlist.py +++ b/prowler/providers/aws/lib/allowlist/allowlist.py @@ -4,7 +4,7 @@ import yaml from boto3.dynamodb.conditions import Attr -from lib.logger import logger +from prowler.lib.logger import logger def parse_allowlist_file(audit_info, allowlist_file): @@ -78,39 +78,53 @@ def is_allowlisted(allowlist, audited_account, check, region, resource): return True return False except Exception as error: - logger.critical(f"{error.__class__.__name__} -- {error}") + logger.critical( + f"{error.__class__.__name__} -- {error}[{error.__traceback__.tb_lineno}]" + ) sys.exit() def is_allowlisted_in_check(allowlist, audited_account, check, region, resource): - # If there is a *, it affects to all checks - if "*" in allowlist["Accounts"][audited_account]["Checks"]: - check = "*" - if is_allowlisted_in_region( - allowlist, audited_account, check, region, resource - ): - return True - # Check if there is the specific check - if check in allowlist["Accounts"][audited_account]["Checks"]: - if is_allowlisted_in_region( - allowlist, audited_account, check, region, resource - ): - return True - return False + try: + # If there is a *, it affects to all checks + if "*" in allowlist["Accounts"][audited_account]["Checks"]: + check = "*" + if is_allowlisted_in_region( + allowlist, audited_account, check, region, resource + ): + return True + # Check if there is the specific check + if check in allowlist["Accounts"][audited_account]["Checks"]: + if is_allowlisted_in_region( + allowlist, audited_account, check, region, resource + ): + return True + return False + except Exception as error: + logger.critical( + f"{error.__class__.__name__} -- {error}[{error.__traceback__.tb_lineno}]" + ) + sys.exit() def is_allowlisted_in_region(allowlist, audited_account, check, region, resource): - # If there is a *, it affects to all regions - if "*" in allowlist["Accounts"][audited_account]["Checks"][check]["Regions"]: - for elem in allowlist["Accounts"][audited_account]["Checks"][check][ - "Resources" - ]: - if re.search(elem, resource): - return True - # Check if there is the specific region - if region in allowlist["Accounts"][audited_account]["Checks"][check]["Regions"]: - for elem in allowlist["Accounts"][audited_account]["Checks"][check][ - "Resources" - ]: - if re.search(elem, resource): - return True + try: + # If there is a *, it affects to all regions + if "*" in allowlist["Accounts"][audited_account]["Checks"][check]["Regions"]: + for elem in allowlist["Accounts"][audited_account]["Checks"][check][ + "Resources" + ]: + if re.search(re.escape(elem), resource): + return True + # Check if there is the specific region + if region in allowlist["Accounts"][audited_account]["Checks"][check]["Regions"]: + for elem in allowlist["Accounts"][audited_account]["Checks"][check][ + "Resources" + ]: + if re.search(elem, resource): + return True + except Exception as error: + logger.critical( + f"{error.__class__.__name__} -- {error}[{error.__traceback__.tb_lineno}]" + ) + sys.exit() diff --git a/providers/aws/services/__init__.py b/prowler/providers/aws/lib/arn/__init__.py similarity index 100% rename from providers/aws/services/__init__.py rename to prowler/providers/aws/lib/arn/__init__.py diff --git a/providers/aws/lib/arn/arn.py b/prowler/providers/aws/lib/arn/arn.py similarity index 96% rename from providers/aws/lib/arn/arn.py rename to prowler/providers/aws/lib/arn/arn.py index 05e0cbcfe2c..5d96b1dd4e5 100644 --- a/providers/aws/lib/arn/arn.py +++ b/prowler/providers/aws/lib/arn/arn.py @@ -1,6 +1,6 @@ from arnparse import arnparse -from providers.aws.lib.arn.error import ( +from prowler.providers.aws.lib.arn.error import ( RoleArnParsingEmptyResource, RoleArnParsingFailedMissingFields, RoleArnParsingIAMRegionNotEmpty, diff --git a/providers/aws/lib/arn/error.py b/prowler/providers/aws/lib/arn/error.py similarity index 100% rename from providers/aws/lib/arn/error.py rename to prowler/providers/aws/lib/arn/error.py diff --git a/providers/aws/lib/audit_info/audit_info.py b/prowler/providers/aws/lib/audit_info/audit_info.py similarity index 86% rename from providers/aws/lib/audit_info/audit_info.py rename to prowler/providers/aws/lib/audit_info/audit_info.py index 5f1efdc0337..1da6ab7b423 100644 --- a/providers/aws/lib/audit_info/audit_info.py +++ b/prowler/providers/aws/lib/audit_info/audit_info.py @@ -1,6 +1,6 @@ from boto3 import session -from providers.aws.lib.audit_info.models import AWS_Assume_Role, AWS_Audit_Info +from prowler.providers.aws.lib.audit_info.models import AWS_Assume_Role, AWS_Audit_Info # Default Current Audit Info current_audit_info = AWS_Audit_Info( diff --git a/providers/aws/lib/audit_info/models.py b/prowler/providers/aws/lib/audit_info/models.py similarity index 100% rename from providers/aws/lib/audit_info/models.py rename to prowler/providers/aws/lib/audit_info/models.py diff --git a/providers/aws/services/accessanalyzer/__init__.py b/prowler/providers/aws/lib/quick_inventory/__init__.py similarity index 100% rename from providers/aws/services/accessanalyzer/__init__.py rename to prowler/providers/aws/lib/quick_inventory/__init__.py diff --git a/providers/aws/lib/quick_inventory/quick_inventory.py b/prowler/providers/aws/lib/quick_inventory/quick_inventory.py similarity index 98% rename from providers/aws/lib/quick_inventory/quick_inventory.py rename to prowler/providers/aws/lib/quick_inventory/quick_inventory.py index abfbd0c7641..e29a718c551 100644 --- a/providers/aws/lib/quick_inventory/quick_inventory.py +++ b/prowler/providers/aws/lib/quick_inventory/quick_inventory.py @@ -5,14 +5,14 @@ from colorama import Fore, Style from tabulate import tabulate -from config.config import ( +from prowler.config.config import ( csv_file_suffix, json_file_suffix, orange_color, output_file_timestamp, ) -from lib.logger import logger -from providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.lib.logger import logger +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info def quick_inventory(audit_info: AWS_Audit_Info, output_directory: str): diff --git a/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/__init__.py b/prowler/providers/aws/lib/security_hub/__init__.py similarity index 100% rename from providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/__init__.py rename to prowler/providers/aws/lib/security_hub/__init__.py diff --git a/providers/aws/lib/security_hub/security_hub.py b/prowler/providers/aws/lib/security_hub/security_hub.py similarity index 95% rename from providers/aws/lib/security_hub/security_hub.py rename to prowler/providers/aws/lib/security_hub/security_hub.py index 19c801889cd..1514fad8ed1 100644 --- a/providers/aws/lib/security_hub/security_hub.py +++ b/prowler/providers/aws/lib/security_hub/security_hub.py @@ -4,10 +4,10 @@ from boto3 import session -from config.config import json_asff_file_suffix, timestamp_utc -from lib.logger import logger -from lib.outputs.models import Check_Output_JSON_ASFF -from providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.config.config import json_asff_file_suffix, timestamp_utc +from prowler.lib.logger import logger +from prowler.lib.outputs.models import Check_Output_JSON_ASFF +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info def send_to_security_hub( diff --git a/providers/aws/services/account/__init__.py b/prowler/providers/aws/services/__init__.py similarity index 100% rename from providers/aws/services/account/__init__.py rename to prowler/providers/aws/services/__init__.py diff --git a/providers/aws/services/account/account_maintain_current_contact_details/__init__.py b/prowler/providers/aws/services/accessanalyzer/__init__.py similarity index 100% rename from providers/aws/services/account/account_maintain_current_contact_details/__init__.py rename to prowler/providers/aws/services/accessanalyzer/__init__.py diff --git a/prowler/providers/aws/services/accessanalyzer/accessanalyzer_client.py b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_client.py new file mode 100644 index 00000000000..ad5e94ddec1 --- /dev/null +++ b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.accessanalyzer.accessanalyzer_service import ( + AccessAnalyzer, +) + +accessanalyzer_client = AccessAnalyzer(current_audit_info) diff --git a/providers/aws/services/account/account_security_contact_information_is_registered/__init__.py b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/__init__.py similarity index 100% rename from providers/aws/services/account/account_security_contact_information_is_registered/__init__.py rename to prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/__init__.py diff --git a/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.metadata.json b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.metadata.json similarity index 99% rename from providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.metadata.json rename to prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.metadata.json index 2b7b1cbf872..784b234303b 100644 --- a/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.metadata.json +++ b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.py b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.py similarity index 91% rename from providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.py rename to prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.py index a6a16073861..50d9da4c9d6 100644 --- a/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.py +++ b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.accessanalyzer.accessanalyzer_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.accessanalyzer.accessanalyzer_client import ( accessanalyzer_client, ) diff --git a/providers/aws/services/accessanalyzer/accessanalyzer_service.py b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_service.py similarity index 97% rename from providers/aws/services/accessanalyzer/accessanalyzer_service.py rename to prowler/providers/aws/services/accessanalyzer/accessanalyzer_service.py index 28bf6d24945..5294751c6b8 100644 --- a/providers/aws/services/accessanalyzer/accessanalyzer_service.py +++ b/prowler/providers/aws/services/accessanalyzer/accessanalyzer_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## AccessAnalyzer diff --git a/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/__init__.py b/prowler/providers/aws/services/account/__init__.py similarity index 100% rename from providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/__init__.py rename to prowler/providers/aws/services/account/__init__.py diff --git a/prowler/providers/aws/services/account/account_client.py b/prowler/providers/aws/services/account/account_client.py new file mode 100644 index 00000000000..2bf199668dc --- /dev/null +++ b/prowler/providers/aws/services/account/account_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.account.account_service import Account + +account_client = Account(current_audit_info) diff --git a/providers/aws/services/acm/__init__.py b/prowler/providers/aws/services/account/account_maintain_current_contact_details/__init__.py similarity index 100% rename from providers/aws/services/acm/__init__.py rename to prowler/providers/aws/services/account/account_maintain_current_contact_details/__init__.py diff --git a/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.metadata.json b/prowler/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.metadata.json similarity index 100% rename from providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.metadata.json rename to prowler/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.metadata.json diff --git a/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.py b/prowler/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.py similarity index 78% rename from providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.py rename to prowler/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.py index b0dbbebda65..39cd2927bbe 100644 --- a/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.py +++ b/prowler/providers/aws/services/account/account_maintain_current_contact_details/account_maintain_current_contact_details.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.account.account_client import account_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.account.account_client import account_client # This check has no findings since it is manual diff --git a/providers/aws/services/acm/acm_certificates_expiration_check/__init__.py b/prowler/providers/aws/services/account/account_security_contact_information_is_registered/__init__.py similarity index 100% rename from providers/aws/services/acm/acm_certificates_expiration_check/__init__.py rename to prowler/providers/aws/services/account/account_security_contact_information_is_registered/__init__.py diff --git a/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.metadata.json b/prowler/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.metadata.json similarity index 100% rename from providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.metadata.json rename to prowler/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.metadata.json diff --git a/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.py b/prowler/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.py similarity index 79% rename from providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.py rename to prowler/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.py index 9e33182fa7d..4f646b9aeae 100644 --- a/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.py +++ b/prowler/providers/aws/services/account/account_security_contact_information_is_registered/account_security_contact_information_is_registered.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.account.account_client import account_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.account.account_client import account_client # This check has no findings since it is manual diff --git a/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/__init__.py b/prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/__init__.py similarity index 100% rename from providers/aws/services/acm/acm_certificates_transparency_logs_enabled/__init__.py rename to prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/__init__.py diff --git a/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.metadata.json b/prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.metadata.json similarity index 100% rename from providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.metadata.json rename to prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.metadata.json diff --git a/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.py b/prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.py similarity index 80% rename from providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.py rename to prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.py index c1b775efb98..89c3bee2c62 100644 --- a/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.py +++ b/prowler/providers/aws/services/account/account_security_questions_are_registered_in_the_aws_account/account_security_questions_are_registered_in_the_aws_account.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.account.account_client import account_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.account.account_client import account_client # This check has no findings since it is manual diff --git a/providers/aws/services/account/account_service.py b/prowler/providers/aws/services/account/account_service.py similarity index 83% rename from providers/aws/services/account/account_service.py rename to prowler/providers/aws/services/account/account_service.py index 8c6c3d9ff6e..88a0f91ad7e 100644 --- a/providers/aws/services/account/account_service.py +++ b/prowler/providers/aws/services/account/account_service.py @@ -1,5 +1,5 @@ ################## Account -from providers.aws.aws_provider import get_region_global_service +from prowler.providers.aws.aws_provider import get_region_global_service class Account: diff --git a/providers/aws/services/apigateway/__init__.py b/prowler/providers/aws/services/acm/__init__.py similarity index 100% rename from providers/aws/services/apigateway/__init__.py rename to prowler/providers/aws/services/acm/__init__.py diff --git a/providers/aws/services/apigateway/apigateway_authorizers_enabled/__init__.py b/prowler/providers/aws/services/acm/acm_certificates_expiration_check/__init__.py similarity index 100% rename from providers/aws/services/apigateway/apigateway_authorizers_enabled/__init__.py rename to prowler/providers/aws/services/acm/acm_certificates_expiration_check/__init__.py diff --git a/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.metadata.json b/prowler/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.metadata.json similarity index 100% rename from providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.metadata.json rename to prowler/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.metadata.json diff --git a/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.py b/prowler/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.py similarity index 88% rename from providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.py rename to prowler/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.py index 54d3611f37c..ac40cbf0afb 100644 --- a/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.py +++ b/prowler/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.acm.acm_client import acm_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.acm.acm_client import acm_client DAYS_TO_EXPIRE_THRESHOLD = 7 diff --git a/providers/aws/services/apigateway/apigateway_client_certificate_enabled/__init__.py b/prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/__init__.py similarity index 100% rename from providers/aws/services/apigateway/apigateway_client_certificate_enabled/__init__.py rename to prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/__init__.py diff --git a/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.metadata.json b/prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.metadata.json similarity index 100% rename from providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.metadata.json rename to prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.metadata.json diff --git a/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.py b/prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.py similarity index 91% rename from providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.py rename to prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.py index 3a8a2601fc0..c55e992b956 100644 --- a/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.py +++ b/prowler/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.acm.acm_client import acm_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.acm.acm_client import acm_client class acm_certificates_transparency_logs_enabled(Check): diff --git a/prowler/providers/aws/services/acm/acm_client.py b/prowler/providers/aws/services/acm/acm_client.py new file mode 100644 index 00000000000..05a3b8bccb7 --- /dev/null +++ b/prowler/providers/aws/services/acm/acm_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.acm.acm_service import ACM + +acm_client = ACM(current_audit_info) diff --git a/providers/aws/services/acm/acm_service.py b/prowler/providers/aws/services/acm/acm_service.py similarity index 95% rename from providers/aws/services/acm/acm_service.py rename to prowler/providers/aws/services/acm/acm_service.py index 6bb50193901..56ac98b1c0a 100644 --- a/providers/aws/services/acm/acm_service.py +++ b/prowler/providers/aws/services/acm/acm_service.py @@ -1,9 +1,9 @@ import threading from dataclasses import dataclass -from config.config import timestamp_utc -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.config.config import timestamp_utc +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## ACM diff --git a/providers/aws/services/apigateway/apigateway_endpoint_public/__init__.py b/prowler/providers/aws/services/apigateway/__init__.py similarity index 100% rename from providers/aws/services/apigateway/apigateway_endpoint_public/__init__.py rename to prowler/providers/aws/services/apigateway/__init__.py diff --git a/providers/aws/services/apigateway/apigateway_logging_enabled/__init__.py b/prowler/providers/aws/services/apigateway/apigateway_authorizers_enabled/__init__.py similarity index 100% rename from providers/aws/services/apigateway/apigateway_logging_enabled/__init__.py rename to prowler/providers/aws/services/apigateway/apigateway_authorizers_enabled/__init__.py diff --git a/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.metadata.json b/prowler/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.metadata.json similarity index 100% rename from providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.metadata.json rename to prowler/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.metadata.json diff --git a/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.py b/prowler/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.py similarity index 83% rename from providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.py rename to prowler/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.py index 9a92d58bf53..81d9dac69d6 100644 --- a/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.py +++ b/prowler/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.apigateway.apigateway_client import apigateway_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.apigateway.apigateway_client import ( + apigateway_client, +) class apigateway_authorizers_enabled(Check): diff --git a/prowler/providers/aws/services/apigateway/apigateway_client.py b/prowler/providers/aws/services/apigateway/apigateway_client.py new file mode 100644 index 00000000000..aafa31cf7fd --- /dev/null +++ b/prowler/providers/aws/services/apigateway/apigateway_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.apigateway.apigateway_service import APIGateway + +apigateway_client = APIGateway(current_audit_info) diff --git a/providers/aws/services/apigateway/apigateway_waf_acl_attached/__init__.py b/prowler/providers/aws/services/apigateway/apigateway_client_certificate_enabled/__init__.py similarity index 100% rename from providers/aws/services/apigateway/apigateway_waf_acl_attached/__init__.py rename to prowler/providers/aws/services/apigateway/apigateway_client_certificate_enabled/__init__.py diff --git a/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.metadata.json b/prowler/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.metadata.json similarity index 100% rename from providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.metadata.json rename to prowler/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.metadata.json diff --git a/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.py b/prowler/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.py similarity index 86% rename from providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.py rename to prowler/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.py index 2dcae4067dc..472dd83ce09 100644 --- a/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.py +++ b/prowler/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.apigateway.apigateway_client import apigateway_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.apigateway.apigateway_client import ( + apigateway_client, +) class apigateway_client_certificate_enabled(Check): diff --git a/providers/aws/services/apigatewayv2/__init__.py b/prowler/providers/aws/services/apigateway/apigateway_endpoint_public/__init__.py similarity index 100% rename from providers/aws/services/apigatewayv2/__init__.py rename to prowler/providers/aws/services/apigateway/apigateway_endpoint_public/__init__.py diff --git a/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.metadata.json b/prowler/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.metadata.json similarity index 99% rename from providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.metadata.json rename to prowler/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.metadata.json index 6a35e392ba4..f547d1e2cbc 100644 --- a/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.metadata.json +++ b/prowler/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.py b/prowler/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.py similarity index 83% rename from providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.py rename to prowler/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.py index 0ee0b2a18e7..1562dd110ca 100644 --- a/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.py +++ b/prowler/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.apigateway.apigateway_client import apigateway_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.apigateway.apigateway_client import ( + apigateway_client, +) class apigateway_endpoint_public(Check): diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/__init__.py b/prowler/providers/aws/services/apigateway/apigateway_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/__init__.py rename to prowler/providers/aws/services/apigateway/apigateway_logging_enabled/__init__.py diff --git a/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.metadata.json b/prowler/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.metadata.json rename to prowler/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.metadata.json index 9040a47ff7a..5e328d576bb 100644 --- a/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.py b/prowler/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.py similarity index 84% rename from providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.py rename to prowler/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.py index 26e60ba36d2..b7e1deab838 100644 --- a/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.py +++ b/prowler/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.apigateway.apigateway_client import apigateway_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.apigateway.apigateway_client import ( + apigateway_client, +) class apigateway_logging_enabled(Check): diff --git a/providers/aws/services/apigateway/apigateway_service.py b/prowler/providers/aws/services/apigateway/apigateway_service.py similarity index 97% rename from providers/aws/services/apigateway/apigateway_service.py rename to prowler/providers/aws/services/apigateway/apigateway_service.py index 6a4bf0b4e93..cdccbb58e46 100644 --- a/providers/aws/services/apigateway/apigateway_service.py +++ b/prowler/providers/aws/services/apigateway/apigateway_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## APIGateway diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/__init__.py b/prowler/providers/aws/services/apigateway/apigateway_waf_acl_attached/__init__.py similarity index 100% rename from providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/__init__.py rename to prowler/providers/aws/services/apigateway/apigateway_waf_acl_attached/__init__.py diff --git a/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.metadata.json b/prowler/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.metadata.json similarity index 100% rename from providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.metadata.json rename to prowler/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.metadata.json diff --git a/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.py b/prowler/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.py similarity index 84% rename from providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.py rename to prowler/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.py index a1e82e047cf..2b0cfaacccd 100644 --- a/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.py +++ b/prowler/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.apigateway.apigateway_client import apigateway_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.apigateway.apigateway_client import ( + apigateway_client, +) class apigateway_waf_acl_attached(Check): diff --git a/providers/aws/services/appstream/__init__.py b/prowler/providers/aws/services/apigatewayv2/__init__.py similarity index 100% rename from providers/aws/services/appstream/__init__.py rename to prowler/providers/aws/services/apigatewayv2/__init__.py diff --git a/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/__init__.py b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/__init__.py rename to prowler/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/__init__.py diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.metadata.json b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.metadata.json similarity index 100% rename from providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.metadata.json rename to prowler/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.metadata.json diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.py b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.py similarity index 83% rename from providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.py rename to prowler/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.py index 63ea21d2681..f7e11b739bc 100644 --- a/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.py +++ b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.apigatewayv2.apigatewayv2_client import apigatewayv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.apigatewayv2.apigatewayv2_client import ( + apigatewayv2_client, +) class apigatewayv2_access_logging_enabled(Check): diff --git a/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/__init__.py b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/__init__.py similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_maximum_session_duration/__init__.py rename to prowler/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/__init__.py diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.metadata.json b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.metadata.json similarity index 100% rename from providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.metadata.json rename to prowler/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.metadata.json diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.py b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.py similarity index 82% rename from providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.py rename to prowler/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.py index 8aa820686cc..ab497eaf49c 100644 --- a/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.py +++ b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.apigatewayv2.apigatewayv2_client import apigatewayv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.apigatewayv2.apigatewayv2_client import ( + apigatewayv2_client, +) class apigatewayv2_authorizers_enabled(Check): diff --git a/prowler/providers/aws/services/apigatewayv2/apigatewayv2_client.py b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_client.py new file mode 100644 index 00000000000..3d88a315e52 --- /dev/null +++ b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.apigatewayv2.apigatewayv2_service import ( + ApiGatewayV2, +) + +apigatewayv2_client = ApiGatewayV2(current_audit_info) diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_service.py b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_service.py similarity index 96% rename from providers/aws/services/apigatewayv2/apigatewayv2_service.py rename to prowler/providers/aws/services/apigatewayv2/apigatewayv2_service.py index 2441941d9f3..3a825a4bd73 100644 --- a/providers/aws/services/apigatewayv2/apigatewayv2_service.py +++ b/prowler/providers/aws/services/apigatewayv2/apigatewayv2_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## ApiGatewayV2 diff --git a/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/__init__.py b/prowler/providers/aws/services/appstream/__init__.py similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/__init__.py rename to prowler/providers/aws/services/appstream/__init__.py diff --git a/prowler/providers/aws/services/appstream/appstream_client.py b/prowler/providers/aws/services/appstream/appstream_client.py new file mode 100644 index 00000000000..4f379f281ae --- /dev/null +++ b/prowler/providers/aws/services/appstream/appstream_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.appstream.appstream_service import AppStream + +appstream_client = AppStream(current_audit_info) diff --git a/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/__init__.py b/prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/__init__.py similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/__init__.py rename to prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/__init__.py diff --git a/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.metadata.json b/prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.metadata.json similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.metadata.json rename to prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.metadata.json diff --git a/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.py b/prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.py similarity index 88% rename from providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.py rename to prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.py index f6986b49dc7..70e16d378a0 100644 --- a/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.py +++ b/prowler/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.appstream.appstream_client import appstream_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.appstream.appstream_client import appstream_client # Check if there are AppStream Fleets with the default internet access enabled diff --git a/providers/aws/services/autoscaling/__init__.py b/prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/__init__.py similarity index 100% rename from providers/aws/services/autoscaling/__init__.py rename to prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/__init__.py diff --git a/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.metadata.json b/prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.metadata.json similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.metadata.json rename to prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.metadata.json diff --git a/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.py b/prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.py similarity index 85% rename from providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.py rename to prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.py index a9025969c5d..178831b30b7 100644 --- a/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.py +++ b/prowler/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration.py @@ -1,6 +1,6 @@ -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.appstream.appstream_client import appstream_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.appstream.appstream_client import appstream_client max_session_duration_seconds = get_config_var("max_session_duration_seconds") """max_session_duration_seconds, default: 36000 seconds (10 hours)""" diff --git a/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/__init__.py b/prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/__init__.py similarity index 100% rename from providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/__init__.py rename to prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/__init__.py diff --git a/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.metadata.json b/prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.metadata.json similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.metadata.json rename to prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.metadata.json diff --git a/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.py b/prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.py similarity index 85% rename from providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.py rename to prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.py index 0e22cd14abd..78774e068c5 100644 --- a/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.py +++ b/prowler/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout.py @@ -1,6 +1,6 @@ -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.appstream.appstream_client import appstream_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.appstream.appstream_client import appstream_client max_disconnect_timeout_in_seconds = get_config_var("max_disconnect_timeout_in_seconds") """max_disconnect_timeout_in_seconds, default: 300 seconds (5 minutes)""" diff --git a/providers/aws/services/awslambda/__init__.py b/prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/__init__.py similarity index 100% rename from providers/aws/services/awslambda/__init__.py rename to prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/__init__.py diff --git a/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.metadata.json b/prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.metadata.json similarity index 100% rename from providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.metadata.json rename to prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.metadata.json diff --git a/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.py b/prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.py similarity index 86% rename from providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.py rename to prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.py index f8a48c23554..db82997f430 100644 --- a/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.py +++ b/prowler/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout.py @@ -1,6 +1,6 @@ -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.appstream.appstream_client import appstream_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.appstream.appstream_client import appstream_client max_idle_disconnect_timeout_in_seconds = get_config_var( "max_idle_disconnect_timeout_in_seconds" diff --git a/providers/aws/services/appstream/appstream_service.py b/prowler/providers/aws/services/appstream/appstream_service.py similarity index 96% rename from providers/aws/services/appstream/appstream_service.py rename to prowler/providers/aws/services/appstream/appstream_service.py index 07620a85a3e..18d3e7fa5fe 100644 --- a/providers/aws/services/appstream/appstream_service.py +++ b/prowler/providers/aws/services/appstream/appstream_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## AppStream diff --git a/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/__init__.py b/prowler/providers/aws/services/autoscaling/__init__.py similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/__init__.py rename to prowler/providers/aws/services/autoscaling/__init__.py diff --git a/prowler/providers/aws/services/autoscaling/autoscaling_client.py b/prowler/providers/aws/services/autoscaling/autoscaling_client.py new file mode 100644 index 00000000000..9f4d933f628 --- /dev/null +++ b/prowler/providers/aws/services/autoscaling/autoscaling_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.autoscaling.autoscaling_service import AutoScaling + +autoscaling_client = AutoScaling(current_audit_info) diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/__init__.py b/prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/__init__.py similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/__init__.py rename to prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/__init__.py diff --git a/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.metadata.json b/prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.metadata.json similarity index 100% rename from providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.metadata.json rename to prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.metadata.json diff --git a/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.py b/prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.py similarity index 91% rename from providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.py rename to prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.py index 3c45a11668d..9b5e6b210ac 100644 --- a/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.py +++ b/prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration.py @@ -5,8 +5,10 @@ from detect_secrets import SecretsCollection from detect_secrets.settings import default_settings -from lib.check.models import Check, Check_Report -from providers.aws.services.autoscaling.autoscaling_client import autoscaling_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.autoscaling.autoscaling_client import ( + autoscaling_client, +) class autoscaling_find_secrets_ec2_launch_configuration(Check): diff --git a/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/fixtures/fixture b/prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/fixtures/fixture similarity index 100% rename from providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/fixtures/fixture rename to prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/fixtures/fixture diff --git a/providers/aws/services/autoscaling/autoscaling_service.py b/prowler/providers/aws/services/autoscaling/autoscaling_service.py similarity index 95% rename from providers/aws/services/autoscaling/autoscaling_service.py rename to prowler/providers/aws/services/autoscaling/autoscaling_service.py index 60d8be80931..2c6f9739b75 100644 --- a/providers/aws/services/autoscaling/autoscaling_service.py +++ b/prowler/providers/aws/services/autoscaling/autoscaling_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## AutoScaling diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/__init__.py b/prowler/providers/aws/services/awslambda/__init__.py similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/__init__.py rename to prowler/providers/aws/services/awslambda/__init__.py diff --git a/prowler/providers/aws/services/awslambda/awslambda_client.py b/prowler/providers/aws/services/awslambda/awslambda_client.py new file mode 100644 index 00000000000..355bda1fc29 --- /dev/null +++ b/prowler/providers/aws/services/awslambda/awslambda_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.awslambda.awslambda_service import Lambda + +awslambda_client = Lambda(current_audit_info) diff --git a/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/__init__.py diff --git a/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.metadata.json b/prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.metadata.json rename to prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.metadata.json index 2f0e9ea55d1..192fc2dfec8 100644 --- a/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.py b/prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.py similarity index 85% rename from providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.py rename to prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.py index 3bdbfd185ac..12243c9f6e1 100644 --- a/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.py +++ b/prowler/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.py @@ -1,6 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.awslambda.awslambda_client import awslambda_client -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.awslambda.awslambda_client import awslambda_client +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) class awslambda_function_invoke_api_operations_cloudtrail_logging_enabled(Check): diff --git a/providers/aws/services/awslambda/awslambda_function_url_cors_policy/__init__.py b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/__init__.py similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_url_cors_policy/__init__.py rename to prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/__init__.py diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.metadata.json b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.metadata.json similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.metadata.json rename to prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.metadata.json diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.py b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.py similarity index 90% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.py rename to prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.py index 1b899f63114..4df25af2cb3 100644 --- a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.py +++ b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code.py @@ -1,10 +1,12 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.awslambda.awslambda_client import awslambda_client -import tempfile import os +import tempfile + from detect_secrets import SecretsCollection from detect_secrets.settings import default_settings +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.awslambda.awslambda_client import awslambda_client + class awslambda_function_no_secrets_in_code(Check): def execute(self): diff --git a/providers/aws/services/awslambda/awslambda_function_url_public/__init__.py b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/__init__.py similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_url_public/__init__.py rename to prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/__init__.py diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.metadata.json b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.metadata.json similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.metadata.json rename to prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.metadata.json diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.py b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.py similarity index 90% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.py rename to prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.py index d0da4de4511..a908324676d 100644 --- a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.py +++ b/prowler/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables.py @@ -1,10 +1,12 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.awslambda.awslambda_client import awslambda_client -import tempfile import json +import os +import tempfile + from detect_secrets import SecretsCollection from detect_secrets.settings import default_settings -import os + +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.awslambda.awslambda_client import awslambda_client class awslambda_function_no_secrets_in_variables(Check): diff --git a/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/__init__.py b/prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/__init__.py rename to prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.metadata.json index 3e94a4600cb..b303c84ebe3 100644 --- a/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.py b/prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.py similarity index 91% rename from providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.py rename to prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.py index d188ed5a7f0..7be6ecc3b0e 100644 --- a/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.py +++ b/prowler/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.awslambda.awslambda_client import awslambda_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.awslambda.awslambda_client import awslambda_client class awslambda_function_not_publicly_accessible(Check): diff --git a/providers/aws/services/cloudformation/__init__.py b/prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/__init__.py similarity index 100% rename from providers/aws/services/cloudformation/__init__.py rename to prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/__init__.py diff --git a/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.metadata.json b/prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.metadata.json similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.metadata.json rename to prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.metadata.json diff --git a/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.py b/prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.py similarity index 85% rename from providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.py rename to prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.py index afbd23b529b..e640036c06f 100644 --- a/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.py +++ b/prowler/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.awslambda.awslambda_client import awslambda_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.awslambda.awslambda_client import awslambda_client class awslambda_function_url_cors_policy(Check): diff --git a/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/__init__.py b/prowler/providers/aws/services/awslambda/awslambda_function_url_public/__init__.py similarity index 100% rename from providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/__init__.py rename to prowler/providers/aws/services/awslambda/awslambda_function_url_public/__init__.py diff --git a/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.metadata.json b/prowler/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.metadata.json similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.metadata.json rename to prowler/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.metadata.json diff --git a/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.py b/prowler/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.py similarity index 79% rename from providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.py rename to prowler/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.py index 556b6c5adc1..0587cf18d2e 100644 --- a/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.py +++ b/prowler/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public.py @@ -1,7 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.awslambda.awslambda_client import awslambda_client - -from providers.aws.services.awslambda.awslambda_service import AuthType +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.awslambda.awslambda_client import awslambda_client +from prowler.providers.aws.services.awslambda.awslambda_service import AuthType class awslambda_function_url_public(Check): diff --git a/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/__init__.py b/prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/__init__.py similarity index 100% rename from providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/__init__.py rename to prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/__init__.py diff --git a/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.metadata.json b/prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.metadata.json similarity index 100% rename from providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.metadata.json rename to prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.metadata.json diff --git a/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.py b/prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.py similarity index 81% rename from providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.py rename to prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.py index c53c5e7fcf2..6660f0653d9 100644 --- a/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.py +++ b/prowler/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.awslambda.awslambda_client import awslambda_client -from config.config import get_config_var +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.awslambda.awslambda_client import awslambda_client class awslambda_function_using_supported_runtimes(Check): diff --git a/providers/aws/services/awslambda/awslambda_service.py b/prowler/providers/aws/services/awslambda/awslambda_service.py similarity index 98% rename from providers/aws/services/awslambda/awslambda_service.py rename to prowler/providers/aws/services/awslambda/awslambda_service.py index dc94b0aa6a6..6c76bff9755 100644 --- a/providers/aws/services/awslambda/awslambda_service.py +++ b/prowler/providers/aws/services/awslambda/awslambda_service.py @@ -8,8 +8,8 @@ import requests from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## Lambda diff --git a/providers/aws/services/cloudfront/__init__.py b/prowler/providers/aws/services/cloudformation/__init__.py similarity index 100% rename from providers/aws/services/cloudfront/__init__.py rename to prowler/providers/aws/services/cloudformation/__init__.py diff --git a/prowler/providers/aws/services/cloudformation/cloudformation_client.py b/prowler/providers/aws/services/cloudformation/cloudformation_client.py new file mode 100644 index 00000000000..47461271ad4 --- /dev/null +++ b/prowler/providers/aws/services/cloudformation/cloudformation_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.cloudformation.cloudformation_service import ( + CloudFormation, +) + +cloudformation_client = CloudFormation(current_audit_info) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/__init__.py b/prowler/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/__init__.py similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/__init__.py rename to prowler/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/__init__.py diff --git a/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.metadata.json b/prowler/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.metadata.json similarity index 100% rename from providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.metadata.json rename to prowler/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.metadata.json diff --git a/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.py b/prowler/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.py similarity index 92% rename from providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.py rename to prowler/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.py index 3b483c2ee8d..4d95627a1b8 100644 --- a/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.py +++ b/prowler/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets.py @@ -4,8 +4,8 @@ from detect_secrets import SecretsCollection from detect_secrets.settings import default_settings -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudformation.cloudformation_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudformation.cloudformation_client import ( cloudformation_client, ) diff --git a/providers/aws/services/cloudformation/cloudformation_service.py b/prowler/providers/aws/services/cloudformation/cloudformation_service.py similarity index 97% rename from providers/aws/services/cloudformation/cloudformation_service.py rename to prowler/providers/aws/services/cloudformation/cloudformation_service.py index c9318bef6cd..3eccf15d85e 100644 --- a/providers/aws/services/cloudformation/cloudformation_service.py +++ b/prowler/providers/aws/services/cloudformation/cloudformation_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## CloudFormation diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/__init__.py b/prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/__init__.py rename to prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/__init__.py diff --git a/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.metadata.json b/prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.metadata.json rename to prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.metadata.json diff --git a/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.py b/prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.py similarity index 88% rename from providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.py rename to prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.py index f8ddd3af904..3449e68b35a 100644 --- a/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.py +++ b/prowler/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudformation.cloudformation_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudformation.cloudformation_client import ( cloudformation_client, ) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/__init__.py b/prowler/providers/aws/services/cloudfront/__init__.py similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/__init__.py rename to prowler/providers/aws/services/cloudfront/__init__.py diff --git a/prowler/providers/aws/services/cloudfront/cloudfront_client.py b/prowler/providers/aws/services/cloudfront/cloudfront_client.py new file mode 100644 index 00000000000..d33af5dfdf8 --- /dev/null +++ b/prowler/providers/aws/services/cloudfront/cloudfront_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.cloudfront.cloudfront_service import CloudFront + +cloudfront_client = CloudFront(current_audit_info) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/__init__.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/__init__.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/__init__.py diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.metadata.json b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.metadata.json rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.metadata.json diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.py similarity index 84% rename from providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.py index 0ea759af7cb..58f4a044fcc 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.py +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudfront.cloudfront_client import cloudfront_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudfront.cloudfront_client import ( + cloudfront_client, +) class cloudfront_distributions_field_level_encryption_enabled(Check): diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/__init__.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/__init__.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/__init__.py diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.metadata.json b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.metadata.json rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.metadata.json diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.py similarity index 76% rename from providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.py index 619de02e440..ad7b03e86fa 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.py +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled.py @@ -1,6 +1,10 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudfront.cloudfront_client import cloudfront_client -from providers.aws.services.cloudfront.cloudfront_service import GeoRestrictionType +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudfront.cloudfront_client import ( + cloudfront_client, +) +from prowler.providers.aws.services.cloudfront.cloudfront_service import ( + GeoRestrictionType, +) class cloudfront_distributions_geo_restrictions_enabled(Check): diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/__init__.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_waf/__init__.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/__init__.py diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.metadata.json b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.metadata.json rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.metadata.json index 8d5db7dbd6f..5b8cebb2129 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.py similarity index 84% rename from providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.py index 272439d35c1..91c991f01dd 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.py +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled.py @@ -1,6 +1,10 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudfront.cloudfront_client import cloudfront_client -from providers.aws.services.cloudfront.cloudfront_service import ViewerProtocolPolicy +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudfront.cloudfront_client import ( + cloudfront_client, +) +from prowler.providers.aws.services.cloudfront.cloudfront_service import ( + ViewerProtocolPolicy, +) class cloudfront_distributions_https_enabled(Check): diff --git a/providers/aws/services/cloudtrail/__init__.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/__init__.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/__init__.py diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.metadata.json b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.metadata.json rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.metadata.json index 6c6c555adef..bae9a505548 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "Logging and Monitoring" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.py similarity index 86% rename from providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.py index bbec6136781..c0215c0b1f7 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.py +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudfront.cloudfront_client import cloudfront_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudfront.cloudfront_client import ( + cloudfront_client, +) class cloudfront_distributions_logging_enabled(Check): diff --git a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/__init__.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/__init__.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/__init__.py diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.metadata.json b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.metadata.json similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.metadata.json rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.metadata.json diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.py similarity index 85% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.py index b4baa046a43..98f163e5796 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.py +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols.py @@ -1,6 +1,10 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudfront.cloudfront_client import cloudfront_client -from providers.aws.services.cloudfront.cloudfront_service import OriginsSSLProtocols +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudfront.cloudfront_client import ( + cloudfront_client, +) +from prowler.providers.aws.services.cloudfront.cloudfront_service import ( + OriginsSSLProtocols, +) class cloudfront_distributions_using_deprecated_ssl_protocols(Check): diff --git a/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/__init__.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/__init__.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/__init__.py diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.metadata.json b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.metadata.json similarity index 100% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.metadata.json rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.metadata.json diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.py b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.py similarity index 83% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.py rename to prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.py index 6bd52882d87..ce8681a5eb4 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.py +++ b/prowler/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudfront.cloudfront_client import cloudfront_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudfront.cloudfront_client import ( + cloudfront_client, +) class cloudfront_distributions_using_waf(Check): diff --git a/providers/aws/services/cloudfront/cloudfront_service.py b/prowler/providers/aws/services/cloudfront/cloudfront_service.py similarity index 98% rename from providers/aws/services/cloudfront/cloudfront_service.py rename to prowler/providers/aws/services/cloudfront/cloudfront_service.py index 77802fcd401..c4ade26a263 100644 --- a/providers/aws/services/cloudfront/cloudfront_service.py +++ b/prowler/providers/aws/services/cloudfront/cloudfront_service.py @@ -1,8 +1,8 @@ from dataclasses import dataclass from enum import Enum -from lib.logger import logger -from providers.aws.aws_provider import get_region_global_service +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import get_region_global_service ################## CloudFront diff --git a/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/__init__.py b/prowler/providers/aws/services/cloudtrail/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/__init__.py rename to prowler/providers/aws/services/cloudtrail/__init__.py diff --git a/prowler/providers/aws/services/cloudtrail/cloudtrail_client.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_client.py new file mode 100644 index 00000000000..0c22cb6ba8c --- /dev/null +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + +cloudtrail_client = Cloudtrail(current_audit_info) diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.metadata.json index fe89859ff17..de7f337947b 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.py similarity index 92% rename from providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.py index 776b6fcba7f..b826b1d400d 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled.py @@ -1,7 +1,9 @@ from datetime import datetime, timedelta, timezone -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) maximum_time_without_logging = 1 diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.metadata.json index e9ea3f90d72..c8473efb6b1 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.py similarity index 89% rename from providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.py index 8a789da5e1d..c92410162ea 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) class cloudtrail_kms_encryption_enabled(Check): diff --git a/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.metadata.json index a0b5390c258..e84725462d5 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.py similarity index 88% rename from providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.py index d441311cf94..c7a0d24eaac 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) class cloudtrail_log_file_validation_enabled(Check): diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.metadata.json index ec84dc98a1c..43be6ecc800 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.py similarity index 86% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.py index 0349bd9e437..1869091a583 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled.py @@ -1,6 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.s3.s3_client import s3_client class cloudtrail_logs_s3_bucket_access_logging_enabled(Check): diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.metadata.json index 9a5808fc1a4..75c56409b06 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.py similarity index 89% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.py index 0ed332af2d4..a17475b69a9 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible.py @@ -1,6 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.s3.s3_client import s3_client class cloudtrail_logs_s3_bucket_is_not_publicly_accessible(Check): diff --git a/providers/aws/services/cloudwatch/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.metadata.json index 3b692ecf898..c8e2e636cae 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.py similarity index 93% rename from providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.py index 6c237faa1b9..7cde3e348f4 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) class cloudtrail_multi_region_enabled(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.metadata.json diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.py similarity index 90% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.py index 330530e7ee7..c0892260a7d 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) class cloudtrail_s3_dataevents_read_enabled(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/__init__.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/__init__.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/__init__.py diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.metadata.json b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.metadata.json similarity index 99% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.metadata.json rename to prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.metadata.json index 656c68e9251..1f55be064ff 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.metadata.json +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.py similarity index 90% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.py index 25cfeb72303..f81fb437555 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) class cloudtrail_s3_dataevents_write_enabled(Check): diff --git a/providers/aws/services/cloudtrail/cloudtrail_service.py b/prowler/providers/aws/services/cloudtrail/cloudtrail_service.py similarity index 98% rename from providers/aws/services/cloudtrail/cloudtrail_service.py rename to prowler/providers/aws/services/cloudtrail/cloudtrail_service.py index fb1eb61b0d5..998eea30983 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_service.py +++ b/prowler/providers/aws/services/cloudtrail/cloudtrail_service.py @@ -2,8 +2,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import ( +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import ( generate_regional_clients, get_region_global_service, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/__init__.py b/prowler/providers/aws/services/cloudwatch/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/__init__.py rename to prowler/providers/aws/services/cloudwatch/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.py index 44615ec2131..5f405699901 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_changes_to_network_acls_alarm_configured(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.py index 657b232c44e..12ad8c0e5de 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_changes_to_network_gateways_alarm_configured(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.py index cbd6a48d3d3..d02752f4b02 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_changes_to_network_route_tables_alarm_configured(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.py similarity index 86% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.py index 8977d95290b..1047592ac4c 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_changes_to_vpcs_alarm_configured(Check): diff --git a/prowler/providers/aws/services/cloudwatch/cloudwatch_client.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_client.py new file mode 100644 index 00000000000..33a8c85e66d --- /dev/null +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.cloudwatch.cloudwatch_service import CloudWatch + +cloudwatch_client = CloudWatch(current_audit_info) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.py index 674f814b8c4..2095cf03401 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class cloudwatch_cross_account_sharing_disabled(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.py index 32376effe2c..b652e6fe34a 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_group_kms_encryption_enabled(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.py similarity index 84% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.py index 3a4a12f9f99..28886d5f4f1 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled.py @@ -1,6 +1,6 @@ -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_group_retention_policy_specific_days_enabled(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.py index 5dde517ca18..819b18a8559 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled( diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.py index 0726648f028..ea736f50b26 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled( diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.py similarity index 84% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.py index 486264728d7..96013f5c95d 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_authentication_failures(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.py similarity index 88% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.py index c12f865905d..92b6f01202a 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_aws_organizations_changes(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.py similarity index 84% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.py index 99927eff040..08dcb69be76 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.py similarity index 86% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.py index 633674f5b98..ba7702d5c07 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_for_s3_bucket_policy_changes(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.py similarity index 87% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.py index b14fc767082..77092ecdf9d 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_policy_changes(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/__init__.py similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.py similarity index 84% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.py index 96a94525351..07463054790 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_root_usage(Check): diff --git a/providers/aws/services/codeartifact/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/__init__.py similarity index 100% rename from providers/aws/services/codeartifact/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.py similarity index 85% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.py index 23f1dc8be96..101180787db 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_security_group_changes(Check): diff --git a/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/__init__.py similarity index 100% rename from providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.py similarity index 84% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.py index aead862ba29..e8ebe4c9cf5 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_sign_in_without_mfa(Check): diff --git a/providers/aws/services/codebuild/__init__.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/__init__.py similarity index 100% rename from providers/aws/services/codebuild/__init__.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/__init__.py diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.metadata.json b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.metadata.json similarity index 100% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.metadata.json rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.metadata.json diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.py similarity index 84% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.py index be788b9b343..48efb414a5e 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls.py @@ -1,9 +1,13 @@ import re -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudtrail.cloudtrail_client import cloudtrail_client -from providers.aws.services.cloudwatch.cloudwatch_client import cloudwatch_client -from providers.aws.services.cloudwatch.logs_client import logs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + cloudtrail_client, +) +from prowler.providers.aws.services.cloudwatch.cloudwatch_client import ( + cloudwatch_client, +) +from prowler.providers.aws.services.cloudwatch.logs_client import logs_client class cloudwatch_log_metric_filter_unauthorized_api_calls(Check): diff --git a/providers/aws/services/cloudwatch/cloudwatch_service.py b/prowler/providers/aws/services/cloudwatch/cloudwatch_service.py similarity index 98% rename from providers/aws/services/cloudwatch/cloudwatch_service.py rename to prowler/providers/aws/services/cloudwatch/cloudwatch_service.py index 1e2e8988721..c250db4878b 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_service.py +++ b/prowler/providers/aws/services/cloudwatch/cloudwatch_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## CloudWatch diff --git a/prowler/providers/aws/services/cloudwatch/logs_client.py b/prowler/providers/aws/services/cloudwatch/logs_client.py new file mode 100644 index 00000000000..a937c9036d5 --- /dev/null +++ b/prowler/providers/aws/services/cloudwatch/logs_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs + +logs_client = Logs(current_audit_info) diff --git a/providers/aws/services/codebuild/codebuild_project_older_90_days/__init__.py b/prowler/providers/aws/services/codeartifact/__init__.py similarity index 100% rename from providers/aws/services/codebuild/codebuild_project_older_90_days/__init__.py rename to prowler/providers/aws/services/codeartifact/__init__.py diff --git a/prowler/providers/aws/services/codeartifact/codeartifact_client.py b/prowler/providers/aws/services/codeartifact/codeartifact_client.py new file mode 100644 index 00000000000..3c22918d0f8 --- /dev/null +++ b/prowler/providers/aws/services/codeartifact/codeartifact_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.codeartifact.codeartifact_service import ( + CodeArtifact, +) + +codeartifact_client = CodeArtifact(current_audit_info) diff --git a/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/__init__.py b/prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/__init__.py similarity index 100% rename from providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/__init__.py rename to prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/__init__.py diff --git a/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.metadata.json b/prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.metadata.json similarity index 100% rename from providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.metadata.json rename to prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.metadata.json diff --git a/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.py b/prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.py similarity index 84% rename from providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.py rename to prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.py index 465edff7583..13462db6442 100644 --- a/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.py +++ b/prowler/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled.py @@ -1,6 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.codeartifact.codeartifact_client import codeartifact_client -from providers.aws.services.codeartifact.codeartifact_service import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.codeartifact.codeartifact_client import ( + codeartifact_client, +) +from prowler.providers.aws.services.codeartifact.codeartifact_service import ( OriginInformationValues, RestrictionValues, ) diff --git a/providers/aws/services/codeartifact/codeartifact_service.py b/prowler/providers/aws/services/codeartifact/codeartifact_service.py similarity index 98% rename from providers/aws/services/codeartifact/codeartifact_service.py rename to prowler/providers/aws/services/codeartifact/codeartifact_service.py index 0899b50e232..d035c9f6e76 100644 --- a/providers/aws/services/codeartifact/codeartifact_service.py +++ b/prowler/providers/aws/services/codeartifact/codeartifact_service.py @@ -3,8 +3,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## CodeArtifact diff --git a/providers/aws/services/config/__init__.py b/prowler/providers/aws/services/codebuild/__init__.py similarity index 100% rename from providers/aws/services/config/__init__.py rename to prowler/providers/aws/services/codebuild/__init__.py diff --git a/prowler/providers/aws/services/codebuild/codebuild_client.py b/prowler/providers/aws/services/codebuild/codebuild_client.py new file mode 100644 index 00000000000..bfc11384915 --- /dev/null +++ b/prowler/providers/aws/services/codebuild/codebuild_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.codebuild.codebuild_service import Codebuild + +codebuild_client = Codebuild(current_audit_info) diff --git a/providers/aws/services/config/config_recorder_all_regions_enabled/__init__.py b/prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/__init__.py similarity index 100% rename from providers/aws/services/config/config_recorder_all_regions_enabled/__init__.py rename to prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/__init__.py diff --git a/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.metadata.json b/prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.metadata.json similarity index 100% rename from providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.metadata.json rename to prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.metadata.json diff --git a/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.py b/prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.py similarity index 88% rename from providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.py rename to prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.py index 2eb227c850a..f9a0705ee64 100644 --- a/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.py +++ b/prowler/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days.py @@ -1,7 +1,7 @@ from datetime import datetime, timezone -from lib.check.models import Check, Check_Report -from providers.aws.services.codebuild.codebuild_client import codebuild_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.codebuild.codebuild_client import codebuild_client class codebuild_project_older_90_days(Check): diff --git a/providers/aws/services/directoryservice/__init__.py b/prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/__init__.py similarity index 100% rename from providers/aws/services/directoryservice/__init__.py rename to prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/__init__.py diff --git a/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.metadata.json b/prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.metadata.json similarity index 100% rename from providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.metadata.json rename to prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.metadata.json diff --git a/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.py b/prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.py similarity index 86% rename from providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.py rename to prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.py index a254bef97d7..b9f043f3fbb 100644 --- a/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.py +++ b/prowler/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec.py @@ -1,7 +1,7 @@ from re import search -from lib.check.models import Check, Check_Report -from providers.aws.services.codebuild.codebuild_client import codebuild_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.codebuild.codebuild_client import codebuild_client class codebuild_project_user_controlled_buildspec(Check): diff --git a/providers/aws/services/codebuild/codebuild_service.py b/prowler/providers/aws/services/codebuild/codebuild_service.py similarity index 96% rename from providers/aws/services/codebuild/codebuild_service.py rename to prowler/providers/aws/services/codebuild/codebuild_service.py index 027f5e6e381..10c95fff609 100644 --- a/providers/aws/services/codebuild/codebuild_service.py +++ b/prowler/providers/aws/services/codebuild/codebuild_service.py @@ -2,8 +2,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################### Codebuild diff --git a/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/__init__.py b/prowler/providers/aws/services/config/__init__.py similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/__init__.py rename to prowler/providers/aws/services/config/__init__.py diff --git a/prowler/providers/aws/services/config/config_client.py b/prowler/providers/aws/services/config/config_client.py new file mode 100644 index 00000000000..05f0fc02f26 --- /dev/null +++ b/prowler/providers/aws/services/config/config_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.config.config_service import Config + +config_client = Config(current_audit_info) diff --git a/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/__init__.py b/prowler/providers/aws/services/config/config_recorder_all_regions_enabled/__init__.py similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/__init__.py rename to prowler/providers/aws/services/config/config_recorder_all_regions_enabled/__init__.py diff --git a/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.metadata.json b/prowler/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.metadata.json similarity index 99% rename from providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.metadata.json rename to prowler/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.metadata.json index 1895b53e254..f0b51d9157e 100644 --- a/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.metadata.json +++ b/prowler/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.py b/prowler/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.py similarity index 90% rename from providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.py rename to prowler/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.py index d5590f337b3..3012455b797 100644 --- a/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.py +++ b/prowler/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.config.config_client import config_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.config.config_client import config_client class config_recorder_all_regions_enabled(Check): diff --git a/providers/aws/services/config/config_service.py b/prowler/providers/aws/services/config/config_service.py similarity index 96% rename from providers/aws/services/config/config_service.py rename to prowler/providers/aws/services/config/config_service.py index bf55758034b..3b84c533cd1 100644 --- a/providers/aws/services/config/config_service.py +++ b/prowler/providers/aws/services/config/config_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## Config diff --git a/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/__init__.py b/prowler/providers/aws/services/directoryservice/__init__.py similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/__init__.py rename to prowler/providers/aws/services/directoryservice/__init__.py diff --git a/prowler/providers/aws/services/directoryservice/directoryservice_client.py b/prowler/providers/aws/services/directoryservice/directoryservice_client.py new file mode 100644 index 00000000000..42c42b6316a --- /dev/null +++ b/prowler/providers/aws/services/directoryservice/directoryservice_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( + DirectoryService, +) + +directoryservice_client = DirectoryService(current_audit_info) diff --git a/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/__init__.py b/prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/__init__.py similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/__init__.py rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/__init__.py diff --git a/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.metadata.json b/prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.metadata.json similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.metadata.json rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.metadata.json diff --git a/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.py b/prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.py similarity index 84% rename from providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.py rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.py index 5cd281c3990..086b5670c76 100644 --- a/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.py +++ b/prowler/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.directoryservice.directoryservice_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.directoryservice.directoryservice_client import ( directoryservice_client, ) diff --git a/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/__init__.py b/prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/__init__.py similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/__init__.py rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/__init__.py diff --git a/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.metadata.json b/prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.metadata.json similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.metadata.json rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.metadata.json diff --git a/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.py b/prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.py similarity index 85% rename from providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.py rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.py index 83359add8a2..6cb9d3c0799 100644 --- a/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.py +++ b/prowler/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.directoryservice.directoryservice_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.directoryservice.directoryservice_client import ( directoryservice_client, ) diff --git a/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/__init__.py b/prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/__init__.py similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/__init__.py rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/__init__.py diff --git a/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.metadata.json b/prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.metadata.json similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.metadata.json rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.metadata.json diff --git a/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.py b/prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.py similarity index 92% rename from providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.py rename to prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.py index cf747cb1c34..ed3f344be3c 100644 --- a/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.py +++ b/prowler/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.directoryservice.directoryservice_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.directoryservice.directoryservice_client import ( directoryservice_client, ) diff --git a/providers/aws/services/dynamodb/__init__.py b/prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/__init__.py similarity index 100% rename from providers/aws/services/dynamodb/__init__.py rename to prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/__init__.py diff --git a/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.metadata.json b/prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.metadata.json similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.metadata.json rename to prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.metadata.json diff --git a/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.py b/prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.py similarity index 89% rename from providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.py rename to prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.py index 0ec4b95a0c4..e613d3822ce 100644 --- a/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.py +++ b/prowler/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration.py @@ -1,7 +1,7 @@ from datetime import datetime -from lib.check.models import Check, Check_Report -from providers.aws.services.directoryservice.directoryservice_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.directoryservice.directoryservice_client import ( directoryservice_client, ) diff --git a/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/__init__.py b/prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/__init__.py similarity index 100% rename from providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/__init__.py rename to prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/__init__.py diff --git a/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.metadata.json b/prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.metadata.json similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.metadata.json rename to prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.metadata.json diff --git a/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.py b/prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.py similarity index 82% rename from providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.py rename to prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.py index bffb3b9dd30..b1c97fb7e39 100644 --- a/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.py +++ b/prowler/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol.py @@ -1,8 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.directoryservice.directoryservice_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.directoryservice.directoryservice_client import ( directoryservice_client, ) -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( AuthenticationProtocol, ) diff --git a/providers/aws/services/directoryservice/directoryservice_service.py b/prowler/providers/aws/services/directoryservice/directoryservice_service.py similarity index 98% rename from providers/aws/services/directoryservice/directoryservice_service.py rename to prowler/providers/aws/services/directoryservice/directoryservice_service.py index b405b48a222..0fc5835823d 100644 --- a/providers/aws/services/directoryservice/directoryservice_service.py +++ b/prowler/providers/aws/services/directoryservice/directoryservice_service.py @@ -5,8 +5,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## DirectoryService diff --git a/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/__init__.py b/prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/__init__.py similarity index 100% rename from providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/__init__.py rename to prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/__init__.py diff --git a/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.metadata.json b/prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.metadata.json similarity index 100% rename from providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.metadata.json rename to prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.metadata.json diff --git a/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.py b/prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.py similarity index 80% rename from providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.py rename to prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.py index f9f9bae679e..18666a70f4a 100644 --- a/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.py +++ b/prowler/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled.py @@ -1,8 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.directoryservice.directoryservice_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.directoryservice.directoryservice_client import ( directoryservice_client, ) -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( RadiusStatus, ) diff --git a/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/__init__.py b/prowler/providers/aws/services/dynamodb/__init__.py similarity index 100% rename from providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/__init__.py rename to prowler/providers/aws/services/dynamodb/__init__.py diff --git a/prowler/providers/aws/services/dynamodb/dax_client.py b/prowler/providers/aws/services/dynamodb/dax_client.py new file mode 100644 index 00000000000..ff3927ab924 --- /dev/null +++ b/prowler/providers/aws/services/dynamodb/dax_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.dynamodb.dynamodb_service import DAX + +dax_client = DAX(current_audit_info) diff --git a/providers/aws/services/ec2/__init__.py b/prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/ec2/__init__.py rename to prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/__init__.py diff --git a/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.metadata.json b/prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.metadata.json rename to prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.metadata.json diff --git a/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.py b/prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.py similarity index 85% rename from providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.py rename to prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.py index 66f289c1ea6..f8b8437478a 100644 --- a/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.py +++ b/prowler/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.dynamodb.dax_client import dax_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.dynamodb.dax_client import dax_client class dynamodb_accelerator_cluster_encryption_enabled(Check): diff --git a/prowler/providers/aws/services/dynamodb/dynamodb_client.py b/prowler/providers/aws/services/dynamodb/dynamodb_client.py new file mode 100644 index 00000000000..a79f6ba5583 --- /dev/null +++ b/prowler/providers/aws/services/dynamodb/dynamodb_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.dynamodb.dynamodb_service import DynamoDB + +dynamodb_client = DynamoDB(current_audit_info) diff --git a/providers/aws/services/dynamodb/dynamodb_service.py b/prowler/providers/aws/services/dynamodb/dynamodb_service.py similarity index 98% rename from providers/aws/services/dynamodb/dynamodb_service.py rename to prowler/providers/aws/services/dynamodb/dynamodb_service.py index d12040ca44a..ee478bb9ba5 100644 --- a/providers/aws/services/dynamodb/dynamodb_service.py +++ b/prowler/providers/aws/services/dynamodb/dynamodb_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## DynamoDB diff --git a/providers/aws/services/ec2/ec2_ami_public/__init__.py b/prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_ami_public/__init__.py rename to prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/__init__.py diff --git a/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.metadata.json b/prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.metadata.json rename to prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.metadata.json diff --git a/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.py b/prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.py similarity index 84% rename from providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.py rename to prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.py index c25381d3d70..fd022c2823d 100644 --- a/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.py +++ b/prowler/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.dynamodb.dynamodb_client import dynamodb_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.dynamodb.dynamodb_client import dynamodb_client class dynamodb_tables_kms_cmk_encryption_enabled(Check): diff --git a/providers/aws/services/ec2/ec2_ebs_default_encryption/__init__.py b/prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_ebs_default_encryption/__init__.py rename to prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/__init__.py diff --git a/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.metadata.json b/prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.metadata.json similarity index 100% rename from providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.metadata.json rename to prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.metadata.json diff --git a/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.py b/prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.py similarity index 83% rename from providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.py rename to prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.py index b5fca8b9b8b..80a0f521251 100644 --- a/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.py +++ b/prowler/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.dynamodb.dynamodb_client import dynamodb_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.dynamodb.dynamodb_client import dynamodb_client class dynamodb_tables_pitr_enabled(Check): diff --git a/providers/aws/services/ec2/ec2_ebs_public_snapshot/__init__.py b/prowler/providers/aws/services/ec2/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_ebs_public_snapshot/__init__.py rename to prowler/providers/aws/services/ec2/__init__.py diff --git a/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/__init__.py b/prowler/providers/aws/services/ec2/ec2_ami_public/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/__init__.py rename to prowler/providers/aws/services/ec2/ec2_ami_public/__init__.py diff --git a/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.metadata.json b/prowler/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.metadata.json rename to prowler/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.metadata.json index 8d18c966f55..0c3f374517e 100644 --- a/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.py b/prowler/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.py similarity index 83% rename from providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.py rename to prowler/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.py index 0ba3504e5a4..436be5d223d 100644 --- a/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.py +++ b/prowler/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_ami_public(Check): diff --git a/prowler/providers/aws/services/ec2/ec2_client.py b/prowler/providers/aws/services/ec2/ec2_client.py new file mode 100644 index 00000000000..2541c7e614b --- /dev/null +++ b/prowler/providers/aws/services/ec2/ec2_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.ec2.ec2_service import EC2 + +ec2_client = EC2(current_audit_info) diff --git a/providers/aws/services/ec2/ec2_ebs_volume_encryption/__init__.py b/prowler/providers/aws/services/ec2/ec2_ebs_default_encryption/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_ebs_volume_encryption/__init__.py rename to prowler/providers/aws/services/ec2/ec2_ebs_default_encryption/__init__.py diff --git a/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.metadata.json b/prowler/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.metadata.json rename to prowler/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.metadata.json diff --git a/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.py b/prowler/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.py similarity index 83% rename from providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.py rename to prowler/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.py index 55eb1c20f3f..c5b7c55cdf6 100644 --- a/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.py +++ b/prowler/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_ebs_default_encryption(Check): diff --git a/providers/aws/services/ec2/ec2_elastic_ip_shodan/__init__.py b/prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_elastic_ip_shodan/__init__.py rename to prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/__init__.py diff --git a/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.metadata.json b/prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.metadata.json rename to prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.metadata.json index 318934bb907..2956ea1b3fd 100644 --- a/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.py b/prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.py similarity index 85% rename from providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.py rename to prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.py index 6cccc2fb552..6da2455764b 100644 --- a/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.py +++ b/prowler/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_ebs_public_snapshot(Check): diff --git a/providers/aws/services/ec2/ec2_elastic_ip_unassgined/__init__.py b/prowler/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_elastic_ip_unassgined/__init__.py rename to prowler/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/__init__.py diff --git a/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.metadata.json b/prowler/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.metadata.json rename to prowler/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.metadata.json diff --git a/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.py b/prowler/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.py similarity index 84% rename from providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.py rename to prowler/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.py index de944874066..e0b5035e77e 100644 --- a/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.py +++ b/prowler/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_ebs_snapshots_encrypted(Check): diff --git a/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/__init__.py b/prowler/providers/aws/services/ec2/ec2_ebs_volume_encryption/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_instance_imdsv2_enabled/__init__.py rename to prowler/providers/aws/services/ec2/ec2_ebs_volume_encryption/__init__.py diff --git a/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.metadata.json b/prowler/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.metadata.json rename to prowler/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.metadata.json diff --git a/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.py b/prowler/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.py similarity index 83% rename from providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.py rename to prowler/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.py index 3a8eebdbe0e..f5289115626 100644 --- a/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.py +++ b/prowler/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_ebs_volume_encryption(Check): diff --git a/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/__init__.py b/prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/__init__.py rename to prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/__init__.py diff --git a/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.metadata.json b/prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.metadata.json rename to prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.metadata.json index e898ca10b9e..7dab33bb700 100644 --- a/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.py b/prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.py similarity index 88% rename from providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.py rename to prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.py index 9f276abf3a8..1d00ed24237 100644 --- a/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.py +++ b/prowler/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan.py @@ -1,9 +1,9 @@ import shodan -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from lib.logger import logger -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.lib.logger import logger +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_elastic_ip_shodan(Check): diff --git a/providers/aws/services/ec2/ec2_instance_managed_by_ssm/__init__.py b/prowler/providers/aws/services/ec2/ec2_elastic_ip_unassgined/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_instance_managed_by_ssm/__init__.py rename to prowler/providers/aws/services/ec2/ec2_elastic_ip_unassgined/__init__.py diff --git a/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.metadata.json b/prowler/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.metadata.json rename to prowler/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.metadata.json diff --git a/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.py b/prowler/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.py similarity index 85% rename from providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.py rename to prowler/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.py index 306ed1b6ae3..34ad9707dd0 100644 --- a/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.py +++ b/prowler/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_elastic_ip_unassgined(Check): diff --git a/providers/aws/services/ec2/ec2_instance_older_than_specific_days/__init__.py b/prowler/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_instance_older_than_specific_days/__init__.py rename to prowler/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/__init__.py diff --git a/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.metadata.json b/prowler/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.metadata.json rename to prowler/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.metadata.json diff --git a/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.py b/prowler/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.py similarity index 86% rename from providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.py rename to prowler/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.py index d795dc152bf..dc8ab884f3d 100644 --- a/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.py +++ b/prowler/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_instance_imdsv2_enabled(Check): diff --git a/providers/aws/services/ec2/ec2_instance_profile_attached/__init__.py b/prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_instance_profile_attached/__init__.py rename to prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/__init__.py diff --git a/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.metadata.json b/prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.metadata.json rename to prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.metadata.json index f2427ceadb0..168fb1a3381 100644 --- a/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.py b/prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.py similarity index 86% rename from providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.py rename to prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.py index cd23f035ad1..153cf8ac4f0 100644 --- a/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.py +++ b/prowler/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_instance_internet_facing_with_instance_profile(Check): diff --git a/providers/aws/services/ec2/ec2_instance_public_ip/__init__.py b/prowler/providers/aws/services/ec2/ec2_instance_managed_by_ssm/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_instance_public_ip/__init__.py rename to prowler/providers/aws/services/ec2/ec2_instance_managed_by_ssm/__init__.py diff --git a/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.metadata.json b/prowler/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.metadata.json rename to prowler/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.metadata.json diff --git a/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.py b/prowler/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.py similarity index 81% rename from providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.py rename to prowler/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.py index e47890babe0..cf1ce06c54d 100644 --- a/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.py +++ b/prowler/providers/aws/services/ec2/ec2_instance_managed_by_ssm/ec2_instance_managed_by_ssm.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ssm.ssm_client import ssm_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ssm.ssm_client import ssm_client class ec2_instance_managed_by_ssm(Check): diff --git a/providers/aws/services/ec2/ec2_instance_secrets_user_data/__init__.py b/prowler/providers/aws/services/ec2/ec2_instance_older_than_specific_days/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_instance_secrets_user_data/__init__.py rename to prowler/providers/aws/services/ec2/ec2_instance_older_than_specific_days/__init__.py diff --git a/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.metadata.json b/prowler/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.metadata.json rename to prowler/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.metadata.json diff --git a/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.py b/prowler/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.py similarity index 87% rename from providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.py rename to prowler/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.py index 27bf9f96b50..7646deb0e8a 100644 --- a/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.py +++ b/prowler/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days.py @@ -1,8 +1,8 @@ from datetime import datetime, timezone -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_instance_older_than_specific_days(Check): diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/__init__.py b/prowler/providers/aws/services/ec2/ec2_instance_profile_attached/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/__init__.py rename to prowler/providers/aws/services/ec2/ec2_instance_profile_attached/__init__.py diff --git a/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.metadata.json b/prowler/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.metadata.json rename to prowler/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.metadata.json diff --git a/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.py b/prowler/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.py similarity index 84% rename from providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.py rename to prowler/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.py index 5cf832b786d..a26123135db 100644 --- a/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.py +++ b/prowler/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_instance_profile_attached(Check): diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/__init__.py b/prowler/providers/aws/services/ec2/ec2_instance_public_ip/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/__init__.py rename to prowler/providers/aws/services/ec2/ec2_instance_public_ip/__init__.py diff --git a/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.metadata.json b/prowler/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.metadata.json rename to prowler/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.metadata.json index af1c4d2a88b..24bcc133426 100644 --- a/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.py b/prowler/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.py similarity index 86% rename from providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.py rename to prowler/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.py index 90ecb3bbade..fd481c74d2a 100644 --- a/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.py +++ b/prowler/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_instance_public_ip(Check): diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/__init__.py b/prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/__init__.py rename to prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/__init__.py diff --git a/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.metadata.json b/prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.metadata.json rename to prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.metadata.json diff --git a/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.py b/prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.py similarity index 92% rename from providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.py rename to prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.py index 184c007604c..e65211ae751 100644 --- a/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.py +++ b/prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data.py @@ -5,8 +5,8 @@ from detect_secrets import SecretsCollection from detect_secrets.settings import default_settings -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_instance_secrets_user_data(Check): diff --git a/providers/aws/services/ec2/ec2_instance_secrets_user_data/fixtures/fixture b/prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/fixtures/fixture similarity index 100% rename from providers/aws/services/ec2/ec2_instance_secrets_user_data/fixtures/fixture rename to prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/fixtures/fixture diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/__init__.py b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/__init__.py rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/__init__.py diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.metadata.json b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.metadata.json rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.metadata.json index e90d0b8cdad..7934331c431 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "Infrastructure Security" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.py b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.py similarity index 81% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.py rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.py index b64c27c7443..6e277f68db4 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.py +++ b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.network_acls import check_network_acl +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.network_acls import check_network_acl class ec2_networkacl_allow_ingress_any_port(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/__init__.py b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/__init__.py rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/__init__.py diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.metadata.json b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.metadata.json rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.metadata.json index 51d6ce56282..5d6c7584c94 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.py b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.py similarity index 82% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.py rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.py index a6c13a6aeab..f59d7a77a00 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.py +++ b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.network_acls import check_network_acl +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.network_acls import check_network_acl class ec2_networkacl_allow_ingress_tcp_port_22(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/__init__.py b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/__init__.py rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/__init__.py diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.metadata.json b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.metadata.json rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.metadata.json index c79390e7781..bb2e27b8dd4 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.py b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.py similarity index 82% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.py rename to prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.py index 0e1d664b813..b685f5957a9 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.py +++ b/prowler/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.network_acls import check_network_acl +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.network_acls import check_network_acl class ec2_networkacl_allow_ingress_tcp_port_3389(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.metadata.json index 86078787c95..26cd1073a65 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.py similarity index 82% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.py index 632857d8444..3c907eabdae 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_any_port(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.metadata.json index 18a70182cde..0db0accd71e 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.py index d08146e6e4c..55f775a470e 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.metadata.json index 3b70ba80808..3e9cd7f6fc6 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.py index 15d6a83f8ad..5acb94ac3b2 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.metadata.json index 30513df7b7a..873797279d4 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.py index 33a5d8f39db..64d22c1f852 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.metadata.json index 88369cd060d..770956dc0b1 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.py index eddbe9083f6..c8361f5dadf 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.metadata.json index 23e4f760e2e..c2b54c61fef 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.py index 83c9a250384..a8f0bb3811c 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888( diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.metadata.json index cff99193d8a..f1ccd5959f8 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.py index 9f27cc03558..02e95e972ea 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601( diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.metadata.json index 22a8844513c..6a5bfa83a0c 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.py index 22c96ac334f..730bd6c296e 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.metadata.json index 118e9f2acc6..fa11c0d5dda 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.py index ae6810de7dd..5e6edc35638 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.metadata.json index d7bba222f22..97cc79c8e1c 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.py index d517d390029..945f7d82799 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.metadata.json index 8feafe49225..bcb6c693516 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.py index 27eeccb1936..74816ab539b 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.metadata.json index abed1cea711..7c8e3a52d76 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.py index 741f2179485..c166fd50a6e 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.metadata.json index 78ce0daa1d9..2ec298fead8 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.py index 5e88545fc0b..a65d3730465 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.metadata.json index 40d38db4fc3..b3e53847323 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.py index d8ad9ffbf0c..a69ee8760df 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434( diff --git a/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.metadata.json index 43437b4989c..4b06f10d133 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.py similarity index 83% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.py index 2c71ffa04dc..fe438c485df 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.metadata.json index 18dccfec44c..daabd4bb0ad 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.py similarity index 94% rename from providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.py index f2d5dec6881..324fb66c58d 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4.py @@ -1,7 +1,7 @@ import ipaddress -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_securitygroup_allow_wide_open_public_ipv4(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_not_used/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_not_used/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.metadata.json diff --git a/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.py similarity index 82% rename from providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.py index d93dfaad5d7..7d2eb59858a 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_default_restrict_traffic(Check): diff --git a/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/__init__.py similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.metadata.json diff --git a/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.py similarity index 86% rename from providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.py index 65faace532a..2b98ce13b07 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_securitygroup_from_launch_wizard(Check): diff --git a/providers/aws/services/ec2/lib/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/__init__.py similarity index 100% rename from providers/aws/services/ec2/lib/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.metadata.json similarity index 99% rename from providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.metadata.json index 28984c17927..b72a05d1641 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.metadata.json +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.py index e36688dc02e..cd1f11bcad2 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group class ec2_securitygroup_in_use_without_ingress_filtering(Check): diff --git a/providers/aws/services/ecr/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_not_used/__init__.py similarity index 100% rename from providers/aws/services/ecr/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_not_used/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.metadata.json diff --git a/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.py similarity index 85% rename from providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.py index b6543384582..60295dc0d06 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_securitygroup_not_used(Check): diff --git a/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/__init__.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/__init__.py similarity index 100% rename from providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/__init__.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/__init__.py diff --git a/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.metadata.json b/prowler/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.metadata.json similarity index 100% rename from providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.metadata.json rename to prowler/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.metadata.json diff --git a/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.py b/prowler/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.py similarity index 84% rename from providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.py rename to prowler/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.py index b9101ad5ade..9f4b20fb85d 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.py +++ b/prowler/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules.py @@ -1,6 +1,6 @@ -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client class ec2_securitygroup_with_many_ingress_egress_rules(Check): diff --git a/providers/aws/services/ec2/ec2_service.py b/prowler/providers/aws/services/ec2/ec2_service.py similarity index 99% rename from providers/aws/services/ec2/ec2_service.py rename to prowler/providers/aws/services/ec2/ec2_service.py index f19fd6e4da3..a5db977ab5a 100644 --- a/providers/aws/services/ec2/ec2_service.py +++ b/prowler/providers/aws/services/ec2/ec2_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## EC2 diff --git a/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/ec2/lib/__init__.py similarity index 100% rename from providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/ec2/lib/__init__.py diff --git a/providers/aws/services/ec2/lib/network_acls.py b/prowler/providers/aws/services/ec2/lib/network_acls.py similarity index 100% rename from providers/aws/services/ec2/lib/network_acls.py rename to prowler/providers/aws/services/ec2/lib/network_acls.py diff --git a/providers/aws/services/ec2/lib/security_groups.py b/prowler/providers/aws/services/ec2/lib/security_groups.py similarity index 100% rename from providers/aws/services/ec2/lib/security_groups.py rename to prowler/providers/aws/services/ec2/lib/security_groups.py diff --git a/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/__init__.py b/prowler/providers/aws/services/ecr/__init__.py similarity index 100% rename from providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/__init__.py rename to prowler/providers/aws/services/ecr/__init__.py diff --git a/prowler/providers/aws/services/ecr/ecr_client.py b/prowler/providers/aws/services/ecr/ecr_client.py new file mode 100644 index 00000000000..d9775a9c367 --- /dev/null +++ b/prowler/providers/aws/services/ecr/ecr_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.ecr.ecr_service import ECR + +ecr_client = ECR(current_audit_info) diff --git a/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/__init__.py b/prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/__init__.py similarity index 100% rename from providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/__init__.py rename to prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/__init__.py diff --git a/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.metadata.json b/prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.metadata.json similarity index 100% rename from providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.metadata.json rename to prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.metadata.json diff --git a/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.py b/prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.py similarity index 86% rename from providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.py rename to prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.py index e294c4b6202..959e2ca8809 100644 --- a/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.py +++ b/prowler/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ecr.ecr_client import ecr_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ecr.ecr_client import ecr_client class ecr_repositories_lifecycle_policy_enabled(Check): diff --git a/providers/aws/services/ecs/__init__.py b/prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/ecs/__init__.py rename to prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.metadata.json index d1affd261b1..ce687151510 100644 --- a/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.metadata.json @@ -36,4 +36,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.py b/prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.py similarity index 90% rename from providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.py rename to prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.py index 197c8310cb6..3596dfdcd67 100644 --- a/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.py +++ b/prowler/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ecr.ecr_client import ecr_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ecr.ecr_client import ecr_client class ecr_repositories_not_publicly_accessible(Check): diff --git a/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/__init__.py b/prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/__init__.py similarity index 100% rename from providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/__init__.py rename to prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/__init__.py diff --git a/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.metadata.json b/prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.metadata.json similarity index 100% rename from providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.metadata.json rename to prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.metadata.json diff --git a/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.py b/prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.py similarity index 86% rename from providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.py rename to prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.py index 3ea725e814a..c880eb3bd05 100644 --- a/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.py +++ b/prowler/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ecr.ecr_client import ecr_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ecr.ecr_client import ecr_client class ecr_repositories_scan_images_on_push_enabled(Check): diff --git a/providers/aws/services/efs/__init__.py b/prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/__init__.py similarity index 100% rename from providers/aws/services/efs/__init__.py rename to prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/__init__.py diff --git a/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.metadata.json b/prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.metadata.json similarity index 100% rename from providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.metadata.json rename to prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.metadata.json diff --git a/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.py b/prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.py similarity index 93% rename from providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.py rename to prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.py index 5a6e68c05a5..4335972d52a 100644 --- a/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.py +++ b/prowler/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ecr.ecr_client import ecr_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ecr.ecr_client import ecr_client class ecr_repositories_scan_vulnerabilities_in_latest_image(Check): diff --git a/providers/aws/services/ecr/ecr_service.py b/prowler/providers/aws/services/ecr/ecr_service.py similarity index 98% rename from providers/aws/services/ecr/ecr_service.py rename to prowler/providers/aws/services/ecr/ecr_service.py index da9fe902031..62b01520a68 100644 --- a/providers/aws/services/ecr/ecr_service.py +++ b/prowler/providers/aws/services/ecr/ecr_service.py @@ -2,8 +2,8 @@ from dataclasses import dataclass from json import loads -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ ECR diff --git a/providers/aws/services/efs/efs_encryption_at_rest_enabled/__init__.py b/prowler/providers/aws/services/ecs/__init__.py similarity index 100% rename from providers/aws/services/efs/efs_encryption_at_rest_enabled/__init__.py rename to prowler/providers/aws/services/ecs/__init__.py diff --git a/prowler/providers/aws/services/ecs/ecs_client.py b/prowler/providers/aws/services/ecs/ecs_client.py new file mode 100644 index 00000000000..5f9d59c1be2 --- /dev/null +++ b/prowler/providers/aws/services/ecs/ecs_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.ecs.ecs_service import ECS + +ecs_client = ECS(current_audit_info) diff --git a/providers/aws/services/ecs/ecs_service.py b/prowler/providers/aws/services/ecs/ecs_service.py similarity index 96% rename from providers/aws/services/ecs/ecs_service.py rename to prowler/providers/aws/services/ecs/ecs_service.py index ebca98d60e7..d017e933418 100644 --- a/providers/aws/services/ecs/ecs_service.py +++ b/prowler/providers/aws/services/ecs/ecs_service.py @@ -3,8 +3,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ ECS diff --git a/providers/aws/services/efs/efs_have_backup_enabled/__init__.py b/prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/__init__.py similarity index 100% rename from providers/aws/services/efs/efs_have_backup_enabled/__init__.py rename to prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/__init__.py diff --git a/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.metadata.json b/prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.metadata.json similarity index 100% rename from providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.metadata.json rename to prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.metadata.json diff --git a/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.py b/prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.py similarity index 92% rename from providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.py rename to prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.py index 8cae04d31be..0df3cf328c8 100644 --- a/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.py +++ b/prowler/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets.py @@ -5,8 +5,8 @@ from detect_secrets import SecretsCollection from detect_secrets.settings import default_settings -from lib.check.models import Check, Check_Report -from providers.aws.services.ecs.ecs_client import ecs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ecs.ecs_client import ecs_client class ecs_task_definitions_no_environment_secrets(Check): diff --git a/providers/aws/services/efs/efs_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/efs/__init__.py similarity index 100% rename from providers/aws/services/efs/efs_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/efs/__init__.py diff --git a/prowler/providers/aws/services/efs/efs_client.py b/prowler/providers/aws/services/efs/efs_client.py new file mode 100644 index 00000000000..00e71cdc8fa --- /dev/null +++ b/prowler/providers/aws/services/efs/efs_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.efs.efs_service import EFS + +efs_client = EFS(current_audit_info) diff --git a/providers/aws/services/eks/__init__.py b/prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/__init__.py similarity index 100% rename from providers/aws/services/eks/__init__.py rename to prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/__init__.py diff --git a/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.metadata.json b/prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.metadata.json similarity index 100% rename from providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.metadata.json rename to prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.metadata.json diff --git a/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.py b/prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.py similarity index 84% rename from providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.py rename to prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.py index cd1ff8b2a2e..20d654fb262 100644 --- a/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.py +++ b/prowler/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.efs.efs_client import efs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.efs.efs_client import efs_client class efs_encryption_at_rest_enabled(Check): diff --git a/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/__init__.py b/prowler/providers/aws/services/efs/efs_have_backup_enabled/__init__.py similarity index 100% rename from providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/__init__.py rename to prowler/providers/aws/services/efs/efs_have_backup_enabled/__init__.py diff --git a/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.metadata.json b/prowler/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.metadata.json similarity index 100% rename from providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.metadata.json rename to prowler/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.metadata.json diff --git a/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.py b/prowler/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.py similarity index 84% rename from providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.py rename to prowler/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.py index 1d06b572ca0..7fee927046f 100644 --- a/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.py +++ b/prowler/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.efs.efs_client import efs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.efs.efs_client import efs_client class efs_have_backup_enabled(Check): diff --git a/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/__init__.py b/prowler/providers/aws/services/efs/efs_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/__init__.py rename to prowler/providers/aws/services/efs/efs_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.metadata.json similarity index 100% rename from providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.metadata.json diff --git a/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.py b/prowler/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.py similarity index 92% rename from providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.py rename to prowler/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.py index 2427c744bef..1d721796a44 100644 --- a/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.py +++ b/prowler/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.efs.efs_client import efs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.efs.efs_client import efs_client class efs_not_publicly_accessible(Check): diff --git a/providers/aws/services/efs/efs_service.py b/prowler/providers/aws/services/efs/efs_service.py similarity index 96% rename from providers/aws/services/efs/efs_service.py rename to prowler/providers/aws/services/efs/efs_service.py index cecc51e80d6..ec842f753d7 100644 --- a/providers/aws/services/efs/efs_service.py +++ b/prowler/providers/aws/services/efs/efs_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################### EFS diff --git a/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/__init__.py b/prowler/providers/aws/services/eks/__init__.py similarity index 100% rename from providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/__init__.py rename to prowler/providers/aws/services/eks/__init__.py diff --git a/prowler/providers/aws/services/eks/eks_client.py b/prowler/providers/aws/services/eks/eks_client.py new file mode 100644 index 00000000000..4eaad652086 --- /dev/null +++ b/prowler/providers/aws/services/eks/eks_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.eks.eks_service import EKS + +eks_client = EKS(current_audit_info) diff --git a/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/__init__.py similarity index 100% rename from providers/aws/services/eks/eks_endpoints_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/__init__.py diff --git a/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.metadata.json b/prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.metadata.json similarity index 100% rename from providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.metadata.json rename to prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.metadata.json diff --git a/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.py b/prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.py similarity index 86% rename from providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.py rename to prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.py index 4029002434c..ad7dcf6860e 100644 --- a/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.py +++ b/prowler/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.eks.eks_client import eks_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.eks.eks_client import eks_client class eks_cluster_kms_cmk_encryption_in_secrets_enabled(Check): diff --git a/providers/aws/services/elb/__init__.py b/prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/__init__.py similarity index 100% rename from providers/aws/services/elb/__init__.py rename to prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/__init__.py diff --git a/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.metadata.json b/prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.metadata.json similarity index 99% rename from providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.metadata.json rename to prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.metadata.json index 501da15127e..f840cf1da25 100644 --- a/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.metadata.json +++ b/prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.py b/prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.py similarity index 89% rename from providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.py rename to prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.py index 76e34a19d77..d7727729e17 100644 --- a/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.py +++ b/prowler/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.eks.eks_client import eks_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.eks.eks_client import eks_client class eks_control_plane_endpoint_access_restricted(Check): diff --git a/providers/aws/services/elb/elb_insecure_ssl_ciphers/__init__.py b/prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/__init__.py similarity index 100% rename from providers/aws/services/elb/elb_insecure_ssl_ciphers/__init__.py rename to prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/__init__.py diff --git a/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.metadata.json b/prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.metadata.json similarity index 99% rename from providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.metadata.json rename to prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.metadata.json index 9d7b211a65e..826f8fa96eb 100644 --- a/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.metadata.json +++ b/prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.py b/prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.py similarity index 91% rename from providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.py rename to prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.py index 55e68be365b..11407ce3eb0 100644 --- a/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.py +++ b/prowler/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.eks.eks_client import eks_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.eks.eks_client import eks_client class eks_control_plane_logging_all_types_enabled(Check): diff --git a/providers/aws/services/elb/elb_internet_facing/__init__.py b/prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/elb/elb_internet_facing/__init__.py rename to prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.metadata.json index 0ccef92e6cd..316aeeef582 100644 --- a/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.metadata.json @@ -37,4 +37,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.py b/prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.py similarity index 86% rename from providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.py rename to prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.py index 54d86bbc04d..9ce3f6f2168 100644 --- a/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.py +++ b/prowler/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.eks.eks_client import eks_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.eks.eks_client import eks_client class eks_endpoints_not_publicly_accessible(Check): diff --git a/providers/aws/services/eks/eks_service.py b/prowler/providers/aws/services/eks/eks_service.py similarity index 97% rename from providers/aws/services/eks/eks_service.py rename to prowler/providers/aws/services/eks/eks_service.py index b35b37b8568..78079594da5 100644 --- a/providers/aws/services/eks/eks_service.py +++ b/prowler/providers/aws/services/eks/eks_service.py @@ -2,8 +2,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ EKS diff --git a/providers/aws/services/elb/elb_logging_enabled/__init__.py b/prowler/providers/aws/services/elb/__init__.py similarity index 100% rename from providers/aws/services/elb/elb_logging_enabled/__init__.py rename to prowler/providers/aws/services/elb/__init__.py diff --git a/prowler/providers/aws/services/elb/elb_client.py b/prowler/providers/aws/services/elb/elb_client.py new file mode 100644 index 00000000000..25c46956409 --- /dev/null +++ b/prowler/providers/aws/services/elb/elb_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.elb.elb_service import ELB + +elb_client = ELB(current_audit_info) diff --git a/providers/aws/services/elb/elb_ssl_listeners/__init__.py b/prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/__init__.py similarity index 100% rename from providers/aws/services/elb/elb_ssl_listeners/__init__.py rename to prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/__init__.py diff --git a/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.metadata.json b/prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.metadata.json similarity index 100% rename from providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.metadata.json rename to prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.metadata.json diff --git a/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.py b/prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.py similarity index 88% rename from providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.py rename to prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.py index 5a27cb066d1..2d07a5e1b19 100644 --- a/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.py +++ b/prowler/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elb.elb_client import elb_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elb.elb_client import elb_client class elb_insecure_ssl_ciphers(Check): diff --git a/providers/aws/services/elbv2/__init__.py b/prowler/providers/aws/services/elb/elb_internet_facing/__init__.py similarity index 100% rename from providers/aws/services/elbv2/__init__.py rename to prowler/providers/aws/services/elb/elb_internet_facing/__init__.py diff --git a/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.metadata.json b/prowler/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.metadata.json similarity index 100% rename from providers/aws/services/elb/elb_internet_facing/elb_internet_facing.metadata.json rename to prowler/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.metadata.json diff --git a/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.py b/prowler/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.py similarity index 83% rename from providers/aws/services/elb/elb_internet_facing/elb_internet_facing.py rename to prowler/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.py index 94b06c2384d..b12c228192a 100644 --- a/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.py +++ b/prowler/providers/aws/services/elb/elb_internet_facing/elb_internet_facing.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elb.elb_client import elb_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elb.elb_client import elb_client class elb_internet_facing(Check): diff --git a/providers/aws/services/elbv2/elbv2_deletion_protection/__init__.py b/prowler/providers/aws/services/elb/elb_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_deletion_protection/__init__.py rename to prowler/providers/aws/services/elb/elb_logging_enabled/__init__.py diff --git a/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.metadata.json b/prowler/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.metadata.json rename to prowler/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.metadata.json index 26f3aec0ca2..8876fc47b24 100644 --- a/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.py b/prowler/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.py similarity index 83% rename from providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.py rename to prowler/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.py index 9bd698ee00f..f28bfff669c 100644 --- a/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.py +++ b/prowler/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elb.elb_client import elb_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elb.elb_client import elb_client class elb_logging_enabled(Check): diff --git a/providers/aws/services/elb/elb_service.py b/prowler/providers/aws/services/elb/elb_service.py similarity index 96% rename from providers/aws/services/elb/elb_service.py rename to prowler/providers/aws/services/elb/elb_service.py index a2c8231a7f5..0f8b6187220 100644 --- a/providers/aws/services/elb/elb_service.py +++ b/prowler/providers/aws/services/elb/elb_service.py @@ -3,8 +3,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################### ELB diff --git a/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/__init__.py b/prowler/providers/aws/services/elb/elb_ssl_listeners/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_desync_mitigation_mode/__init__.py rename to prowler/providers/aws/services/elb/elb_ssl_listeners/__init__.py diff --git a/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.metadata.json b/prowler/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.metadata.json similarity index 100% rename from providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.metadata.json rename to prowler/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.metadata.json diff --git a/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.py b/prowler/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.py similarity index 85% rename from providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.py rename to prowler/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.py index 6db3097830f..0f37f187933 100644 --- a/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.py +++ b/prowler/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elb.elb_client import elb_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elb.elb_client import elb_client class elb_ssl_listeners(Check): diff --git a/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/__init__.py b/prowler/providers/aws/services/elbv2/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/__init__.py rename to prowler/providers/aws/services/elbv2/__init__.py diff --git a/prowler/providers/aws/services/elbv2/elbv2_client.py b/prowler/providers/aws/services/elbv2/elbv2_client.py new file mode 100644 index 00000000000..4b4cfe6e7ac --- /dev/null +++ b/prowler/providers/aws/services/elbv2/elbv2_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 + +elbv2_client = ELBv2(current_audit_info) diff --git a/providers/aws/services/elbv2/elbv2_internet_facing/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_deletion_protection/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_internet_facing/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_deletion_protection/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.py b/prowler/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.py similarity index 84% rename from providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.py rename to prowler/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.py index 9d16c649528..5c02e272c7c 100644 --- a/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.py +++ b/prowler/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_deletion_protection(Check): diff --git a/providers/aws/services/elbv2/elbv2_listeners_underneath/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_listeners_underneath/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.py b/prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.py similarity index 86% rename from providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.py rename to prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.py index 77878e81555..576bb707a9f 100644 --- a/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.py +++ b/prowler/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_desync_mitigation_mode(Check): diff --git a/providers/aws/services/elbv2/elbv2_logging_enabled/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_logging_enabled/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py b/prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py similarity index 91% rename from providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py rename to prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py index fcd47cab779..61634ae22a1 100644 --- a/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py +++ b/prowler/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_insecure_ssl_ciphers(Check): diff --git a/providers/aws/services/elbv2/elbv2_request_smugling/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_internet_facing/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_request_smugling/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_internet_facing/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.metadata.json similarity index 99% rename from providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.metadata.json index 592957cc7cc..11921f8d9a2 100644 --- a/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.metadata.json +++ b/prowler/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.py b/prowler/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.py similarity index 84% rename from providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.py rename to prowler/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.py index 807116b171c..e2013439f79 100644 --- a/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.py +++ b/prowler/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_internet_facing(Check): diff --git a/providers/aws/services/elbv2/elbv2_ssl_listeners/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_ssl_listeners/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.py b/prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.py similarity index 83% rename from providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.py rename to prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.py index e753fac5ec5..f560f9eeea4 100644 --- a/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.py +++ b/prowler/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_listeners_underneath(Check): diff --git a/providers/aws/services/elbv2/elbv2_waf_acl_attached/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/elbv2/elbv2_waf_acl_attached/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_logging_enabled/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.py b/prowler/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.py similarity index 84% rename from providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.py rename to prowler/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.py index 4dd0abfa8fe..4293ce62abf 100644 --- a/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.py +++ b/prowler/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_logging_enabled(Check): diff --git a/providers/aws/services/emr/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_request_smugling/__init__.py similarity index 100% rename from providers/aws/services/emr/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_request_smugling/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.py b/prowler/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.py similarity index 86% rename from providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.py rename to prowler/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.py index 75e2b8e8ca8..8552fdaf4ae 100644 --- a/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.py +++ b/prowler/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_request_smugling(Check): diff --git a/providers/aws/services/elbv2/elbv2_service.py b/prowler/providers/aws/services/elbv2/elbv2_service.py similarity index 98% rename from providers/aws/services/elbv2/elbv2_service.py rename to prowler/providers/aws/services/elbv2/elbv2_service.py index ddb01d87e09..f432de06b2d 100644 --- a/providers/aws/services/elbv2/elbv2_service.py +++ b/prowler/providers/aws/services/elbv2/elbv2_service.py @@ -3,8 +3,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################### ELBv2 diff --git a/providers/aws/services/emr/emr_cluster_account_public_block_enabled/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/__init__.py similarity index 100% rename from providers/aws/services/emr/emr_cluster_account_public_block_enabled/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.py b/prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.py similarity index 91% rename from providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.py rename to prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.py index 4b8b83fbb1e..60b7d7b50bb 100644 --- a/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.py +++ b/prowler/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client class elbv2_ssl_listeners(Check): diff --git a/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/__init__.py b/prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/__init__.py similarity index 100% rename from providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/__init__.py rename to prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/__init__.py diff --git a/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.metadata.json b/prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.metadata.json similarity index 100% rename from providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.metadata.json rename to prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.metadata.json diff --git a/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.py b/prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.py similarity index 80% rename from providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.py rename to prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.py index b596f1d4b29..ace3efb12da 100644 --- a/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.py +++ b/prowler/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached.py @@ -1,7 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client -from providers.aws.services.waf.waf_client import waf_client -from providers.aws.services.wafv2.wafv2_client import wafv2_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.providers.aws.services.waf.waf_client import waf_client +from prowler.providers.aws.services.wafv2.wafv2_client import wafv2_client class elbv2_waf_acl_attached(Check): diff --git a/providers/aws/services/emr/emr_cluster_publicly_accesible/__init__.py b/prowler/providers/aws/services/emr/__init__.py similarity index 100% rename from providers/aws/services/emr/emr_cluster_publicly_accesible/__init__.py rename to prowler/providers/aws/services/emr/__init__.py diff --git a/prowler/providers/aws/services/emr/emr_client.py b/prowler/providers/aws/services/emr/emr_client.py new file mode 100644 index 00000000000..ce022feea56 --- /dev/null +++ b/prowler/providers/aws/services/emr/emr_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.emr.emr_service import EMR + +emr_client = EMR(current_audit_info) diff --git a/providers/aws/services/glacier/__init__.py b/prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/__init__.py similarity index 100% rename from providers/aws/services/glacier/__init__.py rename to prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/__init__.py diff --git a/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.metadata.json b/prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.metadata.json similarity index 100% rename from providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.metadata.json rename to prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.metadata.json diff --git a/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.py b/prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.py similarity index 86% rename from providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.py rename to prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.py index 01a216d2e74..33a94a09f0c 100644 --- a/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.py +++ b/prowler/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.emr.emr_client import emr_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.emr.emr_client import emr_client class emr_cluster_account_public_block_enabled(Check): diff --git a/providers/aws/services/glacier/glacier_vaults_policy_public_access/__init__.py b/prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/__init__.py similarity index 100% rename from providers/aws/services/glacier/glacier_vaults_policy_public_access/__init__.py rename to prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/__init__.py diff --git a/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.metadata.json b/prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.metadata.json similarity index 100% rename from providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.metadata.json rename to prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.metadata.json diff --git a/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.py b/prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.py similarity index 82% rename from providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.py rename to prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.py index b4df38c0a64..db02f10e1d4 100644 --- a/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.py +++ b/prowler/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.emr.emr_client import emr_client -from providers.aws.services.emr.emr_service import ClusterStatus +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.emr.emr_client import emr_client +from prowler.providers.aws.services.emr.emr_service import ClusterStatus class emr_cluster_master_nodes_no_public_ip(Check): diff --git a/providers/aws/services/globalaccelerator/__init__.py b/prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/__init__.py similarity index 100% rename from providers/aws/services/globalaccelerator/__init__.py rename to prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/__init__.py diff --git a/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.metadata.json b/prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.metadata.json similarity index 100% rename from providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.metadata.json rename to prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.metadata.json diff --git a/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.py b/prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.py similarity index 91% rename from providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.py rename to prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.py index a26735419dd..6a7d2e06be4 100644 --- a/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.py +++ b/prowler/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible.py @@ -1,10 +1,10 @@ from copy import deepcopy -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.ec2.lib.security_groups import check_security_group -from providers.aws.services.emr.emr_client import emr_client -from providers.aws.services.emr.emr_service import ClusterStatus +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.ec2.lib.security_groups import check_security_group +from prowler.providers.aws.services.emr.emr_client import emr_client +from prowler.providers.aws.services.emr.emr_service import ClusterStatus class emr_cluster_publicly_accesible(Check): diff --git a/providers/aws/services/emr/emr_service.py b/prowler/providers/aws/services/emr/emr_service.py similarity index 98% rename from providers/aws/services/emr/emr_service.py rename to prowler/providers/aws/services/emr/emr_service.py index a92f42b3819..6826a04f27e 100644 --- a/providers/aws/services/emr/emr_service.py +++ b/prowler/providers/aws/services/emr/emr_service.py @@ -3,8 +3,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## EMR diff --git a/providers/aws/services/glue/__init__.py b/prowler/providers/aws/services/glacier/__init__.py similarity index 100% rename from providers/aws/services/glue/__init__.py rename to prowler/providers/aws/services/glacier/__init__.py diff --git a/prowler/providers/aws/services/glacier/glacier_client.py b/prowler/providers/aws/services/glacier/glacier_client.py new file mode 100644 index 00000000000..a099cd9ce2d --- /dev/null +++ b/prowler/providers/aws/services/glacier/glacier_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.glacier.glacier_service import Glacier + +glacier_client = Glacier(current_audit_info) diff --git a/providers/aws/services/glacier/glacier_service.py b/prowler/providers/aws/services/glacier/glacier_service.py similarity index 95% rename from providers/aws/services/glacier/glacier_service.py rename to prowler/providers/aws/services/glacier/glacier_service.py index e27261508e1..4e592c898c8 100644 --- a/providers/aws/services/glacier/glacier_service.py +++ b/prowler/providers/aws/services/glacier/glacier_service.py @@ -3,8 +3,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## Glacier diff --git a/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/__init__.py b/prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/__init__.py rename to prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/__init__.py diff --git a/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.metadata.json b/prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.metadata.json similarity index 100% rename from providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.metadata.json rename to prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.metadata.json diff --git a/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.py b/prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.py similarity index 92% rename from providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.py rename to prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.py index 62d67f794f7..a9137100da3 100644 --- a/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.py +++ b/prowler/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access.py @@ -1,7 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glacier.glacier_client import ( - glacier_client, -) +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glacier.glacier_client import glacier_client class glacier_vaults_policy_public_access(Check): diff --git a/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/__init__.py b/prowler/providers/aws/services/globalaccelerator/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/__init__.py rename to prowler/providers/aws/services/globalaccelerator/__init__.py diff --git a/prowler/providers/aws/services/globalaccelerator/globalaccelerator_client.py b/prowler/providers/aws/services/globalaccelerator/globalaccelerator_client.py new file mode 100644 index 00000000000..58991d16b69 --- /dev/null +++ b/prowler/providers/aws/services/globalaccelerator/globalaccelerator_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.globalaccelerator.globalaccelerator_service import ( + GlobalAccelerator, +) + +globalaccelerator_client = GlobalAccelerator(current_audit_info) diff --git a/providers/aws/services/globalaccelerator/globalaccelerator_service.py b/prowler/providers/aws/services/globalaccelerator/globalaccelerator_service.py similarity index 97% rename from providers/aws/services/globalaccelerator/globalaccelerator_service.py rename to prowler/providers/aws/services/globalaccelerator/globalaccelerator_service.py index 47a2d9f9aea..b0526b8e59e 100644 --- a/providers/aws/services/globalaccelerator/globalaccelerator_service.py +++ b/prowler/providers/aws/services/globalaccelerator/globalaccelerator_service.py @@ -1,6 +1,6 @@ from pydantic import BaseModel -from lib.logger import logger +from prowler.lib.logger import logger ################### GlobalAccelerator diff --git a/providers/aws/services/glue/glue_database_connections_ssl_enabled/__init__.py b/prowler/providers/aws/services/glue/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_database_connections_ssl_enabled/__init__.py rename to prowler/providers/aws/services/glue/__init__.py diff --git a/prowler/providers/aws/services/glue/glue_client.py b/prowler/providers/aws/services/glue/glue_client.py new file mode 100644 index 00000000000..4647967fec8 --- /dev/null +++ b/prowler/providers/aws/services/glue/glue_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.glue.glue_service import Glue + +glue_client = Glue(current_audit_info) diff --git a/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/__init__.py b/prowler/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/__init__.py rename to prowler/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.py similarity index 85% rename from providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.py index 0a7e20d8a5b..9c6f31eae96 100644 --- a/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_data_catalogs_connection_passwords_encryption_enabled(Check): diff --git a/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/__init__.py b/prowler/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/__init__.py rename to prowler/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.py similarity index 85% rename from providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.py index 78c444245f4..9ea333d43c1 100644 --- a/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_data_catalogs_metadata_encryption_enabled(Check): diff --git a/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/__init__.py b/prowler/providers/aws/services/glue/glue_database_connections_ssl_enabled/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/__init__.py rename to prowler/providers/aws/services/glue/glue_database_connections_ssl_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.py b/prowler/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.py similarity index 85% rename from providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.py rename to prowler/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.py index ad98fce4289..0c343c770da 100644 --- a/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.py +++ b/prowler/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_database_connections_ssl_enabled(Check): diff --git a/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/__init__.py b/prowler/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/__init__.py rename to prowler/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.py similarity index 90% rename from providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.py index 9b8fa09d50c..ee70bf4c56e 100644 --- a/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_development_endpoints_cloudwatch_logs_encryption_enabled(Check): diff --git a/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/__init__.py b/prowler/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/__init__.py rename to prowler/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.py similarity index 90% rename from providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.py index eb7cc9979d7..827d549ebb2 100644 --- a/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_development_endpoints_job_bookmark_encryption_enabled(Check): diff --git a/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/__init__.py b/prowler/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/__init__.py rename to prowler/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.py similarity index 90% rename from providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.py index 06464695b87..470219cf40a 100644 --- a/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_development_endpoints_s3_encryption_enabled(Check): diff --git a/providers/aws/services/guardduty/__init__.py b/prowler/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/guardduty/__init__.py rename to prowler/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.py similarity index 92% rename from providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.py index 002d9bdaa4a..0712a0dc7f7 100644 --- a/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_etl_jobs_amazon_s3_encryption_enabled(Check): diff --git a/providers/aws/services/guardduty/guardduty_is_enabled/__init__.py b/prowler/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/guardduty/guardduty_is_enabled/__init__.py rename to prowler/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.py similarity index 89% rename from providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.py index d12710737b4..1807aa5a2e2 100644 --- a/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_etl_jobs_cloudwatch_logs_encryption_enabled(Check): diff --git a/providers/aws/services/guardduty/guardduty_no_high_severity_findings/__init__.py b/prowler/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/guardduty/guardduty_no_high_severity_findings/__init__.py rename to prowler/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/__init__.py diff --git a/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.metadata.json b/prowler/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.metadata.json rename to prowler/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.metadata.json diff --git a/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.py b/prowler/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.py similarity index 89% rename from providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.py rename to prowler/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.py index c1d6ef88100..24a7c916828 100644 --- a/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.py +++ b/prowler/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.glue.glue_client import glue_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.glue.glue_client import glue_client class glue_etl_jobs_job_bookmark_encryption_enabled(Check): diff --git a/providers/aws/services/glue/glue_service.py b/prowler/providers/aws/services/glue/glue_service.py similarity index 98% rename from providers/aws/services/glue/glue_service.py rename to prowler/providers/aws/services/glue/glue_service.py index 6efb53a594a..c19833c6678 100644 --- a/providers/aws/services/glue/glue_service.py +++ b/prowler/providers/aws/services/glue/glue_service.py @@ -3,8 +3,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## Glue diff --git a/providers/aws/services/iam/__init__.py b/prowler/providers/aws/services/guardduty/__init__.py similarity index 100% rename from providers/aws/services/iam/__init__.py rename to prowler/providers/aws/services/guardduty/__init__.py diff --git a/prowler/providers/aws/services/guardduty/guardduty_client.py b/prowler/providers/aws/services/guardduty/guardduty_client.py new file mode 100644 index 00000000000..74320efcb2d --- /dev/null +++ b/prowler/providers/aws/services/guardduty/guardduty_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.guardduty.guardduty_service import GuardDuty + +guardduty_client = GuardDuty(current_audit_info) diff --git a/providers/aws/services/iam/iam_administrator_access_with_mfa/__init__.py b/prowler/providers/aws/services/guardduty/guardduty_is_enabled/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_administrator_access_with_mfa/__init__.py rename to prowler/providers/aws/services/guardduty/guardduty_is_enabled/__init__.py diff --git a/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.metadata.json b/prowler/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.metadata.json similarity index 99% rename from providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.metadata.json rename to prowler/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.metadata.json index 4e066951677..e467c27fe29 100644 --- a/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.metadata.json +++ b/prowler/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.py b/prowler/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.py similarity index 86% rename from providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.py rename to prowler/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.py index c6cfa3c45f9..e6d3715ec50 100644 --- a/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.py +++ b/prowler/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.guardduty.guardduty_client import guardduty_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.guardduty.guardduty_client import guardduty_client class guardduty_is_enabled(Check): diff --git a/providers/aws/services/iam/iam_avoid_root_usage/__init__.py b/prowler/providers/aws/services/guardduty/guardduty_no_high_severity_findings/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_avoid_root_usage/__init__.py rename to prowler/providers/aws/services/guardduty/guardduty_no_high_severity_findings/__init__.py diff --git a/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.metadata.json b/prowler/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.metadata.json similarity index 100% rename from providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.metadata.json rename to prowler/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.metadata.json diff --git a/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.py b/prowler/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.py similarity index 84% rename from providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.py rename to prowler/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.py index 9d321adfb31..4f71aa3d1a7 100644 --- a/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.py +++ b/prowler/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.guardduty.guardduty_client import guardduty_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.guardduty.guardduty_client import guardduty_client class guardduty_no_high_severity_findings(Check): diff --git a/providers/aws/services/guardduty/guardduty_service.py b/prowler/providers/aws/services/guardduty/guardduty_service.py similarity index 97% rename from providers/aws/services/guardduty/guardduty_service.py rename to prowler/providers/aws/services/guardduty/guardduty_service.py index 0516e178588..74151d94149 100644 --- a/providers/aws/services/guardduty/guardduty_service.py +++ b/prowler/providers/aws/services/guardduty/guardduty_service.py @@ -2,8 +2,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ GuardDuty diff --git a/providers/aws/services/iam/iam_check_saml_providers_sts/__init__.py b/prowler/providers/aws/services/iam/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_check_saml_providers_sts/__init__.py rename to prowler/providers/aws/services/iam/__init__.py diff --git a/providers/aws/services/iam/iam_disable_30_days_credentials/__init__.py b/prowler/providers/aws/services/iam/iam_administrator_access_with_mfa/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_disable_30_days_credentials/__init__.py rename to prowler/providers/aws/services/iam/iam_administrator_access_with_mfa/__init__.py diff --git a/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.metadata.json b/prowler/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.metadata.json rename to prowler/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.metadata.json diff --git a/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.py b/prowler/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.py similarity index 93% rename from providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.py rename to prowler/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.py index bd1e16e4fa5..5b962c36b2d 100644 --- a/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.py +++ b/prowler/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_administrator_access_with_mfa(Check): diff --git a/providers/aws/services/iam/iam_disable_45_days_credentials/__init__.py b/prowler/providers/aws/services/iam/iam_avoid_root_usage/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_disable_45_days_credentials/__init__.py rename to prowler/providers/aws/services/iam/iam_avoid_root_usage/__init__.py diff --git a/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.metadata.json b/prowler/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.metadata.json rename to prowler/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.metadata.json diff --git a/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.py b/prowler/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.py similarity index 95% rename from providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.py rename to prowler/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.py index 3a7c07213dd..867fc178975 100644 --- a/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.py +++ b/prowler/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage.py @@ -1,7 +1,7 @@ import datetime -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client maximum_access_days = 1 diff --git a/providers/aws/services/iam/iam_disable_90_days_credentials/__init__.py b/prowler/providers/aws/services/iam/iam_check_saml_providers_sts/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_disable_90_days_credentials/__init__.py rename to prowler/providers/aws/services/iam/iam_check_saml_providers_sts/__init__.py diff --git a/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.metadata.json b/prowler/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.metadata.json rename to prowler/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.metadata.json diff --git a/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.py b/prowler/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.py similarity index 82% rename from providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.py rename to prowler/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.py index 5872273af36..a88abb93508 100644 --- a/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.py +++ b/prowler/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_check_saml_providers_sts(Check): diff --git a/prowler/providers/aws/services/iam/iam_client.py b/prowler/providers/aws/services/iam/iam_client.py new file mode 100644 index 00000000000..2e855bb21d5 --- /dev/null +++ b/prowler/providers/aws/services/iam/iam_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.iam.iam_service import IAM + +iam_client = IAM(current_audit_info) diff --git a/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/__init__.py b/prowler/providers/aws/services/iam/iam_disable_30_days_credentials/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/__init__.py rename to prowler/providers/aws/services/iam/iam_disable_30_days_credentials/__init__.py diff --git a/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.metadata.json b/prowler/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.metadata.json rename to prowler/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.metadata.json diff --git a/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.py b/prowler/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.py similarity index 91% rename from providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.py rename to prowler/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.py index 3d73dfba402..3b79accb7c3 100644 --- a/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.py +++ b/prowler/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials.py @@ -1,7 +1,7 @@ import datetime -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client maximum_expiration_days = 30 diff --git a/providers/aws/services/iam/iam_no_expired_server_certificates_stored/__init__.py b/prowler/providers/aws/services/iam/iam_disable_45_days_credentials/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_no_expired_server_certificates_stored/__init__.py rename to prowler/providers/aws/services/iam/iam_disable_45_days_credentials/__init__.py diff --git a/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.metadata.json b/prowler/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.metadata.json rename to prowler/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.metadata.json diff --git a/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.py b/prowler/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.py similarity index 91% rename from providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.py rename to prowler/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.py index 43944ce8967..02c1a2223bc 100644 --- a/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.py +++ b/prowler/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials.py @@ -1,7 +1,7 @@ import datetime -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client maximum_expiration_days = 45 diff --git a/providers/aws/services/iam/iam_no_root_access_key/__init__.py b/prowler/providers/aws/services/iam/iam_disable_90_days_credentials/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_no_root_access_key/__init__.py rename to prowler/providers/aws/services/iam/iam_disable_90_days_credentials/__init__.py diff --git a/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.metadata.json b/prowler/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.metadata.json rename to prowler/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.metadata.json diff --git a/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.py b/prowler/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.py similarity index 91% rename from providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.py rename to prowler/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.py index 85512650e87..cf601a8d128 100644 --- a/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.py +++ b/prowler/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials.py @@ -1,7 +1,7 @@ import datetime -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client maximum_expiration_days = 90 diff --git a/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/__init__.py b/prowler/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/__init__.py rename to prowler/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/__init__.py diff --git a/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.metadata.json b/prowler/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.metadata.json rename to prowler/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.metadata.json diff --git a/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.py b/prowler/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.py similarity index 91% rename from providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.py rename to prowler/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.py index c15e3f2f8f0..bf21e2ade6b 100644 --- a/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.py +++ b/prowler/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_no_custom_policy_permissive_role_assumption(Check): diff --git a/providers/aws/services/iam/iam_password_policy_lowercase/__init__.py b/prowler/providers/aws/services/iam/iam_no_expired_server_certificates_stored/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_password_policy_lowercase/__init__.py rename to prowler/providers/aws/services/iam/iam_no_expired_server_certificates_stored/__init__.py diff --git a/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.metadata.json b/prowler/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.metadata.json rename to prowler/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.metadata.json diff --git a/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.py b/prowler/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.py similarity index 88% rename from providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.py rename to prowler/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.py index 71e1fdffdf2..56e9925b440 100644 --- a/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.py +++ b/prowler/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored.py @@ -1,7 +1,7 @@ from datetime import datetime, timezone -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_no_expired_server_certificates_stored(Check): diff --git a/providers/aws/services/iam/iam_password_policy_minimum_length_14/__init__.py b/prowler/providers/aws/services/iam/iam_no_root_access_key/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_password_policy_minimum_length_14/__init__.py rename to prowler/providers/aws/services/iam/iam_no_root_access_key/__init__.py diff --git a/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.metadata.json b/prowler/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.metadata.json rename to prowler/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.metadata.json diff --git a/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.py b/prowler/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.py similarity index 91% rename from providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.py rename to prowler/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.py index 8184d1d386b..3e4328a9b4f 100644 --- a/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.py +++ b/prowler/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_no_root_access_key(Check): diff --git a/providers/aws/services/iam/iam_password_policy_number/__init__.py b/prowler/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_password_policy_number/__init__.py rename to prowler/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/__init__.py diff --git a/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.metadata.json b/prowler/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.metadata.json rename to prowler/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.metadata.json diff --git a/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.py b/prowler/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.py similarity index 90% rename from providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.py rename to prowler/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.py index 51710d0d5c7..0d8290da6ac 100644 --- a/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.py +++ b/prowler/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_password_policy_expires_passwords_within_90_days_or_less(Check): diff --git a/providers/aws/services/iam/iam_password_policy_reuse_24/__init__.py b/prowler/providers/aws/services/iam/iam_password_policy_lowercase/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_password_policy_reuse_24/__init__.py rename to prowler/providers/aws/services/iam/iam_password_policy_lowercase/__init__.py diff --git a/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.metadata.json b/prowler/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.metadata.json rename to prowler/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.metadata.json diff --git a/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.py b/prowler/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.py similarity index 88% rename from providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.py rename to prowler/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.py index 9ffa8001c25..3760176b458 100644 --- a/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.py +++ b/prowler/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_password_policy_lowercase(Check): diff --git a/providers/aws/services/iam/iam_password_policy_symbol/__init__.py b/prowler/providers/aws/services/iam/iam_password_policy_minimum_length_14/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_password_policy_symbol/__init__.py rename to prowler/providers/aws/services/iam/iam_password_policy_minimum_length_14/__init__.py diff --git a/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.metadata.json b/prowler/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.metadata.json rename to prowler/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.metadata.json diff --git a/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.py b/prowler/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.py similarity index 89% rename from providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.py rename to prowler/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.py index 11628b5eb53..1ce11954494 100644 --- a/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.py +++ b/prowler/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_password_policy_minimum_length_14(Check): diff --git a/providers/aws/services/iam/iam_password_policy_uppercase/__init__.py b/prowler/providers/aws/services/iam/iam_password_policy_number/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_password_policy_uppercase/__init__.py rename to prowler/providers/aws/services/iam/iam_password_policy_number/__init__.py diff --git a/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.metadata.json b/prowler/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.metadata.json rename to prowler/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.metadata.json diff --git a/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.py b/prowler/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.py similarity index 88% rename from providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.py rename to prowler/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.py index 758a17a31c6..5ccea1587fc 100644 --- a/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.py +++ b/prowler/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_password_policy_number(Check): diff --git a/providers/aws/services/iam/iam_policy_allows_privilege_escalation/__init__.py b/prowler/providers/aws/services/iam/iam_password_policy_reuse_24/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_policy_allows_privilege_escalation/__init__.py rename to prowler/providers/aws/services/iam/iam_password_policy_reuse_24/__init__.py diff --git a/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.metadata.json b/prowler/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.metadata.json rename to prowler/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.metadata.json diff --git a/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.py b/prowler/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.py similarity index 89% rename from providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.py rename to prowler/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.py index a3c535e568f..10efbb23c7a 100644 --- a/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.py +++ b/prowler/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_password_policy_reuse_24(Check): diff --git a/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/__init__.py b/prowler/providers/aws/services/iam/iam_password_policy_symbol/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/__init__.py rename to prowler/providers/aws/services/iam/iam_password_policy_symbol/__init__.py diff --git a/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.metadata.json b/prowler/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.metadata.json rename to prowler/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.metadata.json diff --git a/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.py b/prowler/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.py similarity index 88% rename from providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.py rename to prowler/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.py index 5b15b6ead2c..265daa45337 100644 --- a/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.py +++ b/prowler/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_password_policy_symbol(Check): diff --git a/providers/aws/services/iam/iam_policy_no_administrative_privileges/__init__.py b/prowler/providers/aws/services/iam/iam_password_policy_uppercase/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_policy_no_administrative_privileges/__init__.py rename to prowler/providers/aws/services/iam/iam_password_policy_uppercase/__init__.py diff --git a/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.metadata.json b/prowler/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.metadata.json rename to prowler/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.metadata.json diff --git a/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.py b/prowler/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.py similarity index 88% rename from providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.py rename to prowler/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.py index 08903c69bdd..c5c9c93e698 100644 --- a/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.py +++ b/prowler/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_password_policy_uppercase(Check): diff --git a/providers/aws/services/iam/iam_root_hardware_mfa_enabled/__init__.py b/prowler/providers/aws/services/iam/iam_policy_allows_privilege_escalation/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_root_hardware_mfa_enabled/__init__.py rename to prowler/providers/aws/services/iam/iam_policy_allows_privilege_escalation/__init__.py diff --git a/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.metadata.json b/prowler/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.metadata.json rename to prowler/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.metadata.json diff --git a/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.py b/prowler/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.py similarity index 97% rename from providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.py rename to prowler/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.py index 95f96e00828..fb2debae25d 100644 --- a/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.py +++ b/prowler/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client # Does the tool analyze both users and roles, or just one or the other? --> Everything using AttachementCount. # Does the tool take a principal-centric or policy-centric approach? --> Policy-centric approach. diff --git a/providers/aws/services/iam/iam_root_mfa_enabled/__init__.py b/prowler/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_root_mfa_enabled/__init__.py rename to prowler/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/__init__.py diff --git a/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.metadata.json b/prowler/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.metadata.json rename to prowler/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.metadata.json diff --git a/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.py b/prowler/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.py similarity index 93% rename from providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.py rename to prowler/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.py index 8373a0722a0..899182564c3 100644 --- a/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.py +++ b/prowler/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_policy_attached_only_to_group_or_roles(Check): diff --git a/providers/aws/services/iam/iam_rotate_access_key_90_days/__init__.py b/prowler/providers/aws/services/iam/iam_policy_no_administrative_privileges/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_rotate_access_key_90_days/__init__.py rename to prowler/providers/aws/services/iam/iam_policy_no_administrative_privileges/__init__.py diff --git a/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.metadata.json b/prowler/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.metadata.json rename to prowler/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.metadata.json diff --git a/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.py b/prowler/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.py similarity index 90% rename from providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.py rename to prowler/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.py index 70947abfabc..c00f57d0922 100644 --- a/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.py +++ b/prowler/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_policy_no_administrative_privileges(Check): diff --git a/providers/aws/services/iam/iam_support_role_created/__init__.py b/prowler/providers/aws/services/iam/iam_root_hardware_mfa_enabled/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_support_role_created/__init__.py rename to prowler/providers/aws/services/iam/iam_root_hardware_mfa_enabled/__init__.py diff --git a/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.metadata.json b/prowler/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.metadata.json rename to prowler/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.metadata.json diff --git a/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.py b/prowler/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.py similarity index 89% rename from providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.py rename to prowler/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.py index f2a941ebb14..1ac81c77465 100644 --- a/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.py +++ b/prowler/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_root_hardware_mfa_enabled(Check): diff --git a/providers/aws/services/iam/iam_user_hardware_mfa_enabled/__init__.py b/prowler/providers/aws/services/iam/iam_root_mfa_enabled/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_user_hardware_mfa_enabled/__init__.py rename to prowler/providers/aws/services/iam/iam_root_mfa_enabled/__init__.py diff --git a/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.metadata.json b/prowler/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.metadata.json rename to prowler/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.metadata.json diff --git a/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.py b/prowler/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.py similarity index 86% rename from providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.py rename to prowler/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.py index c67716cafbf..84eff47eb59 100644 --- a/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.py +++ b/prowler/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_root_mfa_enabled(Check): diff --git a/providers/aws/services/iam/iam_user_mfa_enabled_console_access/__init__.py b/prowler/providers/aws/services/iam/iam_rotate_access_key_90_days/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_user_mfa_enabled_console_access/__init__.py rename to prowler/providers/aws/services/iam/iam_rotate_access_key_90_days/__init__.py diff --git a/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.metadata.json b/prowler/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.metadata.json rename to prowler/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.metadata.json diff --git a/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.py b/prowler/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.py similarity index 95% rename from providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.py rename to prowler/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.py index 6fce660b7b7..d1dcfceb6ba 100644 --- a/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.py +++ b/prowler/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days.py @@ -1,7 +1,7 @@ import datetime -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client maximum_expiration_days = 90 diff --git a/providers/aws/services/iam/iam_service.py b/prowler/providers/aws/services/iam/iam_service.py similarity index 99% rename from providers/aws/services/iam/iam_service.py rename to prowler/providers/aws/services/iam/iam_service.py index 784ea2d40d9..fd4647a0165 100644 --- a/providers/aws/services/iam/iam_service.py +++ b/prowler/providers/aws/services/iam/iam_service.py @@ -2,8 +2,8 @@ from dataclasses import dataclass from datetime import datetime -from lib.logger import logger -from providers.aws.aws_provider import get_region_global_service +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import get_region_global_service ################## IAM diff --git a/providers/aws/services/iam/iam_user_no_setup_initial_access_key/__init__.py b/prowler/providers/aws/services/iam/iam_support_role_created/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_user_no_setup_initial_access_key/__init__.py rename to prowler/providers/aws/services/iam/iam_support_role_created/__init__.py diff --git a/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.metadata.json b/prowler/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_support_role_created/iam_support_role_created.metadata.json rename to prowler/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.metadata.json diff --git a/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.py b/prowler/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.py similarity index 86% rename from providers/aws/services/iam/iam_support_role_created/iam_support_role_created.py rename to prowler/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.py index cea98f288d0..14d20706e10 100644 --- a/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.py +++ b/prowler/providers/aws/services/iam/iam_support_role_created/iam_support_role_created.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_support_role_created(Check): diff --git a/providers/aws/services/iam/iam_user_two_active_access_key/__init__.py b/prowler/providers/aws/services/iam/iam_user_hardware_mfa_enabled/__init__.py similarity index 100% rename from providers/aws/services/iam/iam_user_two_active_access_key/__init__.py rename to prowler/providers/aws/services/iam/iam_user_hardware_mfa_enabled/__init__.py diff --git a/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.metadata.json b/prowler/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.metadata.json rename to prowler/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.metadata.json diff --git a/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.py b/prowler/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.py similarity index 90% rename from providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.py rename to prowler/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.py index a4c23b1449c..a65f06716ee 100644 --- a/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.py +++ b/prowler/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_user_hardware_mfa_enabled(Check): diff --git a/providers/aws/services/kms/__init__.py b/prowler/providers/aws/services/iam/iam_user_mfa_enabled_console_access/__init__.py similarity index 100% rename from providers/aws/services/kms/__init__.py rename to prowler/providers/aws/services/iam/iam_user_mfa_enabled_console_access/__init__.py diff --git a/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.metadata.json b/prowler/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.metadata.json rename to prowler/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.metadata.json diff --git a/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.py b/prowler/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.py similarity index 89% rename from providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.py rename to prowler/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.py index ef4f15ad4f9..1bc7a476c62 100644 --- a/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.py +++ b/prowler/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_user_mfa_enabled_console_access(Check): diff --git a/providers/aws/services/kms/kms_cmk_are_used/__init__.py b/prowler/providers/aws/services/iam/iam_user_no_setup_initial_access_key/__init__.py similarity index 100% rename from providers/aws/services/kms/kms_cmk_are_used/__init__.py rename to prowler/providers/aws/services/iam/iam_user_no_setup_initial_access_key/__init__.py diff --git a/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.metadata.json b/prowler/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.metadata.json rename to prowler/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.metadata.json diff --git a/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.py b/prowler/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.py similarity index 95% rename from providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.py rename to prowler/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.py index 4737b660c2b..ca7ad2627ad 100644 --- a/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.py +++ b/prowler/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_user_no_setup_initial_access_key(Check): diff --git a/providers/aws/services/kms/kms_cmk_rotation_enabled/__init__.py b/prowler/providers/aws/services/iam/iam_user_two_active_access_key/__init__.py similarity index 100% rename from providers/aws/services/kms/kms_cmk_rotation_enabled/__init__.py rename to prowler/providers/aws/services/iam/iam_user_two_active_access_key/__init__.py diff --git a/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.metadata.json b/prowler/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.metadata.json similarity index 100% rename from providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.metadata.json rename to prowler/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.metadata.json diff --git a/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.py b/prowler/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.py similarity index 87% rename from providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.py rename to prowler/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.py index 36ed3f7e081..54d39f776b8 100644 --- a/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.py +++ b/prowler/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from lib.logger import logger -from providers.aws.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.lib.logger import logger +from prowler.providers.aws.services.iam.iam_client import iam_client class iam_user_two_active_access_key(Check): diff --git a/providers/aws/services/kms/kms_key_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/kms/__init__.py similarity index 100% rename from providers/aws/services/kms/kms_key_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/kms/__init__.py diff --git a/prowler/providers/aws/services/kms/kms_client.py b/prowler/providers/aws/services/kms/kms_client.py new file mode 100644 index 00000000000..4d65227a288 --- /dev/null +++ b/prowler/providers/aws/services/kms/kms_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.kms.kms_service import KMS + +kms_client = KMS(current_audit_info) diff --git a/providers/aws/services/macie/__init__.py b/prowler/providers/aws/services/kms/kms_cmk_are_used/__init__.py similarity index 100% rename from providers/aws/services/macie/__init__.py rename to prowler/providers/aws/services/kms/kms_cmk_are_used/__init__.py diff --git a/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.metadata.json b/prowler/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.metadata.json similarity index 100% rename from providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.metadata.json rename to prowler/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.metadata.json diff --git a/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.py b/prowler/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.py similarity index 88% rename from providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.py rename to prowler/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.py index 60240727d5d..4ef3a165b2d 100644 --- a/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.py +++ b/prowler/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.kms.kms_client import kms_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.kms.kms_client import kms_client class kms_cmk_are_used(Check): diff --git a/providers/aws/services/macie/macie_is_enabled/__init__.py b/prowler/providers/aws/services/kms/kms_cmk_rotation_enabled/__init__.py similarity index 100% rename from providers/aws/services/macie/macie_is_enabled/__init__.py rename to prowler/providers/aws/services/kms/kms_cmk_rotation_enabled/__init__.py diff --git a/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.metadata.json b/prowler/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.metadata.json similarity index 100% rename from providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.metadata.json rename to prowler/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.metadata.json diff --git a/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.py b/prowler/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.py similarity index 89% rename from providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.py rename to prowler/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.py index 8b9138a4f9b..c7577c3895f 100644 --- a/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.py +++ b/prowler/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.kms.kms_client import kms_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.kms.kms_client import kms_client class kms_cmk_rotation_enabled(Check): diff --git a/providers/aws/services/opensearch/__init__.py b/prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/opensearch/__init__.py rename to prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.metadata.json index a7748a3e21c..e9d26fc9201 100644 --- a/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.py b/prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.py similarity index 93% rename from providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.py rename to prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.py index 96a65ed5b7a..13337a8eaf5 100644 --- a/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.py +++ b/prowler/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.kms.kms_client import kms_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.kms.kms_client import kms_client class kms_key_not_publicly_accessible(Check): diff --git a/providers/aws/services/kms/kms_service.py b/prowler/providers/aws/services/kms/kms_service.py similarity index 97% rename from providers/aws/services/kms/kms_service.py rename to prowler/providers/aws/services/kms/kms_service.py index 42ed75ae439..39f03a08ce8 100644 --- a/providers/aws/services/kms/kms_service.py +++ b/prowler/providers/aws/services/kms/kms_service.py @@ -2,8 +2,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## KMS diff --git a/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/__init__.py b/prowler/providers/aws/services/macie/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/__init__.py rename to prowler/providers/aws/services/macie/__init__.py diff --git a/prowler/providers/aws/services/macie/macie_client.py b/prowler/providers/aws/services/macie/macie_client.py new file mode 100644 index 00000000000..d1cd34a0bf5 --- /dev/null +++ b/prowler/providers/aws/services/macie/macie_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.macie.macie_service import Macie + +macie_client = Macie(current_audit_info) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/__init__.py b/prowler/providers/aws/services/macie/macie_is_enabled/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/__init__.py rename to prowler/providers/aws/services/macie/macie_is_enabled/__init__.py diff --git a/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.metadata.json b/prowler/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.metadata.json similarity index 99% rename from providers/aws/services/macie/macie_is_enabled/macie_is_enabled.metadata.json rename to prowler/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.metadata.json index e50956bde57..5b03e6805d0 100644 --- a/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.metadata.json +++ b/prowler/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.py b/prowler/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.py similarity index 85% rename from providers/aws/services/macie/macie_is_enabled/macie_is_enabled.py rename to prowler/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.py index f620f70831a..91b3d6e12d1 100644 --- a/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.py +++ b/prowler/providers/aws/services/macie/macie_is_enabled/macie_is_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.macie.macie_client import macie_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.macie.macie_client import macie_client class macie_is_enabled(Check): diff --git a/providers/aws/services/macie/macie_service.py b/prowler/providers/aws/services/macie/macie_service.py similarity index 94% rename from providers/aws/services/macie/macie_service.py rename to prowler/providers/aws/services/macie/macie_service.py index 8eb595d723b..4cbc8b27b67 100644 --- a/providers/aws/services/macie/macie_service.py +++ b/prowler/providers/aws/services/macie/macie_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## Macie diff --git a/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/__init__.py b/prowler/providers/aws/services/opensearch/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/__init__.py rename to prowler/providers/aws/services/opensearch/__init__.py diff --git a/prowler/providers/aws/services/opensearch/opensearch_client.py b/prowler/providers/aws/services/opensearch/opensearch_client.py new file mode 100644 index 00000000000..fdd7f8f46b7 --- /dev/null +++ b/prowler/providers/aws/services/opensearch/opensearch_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchService, +) + +opensearch_client = OpenSearchService(current_audit_info) diff --git a/providers/aws/services/opensearch/opensearch_service.py b/prowler/providers/aws/services/opensearch/opensearch_service.py similarity index 98% rename from providers/aws/services/opensearch/opensearch_service.py rename to prowler/providers/aws/services/opensearch/opensearch_service.py index fbd042542be..49741b7621c 100644 --- a/providers/aws/services/opensearch/opensearch_service.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service.py @@ -3,8 +3,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ OpenSearch diff --git a/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.metadata.json index be9ca033dfa..e034545eb9b 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.metadata.json @@ -36,4 +36,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.py similarity index 85% rename from providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.py index 7fafa516fe1..8e903644942 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_audit_logging_enabled(Check): diff --git a/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.metadata.json index a75b3d0cf03..868f019f81d 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.metadata.json @@ -36,4 +36,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.py similarity index 91% rename from providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.py index 03bada40871..48e67b55ef3 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_cloudwatch_logging_enabled(Check): diff --git a/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.metadata.json similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.metadata.json diff --git a/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.py similarity index 83% rename from providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.py index d390619c033..fd88e6244d9 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_encryption_at_rest_enabled(Check): diff --git a/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.metadata.json similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.metadata.json diff --git a/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.py similarity index 83% rename from providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.py index b8548630954..c265102c52c 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_https_communications_enforced(Check): diff --git a/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.metadata.json similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.metadata.json diff --git a/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.py similarity index 83% rename from providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.py index c209e0e5ba4..7706a7c73fa 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_internal_user_database_enabled(Check): diff --git a/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.metadata.json diff --git a/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.py similarity index 83% rename from providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.py index dbb27385640..678468e623c 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_node_to_node_encryption_enabled(Check): diff --git a/providers/aws/services/rds/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/rds/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.metadata.json index e7c1b46cd91..19a7641c9f0 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.metadata.json @@ -36,4 +36,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.py similarity index 94% rename from providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.py index 17e5316ba0d..320f8b5ceee 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_not_publicly_accessible(Check): diff --git a/providers/aws/services/rds/rds_instance_backup_enabled/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_backup_enabled/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.metadata.json similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.metadata.json diff --git a/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.py similarity index 84% rename from providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.py index a1b08235a31..46e183bae3c 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_updated_to_the_latest_service_software_version(Check): diff --git a/providers/aws/services/rds/rds_instance_deletion_protection/__init__.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_deletion_protection/__init__.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/__init__.py diff --git a/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.metadata.json b/prowler/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.metadata.json similarity index 100% rename from providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.metadata.json rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.metadata.json diff --git a/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.py b/prowler/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.py similarity index 83% rename from providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.py rename to prowler/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.py index aefe01ad12b..d617d879558 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.py +++ b/prowler/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.opensearch.opensearch_client import opensearch_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.opensearch.opensearch_client import ( + opensearch_client, +) class opensearch_service_domains_use_cognito_authentication_for_kibana(Check): diff --git a/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/__init__.py b/prowler/providers/aws/services/rds/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/__init__.py rename to prowler/providers/aws/services/rds/__init__.py diff --git a/prowler/providers/aws/services/rds/rds_client.py b/prowler/providers/aws/services/rds/rds_client.py new file mode 100644 index 00000000000..6911ab5fb22 --- /dev/null +++ b/prowler/providers/aws/services/rds/rds_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.rds.rds_service import RDS + +rds_client = RDS(current_audit_info) diff --git a/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/__init__.py b/prowler/providers/aws/services/rds/rds_instance_backup_enabled/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_backup_enabled/__init__.py diff --git a/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.metadata.json b/prowler/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.metadata.json similarity index 100% rename from providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.metadata.json diff --git a/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.py b/prowler/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.py similarity index 86% rename from providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.py rename to prowler/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.py index 4e2aae9ce67..adfd8a82c35 100644 --- a/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.py +++ b/prowler/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_backup_enabled(Check): diff --git a/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/__init__.py b/prowler/providers/aws/services/rds/rds_instance_deletion_protection/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_deletion_protection/__init__.py diff --git a/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.metadata.json b/prowler/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.metadata.json similarity index 100% rename from providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.metadata.json diff --git a/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.py b/prowler/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.py similarity index 86% rename from providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.py rename to prowler/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.py index 3df4db5c79f..72dab87885f 100644 --- a/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.py +++ b/prowler/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_deletion_protection(Check): diff --git a/providers/aws/services/rds/rds_instance_multi_az/__init__.py b/prowler/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_multi_az/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/__init__.py diff --git a/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.metadata.json b/prowler/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.metadata.json similarity index 100% rename from providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.metadata.json diff --git a/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.py b/prowler/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.py similarity index 86% rename from providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.py rename to prowler/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.py index 7fdf03ea2d7..6f7bb5edad1 100644 --- a/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.py +++ b/prowler/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_enhanced_monitoring_enabled(Check): diff --git a/providers/aws/services/rds/rds_instance_no_public_access/__init__.py b/prowler/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_no_public_access/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/__init__.py diff --git a/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.metadata.json b/prowler/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.metadata.json similarity index 100% rename from providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.metadata.json diff --git a/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.py b/prowler/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.py similarity index 85% rename from providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.py rename to prowler/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.py index e4af35a6d9d..18233cf1381 100644 --- a/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.py +++ b/prowler/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_integration_cloudwatch_logs(Check): diff --git a/providers/aws/services/rds/rds_instance_storage_encrypted/__init__.py b/prowler/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_instance_storage_encrypted/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/__init__.py diff --git a/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.metadata.json b/prowler/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.metadata.json similarity index 100% rename from providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.metadata.json diff --git a/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.py b/prowler/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.py similarity index 86% rename from providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.py rename to prowler/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.py index 449e98fe00e..77fc61959c9 100644 --- a/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.py +++ b/prowler/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_minor_version_upgrade_enabled(Check): diff --git a/providers/aws/services/rds/rds_snapshots_public_access/__init__.py b/prowler/providers/aws/services/rds/rds_instance_multi_az/__init__.py similarity index 100% rename from providers/aws/services/rds/rds_snapshots_public_access/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_multi_az/__init__.py diff --git a/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.metadata.json b/prowler/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.metadata.json similarity index 100% rename from providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.metadata.json diff --git a/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.py b/prowler/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.py similarity index 85% rename from providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.py rename to prowler/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.py index b136a17fc23..02e845e3f12 100644 --- a/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.py +++ b/prowler/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_multi_az(Check): diff --git a/providers/aws/services/redshift/__init__.py b/prowler/providers/aws/services/rds/rds_instance_no_public_access/__init__.py similarity index 100% rename from providers/aws/services/redshift/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_no_public_access/__init__.py diff --git a/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.metadata.json b/prowler/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.metadata.json similarity index 99% rename from providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.metadata.json index 7b9ef1ab467..32e5cd8c669 100644 --- a/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.metadata.json +++ b/prowler/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.py b/prowler/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.py similarity index 85% rename from providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.py rename to prowler/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.py index bd046ef90c3..0b94cf8a13a 100644 --- a/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.py +++ b/prowler/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_no_public_access(Check): diff --git a/providers/aws/services/redshift/redshift_cluster_audit_logging/__init__.py b/prowler/providers/aws/services/rds/rds_instance_storage_encrypted/__init__.py similarity index 100% rename from providers/aws/services/redshift/redshift_cluster_audit_logging/__init__.py rename to prowler/providers/aws/services/rds/rds_instance_storage_encrypted/__init__.py diff --git a/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.metadata.json b/prowler/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.metadata.json similarity index 100% rename from providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.metadata.json rename to prowler/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.metadata.json diff --git a/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.py b/prowler/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.py similarity index 84% rename from providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.py rename to prowler/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.py index 68fe0ebbc1e..9d500b944f5 100644 --- a/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.py +++ b/prowler/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_instance_storage_encrypted(Check): diff --git a/providers/aws/services/rds/rds_service.py b/prowler/providers/aws/services/rds/rds_service.py similarity index 98% rename from providers/aws/services/rds/rds_service.py rename to prowler/providers/aws/services/rds/rds_service.py index 31402e6726a..989f900dbc9 100644 --- a/providers/aws/services/rds/rds_service.py +++ b/prowler/providers/aws/services/rds/rds_service.py @@ -3,8 +3,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## RDS diff --git a/providers/aws/services/redshift/redshift_cluster_automated_snapshot/__init__.py b/prowler/providers/aws/services/rds/rds_snapshots_public_access/__init__.py similarity index 100% rename from providers/aws/services/redshift/redshift_cluster_automated_snapshot/__init__.py rename to prowler/providers/aws/services/rds/rds_snapshots_public_access/__init__.py diff --git a/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.metadata.json b/prowler/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.metadata.json similarity index 99% rename from providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.metadata.json rename to prowler/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.metadata.json index ff607670d47..1be3a444063 100644 --- a/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.metadata.json +++ b/prowler/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.py b/prowler/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.py similarity index 91% rename from providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.py rename to prowler/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.py index 1d0d089d68f..a49627f55a0 100644 --- a/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.py +++ b/prowler/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.rds.rds_client import rds_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.rds.rds_client import rds_client class rds_snapshots_public_access(Check): diff --git a/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/__init__.py b/prowler/providers/aws/services/redshift/__init__.py similarity index 100% rename from providers/aws/services/redshift/redshift_cluster_automatic_upgrades/__init__.py rename to prowler/providers/aws/services/redshift/__init__.py diff --git a/prowler/providers/aws/services/redshift/redshift_client.py b/prowler/providers/aws/services/redshift/redshift_client.py new file mode 100644 index 00000000000..4743ddb4d98 --- /dev/null +++ b/prowler/providers/aws/services/redshift/redshift_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.redshift.redshift_service import Redshift + +redshift_client = Redshift(current_audit_info) diff --git a/providers/aws/services/redshift/redshift_cluster_public_access/__init__.py b/prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/__init__.py similarity index 100% rename from providers/aws/services/redshift/redshift_cluster_public_access/__init__.py rename to prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/__init__.py diff --git a/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.metadata.json b/prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.metadata.json similarity index 99% rename from providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.metadata.json rename to prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.metadata.json index 127b4dfc410..940d4183f82 100644 --- a/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.metadata.json +++ b/prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.py b/prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.py similarity index 84% rename from providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.py rename to prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.py index d99e42a35ff..842804cce32 100644 --- a/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.py +++ b/prowler/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.redshift.redshift_client import redshift_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.redshift.redshift_client import redshift_client class redshift_cluster_audit_logging(Check): diff --git a/providers/aws/services/route53/__init__.py b/prowler/providers/aws/services/redshift/redshift_cluster_automated_snapshot/__init__.py similarity index 100% rename from providers/aws/services/route53/__init__.py rename to prowler/providers/aws/services/redshift/redshift_cluster_automated_snapshot/__init__.py diff --git a/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.metadata.json b/prowler/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.metadata.json similarity index 100% rename from providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.metadata.json rename to prowler/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.metadata.json diff --git a/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.py b/prowler/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.py similarity index 84% rename from providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.py rename to prowler/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.py index 86b0690b783..fc5bae52847 100644 --- a/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.py +++ b/prowler/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.redshift.redshift_client import redshift_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.redshift.redshift_client import redshift_client class redshift_cluster_automated_snapshot(Check): diff --git a/providers/aws/services/route53/route53_domains_privacy_protection_enabled/__init__.py b/prowler/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/__init__.py similarity index 100% rename from providers/aws/services/route53/route53_domains_privacy_protection_enabled/__init__.py rename to prowler/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/__init__.py diff --git a/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.metadata.json b/prowler/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.metadata.json similarity index 100% rename from providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.metadata.json rename to prowler/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.metadata.json diff --git a/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.py b/prowler/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.py similarity index 85% rename from providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.py rename to prowler/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.py index 0cb194b8a64..85247b02d77 100644 --- a/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.py +++ b/prowler/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.redshift.redshift_client import redshift_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.redshift.redshift_client import redshift_client class redshift_cluster_automatic_upgrades(Check): diff --git a/providers/aws/services/route53/route53_domains_transferlock_enabled/__init__.py b/prowler/providers/aws/services/redshift/redshift_cluster_public_access/__init__.py similarity index 100% rename from providers/aws/services/route53/route53_domains_transferlock_enabled/__init__.py rename to prowler/providers/aws/services/redshift/redshift_cluster_public_access/__init__.py diff --git a/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.metadata.json b/prowler/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.metadata.json similarity index 100% rename from providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.metadata.json rename to prowler/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.metadata.json diff --git a/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.py b/prowler/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.py similarity index 84% rename from providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.py rename to prowler/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.py index 1f600e10fac..98ca293331e 100644 --- a/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.py +++ b/prowler/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.redshift.redshift_client import redshift_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.redshift.redshift_client import redshift_client class redshift_cluster_public_access(Check): diff --git a/providers/aws/services/redshift/redshift_service.py b/prowler/providers/aws/services/redshift/redshift_service.py similarity index 97% rename from providers/aws/services/redshift/redshift_service.py rename to prowler/providers/aws/services/redshift/redshift_service.py index 276b806e001..d6d08155105 100644 --- a/providers/aws/services/redshift/redshift_service.py +++ b/prowler/providers/aws/services/redshift/redshift_service.py @@ -2,8 +2,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ Redshift diff --git a/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/__init__.py b/prowler/providers/aws/services/route53/__init__.py similarity index 100% rename from providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/__init__.py rename to prowler/providers/aws/services/route53/__init__.py diff --git a/prowler/providers/aws/services/route53/route53_client.py b/prowler/providers/aws/services/route53/route53_client.py new file mode 100644 index 00000000000..321a6000fe7 --- /dev/null +++ b/prowler/providers/aws/services/route53/route53_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.route53.route53_service import Route53 + +route53_client = Route53(current_audit_info) diff --git a/providers/aws/services/s3/__init__.py b/prowler/providers/aws/services/route53/route53_domains_privacy_protection_enabled/__init__.py similarity index 100% rename from providers/aws/services/s3/__init__.py rename to prowler/providers/aws/services/route53/route53_domains_privacy_protection_enabled/__init__.py diff --git a/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.metadata.json b/prowler/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.metadata.json similarity index 100% rename from providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.metadata.json rename to prowler/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.metadata.json diff --git a/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.py b/prowler/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.py similarity index 83% rename from providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.py rename to prowler/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.py index f4f9cc5806e..e7c01639cdb 100644 --- a/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.py +++ b/prowler/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.route53.route53domains_client import route53domains_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.route53.route53domains_client import ( + route53domains_client, +) class route53_domains_privacy_protection_enabled(Check): diff --git a/providers/aws/services/s3/s3_account_level_public_access_blocks/__init__.py b/prowler/providers/aws/services/route53/route53_domains_transferlock_enabled/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_account_level_public_access_blocks/__init__.py rename to prowler/providers/aws/services/route53/route53_domains_transferlock_enabled/__init__.py diff --git a/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.metadata.json b/prowler/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.metadata.json similarity index 100% rename from providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.metadata.json rename to prowler/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.metadata.json diff --git a/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.py b/prowler/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.py similarity index 83% rename from providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.py rename to prowler/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.py index c38c8c22f6c..c86847f1489 100644 --- a/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.py +++ b/prowler/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.route53.route53domains_client import route53domains_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.route53.route53domains_client import ( + route53domains_client, +) class route53_domains_transferlock_enabled(Check): diff --git a/providers/aws/services/s3/s3_bucket_acl_prohibited/__init__.py b/prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_acl_prohibited/__init__.py rename to prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/__init__.py diff --git a/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.metadata.json b/prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.metadata.json rename to prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.metadata.json index e73e7364068..93f2547b65f 100644 --- a/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.py b/prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.py similarity index 88% rename from providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.py rename to prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.py index 8f75139e6b5..250cc8838d0 100644 --- a/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.py +++ b/prowler/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.route53.route53_client import route53_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.route53.route53_client import route53_client class route53_public_hosted_zones_cloudwatch_logging_enabled(Check): diff --git a/providers/aws/services/route53/route53_service.py b/prowler/providers/aws/services/route53/route53_service.py similarity index 97% rename from providers/aws/services/route53/route53_service.py rename to prowler/providers/aws/services/route53/route53_service.py index 0dbbe5a6527..f633908a5c4 100644 --- a/providers/aws/services/route53/route53_service.py +++ b/prowler/providers/aws/services/route53/route53_service.py @@ -1,7 +1,7 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import get_region_global_service +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import get_region_global_service ################## Route53 diff --git a/prowler/providers/aws/services/route53/route53domains_client.py b/prowler/providers/aws/services/route53/route53domains_client.py new file mode 100644 index 00000000000..d05e7ed8cc6 --- /dev/null +++ b/prowler/providers/aws/services/route53/route53domains_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.route53.route53_service import Route53Domains + +route53domains_client = Route53Domains(current_audit_info) diff --git a/providers/aws/services/s3/s3_bucket_default_encryption/__init__.py b/prowler/providers/aws/services/s3/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_default_encryption/__init__.py rename to prowler/providers/aws/services/s3/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_no_mfa_delete/__init__.py b/prowler/providers/aws/services/s3/s3_account_level_public_access_blocks/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_no_mfa_delete/__init__.py rename to prowler/providers/aws/services/s3/s3_account_level_public_access_blocks/__init__.py diff --git a/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.metadata.json b/prowler/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.metadata.json similarity index 100% rename from providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.metadata.json rename to prowler/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.metadata.json diff --git a/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.py b/prowler/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.py similarity index 80% rename from providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.py rename to prowler/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.py index 7f06b161fc9..93ae88f3ddf 100644 --- a/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.py +++ b/prowler/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client -from providers.aws.services.s3.s3control_client import s3control_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client +from prowler.providers.aws.services.s3.s3control_client import s3control_client class s3_account_level_public_access_blocks(Check): diff --git a/providers/aws/services/s3/s3_bucket_object_versioning/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_acl_prohibited/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_object_versioning/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_acl_prohibited/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.metadata.json similarity index 100% rename from providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.metadata.json diff --git a/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.py b/prowler/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.py similarity index 85% rename from providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.py rename to prowler/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.py index 1bda0e88533..3b7591ed367 100644 --- a/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.py +++ b/prowler/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client class s3_bucket_acl_prohibited(Check): diff --git a/providers/aws/services/s3/s3_bucket_policy_public_write_access/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_default_encryption/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_policy_public_write_access/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_default_encryption/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.metadata.json similarity index 100% rename from providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.metadata.json diff --git a/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.py b/prowler/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.py similarity index 84% rename from providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.py rename to prowler/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.py index a7e21ce687f..829052d816d 100644 --- a/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.py +++ b/prowler/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client class s3_bucket_default_encryption(Check): diff --git a/providers/aws/services/s3/s3_bucket_public_access/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_no_mfa_delete/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_public_access/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_no_mfa_delete/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.metadata.json similarity index 100% rename from providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.metadata.json diff --git a/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.py b/prowler/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.py similarity index 85% rename from providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.py rename to prowler/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.py index c32a57b617f..f6076c61899 100644 --- a/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.py +++ b/prowler/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client class s3_bucket_no_mfa_delete(Check): diff --git a/providers/aws/services/s3/s3_bucket_secure_transport_policy/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_object_versioning/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_secure_transport_policy/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_object_versioning/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.metadata.json similarity index 100% rename from providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.metadata.json diff --git a/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.py b/prowler/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.py similarity index 85% rename from providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.py rename to prowler/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.py index 0839aadb395..5f6c2b0f9fc 100644 --- a/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.py +++ b/prowler/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client class s3_bucket_object_versioning(Check): diff --git a/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/__init__.py similarity index 100% rename from providers/aws/services/s3/s3_bucket_server_access_logging_enabled/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.metadata.json similarity index 99% rename from providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.metadata.json index f0b95edcff9..007aa38a658 100644 --- a/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.metadata.json +++ b/prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.py b/prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.py similarity index 92% rename from providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.py rename to prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.py index 4fdaab646be..9c23576dbc3 100644 --- a/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.py +++ b/prowler/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client class s3_bucket_policy_public_write_access(Check): diff --git a/providers/aws/services/sagemaker/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_public_access/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_public_access/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.metadata.json similarity index 99% rename from providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.metadata.json index fbb2b6af0fb..494533c4267 100644 --- a/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.metadata.json +++ b/prowler/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.py b/prowler/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.py similarity index 94% rename from providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.py rename to prowler/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.py index 30ea123e412..ec348d1aeca 100644 --- a/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.py +++ b/prowler/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client -from providers.aws.services.s3.s3control_client import s3control_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client +from prowler.providers.aws.services.s3.s3control_client import s3control_client class s3_bucket_public_access(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_secure_transport_policy/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_secure_transport_policy/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.metadata.json similarity index 100% rename from providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.metadata.json diff --git a/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.py b/prowler/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.py similarity index 93% rename from providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.py rename to prowler/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.py index 27b751a8d98..3d070f79387 100644 --- a/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.py +++ b/prowler/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client class s3_bucket_secure_transport_policy(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/__init__.py b/prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/__init__.py rename to prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/__init__.py diff --git a/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json b/prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json similarity index 99% rename from providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json rename to prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json index 1972995ebc2..ba0d552f469 100644 --- a/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json +++ b/prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.py b/prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.py similarity index 85% rename from providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.py rename to prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.py index 0479b4e84b4..674630fd6ad 100644 --- a/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.py +++ b/prowler/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.s3.s3_client import s3_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.s3.s3_client import s3_client class s3_bucket_server_access_logging_enabled(Check): diff --git a/prowler/providers/aws/services/s3/s3_client.py b/prowler/providers/aws/services/s3/s3_client.py new file mode 100644 index 00000000000..2e714f5e1c4 --- /dev/null +++ b/prowler/providers/aws/services/s3/s3_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.s3.s3_service import S3 + +s3_client = S3(current_audit_info) diff --git a/providers/aws/services/s3/s3_service.py b/prowler/providers/aws/services/s3/s3_service.py similarity index 99% rename from providers/aws/services/s3/s3_service.py rename to prowler/providers/aws/services/s3/s3_service.py index 44f395fe698..5935ceb3da0 100644 --- a/providers/aws/services/s3/s3_service.py +++ b/prowler/providers/aws/services/s3/s3_service.py @@ -2,8 +2,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import ( +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import ( generate_regional_clients, get_region_global_service, ) diff --git a/prowler/providers/aws/services/s3/s3control_client.py b/prowler/providers/aws/services/s3/s3control_client.py new file mode 100644 index 00000000000..596ef2b27fa --- /dev/null +++ b/prowler/providers/aws/services/s3/s3control_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.s3.s3_service import S3Control + +s3control_client = S3Control(current_audit_info) diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/__init__.py b/prowler/providers/aws/services/sagemaker/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/__init__.py rename to prowler/providers/aws/services/sagemaker/__init__.py diff --git a/prowler/providers/aws/services/sagemaker/sagemaker_client.py b/prowler/providers/aws/services/sagemaker/sagemaker_client.py new file mode 100644 index 00000000000..d883f58778b --- /dev/null +++ b/prowler/providers/aws/services/sagemaker/sagemaker_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.sagemaker.sagemaker_service import SageMaker + +sagemaker_client = SageMaker(current_audit_info) diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.py b/prowler/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.py similarity index 83% rename from providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.py rename to prowler/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.py index 3bbb7fd3a5f..88d3a5eb0d9 100644 --- a/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_models_network_isolation_enabled(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.py b/prowler/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.py similarity index 84% rename from providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.py rename to prowler/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.py index 503618f699c..c3f85fcf4cf 100644 --- a/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_models_vpc_settings_configured(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.py similarity index 85% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.py index 1b4ea933330..bbfa5e6f748 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_notebook_instance_encryption_enabled(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.py similarity index 85% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.py index d61e666407f..07b9374a9b1 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_notebook_instance_root_access_disabled(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.py similarity index 85% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.py index 51d0fe1042a..8f610ac5a1b 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_notebook_instance_vpc_settings_configured(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.metadata.json similarity index 99% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.metadata.json index 54b76232889..21ffbf16b99 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.metadata.json +++ b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.py b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.py similarity index 85% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.py rename to prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.py index 82d078f8c8e..99608483798 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_notebook_instance_without_direct_internet_access_configured(Check): diff --git a/providers/aws/services/sagemaker/sagemaker_service.py b/prowler/providers/aws/services/sagemaker/sagemaker_service.py similarity index 98% rename from providers/aws/services/sagemaker/sagemaker_service.py rename to prowler/providers/aws/services/sagemaker/sagemaker_service.py index 3aa16be6508..77000b89c9c 100644 --- a/providers/aws/services/sagemaker/sagemaker_service.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_service.py @@ -2,8 +2,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ SageMaker diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.py similarity index 85% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.py index 19bb4aac7fd..8bf9679da06 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_training_jobs_intercontainer_encryption_enabled(Check): diff --git a/providers/aws/services/secretsmanager/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/__init__.py similarity index 100% rename from providers/aws/services/secretsmanager/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.py similarity index 84% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.py index a48c543e828..dba10f2877d 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_training_jobs_network_isolation_enabled(Check): diff --git a/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.py similarity index 85% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.py index 018f435d0d6..91b8d5d1236 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_training_jobs_volume_and_output_encryption_enabled(Check): diff --git a/providers/aws/services/securityhub/__init__.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/__init__.py similarity index 100% rename from providers/aws/services/securityhub/__init__.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/__init__.py diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.metadata.json b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.metadata.json similarity index 100% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.metadata.json rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.metadata.json diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.py b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.py similarity index 85% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.py rename to prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.py index 7fc5b46dcc6..d9fd9d500fd 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.py +++ b/prowler/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sagemaker.sagemaker_client import sagemaker_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sagemaker.sagemaker_client import sagemaker_client class sagemaker_training_jobs_vpc_settings_configured(Check): diff --git a/providers/aws/services/securityhub/securityhub_enabled/__init__.py b/prowler/providers/aws/services/secretsmanager/__init__.py similarity index 100% rename from providers/aws/services/securityhub/securityhub_enabled/__init__.py rename to prowler/providers/aws/services/secretsmanager/__init__.py diff --git a/providers/aws/services/shield/__init__.py b/prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/__init__.py similarity index 100% rename from providers/aws/services/shield/__init__.py rename to prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/__init__.py diff --git a/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.metadata.json b/prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.metadata.json similarity index 100% rename from providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.metadata.json rename to prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.metadata.json diff --git a/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.py b/prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.py similarity index 86% rename from providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.py rename to prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.py index b11f1ee79b3..e016406f35b 100644 --- a/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.py +++ b/prowler/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.secretsmanager.secretsmanager_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.secretsmanager.secretsmanager_client import ( secretsmanager_client, ) diff --git a/prowler/providers/aws/services/secretsmanager/secretsmanager_client.py b/prowler/providers/aws/services/secretsmanager/secretsmanager_client.py new file mode 100644 index 00000000000..09475758e1b --- /dev/null +++ b/prowler/providers/aws/services/secretsmanager/secretsmanager_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.secretsmanager.secretsmanager_service import ( + SecretsManager, +) + +secretsmanager_client = SecretsManager(current_audit_info) diff --git a/providers/aws/services/secretsmanager/secretsmanager_service.py b/prowler/providers/aws/services/secretsmanager/secretsmanager_service.py similarity index 94% rename from providers/aws/services/secretsmanager/secretsmanager_service.py rename to prowler/providers/aws/services/secretsmanager/secretsmanager_service.py index 07851d3635a..c5de04a9c96 100644 --- a/providers/aws/services/secretsmanager/secretsmanager_service.py +++ b/prowler/providers/aws/services/secretsmanager/secretsmanager_service.py @@ -2,8 +2,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## SecretsManager diff --git a/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/__init__.py b/prowler/providers/aws/services/securityhub/__init__.py similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/__init__.py rename to prowler/providers/aws/services/securityhub/__init__.py diff --git a/prowler/providers/aws/services/securityhub/securityhub_client.py b/prowler/providers/aws/services/securityhub/securityhub_client.py new file mode 100644 index 00000000000..d7c7c7fe3f0 --- /dev/null +++ b/prowler/providers/aws/services/securityhub/securityhub_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.securityhub.securityhub_service import SecurityHub + +securityhub_client = SecurityHub(current_audit_info) diff --git a/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/__init__.py b/prowler/providers/aws/services/securityhub/securityhub_enabled/__init__.py similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/__init__.py rename to prowler/providers/aws/services/securityhub/securityhub_enabled/__init__.py diff --git a/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.metadata.json b/prowler/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.metadata.json similarity index 100% rename from providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.metadata.json rename to prowler/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.metadata.json diff --git a/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.py b/prowler/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.py similarity index 82% rename from providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.py rename to prowler/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.py index 536f914a8dc..6ea9f23b0c0 100644 --- a/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.py +++ b/prowler/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.securityhub.securityhub_client import securityhub_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.securityhub.securityhub_client import ( + securityhub_client, +) class securityhub_enabled(Check): diff --git a/providers/aws/services/securityhub/securityhub_service.py b/prowler/providers/aws/services/securityhub/securityhub_service.py similarity index 96% rename from providers/aws/services/securityhub/securityhub_service.py rename to prowler/providers/aws/services/securityhub/securityhub_service.py index f1c695dc6d9..83958ad2ef5 100644 --- a/providers/aws/services/securityhub/securityhub_service.py +++ b/prowler/providers/aws/services/securityhub/securityhub_service.py @@ -1,8 +1,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## SecurityHub diff --git a/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/__init__.py b/prowler/providers/aws/services/shield/__init__.py similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/__init__.py rename to prowler/providers/aws/services/shield/__init__.py diff --git a/providers/aws/services/shield/check_extra7170 b/prowler/providers/aws/services/shield/check_extra7170 similarity index 100% rename from providers/aws/services/shield/check_extra7170 rename to prowler/providers/aws/services/shield/check_extra7170 diff --git a/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/__init__.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/__init__.py similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/__init__.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/__init__.py diff --git a/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.metadata.json b/prowler/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.metadata.json similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.metadata.json rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.metadata.json diff --git a/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.py similarity index 82% rename from providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.py index 47f647e8010..c745ca934c2 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.py +++ b/prowler/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ec2.ec2_client import ec2_client -from providers.aws.services.shield.shield_client import shield_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ec2.ec2_client import ec2_client +from prowler.providers.aws.services.shield.shield_client import shield_client class shield_advanced_protection_in_associated_elastic_ips(Check): diff --git a/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/__init__.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/__init__.py similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/__init__.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/__init__.py diff --git a/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.metadata.json b/prowler/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.metadata.json similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.metadata.json rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.metadata.json diff --git a/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.py similarity index 83% rename from providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.py index 0c1dc8c53d5..b5ca63a9b60 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.py +++ b/prowler/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elb.elb_client import elb_client -from providers.aws.services.shield.shield_client import shield_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elb.elb_client import elb_client +from prowler.providers.aws.services.shield.shield_client import shield_client class shield_advanced_protection_in_classic_load_balancers(Check): diff --git a/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/__init__.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/__init__.py similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/__init__.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/__init__.py diff --git a/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.metadata.json b/prowler/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.metadata.json similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.metadata.json rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.metadata.json diff --git a/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.py similarity index 81% rename from providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.py index b99c65b7620..cb571921f32 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.py +++ b/prowler/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions.py @@ -1,6 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.cloudfront.cloudfront_client import cloudfront_client -from providers.aws.services.shield.shield_client import shield_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.cloudfront.cloudfront_client import ( + cloudfront_client, +) +from prowler.providers.aws.services.shield.shield_client import shield_client class shield_advanced_protection_in_cloudfront_distributions(Check): diff --git a/providers/aws/services/sns/__init__.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/__init__.py similarity index 100% rename from providers/aws/services/sns/__init__.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/__init__.py diff --git a/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.metadata.json b/prowler/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.metadata.json similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.metadata.json rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.metadata.json diff --git a/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.py similarity index 82% rename from providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.py index 2303a5441ab..c46bc0e14ac 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.py +++ b/prowler/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators.py @@ -1,8 +1,8 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.globalaccelerator.globalaccelerator_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.globalaccelerator.globalaccelerator_client import ( globalaccelerator_client, ) -from providers.aws.services.shield.shield_client import shield_client +from prowler.providers.aws.services.shield.shield_client import shield_client class shield_advanced_protection_in_global_accelerators(Check): diff --git a/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/__init__.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/__init__.py similarity index 100% rename from providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/__init__.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/__init__.py diff --git a/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.metadata.json b/prowler/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.metadata.json similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.metadata.json rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.metadata.json diff --git a/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.py similarity index 83% rename from providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.py index 4e4ad71f146..de89779e7e3 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.py +++ b/prowler/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.elbv2.elbv2_client import elbv2_client -from providers.aws.services.shield.shield_client import shield_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.elbv2.elbv2_client import elbv2_client +from prowler.providers.aws.services.shield.shield_client import shield_client class shield_advanced_protection_in_internet_facing_load_balancers(Check): diff --git a/providers/aws/services/sns/sns_topics_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/__init__.py similarity index 100% rename from providers/aws/services/sns/sns_topics_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/__init__.py diff --git a/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.metadata.json b/prowler/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.metadata.json similarity index 100% rename from providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.metadata.json rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.metadata.json diff --git a/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.py b/prowler/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.py similarity index 82% rename from providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.py rename to prowler/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.py index 31feeb593a7..3f10492ab45 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.py +++ b/prowler/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.route53.route53_client import route53_client -from providers.aws.services.shield.shield_client import shield_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.route53.route53_client import route53_client +from prowler.providers.aws.services.shield.shield_client import shield_client class shield_advanced_protection_in_route53_hosted_zones(Check): diff --git a/prowler/providers/aws/services/shield/shield_client.py b/prowler/providers/aws/services/shield/shield_client.py new file mode 100644 index 00000000000..277247132da --- /dev/null +++ b/prowler/providers/aws/services/shield/shield_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.shield.shield_service import Shield + +shield_client = Shield(current_audit_info) diff --git a/providers/aws/services/shield/shield_service.py b/prowler/providers/aws/services/shield/shield_service.py similarity index 95% rename from providers/aws/services/shield/shield_service.py rename to prowler/providers/aws/services/shield/shield_service.py index e8c5f58b3e1..4d1eb1876f3 100644 --- a/providers/aws/services/shield/shield_service.py +++ b/prowler/providers/aws/services/shield/shield_service.py @@ -1,6 +1,7 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import get_region_global_service + +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import get_region_global_service ################### Shield diff --git a/providers/aws/services/sqs/__init__.py b/prowler/providers/aws/services/sns/__init__.py similarity index 100% rename from providers/aws/services/sqs/__init__.py rename to prowler/providers/aws/services/sns/__init__.py diff --git a/prowler/providers/aws/services/sns/sns_client.py b/prowler/providers/aws/services/sns/sns_client.py new file mode 100644 index 00000000000..1568449589c --- /dev/null +++ b/prowler/providers/aws/services/sns/sns_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.sns.sns_service import SNS + +sns_client = SNS(current_audit_info) diff --git a/providers/aws/services/sns/sns_service.py b/prowler/providers/aws/services/sns/sns_service.py similarity index 95% rename from providers/aws/services/sns/sns_service.py rename to prowler/providers/aws/services/sns/sns_service.py index 5e89b54dc64..bea9e316500 100644 --- a/providers/aws/services/sns/sns_service.py +++ b/prowler/providers/aws/services/sns/sns_service.py @@ -3,8 +3,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ SNS diff --git a/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/__init__.py b/prowler/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/__init__.py similarity index 100% rename from providers/aws/services/sqs/sqs_queues_not_publicly_accessible/__init__.py rename to prowler/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/__init__.py diff --git a/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.metadata.json b/prowler/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.metadata.json similarity index 100% rename from providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.metadata.json rename to prowler/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.metadata.json diff --git a/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.py b/prowler/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.py similarity index 83% rename from providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.py rename to prowler/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.py index f8b73c2207d..5288389e345 100644 --- a/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.py +++ b/prowler/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sns.sns_client import sns_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sns.sns_client import sns_client class sns_topics_kms_encryption_at_rest_enabled(Check): diff --git a/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/__init__.py b/prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/__init__.py rename to prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.metadata.json index f6a064928c3..477b3b2a9c7 100644 --- a/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.py b/prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.py similarity index 93% rename from providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.py rename to prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.py index 30dce67e036..03790488c12 100644 --- a/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.py +++ b/prowler/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sns.sns_client import sns_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sns.sns_client import sns_client class sns_topics_not_publicly_accessible(Check): diff --git a/providers/aws/services/ssm/__init__.py b/prowler/providers/aws/services/sqs/__init__.py similarity index 100% rename from providers/aws/services/ssm/__init__.py rename to prowler/providers/aws/services/sqs/__init__.py diff --git a/prowler/providers/aws/services/sqs/sqs_client.py b/prowler/providers/aws/services/sqs/sqs_client.py new file mode 100644 index 00000000000..ffbc3977f5d --- /dev/null +++ b/prowler/providers/aws/services/sqs/sqs_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.sqs.sqs_service import SQS + +sqs_client = SQS(current_audit_info) diff --git a/providers/aws/services/ssm/ssm_document_secrets/__init__.py b/prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/__init__.py similarity index 100% rename from providers/aws/services/ssm/ssm_document_secrets/__init__.py rename to prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/__init__.py diff --git a/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.metadata.json b/prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.metadata.json similarity index 99% rename from providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.metadata.json rename to prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.metadata.json index 79e61ce4ebe..d5d32c37825 100644 --- a/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.metadata.json +++ b/prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.metadata.json @@ -33,4 +33,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.py b/prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.py similarity index 93% rename from providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.py rename to prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.py index d659e6459aa..d89b7a214cf 100644 --- a/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.py +++ b/prowler/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sqs.sqs_client import sqs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sqs.sqs_client import sqs_client class sqs_queues_not_publicly_accessible(Check): diff --git a/providers/aws/services/ssm/ssm_documents_set_as_public/__init__.py b/prowler/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/__init__.py similarity index 100% rename from providers/aws/services/ssm/ssm_documents_set_as_public/__init__.py rename to prowler/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/__init__.py diff --git a/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.metadata.json b/prowler/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.metadata.json rename to prowler/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.metadata.json diff --git a/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.py b/prowler/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.py similarity index 85% rename from providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.py rename to prowler/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.py index e11a76b6b18..01bd971baf7 100644 --- a/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.py +++ b/prowler/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.sqs.sqs_client import sqs_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.sqs.sqs_client import sqs_client class sqs_queues_server_side_encryption_enabled(Check): diff --git a/providers/aws/services/sqs/sqs_service.py b/prowler/providers/aws/services/sqs/sqs_service.py similarity index 95% rename from providers/aws/services/sqs/sqs_service.py rename to prowler/providers/aws/services/sqs/sqs_service.py index b74c98c1eff..cdb38e87a8c 100644 --- a/providers/aws/services/sqs/sqs_service.py +++ b/prowler/providers/aws/services/sqs/sqs_service.py @@ -3,8 +3,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ SQS diff --git a/providers/aws/services/ssm/ssm_managed_compliant_patching/__init__.py b/prowler/providers/aws/services/ssm/__init__.py similarity index 100% rename from providers/aws/services/ssm/ssm_managed_compliant_patching/__init__.py rename to prowler/providers/aws/services/ssm/__init__.py diff --git a/prowler/providers/aws/services/ssm/ssm_client.py b/prowler/providers/aws/services/ssm/ssm_client.py new file mode 100644 index 00000000000..cce00a8cabc --- /dev/null +++ b/prowler/providers/aws/services/ssm/ssm_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.ssm.ssm_service import SSM + +ssm_client = SSM(current_audit_info) diff --git a/providers/aws/services/trustedadvisor/__init__.py b/prowler/providers/aws/services/ssm/ssm_document_secrets/__init__.py similarity index 100% rename from providers/aws/services/trustedadvisor/__init__.py rename to prowler/providers/aws/services/ssm/ssm_document_secrets/__init__.py diff --git a/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.metadata.json b/prowler/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.metadata.json similarity index 100% rename from providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.metadata.json rename to prowler/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.metadata.json diff --git a/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.py b/prowler/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.py similarity index 92% rename from providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.py rename to prowler/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.py index f0fe64e2824..605362c4c09 100644 --- a/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.py +++ b/prowler/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets.py @@ -5,8 +5,8 @@ from detect_secrets import SecretsCollection from detect_secrets.settings import default_settings -from lib.check.models import Check, Check_Report -from providers.aws.services.ssm.ssm_client import ssm_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ssm.ssm_client import ssm_client class ssm_document_secrets(Check): diff --git a/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/__init__.py b/prowler/providers/aws/services/ssm/ssm_documents_set_as_public/__init__.py similarity index 100% rename from providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/__init__.py rename to prowler/providers/aws/services/ssm/ssm_documents_set_as_public/__init__.py diff --git a/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.metadata.json b/prowler/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.metadata.json similarity index 100% rename from providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.metadata.json rename to prowler/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.metadata.json diff --git a/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.py b/prowler/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.py similarity index 86% rename from providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.py rename to prowler/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.py index ac984d60b7b..e1fc77c7fe2 100644 --- a/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.py +++ b/prowler/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ssm.ssm_client import ssm_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ssm.ssm_client import ssm_client class ssm_documents_set_as_public(Check): diff --git a/providers/aws/services/vpc/__init__.py b/prowler/providers/aws/services/ssm/ssm_managed_compliant_patching/__init__.py similarity index 100% rename from providers/aws/services/vpc/__init__.py rename to prowler/providers/aws/services/ssm/ssm_managed_compliant_patching/__init__.py diff --git a/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.metadata.json b/prowler/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.metadata.json similarity index 100% rename from providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.metadata.json rename to prowler/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.metadata.json diff --git a/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.py b/prowler/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.py similarity index 81% rename from providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.py rename to prowler/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.py index 81a98104947..799085ebbfd 100644 --- a/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.py +++ b/prowler/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching.py @@ -1,6 +1,6 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.ssm.ssm_client import ssm_client -from providers.aws.services.ssm.ssm_service import ResourceStatus +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.ssm.ssm_client import ssm_client +from prowler.providers.aws.services.ssm.ssm_service import ResourceStatus class ssm_managed_compliant_patching(Check): diff --git a/providers/aws/services/ssm/ssm_service.py b/prowler/providers/aws/services/ssm/ssm_service.py similarity index 98% rename from providers/aws/services/ssm/ssm_service.py rename to prowler/providers/aws/services/ssm/ssm_service.py index 6ee5b054cd6..74f444a7af2 100644 --- a/providers/aws/services/ssm/ssm_service.py +++ b/prowler/providers/aws/services/ssm/ssm_service.py @@ -4,8 +4,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## SSM diff --git a/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/__init__.py b/prowler/providers/aws/services/trustedadvisor/__init__.py similarity index 100% rename from providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/__init__.py rename to prowler/providers/aws/services/trustedadvisor/__init__.py diff --git a/prowler/providers/aws/services/trustedadvisor/trustedadvisor_client.py b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_client.py new file mode 100644 index 00000000000..b037a841003 --- /dev/null +++ b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_client.py @@ -0,0 +1,6 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.trustedadvisor.trustedadvisor_service import ( + TrustedAdvisor, +) + +trustedadvisor_client = TrustedAdvisor(current_audit_info) diff --git a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/__init__.py b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/__init__.py similarity index 100% rename from providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/__init__.py rename to prowler/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/__init__.py diff --git a/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.metadata.json b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.metadata.json similarity index 100% rename from providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.metadata.json rename to prowler/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.metadata.json diff --git a/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.py b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.py similarity index 83% rename from providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.py rename to prowler/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.py index b80c4d0347d..5441ac4032c 100644 --- a/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.py +++ b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.trustedadvisor.trustedadvisor_client import ( +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.trustedadvisor.trustedadvisor_client import ( trustedadvisor_client, ) diff --git a/providers/aws/services/trustedadvisor/trustedadvisor_service.py b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_service.py similarity index 95% rename from providers/aws/services/trustedadvisor/trustedadvisor_service.py rename to prowler/providers/aws/services/trustedadvisor/trustedadvisor_service.py index 639db18fd4a..e2601d37465 100644 --- a/providers/aws/services/trustedadvisor/trustedadvisor_service.py +++ b/prowler/providers/aws/services/trustedadvisor/trustedadvisor_service.py @@ -3,8 +3,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ TrustedAdvisor diff --git a/providers/aws/services/vpc/vpc_flow_logs_enabled/__init__.py b/prowler/providers/aws/services/vpc/__init__.py similarity index 100% rename from providers/aws/services/vpc/vpc_flow_logs_enabled/__init__.py rename to prowler/providers/aws/services/vpc/__init__.py diff --git a/prowler/providers/aws/services/vpc/vpc_client.py b/prowler/providers/aws/services/vpc/vpc_client.py new file mode 100644 index 00000000000..22d241c4e4c --- /dev/null +++ b/prowler/providers/aws/services/vpc/vpc_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.vpc.vpc_service import VPC + +vpc_client = VPC(current_audit_info) diff --git a/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/__init__.py b/prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/__init__.py similarity index 100% rename from providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/__init__.py rename to prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/__init__.py diff --git a/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.metadata.json b/prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.metadata.json similarity index 99% rename from providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.metadata.json rename to prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.metadata.json index 70e755e046f..ecc60f9508a 100644 --- a/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.metadata.json +++ b/prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.py b/prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.py similarity index 89% rename from providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.py rename to prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.py index 5513df5d693..e7cb5b58673 100644 --- a/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.py +++ b/prowler/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries.py @@ -1,12 +1,12 @@ -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.vpc.vpc_client import vpc_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.vpc.vpc_client import vpc_client class vpc_endpoint_connections_trust_boundaries(Check): def execute(self): findings = [] - # Get trusted account_ids from config.yaml + # Get trusted account_ids from prowler.config.yaml trusted_account_ids = get_config_var("trusted_account_ids") for endpoint in vpc_client.vpc_endpoints: # Check VPC endpoint policy diff --git a/providers/aws/services/waf/__init__.py b/prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/__init__.py similarity index 100% rename from providers/aws/services/waf/__init__.py rename to prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/__init__.py diff --git a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.metadata.json b/prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.metadata.json similarity index 99% rename from providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.metadata.json rename to prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.metadata.json index c6fbd049e76..8c0b1920e61 100644 --- a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.metadata.json +++ b/prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.py b/prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.py similarity index 87% rename from providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.py rename to prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.py index f4e9f6f82bc..19f6888fe9a 100644 --- a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.py +++ b/prowler/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries.py @@ -1,12 +1,12 @@ -from config.config import get_config_var -from lib.check.models import Check, Check_Report -from providers.aws.services.vpc.vpc_client import vpc_client +from prowler.config.config import get_config_var +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.vpc.vpc_client import vpc_client class vpc_endpoint_services_allowed_principals_trust_boundaries(Check): def execute(self): findings = [] - # Get trusted account_ids from config.yaml + # Get trusted account_ids from prowler.config.yaml trusted_account_ids = get_config_var("trusted_account_ids") for service in vpc_client.vpc_endpoint_services: if not service.allowed_principals: diff --git a/providers/aws/services/wafv2/__init__.py b/prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/__init__.py similarity index 100% rename from providers/aws/services/wafv2/__init__.py rename to prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/__init__.py diff --git a/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.metadata.json b/prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.metadata.json similarity index 99% rename from providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.metadata.json rename to prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.metadata.json index 92d85218866..94e657a1751 100644 --- a/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.metadata.json +++ b/prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.metadata.json @@ -35,4 +35,4 @@ "DependsOn": [], "RelatedTo": [], "Notes": "" -} \ No newline at end of file +} diff --git a/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.py b/prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.py similarity index 83% rename from providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.py rename to prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.py index e12e7b2adfa..32a90dd8e9d 100644 --- a/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.py +++ b/prowler/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.vpc.vpc_client import vpc_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.vpc.vpc_client import vpc_client class vpc_flow_logs_enabled(Check): diff --git a/providers/aws/services/workspaces/__init__.py b/prowler/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/__init__.py similarity index 100% rename from providers/aws/services/workspaces/__init__.py rename to prowler/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/__init__.py diff --git a/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.metadata.json b/prowler/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.metadata.json similarity index 100% rename from providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.metadata.json rename to prowler/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.metadata.json diff --git a/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.py b/prowler/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.py similarity index 91% rename from providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.py rename to prowler/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.py index 72e04ed83c7..d2b5634462a 100644 --- a/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.py +++ b/prowler/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.vpc.vpc_client import vpc_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.vpc.vpc_client import vpc_client class vpc_peering_routing_tables_with_least_privilege(Check): diff --git a/providers/aws/services/vpc/vpc_service.py b/prowler/providers/aws/services/vpc/vpc_service.py similarity index 98% rename from providers/aws/services/vpc/vpc_service.py rename to prowler/providers/aws/services/vpc/vpc_service.py index f3387da0422..286a49a91eb 100644 --- a/providers/aws/services/vpc/vpc_service.py +++ b/prowler/providers/aws/services/vpc/vpc_service.py @@ -2,8 +2,8 @@ import threading from dataclasses import dataclass -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################## VPC diff --git a/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/__init__.py b/prowler/providers/aws/services/waf/__init__.py similarity index 100% rename from providers/aws/services/workspaces/workspaces_volume_encryption_enabled/__init__.py rename to prowler/providers/aws/services/waf/__init__.py diff --git a/prowler/providers/aws/services/waf/waf_client.py b/prowler/providers/aws/services/waf/waf_client.py new file mode 100644 index 00000000000..7e30b16239a --- /dev/null +++ b/prowler/providers/aws/services/waf/waf_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.waf.waf_service import WAF + +waf_client = WAF(current_audit_info) diff --git a/providers/aws/services/waf/waf_service.py b/prowler/providers/aws/services/waf/waf_service.py similarity index 95% rename from providers/aws/services/waf/waf_service.py rename to prowler/providers/aws/services/waf/waf_service.py index 3d0b813df85..44dad8ae974 100644 --- a/providers/aws/services/waf/waf_service.py +++ b/prowler/providers/aws/services/waf/waf_service.py @@ -2,8 +2,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################### WAF diff --git a/providers/azure/services/defender/__init__.py b/prowler/providers/aws/services/wafv2/__init__.py similarity index 100% rename from providers/azure/services/defender/__init__.py rename to prowler/providers/aws/services/wafv2/__init__.py diff --git a/prowler/providers/aws/services/wafv2/wafv2_client.py b/prowler/providers/aws/services/wafv2/wafv2_client.py new file mode 100644 index 00000000000..76832a0efec --- /dev/null +++ b/prowler/providers/aws/services/wafv2/wafv2_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.wafv2.wafv2_service import WAFv2 + +wafv2_client = WAFv2(current_audit_info) diff --git a/providers/aws/services/wafv2/wafv2_service.py b/prowler/providers/aws/services/wafv2/wafv2_service.py similarity index 95% rename from providers/aws/services/wafv2/wafv2_service.py rename to prowler/providers/aws/services/wafv2/wafv2_service.py index abd7416adc4..97c6055fa9d 100644 --- a/providers/aws/services/wafv2/wafv2_service.py +++ b/prowler/providers/aws/services/wafv2/wafv2_service.py @@ -2,8 +2,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################### WAFv2 diff --git a/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/__init__.py b/prowler/providers/aws/services/workspaces/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/__init__.py rename to prowler/providers/aws/services/workspaces/__init__.py diff --git a/prowler/providers/aws/services/workspaces/workspaces_client.py b/prowler/providers/aws/services/workspaces/workspaces_client.py new file mode 100644 index 00000000000..9fea90781bf --- /dev/null +++ b/prowler/providers/aws/services/workspaces/workspaces_client.py @@ -0,0 +1,4 @@ +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.workspaces.workspaces_service import WorkSpaces + +workspaces_client = WorkSpaces(current_audit_info) diff --git a/providers/aws/services/workspaces/workspaces_service.py b/prowler/providers/aws/services/workspaces/workspaces_service.py similarity index 95% rename from providers/aws/services/workspaces/workspaces_service.py rename to prowler/providers/aws/services/workspaces/workspaces_service.py index 4ad79cd704d..05c725d93f7 100644 --- a/providers/aws/services/workspaces/workspaces_service.py +++ b/prowler/providers/aws/services/workspaces/workspaces_service.py @@ -2,8 +2,8 @@ from pydantic import BaseModel -from lib.logger import logger -from providers.aws.aws_provider import generate_regional_clients +from prowler.lib.logger import logger +from prowler.providers.aws.aws_provider import generate_regional_clients ################################ WorkSpaces diff --git a/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/__init__.py b/prowler/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/__init__.py rename to prowler/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/__init__.py diff --git a/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.metadata.json b/prowler/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.metadata.json similarity index 100% rename from providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.metadata.json rename to prowler/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.metadata.json diff --git a/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.py b/prowler/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.py similarity index 89% rename from providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.py rename to prowler/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.py index c4095db6739..0f6f6465004 100644 --- a/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.py +++ b/prowler/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled.py @@ -1,5 +1,7 @@ -from lib.check.models import Check, Check_Report -from providers.aws.services.workspaces.workspaces_client import workspaces_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.aws.services.workspaces.workspaces_client import ( + workspaces_client, +) class workspaces_volume_encryption_enabled(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/__init__.py b/prowler/providers/azure/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/__init__.py rename to prowler/providers/azure/__init__.py diff --git a/providers/azure/azure_provider.py b/prowler/providers/azure/azure_provider.py similarity index 97% rename from providers/azure/azure_provider.py rename to prowler/providers/azure/azure_provider.py index 53c8ade1f26..e9f47db2e43 100644 --- a/providers/azure/azure_provider.py +++ b/prowler/providers/azure/azure_provider.py @@ -5,9 +5,12 @@ from azure.mgmt.subscription import SubscriptionClient from msgraph.core import GraphClient -from lib.logger import logger -from providers.azure.lib.audit_info.audit_info import azure_audit_info -from providers.azure.lib.audit_info.models import Azure_Audit_Info, Azure_Identity_Info +from prowler.lib.logger import logger +from prowler.providers.azure.lib.audit_info.audit_info import azure_audit_info +from prowler.providers.azure.lib.audit_info.models import ( + Azure_Audit_Info, + Azure_Identity_Info, +) class Azure_Provider: diff --git a/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/__init__.py b/prowler/providers/azure/lib/audit_info/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/__init__.py rename to prowler/providers/azure/lib/audit_info/__init__.py diff --git a/prowler/providers/azure/lib/audit_info/audit_info.py b/prowler/providers/azure/lib/audit_info/audit_info.py new file mode 100644 index 00000000000..53bf08d8874 --- /dev/null +++ b/prowler/providers/azure/lib/audit_info/audit_info.py @@ -0,0 +1,6 @@ +from prowler.providers.azure.lib.audit_info.models import ( + Azure_Audit_Info, + Azure_Identity_Info, +) + +azure_audit_info = Azure_Audit_Info(credentials=None, identity=Azure_Identity_Info()) diff --git a/providers/azure/lib/audit_info/models.py b/prowler/providers/azure/lib/audit_info/models.py similarity index 100% rename from providers/azure/lib/audit_info/models.py rename to prowler/providers/azure/lib/audit_info/models.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/__init__.py b/prowler/providers/azure/services/defender/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/__init__.py rename to prowler/providers/azure/services/defender/__init__.py diff --git a/prowler/providers/azure/services/defender/defender_client.py b/prowler/providers/azure/services/defender/defender_client.py new file mode 100644 index 00000000000..f2f50f1a8a1 --- /dev/null +++ b/prowler/providers/azure/services/defender/defender_client.py @@ -0,0 +1,4 @@ +from prowler.providers.azure.lib.audit_info.audit_info import azure_audit_info +from prowler.providers.azure.services.defender.defender_service import Defender + +defender_client = Defender(azure_audit_info) diff --git a/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.py similarity index 85% rename from providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.py index 70bb004cc3a..7fc6eb37fe0 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_app_services_is_on(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.py similarity index 85% rename from providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.py index d507f3faa0c..9e37c62cdcd 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_arm_is_on(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.py similarity index 86% rename from providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.py index 66b9bee0829..6bece7ecff8 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_azure_sql_databases_is_on(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.py similarity index 85% rename from providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.py index 055af9ad027..11352e1d980 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_containers_is_on(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_server_is_on/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.py similarity index 85% rename from providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.py index 5bd5e345d38..c6a5800e95e 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_cosmosdb_is_on(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.py similarity index 88% rename from providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.py index 5b2418bf197..51f95664659 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_databases_is_on(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.py similarity index 85% rename from providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.py index b6d5b0aea9d..6bfae5b80dd 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_dns_is_on(Check): diff --git a/providers/azure/services/iam/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/__init__.py similarity index 100% rename from providers/azure/services/iam/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.py similarity index 85% rename from providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.py index 2f1bdb045e8..e740497727b 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_keyvault_is_on(Check): diff --git a/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/__init__.py similarity index 100% rename from providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.py similarity index 87% rename from providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.py index ae2707386d4..2b79648d553 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_os_relational_databases_is_on(Check): diff --git a/providers/azure/services/storage/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/__init__.py similarity index 100% rename from providers/azure/services/storage/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.py similarity index 85% rename from providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.py index cace2055fa3..082e5094e54 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_server_is_on(Check): diff --git a/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_blob_public_access_level_is_disabled/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.py similarity index 86% rename from providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.py index b173b51fdd5..2d0adb0f652 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_sql_servers_is_on(Check): diff --git a/providers/azure/services/storage/storage_default_network_access_rule_is_denied/__init__.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_default_network_access_rule_is_denied/__init__.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/__init__.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.metadata.json b/prowler/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.metadata.json similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.metadata.json rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.metadata.json diff --git a/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.py b/prowler/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.py similarity index 86% rename from providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.py rename to prowler/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.py index 3e35ea124e4..0423d91990f 100644 --- a/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.py +++ b/prowler/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.defender.defender_client import defender_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.defender.defender_client import defender_client class defender_ensure_defender_for_storage_is_on(Check): diff --git a/providers/azure/services/defender/defender_service.py b/prowler/providers/azure/services/defender/defender_service.py similarity index 98% rename from providers/azure/services/defender/defender_service.py rename to prowler/providers/azure/services/defender/defender_service.py index ec822f39d9b..9c281faa4c3 100644 --- a/providers/azure/services/defender/defender_service.py +++ b/prowler/providers/azure/services/defender/defender_service.py @@ -3,7 +3,7 @@ from azure.mgmt.security import SecurityCenter from pydantic import BaseModel -from lib.logger import logger +from prowler.lib.logger import logger ########################## Defender diff --git a/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/__init__.py b/prowler/providers/azure/services/iam/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/__init__.py rename to prowler/providers/azure/services/iam/__init__.py diff --git a/prowler/providers/azure/services/iam/iam_client.py b/prowler/providers/azure/services/iam/iam_client.py new file mode 100644 index 00000000000..b4d7fd42aed --- /dev/null +++ b/prowler/providers/azure/services/iam/iam_client.py @@ -0,0 +1,4 @@ +from prowler.providers.azure.lib.audit_info.audit_info import azure_audit_info +from prowler.providers.azure.services.iam.iam_service import IAM + +iam_client = IAM(azure_audit_info) diff --git a/providers/azure/services/iam/iam_service.py b/prowler/providers/azure/services/iam/iam_service.py similarity index 98% rename from providers/azure/services/iam/iam_service.py rename to prowler/providers/azure/services/iam/iam_service.py index 42640e45cdd..71f4d2ec997 100644 --- a/providers/azure/services/iam/iam_service.py +++ b/prowler/providers/azure/services/iam/iam_service.py @@ -3,7 +3,7 @@ from azure.mgmt.authorization import AuthorizationManagementClient from azure.mgmt.authorization.v2022_04_01.models import Permission -from lib.logger import logger +from prowler.lib.logger import logger ########################## IAM diff --git a/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/__init__.py b/prowler/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/__init__.py rename to prowler/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/__init__.py diff --git a/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.metadata.json b/prowler/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.metadata.json similarity index 100% rename from providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.metadata.json rename to prowler/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.metadata.json diff --git a/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.py b/prowler/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.py similarity index 89% rename from providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.py rename to prowler/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.py index 1d0bcf122a6..a14210e063b 100644 --- a/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.py +++ b/prowler/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created.py @@ -1,7 +1,7 @@ from re import search -from lib.check.models import Check, Check_Report -from providers.azure.services.iam.iam_client import iam_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.iam.iam_client import iam_client class iam_subscription_roles_owner_custom_not_created(Check): diff --git a/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/__init__.py b/prowler/providers/azure/services/storage/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_ensure_minimum_tls_version_12/__init__.py rename to prowler/providers/azure/services/storage/__init__.py diff --git a/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/__init__.py b/prowler/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/__init__.py rename to prowler/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/__init__.py diff --git a/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.metadata.json b/prowler/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.metadata.json similarity index 100% rename from providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.metadata.json rename to prowler/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.metadata.json diff --git a/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.py b/prowler/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.py similarity index 87% rename from providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.py rename to prowler/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.py index bab5120338f..a9a89929bb6 100644 --- a/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.py +++ b/prowler/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.storage.storage_client import storage_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.storage.storage_client import storage_client class storage_blob_public_access_level_is_disabled(Check): diff --git a/prowler/providers/azure/services/storage/storage_client.py b/prowler/providers/azure/services/storage/storage_client.py new file mode 100644 index 00000000000..2a18d2cab24 --- /dev/null +++ b/prowler/providers/azure/services/storage/storage_client.py @@ -0,0 +1,4 @@ +from prowler.providers.azure.lib.audit_info.audit_info import azure_audit_info +from prowler.providers.azure.services.storage.storage_service import Storage + +storage_client = Storage(azure_audit_info) diff --git a/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/__init__.py b/prowler/providers/azure/services/storage/storage_default_network_access_rule_is_denied/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_secure_transfer_required_is_enabled/__init__.py rename to prowler/providers/azure/services/storage/storage_default_network_access_rule_is_denied/__init__.py diff --git a/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.metadata.json b/prowler/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.metadata.json similarity index 100% rename from providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.metadata.json rename to prowler/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.metadata.json diff --git a/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.py b/prowler/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.py similarity index 87% rename from providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.py rename to prowler/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.py index df4a4a4295b..95feb93d065 100644 --- a/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.py +++ b/prowler/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.storage.storage_client import storage_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.storage.storage_client import storage_client class storage_default_network_access_rule_is_denied(Check): diff --git a/lib/outputs/fixtures/prowler-output-123456789012.csv b/prowler/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/__init__.py similarity index 100% rename from lib/outputs/fixtures/prowler-output-123456789012.csv rename to prowler/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/__init__.py diff --git a/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.metadata.json b/prowler/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.metadata.json similarity index 100% rename from providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.metadata.json rename to prowler/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.metadata.json diff --git a/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.py b/prowler/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.py similarity index 88% rename from providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.py rename to prowler/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.py index 54838209eaa..1e8734e05e1 100644 --- a/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.py +++ b/prowler/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.storage.storage_client import storage_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.storage.storage_client import storage_client class storage_ensure_azure_services_are_trusted_to_access_is_enabled(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on_test.py b/prowler/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on_test.py rename to prowler/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/__init__.py diff --git a/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.metadata.json b/prowler/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.metadata.json similarity index 100% rename from providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.metadata.json rename to prowler/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.metadata.json diff --git a/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.py b/prowler/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.py similarity index 87% rename from providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.py rename to prowler/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.py index 3fce778ee6b..83b0de55103 100644 --- a/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.py +++ b/prowler/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.storage.storage_client import storage_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.storage.storage_client import storage_client class storage_ensure_encryption_with_customer_managed_keys(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on_test.py b/prowler/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on_test.py rename to prowler/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/__init__.py diff --git a/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.metadata.json b/prowler/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.metadata.json similarity index 100% rename from providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.metadata.json rename to prowler/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.metadata.json diff --git a/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.py b/prowler/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.py similarity index 87% rename from providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.py rename to prowler/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.py index 322ec2e9fa1..1161fa04fec 100644 --- a/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.py +++ b/prowler/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.storage.storage_client import storage_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.storage.storage_client import storage_client class storage_ensure_minimum_tls_version_12(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on_test.py b/prowler/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on_test.py rename to prowler/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/__init__.py diff --git a/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.metadata.json b/prowler/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.metadata.json similarity index 100% rename from providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.metadata.json rename to prowler/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.metadata.json diff --git a/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.py b/prowler/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.py similarity index 87% rename from providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.py rename to prowler/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.py index 13835bdc19c..95fed930dc8 100644 --- a/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.py +++ b/prowler/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.storage.storage_client import storage_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.storage.storage_client import storage_client class storage_infrastructure_encryption_is_enabled(Check): diff --git a/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on_test.py b/prowler/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on_test.py rename to prowler/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/__init__.py diff --git a/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.metadata.json b/prowler/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.metadata.json similarity index 100% rename from providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.metadata.json rename to prowler/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.metadata.json diff --git a/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.py b/prowler/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.py similarity index 87% rename from providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.py rename to prowler/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.py index 3790d0684bc..ec1a9cb8fed 100644 --- a/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.py +++ b/prowler/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled.py @@ -1,5 +1,5 @@ -from lib.check.models import Check, Check_Report -from providers.azure.services.storage.storage_client import storage_client +from prowler.lib.check.models import Check, Check_Report +from prowler.providers.azure.services.storage.storage_client import storage_client class storage_secure_transfer_required_is_enabled(Check): diff --git a/providers/azure/services/storage/storage_service.py b/prowler/providers/azure/services/storage/storage_service.py similarity index 98% rename from providers/azure/services/storage/storage_service.py rename to prowler/providers/azure/services/storage/storage_service.py index d6ea71a6c28..2c9d6cc0f5c 100644 --- a/providers/azure/services/storage/storage_service.py +++ b/prowler/providers/azure/services/storage/storage_service.py @@ -3,7 +3,7 @@ from azure.mgmt.storage import StorageManagementClient from azure.mgmt.storage.v2022_09_01.models import NetworkRuleSet -from lib.logger import logger +from prowler.lib.logger import logger ########################## Storage diff --git a/pyproject.toml b/pyproject.toml new file mode 100644 index 00000000000..96cce0de857 --- /dev/null +++ b/pyproject.toml @@ -0,0 +1,66 @@ +[build-system] +requires = ["setuptools>=61.0"] +build-backend = "setuptools.build_meta" + +[project] +name = "prowler-cloud" +# https://peps.python.org/pep-0440/ +version = "3.0.0-rc1" +authors = [{ name = "Toni de la Fuente", email = "toni@blyx.com" }] +maintainers = [ + { name = "Sergio Garcia", email = "sergio@verica.io" }, + { name = "Nacho Rivera", email = "nacho@verica.io" }, + { name = "Pepe Fagoaga", email = "pepe@verica.io" }, +] +description = "Prowler is an Open Source security tool to perform AWS security best practices assessments, audits, incident response, continuous monitoring, hardening and forensics readiness. It contains more than 240 controls covering CIS, PCI-DSS, ISO27001, GDPR, HIPAA, FFIEC, SOC2, AWS FTR, ENS and custom security frameworks." +readme = "README.md" +requires-python = ">=3.9" +license = { text = "Apache-2.0" } +classifiers = [ + "Programming Language :: Python :: 3", + "Programming Language :: Python :: 3.9", + "License :: OSI Approved :: Apache Software License", +] + +# https://peps.python.org/pep-0631/ +dependencies = [ + "colorama ~=0.4.4", + "boto3 ~=1.26.17", + "arnparse ~=0.0.2", + "botocore ~=1.29.18", + "pydantic ~=1.9.1", + "shodan ~=1.28.0", + "detect-secrets ~=1.4.0", + "alive-progress ~=2.4.1", + "tabulate ~=0.9.0", + "azure-identity ~=1.12.0", + "azure-storage-blob ~=12.14.1", + "msgraph-core ~=0.2.2", + "azure-mgmt-subscription ~=3.1.1", + "azure-mgmt-authorization ~=3.0.0", + "azure-mgmt-security ~=3.0.0", + "azure-mgmt-storage ~=21.0.0", +] + +[project.urls] +"Homepage" = "https://github.com/prowler-cloud/prowler" +"Documentation" = "https://github.com/prowler-cloud/prowler/blob/master/README.md" +"Issue tracker" = "https://github.com/prowler-cloud/prowler/issues" +"Changelog" = "https://github.com/prowler-cloud/prowler/releases" + +# https://setuptools.pypa.io/en/latest/userguide/package_discovery.html +[tool.setuptools] +include-package-data = true +package-dir = { "prowler" = "prowler" } + +[tool.setuptools.package-data] +# We need the above pattern to include our data files +"*" = ["*.yaml", "*.json"] + +[project.scripts] +prowler = "prowler.__main__:prowler" + +[tool.pytest.ini_options] +pythonpath = [ + "." +] diff --git a/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on_test.py b/tests/__init__.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on_test.py rename to tests/__init__.py diff --git a/lib/check/check_test.py b/tests/lib/check/check_test.py similarity index 54% rename from lib/check/check_test.py rename to tests/lib/check/check_test.py index 157dedfc80b..4b4ea80d935 100644 --- a/lib/check/check_test.py +++ b/tests/lib/check/check_test.py @@ -1,14 +1,11 @@ import os -from unittest import mock -from lib.check.check import ( - bulk_load_compliance_frameworks, +from prowler.lib.check.check import ( exclude_checks_to_run, exclude_services_to_run, - parse_checks_from_compliance_framework, parse_checks_from_file, ) -from lib.check.models import load_check_metadata +from prowler.lib.check.models import load_check_metadata class Test_Check: @@ -110,74 +107,74 @@ def test_exclude_services_to_run(self): == test["expected"] ) - def test_parse_checks_from_compliance_framework_two(self): - test_case = { - "input": {"compliance_frameworks": ["cis_v1.4_aws", "ens_v3_aws"]}, - "expected": { - "vpc_flow_logs_enabled", - "ec2_ebs_snapshot_encryption", - "iam_user_mfa_enabled_console_access", - "cloudtrail_multi_region_enabled", - "ec2_elbv2_insecure_ssl_ciphers", - "guardduty_is_enabled", - "s3_bucket_default_encryption", - "cloudfront_distributions_https_enabled", - "iam_avoid_root_usage", - "s3_bucket_secure_transport_policy", - }, - } - with mock.patch( - "lib.check.check.compliance_specification_dir", - new=f"{os.path.dirname(os.path.realpath(__file__))}/fixtures", - ): - provider = "aws" - bulk_compliance_frameworks = bulk_load_compliance_frameworks(provider) - compliance_frameworks = test_case["input"]["compliance_frameworks"] - assert ( - parse_checks_from_compliance_framework( - compliance_frameworks, bulk_compliance_frameworks - ) - == test_case["expected"] - ) + # def test_parse_checks_from_compliance_framework_two(self): + # test_case = { + # "input": {"compliance_frameworks": ["cis_v1.4_aws", "ens_v3_aws"]}, + # "expected": { + # "vpc_flow_logs_enabled", + # "ec2_ebs_snapshot_encryption", + # "iam_user_mfa_enabled_console_access", + # "cloudtrail_multi_region_enabled", + # "ec2_elbv2_insecure_ssl_ciphers", + # "guardduty_is_enabled", + # "s3_bucket_default_encryption", + # "cloudfront_distributions_https_enabled", + # "iam_avoid_root_usage", + # "s3_bucket_secure_transport_policy", + # }, + # } + # with mock.patch( + # "prowler.lib.check.check.compliance_specification_dir_path", + # new=f"{os.path.dirname(os.path.realpath(__file__))}/fixtures", + # ): + # provider = "aws" + # bulk_compliance_frameworks = bulk_load_compliance_frameworks(provider) + # compliance_frameworks = test_case["input"]["compliance_frameworks"] + # assert ( + # parse_checks_from_compliance_framework( + # compliance_frameworks, bulk_compliance_frameworks + # ) + # == test_case["expected"] + # ) - def test_parse_checks_from_compliance_framework_one(self): - test_case = { - "input": {"compliance_frameworks": ["cis_v1.4_aws"]}, - "expected": { - "iam_user_mfa_enabled_console_access", - "s3_bucket_default_encryption", - "iam_avoid_root_usage", - }, - } - with mock.patch( - "lib.check.check.compliance_specification_dir", - new=f"{os.path.dirname(os.path.realpath(__file__))}/fixtures", - ): - provider = "aws" - bulk_compliance_frameworks = bulk_load_compliance_frameworks(provider) - compliance_frameworks = test_case["input"]["compliance_frameworks"] - assert ( - parse_checks_from_compliance_framework( - compliance_frameworks, bulk_compliance_frameworks - ) - == test_case["expected"] - ) + # def test_parse_checks_from_compliance_framework_one(self): + # test_case = { + # "input": {"compliance_frameworks": ["cis_v1.4_aws"]}, + # "expected": { + # "iam_user_mfa_enabled_console_access", + # "s3_bucket_default_encryption", + # "iam_avoid_root_usage", + # }, + # } + # with mock.patch( + # "prowler.lib.check.check.compliance_specification_dir", + # new=f"{os.path.dirname(os.path.realpath(__file__))}/fixtures", + # ): + # provider = "aws" + # bulk_compliance_frameworks = bulk_load_compliance_frameworks(provider) + # compliance_frameworks = test_case["input"]["compliance_frameworks"] + # assert ( + # parse_checks_from_compliance_framework( + # compliance_frameworks, bulk_compliance_frameworks + # ) + # == test_case["expected"] + # ) - def test_parse_checks_from_compliance_framework_no_compliance(self): - test_case = { - "input": {"compliance_frameworks": []}, - "expected": set(), - } - with mock.patch( - "lib.check.check.compliance_specification_dir", - new=f"{os.path.dirname(os.path.realpath(__file__))}/fixtures", - ): - provider = "aws" - bulk_compliance_frameworks = bulk_load_compliance_frameworks(provider) - compliance_frameworks = test_case["input"]["compliance_frameworks"] - assert ( - parse_checks_from_compliance_framework( - compliance_frameworks, bulk_compliance_frameworks - ) - == test_case["expected"] - ) + # def test_parse_checks_from_compliance_framework_no_compliance(self): + # test_case = { + # "input": {"compliance_frameworks": []}, + # "expected": set(), + # } + # with mock.patch( + # "prowler.lib.check.check.compliance_specification_dir", + # new=f"{os.path.dirname(os.path.realpath(__file__))}/fixtures", + # ): + # provider = "aws" + # bulk_compliance_frameworks = bulk_load_compliance_frameworks(provider) + # compliance_frameworks = test_case["input"]["compliance_frameworks"] + # assert ( + # parse_checks_from_compliance_framework( + # compliance_frameworks, bulk_compliance_frameworks + # ) + # == test_case["expected"] + # ) diff --git a/lib/check/fixtures/aws/cis_v1.4_aws.json b/tests/lib/check/fixtures/aws/cis_v1.4_aws.json similarity index 100% rename from lib/check/fixtures/aws/cis_v1.4_aws.json rename to tests/lib/check/fixtures/aws/cis_v1.4_aws.json diff --git a/lib/check/fixtures/aws/ens_v3_aws.json b/tests/lib/check/fixtures/aws/ens_v3_aws.json similarity index 100% rename from lib/check/fixtures/aws/ens_v3_aws.json rename to tests/lib/check/fixtures/aws/ens_v3_aws.json diff --git a/lib/check/fixtures/checklistA.json b/tests/lib/check/fixtures/checklistA.json similarity index 100% rename from lib/check/fixtures/checklistA.json rename to tests/lib/check/fixtures/checklistA.json diff --git a/lib/check/fixtures/groupsA.json b/tests/lib/check/fixtures/groupsA.json similarity index 100% rename from lib/check/fixtures/groupsA.json rename to tests/lib/check/fixtures/groupsA.json diff --git a/lib/check/fixtures/metadata.json b/tests/lib/check/fixtures/metadata.json similarity index 95% rename from lib/check/fixtures/metadata.json rename to tests/lib/check/fixtures/metadata.json index a58137d8a0e..f1b61c4888f 100644 --- a/lib/check/fixtures/metadata.json +++ b/tests/lib/check/fixtures/metadata.json @@ -5,7 +5,9 @@ ], "CheckID": "iam_disable_30_days_credentials", "CheckTitle": "Ensure credentials unused for 30 days or greater are disabled", - "CheckType": ["Software and Configuration Checks"], + "CheckType": [ + "Software and Configuration Checks" + ], "Compliance": [ { "Control": [ diff --git a/lib/outputs/fixtures/metadata.json b/tests/lib/outputs/fixtures/metadata.json similarity index 95% rename from lib/outputs/fixtures/metadata.json rename to tests/lib/outputs/fixtures/metadata.json index a58137d8a0e..f1b61c4888f 100644 --- a/lib/outputs/fixtures/metadata.json +++ b/tests/lib/outputs/fixtures/metadata.json @@ -5,7 +5,9 @@ ], "CheckID": "iam_disable_30_days_credentials", "CheckTitle": "Ensure credentials unused for 30 days or greater are disabled", - "CheckType": ["Software and Configuration Checks"], + "CheckType": [ + "Software and Configuration Checks" + ], "Compliance": [ { "Control": [ diff --git a/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on_test.py b/tests/lib/outputs/fixtures/prowler-output-123456789012.csv similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on_test.py rename to tests/lib/outputs/fixtures/prowler-output-123456789012.csv diff --git a/lib/outputs/outputs_test.py b/tests/lib/outputs/outputs_test.py similarity index 97% rename from lib/outputs/outputs_test.py rename to tests/lib/outputs/outputs_test.py index c36f91e04c1..589ad1bfca4 100644 --- a/lib/outputs/outputs_test.py +++ b/tests/lib/outputs/outputs_test.py @@ -6,7 +6,7 @@ from colorama import Fore from moto import mock_s3 -from config.config import ( +from prowler.config.config import ( csv_file_suffix, json_asff_file_suffix, json_file_suffix, @@ -16,8 +16,8 @@ timestamp_iso, timestamp_utc, ) -from lib.check.models import Check_Report, load_check_metadata -from lib.outputs.models import ( +from prowler.lib.check.models import Check_Report, load_check_metadata +from prowler.lib.outputs.models import ( Check_Output_CSV, Check_Output_JSON, Check_Output_JSON_ASFF, @@ -26,7 +26,7 @@ Resource, Severity, ) -from lib.outputs.outputs import ( +from prowler.lib.outputs.outputs import ( fill_file_descriptors, fill_json, fill_json_asff, @@ -34,8 +34,8 @@ send_to_s3_bucket, set_report_color, ) -from lib.utils.utils import hash_sha512, open_file -from providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.lib.utils.utils import hash_sha512, open_file +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info class Test_Outputs: diff --git a/providers/aws/aws_provider_test.py b/tests/providers/aws/aws_provider_test.py similarity index 98% rename from providers/aws/aws_provider_test.py rename to tests/providers/aws/aws_provider_test.py index fabea747cc1..4f573bb4337 100644 --- a/providers/aws/aws_provider_test.py +++ b/tests/providers/aws/aws_provider_test.py @@ -4,13 +4,13 @@ import sure # noqa from moto import mock_iam, mock_organizations, mock_sts -from providers.aws.aws_provider import ( +from prowler.providers.aws.aws_provider import ( assume_role, get_organizations_metadata, get_region_global_service, validate_credentials, ) -from providers.aws.lib.audit_info.models import AWS_Assume_Role, AWS_Audit_Info +from prowler.providers.aws.lib.audit_info.models import AWS_Assume_Role, AWS_Audit_Info ACCOUNT_ID = 123456789012 diff --git a/providers/aws/lib/allowlist/allowlist_test.py b/tests/providers/aws/lib/allowlist/allowlist_test.py similarity index 92% rename from providers/aws/lib/allowlist/allowlist_test.py rename to tests/providers/aws/lib/allowlist/allowlist_test.py index 607d7f1c86c..7c79e1a6a2a 100644 --- a/providers/aws/lib/allowlist/allowlist_test.py +++ b/tests/providers/aws/lib/allowlist/allowlist_test.py @@ -2,8 +2,11 @@ from boto3 import resource, session from moto import mock_dynamodb, mock_s3 -from providers.aws.lib.allowlist.allowlist import is_allowlisted, parse_allowlist_file -from providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.lib.allowlist.allowlist import ( + is_allowlisted, + parse_allowlist_file, +) +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" @@ -41,12 +44,12 @@ def test_s3_allowlist(self): s3_resource.create_bucket(Bucket="test-allowlist") s3_resource.Object("test-allowlist", "allowlist.yaml").put( Body=open( - "providers/aws/lib/allowlist/fixtures/allowlist.yaml", + "tests/providers/aws/lib/allowlist/fixtures/allowlist.yaml", "rb", ) ) - with open("providers/aws/lib/allowlist/fixtures/allowlist.yaml") as f: + with open("tests/providers/aws/lib/allowlist/fixtures/allowlist.yaml") as f: assert yaml.safe_load(f)["Allowlist"] == parse_allowlist_file( audit_info, "s3://test-allowlist/allowlist.yaml" ) diff --git a/providers/aws/lib/allowlist/fixtures/allowlist.yaml b/tests/providers/aws/lib/allowlist/fixtures/allowlist.yaml similarity index 100% rename from providers/aws/lib/allowlist/fixtures/allowlist.yaml rename to tests/providers/aws/lib/allowlist/fixtures/allowlist.yaml diff --git a/providers/aws/lib/arn/arn_test.py b/tests/providers/aws/lib/arn/arn_test.py similarity index 95% rename from providers/aws/lib/arn/arn_test.py rename to tests/providers/aws/lib/arn/arn_test.py index deabb281462..df16a58faa3 100644 --- a/providers/aws/lib/arn/arn_test.py +++ b/tests/providers/aws/lib/arn/arn_test.py @@ -1,6 +1,6 @@ import sure # noqa -from providers.aws.lib.arn.arn import arn_parsing +from prowler.providers.aws.lib.arn.arn import arn_parsing ACCOUNT_ID = "123456789012" RESOURCE_TYPE = "role" diff --git a/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings_test.py b/tests/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings_test.py similarity index 77% rename from providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings_test.py rename to tests/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings_test.py index 4284023f5ab..4f2fd2bf5fc 100644 --- a/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings_test.py +++ b/tests/providers/aws/services/accessanalyzer/accessanalyzer_enabled_without_findings/accessanalyzer_enabled_without_findings_test.py @@ -1,6 +1,8 @@ from unittest import mock -from providers.aws.services.accessanalyzer.accessanalyzer_service import Analyzer +from prowler.providers.aws.services.accessanalyzer.accessanalyzer_service import ( + Analyzer, +) class Test_accessanalyzer_enabled_without_findings: @@ -8,11 +10,11 @@ def test_no_analyzers(self): accessanalyzer_client = mock.MagicMock accessanalyzer_client.analyzers = [] with mock.patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", new=accessanalyzer_client, ): # Test Check - from providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( + from prowler.providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( accessanalyzer_enabled_without_findings, ) @@ -36,10 +38,10 @@ def test_one_analyzer_not_available(self): ) ] with mock.patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", accessanalyzer_client, ): - from providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( + from prowler.providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( accessanalyzer_enabled_without_findings, ) @@ -76,11 +78,11 @@ def test_two_analyzers(self): # Patch AccessAnalyzer Client with mock.patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", new=accessanalyzer_client, ): # Test Check - from providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( + from prowler.providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( accessanalyzer_enabled_without_findings, ) @@ -113,11 +115,11 @@ def test_one_active_analyzer_without_findings(self): ] with mock.patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", new=accessanalyzer_client, ): # Test Check - from providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( + from prowler.providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( accessanalyzer_enabled_without_findings, ) @@ -147,11 +149,11 @@ def test_one_active_analyzer_not_active(self): ] # Patch AccessAnalyzer Client with mock.patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.AccessAnalyzer", new=accessanalyzer_client, ): # Test Check - from providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( + from prowler.providers.aws.services.accessanalyzer.accessanalyzer_enabled_without_findings.accessanalyzer_enabled_without_findings import ( accessanalyzer_enabled_without_findings, ) diff --git a/providers/aws/services/accessanalyzer/accessanalyzer_service_test.py b/tests/providers/aws/services/accessanalyzer/accessanalyzer_service_test.py similarity index 91% rename from providers/aws/services/accessanalyzer/accessanalyzer_service_test.py rename to tests/providers/aws/services/accessanalyzer/accessanalyzer_service_test.py index 812de8d1393..42376cc8109 100644 --- a/providers/aws/services/accessanalyzer/accessanalyzer_service_test.py +++ b/tests/providers/aws/services/accessanalyzer/accessanalyzer_service_test.py @@ -2,8 +2,10 @@ import botocore -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.accessanalyzer.accessanalyzer_service import AccessAnalyzer +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.accessanalyzer.accessanalyzer_service import ( + AccessAnalyzer, +) # Mock Test Region AWS_REGION = "eu-west-1" @@ -51,7 +53,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_AccessAnalyzer_Service: diff --git a/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check_test.py b/tests/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check_test.py similarity index 69% rename from providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check_test.py rename to tests/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check_test.py index 408a18b0bae..f5904d47ffb 100644 --- a/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check_test.py +++ b/tests/providers/aws/services/acm/acm_certificates_expiration_check/acm_certificates_expiration_check_test.py @@ -15,17 +15,17 @@ def test_acm_certificate_expirated(self): certificate = acm_client.request_certificate( DomainName="test.com", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.acm.acm_service import ACM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.acm.acm_service import ACM current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check.acm_client", + "prowler.providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check.acm_client", new=ACM(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check import ( + from prowler.providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check import ( acm_certificates_expiration_check, ) @@ -46,17 +46,17 @@ def test_acm_certificate_not_expirated(self): certificate = acm_client.request_certificate( DomainName="test.com", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.acm.acm_service import ACM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.acm.acm_service import ACM current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check.acm_client", + "prowler.providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check.acm_client", new=ACM(current_audit_info), ): # Test Check - from providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check import ( + from prowler.providers.aws.services.acm.acm_certificates_expiration_check.acm_certificates_expiration_check import ( acm_certificates_expiration_check, ) diff --git a/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled_test.py b/tests/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled_test.py similarity index 71% rename from providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled_test.py rename to tests/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled_test.py index 2b4c5eb20a4..553107296d7 100644 --- a/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled_test.py +++ b/tests/providers/aws/services/acm/acm_certificates_transparency_logs_enabled/acm_certificates_transparency_logs_enabled_test.py @@ -16,17 +16,17 @@ def test_acm_certificate_with_logging(self): DomainName="test.com", Options={"CertificateTransparencyLoggingPreference": "ENABLED"}, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.acm.acm_service import ACM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.acm.acm_service import ACM current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled.acm_client", + "prowler.providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled.acm_client", new=ACM(current_audit_info), ): # Test Check - from providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled import ( + from prowler.providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled import ( acm_certificates_transparency_logs_enabled, ) @@ -51,17 +51,17 @@ def test_acm_certificate_without_logging(self): DomainName="test.com", Options={"CertificateTransparencyLoggingPreference": "ENABLED"}, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.acm.acm_service import ACM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.acm.acm_service import ACM current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled.acm_client", + "prowler.providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled.acm_client", new=ACM(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled import ( + from prowler.providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled import ( acm_certificates_transparency_logs_enabled, ) @@ -86,17 +86,17 @@ def test_acm_default_certificate(self): certificate = acm_client.request_certificate( DomainName="test.com", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.acm.acm_service import ACM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.acm.acm_service import ACM current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled.acm_client", + "prowler.providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled.acm_client", new=ACM(current_audit_info), ): # Test Check - from providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled import ( + from prowler.providers.aws.services.acm.acm_certificates_transparency_logs_enabled.acm_certificates_transparency_logs_enabled import ( acm_certificates_transparency_logs_enabled, ) diff --git a/providers/aws/services/acm/acm_service_test.py b/tests/providers/aws/services/acm/acm_service_test.py similarity index 95% rename from providers/aws/services/acm/acm_service_test.py rename to tests/providers/aws/services/acm/acm_service_test.py index 123bb826c61..44b82e4897e 100644 --- a/providers/aws/services/acm/acm_service_test.py +++ b/tests/providers/aws/services/acm/acm_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, session from moto import mock_acm -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.acm.acm_service import ACM +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.acm.acm_service import ACM AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled_test.py b/tests/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled_test.py similarity index 71% rename from providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled_test.py rename to tests/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled_test.py index b53b11e7c02..0b15333c201 100644 --- a/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled_test.py +++ b/tests/providers/aws/services/apigateway/apigateway_authorizers_enabled/apigateway_authorizers_enabled_test.py @@ -10,17 +10,19 @@ class Test_apigateway_authorizers_enabled: @mock_apigateway def test_apigateway_no_rest_apis(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled import ( apigateway_authorizers_enabled, ) @@ -60,17 +62,19 @@ def test_apigateway_one_rest_api_with_lambda_authorizer(self): type="TOKEN", authorizerUri=f"arn:aws:apigateway:{apigateway_client.meta.region_name}:lambda:path/2015-03-31/functions/arn:aws:lambda:{apigateway_client.meta.region_name}:{ACCOUNT_ID}:function:{authorizer['FunctionName']}/invocations", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled import ( apigateway_authorizers_enabled, ) @@ -93,17 +97,19 @@ def test_apigateway_one_rest_api_without_lambda_authorizer(self): rest_api = apigateway_client.create_rest_api( name="test-rest-api", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_authorizers_enabled.apigateway_authorizers_enabled import ( apigateway_authorizers_enabled, ) diff --git a/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled_test.py b/tests/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled_test.py similarity index 71% rename from providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled_test.py rename to tests/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled_test.py index 2cab38610b1..dbdb3026f14 100644 --- a/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled_test.py +++ b/tests/providers/aws/services/apigateway/apigateway_client_certificate_enabled/apigateway_client_certificate_enabled_test.py @@ -3,7 +3,7 @@ from boto3 import client from moto import mock_apigateway -from providers.aws.services.apigateway.apigateway_service import Stage +from prowler.providers.aws.services.apigateway.apigateway_service import Stage AWS_REGION = "us-east-1" @@ -17,17 +17,19 @@ def test_apigateway_no_stages(self): apigateway_client.create_rest_api( name="test-rest-api", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled import ( apigateway_client_certificate_enabled, ) @@ -71,17 +73,19 @@ def test_apigateway_one_stage_without_certificate(self): restApiId=rest_api["id"], stageName="test", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled import ( apigateway_client_certificate_enabled, ) @@ -105,17 +109,19 @@ def test_apigateway_one_stage_with_certificate(self): rest_api = apigateway_client.create_rest_api( name="test-rest-api", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled.apigateway_client", new=APIGateway(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_client_certificate_enabled.apigateway_client_certificate_enabled import ( apigateway_client_certificate_enabled, ) diff --git a/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public_test.py b/tests/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public_test.py similarity index 66% rename from providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public_test.py rename to tests/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public_test.py index 8f83553d4d1..cf6f89557f9 100644 --- a/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public_test.py +++ b/tests/providers/aws/services/apigateway/apigateway_endpoint_public/apigateway_endpoint_public_test.py @@ -9,17 +9,19 @@ class Test_apigateway_endpoint_public: @mock_apigateway def test_apigateway_no_rest_apis(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public import ( + from prowler.providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public import ( apigateway_endpoint_public, ) @@ -41,17 +43,19 @@ def test_apigateway_one_private_rest_api(self): ] }, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public import ( + from prowler.providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public import ( apigateway_endpoint_public, ) @@ -79,17 +83,19 @@ def test_apigateway_one_public_rest_api(self): ] }, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public import ( + from prowler.providers.aws.services.apigateway.apigateway_endpoint_public.apigateway_endpoint_public import ( apigateway_endpoint_public, ) diff --git a/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled_test.py b/tests/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled_test.py similarity index 77% rename from providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled_test.py rename to tests/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled_test.py index 1560d13bacb..58a00f0d931 100644 --- a/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled_test.py +++ b/tests/providers/aws/services/apigateway/apigateway_logging_enabled/apigateway_logging_enabled_test.py @@ -9,17 +9,19 @@ class Test_apigateway_logging_enabled: @mock_apigateway def test_apigateway_no_rest_apis(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled import ( apigateway_logging_enabled, ) @@ -73,17 +75,19 @@ def test_apigateway_one_rest_api_with_logging(self): }, ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled import ( apigateway_logging_enabled, ) @@ -134,17 +138,19 @@ def test_apigateway_one_rest_api_without_logging(self): stageName="test", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled import ( + from prowler.providers.aws.services.apigateway.apigateway_logging_enabled.apigateway_logging_enabled import ( apigateway_logging_enabled, ) diff --git a/providers/aws/services/apigateway/apigateway_service_test.py b/tests/providers/aws/services/apigateway/apigateway_service_test.py similarity index 97% rename from providers/aws/services/apigateway/apigateway_service_test.py rename to tests/providers/aws/services/apigateway/apigateway_service_test.py index 63e424bf6d6..685ca303150 100644 --- a/providers/aws/services/apigateway/apigateway_service_test.py +++ b/tests/providers/aws/services/apigateway/apigateway_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, session from moto import mock_apigateway -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.apigateway.apigateway_service import APIGateway +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.apigateway.apigateway_service import APIGateway AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached_test.py b/tests/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached_test.py similarity index 78% rename from providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached_test.py rename to tests/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached_test.py index 7c502107ced..6cd18cb9637 100644 --- a/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached_test.py +++ b/tests/providers/aws/services/apigateway/apigateway_waf_acl_attached/apigateway_waf_acl_attached_test.py @@ -9,17 +9,19 @@ class Test_apigateway_waf_acl_attached: @mock_apigateway def test_apigateway_no_rest_apis(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached import ( + from prowler.providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached import ( apigateway_waf_acl_attached, ) @@ -79,17 +81,19 @@ def test_apigateway_one_rest_api_with_waf(self): ResourceArn=f"arn:aws:apigateway:{apigateway_client.meta.region_name}::/restapis/{rest_api['id']}/stages/test", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached import ( + from prowler.providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached import ( apigateway_waf_acl_attached, ) @@ -140,17 +144,19 @@ def test_apigateway_one_rest_api_without_waf(self): stageName="test", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigateway.apigateway_service import APIGateway + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigateway.apigateway_service import ( + APIGateway, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached.apigateway_client", + "prowler.providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached.apigateway_client", new=APIGateway(current_audit_info), ): # Test Check - from providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached import ( + from prowler.providers.aws.services.apigateway.apigateway_waf_acl_attached.apigateway_waf_acl_attached import ( apigateway_waf_acl_attached, ) diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled_test.py b/tests/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled_test.py similarity index 73% rename from providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled_test.py rename to tests/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled_test.py index d97bbd50e7b..93ca81e8182 100644 --- a/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled_test.py +++ b/tests/providers/aws/services/apigatewayv2/apigatewayv2_access_logging_enabled/apigatewayv2_access_logging_enabled_test.py @@ -38,19 +38,19 @@ def mock_make_api_call(self, operation_name, kwarg): class Test_apigatewayv2_access_logging_enabled: @mock_apigatewayv2 def test_apigateway_no_apis(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigatewayv2.apigatewayv2_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_service import ( ApiGatewayV2, ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled.apigatewayv2_client", + "prowler.providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled.apigatewayv2_client", new=ApiGatewayV2(current_audit_info), ): # Test Check - from providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled import ( + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled import ( apigatewayv2_access_logging_enabled, ) @@ -66,19 +66,19 @@ def test_apigateway_one_api_with_logging_in_stage(self): # Create ApiGatewayV2 API api = apigatewayv2_client.create_api(Name="test-api", ProtocolType="HTTP") # Get stages mock with stage with logging - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigatewayv2.apigatewayv2_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_service import ( ApiGatewayV2, ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled.apigatewayv2_client", + "prowler.providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled.apigatewayv2_client", new=ApiGatewayV2(current_audit_info), ): # Test Check - from providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled import ( + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_access_logging_enabled.apigatewayv2_access_logging_enabled import ( apigatewayv2_access_logging_enabled, ) diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled_test.py b/tests/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled_test.py similarity index 75% rename from providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled_test.py rename to tests/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled_test.py index b9b8c2312de..2838b68b31c 100644 --- a/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled_test.py +++ b/tests/providers/aws/services/apigatewayv2/apigatewayv2_authorizers_enabled/apigatewayv2_authorizers_enabled_test.py @@ -38,19 +38,19 @@ def mock_make_api_call(self, operation_name, kwarg): class Test_apigatewayv2_authorizers_enabled: @mock_apigatewayv2 def test_apigateway_no_apis(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigatewayv2.apigatewayv2_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_service import ( ApiGatewayV2, ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled.apigatewayv2_client", + "prowler.providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled.apigatewayv2_client", new=ApiGatewayV2(current_audit_info), ): # Test Check - from providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled import ( + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled import ( apigatewayv2_authorizers_enabled, ) @@ -72,19 +72,19 @@ def test_apigateway_one_api_with_authorizer(self): Name="auth1", AuthorizerPayloadFormatVersion="2.0", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.apigatewayv2.apigatewayv2_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_service import ( ApiGatewayV2, ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled.apigatewayv2_client", + "prowler.providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled.apigatewayv2_client", new=ApiGatewayV2(current_audit_info), ): # Test Check - from providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled import ( + from prowler.providers.aws.services.apigatewayv2.apigatewayv2_authorizers_enabled.apigatewayv2_authorizers_enabled import ( apigatewayv2_authorizers_enabled, ) diff --git a/providers/aws/services/apigatewayv2/apigatewayv2_service_test.py b/tests/providers/aws/services/apigatewayv2/apigatewayv2_service_test.py similarity index 96% rename from providers/aws/services/apigatewayv2/apigatewayv2_service_test.py rename to tests/providers/aws/services/apigatewayv2/apigatewayv2_service_test.py index 59ce6dece55..65b2da91efb 100644 --- a/providers/aws/services/apigatewayv2/apigatewayv2_service_test.py +++ b/tests/providers/aws/services/apigatewayv2/apigatewayv2_service_test.py @@ -3,8 +3,10 @@ from mock import patch from moto import mock_apigatewayv2 -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.apigatewayv2.apigatewayv2_service import ApiGatewayV2 +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.apigatewayv2.apigatewayv2_service import ( + ApiGatewayV2, +) AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled_test.py b/tests/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled_test.py similarity index 82% rename from providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled_test.py rename to tests/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled_test.py index ee9d1b276e5..dad123e80e7 100644 --- a/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled_test.py +++ b/tests/providers/aws/services/appstream/appstream_fleet_default_internet_access_disabled/appstream_fleet_default_internet_access_disabled_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.appstream.appstream_service import Fleet +from prowler.providers.aws.services.appstream.appstream_service import Fleet # Mock Test Region AWS_REGION = "eu-west-1" @@ -11,11 +11,11 @@ def test_no_fleets(self): appstream_client = mock.MagicMock appstream_client.fleets = [] with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( + from prowler.providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( appstream_fleet_default_internet_access_disabled, ) @@ -40,11 +40,11 @@ def test_one_fleet_internet_access_enabled(self): appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( + from prowler.providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( appstream_fleet_default_internet_access_disabled, ) @@ -77,11 +77,11 @@ def test_one_fleet_internet_access_disbaled(self): appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( + from prowler.providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( appstream_fleet_default_internet_access_disabled, ) @@ -124,11 +124,11 @@ def test_two_fleets_internet_access_one_enabled_two_disabled(self): appstream_client.fleets.append(fleet2) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( + from prowler.providers.aws.services.appstream.appstream_fleet_default_internet_access_disabled.appstream_fleet_default_internet_access_disabled import ( appstream_fleet_default_internet_access_disabled, ) diff --git a/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration_test.py b/tests/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration_test.py similarity index 84% rename from providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration_test.py rename to tests/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration_test.py index 8742f7d5d7d..9901d804c5e 100644 --- a/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration_test.py +++ b/tests/providers/aws/services/appstream/appstream_fleet_maximum_session_duration/appstream_fleet_maximum_session_duration_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.appstream.appstream_service import Fleet +from prowler.providers.aws.services.appstream.appstream_service import Fleet # Mock Test Region AWS_REGION = "eu-west-1" @@ -11,11 +11,11 @@ def test_no_fleets(self): appstream_client = mock.MagicMock appstream_client.fleets = [] with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( + from prowler.providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( appstream_fleet_maximum_session_duration, ) @@ -41,11 +41,11 @@ def test_one_fleet_maximum_session_duration_more_than_10_hours(self): appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( + from prowler.providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( appstream_fleet_maximum_session_duration, ) @@ -79,11 +79,11 @@ def test_one_fleet_maximum_session_duration_less_than_10_hours(self): appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( + from prowler.providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( appstream_fleet_maximum_session_duration, ) @@ -130,11 +130,11 @@ def test_two_fleets_one_maximum_session_duration_less_than_10_hours_on_more_than appstream_client.fleets.append(fleet2) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( + from prowler.providers.aws.services.appstream.appstream_fleet_maximum_session_duration.appstream_fleet_maximum_session_duration import ( appstream_fleet_maximum_session_duration, ) diff --git a/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout_test.py b/tests/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout_test.py similarity index 84% rename from providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout_test.py rename to tests/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout_test.py index aaedf89d44b..b380e592ac6 100644 --- a/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout_test.py +++ b/tests/providers/aws/services/appstream/appstream_fleet_session_disconnect_timeout/appstream_fleet_session_disconnect_timeout_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.appstream.appstream_service import Fleet +from prowler.providers.aws.services.appstream.appstream_service import Fleet # Mock Test Region AWS_REGION = "eu-west-1" @@ -11,11 +11,11 @@ def test_no_fleets(self): appstream_client = mock.MagicMock appstream_client.fleets = [] with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( appstream_fleet_session_disconnect_timeout, ) @@ -41,11 +41,11 @@ def test_one_fleet_session_disconnect_timeout_more_than_5_minutes(self): appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( appstream_fleet_session_disconnect_timeout, ) @@ -79,11 +79,11 @@ def test_one_fleet_session_disconnect_timeout_less_than_5_minutes(self): appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( appstream_fleet_session_disconnect_timeout, ) @@ -130,11 +130,11 @@ def test_two_fleets_session_disconnect_timeout_less_than_5_minutes_one_more_than appstream_client.fleets.append(fleet2) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_disconnect_timeout.appstream_fleet_session_disconnect_timeout import ( appstream_fleet_session_disconnect_timeout, ) diff --git a/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout_test.py b/tests/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout_test.py similarity index 83% rename from providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout_test.py rename to tests/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout_test.py index c6e6fbbf4a0..a96b193ee9a 100644 --- a/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout_test.py +++ b/tests/providers/aws/services/appstream/appstream_fleet_session_idle_disconnect_timeout/appstream_fleet_session_idle_disconnect_timeout_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.appstream.appstream_service import Fleet +from prowler.providers.aws.services.appstream.appstream_service import Fleet # Mock Test Region AWS_REGION = "eu-west-1" @@ -11,11 +11,11 @@ def test_no_fleets(self): appstream_client = mock.MagicMock appstream_client.fleets = [] with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( appstream_fleet_session_idle_disconnect_timeout, ) @@ -41,11 +41,11 @@ def test_one_fleet_session_idle_disconnect_timeout_more_than_10_minutes(self): appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( appstream_fleet_session_idle_disconnect_timeout, ) @@ -79,11 +79,11 @@ def test_one_fleet_session_idle_disconnect_timeout_less_than_10_minutes(self): appstream_client.fleets.append(fleet1) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( appstream_fleet_session_idle_disconnect_timeout, ) @@ -130,11 +130,11 @@ def test_two_fleets_session_idle_disconnect_timeout_than_10_minutes_one_more_tha appstream_client.fleets.append(fleet2) with mock.patch( - "providers.aws.services.appstream.appstream_service.AppStream", + "prowler.providers.aws.services.appstream.appstream_service.AppStream", new=appstream_client, ): # Test Check - from providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( + from prowler.providers.aws.services.appstream.appstream_fleet_session_idle_disconnect_timeout.appstream_fleet_session_idle_disconnect_timeout import ( appstream_fleet_session_idle_disconnect_timeout, ) diff --git a/providers/aws/services/appstream/appstream_service_test.py b/tests/providers/aws/services/appstream/appstream_service_test.py similarity index 94% rename from providers/aws/services/appstream/appstream_service_test.py rename to tests/providers/aws/services/appstream/appstream_service_test.py index f1144c849dc..0d3b2508fd0 100644 --- a/providers/aws/services/appstream/appstream_service_test.py +++ b/tests/providers/aws/services/appstream/appstream_service_test.py @@ -3,8 +3,8 @@ import botocore from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.appstream.appstream_service import AppStream +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.appstream.appstream_service import AppStream # Mock Test Region AWS_REGION = "eu-west-1" @@ -56,7 +56,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.appstream.appstream_service.generate_regional_clients", + "prowler.providers.aws.services.appstream.appstream_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_AppStream_Service: diff --git a/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration_test.py b/tests/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration_test.py similarity index 64% rename from providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration_test.py rename to tests/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration_test.py index 8737b86a1ac..28495cae63f 100644 --- a/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration_test.py +++ b/tests/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/autoscaling_find_secrets_ec2_launch_configuration_test.py @@ -12,17 +12,19 @@ def test_no_autoscaling(self): autoscaling_client = client("autoscaling", region_name=AWS_REGION) autoscaling_client.launch_configurations = [] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.autoscaling.autoscaling_service import AutoScaling + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.autoscaling.autoscaling_service import ( + AutoScaling, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", + "prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", new=AutoScaling(current_audit_info), ): # Test Check - from providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( + from prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( autoscaling_find_secrets_ec2_launch_configuration, ) @@ -44,16 +46,18 @@ def test_one_autoscaling_with_no_secrets(self): UserData="This is some user_data", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.autoscaling.autoscaling_service import AutoScaling + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.autoscaling.autoscaling_service import ( + AutoScaling, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", + "prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", new=AutoScaling(current_audit_info), ): - from providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( + from prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( autoscaling_find_secrets_ec2_launch_configuration, ) @@ -81,16 +85,18 @@ def test_one_autoscaling_with_secrets(self): UserData="DB_PASSWORD=foobar123", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.autoscaling.autoscaling_service import AutoScaling + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.autoscaling.autoscaling_service import ( + AutoScaling, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", + "prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", new=AutoScaling(current_audit_info), ): - from providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( + from prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( autoscaling_find_secrets_ec2_launch_configuration, ) @@ -109,7 +115,7 @@ def test_one_autoscaling_with_secrets(self): def test_one_autoscaling_file_with_secrets(self): # Include launch_configurations to check f = open( - "providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/fixtures/fixture", + "prowler/providers/aws/services/autoscaling/autoscaling_find_secrets_ec2_launch_configuration/fixtures/fixture", "r", ) secrets = f.read() @@ -123,16 +129,18 @@ def test_one_autoscaling_file_with_secrets(self): UserData=secrets, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.autoscaling.autoscaling_service import AutoScaling + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.autoscaling.autoscaling_service import ( + AutoScaling, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", + "prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", new=AutoScaling(current_audit_info), ): - from providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( + from prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( autoscaling_find_secrets_ec2_launch_configuration, ) @@ -159,16 +167,18 @@ def test_one_launch_configurations_without_user_data(self): SecurityGroups=["default", "default2"], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.autoscaling.autoscaling_service import AutoScaling + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.autoscaling.autoscaling_service import ( + AutoScaling, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", + "prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_client", new=AutoScaling(current_audit_info), ): - from providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( + from prowler.providers.aws.services.autoscaling.autoscaling_find_secrets_ec2_launch_configuration.autoscaling_find_secrets_ec2_launch_configuration import ( autoscaling_find_secrets_ec2_launch_configuration, ) diff --git a/providers/aws/services/autoscaling/autoscaling_service_test.py b/tests/providers/aws/services/autoscaling/autoscaling_service_test.py similarity index 95% rename from providers/aws/services/autoscaling/autoscaling_service_test.py rename to tests/providers/aws/services/autoscaling/autoscaling_service_test.py index 9513df362da..1566b7a03fb 100644 --- a/providers/aws/services/autoscaling/autoscaling_service_test.py +++ b/tests/providers/aws/services/autoscaling/autoscaling_service_test.py @@ -3,8 +3,8 @@ from boto3 import client, session from moto import mock_autoscaling -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.autoscaling.autoscaling_service import AutoScaling +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.autoscaling.autoscaling_service import AutoScaling AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled_test.py b/tests/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled_test.py similarity index 72% rename from providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled_test.py rename to tests/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled_test.py index 75b0dc8113f..d05a958dc83 100644 --- a/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled/awslambda_function_invoke_api_operations_cloudtrail_logging_enabled_test.py @@ -5,8 +5,8 @@ from moto import mock_cloudtrail, mock_s3 from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import AWS_Audit_Info -from providers.aws.services.awslambda.awslambda_service import Function +from prowler.providers.aws.lib.audit_info.audit_info import AWS_Audit_Info +from prowler.providers.aws.services.awslambda.awslambda_service import Function AWS_REGION = "us-east-1" @@ -20,7 +20,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_awslambda_function_invoke_api_operations_cloudtrail_logging_enabled: @@ -50,20 +50,22 @@ def test_no_functions(self): lambda_client = mock.MagicMock lambda_client.functions = {} - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.cloudtrail_client", new=Cloudtrail(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled import ( + from prowler.providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled import ( awslambda_function_invoke_api_operations_cloudtrail_logging_enabled, ) @@ -103,21 +105,23 @@ def test_lambda_not_recorded_by_cloudtrail(self): Name=trail_name, S3BucketName=bucket_name, IsMultiRegionTrail=False ) - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.cloudtrail_client", new=Cloudtrail(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled import ( + from prowler.providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled import ( awslambda_function_invoke_api_operations_cloudtrail_logging_enabled, ) @@ -177,21 +181,23 @@ def test_lambda_recorded_by_cloudtrail(self): ], ) - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.cloudtrail_client", new=Cloudtrail(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled import ( + from prowler.providers.aws.services.awslambda.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled.awslambda_function_invoke_api_operations_cloudtrail_logging_enabled import ( awslambda_function_invoke_api_operations_cloudtrail_logging_enabled, ) diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code_test.py b/tests/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code_test.py similarity index 81% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code_test.py rename to tests/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code_test.py index ee994d4ff71..f8a68669b54 100644 --- a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_function_no_secrets_in_code/awslambda_function_no_secrets_in_code_test.py @@ -1,10 +1,13 @@ import zipfile from unittest import mock +from awslambda_service_test import create_zip_file from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.awslambda.awslambda_service import Function, LambdaCode -from providers.aws.services.awslambda.awslambda_service_test import create_zip_file +from prowler.providers.aws.services.awslambda.awslambda_service import ( + Function, + LambdaCode, +) AWS_REGION = "us-east-1" @@ -15,11 +18,11 @@ def test_no_functions(self): lambda_client.functions = {} with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_no_secrets_in_code.awslambda_function_no_secrets_in_code import ( + from prowler.providers.aws.services.awslambda.awslambda_function_no_secrets_in_code.awslambda_function_no_secrets_in_code import ( awslambda_function_no_secrets_in_code, ) @@ -55,11 +58,11 @@ def lambda_handler(event, context): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_no_secrets_in_code.awslambda_function_no_secrets_in_code import ( + from prowler.providers.aws.services.awslambda.awslambda_function_no_secrets_in_code.awslambda_function_no_secrets_in_code import ( awslambda_function_no_secrets_in_code, ) @@ -102,11 +105,11 @@ def lambda_handler(event, context): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_no_secrets_in_code.awslambda_function_no_secrets_in_code import ( + from prowler.providers.aws.services.awslambda.awslambda_function_no_secrets_in_code.awslambda_function_no_secrets_in_code import ( awslambda_function_no_secrets_in_code, ) diff --git a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables_test.py b/tests/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables_test.py similarity index 81% rename from providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables_test.py rename to tests/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables_test.py index 40e4139fb68..7025f957f6e 100644 --- a/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_function_no_secrets_in_variables/awslambda_function_no_secrets_in_variables_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.awslambda.awslambda_service import Function +from prowler.providers.aws.services.awslambda.awslambda_service import Function AWS_REGION = "us-east-1" @@ -13,11 +13,11 @@ def test_no_functions(self): lambda_client.functions = {} with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( + from prowler.providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( awslambda_function_no_secrets_in_variables, ) @@ -44,11 +44,11 @@ def test_function_no_variables(self): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( + from prowler.providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( awslambda_function_no_secrets_in_variables, ) @@ -84,11 +84,11 @@ def test_function_secrets_in_variables(self): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( + from prowler.providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( awslambda_function_no_secrets_in_variables, ) @@ -124,11 +124,11 @@ def test_function_no_secrets_in_variables(self): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( + from prowler.providers.aws.services.awslambda.awslambda_function_no_secrets_in_variables.awslambda_function_no_secrets_in_variables import ( awslambda_function_no_secrets_in_variables, ) diff --git a/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible_test.py b/tests/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible_test.py similarity index 84% rename from providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible_test.py rename to tests/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible_test.py index a606f093367..1086aef7aed 100644 --- a/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_function_not_publicly_accessible/awslambda_function_not_publicly_accessible_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.awslambda.awslambda_service import Function +from prowler.providers.aws.services.awslambda.awslambda_service import Function AWS_REGION = "us-east-1" @@ -13,11 +13,11 @@ def test_no_functions(self): lambda_client.functions = {} with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( + from prowler.providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( awslambda_function_not_publicly_accessible, ) @@ -59,11 +59,11 @@ def test_function_public(self): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( + from prowler.providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( awslambda_function_not_publicly_accessible, ) @@ -113,11 +113,11 @@ def test_function_not_public(self): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( + from prowler.providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( awslambda_function_not_publicly_accessible, ) @@ -167,11 +167,11 @@ def test_function_public_with_canonical(self): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( + from prowler.providers.aws.services.awslambda.awslambda_function_not_publicly_accessible.awslambda_function_not_publicly_accessible import ( awslambda_function_not_publicly_accessible, ) diff --git a/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy_test.py b/tests/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy_test.py similarity index 83% rename from providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy_test.py rename to tests/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy_test.py index ce6d01c3ade..942d9d0515b 100644 --- a/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_function_url_cors_policy/awslambda_function_url_cors_policy_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.awslambda.awslambda_service import ( +from prowler.providers.aws.services.awslambda.awslambda_service import ( AuthType, Function, URLConfig, @@ -18,11 +18,11 @@ def test_no_functions(self): lambda_client.functions = {} with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( + from prowler.providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( awslambda_function_url_cors_policy, ) @@ -53,11 +53,11 @@ def test_function_cors_asterisk(self): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( + from prowler.providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( awslambda_function_url_cors_policy, ) @@ -96,11 +96,11 @@ def test_function_cors_not_wide(self): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( + from prowler.providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( awslambda_function_url_cors_policy, ) @@ -141,11 +141,11 @@ def test_function_cors_wide_with_two_origins(self): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( + from prowler.providers.aws.services.awslambda.awslambda_function_url_cors_policy.awslambda_function_url_cors_policy import ( awslambda_function_url_cors_policy, ) diff --git a/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public_test.py b/tests/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public_test.py similarity index 82% rename from providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public_test.py rename to tests/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public_test.py index 13c63554b24..4b3d0a262dd 100644 --- a/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_function_url_public/awslambda_function_url_public_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.awslambda.awslambda_service import ( +from prowler.providers.aws.services.awslambda.awslambda_service import ( AuthType, Function, URLConfig, @@ -18,11 +18,11 @@ def test_no_functions(self): lambda_client.functions = {} with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_url_public.awslambda_function_url_public import ( + from prowler.providers.aws.services.awslambda.awslambda_function_url_public.awslambda_function_url_public import ( awslambda_function_url_public, ) @@ -53,11 +53,11 @@ def test_function_public_url(self): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_url_public.awslambda_function_url_public import ( + from prowler.providers.aws.services.awslambda.awslambda_function_url_public.awslambda_function_url_public import ( awslambda_function_url_public, ) @@ -96,11 +96,11 @@ def test_function_private_url(self): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_url_public.awslambda_function_url_public import ( + from prowler.providers.aws.services.awslambda.awslambda_function_url_public.awslambda_function_url_public import ( awslambda_function_url_public, ) diff --git a/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes_test.py b/tests/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes_test.py similarity index 75% rename from providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes_test.py rename to tests/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes_test.py index c9293a3f8e7..a16d25125d1 100644 --- a/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_function_using_supported_runtimes/awslambda_function_using_supported_runtimes_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.awslambda.awslambda_service import Function +from prowler.providers.aws.services.awslambda.awslambda_service import Function AWS_REGION = "us-east-1" @@ -30,11 +30,11 @@ def test_no_functions(self): lambda_client.functions = {} with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes import ( + from prowler.providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes import ( awslambda_function_using_supported_runtimes, ) @@ -60,14 +60,14 @@ def test_function_obsolete_runtime(self): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ), mock.patch( - "providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes.get_config_var", + "prowler.providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes.get_config_var", new=mock_get_config_var, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes import ( + from prowler.providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes import ( awslambda_function_using_supported_runtimes, ) @@ -101,14 +101,14 @@ def test_function_supported_runtime(self): } with mock.patch( - "providers.aws.services.awslambda.awslambda_service.Lambda", + "prowler.providers.aws.services.awslambda.awslambda_service.Lambda", new=lambda_client, ), mock.patch( - "providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes.get_config_var", + "prowler.providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes.get_config_var", new=mock_get_config_var, ): # Test Check - from providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes import ( + from prowler.providers.aws.services.awslambda.awslambda_function_using_supported_runtimes.awslambda_function_using_supported_runtimes import ( awslambda_function_using_supported_runtimes, ) diff --git a/providers/aws/services/awslambda/awslambda_service_test.py b/tests/providers/aws/services/awslambda/awslambda_service_test.py similarity index 94% rename from providers/aws/services/awslambda/awslambda_service_test.py rename to tests/providers/aws/services/awslambda/awslambda_service_test.py index c4835cf8988..beb353c8600 100644 --- a/providers/aws/services/awslambda/awslambda_service_test.py +++ b/tests/providers/aws/services/awslambda/awslambda_service_test.py @@ -1,16 +1,18 @@ -from unittest.mock import patch -from moto.core import DEFAULT_ACCOUNT_ID -from boto3 import client, resource, session -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.awslambda.awslambda_service import Lambda, AuthType -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from moto import mock_lambda, mock_iam, mock_s3 -import zipfile import io -import mock -from re import search -import tempfile import os +import tempfile +import zipfile +from re import search +from unittest.mock import patch + +import mock +from boto3 import client, resource, session +from moto import mock_iam, mock_lambda, mock_s3 +from moto.core import DEFAULT_ACCOUNT_ID + +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.awslambda.awslambda_service import AuthType, Lambda # Mock Test Region AWS_REGION = "eu-west-1" @@ -51,7 +53,7 @@ def mock_generate_regional_clients(service, audit_info): @patch( - "providers.aws.services.awslambda.awslambda_service.generate_regional_clients", + "prowler.providers.aws.services.awslambda.awslambda_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_Lambda_Service: @@ -171,7 +173,7 @@ def test__list_functions__(self): lambda_arn = resp["FunctionArn"] with mock.patch( - "providers.aws.services.awslambda.awslambda_service.requests.get", + "prowler.providers.aws.services.awslambda.awslambda_service.requests.get", new=mock_request_get, ): awslambda = Lambda(self.set_mocked_audit_info()) @@ -215,7 +217,6 @@ def test__list_functions__(self): assert files_in_zip[0] == "lambda_function.py" with open(f"{tmp_dir_name}/{files_in_zip[0]}", "r") as lambda_code_file: _ = lambda_code_file - pass # assert ( # lambda_code_file.read() # == """ diff --git a/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets_test.py b/tests/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets_test.py similarity index 79% rename from providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets_test.py rename to tests/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets_test.py index 4c7a54c7bc9..5ac1e3f4024 100644 --- a/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets_test.py +++ b/tests/providers/aws/services/cloudformation/cloudformation_outputs_find_secrets/cloudformation_outputs_find_secrets_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.cloudformation.cloudformation_service import Stack +from prowler.providers.aws.services.cloudformation.cloudformation_service import Stack # Mock Test Region AWS_REGION = "eu-west-1" @@ -11,11 +11,11 @@ def test_no_stacks(self): cloudformation_client = mock.MagicMock cloudformation_client.stacks = [] with mock.patch( - "providers.aws.services.cloudformation.cloudformation_service.CloudFormation", + "prowler.providers.aws.services.cloudformation.cloudformation_service.CloudFormation", new=cloudformation_client, ): # Test Check - from providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( + from prowler.providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( cloudformation_outputs_find_secrets, ) @@ -37,10 +37,10 @@ def test_stack_secret_in_outputs(self): ] with mock.patch( - "providers.aws.services.cloudformation.cloudformation_service.CloudFormation", + "prowler.providers.aws.services.cloudformation.cloudformation_service.CloudFormation", cloudformation_client, ): - from providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( + from prowler.providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( cloudformation_outputs_find_secrets, ) @@ -73,10 +73,10 @@ def test_stack_no_secret_in_outputs(self): ] with mock.patch( - "providers.aws.services.cloudformation.cloudformation_service.CloudFormation", + "prowler.providers.aws.services.cloudformation.cloudformation_service.CloudFormation", cloudformation_client, ): - from providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( + from prowler.providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( cloudformation_outputs_find_secrets, ) @@ -109,10 +109,10 @@ def test_stack_no_outputs(self): ] with mock.patch( - "providers.aws.services.cloudformation.cloudformation_service.CloudFormation", + "prowler.providers.aws.services.cloudformation.cloudformation_service.CloudFormation", cloudformation_client, ): - from providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( + from prowler.providers.aws.services.cloudformation.cloudformation_outputs_find_secrets.cloudformation_outputs_find_secrets import ( cloudformation_outputs_find_secrets, ) diff --git a/providers/aws/services/cloudformation/cloudformation_service_test.py b/tests/providers/aws/services/cloudformation/cloudformation_service_test.py similarity index 96% rename from providers/aws/services/cloudformation/cloudformation_service_test.py rename to tests/providers/aws/services/cloudformation/cloudformation_service_test.py index 470ff4cc789..d035ca1da14 100644 --- a/providers/aws/services/cloudformation/cloudformation_service_test.py +++ b/tests/providers/aws/services/cloudformation/cloudformation_service_test.py @@ -9,8 +9,10 @@ from moto import mock_cloudformation from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import AWS_Audit_Info -from providers.aws.services.cloudformation.cloudformation_service import CloudFormation +from prowler.providers.aws.lib.audit_info.audit_info import AWS_Audit_Info +from prowler.providers.aws.services.cloudformation.cloudformation_service import ( + CloudFormation, +) # Mock Test Region AWS_REGION = "eu-west-1" @@ -127,7 +129,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.cloudformation.cloudformation_service.generate_regional_clients", + "prowler.providers.aws.services.cloudformation.cloudformation_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_CloudFormation_Service: diff --git a/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled_test.py b/tests/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled_test.py similarity index 78% rename from providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled_test.py rename to tests/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled_test.py index 2307615bf77..a40bce4b330 100644 --- a/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled_test.py +++ b/tests/providers/aws/services/cloudformation/cloudformation_stacks_termination_protection_enabled/cloudformation_stacks_termination_protection_enabled_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.cloudformation.cloudformation_service import Stack +from prowler.providers.aws.services.cloudformation.cloudformation_service import Stack # Mock Test Region AWS_REGION = "eu-west-1" @@ -11,11 +11,11 @@ def test_no_stacks(self): cloudformation_client = mock.MagicMock cloudformation_client.stacks = [] with mock.patch( - "providers.aws.services.cloudformation.cloudformation_service.CloudFormation", + "prowler.providers.aws.services.cloudformation.cloudformation_service.CloudFormation", new=cloudformation_client, ): # Test Check - from providers.aws.services.cloudformation.cloudformation_stacks_termination_protection_enabled.cloudformation_stacks_termination_protection_enabled import ( + from prowler.providers.aws.services.cloudformation.cloudformation_stacks_termination_protection_enabled.cloudformation_stacks_termination_protection_enabled import ( cloudformation_stacks_termination_protection_enabled, ) @@ -38,10 +38,10 @@ def test_stack_termination_protection_enabled(self): cloudformation_client.stacks[0].enable_termination_protection = True with mock.patch( - "providers.aws.services.cloudformation.cloudformation_service.CloudFormation", + "prowler.providers.aws.services.cloudformation.cloudformation_service.CloudFormation", cloudformation_client, ): - from providers.aws.services.cloudformation.cloudformation_stacks_termination_protection_enabled.cloudformation_stacks_termination_protection_enabled import ( + from prowler.providers.aws.services.cloudformation.cloudformation_stacks_termination_protection_enabled.cloudformation_stacks_termination_protection_enabled import ( cloudformation_stacks_termination_protection_enabled, ) @@ -75,10 +75,10 @@ def test_stack_termination_protection_disabled(self): cloudformation_client.stacks[0].enable_termination_protection = False with mock.patch( - "providers.aws.services.cloudformation.cloudformation_service.CloudFormation", + "prowler.providers.aws.services.cloudformation.cloudformation_service.CloudFormation", cloudformation_client, ): - from providers.aws.services.cloudformation.cloudformation_stacks_termination_protection_enabled.cloudformation_stacks_termination_protection_enabled import ( + from prowler.providers.aws.services.cloudformation.cloudformation_stacks_termination_protection_enabled.cloudformation_stacks_termination_protection_enabled import ( cloudformation_stacks_termination_protection_enabled, ) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled_test.py b/tests/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled_test.py similarity index 80% rename from providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled_test.py rename to tests/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled_test.py index 5f228fd4cd8..c96f3223799 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled_test.py +++ b/tests/providers/aws/services/cloudfront/cloudfront_distributions_field_level_encryption_enabled/cloudfront_distributions_field_level_encryption_enabled_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.cloudfront.cloudfront_service import ( +from prowler.providers.aws.services.cloudfront.cloudfront_service import ( DefaultCacheConfigBehaviour, Distribution, ViewerProtocolPolicy, @@ -20,11 +20,11 @@ def test_no_distributions(self): cloudfront_client = mock.MagicMock cloudfront_client.distributions = {} with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_field_level_encryption_enabled.cloudfront_distributions_field_level_encryption_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_field_level_encryption_enabled.cloudfront_distributions_field_level_encryption_enabled import ( cloudfront_distributions_field_level_encryption_enabled, ) @@ -50,11 +50,11 @@ def test_one_distribution_field_level_encryption_enabled(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_field_level_encryption_enabled.cloudfront_distributions_field_level_encryption_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_field_level_encryption_enabled.cloudfront_distributions_field_level_encryption_enabled import ( cloudfront_distributions_field_level_encryption_enabled, ) @@ -88,11 +88,11 @@ def test_one_distribution_field_level_encryption_disabled(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_field_level_encryption_enabled.cloudfront_distributions_field_level_encryption_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_field_level_encryption_enabled.cloudfront_distributions_field_level_encryption_enabled import ( cloudfront_distributions_field_level_encryption_enabled, ) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled_test.py b/tests/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled_test.py similarity index 79% rename from providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled_test.py rename to tests/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled_test.py index 3b71e4e150f..42f89f9960b 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled_test.py +++ b/tests/providers/aws/services/cloudfront/cloudfront_distributions_geo_restrictions_enabled/cloudfront_distributions_geo_restrictions_enabled_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.cloudfront.cloudfront_service import ( +from prowler.providers.aws.services.cloudfront.cloudfront_service import ( Distribution, GeoRestrictionType, ) @@ -19,11 +19,11 @@ def test_no_distributions(self): cloudfront_client = mock.MagicMock cloudfront_client.distributions = {} with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( cloudfront_distributions_geo_restrictions_enabled, ) @@ -45,11 +45,11 @@ def test_one_distribution_geo_restriction_disabled(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( cloudfront_distributions_geo_restrictions_enabled, ) @@ -79,11 +79,11 @@ def test_one_distribution_geo_restriction_enabled_whitelist(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( cloudfront_distributions_geo_restrictions_enabled, ) @@ -113,11 +113,11 @@ def test_one_distribution_geo_restriction_enabled_blacklist(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_geo_restrictions_enabled.cloudfront_distributions_geo_restrictions_enabled import ( cloudfront_distributions_geo_restrictions_enabled, ) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled_test.py b/tests/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled_test.py similarity index 82% rename from providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled_test.py rename to tests/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled_test.py index a2e5ccbade3..b9e5b53c57f 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled_test.py +++ b/tests/providers/aws/services/cloudfront/cloudfront_distributions_https_enabled/cloudfront_distributions_https_enabled_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.cloudfront.cloudfront_service import ( +from prowler.providers.aws.services.cloudfront.cloudfront_service import ( DefaultCacheConfigBehaviour, Distribution, ViewerProtocolPolicy, @@ -20,11 +20,11 @@ def test_no_distributions(self): cloudfront_client = mock.MagicMock cloudfront_client.distributions = {} with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( cloudfront_distributions_https_enabled, ) @@ -50,11 +50,11 @@ def test_one_distribution_https_disabled(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( cloudfront_distributions_https_enabled, ) @@ -88,11 +88,11 @@ def test_one_distribution_https_redirect(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( cloudfront_distributions_https_enabled, ) @@ -126,11 +126,11 @@ def test_one_distribution_https_only(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_https_enabled.cloudfront_distributions_https_enabled import ( cloudfront_distributions_https_enabled, ) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled_test.py b/tests/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled_test.py similarity index 82% rename from providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled_test.py rename to tests/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled_test.py index 95bfd8f2d62..f866f333a47 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled_test.py +++ b/tests/providers/aws/services/cloudfront/cloudfront_distributions_logging_enabled/cloudfront_distributions_logging_enabled_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.cloudfront.cloudfront_service import ( +from prowler.providers.aws.services.cloudfront.cloudfront_service import ( DefaultCacheConfigBehaviour, Distribution, ViewerProtocolPolicy, @@ -20,11 +20,11 @@ def test_no_distributions(self): cloudfront_client = mock.MagicMock cloudfront_client.distributions = {} with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( cloudfront_distributions_logging_enabled, ) @@ -46,11 +46,11 @@ def test_one_distribution_logging_enabled(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( cloudfront_distributions_logging_enabled, ) @@ -85,11 +85,11 @@ def test_one_distribution_logging_disabled_realtime_disabled(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( cloudfront_distributions_logging_enabled, ) @@ -124,11 +124,11 @@ def test_one_distribution_logging_disabled_realtime_enabled(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( cloudfront_distributions_logging_enabled, ) @@ -163,11 +163,11 @@ def test_one_distribution_logging_enabled_realtime_enabled(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_logging_enabled.cloudfront_distributions_logging_enabled import ( cloudfront_distributions_logging_enabled, ) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols_test.py b/tests/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols_test.py similarity index 88% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols_test.py rename to tests/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols_test.py index eabffdcf60a..97dd5cca1e5 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols_test.py +++ b/tests/providers/aws/services/cloudfront/cloudfront_distributions_using_deprecated_ssl_protocols/cloudfront_distributions_using_deprecated_ssl_protocols_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.cloudfront.cloudfront_service import Distribution +from prowler.providers.aws.services.cloudfront.cloudfront_service import Distribution DISTRIBUTION_ID = "E27LVI50CSW06W" DISTRIBUTION_ARN = ( @@ -16,11 +16,11 @@ def test_no_distributions(self): cloudfront_client = mock.MagicMock cloudfront_client.distributions = {} with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( cloudfront_distributions_using_deprecated_ssl_protocols, ) @@ -77,11 +77,11 @@ def test_one_distribution_using_deprecated_ssl_protocols(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( cloudfront_distributions_using_deprecated_ssl_protocols, ) @@ -147,11 +147,11 @@ def test_one_distribution_using_SSL_and_TLS(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( cloudfront_distributions_using_deprecated_ssl_protocols, ) @@ -217,11 +217,11 @@ def test_one_distribution_using_SSL_and_bad_TLS(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( cloudfront_distributions_using_deprecated_ssl_protocols, ) @@ -284,11 +284,11 @@ def test_one_distribution_not_using_deprecated_ssl_protocols(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_deprecated_ssl_protocols.cloudfront_distributions_using_deprecated_ssl_protocols import ( cloudfront_distributions_using_deprecated_ssl_protocols, ) diff --git a/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf_test.py b/tests/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf_test.py similarity index 78% rename from providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf_test.py rename to tests/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf_test.py index a2fd0a83d85..7432034bd5d 100644 --- a/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf_test.py +++ b/tests/providers/aws/services/cloudfront/cloudfront_distributions_using_waf/cloudfront_distributions_using_waf_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.cloudfront.cloudfront_service import Distribution +from prowler.providers.aws.services.cloudfront.cloudfront_service import Distribution DISTRIBUTION_ID = "E27LVI50CSW06W" DISTRIBUTION_ARN = ( @@ -16,11 +16,11 @@ def test_no_distributions(self): cloudfront_client = mock.MagicMock cloudfront_client.distributions = {} with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_waf.cloudfront_distributions_using_waf import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_waf.cloudfront_distributions_using_waf import ( cloudfront_distributions_using_waf, ) @@ -43,11 +43,11 @@ def test_one_distribution_waf(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_waf.cloudfront_distributions_using_waf import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_waf.cloudfront_distributions_using_waf import ( cloudfront_distributions_using_waf, ) @@ -76,11 +76,11 @@ def test_one_distribution_no_waf(self): } with mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.cloudfront.cloudfront_distributions_using_waf.cloudfront_distributions_using_waf import ( + from prowler.providers.aws.services.cloudfront.cloudfront_distributions_using_waf.cloudfront_distributions_using_waf import ( cloudfront_distributions_using_waf, ) diff --git a/providers/aws/services/cloudfront/cloudfront_service_test.py b/tests/providers/aws/services/cloudfront/cloudfront_service_test.py similarity index 98% rename from providers/aws/services/cloudfront/cloudfront_service_test.py rename to tests/providers/aws/services/cloudfront/cloudfront_service_test.py index 4c9411207cf..d71157b1198 100644 --- a/providers/aws/services/cloudfront/cloudfront_service_test.py +++ b/tests/providers/aws/services/cloudfront/cloudfront_service_test.py @@ -5,8 +5,8 @@ from moto import mock_cloudfront from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.cloudfront.cloudfront_service import CloudFront +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.cloudfront.cloudfront_service import CloudFront # Mock Test Region AWS_REGION = "eu-west-1" diff --git a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py similarity index 86% rename from providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py index a86daf78550..921392d783b 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_cloudwatch_logging_enabled/cloudtrail_cloudwatch_logging_enabled_test.py @@ -30,17 +30,19 @@ def test_trails_sending_logs_during_and_not_last_day(self): Name=trail_name_eu, S3BucketName=bucket_name_eu, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled import ( cloudtrail_cloudwatch_logging_enabled, ) @@ -103,17 +105,19 @@ def test_multi_region_and_single_region_logging_and_not(self): Name=trail_name_eu, S3BucketName=bucket_name_eu, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled import ( cloudtrail_cloudwatch_logging_enabled, ) @@ -176,17 +180,19 @@ def test_trails_sending_and_not_sending_logs(self): Name=trail_name_eu, S3BucketName=bucket_name_eu, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_cloudwatch_logging_enabled.cloudtrail_cloudwatch_logging_enabled import ( cloudtrail_cloudwatch_logging_enabled, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled_test.py similarity index 73% rename from providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled_test.py index e2f45ce2205..e1d2b7ce823 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_kms_encryption_enabled/cloudtrail_kms_encryption_enabled_test.py @@ -18,17 +18,19 @@ def test_trail_no_kms(self): Name=trail_name_us, S3BucketName=bucket_name_us, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled import ( cloudtrail_kms_encryption_enabled, ) @@ -62,17 +64,19 @@ def test_trail_kms(self): KmsKeyId=key_arn, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_kms_encryption_enabled.cloudtrail_kms_encryption_enabled import ( cloudtrail_kms_encryption_enabled, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled_test.py similarity index 78% rename from providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled_test.py index 2919ae80419..644dc12e49d 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_log_file_validation_enabled/cloudtrail_log_file_validation_enabled_test.py @@ -17,17 +17,19 @@ def test_no_logging_validation(self): trail_us = cloudtrail_client_us_east_1.create_trail( Name=trail_name_us, S3BucketName=bucket_name_us, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled import ( cloudtrail_log_file_validation_enabled, ) @@ -66,17 +68,19 @@ def test_various_trails_with_and_without_logging_validation(self): Name=trail_name_eu, S3BucketName=bucket_name_eu, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_log_file_validation_enabled.cloudtrail_log_file_validation_enabled import ( cloudtrail_log_file_validation_enabled, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled_test.py similarity index 72% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled_test.py index 99caae69d11..f9f513c28ca 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_access_logging_enabled/cloudtrail_logs_s3_bucket_access_logging_enabled_test.py @@ -18,22 +18,24 @@ def test_bucket_not_logging(self): Name=trail_name_us, S3BucketName=bucket_name_us, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.s3_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled import ( cloudtrail_logs_s3_bucket_access_logging_enabled, ) @@ -81,22 +83,24 @@ def test_bucket_logging(self): }, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.s3_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled import ( cloudtrail_logs_s3_bucket_access_logging_enabled, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible_test.py similarity index 73% rename from providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible_test.py index 72a8c94c566..2d8103f1ec8 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_logs_s3_bucket_is_not_publicly_accessible/cloudtrail_logs_s3_bucket_is_not_publicly_accessible_test.py @@ -17,22 +17,24 @@ def test_trail_bucket_no_acl(self): trail_us = cloudtrail_client.create_trail( Name=trail_name_us, S3BucketName=bucket_name_us, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_client", new=Cloudtrail(current_audit_info), ): with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.s3_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_access_logging_enabled.cloudtrail_logs_s3_bucket_access_logging_enabled.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible import ( cloudtrail_logs_s3_bucket_is_not_publicly_accessible, ) @@ -79,22 +81,24 @@ def test_trail_bucket_public_acl(self): Name=trail_name_us, S3BucketName=bucket_name_us, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_client", new=Cloudtrail(current_audit_info), ): with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.s3_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible import ( cloudtrail_logs_s3_bucket_is_not_publicly_accessible, ) @@ -140,17 +144,19 @@ def test_trail_bucket_not_public_acl(self): }, Bucket=bucket_name_us, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_logs_s3_bucket_is_not_publicly_accessible.cloudtrail_logs_s3_bucket_is_not_publicly_accessible import ( cloudtrail_logs_s3_bucket_is_not_publicly_accessible, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled_test.py similarity index 79% rename from providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled_test.py index 939f5ebfe15..8f7a40ca369 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_multi_region_enabled/cloudtrail_multi_region_enabled_test.py @@ -8,17 +8,19 @@ class Test_cloudtrail_multi_region_enabled: @mock_cloudtrail def test_no_trails(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled import ( cloudtrail_multi_region_enabled, ) @@ -61,17 +63,19 @@ def test_various_trails_no_login(self): Name=trail_name_eu, S3BucketName=bucket_name_eu, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled import ( cloudtrail_multi_region_enabled, ) @@ -116,17 +120,19 @@ def test_various_trails_with_and_without_login(self): _ = cloudtrail_client_us_east_1.start_logging(Name=trail_name_us) _ = cloudtrail_client_us_east_1.get_trail_status(Name=trail_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_multi_region_enabled.cloudtrail_multi_region_enabled import ( cloudtrail_multi_region_enabled, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled_test.py similarity index 76% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled_test.py index a219382bb47..0c465e717d4 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_read_enabled/cloudtrail_s3_dataevents_read_enabled_test.py @@ -18,17 +18,19 @@ def test_trail_without_data_events(self): Name=trail_name_us, S3BucketName=bucket_name_us, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled import ( cloudtrail_s3_dataevents_read_enabled, ) @@ -67,17 +69,19 @@ def test_trail_without_s3_data_events(self): } ], )["EventSelectors"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled import ( cloudtrail_s3_dataevents_read_enabled, ) @@ -116,17 +120,19 @@ def test_trail_with_s3_data_events(self): } ], )["EventSelectors"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_read_enabled.cloudtrail_s3_dataevents_read_enabled import ( cloudtrail_s3_dataevents_read_enabled, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled_test.py similarity index 76% rename from providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled_test.py index c3b23a63f82..0d43a76b5e2 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_s3_dataevents_write_enabled/cloudtrail_s3_dataevents_write_enabled_test.py @@ -18,17 +18,19 @@ def test_trail_without_data_events(self): Name=trail_name_us, S3BucketName=bucket_name_us, IsMultiRegionTrail=False ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled import ( cloudtrail_s3_dataevents_write_enabled, ) @@ -67,17 +69,19 @@ def test_trail_without_s3_data_events(self): } ], )["EventSelectors"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled import ( cloudtrail_s3_dataevents_write_enabled, ) @@ -116,17 +120,19 @@ def test_trail_with_s3_data_events(self): } ], )["EventSelectors"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudtrail.cloudtrail_service import ( + Cloudtrail, + ) current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled import ( + from prowler.providers.aws.services.cloudtrail.cloudtrail_s3_dataevents_write_enabled.cloudtrail_s3_dataevents_write_enabled import ( cloudtrail_s3_dataevents_write_enabled, ) diff --git a/providers/aws/services/cloudtrail/cloudtrail_service_test.py b/tests/providers/aws/services/cloudtrail/cloudtrail_service_test.py similarity index 98% rename from providers/aws/services/cloudtrail/cloudtrail_service_test.py rename to tests/providers/aws/services/cloudtrail/cloudtrail_service_test.py index 263e30270cc..a0d9d453742 100644 --- a/providers/aws/services/cloudtrail/cloudtrail_service_test.py +++ b/tests/providers/aws/services/cloudtrail/cloudtrail_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, session from moto import mock_cloudtrail, mock_s3 -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.cloudtrail.cloudtrail_service import Cloudtrail AWS_ACCOUNT_NUMBER = 123456789012 diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured_test.py similarity index 63% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured_test.py index 633d204574e..f51c83026b7 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_acls_alarm_configured/cloudwatch_changes_to_network_acls_alarm_configured_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( cloudwatch_changes_to_network_acls_alarm_configured, ) @@ -57,27 +59,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( cloudwatch_changes_to_network_acls_alarm_configured, ) @@ -108,27 +112,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( cloudwatch_changes_to_network_acls_alarm_configured, ) @@ -171,27 +177,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( cloudwatch_changes_to_network_acls_alarm_configured, ) @@ -246,27 +254,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_acls_alarm_configured.cloudwatch_changes_to_network_acls_alarm_configured import ( cloudwatch_changes_to_network_acls_alarm_configured, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured_test.py similarity index 63% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured_test.py index bd47a58eaf0..0f0bcdc136a 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_gateways_alarm_configured/cloudwatch_changes_to_network_gateways_alarm_configured_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( cloudwatch_changes_to_network_gateways_alarm_configured, ) @@ -57,27 +59,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( cloudwatch_changes_to_network_gateways_alarm_configured, ) @@ -108,27 +112,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( cloudwatch_changes_to_network_gateways_alarm_configured, ) @@ -171,27 +177,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( cloudwatch_changes_to_network_gateways_alarm_configured, ) @@ -246,27 +254,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_gateways_alarm_configured.cloudwatch_changes_to_network_gateways_alarm_configured import ( cloudwatch_changes_to_network_gateways_alarm_configured, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured_test.py similarity index 62% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured_test.py index f47cab81100..5a016dda3ff 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_network_route_tables_alarm_configured/cloudwatch_changes_to_network_route_tables_alarm_configured_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( cloudwatch_changes_to_network_route_tables_alarm_configured, ) @@ -57,27 +59,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( cloudwatch_changes_to_network_route_tables_alarm_configured, ) @@ -108,27 +112,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( cloudwatch_changes_to_network_route_tables_alarm_configured, ) @@ -171,27 +177,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( cloudwatch_changes_to_network_route_tables_alarm_configured, ) @@ -246,27 +254,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_network_route_tables_alarm_configured.cloudwatch_changes_to_network_route_tables_alarm_configured import ( cloudwatch_changes_to_network_route_tables_alarm_configured, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured_test.py similarity index 66% rename from providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured_test.py index 0541f37c2fc..af7dc1b2b1b 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_changes_to_vpcs_alarm_configured/cloudwatch_changes_to_vpcs_alarm_configured_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( cloudwatch_changes_to_vpcs_alarm_configured, ) @@ -57,27 +59,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( cloudwatch_changes_to_vpcs_alarm_configured, ) @@ -108,27 +112,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( cloudwatch_changes_to_vpcs_alarm_configured, ) @@ -171,27 +177,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( cloudwatch_changes_to_vpcs_alarm_configured, ) @@ -246,27 +254,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_changes_to_vpcs_alarm_configured.cloudwatch_changes_to_vpcs_alarm_configured import ( cloudwatch_changes_to_vpcs_alarm_configured, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled_test.py similarity index 66% rename from providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled_test.py index 75a98be6d3b..a93b89971fa 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_cross_account_sharing_disabled/cloudwatch_cross_account_sharing_disabled_test.py @@ -9,17 +9,17 @@ class Test_cloudwatch_cross_account_sharing_disabled: @mock_iam def test_cloudwatch_without_cross_account_role(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled.iam_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled import ( cloudwatch_cross_account_sharing_disabled, ) @@ -42,17 +42,17 @@ def test_cloudwatch_log_group_with_cross_account_role(self): iam_client.create_role( RoleName="CloudWatch-CrossAccountSharingRole", AssumeRolePolicyDocument="{}" ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled.iam_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_cross_account_sharing_disabled.cloudwatch_cross_account_sharing_disabled import ( cloudwatch_cross_account_sharing_disabled, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled_test.py similarity index 62% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled_test.py index 6635723757e..0c273d77495 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_group_kms_encryption_enabled/cloudwatch_log_group_kms_encryption_enabled_test.py @@ -8,17 +8,17 @@ class Test_cloudwatch_log_group_kms_encryption_enabled: def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import Logs + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client", new=Logs(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled import ( cloudwatch_log_group_kms_encryption_enabled, ) @@ -35,17 +35,17 @@ def test_cloudwatch_log_group_without_kms_key(self): logs_client.create_log_group( logGroupName="test", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import Logs + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client", new=Logs(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled import ( cloudwatch_log_group_kms_encryption_enabled, ) @@ -66,17 +66,17 @@ def test_cloudwatch_log_group_with_kms_key(self): logs_client = client("logs", region_name=AWS_REGION) # Request Logs group logs_client.create_log_group(logGroupName="test", kmsKeyId="test_kms_id") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import Logs + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled.logs_client", new=Logs(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_kms_encryption_enabled.cloudwatch_log_group_kms_encryption_enabled import ( cloudwatch_log_group_kms_encryption_enabled, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled_test.py similarity index 62% rename from providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled_test.py index b6951b9c46e..26802a97948 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_group_retention_policy_specific_days_enabled/cloudwatch_log_group_retention_policy_specific_days_enabled_test.py @@ -8,17 +8,17 @@ class Test_cloudwatch_log_group_retention_policy_specific_days_enabled: def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import Logs + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", new=Logs(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( cloudwatch_log_group_retention_policy_specific_days_enabled, ) @@ -35,17 +35,17 @@ def test_cloudwatch_log_group_without_retention_days(self): logs_client.create_log_group( logGroupName="test", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import Logs + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", new=Logs(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( cloudwatch_log_group_retention_policy_specific_days_enabled, ) @@ -69,17 +69,17 @@ def test_cloudwatch_log_group_with_compliant_retention_days(self): logGroupName="test", ) logs_client.put_retention_policy(logGroupName="test", retentionInDays=400) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import Logs + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", new=Logs(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( cloudwatch_log_group_retention_policy_specific_days_enabled, ) @@ -103,17 +103,17 @@ def test_cloudwatch_log_group_with_no_compliant_retention_days(self): logGroupName="test", ) logs_client.put_retention_policy(logGroupName="test", retentionInDays=7) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import Logs + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import Logs current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled.logs_client", new=Logs(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_group_retention_policy_specific_days_enabled.cloudwatch_log_group_retention_policy_specific_days_enabled import ( cloudwatch_log_group_retention_policy_specific_days_enabled, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled_test.py similarity index 59% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled_test.py index 0129da7f937..9bbf72979ee 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled, ) @@ -59,27 +61,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled, ) @@ -112,27 +116,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled, ) @@ -177,27 +183,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled, ) @@ -254,27 +262,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_aws_config_configuration_changes_enabled, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled_test.py similarity index 59% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled_test.py index a4c1a1c4bc0..8830df8ac80 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled/cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled, ) @@ -59,27 +61,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled, ) @@ -112,27 +116,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled, ) @@ -177,27 +183,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled, ) @@ -254,27 +262,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled.cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled import ( cloudwatch_log_metric_filter_and_alarm_for_cloudtrail_configuration_changes_enabled, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures_test.py similarity index 62% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures_test.py index abbfa561faf..8c800b1e410 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_authentication_failures/cloudwatch_log_metric_filter_authentication_failures_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( cloudwatch_log_metric_filter_authentication_failures, ) @@ -57,27 +59,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( cloudwatch_log_metric_filter_authentication_failures, ) @@ -108,27 +112,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( cloudwatch_log_metric_filter_authentication_failures, ) @@ -171,27 +177,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( cloudwatch_log_metric_filter_authentication_failures, ) @@ -246,27 +254,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_authentication_failures.cloudwatch_log_metric_filter_authentication_failures import ( cloudwatch_log_metric_filter_authentication_failures, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes_test.py similarity index 66% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes_test.py index 094dfab3f5e..de96c7dd9e8 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_aws_organizations_changes/cloudwatch_log_metric_filter_aws_organizations_changes_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_aws_organizations_changes: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( cloudwatch_log_metric_filter_aws_organizations_changes, ) @@ -57,27 +59,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( cloudwatch_log_metric_filter_aws_organizations_changes, ) @@ -108,27 +112,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( cloudwatch_log_metric_filter_aws_organizations_changes, ) @@ -171,27 +177,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( cloudwatch_log_metric_filter_aws_organizations_changes, ) @@ -246,27 +254,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_aws_organizations_changes.cloudwatch_log_metric_filter_aws_organizations_changes import ( cloudwatch_log_metric_filter_aws_organizations_changes, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk_test.py similarity index 60% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk_test.py index 7b15af942b2..abf4b5b8b58 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk/cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk, ) @@ -59,27 +61,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk, ) @@ -112,27 +116,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk, ) @@ -177,27 +183,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk, ) @@ -254,27 +262,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk.cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk import ( cloudwatch_log_metric_filter_disable_or_scheduled_deletion_of_kms_cmk, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes_test.py similarity index 63% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes_test.py index 069eac246be..7c60372d5f4 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes/cloudwatch_log_metric_filter_for_s3_bucket_policy_changes_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( cloudwatch_log_metric_filter_for_s3_bucket_policy_changes, ) @@ -57,27 +59,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( cloudwatch_log_metric_filter_for_s3_bucket_policy_changes, ) @@ -108,27 +112,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( cloudwatch_log_metric_filter_for_s3_bucket_policy_changes, ) @@ -171,27 +177,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( cloudwatch_log_metric_filter_for_s3_bucket_policy_changes, ) @@ -246,27 +254,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes.cloudwatch_log_metric_filter_for_s3_bucket_policy_changes import ( cloudwatch_log_metric_filter_for_s3_bucket_policy_changes, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes_test.py similarity index 66% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes_test.py index 0ef5e1d842e..3e285152240 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_policy_changes/cloudwatch_log_metric_filter_policy_changes_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( cloudwatch_log_metric_filter_policy_changes, ) @@ -57,27 +59,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( cloudwatch_log_metric_filter_policy_changes, ) @@ -108,27 +112,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( cloudwatch_log_metric_filter_policy_changes, ) @@ -171,27 +177,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( cloudwatch_log_metric_filter_policy_changes, ) @@ -246,27 +254,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_policy_changes.cloudwatch_log_metric_filter_policy_changes import ( cloudwatch_log_metric_filter_policy_changes, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage_test.py similarity index 65% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage_test.py index 1033d00ae27..f62f37d9023 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_root_usage/cloudwatch_log_metric_filter_root_usage_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( cloudwatch_log_metric_filter_root_usage, ) @@ -57,27 +59,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( cloudwatch_log_metric_filter_root_usage, ) @@ -108,27 +112,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( cloudwatch_log_metric_filter_root_usage, ) @@ -171,27 +177,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( cloudwatch_log_metric_filter_root_usage, ) @@ -246,27 +254,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_root_usage.cloudwatch_log_metric_filter_root_usage import ( cloudwatch_log_metric_filter_root_usage, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes_test.py similarity index 64% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes_test.py index 3bd6c9d2145..f35f193fb68 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_security_group_changes/cloudwatch_log_metric_filter_security_group_changes_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( cloudwatch_log_metric_filter_security_group_changes, ) @@ -57,27 +59,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( cloudwatch_log_metric_filter_security_group_changes, ) @@ -108,27 +112,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( cloudwatch_log_metric_filter_security_group_changes, ) @@ -171,27 +177,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( cloudwatch_log_metric_filter_security_group_changes, ) @@ -246,27 +254,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_security_group_changes.cloudwatch_log_metric_filter_security_group_changes import ( cloudwatch_log_metric_filter_security_group_changes, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa_test.py similarity index 63% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa_test.py index a0d5d6b6702..a9866fb3cbc 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_sign_in_without_mfa/cloudwatch_log_metric_filter_sign_in_without_mfa_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( cloudwatch_log_metric_filter_sign_in_without_mfa, ) @@ -57,27 +59,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( cloudwatch_log_metric_filter_sign_in_without_mfa, ) @@ -108,27 +112,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( cloudwatch_log_metric_filter_sign_in_without_mfa, ) @@ -171,27 +177,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( cloudwatch_log_metric_filter_sign_in_without_mfa, ) @@ -246,27 +254,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_sign_in_without_mfa.cloudwatch_log_metric_filter_sign_in_without_mfa import ( cloudwatch_log_metric_filter_sign_in_without_mfa, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls_test.py similarity index 63% rename from providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls_test.py index 2769a04e016..95e3459e654 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_log_metric_filter_unauthorized_api_calls/cloudwatch_log_metric_filter_unauthorized_api_calls_test.py @@ -12,27 +12,29 @@ class Test_cloudwatch_log_metric_filter_unauthorized_api_calls: @mock_cloudtrail @mock_cloudwatch def test_cloudwatch_no_log_groups(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( cloudwatch_log_metric_filter_unauthorized_api_calls, ) @@ -57,27 +59,29 @@ def test_cloudwatch_trail_no_log_group(self): s3_client.create_bucket(Bucket="test") cloudtrail_client.create_trail(Name="test_trail", S3BucketName="test") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( cloudwatch_log_metric_filter_unauthorized_api_calls, ) @@ -108,27 +112,29 @@ def test_cloudwatch_trail_with_log_group(self): CloudWatchLogsLogGroupArn=f"arn:aws:logs:{AWS_REGION}:{DEFAULT_ACCOUNT_ID}:log-group:/log-group/test:*", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( cloudwatch_log_metric_filter_unauthorized_api_calls, ) @@ -171,27 +177,29 @@ def test_cloudwatch_trail_with_log_group_with_metric(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( cloudwatch_log_metric_filter_unauthorized_api_calls, ) @@ -246,27 +254,29 @@ def test_cloudwatch_trail_with_log_group_with_metric_and_alarm(self): ActionsEnabled=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.cloudwatch.cloudwatch_service import ( + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.cloudwatch.cloudwatch_service import ( CloudWatch, Logs, ) current_audit_info.audited_partition = "aws" - from providers.aws.services.cloudtrail.cloudtrail_client import Cloudtrail + from prowler.providers.aws.services.cloudtrail.cloudtrail_client import ( + Cloudtrail, + ) with mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.logs_client", new=Logs(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_client", new=CloudWatch(current_audit_info), ), mock.patch( - "providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", + "prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudtrail_client", new=Cloudtrail(current_audit_info), ): # Test Check - from providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( + from prowler.providers.aws.services.cloudwatch.cloudwatch_log_metric_filter_unauthorized_api_calls.cloudwatch_log_metric_filter_unauthorized_api_calls import ( cloudwatch_log_metric_filter_unauthorized_api_calls, ) diff --git a/providers/aws/services/cloudwatch/cloudwatch_service_test.py b/tests/providers/aws/services/cloudwatch/cloudwatch_service_test.py similarity index 92% rename from providers/aws/services/cloudwatch/cloudwatch_service_test.py rename to tests/providers/aws/services/cloudwatch/cloudwatch_service_test.py index c051f3beece..3a0864543a2 100644 --- a/providers/aws/services/cloudwatch/cloudwatch_service_test.py +++ b/tests/providers/aws/services/cloudwatch/cloudwatch_service_test.py @@ -1,8 +1,8 @@ from boto3 import session from moto import mock_cloudwatch -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.cloudwatch.cloudwatch_service import CloudWatch +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.cloudwatch.cloudwatch_service import CloudWatch AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled_test.py b/tests/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled_test.py similarity index 83% rename from providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled_test.py rename to tests/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled_test.py index 129b7f420a7..1290ed3a570 100644 --- a/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled_test.py +++ b/tests/providers/aws/services/codeartifact/codeartifact_packages_external_public_publishing_disabled/codeartifact_packages_external_public_publishing_disabled_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.codeartifact.codeartifact_service import ( +from prowler.providers.aws.services.codeartifact.codeartifact_service import ( LatestPackageVersion, LatestPackageVersionStatus, OriginConfiguration, @@ -22,11 +22,11 @@ def test_no_repositories(self): codeartifact_client = mock.MagicMock codeartifact_client.repositories = {} with mock.patch( - "providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", + "prowler.providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", new=codeartifact_client, ): # Test Check - from providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( + from prowler.providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( codeartifact_packages_external_public_publishing_disabled, ) @@ -48,11 +48,11 @@ def test_repository_without_packages(self): ) } with mock.patch( - "providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", + "prowler.providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", new=codeartifact_client, ): # Test Check - from providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( + from prowler.providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( codeartifact_packages_external_public_publishing_disabled, ) @@ -96,11 +96,11 @@ def test_repository_package_public_publishing_origin_internal(self): ) } with mock.patch( - "providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", + "prowler.providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", new=codeartifact_client, ): # Test Check - from providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( + from prowler.providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( codeartifact_packages_external_public_publishing_disabled, ) @@ -151,11 +151,11 @@ def test_repository_package_private_publishing_origin_internal(self): ) } with mock.patch( - "providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", + "prowler.providers.aws.services.codeartifact.codeartifact_service.CodeArtifact", new=codeartifact_client, ): # Test Check - from providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( + from prowler.providers.aws.services.codeartifact.codeartifact_packages_external_public_publishing_disabled.codeartifact_packages_external_public_publishing_disabled import ( codeartifact_packages_external_public_publishing_disabled, ) diff --git a/providers/aws/services/codeartifact/codeartifact_service_test.py b/tests/providers/aws/services/codeartifact/codeartifact_service_test.py similarity index 95% rename from providers/aws/services/codeartifact/codeartifact_service_test.py rename to tests/providers/aws/services/codeartifact/codeartifact_service_test.py index c342466ac6a..be01c1d4f88 100644 --- a/providers/aws/services/codeartifact/codeartifact_service_test.py +++ b/tests/providers/aws/services/codeartifact/codeartifact_service_test.py @@ -3,8 +3,8 @@ import botocore from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.codeartifact.codeartifact_service import ( +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.codeartifact.codeartifact_service import ( CodeArtifact, LatestPackageVersionStatus, OriginInformationValues, @@ -85,7 +85,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.codeartifact.codeartifact_service.generate_regional_clients", + "prowler.providers.aws.services.codeartifact.codeartifact_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_CodeArtifact_Service: diff --git a/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days_test.py b/tests/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days_test.py similarity index 78% rename from providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days_test.py rename to tests/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days_test.py index 5035783feb0..065ebb03895 100644 --- a/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days_test.py +++ b/tests/providers/aws/services/codebuild/codebuild_project_older_90_days/codebuild_project_older_90_days_test.py @@ -2,7 +2,7 @@ from re import search from unittest import mock -from providers.aws.services.codebuild.codebuild_service import CodebuildProject +from prowler.providers.aws.services.codebuild.codebuild_service import CodebuildProject class Test_codebuild_project_older_90_days: @@ -17,10 +17,10 @@ def test_project_not_built_in_last_90_days(self): ) ] with mock.patch( - "providers.aws.services.codebuild.codebuild_service.Codebuild", + "prowler.providers.aws.services.codebuild.codebuild_service.Codebuild", codebuild_client, ): - from providers.aws.services.codebuild.codebuild_project_older_90_days.codebuild_project_older_90_days import ( + from prowler.providers.aws.services.codebuild.codebuild_project_older_90_days.codebuild_project_older_90_days import ( codebuild_project_older_90_days, ) @@ -43,10 +43,10 @@ def test_project_not_built(self): ) ] with mock.patch( - "providers.aws.services.codebuild.codebuild_service.Codebuild", + "prowler.providers.aws.services.codebuild.codebuild_service.Codebuild", codebuild_client, ): - from providers.aws.services.codebuild.codebuild_project_older_90_days.codebuild_project_older_90_days import ( + from prowler.providers.aws.services.codebuild.codebuild_project_older_90_days.codebuild_project_older_90_days import ( codebuild_project_older_90_days, ) @@ -70,10 +70,10 @@ def test_project_built_in_last_90_days(self): ) ] with mock.patch( - "providers.aws.services.codebuild.codebuild_service.Codebuild", + "prowler.providers.aws.services.codebuild.codebuild_service.Codebuild", codebuild_client, ): - from providers.aws.services.codebuild.codebuild_project_older_90_days.codebuild_project_older_90_days import ( + from prowler.providers.aws.services.codebuild.codebuild_project_older_90_days.codebuild_project_older_90_days import ( codebuild_project_older_90_days, ) diff --git a/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec_test.py b/tests/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec_test.py similarity index 78% rename from providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec_test.py rename to tests/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec_test.py index 2b1c901e9b8..436a439004e 100644 --- a/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec_test.py +++ b/tests/providers/aws/services/codebuild/codebuild_project_user_controlled_buildspec/codebuild_project_user_controlled_buildspec_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.codebuild.codebuild_service import CodebuildProject +from prowler.providers.aws.services.codebuild.codebuild_service import CodebuildProject class Test_codebuild_project_user_controlled_buildspec: @@ -16,10 +16,10 @@ def test_project_not_buildspec(self): ) ] with mock.patch( - "providers.aws.services.codebuild.codebuild_service.Codebuild", + "prowler.providers.aws.services.codebuild.codebuild_service.Codebuild", codebuild_client, ): - from providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( + from prowler.providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( codebuild_project_user_controlled_buildspec, ) @@ -46,10 +46,10 @@ def test_project_buildspec_not_yaml(self): ) ] with mock.patch( - "providers.aws.services.codebuild.codebuild_service.Codebuild", + "prowler.providers.aws.services.codebuild.codebuild_service.Codebuild", codebuild_client, ): - from providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( + from prowler.providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( codebuild_project_user_controlled_buildspec, ) @@ -76,10 +76,10 @@ def test_project_valid_buildspec(self): ) ] with mock.patch( - "providers.aws.services.codebuild.codebuild_service.Codebuild", + "prowler.providers.aws.services.codebuild.codebuild_service.Codebuild", codebuild_client, ): - from providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( + from prowler.providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( codebuild_project_user_controlled_buildspec, ) @@ -103,10 +103,10 @@ def test_project_invalid_buildspec_without_extension(self): ) ] with mock.patch( - "providers.aws.services.codebuild.codebuild_service.Codebuild", + "prowler.providers.aws.services.codebuild.codebuild_service.Codebuild", codebuild_client, ): - from providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( + from prowler.providers.aws.services.codebuild.codebuild_project_user_controlled_buildspec.codebuild_project_user_controlled_buildspec import ( codebuild_project_user_controlled_buildspec, ) diff --git a/providers/aws/services/codebuild/codebuild_service_test.py b/tests/providers/aws/services/codebuild/codebuild_service_test.py similarity index 90% rename from providers/aws/services/codebuild/codebuild_service_test.py rename to tests/providers/aws/services/codebuild/codebuild_service_test.py index de30d16680f..8f572682fdb 100644 --- a/providers/aws/services/codebuild/codebuild_service_test.py +++ b/tests/providers/aws/services/codebuild/codebuild_service_test.py @@ -4,9 +4,9 @@ import botocore from boto3 import session -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.codebuild.codebuild_service import Codebuild +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.codebuild.codebuild_service import Codebuild # Mock Test Region AWS_REGION = "eu-west-1" @@ -49,7 +49,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.codebuild.codebuild_service.generate_regional_clients", + "prowler.providers.aws.services.codebuild.codebuild_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_Codebuild_Service: diff --git a/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py b/tests/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py similarity index 70% rename from providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py rename to tests/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py index a5d7c4c9c17..a674d386c24 100644 --- a/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py +++ b/tests/providers/aws/services/config/config_recorder_all_regions_enabled/config_recorder_all_regions_enabled_test.py @@ -9,17 +9,17 @@ class Test_config_recorder_all_regions_enabled: @mock_config def test_config_no_recorders(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.config.config_service import Config + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.config.config_service import Config current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled.config_client", + "prowler.providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled.config_client", new=Config(current_audit_info), ): # Test Check - from providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled import ( + from prowler.providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled import ( config_recorder_all_regions_enabled, ) @@ -39,17 +39,17 @@ def test_config_one_recoder_disabled(self): config_client.put_configuration_recorder( ConfigurationRecorder={"name": "default", "roleARN": "somearn"} ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.config.config_service import Config + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.config.config_service import Config current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled.config_client", + "prowler.providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled.config_client", new=Config(current_audit_info), ): # Test Check - from providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled import ( + from prowler.providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled import ( config_recorder_all_regions_enabled, ) @@ -79,17 +79,17 @@ def test_config_one_recoder_enabled(self): DeliveryChannel={"name": "testchannel", "s3BucketName": "somebucket"} ) config_client.start_configuration_recorder(ConfigurationRecorderName="default") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.config.config_service import Config + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.config.config_service import Config current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled.config_client", + "prowler.providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled.config_client", new=Config(current_audit_info), ): # Test Check - from providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled import ( + from prowler.providers.aws.services.config.config_recorder_all_regions_enabled.config_recorder_all_regions_enabled import ( config_recorder_all_regions_enabled, ) diff --git a/providers/aws/services/config/config_service_test.py b/tests/providers/aws/services/config/config_service_test.py similarity index 95% rename from providers/aws/services/config/config_service_test.py rename to tests/providers/aws/services/config/config_service_test.py index c47c7b91525..880fa439063 100644 --- a/providers/aws/services/config/config_service_test.py +++ b/tests/providers/aws/services/config/config_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, session from moto import mock_config -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.config.config_service import Config +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.config.config_service import Config AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled_test.py b/tests/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled_test.py similarity index 77% rename from providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled_test.py rename to tests/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled_test.py index 12739bc5639..c92db982956 100644 --- a/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled_test.py +++ b/tests/providers/aws/services/directoryservice/directoryservice_directory_log_forwarding_enabled/directoryservice_directory_log_forwarding_enabled_test.py @@ -1,7 +1,7 @@ from datetime import datetime from unittest import mock -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( Directory, DirectoryType, LogSubscriptions, @@ -15,11 +15,11 @@ def test_no_directories(self): directoryservice_client = mock.MagicMock directoryservice_client.directories = {} with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_log_forwarding_enabled.directoryservice_directory_log_forwarding_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_log_forwarding_enabled.directoryservice_directory_log_forwarding_enabled import ( directoryservice_directory_log_forwarding_enabled, ) @@ -42,11 +42,11 @@ def test_one_directory_logging_disabled(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_log_forwarding_enabled.directoryservice_directory_log_forwarding_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_log_forwarding_enabled.directoryservice_directory_log_forwarding_enabled import ( directoryservice_directory_log_forwarding_enabled, ) @@ -82,11 +82,11 @@ def test_one_directory_logging_enabled(self): } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_log_forwarding_enabled.directoryservice_directory_log_forwarding_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_log_forwarding_enabled.directoryservice_directory_log_forwarding_enabled import ( directoryservice_directory_log_forwarding_enabled, ) diff --git a/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications_test.py b/tests/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications_test.py similarity index 78% rename from providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications_test.py rename to tests/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications_test.py index 6554747cee9..44679816288 100644 --- a/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications_test.py +++ b/tests/providers/aws/services/directoryservice/directoryservice_directory_monitor_notifications/directoryservice_directory_monitor_notifications_test.py @@ -3,7 +3,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( Directory, DirectoryType, EventTopics, @@ -18,11 +18,11 @@ def test_no_directories(self): directoryservice_client = mock.MagicMock directoryservice_client.directories = {} with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_monitor_notifications.directoryservice_directory_monitor_notifications import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_monitor_notifications.directoryservice_directory_monitor_notifications import ( directoryservice_directory_monitor_notifications, ) @@ -45,11 +45,11 @@ def test_one_directory_logging_disabled(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_monitor_notifications.directoryservice_directory_monitor_notifications import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_monitor_notifications.directoryservice_directory_monitor_notifications import ( directoryservice_directory_monitor_notifications, ) @@ -86,11 +86,11 @@ def test_one_directory_logging_enabled(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_monitor_notifications.directoryservice_directory_monitor_notifications import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_monitor_notifications.directoryservice_directory_monitor_notifications import ( directoryservice_directory_monitor_notifications, ) diff --git a/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit_test.py b/tests/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit_test.py similarity index 82% rename from providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit_test.py rename to tests/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit_test.py index ef02323747e..8efae8c5381 100644 --- a/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit_test.py +++ b/tests/providers/aws/services/directoryservice/directoryservice_directory_snapshots_limit/directoryservice_directory_snapshots_limit_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( Directory, DirectoryType, SnapshotLimit, @@ -14,11 +14,11 @@ def test_no_directories(self): directoryservice_client = mock.MagicMock directoryservice_client.directories = {} with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( directoryservice_directory_snapshots_limit, ) @@ -48,11 +48,11 @@ def test_one_directory_snapshots_limit_reached(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( directoryservice_directory_snapshots_limit, ) @@ -89,11 +89,11 @@ def test_one_directory_snapshots_limit_over_threshold(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( directoryservice_directory_snapshots_limit, ) @@ -130,11 +130,11 @@ def test_one_directory_snapshots_limit_equal_threshold(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( directoryservice_directory_snapshots_limit, ) @@ -171,11 +171,11 @@ def test_one_directory_snapshots_limit_more_threshold(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( + from prowler.providers.aws.services.directoryservice.directoryservice_directory_snapshots_limit.directoryservice_directory_snapshots_limit import ( directoryservice_directory_snapshots_limit, ) diff --git a/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration_test.py b/tests/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration_test.py similarity index 81% rename from providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration_test.py rename to tests/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration_test.py index 5c31a10fb25..05dd2be02dc 100644 --- a/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration_test.py +++ b/tests/providers/aws/services/directoryservice/directoryservice_ldap_certificate_expiration/directoryservice_ldap_certificate_expiration_test.py @@ -3,7 +3,7 @@ from freezegun import freeze_time -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( Certificate, CertificateState, CertificateType, @@ -21,11 +21,11 @@ def test_no_directories(self): directoryservice_client = mock.MagicMock directoryservice_client.directories = {} with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( + from prowler.providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( directoryservice_ldap_certificate_expiration, ) @@ -48,11 +48,11 @@ def test_directory_no_certificate(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( + from prowler.providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( directoryservice_ldap_certificate_expiration, ) @@ -87,11 +87,11 @@ def test_directory_certificate_expires_in_365_days(self): } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( + from prowler.providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( directoryservice_ldap_certificate_expiration, ) @@ -133,11 +133,11 @@ def test_directory_certificate_expires_in_90_days(self): } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( + from prowler.providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( directoryservice_ldap_certificate_expiration, ) @@ -179,11 +179,11 @@ def test_directory_certificate_expires_in_31_days(self): } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( + from prowler.providers.aws.services.directoryservice.directoryservice_ldap_certificate_expiration.directoryservice_ldap_certificate_expiration import ( directoryservice_ldap_certificate_expiration, ) diff --git a/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol_test.py b/tests/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol_test.py similarity index 77% rename from providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol_test.py rename to tests/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol_test.py index bf6e90f1a78..3846829b3cd 100644 --- a/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol_test.py +++ b/tests/providers/aws/services/directoryservice/directoryservice_radius_server_security_protocol/directoryservice_radius_server_security_protocol_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( AuthenticationProtocol, Directory, DirectoryType, @@ -16,11 +16,11 @@ def test_no_directories(self): directoryservice_client = mock.MagicMock directoryservice_client.directories = {} with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( + from prowler.providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( directoryservice_radius_server_security_protocol, ) @@ -43,11 +43,11 @@ def test_directory_no_radius_server(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( + from prowler.providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( directoryservice_radius_server_security_protocol, ) @@ -73,11 +73,11 @@ def test_directory_radius_server_bad_auth_protocol(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( + from prowler.providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( directoryservice_radius_server_security_protocol, ) @@ -110,11 +110,11 @@ def test_directory_radius_server_secure_auth_protocol(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( + from prowler.providers.aws.services.directoryservice.directoryservice_radius_server_security_protocol.directoryservice_radius_server_security_protocol import ( directoryservice_radius_server_security_protocol, ) diff --git a/providers/aws/services/directoryservice/directoryservice_service_test.py b/tests/providers/aws/services/directoryservice/directoryservice_service_test.py similarity index 96% rename from providers/aws/services/directoryservice/directoryservice_service_test.py rename to tests/providers/aws/services/directoryservice/directoryservice_service_test.py index 366868049d5..3163a9cdfd5 100644 --- a/providers/aws/services/directoryservice/directoryservice_service_test.py +++ b/tests/providers/aws/services/directoryservice/directoryservice_service_test.py @@ -5,8 +5,8 @@ from moto import mock_ds from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( AuthenticationProtocol, CertificateState, CertificateType, @@ -106,7 +106,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.directoryservice.directoryservice_service.generate_regional_clients", + "prowler.providers.aws.services.directoryservice.directoryservice_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_DirectoryService_Service: diff --git a/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled_test.py b/tests/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled_test.py similarity index 78% rename from providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled_test.py rename to tests/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled_test.py index 26a040cf093..4d59328454d 100644 --- a/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled_test.py +++ b/tests/providers/aws/services/directoryservice/directoryservice_supported_mfa_radius_enabled/directoryservice_supported_mfa_radius_enabled_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.directoryservice.directoryservice_service import ( +from prowler.providers.aws.services.directoryservice.directoryservice_service import ( AuthenticationProtocol, Directory, DirectoryType, @@ -16,11 +16,11 @@ def test_no_directories(self): directoryservice_client = mock.MagicMock directoryservice_client.directories = {} with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( directoryservice_supported_mfa_radius_enabled, ) @@ -43,11 +43,11 @@ def test_directory_no_radius_server(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( directoryservice_supported_mfa_radius_enabled, ) @@ -73,11 +73,11 @@ def test_directory_radius_server_status_failed(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( directoryservice_supported_mfa_radius_enabled, ) @@ -110,11 +110,11 @@ def test_directory_radius_server_status_creating(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( directoryservice_supported_mfa_radius_enabled, ) @@ -147,11 +147,11 @@ def test_directory_radius_server_status_completed(self): ) } with mock.patch( - "providers.aws.services.directoryservice.directoryservice_service.DirectoryService", + "prowler.providers.aws.services.directoryservice.directoryservice_service.DirectoryService", new=directoryservice_client, ): # Test Check - from providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( + from prowler.providers.aws.services.directoryservice.directoryservice_supported_mfa_radius_enabled.directoryservice_supported_mfa_radius_enabled import ( directoryservice_supported_mfa_radius_enabled, ) diff --git a/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled_test.py b/tests/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled_test.py similarity index 66% rename from providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled_test.py rename to tests/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled_test.py index 79be81cdd04..1b30bfdf4e0 100644 --- a/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled_test.py +++ b/tests/providers/aws/services/dynamodb/dynamodb_accelerator_cluster_encryption_enabled/dynamodb_accelerator_cluster_encryption_enabled_test.py @@ -11,17 +11,17 @@ class Test_dynamodb_accelerator_cluster_encryption_enabled: @mock_dax def test_dax_no_clusters(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DAX + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DAX current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled.dax_client", + "prowler.providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled.dax_client", new=DAX(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled import ( dynamodb_accelerator_cluster_encryption_enabled, ) @@ -40,17 +40,17 @@ def test_dax_cluster_no_encryption(self): ReplicationFactor=3, IamRoleArn=iam_role_arn, )["Cluster"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DAX + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DAX current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled.dax_client", + "prowler.providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled.dax_client", new=DAX(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled import ( dynamodb_accelerator_cluster_encryption_enabled, ) @@ -77,17 +77,17 @@ def test_dax_cluster_with_encryption(self): IamRoleArn=iam_role_arn, SSESpecification={"Enabled": True}, )["Cluster"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DAX + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DAX current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled.dax_client", + "prowler.providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled.dax_client", new=DAX(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_accelerator_cluster_encryption_enabled.dynamodb_accelerator_cluster_encryption_enabled import ( dynamodb_accelerator_cluster_encryption_enabled, ) diff --git a/providers/aws/services/dynamodb/dynamodb_service_test.py b/tests/providers/aws/services/dynamodb/dynamodb_service_test.py similarity index 97% rename from providers/aws/services/dynamodb/dynamodb_service_test.py rename to tests/providers/aws/services/dynamodb/dynamodb_service_test.py index 23a3ec46c2a..099e3961378 100644 --- a/providers/aws/services/dynamodb/dynamodb_service_test.py +++ b/tests/providers/aws/services/dynamodb/dynamodb_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, session from moto import mock_dax, mock_dynamodb -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.dynamodb.dynamodb_service import DAX, DynamoDB +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.dynamodb.dynamodb_service import DAX, DynamoDB AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled_test.py b/tests/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled_test.py similarity index 69% rename from providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled_test.py rename to tests/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled_test.py index 885b58dbd10..533bdc4eee3 100644 --- a/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled_test.py +++ b/tests/providers/aws/services/dynamodb/dynamodb_tables_kms_cmk_encryption_enabled/dynamodb_tables_kms_cmk_encryption_enabled_test.py @@ -10,17 +10,17 @@ class Test_dynamodb_tables_kms_cmk_encryption_enabled: @mock_dynamodb def test_dynamodb_no_tables(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DynamoDB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DynamoDB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_client", + "prowler.providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_client", new=DynamoDB(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled import ( dynamodb_tables_kms_cmk_encryption_enabled, ) @@ -45,17 +45,17 @@ def test_dynamodb_table_kms_encryption(self): BillingMode="PAY_PER_REQUEST", SSESpecification={"Enabled": True, "KMSMasterKeyId": "/custom-kms-key"}, )["TableDescription"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DynamoDB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DynamoDB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_client", + "prowler.providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_client", new=DynamoDB(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled import ( dynamodb_tables_kms_cmk_encryption_enabled, ) @@ -83,17 +83,17 @@ def test_dynamodb_table_default_encryption(self): ], BillingMode="PAY_PER_REQUEST", )["TableDescription"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DynamoDB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DynamoDB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_client", + "prowler.providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_client", new=DynamoDB(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_tables_kms_cmk_encryption_enabled.dynamodb_tables_kms_cmk_encryption_enabled import ( dynamodb_tables_kms_cmk_encryption_enabled, ) diff --git a/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled_test.py b/tests/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled_test.py similarity index 72% rename from providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled_test.py rename to tests/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled_test.py index dbea2374360..cfb2f5b2da5 100644 --- a/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled_test.py +++ b/tests/providers/aws/services/dynamodb/dynamodb_tables_pitr_enabled/dynamodb_tables_pitr_enabled_test.py @@ -10,17 +10,17 @@ class Test_dynamodb_tables_pitr_enabled: @mock_dynamodb def test_dynamodb_no_tables(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DynamoDB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DynamoDB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled.dynamodb_client", + "prowler.providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled.dynamodb_client", new=DynamoDB(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled import ( dynamodb_tables_pitr_enabled, ) @@ -44,17 +44,17 @@ def test_dynamodb_table_no_pitr(self): ], BillingMode="PAY_PER_REQUEST", )["TableDescription"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DynamoDB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DynamoDB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled.dynamodb_client", + "prowler.providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled.dynamodb_client", new=DynamoDB(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled import ( dynamodb_tables_pitr_enabled, ) @@ -89,17 +89,17 @@ def test_dynamodb_table_with_pitr(self): TableName="test1", PointInTimeRecoverySpecification={"PointInTimeRecoveryEnabled": True}, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.dynamodb.dynamodb_service import DynamoDB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.dynamodb.dynamodb_service import DynamoDB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled.dynamodb_client", + "prowler.providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled.dynamodb_client", new=DynamoDB(current_audit_info), ): # Test Check - from providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled import ( + from prowler.providers.aws.services.dynamodb.dynamodb_tables_pitr_enabled.dynamodb_tables_pitr_enabled import ( dynamodb_tables_pitr_enabled, ) diff --git a/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public_test.py b/tests/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public_test.py similarity index 72% rename from providers/aws/services/ec2/ec2_ami_public/ec2_ami_public_test.py rename to tests/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public_test.py index ba06374f311..5a5e71d0675 100644 --- a/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public_test.py +++ b/tests/providers/aws/services/ec2/ec2_ami_public/ec2_ami_public_test.py @@ -11,17 +11,17 @@ class Test_ec2_ami_public: @mock_ec2 def test_no_amis(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ami_public.ec2_ami_public.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ami_public.ec2_ami_public.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ami_public.ec2_ami_public import ( + from prowler.providers.aws.services.ec2.ec2_ami_public.ec2_ami_public import ( ec2_ami_public, ) @@ -43,16 +43,16 @@ def test_one_private_ami(self): InstanceId=instance_id, Name="test-ami", Description="this is a test ami" )["ImageId"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ami_public.ec2_ami_public.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ami_public.ec2_ami_public.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_ami_public.ec2_ami_public import ( + from prowler.providers.aws.services.ec2.ec2_ami_public.ec2_ami_public import ( ec2_ami_public, ) @@ -86,16 +86,16 @@ def test_one_public_ami(self): } image.modify_attribute(**ADD_GROUP_ARGS) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ami_public.ec2_ami_public.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ami_public.ec2_ami_public.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_ami_public.ec2_ami_public import ( + from prowler.providers.aws.services.ec2.ec2_ami_public.ec2_ami_public import ( ec2_ami_public, ) diff --git a/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py b/tests/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py similarity index 68% rename from providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py rename to tests/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py index f8ab2322758..404c31f910a 100644 --- a/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py +++ b/tests/providers/aws/services/ec2/ec2_ebs_default_encryption/ec2_ebs_default_encryption_test.py @@ -15,17 +15,17 @@ def test_ec2_ebs_encryption_enabled(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.enable_ebs_encryption_by_default() - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption import ( + from prowler.providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption import ( ec2_ebs_default_encryption, ) @@ -45,17 +45,17 @@ def test_ec2_ebs_encryption_enabled(self): @mock_ec2 def test_ec2_ebs_encryption_disabled(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption import ( + from prowler.providers.aws.services.ec2.ec2_ebs_default_encryption.ec2_ebs_default_encryption import ( ec2_ebs_default_encryption, ) diff --git a/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py b/tests/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py similarity index 68% rename from providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py rename to tests/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py index c1f23d6ab54..3374277a787 100644 --- a/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py +++ b/tests/providers/aws/services/ec2/ec2_ebs_public_snapshot/ec2_ebs_public_snapshot_test.py @@ -10,17 +10,17 @@ class Test_ec2_ebs_public_snapshot: @mock_ec2 def test_ec2_default_snapshots(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot import ( + from prowler.providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot import ( ec2_ebs_public_snapshot, ) @@ -28,7 +28,7 @@ def test_ec2_default_snapshots(self): result = check.execute() # Default snapshots - assert len(result) == 1433 + assert len(result) == 1485 @mock_ec2 def test_ec2_public_snapshot(self): @@ -43,17 +43,17 @@ def test_ec2_public_snapshot(self): OperationType="add", GroupNames=["all"], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot import ( + from prowler.providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot import ( ec2_ebs_public_snapshot, ) @@ -61,7 +61,7 @@ def test_ec2_public_snapshot(self): results = check.execute() # Default snapshots + 1 created - assert len(results) == 1434 + assert len(results) == 1486 for snap in results: if snap.resource_id == snapshot.id: @@ -79,17 +79,17 @@ def test_ec2_private_snapshot(self): Size=80, AvailabilityZone=f"{AWS_REGION}a", Encrypted=True ) snapshot = volume.create_snapshot(Description="testsnap") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot import ( + from prowler.providers.aws.services.ec2.ec2_ebs_public_snapshot.ec2_ebs_public_snapshot import ( ec2_ebs_public_snapshot, ) @@ -97,7 +97,7 @@ def test_ec2_private_snapshot(self): results = check.execute() # Default snapshots + 1 created - assert len(results) == 1434 + assert len(results) == 1486 for snap in results: if snap.resource_id == snapshot.id: diff --git a/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py b/tests/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py similarity index 65% rename from providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py rename to tests/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py index d7e95a9bf6e..0285efd0cac 100644 --- a/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py +++ b/tests/providers/aws/services/ec2/ec2_ebs_snapshots_encrypted/ec2_ebs_snapshots_encrypted_test.py @@ -10,17 +10,17 @@ class Test_ec2_ebs_snapshots_encrypted: @mock_ec2 def test_ec2_default_snapshots(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted import ( + from prowler.providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted import ( ec2_ebs_snapshots_encrypted, ) @@ -28,7 +28,7 @@ def test_ec2_default_snapshots(self): result = check.execute() # Default snapshots - assert len(result) == 1433 + assert len(result) == 1485 @mock_ec2 def test_ec2_unencrypted_snapshot(self): @@ -37,17 +37,17 @@ def test_ec2_unencrypted_snapshot(self): volume = ec2.create_volume(Size=80, AvailabilityZone=f"{AWS_REGION}a") snapshot = volume.create_snapshot(Description="testsnap") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted import ( + from prowler.providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted import ( ec2_ebs_snapshots_encrypted, ) @@ -55,7 +55,7 @@ def test_ec2_unencrypted_snapshot(self): results = check.execute() # Default snapshots + 1 created - assert len(results) == 1434 + assert len(results) == 1486 for snap in results: if snap.resource_id == snapshot.id: @@ -73,17 +73,17 @@ def test_ec2_encrypted_snapshot(self): Size=80, AvailabilityZone=f"{AWS_REGION}a", Encrypted=True ) snapshot = volume.create_snapshot(Description="testsnap") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted import ( + from prowler.providers.aws.services.ec2.ec2_ebs_snapshots_encrypted.ec2_ebs_snapshots_encrypted import ( ec2_ebs_snapshots_encrypted, ) @@ -91,7 +91,7 @@ def test_ec2_encrypted_snapshot(self): results = check.execute() # Default snapshots + 1 created - assert len(results) == 1434 + assert len(results) == 1486 for snap in results: if snap.resource_id == snapshot.id: diff --git a/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption_test.py b/tests/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption_test.py similarity index 63% rename from providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption_test.py rename to tests/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption_test.py index 0bba7c0f970..0633c310a9e 100644 --- a/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption_test.py +++ b/tests/providers/aws/services/ec2/ec2_ebs_volume_encryption/ec2_ebs_volume_encryption_test.py @@ -10,17 +10,17 @@ class Test_ec2_ebs_volume_encryption: @mock_ec2 def test_ec2_no_volumes(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption import ( + from prowler.providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption import ( ec2_ebs_volume_encryption, ) @@ -35,17 +35,17 @@ def test_ec2_unencrypted_volume(self): ec2 = resource("ec2", region_name=AWS_REGION) volume = ec2.create_volume(Size=80, AvailabilityZone=f"{AWS_REGION}a") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption import ( + from prowler.providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption import ( ec2_ebs_volume_encryption, ) @@ -67,17 +67,17 @@ def test_ec2_encrypted_volume(self): Size=80, AvailabilityZone=f"{AWS_REGION}a", Encrypted=True ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption.ec2_client", + "prowler.providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption import ( + from prowler.providers.aws.services.ec2.ec2_ebs_volume_encryption.ec2_ebs_volume_encryption import ( ec2_ebs_volume_encryption, ) diff --git a/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan_test.py b/tests/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan_test.py similarity index 64% rename from providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan_test.py rename to tests/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan_test.py index 8313d3d635c..9459f08c096 100644 --- a/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan_test.py +++ b/tests/providers/aws/services/ec2/ec2_elastic_ip_shodan/ec2_elastic_ip_shodan_test.py @@ -3,7 +3,7 @@ from boto3 import client from moto import mock_ec2 -from config.config import get_config_var +from prowler.config.config import get_config_var EXAMPLE_AMI_ID = "ami-12c6146b" shodan_api_key = get_config_var("shodan_api_key") @@ -19,17 +19,19 @@ def test_ec2_one_instances_no_public_ip(self): # Create EC2 Instance ec2_client.run_instances(ImageId=EXAMPLE_AMI_ID, MinCount=1, MaxCount=1) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import ( + current_audit_info, + ) + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan.ec2_client", + "prowler.providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan import ( + from prowler.providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan import ( ec2_elastic_ip_shodan, ) @@ -45,17 +47,19 @@ def test_ec2_one_unattached_eip(self): # Create EC2 Instance ec2_client.allocate_address(Domain="vpc") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import ( + current_audit_info, + ) + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan.ec2_client", + "prowler.providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan import ( + from prowler.providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan import ( ec2_elastic_ip_shodan, ) @@ -78,17 +82,19 @@ def test_ec2_one_attached_eip(self): InstanceId=instance["Instances"][0]["InstanceId"], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import ( + current_audit_info, + ) + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan.ec2_client", + "prowler.providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan import ( + from prowler.providers.aws.services.ec2.ec2_elastic_ip_shodan.ec2_elastic_ip_shodan import ( ec2_elastic_ip_shodan, ) diff --git a/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined_test.py b/tests/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined_test.py similarity index 68% rename from providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined_test.py rename to tests/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined_test.py index be732125aeb..b2ea562a1b0 100644 --- a/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined_test.py +++ b/tests/providers/aws/services/ec2/ec2_elastic_ip_unassgined/ec2_elastic_ip_unassgined_test.py @@ -12,17 +12,17 @@ class Test_ec2_elastic_ip_unassgined: @mock_ec2 def test_no_eips(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined.ec2_client", + "prowler.providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined import ( + from prowler.providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined import ( ec2_elastic_ip_unassgined, ) @@ -37,17 +37,17 @@ def test_eip_unassociated(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.allocate_address(Domain="vpc", Address="127.38.43.222") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined.ec2_client", + "prowler.providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined import ( + from prowler.providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined import ( ec2_elastic_ip_unassgined, ) @@ -80,17 +80,17 @@ def test_eip_associated(self): InstanceId=instance.id, AllocationId=eip.allocation_id ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined.ec2_client", + "prowler.providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined import ( + from prowler.providers.aws.services.ec2.ec2_elastic_ip_unassgined.ec2_elastic_ip_unassgined import ( ec2_elastic_ip_unassgined, ) diff --git a/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled_test.py b/tests/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled_test.py rename to tests/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled_test.py index 26bf92d29b1..c2190b2da67 100644 --- a/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled_test.py +++ b/tests/providers/aws/services/ec2/ec2_instance_imdsv2_enabled/ec2_instance_imdsv2_enabled_test.py @@ -12,17 +12,17 @@ class Test_ec2_instance_imdsv2_enabled: @mock_ec2 def test_ec2_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled import ( + from prowler.providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled import ( ec2_instance_imdsv2_enabled, ) @@ -45,16 +45,16 @@ def test_one_compliant_ec2(self): }, )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled.ec2_client", new=EC2(current_audit_info), ) as service_client: - from providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled import ( + from prowler.providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled import ( ec2_instance_imdsv2_enabled, ) @@ -86,16 +86,16 @@ def test_one_uncompliant_ec2(self): }, )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled.ec2_client", new=EC2(current_audit_info), ) as service_client: - from providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled import ( + from prowler.providers.aws.services.ec2.ec2_instance_imdsv2_enabled.ec2_instance_imdsv2_enabled import ( ec2_instance_imdsv2_enabled, ) diff --git a/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile_test.py b/tests/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile_test.py similarity index 71% rename from providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile_test.py rename to tests/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile_test.py index 2f86fedcb87..e0e97f755e4 100644 --- a/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile_test.py +++ b/tests/providers/aws/services/ec2/ec2_instance_internet_facing_with_instance_profile/ec2_instance_internet_facing_with_instance_profile_test.py @@ -12,17 +12,17 @@ class Test_ec2_instance_internet_facing_with_instance_profile: @mock_ec2 def test_ec2_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile import ( + from prowler.providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile import ( ec2_instance_internet_facing_with_instance_profile, ) @@ -56,16 +56,16 @@ def test_one_compliant_ec2(self): ], )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile import ( + from prowler.providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile import ( ec2_instance_internet_facing_with_instance_profile, ) @@ -105,16 +105,16 @@ def test_one_non_compliant_ec2(self): ], )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile import ( + from prowler.providers.aws.services.ec2.ec2_instance_internet_facing_with_instance_profile.ec2_instance_internet_facing_with_instance_profile import ( ec2_instance_internet_facing_with_instance_profile, ) diff --git a/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days_test.py b/tests/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days_test.py similarity index 66% rename from providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days_test.py rename to tests/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days_test.py index 090bfb182c9..d22a19b1050 100644 --- a/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days_test.py +++ b/tests/providers/aws/services/ec2/ec2_instance_older_than_specific_days/ec2_instance_older_than_specific_days_test.py @@ -14,17 +14,17 @@ class Test_ec2_instance_older_than_specific_days: @mock_ec2 def test_ec2_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days import ( + from prowler.providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days import ( ec2_instance_older_than_specific_days, ) @@ -44,16 +44,16 @@ def test_one_compliant_ec2(self): UserData="This is some user_data", )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days import ( + from prowler.providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days import ( ec2_instance_older_than_specific_days, ) @@ -78,16 +78,16 @@ def test_one_old_ec2(self): UserData="This is some user_data", )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days.ec2_client", new=EC2(current_audit_info), ) as service_client: - from providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days import ( + from prowler.providers.aws.services.ec2.ec2_instance_older_than_specific_days.ec2_instance_older_than_specific_days import ( ec2_instance_older_than_specific_days, ) diff --git a/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached_test.py b/tests/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached_test.py similarity index 72% rename from providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached_test.py rename to tests/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached_test.py index 2893e89b785..d4aadc9836a 100644 --- a/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached_test.py +++ b/tests/providers/aws/services/ec2/ec2_instance_profile_attached/ec2_instance_profile_attached_test.py @@ -12,17 +12,17 @@ class Test_ec2_instance_profile_attached: @mock_ec2 def test_ec2_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached import ( + from prowler.providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached import ( ec2_instance_profile_attached, ) @@ -56,16 +56,16 @@ def test_one_compliant_ec2(self): ], )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached import ( + from prowler.providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached import ( ec2_instance_profile_attached, ) @@ -98,16 +98,16 @@ def test_one_non_compliant_ec2(self): ], )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached import ( + from prowler.providers.aws.services.ec2.ec2_instance_profile_attached.ec2_instance_profile_attached import ( ec2_instance_profile_attached, ) diff --git a/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip_test.py b/tests/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip_test.py similarity index 71% rename from providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip_test.py rename to tests/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip_test.py index e4c9729d22d..7381286e549 100644 --- a/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip_test.py +++ b/tests/providers/aws/services/ec2/ec2_instance_public_ip/ec2_instance_public_ip_test.py @@ -12,17 +12,17 @@ class Test_ec2_instance_public_ip: @mock_ec2 def test_ec2_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip import ( + from prowler.providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip import ( ec2_instance_public_ip, ) @@ -50,16 +50,16 @@ def test_one_compliant_ec2(self): ], )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip import ( + from prowler.providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip import ( ec2_instance_public_ip, ) @@ -93,16 +93,16 @@ def test_one_ec2_with_public_ip(self): ], )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip import ( + from prowler.providers.aws.services.ec2.ec2_instance_public_ip.ec2_instance_public_ip import ( ec2_instance_public_ip, ) diff --git a/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data_test.py b/tests/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data_test.py similarity index 66% rename from providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data_test.py rename to tests/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data_test.py index 990321f4be4..86876cd1b8d 100644 --- a/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data_test.py +++ b/tests/providers/aws/services/ec2/ec2_instance_secrets_user_data/ec2_instance_secrets_user_data_test.py @@ -11,17 +11,17 @@ class Test_ec2_instance_secrets_user_data: @mock_ec2 def test_no_ec2(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( + from prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( ec2_instance_secrets_user_data, ) @@ -41,16 +41,16 @@ def test_one_ec2_with_no_secrets(self): UserData="This is some user_data", )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( + from prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( ec2_instance_secrets_user_data, ) @@ -76,16 +76,16 @@ def test_one_ec2_with_secrets(self): UserData="DB_PASSWORD=foobar123", )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( + from prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( ec2_instance_secrets_user_data, ) @@ -104,7 +104,7 @@ def test_one_ec2_with_secrets(self): def test_one_ec2_file_with_secrets(self): # Include launch_configurations to check f = open( - "providers/aws/services/ec2/ec2_instance_secrets_user_data/fixtures/fixture", + "prowler/providers/aws/services/ec2/ec2_instance_secrets_user_data/fixtures/fixture", "r", ) secrets = f.read() @@ -113,16 +113,16 @@ def test_one_ec2_file_with_secrets(self): ImageId=EXAMPLE_AMI_ID, MinCount=1, MaxCount=1, UserData=secrets )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( + from prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( ec2_instance_secrets_user_data, ) @@ -145,16 +145,16 @@ def test_one_launch_configurations_without_user_data(self): ImageId=EXAMPLE_AMI_ID, MinCount=1, MaxCount=1, UserData="" )[0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", + "prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data.ec2_client", new=EC2(current_audit_info), ): - from providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( + from prowler.providers.aws.services.ec2.ec2_instance_secrets_user_data.ec2_instance_secrets_user_data import ( ec2_instance_secrets_user_data, ) diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port_test.py b/tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port_test.py rename to tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port_test.py index 11c5f4da80a..d3bf22b8cb1 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port_test.py +++ b/tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_any_port/ec2_networkacl_allow_ingress_any_port_test.py @@ -10,17 +10,17 @@ class ec2_networkacl_allow_ingress_any_port: @mock_ec2 def test_ec2_default_nacls(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( ec2_networkacl_allow_ingress_any_port, ) @@ -33,17 +33,17 @@ def test_ec2_default_nacls(self): @mock_ec2 def test_ec2_non_default_compliant_nacl(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( ec2_networkacl_allow_ingress_any_port, ) @@ -77,17 +77,17 @@ def test_ec2_non_compliant_nacl(self): CidrBlock="0.0.0.0/0", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( ec2_networkacl_allow_ingress_any_port, ) @@ -122,17 +122,17 @@ def test_ec2_compliant_nacl(self): CidrBlock="10.0.0.2/32", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_any_port.ec2_networkacl_allow_ingress_any_port import ( ec2_networkacl_allow_ingress_any_port, ) diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py b/tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py rename to tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py index f7ab0cd34a9..b3e7221550a 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py +++ b/tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_22/ec2_networkacl_allow_ingress_tcp_port_22_test.py @@ -10,17 +10,17 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_22: @mock_ec2 def test_ec2_default_nacls(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( ec2_networkacl_allow_ingress_tcp_port_22, ) @@ -33,17 +33,17 @@ def test_ec2_default_nacls(self): @mock_ec2 def test_ec2_non_default_compliant_nacl(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( ec2_networkacl_allow_ingress_tcp_port_22, ) @@ -78,17 +78,17 @@ def test_ec2_non_compliant_nacl(self): CidrBlock="0.0.0.0/0", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( ec2_networkacl_allow_ingress_tcp_port_22, ) @@ -124,17 +124,17 @@ def test_ec2_compliant_nacl(self): CidrBlock="10.0.0.2/32", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_22.ec2_networkacl_allow_ingress_tcp_port_22 import ( ec2_networkacl_allow_ingress_tcp_port_22, ) diff --git a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py b/tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py rename to tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py index b732c7524f8..313664de141 100644 --- a/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py +++ b/tests/providers/aws/services/ec2/ec2_networkacl_allow_ingress_tcp_port_3389/ec2_networkacl_allow_ingress_tcp_port_3389_test.py @@ -10,17 +10,17 @@ class Test_ec2_networkacl_allow_ingress_tcp_port_3389: @mock_ec2 def test_ec2_default_nacls(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( ec2_networkacl_allow_ingress_tcp_port_3389, ) @@ -33,17 +33,17 @@ def test_ec2_default_nacls(self): @mock_ec2 def test_ec2_non_default_compliant_nacl(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( ec2_networkacl_allow_ingress_tcp_port_3389, ) @@ -78,17 +78,17 @@ def test_ec2_non_compliant_nacl(self): CidrBlock="0.0.0.0/0", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( ec2_networkacl_allow_ingress_tcp_port_3389, ) @@ -124,17 +124,17 @@ def test_ec2_compliant_nacl(self): CidrBlock="10.0.0.2/32", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", + "prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( + from prowler.providers.aws.services.ec2.ec2_networkacl_allow_ingress_tcp_port_3389.ec2_networkacl_allow_ingress_tcp_port_3389 import ( ec2_networkacl_allow_ingress_tcp_port_3389, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py index 60b10952541..581290497a2 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_any_port/ec2_securitygroup_allow_ingress_from_internet_to_any_port_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port import ( ec2_securitygroup_allow_ingress_from_internet_to_any_port, ) @@ -54,17 +54,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port import ( ec2_securitygroup_allow_ingress_from_internet_to_any_port, ) @@ -100,17 +100,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_any_port.ec2_securitygroup_allow_ingress_from_internet_to_any_port import ( ec2_securitygroup_allow_ingress_from_internet_to_any_port, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py index 22122903028..383b2a6789f 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018/ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018 import ( ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018, ) @@ -58,17 +58,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018 import ( ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018, ) @@ -108,17 +108,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018.ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018 import ( ec2_securitygroup_allow_ingress_from_internet_to_port_mongodb_27017_27018, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py similarity index 71% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py index 4e93b7a5412..b8360128ca4 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21/ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21, ) @@ -58,17 +58,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21, ) @@ -108,17 +108,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21.ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_ftp_port_20_21, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py similarity index 71% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py index 8625819535e..3b34ecc6bb8 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22, ) @@ -56,17 +56,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22, ) @@ -104,17 +104,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_22, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py similarity index 71% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py index 13e2eaac825..e72121b80eb 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389, ) @@ -56,17 +56,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389, ) @@ -104,17 +104,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_3389, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py similarity index 69% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py index 08a3a65427c..8bdeb89612d 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888, ) @@ -58,17 +58,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888, ) @@ -108,17 +108,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_cassandra_7199_9160_8888, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py similarity index 68% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py index 704d8c695d5..0f726d6d449 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601, ) @@ -58,17 +58,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601, ) @@ -108,17 +108,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_elasticsearch_kibana_9200_9300_5601, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py index ccb82eeecc8..aba5ad6dbfc 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092, ) @@ -58,17 +58,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092, ) @@ -107,17 +107,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_kafka_9092, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py index 3bb2f68b1fa..bd6d6ffe28a 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211, ) @@ -58,17 +58,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211, ) @@ -108,17 +108,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_memcached_11211, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py index 68c41ba13d9..5c6528c7c1a 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306, ) @@ -58,17 +58,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306, ) @@ -108,17 +108,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_mysql_3306, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py index 775ac1eb882..a54443a0472 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483, ) @@ -58,17 +58,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483, ) @@ -108,17 +108,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_oracle_1521_2483, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py index 8a14347b953..665da2edeb5 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432, ) @@ -58,17 +58,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432, ) @@ -108,17 +108,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_postgres_5432, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py index 7d1998b28dc..f60ccfb315d 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379, ) @@ -58,17 +58,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379, ) @@ -107,17 +107,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_redis_6379, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py index 63e333ba0d3..37efa7a8a75 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434, ) @@ -58,17 +58,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434, ) @@ -108,17 +108,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_sql_server_1433_1434, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py similarity index 70% rename from providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py index 370749275f2..8e11596fd67 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23/ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23, ) @@ -58,17 +58,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23, ) @@ -107,17 +107,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23.ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23 import ( ec2_securitygroup_allow_ingress_from_internet_to_tcp_port_telnet_23, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py similarity index 72% rename from providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py index 57448c9328b..bc7e3565995 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_allow_wide_open_public_ipv4/ec2_securitygroup_allow_wide_open_public_ipv4_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4 import ( ec2_securitygroup_allow_wide_open_public_ipv4, ) @@ -54,17 +54,17 @@ def test_ec2_default_sg_with_RFC1918_address(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4 import ( ec2_securitygroup_allow_wide_open_public_ipv4, ) @@ -100,17 +100,17 @@ def test_ec2_default_sg_with_non_RFC1918_address(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4 import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_allow_wide_open_public_ipv4.ec2_securitygroup_allow_wide_open_public_ipv4 import ( ec2_securitygroup_allow_wide_open_public_ipv4, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py similarity index 72% rename from providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py index 7e8e33c5981..5c524c0e427 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_default_restrict_traffic/ec2_securitygroup_default_restrict_traffic_test.py @@ -13,17 +13,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic import ( ec2_securitygroup_default_restrict_traffic, ) @@ -48,17 +48,17 @@ def test_ec2_non_compliant_default_sg(self): IpPermissions=[{"IpProtocol": "-1", "IpRanges": [{"CidrIp": "0.0.0.0/0"}]}], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic import ( ec2_securitygroup_default_restrict_traffic, ) @@ -91,17 +91,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_default_restrict_traffic.ec2_securitygroup_default_restrict_traffic import ( ec2_securitygroup_default_restrict_traffic, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py similarity index 72% rename from providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py index 0a88ec4897b..5c61267abec 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_from_launch_wizard/ec2_securitygroup_from_launch_wizard_test.py @@ -15,17 +15,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard import ( ec2_securitygroup_from_launch_wizard, ) @@ -46,17 +46,17 @@ def test_ec2_launch_wizard_sg(self): GroupName="launch-wizard-1", Description="launch wizard sg" )["GroupId"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard import ( ec2_securitygroup_from_launch_wizard, ) @@ -92,17 +92,17 @@ def test_ec2_compliant_default_sg(self): default_sg_id, ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_from_launch_wizard.ec2_securitygroup_from_launch_wizard import ( ec2_securitygroup_from_launch_wizard, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py similarity index 72% rename from providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py index b4d56ba5b9c..dfef038e94a 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_in_use_without_ingress_filtering/ec2_securitygroup_in_use_without_ingress_filtering_test.py @@ -15,17 +15,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( ec2_securitygroup_in_use_without_ingress_filtering, ) @@ -55,17 +55,17 @@ def test_ec2_unused_public_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( ec2_securitygroup_in_use_without_ingress_filtering, ) @@ -109,17 +109,17 @@ def test_ec2_used_public_default_sg(self): default_sg_id, ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( ec2_securitygroup_in_use_without_ingress_filtering, ) @@ -146,17 +146,17 @@ def test_ec2_private_default_sg(self): "SecurityGroups" ][0]["GroupId"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_in_use_without_ingress_filtering.ec2_securitygroup_in_use_without_ingress_filtering import ( ec2_securitygroup_in_use_without_ingress_filtering, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py similarity index 73% rename from providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py index 056c6f6d1c1..a8e3bb88006 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_not_used/ec2_securitygroup_not_used_test.py @@ -15,17 +15,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used import ( ec2_securitygroup_not_used, ) @@ -46,17 +46,17 @@ def test_ec2_unused_default_sg(self): "SecurityGroups" ][0]["GroupId"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used import ( ec2_securitygroup_not_used, ) @@ -92,17 +92,17 @@ def test_ec2_used_default_sg(self): default_sg_id, ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_not_used.ec2_securitygroup_not_used import ( ec2_securitygroup_not_used, ) diff --git a/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py b/tests/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py similarity index 73% rename from providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py rename to tests/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py index 4cda309a62d..9216607c648 100644 --- a/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py +++ b/tests/providers/aws/services/ec2/ec2_securitygroup_with_many_ingress_egress_rules/ec2_securitygroup_with_many_ingress_egress_rules_test.py @@ -14,17 +14,17 @@ def test_ec2_default_sgs(self): ec2_client = client("ec2", region_name=AWS_REGION) ec2_client.create_vpc(CidrBlock="10.0.0.0/16") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules import ( ec2_securitygroup_with_many_ingress_egress_rules, ) @@ -57,17 +57,17 @@ def test_ec2_non_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules import ( ec2_securitygroup_with_many_ingress_egress_rules, ) @@ -104,17 +104,17 @@ def test_ec2_compliant_default_sg(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.ec2.ec2_service import EC2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules.ec2_client", + "prowler.providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules.ec2_client", new=EC2(current_audit_info), ): # Test Check - from providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules import ( + from prowler.providers.aws.services.ec2.ec2_securitygroup_with_many_ingress_egress_rules.ec2_securitygroup_with_many_ingress_egress_rules import ( ec2_securitygroup_with_many_ingress_egress_rules, ) diff --git a/providers/aws/services/ec2/ec2_service_test.py b/tests/providers/aws/services/ec2/ec2_service_test.py similarity index 98% rename from providers/aws/services/ec2/ec2_service_test.py rename to tests/providers/aws/services/ec2/ec2_service_test.py index 591edb07866..19e5bec6bfd 100644 --- a/providers/aws/services/ec2/ec2_service_test.py +++ b/tests/providers/aws/services/ec2/ec2_service_test.py @@ -3,8 +3,8 @@ from boto3 import client, resource, session from moto import mock_ec2 -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.ec2.ec2_service import EC2 +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.ec2.ec2_service import EC2 AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/ec2/lib/network_acls_test.py b/tests/providers/aws/services/ec2/lib/network_acls_test.py similarity index 99% rename from providers/aws/services/ec2/lib/network_acls_test.py rename to tests/providers/aws/services/ec2/lib/network_acls_test.py index 3e0104d3dfc..226f78501f8 100644 --- a/providers/aws/services/ec2/lib/network_acls_test.py +++ b/tests/providers/aws/services/ec2/lib/network_acls_test.py @@ -1,4 +1,4 @@ -from providers.aws.services.ec2.lib.network_acls import check_network_acl +from prowler.providers.aws.services.ec2.lib.network_acls import check_network_acl default_deny_entry_ingress_IPv4 = { "CidrBlock": "0.0.0.0/0", diff --git a/providers/aws/services/ec2/lib/security_groups_test.py b/tests/providers/aws/services/ec2/lib/security_groups_test.py similarity index 86% rename from providers/aws/services/ec2/lib/security_groups_test.py rename to tests/providers/aws/services/ec2/lib/security_groups_test.py index 0dd63cbb78f..3d78c51e42d 100644 --- a/providers/aws/services/ec2/lib/security_groups_test.py +++ b/tests/providers/aws/services/ec2/lib/security_groups_test.py @@ -1,6 +1,6 @@ import pytest -from providers.aws.services.ec2.lib.security_groups import _is_cidr_public +from prowler.providers.aws.services.ec2.lib.security_groups import _is_cidr_public class Test_security_groups: diff --git a/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled_test.py b/tests/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled_test.py similarity index 84% rename from providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled_test.py rename to tests/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled_test.py index 4b046fd4454..50d914fdc77 100644 --- a/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled_test.py +++ b/tests/providers/aws/services/ecr/ecr_repositories_lifecycle_policy_enabled/ecr_repositories_lifecycle_policy_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.ecr.ecr_service import Repository +from prowler.providers.aws.services.ecr.ecr_service import Repository # Mock Test Region AWS_REGION = "eu-west-1" @@ -40,10 +40,10 @@ def test_no_lyfecicle_policy(self): ) with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_lifecycle_policy_enabled.ecr_repositories_lifecycle_policy_enabled import ( + from prowler.providers.aws.services.ecr.ecr_repositories_lifecycle_policy_enabled.ecr_repositories_lifecycle_policy_enabled import ( ecr_repositories_lifecycle_policy_enabled, ) @@ -71,10 +71,10 @@ def test_lifecycle_policy(self): ) with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_lifecycle_policy_enabled.ecr_repositories_lifecycle_policy_enabled import ( + from prowler.providers.aws.services.ecr.ecr_repositories_lifecycle_policy_enabled.ecr_repositories_lifecycle_policy_enabled import ( ecr_repositories_lifecycle_policy_enabled, ) diff --git a/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible_test.py b/tests/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible_test.py similarity index 85% rename from providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible_test.py rename to tests/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible_test.py index 29b3b1a2fc6..a9f0636c3c6 100644 --- a/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/ecr/ecr_repositories_not_publicly_accessible/ecr_repositories_not_publicly_accessible_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.ecr.ecr_service import Repository +from prowler.providers.aws.services.ecr.ecr_service import Repository # Mock Test Region AWS_REGION = "eu-west-1" @@ -52,10 +52,10 @@ def test_repository_not_public(self): ) with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_not_publicly_accessible.ecr_repositories_not_publicly_accessible import ( + from prowler.providers.aws.services.ecr.ecr_repositories_not_publicly_accessible.ecr_repositories_not_publicly_accessible import ( ecr_repositories_not_publicly_accessible, ) @@ -83,10 +83,10 @@ def test_repository_public(self): ) with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_not_publicly_accessible.ecr_repositories_not_publicly_accessible import ( + from prowler.providers.aws.services.ecr.ecr_repositories_not_publicly_accessible.ecr_repositories_not_publicly_accessible import ( ecr_repositories_not_publicly_accessible, ) diff --git a/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled_test.py b/tests/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled_test.py similarity index 83% rename from providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled_test.py rename to tests/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled_test.py index 743effac3a1..b6f63f6528c 100644 --- a/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled_test.py +++ b/tests/providers/aws/services/ecr/ecr_repositories_scan_images_on_push_enabled/ecr_repositories_scan_images_on_push_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.ecr.ecr_service import Repository +from prowler.providers.aws.services.ecr.ecr_service import Repository # Mock Test Region AWS_REGION = "eu-west-1" @@ -40,10 +40,10 @@ def test_scan_on_push_disabled(self): ) with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_scan_images_on_push_enabled.ecr_repositories_scan_images_on_push_enabled import ( + from prowler.providers.aws.services.ecr.ecr_repositories_scan_images_on_push_enabled.ecr_repositories_scan_images_on_push_enabled import ( ecr_repositories_scan_images_on_push_enabled, ) @@ -71,10 +71,10 @@ def test_scan_on_push_enabled(self): ) with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_scan_images_on_push_enabled.ecr_repositories_scan_images_on_push_enabled import ( + from prowler.providers.aws.services.ecr.ecr_repositories_scan_images_on_push_enabled.ecr_repositories_scan_images_on_push_enabled import ( ecr_repositories_scan_images_on_push_enabled, ) diff --git a/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image_test.py b/tests/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image_test.py similarity index 86% rename from providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image_test.py rename to tests/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image_test.py index d72d91a6083..2df47e01189 100644 --- a/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image_test.py +++ b/tests/providers/aws/services/ecr/ecr_repositories_scan_vulnerabilities_in_latest_image/ecr_repositories_scan_vulnerabilities_in_latest_image_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.ecr.ecr_service import ( +from prowler.providers.aws.services.ecr.ecr_service import ( FindingSeverityCounts, ImageDetails, Repository, @@ -53,10 +53,10 @@ def test_image_scaned_without_findings(self): ), ), with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( + from prowler.providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( ecr_repositories_scan_vulnerabilities_in_latest_image, ) @@ -93,10 +93,10 @@ def test_image_scanned_with_findings(self): ), ), with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( + from prowler.providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( ecr_repositories_scan_vulnerabilities_in_latest_image, ) @@ -133,10 +133,10 @@ def test_image_scanned_fail_scan(self): ), ), with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( + from prowler.providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( ecr_repositories_scan_vulnerabilities_in_latest_image, ) @@ -173,10 +173,10 @@ def test_image_not_scanned(self): ), ), with mock.patch( - "providers.aws.services.ecr.ecr_service.ECR", + "prowler.providers.aws.services.ecr.ecr_service.ECR", ecr_client, ): - from providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( + from prowler.providers.aws.services.ecr.ecr_repositories_scan_vulnerabilities_in_latest_image.ecr_repositories_scan_vulnerabilities_in_latest_image import ( ecr_repositories_scan_vulnerabilities_in_latest_image, ) diff --git a/providers/aws/services/ecr/ecr_service_test.py b/tests/providers/aws/services/ecr/ecr_service_test.py similarity index 97% rename from providers/aws/services/ecr/ecr_service_test.py rename to tests/providers/aws/services/ecr/ecr_service_test.py index eb5b1cd9d85..cdf3349c54b 100644 --- a/providers/aws/services/ecr/ecr_service_test.py +++ b/tests/providers/aws/services/ecr/ecr_service_test.py @@ -4,8 +4,8 @@ from boto3 import client, session from moto import mock_ecr -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.ecr.ecr_service import ECR +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.ecr.ecr_service import ECR AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -65,7 +65,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.ecr.ecr_service.generate_regional_clients", + "prowler.providers.aws.services.ecr.ecr_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_ECR_Service: diff --git a/providers/aws/services/ecs/ecs_service_test.py b/tests/providers/aws/services/ecs/ecs_service_test.py similarity index 95% rename from providers/aws/services/ecs/ecs_service_test.py rename to tests/providers/aws/services/ecs/ecs_service_test.py index a900d774e80..82b26dd3ff5 100644 --- a/providers/aws/services/ecs/ecs_service_test.py +++ b/tests/providers/aws/services/ecs/ecs_service_test.py @@ -3,8 +3,8 @@ from boto3 import client, session from moto import mock_ecs -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.ecs.ecs_service import ECS +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.ecs.ecs_service import ECS AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -17,7 +17,7 @@ def mock_generate_regional_clients(service, audit_info): @patch( - "providers.aws.services.ecs.ecs_service.generate_regional_clients", + "prowler.providers.aws.services.ecs.ecs_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_ECS_Service: diff --git a/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets_test.py b/tests/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets_test.py similarity index 81% rename from providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets_test.py rename to tests/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets_test.py index 8c3653db194..a8da2b65259 100644 --- a/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets_test.py +++ b/tests/providers/aws/services/ecs/ecs_task_definitions_no_environment_secrets/ecs_task_definitions_no_environment_secrets_test.py @@ -1,7 +1,10 @@ from re import search from unittest import mock -from providers.aws.services.ecs.ecs_service import ContainerEnvVariable, TaskDefinition +from prowler.providers.aws.services.ecs.ecs_service import ( + ContainerEnvVariable, + TaskDefinition, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -18,10 +21,10 @@ def test_no_task_definitions(self): ecs_client.task_definitions = [] with mock.patch( - "providers.aws.services.ecs.ecs_service.ECS", + "prowler.providers.aws.services.ecs.ecs_service.ECS", ecs_client, ): - from providers.aws.services.ecs.ecs_task_definitions_no_environment_secrets.ecs_task_definitions_no_environment_secrets import ( + from prowler.providers.aws.services.ecs.ecs_task_definitions_no_environment_secrets.ecs_task_definitions_no_environment_secrets import ( ecs_task_definitions_no_environment_secrets, ) @@ -46,10 +49,10 @@ def test_container_env_var_no_secrets(self): ) with mock.patch( - "providers.aws.services.ecs.ecs_service.ECS", + "prowler.providers.aws.services.ecs.ecs_service.ECS", ecs_client, ): - from providers.aws.services.ecs.ecs_task_definitions_no_environment_secrets.ecs_task_definitions_no_environment_secrets import ( + from prowler.providers.aws.services.ecs.ecs_task_definitions_no_environment_secrets.ecs_task_definitions_no_environment_secrets import ( ecs_task_definitions_no_environment_secrets, ) @@ -83,10 +86,10 @@ def test_container_env_var_with_secrets(self): ) with mock.patch( - "providers.aws.services.ecs.ecs_service.ECS", + "prowler.providers.aws.services.ecs.ecs_service.ECS", ecs_client, ): - from providers.aws.services.ecs.ecs_task_definitions_no_environment_secrets.ecs_task_definitions_no_environment_secrets import ( + from prowler.providers.aws.services.ecs.ecs_task_definitions_no_environment_secrets.ecs_task_definitions_no_environment_secrets import ( ecs_task_definitions_no_environment_secrets, ) diff --git a/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled_test.py b/tests/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled_test.py similarity index 81% rename from providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled_test.py rename to tests/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled_test.py index 087dcfc882c..c07eae0f838 100644 --- a/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled_test.py +++ b/tests/providers/aws/services/efs/efs_encryption_at_rest_enabled/efs_encryption_at_rest_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.efs.efs_service import FileSystem +from prowler.providers.aws.services.efs.efs_service import FileSystem # Mock Test Region AWS_REGION = "eu-west-1" @@ -25,10 +25,10 @@ def test_efs_encryption_enabled(self): ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_encryption_at_rest_enabled.efs_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.efs.efs_encryption_at_rest_enabled.efs_encryption_at_rest_enabled import ( efs_encryption_at_rest_enabled, ) @@ -52,10 +52,10 @@ def test_efs_encryption_disabled(self): ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_encryption_at_rest_enabled.efs_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.efs.efs_encryption_at_rest_enabled.efs_encryption_at_rest_enabled import ( efs_encryption_at_rest_enabled, ) diff --git a/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled_test.py b/tests/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled_test.py similarity index 82% rename from providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled_test.py rename to tests/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled_test.py index bbb4e74d474..c7940c1569c 100644 --- a/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled_test.py +++ b/tests/providers/aws/services/efs/efs_have_backup_enabled/efs_have_backup_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.efs.efs_service import FileSystem +from prowler.providers.aws.services.efs.efs_service import FileSystem # Mock Test Region AWS_REGION = "eu-west-1" @@ -27,10 +27,10 @@ def test_efs_valid_backup_policy(self): ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_have_backup_enabled.efs_have_backup_enabled import ( + from prowler.providers.aws.services.efs.efs_have_backup_enabled.efs_have_backup_enabled import ( efs_have_backup_enabled, ) @@ -54,10 +54,10 @@ def test_efs_invalid_policy_backup_1(self): ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_have_backup_enabled.efs_have_backup_enabled import ( + from prowler.providers.aws.services.efs.efs_have_backup_enabled.efs_have_backup_enabled import ( efs_have_backup_enabled, ) @@ -81,10 +81,10 @@ def test_efs_invalid_policy_backup_2(self): ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_have_backup_enabled.efs_have_backup_enabled import ( + from prowler.providers.aws.services.efs.efs_have_backup_enabled.efs_have_backup_enabled import ( efs_have_backup_enabled, ) diff --git a/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible_test.py b/tests/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible_test.py similarity index 84% rename from providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible_test.py rename to tests/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible_test.py index 0009d25bc1f..103598418af 100644 --- a/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/efs/efs_not_publicly_accessible/efs_not_publicly_accessible_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.efs.efs_service import FileSystem +from prowler.providers.aws.services.efs.efs_service import FileSystem # Mock Test Region AWS_REGION = "eu-west-1" @@ -46,10 +46,10 @@ def test_efs_valid_policy(self): ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_not_publicly_accessible.efs_not_publicly_accessible import ( + from prowler.providers.aws.services.efs.efs_not_publicly_accessible.efs_not_publicly_accessible import ( efs_not_publicly_accessible, ) @@ -76,10 +76,10 @@ def test_efs_invalid_policy(self): ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_not_publicly_accessible.efs_not_publicly_accessible import ( + from prowler.providers.aws.services.efs.efs_not_publicly_accessible.efs_not_publicly_accessible import ( efs_not_publicly_accessible, ) @@ -105,10 +105,10 @@ def test_efs_no_policy(self): ) ] with mock.patch( - "providers.aws.services.efs.efs_service.EFS", + "prowler.providers.aws.services.efs.efs_service.EFS", efs_client, ): - from providers.aws.services.efs.efs_not_publicly_accessible.efs_not_publicly_accessible import ( + from prowler.providers.aws.services.efs.efs_not_publicly_accessible.efs_not_publicly_accessible import ( efs_not_publicly_accessible, ) diff --git a/providers/aws/services/efs/efs_service_test.py b/tests/providers/aws/services/efs/efs_service_test.py similarity index 94% rename from providers/aws/services/efs/efs_service_test.py rename to tests/providers/aws/services/efs/efs_service_test.py index f6292c14ee4..e88325bddbb 100644 --- a/providers/aws/services/efs/efs_service_test.py +++ b/tests/providers/aws/services/efs/efs_service_test.py @@ -4,8 +4,8 @@ from boto3 import client, session from moto import mock_efs -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.efs.efs_service import EFS +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.efs.efs_service import EFS # Mock Test Region AWS_REGION = "eu-west-1" @@ -49,7 +49,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.efs.efs_service.generate_regional_clients", + "prowler.providers.aws.services.efs.efs_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_EFS: diff --git a/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled_test.py b/tests/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled_test.py similarity index 76% rename from providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled_test.py rename to tests/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled_test.py index 396e9273d66..3b84a7f22b4 100644 --- a/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled_test.py +++ b/tests/providers/aws/services/eks/eks_cluster_kms_cmk_encryption_in_secrets_enabled/eks_cluster_kms_cmk_encryption_in_secrets_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.eks.eks_service import EKSCluster +from prowler.providers.aws.services.eks.eks_service import EKSCluster AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ def test_no_clusters(self): eks_client = mock.MagicMock eks_client.clusters = [] with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_cluster_kms_cmk_encryption_in_secrets_enabled.eks_cluster_kms_cmk_encryption_in_secrets_enabled import ( + from prowler.providers.aws.services.eks.eks_cluster_kms_cmk_encryption_in_secrets_enabled.eks_cluster_kms_cmk_encryption_in_secrets_enabled import ( eks_cluster_kms_cmk_encryption_in_secrets_enabled, ) @@ -39,10 +39,10 @@ def test_not_secrets_encryption(self): ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_cluster_kms_cmk_encryption_in_secrets_enabled.eks_cluster_kms_cmk_encryption_in_secrets_enabled import ( + from prowler.providers.aws.services.eks.eks_cluster_kms_cmk_encryption_in_secrets_enabled.eks_cluster_kms_cmk_encryption_in_secrets_enabled import ( eks_cluster_kms_cmk_encryption_in_secrets_enabled, ) @@ -69,10 +69,10 @@ def test_secrets_encryption(self): ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_cluster_kms_cmk_encryption_in_secrets_enabled.eks_cluster_kms_cmk_encryption_in_secrets_enabled import ( + from prowler.providers.aws.services.eks.eks_cluster_kms_cmk_encryption_in_secrets_enabled.eks_cluster_kms_cmk_encryption_in_secrets_enabled import ( eks_cluster_kms_cmk_encryption_in_secrets_enabled, ) diff --git a/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted_test.py b/tests/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted_test.py similarity index 80% rename from providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted_test.py rename to tests/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted_test.py index a3a408125ed..e4392c4ec05 100644 --- a/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted_test.py +++ b/tests/providers/aws/services/eks/eks_control_plane_endpoint_access_restricted/eks_control_plane_endpoint_access_restricted_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.eks.eks_service import EKSCluster +from prowler.providers.aws.services.eks.eks_service import EKSCluster AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ def test_no_clusters(self): eks_client = mock.MagicMock eks_client.clusters = [] with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( + from prowler.providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( eks_control_plane_endpoint_access_restricted, ) @@ -42,10 +42,10 @@ def test_control_plane_private(self): ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( + from prowler.providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( eks_control_plane_endpoint_access_restricted, ) @@ -76,10 +76,10 @@ def test_control_plane_access_restricted(self): ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( + from prowler.providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( eks_control_plane_endpoint_access_restricted, ) @@ -110,10 +110,10 @@ def test_control_plane_not_restricted(self): ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( + from prowler.providers.aws.services.eks.eks_control_plane_endpoint_access_restricted.eks_control_plane_endpoint_access_restricted import ( eks_control_plane_endpoint_access_restricted, ) diff --git a/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled_test.py b/tests/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled_test.py similarity index 80% rename from providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled_test.py rename to tests/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled_test.py index dbc49611009..601213aaa83 100644 --- a/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled_test.py +++ b/tests/providers/aws/services/eks/eks_control_plane_logging_all_types_enabled/eks_control_plane_logging_all_types_enabled_test.py @@ -1,7 +1,10 @@ from re import search from unittest import mock -from providers.aws.services.eks.eks_service import EKSCluster, EKSClusterLoggingEntity +from prowler.providers.aws.services.eks.eks_service import ( + EKSCluster, + EKSClusterLoggingEntity, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +18,10 @@ def test_no_clusters(self): eks_client = mock.MagicMock eks_client.clusters = [] with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( + from prowler.providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( eks_control_plane_logging_all_types_enabled, ) @@ -39,10 +42,10 @@ def test_control_plane_not_loggging(self): ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( + from prowler.providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( eks_control_plane_logging_all_types_enabled, ) @@ -73,10 +76,10 @@ def test_control_plane_incomplete_loggging(self): ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( + from prowler.providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( eks_control_plane_logging_all_types_enabled, ) @@ -113,10 +116,10 @@ def test_control_plane_complete_loggging(self): ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( + from prowler.providers.aws.services.eks.eks_control_plane_logging_all_types_enabled.eks_control_plane_logging_all_types_enabled import ( eks_control_plane_logging_all_types_enabled, ) diff --git a/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible_test.py b/tests/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible_test.py similarity index 79% rename from providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible_test.py rename to tests/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible_test.py index 95b27d6e077..5ad7dba153b 100644 --- a/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/eks/eks_endpoints_not_publicly_accessible/eks_endpoints_not_publicly_accessible_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.eks.eks_service import EKSCluster +from prowler.providers.aws.services.eks.eks_service import EKSCluster AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ def test_no_clusters(self): eks_client = mock.MagicMock eks_client.clusters = [] with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_endpoints_not_publicly_accessible.eks_endpoints_not_publicly_accessible import ( + from prowler.providers.aws.services.eks.eks_endpoints_not_publicly_accessible.eks_endpoints_not_publicly_accessible import ( eks_endpoints_not_publicly_accessible, ) @@ -41,10 +41,10 @@ def test_endpoint_public_access(self): ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_endpoints_not_publicly_accessible.eks_endpoints_not_publicly_accessible import ( + from prowler.providers.aws.services.eks.eks_endpoints_not_publicly_accessible.eks_endpoints_not_publicly_accessible import ( eks_endpoints_not_publicly_accessible, ) @@ -74,10 +74,10 @@ def test_endpoint_not_public_access(self): ) with mock.patch( - "providers.aws.services.eks.eks_service.EKS", + "prowler.providers.aws.services.eks.eks_service.EKS", eks_client, ): - from providers.aws.services.eks.eks_endpoints_not_publicly_accessible.eks_endpoints_not_publicly_accessible import ( + from prowler.providers.aws.services.eks.eks_endpoints_not_publicly_accessible.eks_endpoints_not_publicly_accessible import ( eks_endpoints_not_publicly_accessible, ) diff --git a/providers/aws/services/eks/eks_service_test.py b/tests/providers/aws/services/eks/eks_service_test.py similarity index 96% rename from providers/aws/services/eks/eks_service_test.py rename to tests/providers/aws/services/eks/eks_service_test.py index bb62395db4a..6cfdc51948f 100644 --- a/providers/aws/services/eks/eks_service_test.py +++ b/tests/providers/aws/services/eks/eks_service_test.py @@ -3,8 +3,8 @@ from boto3 import client, session from moto import mock_ec2, mock_eks -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.eks.eks_service import EKS +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.eks.eks_service import EKS AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -22,7 +22,7 @@ def mock_generate_regional_clients(service, audit_info): @patch( - "providers.aws.services.eks.eks_service.generate_regional_clients", + "prowler.providers.aws.services.eks.eks_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_EKS_Service: diff --git a/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers_test.py b/tests/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers_test.py similarity index 75% rename from providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers_test.py rename to tests/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers_test.py index e4ebeaa3111..aacbd1cbe00 100644 --- a/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers_test.py +++ b/tests/providers/aws/services/elb/elb_insecure_ssl_ciphers/elb_insecure_ssl_ciphers_test.py @@ -12,17 +12,17 @@ class Test_elb_insecure_ssl_ciphers: @mock_elb def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers.elb_client", + "prowler.providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers.elb_client", new=ELB(current_audit_info), ): # Test Check - from providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers import ( + from prowler.providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers import ( elb_insecure_ssl_ciphers, ) @@ -59,16 +59,16 @@ def test_elb_listener_with_secure_policy(self): ) elb.describe_load_balancer_policies(LoadBalancerName="my-lb") - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers.elb_client", + "prowler.providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers import ( + from prowler.providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers import ( elb_insecure_ssl_ciphers, ) @@ -104,16 +104,16 @@ def test_elb_with_HTTPS_listener(self): SecurityGroups=[security_group.id], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers.elb_client", + "prowler.providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers import ( + from prowler.providers.aws.services.elb.elb_insecure_ssl_ciphers.elb_insecure_ssl_ciphers import ( elb_insecure_ssl_ciphers, ) diff --git a/providers/aws/services/elb/elb_internet_facing/elb_internet_facing_test.py b/tests/providers/aws/services/elb/elb_internet_facing/elb_internet_facing_test.py similarity index 74% rename from providers/aws/services/elb/elb_internet_facing/elb_internet_facing_test.py rename to tests/providers/aws/services/elb/elb_internet_facing/elb_internet_facing_test.py index 118b0226a0e..31d9f4ad78f 100644 --- a/providers/aws/services/elb/elb_internet_facing/elb_internet_facing_test.py +++ b/tests/providers/aws/services/elb/elb_internet_facing/elb_internet_facing_test.py @@ -12,17 +12,17 @@ class Test_elb_request_smugling: @mock_elb def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_internet_facing.elb_internet_facing.elb_client", + "prowler.providers.aws.services.elb.elb_internet_facing.elb_internet_facing.elb_client", new=ELB(current_audit_info), ): # Test Check - from providers.aws.services.elb.elb_internet_facing.elb_internet_facing import ( + from prowler.providers.aws.services.elb.elb_internet_facing.elb_internet_facing import ( elb_internet_facing, ) @@ -52,16 +52,16 @@ def test_elb_private(self): SecurityGroups=[security_group.id], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_internet_facing.elb_internet_facing.elb_client", + "prowler.providers.aws.services.elb.elb_internet_facing.elb_internet_facing.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_internet_facing.elb_internet_facing import ( + from prowler.providers.aws.services.elb.elb_internet_facing.elb_internet_facing import ( elb_internet_facing, ) @@ -97,16 +97,16 @@ def test_elb_with_deletion_protection(self): SecurityGroups=[security_group.id], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_internet_facing.elb_internet_facing.elb_client", + "prowler.providers.aws.services.elb.elb_internet_facing.elb_internet_facing.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_internet_facing.elb_internet_facing import ( + from prowler.providers.aws.services.elb.elb_internet_facing.elb_internet_facing import ( elb_internet_facing, ) diff --git a/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled_test.py b/tests/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled_test.py similarity index 76% rename from providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled_test.py rename to tests/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled_test.py index 7bb89c9ec0a..732c227a4b0 100644 --- a/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled_test.py +++ b/tests/providers/aws/services/elb/elb_logging_enabled/elb_logging_enabled_test.py @@ -12,17 +12,17 @@ class Test_elb_logging_enabled: @mock_elb def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled.elb_client", + "prowler.providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled.elb_client", new=ELB(current_audit_info), ): # Test Check - from providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled import ( + from prowler.providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled import ( elb_logging_enabled, ) @@ -52,16 +52,16 @@ def test_elb_without_access_log(self): SecurityGroups=[security_group.id], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled.elb_client", + "prowler.providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled import ( + from prowler.providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled import ( elb_logging_enabled, ) @@ -109,16 +109,16 @@ def test_elb_with_deletion_protection(self): }, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled.elb_client", + "prowler.providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled import ( + from prowler.providers.aws.services.elb.elb_logging_enabled.elb_logging_enabled import ( elb_logging_enabled, ) diff --git a/providers/aws/services/elb/elb_service_test.py b/tests/providers/aws/services/elb/elb_service_test.py similarity index 97% rename from providers/aws/services/elb/elb_service_test.py rename to tests/providers/aws/services/elb/elb_service_test.py index 84c3bab225e..993847c6eeb 100644 --- a/providers/aws/services/elb/elb_service_test.py +++ b/tests/providers/aws/services/elb/elb_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, resource, session from moto import mock_ec2, mock_elb -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.elb.elb_service import ELB +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.elb.elb_service import ELB AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners_test.py b/tests/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners_test.py similarity index 74% rename from providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners_test.py rename to tests/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners_test.py index d468daddd96..9cefe61d44f 100644 --- a/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners_test.py +++ b/tests/providers/aws/services/elb/elb_ssl_listeners/elb_ssl_listeners_test.py @@ -12,17 +12,17 @@ class Test_elb_ssl_listeners: @mock_elb def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners.elb_client", + "prowler.providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners.elb_client", new=ELB(current_audit_info), ): # Test Check - from providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners import ( + from prowler.providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners import ( elb_ssl_listeners, ) @@ -52,16 +52,16 @@ def test_elb_with_HTTP_listener(self): SecurityGroups=[security_group.id], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners.elb_client", + "prowler.providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners import ( + from prowler.providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners import ( elb_ssl_listeners, ) @@ -95,16 +95,16 @@ def test_elb_with_HTTPS_listener(self): Scheme="internal", SecurityGroups=[security_group.id], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elb.elb_service import ELB current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners.elb_client", + "prowler.providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners.elb_client", new=ELB(current_audit_info), ): - from providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners import ( + from prowler.providers.aws.services.elb.elb_ssl_listeners.elb_ssl_listeners import ( elb_ssl_listeners, ) diff --git a/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection_test.py b/tests/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection_test.py similarity index 77% rename from providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection_test.py rename to tests/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection_test.py index 6809dbac8b0..baa920287a3 100644 --- a/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_deletion_protection/elbv2_deletion_protection_test.py @@ -12,17 +12,17 @@ class Test_elbv2_deletion_protection: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection import ( + from prowler.providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection import ( elbv2_deletion_protection, ) @@ -63,16 +63,16 @@ def test_elbv2_without_deletion_protection(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection import ( + from prowler.providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection import ( elbv2_deletion_protection, ) @@ -119,16 +119,16 @@ def test_elbv2_with_deletion_protection(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection import ( + from prowler.providers.aws.services.elbv2.elbv2_deletion_protection.elbv2_deletion_protection import ( elbv2_deletion_protection, ) diff --git a/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode_test.py b/tests/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode_test.py similarity index 77% rename from providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode_test.py rename to tests/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode_test.py index 07453da84bb..ff2132334dc 100644 --- a/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_desync_mitigation_mode/elbv2_desync_mitigation_mode_test.py @@ -12,17 +12,17 @@ class Test_elbv2_desync_mitigation_mode: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode import ( + from prowler.providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode import ( elbv2_desync_mitigation_mode, ) @@ -63,16 +63,16 @@ def test_elbv2_without_desync_mitigation_mode(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode import ( + from prowler.providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode import ( elbv2_desync_mitigation_mode, ) @@ -119,16 +119,16 @@ def test_elbv2_with_desync_mitigation_mode(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode import ( + from prowler.providers.aws.services.elbv2.elbv2_desync_mitigation_mode.elbv2_desync_mitigation_mode import ( elbv2_desync_mitigation_mode, ) diff --git a/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers_test.py b/tests/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers_test.py similarity index 81% rename from providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers_test.py rename to tests/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers_test.py index 30b90c3a84c..3f237995cfb 100644 --- a/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_insecure_ssl_ciphers/elbv2_insecure_ssl_ciphers_test.py @@ -12,17 +12,17 @@ class Test_elbv2_insecure_ssl_ciphers: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers import ( + from prowler.providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers import ( elbv2_insecure_ssl_ciphers, ) @@ -80,16 +80,16 @@ def test_elbv2_listener_with_secure_policy(self): DefaultActions=[{"Type": "forward", "TargetGroupArn": target_group_arn}], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers import ( + from prowler.providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers import ( elbv2_insecure_ssl_ciphers, ) @@ -152,16 +152,16 @@ def test_elbv2_with_HTTPS_listener(self): DefaultActions=[{"Type": "forward", "TargetGroupArn": target_group_arn}], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers import ( + from prowler.providers.aws.services.elbv2.elbv2_insecure_ssl_ciphers.elbv2_insecure_ssl_ciphers import ( elbv2_insecure_ssl_ciphers, ) diff --git a/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing_test.py b/tests/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing_test.py similarity index 76% rename from providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing_test.py rename to tests/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing_test.py index b354b399394..e2871c019d1 100644 --- a/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_internet_facing/elbv2_internet_facing_test.py @@ -12,17 +12,17 @@ class Test_elbv2_request_smugling: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing import ( + from prowler.providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing import ( elbv2_internet_facing, ) @@ -56,16 +56,16 @@ def test_elbv2_private(self): Type="application", )["LoadBalancers"][0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing import ( + from prowler.providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing import ( elbv2_internet_facing, ) @@ -105,16 +105,16 @@ def test_elbv2_with_deletion_protection(self): Scheme="internet-facing", )["LoadBalancers"][0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing import ( + from prowler.providers.aws.services.elbv2.elbv2_internet_facing.elbv2_internet_facing import ( elbv2_internet_facing, ) diff --git a/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath_test.py b/tests/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath_test.py similarity index 78% rename from providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath_test.py rename to tests/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath_test.py index 572214fb4b6..b82f61e3479 100644 --- a/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_listeners_underneath/elbv2_listeners_underneath_test.py @@ -12,17 +12,17 @@ class Test_elbv2_listeners_underneath: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath import ( + from prowler.providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath import ( elbv2_listeners_underneath, ) @@ -56,16 +56,16 @@ def test_elbv2_without_listeners(self): Type="application", )["LoadBalancers"][0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath import ( + from prowler.providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath import ( elbv2_listeners_underneath, ) @@ -127,16 +127,16 @@ def test_elbv2_with_listeners(self): DefaultActions=[{"Type": "forward", "TargetGroupArn": target_group_arn}], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath import ( + from prowler.providers.aws.services.elbv2.elbv2_listeners_underneath.elbv2_listeners_underneath import ( elbv2_listeners_underneath, ) diff --git a/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled_test.py b/tests/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled_test.py similarity index 78% rename from providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled_test.py rename to tests/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled_test.py index bb5ae984f1a..e0c9e1cdf45 100644 --- a/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_logging_enabled/elbv2_logging_enabled_test.py @@ -12,17 +12,17 @@ class Test_elbv2_logging_enabled: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled import ( + from prowler.providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled import ( elbv2_logging_enabled, ) @@ -66,16 +66,16 @@ def test_elbv2_without_deletion_protection(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled import ( + from prowler.providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled import ( elbv2_logging_enabled, ) @@ -125,16 +125,16 @@ def test_elbv2_with_deletion_protection(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled import ( + from prowler.providers.aws.services.elbv2.elbv2_logging_enabled.elbv2_logging_enabled import ( elbv2_logging_enabled, ) diff --git a/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling_test.py b/tests/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling_test.py similarity index 78% rename from providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling_test.py rename to tests/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling_test.py index 08b98df9f9a..1cd6aceef64 100644 --- a/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_request_smugling/elbv2_request_smugling_test.py @@ -12,17 +12,17 @@ class Test_elbv2_request_smugling: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling import ( + from prowler.providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling import ( elbv2_request_smugling, ) @@ -66,16 +66,16 @@ def test_elbv2_without_dropping(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling import ( + from prowler.providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling import ( elbv2_request_smugling, ) @@ -125,16 +125,16 @@ def test_elbv2_with_dropping(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling import ( + from prowler.providers.aws.services.elbv2.elbv2_request_smugling.elbv2_request_smugling import ( elbv2_request_smugling, ) diff --git a/providers/aws/services/elbv2/elbv2_service_test.py b/tests/providers/aws/services/elbv2/elbv2_service_test.py similarity index 98% rename from providers/aws/services/elbv2/elbv2_service_test.py rename to tests/providers/aws/services/elbv2/elbv2_service_test.py index 22856a0f42d..33b49ad7836 100644 --- a/providers/aws/services/elbv2/elbv2_service_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, resource, session from moto import mock_ec2, mock_elbv2 -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.elbv2.elbv2_service import ELBv2 +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners_test.py b/tests/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners_test.py similarity index 82% rename from providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners_test.py rename to tests/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners_test.py index dbc2f973c9e..68739b536dc 100644 --- a/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_ssl_listeners/elbv2_ssl_listeners_test.py @@ -12,17 +12,17 @@ class Test_elbv2_ssl_listeners: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", new=ELBv2(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( + from prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( elbv2_ssl_listeners, ) @@ -78,16 +78,16 @@ def test_elbv2_with_HTTP_listener(self): DefaultActions=[{"Type": "forward", "TargetGroupArn": target_group_arn}], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( + from prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( elbv2_ssl_listeners, ) @@ -149,16 +149,16 @@ def test_elbv2_with_HTTPS_listener(self): DefaultActions=[{"Type": "forward", "TargetGroupArn": target_group_arn}], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( + from prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( elbv2_ssl_listeners, ) @@ -213,16 +213,16 @@ def test_elbv2_with_HTTPS_redirection(self): ], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners.elbv2_client", new=ELBv2(current_audit_info), ): - from providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( + from prowler.providers.aws.services.elbv2.elbv2_ssl_listeners.elbv2_ssl_listeners import ( elbv2_ssl_listeners, ) diff --git a/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached_test.py b/tests/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached_test.py similarity index 72% rename from providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached_test.py rename to tests/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached_test.py index 382e8a41ade..5b8bd7f7063 100644 --- a/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached_test.py +++ b/tests/providers/aws/services/elbv2/elbv2_waf_acl_attached/elbv2_waf_acl_attached_test.py @@ -35,27 +35,27 @@ class Test_elbv2_waf_acl_attached: @mock_elbv2 def test_elb_no_balancers(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 - from providers.aws.services.waf.waf_service import WAF - from providers.aws.services.wafv2.wafv2_service import WAFv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.waf.waf_service import WAF + from prowler.providers.aws.services.wafv2.wafv2_service import WAFv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.elbv2_client", new=ELBv2(current_audit_info), ): with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.wafv2_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.wafv2_client", new=WAFv2(current_audit_info), ): with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.waf_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.waf_client", new=WAF(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached import ( + from prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached import ( elbv2_waf_acl_attached, ) @@ -100,27 +100,27 @@ def test_elbv2_without_WAF(self): Type="application", )["LoadBalancers"][0] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 - from providers.aws.services.waf.waf_service import WAF - from providers.aws.services.wafv2.wafv2_service import WAFv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.waf.waf_service import WAF + from prowler.providers.aws.services.wafv2.wafv2_service import WAFv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.elbv2_client", new=ELBv2(current_audit_info), ): with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.wafv2_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.wafv2_client", new=WAFv2(current_audit_info), ): with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.waf_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.waf_client", new=WAF(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached import ( + from prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached import ( elbv2_waf_acl_attached, ) @@ -174,27 +174,27 @@ def test_elbv2_with_WAF(self): wafv2.associate_web_acl(WebACLArn=waf["ARN"], ResourceArn=lb["LoadBalancerArn"]) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.elbv2.elbv2_service import ELBv2 - from providers.aws.services.waf.waf_service import WAF - from providers.aws.services.wafv2.wafv2_service import WAFv2 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.waf.waf_service import WAF + from prowler.providers.aws.services.wafv2.wafv2_service import WAFv2 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.elbv2_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.elbv2_client", new=ELBv2(current_audit_info), ): with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.wafv2_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.wafv2_client", new=WAFv2(current_audit_info), ) as service_client: with mock.patch( - "providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.waf_client", + "prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached.waf_client", new=WAF(current_audit_info), ): # Test Check - from providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached import ( + from prowler.providers.aws.services.elbv2.elbv2_waf_acl_attached.elbv2_waf_acl_attached import ( elbv2_waf_acl_attached, ) diff --git a/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled_test.py b/tests/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled_test.py similarity index 79% rename from providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled_test.py rename to tests/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled_test.py index 5a77a6a74c5..90eeb2be629 100644 --- a/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled_test.py +++ b/tests/providers/aws/services/emr/emr_cluster_account_public_block_enabled/emr_cluster_account_public_block_enabled_test.py @@ -2,7 +2,9 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.emr.emr_service import BlockPublicAccessConfiguration +from prowler.providers.aws.services.emr.emr_service import ( + BlockPublicAccessConfiguration, +) AWS_REGION = "eu-west-1" @@ -17,11 +19,11 @@ def test_account_public_block_enabled(self): ) } with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_account_public_block_enabled.emr_cluster_account_public_block_enabled import ( + from prowler.providers.aws.services.emr.emr_cluster_account_public_block_enabled.emr_cluster_account_public_block_enabled import ( emr_cluster_account_public_block_enabled, ) @@ -46,11 +48,11 @@ def test_account_public_block_disabled(self): ) } with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_account_public_block_enabled.emr_cluster_account_public_block_enabled import ( + from prowler.providers.aws.services.emr.emr_cluster_account_public_block_enabled.emr_cluster_account_public_block_enabled import ( emr_cluster_account_public_block_enabled, ) diff --git a/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip_test.py b/tests/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip_test.py similarity index 82% rename from providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip_test.py rename to tests/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip_test.py index c5bfad85553..f328c28b7b0 100644 --- a/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip_test.py +++ b/tests/providers/aws/services/emr/emr_cluster_master_nodes_no_public_ip/emr_cluster_master_nodes_no_public_ip_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.emr.emr_service import Cluster, ClusterStatus +from prowler.providers.aws.services.emr.emr_service import Cluster, ClusterStatus AWS_REGION = "eu-west-1" @@ -12,11 +12,11 @@ def test_no_clusters(self): emr_client = mock.MagicMock emr_client.clusters = {} with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( + from prowler.providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( emr_cluster_master_nodes_no_public_ip, ) @@ -42,11 +42,11 @@ def test_cluster_public_running(self): ) } with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( + from prowler.providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( emr_cluster_master_nodes_no_public_ip, ) @@ -79,11 +79,11 @@ def test_cluster_private_running(self): ) } with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( + from prowler.providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( emr_cluster_master_nodes_no_public_ip, ) @@ -117,11 +117,11 @@ def test_cluster_public_terminated(self): ) } with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( + from prowler.providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( emr_cluster_master_nodes_no_public_ip, ) @@ -147,11 +147,11 @@ def test_cluster_private_bootstrapping(self): ) } with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( + from prowler.providers.aws.services.emr.emr_cluster_master_nodes_no_public_ip.emr_cluster_master_nodes_no_public_ip import ( emr_cluster_master_nodes_no_public_ip, ) diff --git a/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible_test.py b/tests/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible_test.py similarity index 82% rename from providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible_test.py rename to tests/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible_test.py index ed623c511dd..c19a14f1eda 100644 --- a/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible_test.py +++ b/tests/providers/aws/services/emr/emr_cluster_publicly_accesible/emr_cluster_publicly_accesible_test.py @@ -5,8 +5,8 @@ from moto import mock_ec2 from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import AWS_Audit_Info -from providers.aws.services.emr.emr_service import Cluster, ClusterStatus, Node +from prowler.providers.aws.lib.audit_info.audit_info import AWS_Audit_Info +from prowler.providers.aws.services.emr.emr_service import Cluster, ClusterStatus, Node AWS_REGION = "eu-west-1" @@ -41,14 +41,14 @@ def test_no_clusters(self): ec2_client = mock.MagicMock with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ), mock.patch( - "providers.aws.services.ec2.ec2_service.EC2", + "prowler.providers.aws.services.ec2.ec2_service.EC2", new=ec2_client, ): # Test Check - from providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( + from prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( emr_cluster_publicly_accesible, ) @@ -95,20 +95,20 @@ def test_clusters_master_public_sg(self): master_expected_public_sgs = [master_security_group.id] - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", + "prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( + from prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( emr_cluster_publicly_accesible, ) @@ -161,20 +161,20 @@ def test_clusters_master_private_sg(self): ) } - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", + "prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( + from prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( emr_cluster_publicly_accesible, ) @@ -244,20 +244,20 @@ def test_clusters_master_private_slave_public_sg(self): slave_expected_public_sgs = [slave_security_group.id] - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", + "prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( + from prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( emr_cluster_publicly_accesible, ) @@ -330,20 +330,20 @@ def test_clusters_master_public_slave_private_two_sg(self): master_security_group.id, ] - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.emr.emr_service.EMR", + "prowler.providers.aws.services.emr.emr_service.EMR", new=emr_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", + "prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( + from prowler.providers.aws.services.emr.emr_cluster_publicly_accesible.emr_cluster_publicly_accesible import ( emr_cluster_publicly_accesible, ) diff --git a/providers/aws/services/emr/emr_service_test.py b/tests/providers/aws/services/emr/emr_service_test.py similarity index 95% rename from providers/aws/services/emr/emr_service_test.py rename to tests/providers/aws/services/emr/emr_service_test.py index f30b21d935f..1c4b0116267 100644 --- a/providers/aws/services/emr/emr_service_test.py +++ b/tests/providers/aws/services/emr/emr_service_test.py @@ -6,8 +6,8 @@ from moto import mock_emr from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.emr.emr_service import EMR, ClusterStatus +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.emr.emr_service import EMR, ClusterStatus # Mock Test Region AWS_REGION = "eu-west-1" @@ -44,7 +44,7 @@ def mock_generate_regional_clients(service, audit_info): @patch( - "providers.aws.services.emr.emr_service.generate_regional_clients", + "prowler.providers.aws.services.emr.emr_service.generate_regional_clients", new=mock_generate_regional_clients, ) @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) diff --git a/providers/aws/services/glacier/glacier_service_test.py b/tests/providers/aws/services/glacier/glacier_service_test.py similarity index 94% rename from providers/aws/services/glacier/glacier_service_test.py rename to tests/providers/aws/services/glacier/glacier_service_test.py index cca64111bef..78551a77af4 100644 --- a/providers/aws/services/glacier/glacier_service_test.py +++ b/tests/providers/aws/services/glacier/glacier_service_test.py @@ -4,8 +4,8 @@ import botocore from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.glacier.glacier_service import Glacier +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.glacier.glacier_service import Glacier # Mock Test Region AWS_REGION = "eu-west-1" @@ -67,7 +67,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.glacier.glacier_service.generate_regional_clients", + "prowler.providers.aws.services.glacier.glacier_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_Glacier_Service: diff --git a/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access_test.py b/tests/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access_test.py similarity index 87% rename from providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access_test.py rename to tests/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access_test.py index afe730d7033..58ecf778ad8 100644 --- a/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access_test.py +++ b/tests/providers/aws/services/glacier/glacier_vaults_policy_public_access/glacier_vaults_policy_public_access_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.glacier.glacier_service import Vault +from prowler.providers.aws.services.glacier.glacier_service import Vault AWS_REGION = "eu-west-1" @@ -12,11 +12,11 @@ def test_no_vaults(self): glacier_client = mock.MagicMock glacier_client.vaults = {} with mock.patch( - "providers.aws.services.glacier.glacier_service.Glacier", + "prowler.providers.aws.services.glacier.glacier_service.Glacier", new=glacier_client, ): # Test Check - from providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( + from prowler.providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( glacier_vaults_policy_public_access, ) @@ -40,11 +40,11 @@ def test_vault_no_policy(self): ) } with mock.patch( - "providers.aws.services.glacier.glacier_service.Glacier", + "prowler.providers.aws.services.glacier.glacier_service.Glacier", new=glacier_client, ): # Test Check - from providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( + from prowler.providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( glacier_vaults_policy_public_access, ) @@ -94,11 +94,11 @@ def test_vault_policy_pricipal_aws_list_asterisk(self): ) } with mock.patch( - "providers.aws.services.glacier.glacier_service.Glacier", + "prowler.providers.aws.services.glacier.glacier_service.Glacier", new=glacier_client, ): # Test Check - from providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( + from prowler.providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( glacier_vaults_policy_public_access, ) @@ -148,11 +148,11 @@ def test_vault_policy_pricipal_asterisk(self): ) } with mock.patch( - "providers.aws.services.glacier.glacier_service.Glacier", + "prowler.providers.aws.services.glacier.glacier_service.Glacier", new=glacier_client, ): # Test Check - from providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( + from prowler.providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( glacier_vaults_policy_public_access, ) @@ -202,11 +202,11 @@ def test_vault_policy_pricipal_canonical_user_asterisk(self): ) } with mock.patch( - "providers.aws.services.glacier.glacier_service.Glacier", + "prowler.providers.aws.services.glacier.glacier_service.Glacier", new=glacier_client, ): # Test Check - from providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( + from prowler.providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( glacier_vaults_policy_public_access, ) @@ -260,11 +260,11 @@ def test_vault_policy_private(self): ) } with mock.patch( - "providers.aws.services.glacier.glacier_service.Glacier", + "prowler.providers.aws.services.glacier.glacier_service.Glacier", new=glacier_client, ): # Test Check - from providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( + from prowler.providers.aws.services.glacier.glacier_vaults_policy_public_access.glacier_vaults_policy_public_access import ( glacier_vaults_policy_public_access, ) diff --git a/providers/aws/services/globalaccelerator/globalaccelerator_service_test.py b/tests/providers/aws/services/globalaccelerator/globalaccelerator_service_test.py similarity index 96% rename from providers/aws/services/globalaccelerator/globalaccelerator_service_test.py rename to tests/providers/aws/services/globalaccelerator/globalaccelerator_service_test.py index 0534eca628f..43b4390e6ea 100644 --- a/providers/aws/services/globalaccelerator/globalaccelerator_service_test.py +++ b/tests/providers/aws/services/globalaccelerator/globalaccelerator_service_test.py @@ -3,8 +3,8 @@ from mock import patch from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.globalaccelerator.globalaccelerator_service import ( +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.globalaccelerator.globalaccelerator_service import ( GlobalAccelerator, ) diff --git a/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled_test.py similarity index 75% rename from providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled_test.py index d93bcf7ae9f..a620debd55f 100644 --- a/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_data_catalogs_connection_passwords_encryption_enabled/glue_data_catalogs_connection_passwords_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import CatalogEncryptionSetting +from prowler.providers.aws.services.glue.glue_service import CatalogEncryptionSetting AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ def test_glue_no_settings(self): glue_client.catalog_encryption_settings = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_data_catalogs_connection_passwords_encryption_enabled.glue_data_catalogs_connection_passwords_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_data_catalogs_connection_passwords_encryption_enabled.glue_data_catalogs_connection_passwords_encryption_enabled import ( glue_data_catalogs_connection_passwords_encryption_enabled, ) @@ -39,11 +39,11 @@ def test_glue_catalog_password_unencrypted(self): glue_client.audited_account = "12345678912" with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_data_catalogs_connection_passwords_encryption_enabled.glue_data_catalogs_connection_passwords_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_data_catalogs_connection_passwords_encryption_enabled.glue_data_catalogs_connection_passwords_encryption_enabled import ( glue_data_catalogs_connection_passwords_encryption_enabled, ) @@ -71,11 +71,11 @@ def test_glue_catalog_encrypted(self): glue_client.audited_account = "12345678912" with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_data_catalogs_connection_passwords_encryption_enabled.glue_data_catalogs_connection_passwords_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_data_catalogs_connection_passwords_encryption_enabled.glue_data_catalogs_connection_passwords_encryption_enabled import ( glue_data_catalogs_connection_passwords_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled_test.py similarity index 77% rename from providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled_test.py index 541315f08b1..a27b7871fae 100644 --- a/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_data_catalogs_metadata_encryption_enabled/glue_data_catalogs_metadata_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import CatalogEncryptionSetting +from prowler.providers.aws.services.glue.glue_service import CatalogEncryptionSetting AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ def test_glue_no_settings(self): glue_client.catalog_encryption_settings = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_data_catalogs_metadata_encryption_enabled.glue_data_catalogs_metadata_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_data_catalogs_metadata_encryption_enabled.glue_data_catalogs_metadata_encryption_enabled import ( glue_data_catalogs_metadata_encryption_enabled, ) @@ -39,11 +39,11 @@ def test_glue_catalog_unencrypted(self): glue_client.audited_account = "12345678912" with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_data_catalogs_metadata_encryption_enabled.glue_data_catalogs_metadata_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_data_catalogs_metadata_encryption_enabled.glue_data_catalogs_metadata_encryption_enabled import ( glue_data_catalogs_metadata_encryption_enabled, ) @@ -72,11 +72,11 @@ def test_glue_catalog_encrypted(self): glue_client.audited_account = "12345678912" with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_data_catalogs_metadata_encryption_enabled.glue_data_catalogs_metadata_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_data_catalogs_metadata_encryption_enabled.glue_data_catalogs_metadata_encryption_enabled import ( glue_data_catalogs_metadata_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled_test.py b/tests/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled_test.py similarity index 79% rename from providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled_test.py rename to tests/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled_test.py index c9227166ada..16a5388ea73 100644 --- a/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_database_connections_ssl_enabled/glue_database_connections_ssl_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import Connection +from prowler.providers.aws.services.glue.glue_service import Connection AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ def test_glue_no_conns(self): glue_client.connections = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_database_connections_ssl_enabled.glue_database_connections_ssl_enabled import ( + from prowler.providers.aws.services.glue.glue_database_connections_ssl_enabled.glue_database_connections_ssl_enabled import ( glue_database_connections_ssl_enabled, ) @@ -42,11 +42,11 @@ def test_glue_table_no_SSL(self): ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_database_connections_ssl_enabled.glue_database_connections_ssl_enabled import ( + from prowler.providers.aws.services.glue.glue_database_connections_ssl_enabled.glue_database_connections_ssl_enabled import ( glue_database_connections_ssl_enabled, ) @@ -79,11 +79,11 @@ def test_glue_table_with_SSL(self): ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_database_connections_ssl_enabled.glue_database_connections_ssl_enabled import ( + from prowler.providers.aws.services.glue.glue_database_connections_ssl_enabled.glue_database_connections_ssl_enabled import ( glue_database_connections_ssl_enabled, ) diff --git a/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled_test.py similarity index 77% rename from providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled_test.py index 37ae8b8b657..5978a631c2c 100644 --- a/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_development_endpoints_cloudwatch_logs_encryption_enabled/glue_development_endpoints_cloudwatch_logs_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import DevEndpoint, SecurityConfig +from prowler.providers.aws.services.glue.glue_service import DevEndpoint, SecurityConfig AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ def test_glue_no_endpoints(self): glue_client.dev_endpoints = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( glue_development_endpoints_cloudwatch_logs_encryption_enabled, ) @@ -46,11 +46,11 @@ def test_glue_encrypted_endpoint(self): ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( glue_development_endpoints_cloudwatch_logs_encryption_enabled, ) @@ -85,11 +85,11 @@ def test_glue_unencrypted_endpoint(self): ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( glue_development_endpoints_cloudwatch_logs_encryption_enabled, ) @@ -116,11 +116,11 @@ def test_glue_no_sec_configs(self): glue_client.security_configs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_cloudwatch_logs_encryption_enabled.glue_development_endpoints_cloudwatch_logs_encryption_enabled import ( glue_development_endpoints_cloudwatch_logs_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled_test.py similarity index 77% rename from providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled_test.py index e5ec74d88b4..5f2026cf494 100644 --- a/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_development_endpoints_job_bookmark_encryption_enabled/glue_development_endpoints_job_bookmark_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import DevEndpoint, SecurityConfig +from prowler.providers.aws.services.glue.glue_service import DevEndpoint, SecurityConfig AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ def test_glue_no_endpoints(self): glue_client.dev_endpoints = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( glue_development_endpoints_job_bookmark_encryption_enabled, ) @@ -46,11 +46,11 @@ def test_glue_encrypted_endpoint(self): ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( glue_development_endpoints_job_bookmark_encryption_enabled, ) @@ -85,11 +85,11 @@ def test_glue_unencrypted_endpoint(self): ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( glue_development_endpoints_job_bookmark_encryption_enabled, ) @@ -116,11 +116,11 @@ def test_glue_no_sec_configs(self): glue_client.security_configs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_job_bookmark_encryption_enabled.glue_development_endpoints_job_bookmark_encryption_enabled import ( glue_development_endpoints_job_bookmark_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled_test.py similarity index 78% rename from providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled_test.py index 73da6e85974..4ed18ea49e0 100644 --- a/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_development_endpoints_s3_encryption_enabled/glue_development_endpoints_s3_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import DevEndpoint, SecurityConfig +from prowler.providers.aws.services.glue.glue_service import DevEndpoint, SecurityConfig AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ def test_glue_no_endpoints(self): glue_client.dev_endpoints = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( glue_development_endpoints_s3_encryption_enabled, ) @@ -46,11 +46,11 @@ def test_glue_encrypted_endpoint(self): ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( glue_development_endpoints_s3_encryption_enabled, ) @@ -85,11 +85,11 @@ def test_glue_unencrypted_endpoint(self): ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( glue_development_endpoints_s3_encryption_enabled, ) @@ -116,11 +116,11 @@ def test_glue_no_sec_configs(self): glue_client.security_configs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_development_endpoints_s3_encryption_enabled.glue_development_endpoints_s3_encryption_enabled import ( glue_development_endpoints_s3_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled_test.py similarity index 79% rename from providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled_test.py index 364da1ed85f..53e8030fbfa 100644 --- a/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_etl_jobs_amazon_s3_encryption_enabled/glue_etl_jobs_amazon_s3_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import Job, SecurityConfig +from prowler.providers.aws.services.glue.glue_service import Job, SecurityConfig AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ def test_glue_no_jobs(self): glue_client.jobs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( glue_etl_jobs_amazon_s3_encryption_enabled, ) @@ -47,11 +47,11 @@ def test_glue_encrypted_job(self): ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( glue_etl_jobs_amazon_s3_encryption_enabled, ) @@ -87,11 +87,11 @@ def test_glue_unencrypted_job(self): ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( glue_etl_jobs_amazon_s3_encryption_enabled, ) @@ -118,11 +118,11 @@ def test_glue_no_sec_configs(self): glue_client.security_configs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( glue_etl_jobs_amazon_s3_encryption_enabled, ) @@ -153,11 +153,11 @@ def test_glue_encrypted_job_with_argument(self): glue_client.security_configs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_amazon_s3_encryption_enabled.glue_etl_jobs_amazon_s3_encryption_enabled import ( glue_etl_jobs_amazon_s3_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled_test.py similarity index 78% rename from providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled_test.py index 19a9355bab6..715b6f52d8f 100644 --- a/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_etl_jobs_cloudwatch_logs_encryption_enabled/glue_etl_jobs_cloudwatch_logs_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import Job, SecurityConfig +from prowler.providers.aws.services.glue.glue_service import Job, SecurityConfig AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ def test_glue_no_jobs(self): glue_client.jobs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( glue_etl_jobs_cloudwatch_logs_encryption_enabled, ) @@ -47,11 +47,11 @@ def test_glue_encrypted_job(self): ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( glue_etl_jobs_cloudwatch_logs_encryption_enabled, ) @@ -87,11 +87,11 @@ def test_glue_unencrypted_job(self): ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( glue_etl_jobs_cloudwatch_logs_encryption_enabled, ) @@ -118,11 +118,11 @@ def test_glue_no_sec_configs(self): glue_client.security_configs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_cloudwatch_logs_encryption_enabled.glue_etl_jobs_cloudwatch_logs_encryption_enabled import ( glue_etl_jobs_cloudwatch_logs_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled_test.py b/tests/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled_test.py similarity index 79% rename from providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled_test.py rename to tests/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled_test.py index 7ccaf35181f..4f9b03d0718 100644 --- a/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled_test.py +++ b/tests/providers/aws/services/glue/glue_etl_jobs_job_bookmark_encryption_enabled/glue_etl_jobs_job_bookmark_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.glue.glue_service import Job, SecurityConfig +from prowler.providers.aws.services.glue.glue_service import Job, SecurityConfig AWS_REGION = "us-east-1" @@ -12,11 +12,11 @@ def test_glue_no_jobs(self): glue_client.jobs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( glue_etl_jobs_job_bookmark_encryption_enabled, ) @@ -47,11 +47,11 @@ def test_glue_encrypted_job(self): ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( glue_etl_jobs_job_bookmark_encryption_enabled, ) @@ -87,11 +87,11 @@ def test_glue_unencrypted_job(self): ] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( glue_etl_jobs_job_bookmark_encryption_enabled, ) @@ -118,11 +118,11 @@ def test_glue_no_sec_configs(self): glue_client.security_configs = [] with mock.patch( - "providers.aws.services.glue.glue_service.Glue", + "prowler.providers.aws.services.glue.glue_service.Glue", glue_client, ): # Test Check - from providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( + from prowler.providers.aws.services.glue.glue_etl_jobs_job_bookmark_encryption_enabled.glue_etl_jobs_job_bookmark_encryption_enabled import ( glue_etl_jobs_job_bookmark_encryption_enabled, ) diff --git a/providers/aws/services/glue/glue_service_test.py b/tests/providers/aws/services/glue/glue_service_test.py similarity index 97% rename from providers/aws/services/glue/glue_service_test.py rename to tests/providers/aws/services/glue/glue_service_test.py index 2590c955102..4f3420a084b 100644 --- a/providers/aws/services/glue/glue_service_test.py +++ b/tests/providers/aws/services/glue/glue_service_test.py @@ -4,8 +4,8 @@ from boto3 import session from moto import mock_glue -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.glue.glue_service import Glue +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.glue.glue_service import Glue AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" @@ -113,7 +113,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.glue.glue_service.generate_regional_clients", + "prowler.providers.aws.services.glue.glue_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_Glue_Service: diff --git a/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled_test.py b/tests/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled_test.py similarity index 76% rename from providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled_test.py rename to tests/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled_test.py index ae11db6950c..d2924eb7722 100644 --- a/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled_test.py +++ b/tests/providers/aws/services/guardduty/guardduty_is_enabled/guardduty_is_enabled_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.guardduty.guardduty_service import Detector +from prowler.providers.aws.services.guardduty.guardduty_service import Detector AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ def test_no_detectors(self): guardduty_client = mock.MagicMock guardduty_client.detectors = [] with mock.patch( - "providers.aws.services.guardduty.guardduty_service.GuardDuty", + "prowler.providers.aws.services.guardduty.guardduty_service.GuardDuty", guardduty_client, ): - from providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( + from prowler.providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( guardduty_is_enabled, ) @@ -37,10 +37,10 @@ def test_guardduty_enabled(self): ) ) with mock.patch( - "providers.aws.services.guardduty.guardduty_service.GuardDuty", + "prowler.providers.aws.services.guardduty.guardduty_service.GuardDuty", guardduty_client, ): - from providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( + from prowler.providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( guardduty_is_enabled, ) @@ -63,10 +63,10 @@ def test_guardduty_configured_but_suspended(self): ) ) with mock.patch( - "providers.aws.services.guardduty.guardduty_service.GuardDuty", + "prowler.providers.aws.services.guardduty.guardduty_service.GuardDuty", guardduty_client, ): - from providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( + from prowler.providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( guardduty_is_enabled, ) @@ -88,10 +88,10 @@ def test_guardduty_not_configured(self): ) ) with mock.patch( - "providers.aws.services.guardduty.guardduty_service.GuardDuty", + "prowler.providers.aws.services.guardduty.guardduty_service.GuardDuty", guardduty_client, ): - from providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( + from prowler.providers.aws.services.guardduty.guardduty_is_enabled.guardduty_is_enabled import ( guardduty_is_enabled, ) diff --git a/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings_test.py b/tests/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings_test.py similarity index 74% rename from providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings_test.py rename to tests/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings_test.py index 2d4aa6386ff..a61aa8f9d1d 100644 --- a/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings_test.py +++ b/tests/providers/aws/services/guardduty/guardduty_no_high_severity_findings/guardduty_no_high_severity_findings_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.guardduty.guardduty_service import Detector +from prowler.providers.aws.services.guardduty.guardduty_service import Detector AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ def test_no_detectors(self): guardduty_client = mock.MagicMock guardduty_client.detectors = [] with mock.patch( - "providers.aws.services.guardduty.guardduty_service.GuardDuty", + "prowler.providers.aws.services.guardduty.guardduty_service.GuardDuty", guardduty_client, ): - from providers.aws.services.guardduty.guardduty_no_high_severity_findings.guardduty_no_high_severity_findings import ( + from prowler.providers.aws.services.guardduty.guardduty_no_high_severity_findings.guardduty_no_high_severity_findings import ( guardduty_no_high_severity_findings, ) @@ -36,10 +36,10 @@ def test_no_high_findings(self): ) ) with mock.patch( - "providers.aws.services.guardduty.guardduty_service.GuardDuty", + "prowler.providers.aws.services.guardduty.guardduty_service.GuardDuty", guardduty_client, ): - from providers.aws.services.guardduty.guardduty_no_high_severity_findings.guardduty_no_high_severity_findings import ( + from prowler.providers.aws.services.guardduty.guardduty_no_high_severity_findings.guardduty_no_high_severity_findings import ( guardduty_no_high_severity_findings, ) @@ -62,10 +62,10 @@ def test_high_findings(self): ) ) with mock.patch( - "providers.aws.services.guardduty.guardduty_service.GuardDuty", + "prowler.providers.aws.services.guardduty.guardduty_service.GuardDuty", guardduty_client, ): - from providers.aws.services.guardduty.guardduty_no_high_severity_findings.guardduty_no_high_severity_findings import ( + from prowler.providers.aws.services.guardduty.guardduty_no_high_severity_findings.guardduty_no_high_severity_findings import ( guardduty_no_high_severity_findings, ) diff --git a/providers/aws/services/guardduty/guardduty_service_test.py b/tests/providers/aws/services/guardduty/guardduty_service_test.py similarity index 93% rename from providers/aws/services/guardduty/guardduty_service_test.py rename to tests/providers/aws/services/guardduty/guardduty_service_test.py index 89dd26f2aba..698f96ad0fd 100644 --- a/providers/aws/services/guardduty/guardduty_service_test.py +++ b/tests/providers/aws/services/guardduty/guardduty_service_test.py @@ -4,8 +4,8 @@ from boto3 import client, session from moto import mock_guardduty -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.guardduty.guardduty_service import GuardDuty +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.guardduty.guardduty_service import GuardDuty AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -27,7 +27,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.guardduty.guardduty_service.generate_regional_clients", + "prowler.providers.aws.services.guardduty.guardduty_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_GuardDuty_Service: diff --git a/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa_test.py b/tests/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa_test.py similarity index 75% rename from providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa_test.py rename to tests/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa_test.py index a25a0e53f38..731099ceed8 100644 --- a/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa_test.py +++ b/tests/providers/aws/services/iam/iam_administrator_access_with_mfa/iam_administrator_access_with_mfa_test.py @@ -14,14 +14,14 @@ def test_group_with_no_policies(self): arn = iam.create_group(GroupName=group_name)["Group"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", + "prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( + from prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( iam_administrator_access_with_mfa, ) @@ -52,14 +52,14 @@ def test_group_non_administrative_policy(self): arn = iam.create_group(GroupName=group_name)["Group"]["Arn"] iam.attach_group_policy(GroupName=group_name, PolicyArn=policy_arn) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", + "prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( + from prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( iam_administrator_access_with_mfa, ) @@ -85,14 +85,14 @@ def test_admin_policy_no_users(self): PolicyArn="arn:aws:iam::aws:policy/AdministratorAccess", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", + "prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( + from prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( iam_administrator_access_with_mfa, ) @@ -120,14 +120,14 @@ def test_admin_policy_with_user_without_mfa(self): ) iam.add_user_to_group(GroupName=group_name, UserName=user_name) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", + "prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( + from prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( iam_administrator_access_with_mfa, ) @@ -179,14 +179,14 @@ def test_various_policies_with_users_with_and_without_mfa(self): iam.add_user_to_group(GroupName=group_name, UserName=user_name_no_mfa) iam.add_user_to_group(GroupName=group_name, UserName=user_name_mfa) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", + "prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( + from prowler.providers.aws.services.iam.iam_administrator_access_with_mfa.iam_administrator_access_with_mfa import ( iam_administrator_access_with_mfa, ) diff --git a/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage_test.py b/tests/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage_test.py similarity index 82% rename from providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage_test.py rename to tests/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage_test.py index 776c898fb5d..e93ada748c9 100644 --- a/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage_test.py +++ b/tests/providers/aws/services/iam/iam_avoid_root_usage/iam_avoid_root_usage_test.py @@ -15,14 +15,14 @@ def test_root_not_used(self): csv_reader = DictReader(credential_lines, delimiter=",") credential_list = list(csv_reader) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", + "prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( + from prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( iam_avoid_root_usage, ) @@ -48,14 +48,14 @@ def test_root_password_used(self): csv_reader = DictReader(credential_lines, delimiter=",") credential_list = list(csv_reader) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", + "prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( + from prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( iam_avoid_root_usage, ) @@ -80,14 +80,14 @@ def test_root_access_key_1_used(self): csv_reader = DictReader(credential_lines, delimiter=",") credential_list = list(csv_reader) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", + "prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( + from prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( iam_avoid_root_usage, ) @@ -112,14 +112,14 @@ def test_root_access_key_2_used(self): csv_reader = DictReader(credential_lines, delimiter=",") credential_list = list(csv_reader) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", + "prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( + from prowler.providers.aws.services.iam.iam_avoid_root_usage.iam_avoid_root_usage import ( iam_avoid_root_usage, ) diff --git a/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts_test.py b/tests/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts_test.py similarity index 84% rename from providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts_test.py rename to tests/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts_test.py index 88bd94c0f94..0b80f879cea 100644 --- a/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts_test.py +++ b/tests/providers/aws/services/iam/iam_check_saml_providers_sts/iam_check_saml_providers_sts_test.py @@ -41,15 +41,15 @@ def test_iam_check_saml_providers_sts(self): SAMLMetadataDocument=xml_template, Name=saml_provider_name ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_check_saml_providers_sts.iam_check_saml_providers_sts.iam_client", + "prowler.providers.aws.services.iam.iam_check_saml_providers_sts.iam_check_saml_providers_sts.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_check_saml_providers_sts.iam_check_saml_providers_sts import ( + from prowler.providers.aws.services.iam.iam_check_saml_providers_sts.iam_check_saml_providers_sts import ( iam_check_saml_providers_sts, ) diff --git a/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials_test.py b/tests/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials_test.py similarity index 70% rename from providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials_test.py rename to tests/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials_test.py index 3221f1dde3e..21e9c668d04 100644 --- a/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials_test.py +++ b/tests/providers/aws/services/iam/iam_disable_30_days_credentials/iam_disable_30_days_credentials_test.py @@ -15,14 +15,14 @@ def test_iam_user_logged_30_days(self): iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials import ( iam_disable_30_days_credentials, ) @@ -45,14 +45,14 @@ def test_iam_user_not_logged_30_days(self): iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials import ( iam_disable_30_days_credentials, ) @@ -72,14 +72,14 @@ def test_iam_user_not_logged(self): iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_30_days_credentials.iam_disable_30_days_credentials import ( iam_disable_30_days_credentials, ) diff --git a/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials_test.py b/tests/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials_test.py similarity index 70% rename from providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials_test.py rename to tests/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials_test.py index 9eb02f00f12..5861dd25c94 100644 --- a/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials_test.py +++ b/tests/providers/aws/services/iam/iam_disable_45_days_credentials/iam_disable_45_days_credentials_test.py @@ -15,14 +15,14 @@ def test_iam_user_logged_45_days(self): iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials import ( iam_disable_45_days_credentials, ) @@ -45,14 +45,14 @@ def test_iam_user_not_logged_45_days(self): iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials import ( iam_disable_45_days_credentials, ) @@ -72,14 +72,14 @@ def test_iam_user_not_logged(self): iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_45_days_credentials.iam_disable_45_days_credentials import ( iam_disable_45_days_credentials, ) diff --git a/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials_test.py b/tests/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials_test.py similarity index 70% rename from providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials_test.py rename to tests/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials_test.py index 1d92de68006..4763b2ebc8e 100644 --- a/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials_test.py +++ b/tests/providers/aws/services/iam/iam_disable_90_days_credentials/iam_disable_90_days_credentials_test.py @@ -15,14 +15,14 @@ def test_iam_user_logged_90_days(self): iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials import ( iam_disable_90_days_credentials, ) @@ -45,14 +45,14 @@ def test_iam_user_not_logged_90_days(self): iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials import ( iam_disable_90_days_credentials, ) @@ -72,14 +72,14 @@ def test_iam_user_not_logged(self): iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials.iam_client", + "prowler.providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials import ( + from prowler.providers.aws.services.iam.iam_disable_90_days_credentials.iam_disable_90_days_credentials import ( iam_disable_90_days_credentials, ) diff --git a/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption_test.py b/tests/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption_test.py similarity index 73% rename from providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption_test.py rename to tests/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption_test.py index 36a06db5aef..b49b2f640ab 100644 --- a/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption_test.py +++ b/tests/providers/aws/services/iam/iam_no_custom_policy_permissive_role_assumption/iam_no_custom_policy_permissive_role_assumption_test.py @@ -21,14 +21,14 @@ def test_policy_allows_permissive_role_assumption_wildcard(self): PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", + "prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( + from prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( iam_no_custom_policy_permissive_role_assumption, ) @@ -56,14 +56,14 @@ def test_policy_allows_permissive_role_assumption_no_wilcard(self): PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", + "prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( + from prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( iam_no_custom_policy_permissive_role_assumption, ) @@ -94,14 +94,14 @@ def test_policy_assume_role_not_allow_permissive_role_assumption(self): arn = iam_client.create_policy( PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", + "prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( + from prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( iam_no_custom_policy_permissive_role_assumption, ) @@ -129,14 +129,14 @@ def test_policy_not_allow_permissive_role_assumption(self): PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", + "prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( + from prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( iam_no_custom_policy_permissive_role_assumption, ) @@ -176,14 +176,14 @@ def test_policy_permissive_and_not_permissive(self): PolicyDocument=dumps(policy_document_permissive), )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", + "prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( + from prowler.providers.aws.services.iam.iam_no_custom_policy_permissive_role_assumption.iam_no_custom_policy_permissive_role_assumption import ( iam_no_custom_policy_permissive_role_assumption, ) diff --git a/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored_test.py b/tests/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored_test.py similarity index 61% rename from providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored_test.py rename to tests/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored_test.py index 06452462fca..1ed415ec96c 100644 --- a/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored_test.py +++ b/tests/providers/aws/services/iam/iam_no_expired_server_certificates_stored/iam_no_expired_server_certificates_stored_test.py @@ -8,14 +8,14 @@ class Test_iam_no_expired_server_certificates_stored_test: @mock_iam def test_no_certificates(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored.iam_client", + "prowler.providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored import ( + from prowler.providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored import ( iam_no_expired_server_certificates_stored, ) @@ -33,14 +33,14 @@ def test_expired_certificate(self): CertificateBody="certbody", PrivateKey="privatekey", )["ServerCertificateMetadata"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored.iam_client", + "prowler.providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored import ( + from prowler.providers.aws.services.iam.iam_no_expired_server_certificates_stored.iam_no_expired_server_certificates_stored import ( iam_no_expired_server_certificates_stored, ) diff --git a/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key_test.py b/tests/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key_test.py similarity index 76% rename from providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key_test.py rename to tests/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key_test.py index b4eaf79ad36..e54f9175095 100644 --- a/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key_test.py +++ b/tests/providers/aws/services/iam/iam_no_root_access_key/iam_no_root_access_key_test.py @@ -12,14 +12,14 @@ def test_iam_root_no_access_keys(self): user = "test" iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( + from prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( iam_no_root_access_key, ) @@ -50,14 +50,14 @@ def test_iam_root_access_key_1(self): user = "test" iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( + from prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( iam_no_root_access_key, ) @@ -88,14 +88,14 @@ def test_iam_root_access_key_2(self): user = "test" iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( + from prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( iam_no_root_access_key, ) @@ -126,14 +126,14 @@ def test_iam_root_both_access_keys(self): user = "test" iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( + from prowler.providers.aws.services.iam.iam_no_root_access_key.iam_no_root_access_key import ( iam_no_root_access_key, ) diff --git a/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less_test.py b/tests/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less_test.py similarity index 67% rename from providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less_test.py rename to tests/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less_test.py index 73ecfb8639b..21654999ec9 100644 --- a/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less_test.py +++ b/tests/providers/aws/services/iam/iam_password_policy_expires_passwords_within_90_days_or_less/iam_password_policy_expires_passwords_within_90_days_or_less_test.py @@ -7,14 +7,14 @@ class Test_iam_password_policy_expires_passwords_within_90_days_or_less: @mock_iam def test_password_expiration_lower_90(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM, PasswordPolicy + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM, PasswordPolicy with mock.patch( - "providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less import ( + from prowler.providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less import ( iam_password_policy_expires_passwords_within_90_days_or_less, ) @@ -41,14 +41,14 @@ def test_password_expiration_lower_90(self): @mock_iam def test_password_expiration_greater_90(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM, PasswordPolicy + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM, PasswordPolicy with mock.patch( - "providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less import ( + from prowler.providers.aws.services.iam.iam_password_policy_expires_passwords_within_90_days_or_less.iam_password_policy_expires_passwords_within_90_days_or_less import ( iam_password_policy_expires_passwords_within_90_days_or_less, ) diff --git a/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase_test.py b/tests/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase_test.py similarity index 59% rename from providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase_test.py rename to tests/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase_test.py index edb06eb2d46..61b86e3993a 100644 --- a/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase_test.py +++ b/tests/providers/aws/services/iam/iam_password_policy_lowercase/iam_password_policy_lowercase_test.py @@ -11,15 +11,15 @@ def test_iam_password_policy_no_lowercase_flag(self): # update password policy iam_client.update_account_password_policy(RequireLowercaseCharacters=False) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase import ( + from prowler.providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase import ( iam_password_policy_lowercase, ) @@ -33,15 +33,15 @@ def test_iam_password_policy_lowercase_flag(self): # update password policy iam_client.update_account_password_policy(RequireLowercaseCharacters=True) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase import ( + from prowler.providers.aws.services.iam.iam_password_policy_lowercase.iam_password_policy_lowercase import ( iam_password_policy_lowercase, ) diff --git a/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14_test.py b/tests/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14_test.py similarity index 57% rename from providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14_test.py rename to tests/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14_test.py index 21888b5056a..d145e6b1367 100644 --- a/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14_test.py +++ b/tests/providers/aws/services/iam/iam_password_policy_minimum_length_14/iam_password_policy_minimum_length_14_test.py @@ -11,15 +11,15 @@ def test_iam_password_policy_minimum_length_equal_14(self): # update password policy iam_client.update_account_password_policy(MinimumPasswordLength=14) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14 import ( + from prowler.providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14 import ( iam_password_policy_minimum_length_14, ) @@ -33,15 +33,15 @@ def test_iam_password_policy_minimum_length_greater_14(self): # update password policy iam_client.update_account_password_policy(MinimumPasswordLength=20) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14 import ( + from prowler.providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14 import ( iam_password_policy_minimum_length_14, ) @@ -55,15 +55,15 @@ def test_iam_password_policy_minimum_length_less_14(self): # update password policy iam_client.update_account_password_policy(MinimumPasswordLength=10) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14 import ( + from prowler.providers.aws.services.iam.iam_password_policy_minimum_length_14.iam_password_policy_minimum_length_14 import ( iam_password_policy_minimum_length_14, ) diff --git a/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number_test.py b/tests/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number_test.py similarity index 59% rename from providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number_test.py rename to tests/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number_test.py index 0e02bdbbd64..7a2580bdb54 100644 --- a/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number_test.py +++ b/tests/providers/aws/services/iam/iam_password_policy_number/iam_password_policy_number_test.py @@ -11,15 +11,15 @@ def test_iam_password_policy_no_number_flag(self): # update password policy iam_client.update_account_password_policy(RequireNumbers=False) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number import ( + from prowler.providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number import ( iam_password_policy_number, ) @@ -33,15 +33,15 @@ def test_iam_password_policy_number_flag(self): # update password policy iam_client.update_account_password_policy(RequireNumbers=True) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number import ( + from prowler.providers.aws.services.iam.iam_password_policy_number.iam_password_policy_number import ( iam_password_policy_number, ) diff --git a/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24_test.py b/tests/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24_test.py similarity index 59% rename from providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24_test.py rename to tests/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24_test.py index 7eff03d4103..f6441b6398e 100644 --- a/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24_test.py +++ b/tests/providers/aws/services/iam/iam_password_policy_reuse_24/iam_password_policy_reuse_24_test.py @@ -11,15 +11,15 @@ def test_iam_password_policy_reuse_prevention_equal_24(self): # update password policy iam_client.update_account_password_policy(PasswordReusePrevention=24) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24 import ( + from prowler.providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24 import ( iam_password_policy_reuse_24, ) @@ -33,15 +33,15 @@ def test_iam_password_policy_reuse_prevention_less_24(self): # update password policy iam_client.update_account_password_policy(PasswordReusePrevention=20) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24 import ( + from prowler.providers.aws.services.iam.iam_password_policy_reuse_24.iam_password_policy_reuse_24 import ( iam_password_policy_reuse_24, ) diff --git a/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol_test.py b/tests/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol_test.py similarity index 59% rename from providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol_test.py rename to tests/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol_test.py index 92963bab81e..ccabf270db7 100644 --- a/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol_test.py +++ b/tests/providers/aws/services/iam/iam_password_policy_symbol/iam_password_policy_symbol_test.py @@ -11,15 +11,15 @@ def test_iam_password_policy_no_symbol_flag(self): # update password policy iam_client.update_account_password_policy(RequireSymbols=False) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol import ( + from prowler.providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol import ( iam_password_policy_symbol, ) @@ -33,15 +33,15 @@ def test_iam_password_policy_symbol_flag(self): # update password policy iam_client.update_account_password_policy(RequireSymbols=True) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol import ( + from prowler.providers.aws.services.iam.iam_password_policy_symbol.iam_password_policy_symbol import ( iam_password_policy_symbol, ) diff --git a/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase_test.py b/tests/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase_test.py similarity index 59% rename from providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase_test.py rename to tests/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase_test.py index 99d3a10fa08..79e4d595d48 100644 --- a/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase_test.py +++ b/tests/providers/aws/services/iam/iam_password_policy_uppercase/iam_password_policy_uppercase_test.py @@ -11,15 +11,15 @@ def test_iam_password_policy_no_uppercase_flag(self): # update password policy iam_client.update_account_password_policy(RequireUppercaseCharacters=False) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase import ( + from prowler.providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase import ( iam_password_policy_uppercase, ) @@ -33,15 +33,15 @@ def test_iam_password_policy_uppercase_flag(self): # update password policy iam_client.update_account_password_policy(RequireUppercaseCharacters=True) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase.iam_client", + "prowler.providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase import ( + from prowler.providers.aws.services.iam.iam_password_policy_uppercase.iam_password_policy_uppercase import ( iam_password_policy_uppercase, ) diff --git a/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation_test.py b/tests/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation_test.py similarity index 77% rename from providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation_test.py rename to tests/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation_test.py index a9c044d39e1..2a3b82b8c68 100644 --- a/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation_test.py +++ b/tests/providers/aws/services/iam/iam_policy_allows_privilege_escalation/iam_policy_allows_privilege_escalation_test.py @@ -22,15 +22,15 @@ def test_iam_policy_allows_privilege_escalation_sts(self): PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", + "prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( + from prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( iam_policy_allows_privilege_escalation, ) @@ -62,15 +62,15 @@ def test_iam_policy_not_allows_privilege_escalation(self): PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", + "prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( + from prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( iam_policy_allows_privilege_escalation, ) @@ -106,15 +106,15 @@ def test_iam_policy_not_allows_privilege_escalation_glue_GetDevEndpoints(self): PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", + "prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( + from prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( iam_policy_allows_privilege_escalation, ) @@ -161,15 +161,15 @@ def test_iam_policy_not_allows_privilege_escalation_dynamodb_PutItem(self): PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", + "prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( + from prowler.providers.aws.services.iam.iam_policy_allows_privilege_escalation.iam_policy_allows_privilege_escalation import ( iam_policy_allows_privilege_escalation, ) diff --git a/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles_test.py b/tests/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles_test.py similarity index 68% rename from providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles_test.py rename to tests/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles_test.py index f8dfd7bf680..1439763ac09 100644 --- a/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles_test.py +++ b/tests/providers/aws/services/iam/iam_policy_attached_only_to_group_or_roles/iam_policy_attached_only_to_group_or_roles_test.py @@ -25,14 +25,14 @@ def test_iam_user_attached_policy(self): )["Policy"]["Arn"] iam_client.attach_user_policy(UserName=user, PolicyArn=policyArn) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", + "prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( + from prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( iam_policy_attached_only_to_group_or_roles, ) @@ -61,14 +61,14 @@ def test_iam_user_attached_and_inline_policy(self): )["Policy"]["Arn"] iam_client.attach_user_policy(UserName=user, PolicyArn=policyArn) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", + "prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( + from prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( iam_policy_attached_only_to_group_or_roles, ) @@ -103,14 +103,14 @@ def test_iam_user_inline_policy(self): UserName=user, PolicyName=policyName, PolicyDocument=dumps(policyDocument) ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", + "prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( + from prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( iam_policy_attached_only_to_group_or_roles, ) @@ -125,14 +125,14 @@ def test_iam_user_no_policies(self): user = "test_no_policies" iam_client.create_user(UserName=user) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", + "prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( + from prowler.providers.aws.services.iam.iam_policy_attached_only_to_group_or_roles.iam_policy_attached_only_to_group_or_roles import ( iam_policy_attached_only_to_group_or_roles, ) diff --git a/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges_test.py b/tests/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges_test.py similarity index 75% rename from providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges_test.py rename to tests/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges_test.py index e7a1203c763..f7ddcf083fa 100644 --- a/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges_test.py +++ b/tests/providers/aws/services/iam/iam_policy_no_administrative_privileges/iam_policy_no_administrative_privileges_test.py @@ -22,14 +22,14 @@ def test_policy_administrative(self): PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges.iam_client", + "prowler.providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges import ( + from prowler.providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges import ( iam_policy_no_administrative_privileges, ) @@ -55,14 +55,14 @@ def test_policy_non_administrative(self): PolicyName=policy_name, PolicyDocument=dumps(policy_document) )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges.iam_client", + "prowler.providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges import ( + from prowler.providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges import ( iam_policy_no_administrative_privileges, ) @@ -102,14 +102,14 @@ def test_policy_administrative_and_non_administrative(self): PolicyDocument=dumps(policy_document_administrative), )["Policy"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges.iam_client", + "prowler.providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges import ( + from prowler.providers.aws.services.iam.iam_policy_no_administrative_privileges.iam_policy_no_administrative_privileges import ( iam_policy_no_administrative_privileges, ) diff --git a/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled_test.py b/tests/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled_test.py similarity index 71% rename from providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled_test.py rename to tests/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled_test.py index 6d81bfa0fc3..8126f48fc09 100644 --- a/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled_test.py +++ b/tests/providers/aws/services/iam/iam_root_hardware_mfa_enabled/iam_root_hardware_mfa_enabled_test.py @@ -11,14 +11,14 @@ def test_root_hardware_virtual_mfa_enabled(self): iam = client("iam") mfa_device_name = "mfa-test" iam.create_virtual_mfa_device(VirtualMFADeviceName=mfa_device_name) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled.iam_client", + "prowler.providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled import ( + from prowler.providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled import ( iam_root_hardware_mfa_enabled, ) @@ -39,14 +39,14 @@ def test_root_hardware_virtual_hardware_mfa_enabled(self): iam = client("iam") mfa_device_name = "mfa-test" iam.create_virtual_mfa_device(VirtualMFADeviceName=mfa_device_name) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled.iam_client", + "prowler.providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled import ( + from prowler.providers.aws.services.iam.iam_root_hardware_mfa_enabled.iam_root_hardware_mfa_enabled import ( iam_root_hardware_mfa_enabled, ) diff --git a/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled_test.py b/tests/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled_test.py similarity index 74% rename from providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled_test.py rename to tests/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled_test.py index 7ce1984e4de..7eeddfcb1b9 100644 --- a/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled_test.py +++ b/tests/providers/aws/services/iam/iam_root_mfa_enabled/iam_root_mfa_enabled_test.py @@ -11,14 +11,14 @@ def test_root_mfa_not_enabled(self): iam_client = client("iam") user = "test-user" iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled.iam_client", + "prowler.providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled import ( + from prowler.providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled import ( iam_root_mfa_enabled, ) @@ -42,14 +42,14 @@ def test_root_mfa_enabled(self): iam_client = client("iam") user = "test-user" iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled.iam_client", + "prowler.providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled import ( + from prowler.providers.aws.services.iam.iam_root_mfa_enabled.iam_root_mfa_enabled import ( iam_root_mfa_enabled, ) diff --git a/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days_test.py b/tests/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days_test.py similarity index 71% rename from providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days_test.py rename to tests/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days_test.py index 48c1e52b006..e5169d12621 100644 --- a/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days_test.py +++ b/tests/providers/aws/services/iam/iam_rotate_access_key_90_days/iam_rotate_access_key_90_days_test.py @@ -12,14 +12,14 @@ def test_user_no_access_keys(self): user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days.iam_client", + "prowler.providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days import ( + from prowler.providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days import ( iam_rotate_access_key_90_days, ) @@ -42,14 +42,14 @@ def test_user_access_key_1_not_rotated(self): user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days.iam_client", + "prowler.providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days import ( + from prowler.providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days import ( iam_rotate_access_key_90_days, ) @@ -76,14 +76,14 @@ def test_user_access_key_2_not_rotated(self): user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days.iam_client", + "prowler.providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days import ( + from prowler.providers.aws.services.iam.iam_rotate_access_key_90_days.iam_rotate_access_key_90_days import ( iam_rotate_access_key_90_days, ) diff --git a/providers/aws/services/iam/iam_service_test.py b/tests/providers/aws/services/iam/iam_service_test.py similarity index 99% rename from providers/aws/services/iam/iam_service_test.py rename to tests/providers/aws/services/iam/iam_service_test.py index 1d4399a588a..d96b2d33b02 100644 --- a/providers/aws/services/iam/iam_service_test.py +++ b/tests/providers/aws/services/iam/iam_service_test.py @@ -4,8 +4,8 @@ from boto3 import client, session from moto import mock_iam -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.iam.iam_service import IAM +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.iam.iam_service import IAM AWS_ACCOUNT_NUMBER = 123456789012 diff --git a/providers/aws/services/iam/iam_support_role_created/iam_support_role_created_test.py b/tests/providers/aws/services/iam/iam_support_role_created/iam_support_role_created_test.py similarity index 74% rename from providers/aws/services/iam/iam_support_role_created/iam_support_role_created_test.py rename to tests/providers/aws/services/iam/iam_support_role_created/iam_support_role_created_test.py index d4e6bd1d6a7..92b1c806f9e 100644 --- a/providers/aws/services/iam/iam_support_role_created/iam_support_role_created_test.py +++ b/tests/providers/aws/services/iam/iam_support_role_created/iam_support_role_created_test.py @@ -29,14 +29,14 @@ def test_support_role_created(self): PolicyArn="arn:aws:iam::aws:policy/aws-service-role/AWSSupportServiceRolePolicy", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_support_role_created.iam_support_role_created.iam_client", + "prowler.providers.aws.services.iam.iam_support_role_created.iam_support_role_created.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_support_role_created.iam_support_role_created import ( + from prowler.providers.aws.services.iam.iam_support_role_created.iam_support_role_created import ( iam_support_role_created, ) @@ -56,14 +56,14 @@ def test_support_role_created(self): @mock_iam def test_no_support_role_created(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_support_role_created.iam_support_role_created.iam_client", + "prowler.providers.aws.services.iam.iam_support_role_created.iam_support_role_created.iam_client", new=IAM(current_audit_info), ): - from providers.aws.services.iam.iam_support_role_created.iam_support_role_created import ( + from prowler.providers.aws.services.iam.iam_support_role_created.iam_support_role_created import ( iam_support_role_created, ) diff --git a/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled_test.py b/tests/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled_test.py similarity index 70% rename from providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled_test.py rename to tests/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled_test.py index cb380e87568..6c95dedcc1f 100644 --- a/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled_test.py +++ b/tests/providers/aws/services/iam/iam_user_hardware_mfa_enabled/iam_user_hardware_mfa_enabled_test.py @@ -11,14 +11,14 @@ def test_user_no_mfa_devices(self): iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled.iam_client", + "prowler.providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled import ( + from prowler.providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled import ( iam_user_hardware_mfa_enabled, ) @@ -39,14 +39,14 @@ def test_user_virtual_mfa_devices(self): iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM, MFADevice + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM, MFADevice with mock.patch( - "providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled.iam_client", + "prowler.providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled import ( + from prowler.providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled import ( iam_user_hardware_mfa_enabled, ) @@ -73,14 +73,14 @@ def test_user_virtual_sms_mfa_devices(self): iam_client = client("iam") user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM, MFADevice + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM, MFADevice with mock.patch( - "providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled.iam_client", + "prowler.providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled import ( + from prowler.providers.aws.services.iam.iam_user_hardware_mfa_enabled.iam_user_hardware_mfa_enabled import ( iam_user_hardware_mfa_enabled, ) diff --git a/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access_test.py b/tests/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access_test.py similarity index 68% rename from providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access_test.py rename to tests/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access_test.py index fe3f0be14cc..66dc530bfa8 100644 --- a/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access_test.py +++ b/tests/providers/aws/services/iam/iam_user_mfa_enabled_console_access/iam_user_mfa_enabled_console_access_test.py @@ -11,14 +11,14 @@ def test_user_not_password_console_enabled(self): user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access.iam_client", + "prowler.providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access import ( + from prowler.providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access import ( iam_user_mfa_enabled_console_access, ) @@ -41,14 +41,14 @@ def test_user_password_console_and_mfa_enabled(self): user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access.iam_client", + "prowler.providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access import ( + from prowler.providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access import ( iam_user_mfa_enabled_console_access, ) @@ -72,14 +72,14 @@ def test_user_password_console_enabled_and_mfa_not_enabled(self): user = "test-user" arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access.iam_client", + "prowler.providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access import ( + from prowler.providers.aws.services.iam.iam_user_mfa_enabled_console_access.iam_user_mfa_enabled_console_access import ( iam_user_mfa_enabled_console_access, ) diff --git a/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key_test.py b/tests/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key_test.py similarity index 77% rename from providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key_test.py rename to tests/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key_test.py index 4c0a5419105..a36343a9357 100644 --- a/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key_test.py +++ b/tests/providers/aws/services/iam/iam_user_no_setup_initial_access_key/iam_user_no_setup_initial_access_key_test.py @@ -14,14 +14,14 @@ def test_setup_access_key_1_fail(self): csv_reader = DictReader(credential_lines, delimiter=",") credential_list = list(csv_reader) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key import ( + from prowler.providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key import ( iam_user_no_setup_initial_access_key, ) @@ -40,14 +40,14 @@ def test_setup_access_key_2_fail(self): csv_reader = DictReader(credential_lines, delimiter=",") credential_list = list(csv_reader) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key import ( + from prowler.providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key import ( iam_user_no_setup_initial_access_key, ) @@ -66,14 +66,14 @@ def test_setup_access_key_pass(self): csv_reader = DictReader(credential_lines, delimiter=",") credential_list = list(csv_reader) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key.iam_client", new=IAM(current_audit_info), ) as service_client: - from providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key import ( + from prowler.providers.aws.services.iam.iam_user_no_setup_initial_access_key.iam_user_no_setup_initial_access_key import ( iam_user_no_setup_initial_access_key, ) diff --git a/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key_test.py b/tests/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key_test.py similarity index 65% rename from providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key_test.py rename to tests/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key_test.py index e0752b3c80f..1cb8fa5eda6 100644 --- a/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key_test.py +++ b/tests/providers/aws/services/iam/iam_user_two_active_access_key/iam_user_two_active_access_key_test.py @@ -17,15 +17,15 @@ def test_iam_user_two_active_access_key(self): # Create Access Key 2 iam_client.create_access_key(UserName=user) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( + from prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( iam_user_two_active_access_key, ) @@ -49,15 +49,15 @@ def test_iam_user_one_active_access_key(self): # Create Access Key 1 iam_client.create_access_key(UserName=user) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( + from prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( iam_user_two_active_access_key, ) @@ -79,15 +79,15 @@ def test_iam_user_without_active_access_key(self): user = "test1" user_arn = iam_client.create_user(UserName=user)["User"]["Arn"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( + from prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( iam_user_two_active_access_key, ) @@ -104,15 +104,15 @@ def test_iam_user_without_active_access_key(self): @mock_iam def test_iam_no_users(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.iam.iam_service import IAM + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.iam.iam_service import IAM with mock.patch( - "providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", + "prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key.iam_client", new=IAM(current_audit_info), ): # Test Check - from providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( + from prowler.providers.aws.services.iam.iam_user_two_active_access_key.iam_user_two_active_access_key import ( iam_user_two_active_access_key, ) diff --git a/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used_test.py b/tests/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used_test.py similarity index 69% rename from providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used_test.py rename to tests/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used_test.py index fe94e29b125..109d7bed47e 100644 --- a/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used_test.py +++ b/tests/providers/aws/services/kms/kms_cmk_are_used/kms_cmk_are_used_test.py @@ -9,17 +9,17 @@ class Test_kms_cmk_are_used: @mock_kms def test_kms_no_keys(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", + "prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( + from prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( kms_cmk_are_used, ) @@ -34,17 +34,17 @@ def test_kms_cmk_are_used(self): kms_client = client("kms", region_name=AWS_REGION) # Create enabled KMS key key = kms_client.create_key()["KeyMetadata"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", + "prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( + from prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( kms_cmk_are_used, ) @@ -64,17 +64,17 @@ def test_kms_key_with_deletion(self): # Creaty KMS key with deletion key = kms_client.create_key()["KeyMetadata"] kms_client.schedule_key_deletion(KeyId=key["KeyId"]) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", + "prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( + from prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( kms_cmk_are_used, ) @@ -97,17 +97,17 @@ def test_kms_disabled_key(self): # Creaty KMS key with deletion key = kms_client.create_key()["KeyMetadata"] kms_client.disable_key(KeyId=key["KeyId"]) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", + "prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( + from prowler.providers.aws.services.kms.kms_cmk_are_used.kms_cmk_are_used import ( kms_cmk_are_used, ) diff --git a/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled_test.py b/tests/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled_test.py similarity index 67% rename from providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled_test.py rename to tests/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled_test.py index bd0c81aec7c..5d3c173402a 100644 --- a/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled_test.py +++ b/tests/providers/aws/services/kms/kms_cmk_rotation_enabled/kms_cmk_rotation_enabled_test.py @@ -9,17 +9,17 @@ class Test_kms_cmk_rotation_enabled: @mock_kms def test_kms_no_key(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled.kms_client", + "prowler.providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled import ( + from prowler.providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled import ( kms_cmk_rotation_enabled, ) @@ -35,17 +35,17 @@ def test_kms_cmk_rotation_enabled(self): # Creaty KMS key with rotation key = kms_client.create_key()["KeyMetadata"] kms_client.enable_key_rotation(KeyId=key["KeyId"]) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled.kms_client", + "prowler.providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled import ( + from prowler.providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled import ( kms_cmk_rotation_enabled, ) @@ -67,17 +67,17 @@ def test_kms_cmk_rotation_disabled(self): kms_client = client("kms", region_name=AWS_REGION) # Creaty KMS key without rotation key = kms_client.create_key()["KeyMetadata"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled.kms_client", + "prowler.providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled import ( + from prowler.providers.aws.services.kms.kms_cmk_rotation_enabled.kms_cmk_rotation_enabled import ( kms_cmk_rotation_enabled, ) diff --git a/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible_test.py b/tests/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible_test.py similarity index 70% rename from providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible_test.py rename to tests/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible_test.py index b222bc6664c..bd1bcce770c 100644 --- a/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/kms/kms_key_not_publicly_accessible/kms_key_not_publicly_accessible_test.py @@ -10,17 +10,17 @@ class Test_kms_key_not_publicly_accessible: @mock_kms def test_no_kms_keys(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible.kms_client", + "prowler.providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible import ( + from prowler.providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible import ( kms_key_not_publicly_accessible, ) @@ -35,17 +35,17 @@ def test_kms_key_not_publicly_accessible(self): kms_client = client("kms", region_name=AWS_REGION) # Creaty KMS key without policy key = kms_client.create_key()["KeyMetadata"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible.kms_client", + "prowler.providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible import ( + from prowler.providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible import ( kms_key_not_publicly_accessible, ) @@ -83,17 +83,17 @@ def test_kms_key_public_accessible(self): } ) )["KeyMetadata"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.kms.kms_service import KMS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.kms.kms_service import KMS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible.kms_client", + "prowler.providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible.kms_client", new=KMS(current_audit_info), ): # Test Check - from providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible import ( + from prowler.providers.aws.services.kms.kms_key_not_publicly_accessible.kms_key_not_publicly_accessible import ( kms_key_not_publicly_accessible, ) diff --git a/providers/aws/services/kms/kms_service_test.py b/tests/providers/aws/services/kms/kms_service_test.py similarity index 97% rename from providers/aws/services/kms/kms_service_test.py rename to tests/providers/aws/services/kms/kms_service_test.py index 09ca59fb8da..5485620eaa4 100644 --- a/providers/aws/services/kms/kms_service_test.py +++ b/tests/providers/aws/services/kms/kms_service_test.py @@ -3,8 +3,8 @@ from boto3 import client, session from moto import mock_kms -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.kms.kms_service import KMS +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.kms.kms_service import KMS AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/macie/macie_is_enabled/macie_is_enabled_test.py b/tests/providers/aws/services/macie/macie_is_enabled/macie_is_enabled_test.py similarity index 77% rename from providers/aws/services/macie/macie_is_enabled/macie_is_enabled_test.py rename to tests/providers/aws/services/macie/macie_is_enabled/macie_is_enabled_test.py index 635e4bec084..d270aed447b 100644 --- a/providers/aws/services/macie/macie_is_enabled/macie_is_enabled_test.py +++ b/tests/providers/aws/services/macie/macie_is_enabled/macie_is_enabled_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.macie.macie_service import Session +from prowler.providers.aws.services.macie.macie_service import Session class Test_macie_is_enabled: @@ -13,11 +13,11 @@ def test_macie_disabled(self): ) ] with mock.patch( - "providers.aws.services.macie.macie_service.Macie", + "prowler.providers.aws.services.macie.macie_service.Macie", new=macie_client, ): # Test Check - from providers.aws.services.macie.macie_is_enabled.macie_is_enabled import ( + from prowler.providers.aws.services.macie.macie_is_enabled.macie_is_enabled import ( macie_is_enabled, ) @@ -38,11 +38,11 @@ def test_macie_enabled(self): ) ] with mock.patch( - "providers.aws.services.macie.macie_service.Macie", + "prowler.providers.aws.services.macie.macie_service.Macie", new=macie_client, ): # Test Check - from providers.aws.services.macie.macie_is_enabled.macie_is_enabled import ( + from prowler.providers.aws.services.macie.macie_is_enabled.macie_is_enabled import ( macie_is_enabled, ) @@ -63,11 +63,11 @@ def test_macie_suspended(self): ) ] with mock.patch( - "providers.aws.services.macie.macie_service.Macie", + "prowler.providers.aws.services.macie.macie_service.Macie", new=macie_client, ): # Test Check - from providers.aws.services.macie.macie_is_enabled.macie_is_enabled import ( + from prowler.providers.aws.services.macie.macie_is_enabled.macie_is_enabled import ( macie_is_enabled, ) diff --git a/providers/aws/services/macie/macie_service_test.py b/tests/providers/aws/services/macie/macie_service_test.py similarity index 90% rename from providers/aws/services/macie/macie_service_test.py rename to tests/providers/aws/services/macie/macie_service_test.py index 0c664fd4044..e505ea060f2 100644 --- a/providers/aws/services/macie/macie_service_test.py +++ b/tests/providers/aws/services/macie/macie_service_test.py @@ -3,8 +3,8 @@ import botocore -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.macie.macie_service import Macie, Session +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.macie.macie_service import Macie, Session # Mock Test Region AWS_REGION = "eu-west-1" @@ -41,7 +41,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.macie.macie_service.generate_regional_clients", + "prowler.providers.aws.services.macie.macie_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_Macie_Service: diff --git a/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled_test.py similarity index 75% rename from providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled_test.py index 0a84fb33cbb..72436e9c034 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_audit_logging_enabled/opensearch_service_domains_audit_logging_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import ( +from prowler.providers.aws.services.opensearch.opensearch_service import ( OpenSearchDomain, PublishingLoggingOption, ) @@ -18,10 +18,10 @@ def test_no_domains(self): opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_audit_logging_enabled.opensearch_service_domains_audit_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_audit_logging_enabled.opensearch_service_domains_audit_logging_enabled import ( opensearch_service_domains_audit_logging_enabled, ) @@ -38,10 +38,10 @@ def test_no_logging_enabled(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_audit_logging_enabled.opensearch_service_domains_audit_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_audit_logging_enabled.opensearch_service_domains_audit_logging_enabled import ( opensearch_service_domains_audit_logging_enabled, ) @@ -65,10 +65,10 @@ def test_logging_AUDIT_LOGS_enabled(self): ) with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_audit_logging_enabled.opensearch_service_domains_audit_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_audit_logging_enabled.opensearch_service_domains_audit_logging_enabled import ( opensearch_service_domains_audit_logging_enabled, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled_test.py similarity index 78% rename from providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled_test.py index f53e076afb6..41de6229848 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_cloudwatch_logging_enabled/opensearch_service_domains_cloudwatch_logging_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import ( +from prowler.providers.aws.services.opensearch.opensearch_service import ( OpenSearchDomain, PublishingLoggingOption, ) @@ -18,10 +18,10 @@ def test_no_domains(self): opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( opensearch_service_domains_cloudwatch_logging_enabled, ) @@ -38,10 +38,10 @@ def test_no_logging_enabled(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( opensearch_service_domains_cloudwatch_logging_enabled, ) @@ -68,10 +68,10 @@ def test_logging_SEARCH_SLOW_LOGS_enabled(self): ) with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( opensearch_service_domains_cloudwatch_logging_enabled, ) @@ -98,10 +98,10 @@ def test_logging_INDEX_SLOW_LOGS_enabled(self): ) with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( opensearch_service_domains_cloudwatch_logging_enabled, ) @@ -130,10 +130,10 @@ def test_logging_INDEX_SLOW_LOGS_and_SEARCH_SLOW_LOGS_enabled(self): opensearch_client.opensearch_domains[0].logging.extend(logging_options) with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_cloudwatch_logging_enabled.opensearch_service_domains_cloudwatch_logging_enabled import ( opensearch_service_domains_cloudwatch_logging_enabled, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled_test.py similarity index 75% rename from providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled_test.py index ed2514edc13..c8bce4ced40 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_encryption_at_rest_enabled/opensearch_service_domains_encryption_at_rest_enabled_test.py @@ -1,7 +1,9 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import OpenSearchDomain +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchDomain, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +17,10 @@ def test_no_domains(self): opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_encryption_at_rest_enabled.opensearch_service_domains_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_encryption_at_rest_enabled.opensearch_service_domains_encryption_at_rest_enabled import ( opensearch_service_domains_encryption_at_rest_enabled, ) @@ -40,10 +42,10 @@ def test_no_encryption_at_rest_enabled(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_encryption_at_rest_enabled.opensearch_service_domains_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_encryption_at_rest_enabled.opensearch_service_domains_encryption_at_rest_enabled import ( opensearch_service_domains_encryption_at_rest_enabled, ) @@ -71,10 +73,10 @@ def test_encryption_at_rest_enabled(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_encryption_at_rest_enabled.opensearch_service_domains_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_encryption_at_rest_enabled.opensearch_service_domains_encryption_at_rest_enabled import ( opensearch_service_domains_encryption_at_rest_enabled, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced_test.py similarity index 73% rename from providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced_test.py index cccf68fbad5..07816e06e2c 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_https_communications_enforced/opensearch_service_domains_https_communications_enforced_test.py @@ -1,7 +1,9 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import OpenSearchDomain +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchDomain, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +17,10 @@ def test_no_domains(self): opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_https_communications_enforced.opensearch_service_domains_https_communications_enforced import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_https_communications_enforced.opensearch_service_domains_https_communications_enforced import ( opensearch_service_domains_https_communications_enforced, ) @@ -37,10 +39,10 @@ def test_no_https_enabled(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_https_communications_enforced.opensearch_service_domains_https_communications_enforced import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_https_communications_enforced.opensearch_service_domains_https_communications_enforced import ( opensearch_service_domains_https_communications_enforced, ) @@ -65,10 +67,10 @@ def test_https_enabled(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_https_communications_enforced.opensearch_service_domains_https_communications_enforced import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_https_communications_enforced.opensearch_service_domains_https_communications_enforced import ( opensearch_service_domains_https_communications_enforced, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled_test.py similarity index 75% rename from providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled_test.py index e878faa1e3b..0d205022962 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_internal_user_database_enabled/opensearch_service_domains_internal_user_database_enabled_test.py @@ -1,7 +1,9 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import OpenSearchDomain +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchDomain, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +17,10 @@ def test_no_domains(self): opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_internal_user_database_enabled.opensearch_service_domains_internal_user_database_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_internal_user_database_enabled.opensearch_service_domains_internal_user_database_enabled import ( opensearch_service_domains_internal_user_database_enabled, ) @@ -40,10 +42,10 @@ def test_internal_database_disabled(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_internal_user_database_enabled.opensearch_service_domains_internal_user_database_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_internal_user_database_enabled.opensearch_service_domains_internal_user_database_enabled import ( opensearch_service_domains_internal_user_database_enabled, ) @@ -72,10 +74,10 @@ def test_internal_database_enabled(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_internal_user_database_enabled.opensearch_service_domains_internal_user_database_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_internal_user_database_enabled.opensearch_service_domains_internal_user_database_enabled import ( opensearch_service_domains_internal_user_database_enabled, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled_test.py similarity index 75% rename from providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled_test.py index d7d3272a334..018d96d3c22 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_node_to_node_encryption_enabled/opensearch_service_domains_node_to_node_encryption_enabled_test.py @@ -1,7 +1,9 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import OpenSearchDomain +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchDomain, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +17,10 @@ def test_no_domains(self): opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_node_to_node_encryption_enabled.opensearch_service_domains_node_to_node_encryption_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_node_to_node_encryption_enabled.opensearch_service_domains_node_to_node_encryption_enabled import ( opensearch_service_domains_node_to_node_encryption_enabled, ) @@ -40,10 +42,10 @@ def test_no_encryption_enabled(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_node_to_node_encryption_enabled.opensearch_service_domains_node_to_node_encryption_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_node_to_node_encryption_enabled.opensearch_service_domains_node_to_node_encryption_enabled import ( opensearch_service_domains_node_to_node_encryption_enabled, ) @@ -72,10 +74,10 @@ def test_encryption_enabled(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_node_to_node_encryption_enabled.opensearch_service_domains_node_to_node_encryption_enabled import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_node_to_node_encryption_enabled.opensearch_service_domains_node_to_node_encryption_enabled import ( opensearch_service_domains_node_to_node_encryption_enabled, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible_test.py similarity index 82% rename from providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible_test.py index d41e547c7a3..8238d6a78b4 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_not_publicly_accessible/opensearch_service_domains_not_publicly_accessible_test.py @@ -1,6 +1,8 @@ from unittest import mock -from providers.aws.services.opensearch.opensearch_service import OpenSearchDomain +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchDomain, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -76,10 +78,10 @@ def test_no_domains(self): opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( opensearch_service_domains_not_publicly_accessible, ) @@ -101,10 +103,10 @@ def test_policy_data_restricted(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( opensearch_service_domains_not_publicly_accessible, ) @@ -133,10 +135,10 @@ def test_policy_data_not_restricted_with_principal_AWS(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( opensearch_service_domains_not_publicly_accessible, ) @@ -165,10 +167,10 @@ def test_policy_data_not_restricted_with_principal_no_AWS(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( opensearch_service_domains_not_publicly_accessible, ) @@ -197,10 +199,10 @@ def test_policy_data_not_restricted_ip_full(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( opensearch_service_domains_not_publicly_accessible, ) @@ -229,10 +231,10 @@ def test_policy_data_not_restricted_whole_internet(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_not_publicly_accessible.opensearch_service_domains_not_publicly_accessible import ( opensearch_service_domains_not_publicly_accessible, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version_test.py similarity index 74% rename from providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version_test.py index 01f21238671..96fd387dfbc 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_updated_to_the_latest_service_software_version/opensearch_service_domains_updated_to_the_latest_service_software_version_test.py @@ -1,7 +1,9 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import OpenSearchDomain +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchDomain, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +17,10 @@ def test_no_domains(self): opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_updated_to_the_latest_service_software_version.opensearch_service_domains_updated_to_the_latest_service_software_version import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_updated_to_the_latest_service_software_version.opensearch_service_domains_updated_to_the_latest_service_software_version import ( opensearch_service_domains_updated_to_the_latest_service_software_version, ) @@ -42,10 +44,10 @@ def test_internal_update_available(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_updated_to_the_latest_service_software_version.opensearch_service_domains_updated_to_the_latest_service_software_version import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_updated_to_the_latest_service_software_version.opensearch_service_domains_updated_to_the_latest_service_software_version import ( opensearch_service_domains_updated_to_the_latest_service_software_version, ) @@ -75,10 +77,10 @@ def test_internal_database_enabled(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_updated_to_the_latest_service_software_version.opensearch_service_domains_updated_to_the_latest_service_software_version import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_updated_to_the_latest_service_software_version.opensearch_service_domains_updated_to_the_latest_service_software_version import ( opensearch_service_domains_updated_to_the_latest_service_software_version, ) diff --git a/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana_test.py b/tests/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana_test.py similarity index 74% rename from providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana_test.py index 1600021c30b..49393b22133 100644 --- a/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_domains_use_cognito_authentication_for_kibana/opensearch_service_domains_use_cognito_authentication_for_kibana_test.py @@ -1,7 +1,9 @@ from re import search from unittest import mock -from providers.aws.services.opensearch.opensearch_service import OpenSearchDomain +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchDomain, +) AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +17,10 @@ def test_no_domains(self): opensearch_client = mock.MagicMock opensearch_client.opensearch_domains = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_use_cognito_authentication_for_kibana.opensearch_service_domains_use_cognito_authentication_for_kibana import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_use_cognito_authentication_for_kibana.opensearch_service_domains_use_cognito_authentication_for_kibana import ( opensearch_service_domains_use_cognito_authentication_for_kibana, ) @@ -40,10 +42,10 @@ def test_no_cognito_enabled(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_use_cognito_authentication_for_kibana.opensearch_service_domains_use_cognito_authentication_for_kibana import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_use_cognito_authentication_for_kibana.opensearch_service_domains_use_cognito_authentication_for_kibana import ( opensearch_service_domains_use_cognito_authentication_for_kibana, ) @@ -72,10 +74,10 @@ def test_cognito_enabled(self): opensearch_client.opensearch_domains[0].logging = [] with mock.patch( - "providers.aws.services.opensearch.opensearch_service.OpenSearchService", + "prowler.providers.aws.services.opensearch.opensearch_service.OpenSearchService", opensearch_client, ): - from providers.aws.services.opensearch.opensearch_service_domains_use_cognito_authentication_for_kibana.opensearch_service_domains_use_cognito_authentication_for_kibana import ( + from prowler.providers.aws.services.opensearch.opensearch_service_domains_use_cognito_authentication_for_kibana.opensearch_service_domains_use_cognito_authentication_for_kibana import ( opensearch_service_domains_use_cognito_authentication_for_kibana, ) diff --git a/providers/aws/services/opensearch/opensearch_service_test.py b/tests/providers/aws/services/opensearch/opensearch_service_test.py similarity index 96% rename from providers/aws/services/opensearch/opensearch_service_test.py rename to tests/providers/aws/services/opensearch/opensearch_service_test.py index 79b34e9afb9..84a4b1d01bc 100644 --- a/providers/aws/services/opensearch/opensearch_service_test.py +++ b/tests/providers/aws/services/opensearch/opensearch_service_test.py @@ -4,8 +4,10 @@ import botocore from boto3 import session -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.opensearch.opensearch_service import OpenSearchService +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.opensearch.opensearch_service import ( + OpenSearchService, +) AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -91,7 +93,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.opensearch.opensearch_service.generate_regional_clients", + "prowler.providers.aws.services.opensearch.opensearch_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_OpenSearchService_Service: diff --git a/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled_test.py b/tests/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled_test.py similarity index 68% rename from providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled_test.py rename to tests/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled_test.py index db4a21de0d2..9cfd1670830 100644 --- a/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled_test.py +++ b/tests/providers/aws/services/rds/rds_instance_backup_enabled/rds_instance_backup_enabled_test.py @@ -10,17 +10,17 @@ class Test_rds_instance_backup_enabled: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled import ( rds_instance_backup_enabled, ) @@ -39,17 +39,17 @@ def test_rds_instance_no_backup(self): DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled.rds_client", new=RDS(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled import ( rds_instance_backup_enabled, ) @@ -77,17 +77,17 @@ def test_rds_instance_with_backup(self): DBInstanceClass="db.m1.small", BackupRetentionPeriod=10, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_backup_enabled.rds_instance_backup_enabled import ( rds_instance_backup_enabled, ) diff --git a/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection_test.py b/tests/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection_test.py similarity index 66% rename from providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection_test.py rename to tests/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection_test.py index c38ae37d1b8..b6361a52f59 100644 --- a/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection_test.py +++ b/tests/providers/aws/services/rds/rds_instance_deletion_protection/rds_instance_deletion_protection_test.py @@ -10,17 +10,17 @@ class Test_rds_instance_deletion_protection: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection.rds_client", + "prowler.providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection import ( + from prowler.providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection import ( rds_instance_deletion_protection, ) @@ -39,17 +39,17 @@ def test_rds_instance_no_deletion_protection(self): DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection.rds_client", + "prowler.providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection import ( + from prowler.providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection import ( rds_instance_deletion_protection, ) @@ -75,17 +75,17 @@ def test_rds_instance_with_encryption(self): DBInstanceClass="db.m1.small", DeletionProtection=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection.rds_client", + "prowler.providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection import ( + from prowler.providers.aws.services.rds.rds_instance_deletion_protection.rds_instance_deletion_protection import ( rds_instance_deletion_protection, ) diff --git a/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled_test.py b/tests/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled_test.py similarity index 66% rename from providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled_test.py rename to tests/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled_test.py index 1081b9a2353..ce693b03a89 100644 --- a/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled_test.py +++ b/tests/providers/aws/services/rds/rds_instance_enhanced_monitoring_enabled/rds_instance_enhanced_monitoring_enabled_test.py @@ -10,17 +10,17 @@ class Test_rds_instance_enhanced_monitoring_enabled: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled import ( rds_instance_enhanced_monitoring_enabled, ) @@ -39,17 +39,17 @@ def test_rds_instance_no_monitoring(self): DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled import ( rds_instance_enhanced_monitoring_enabled, ) @@ -74,17 +74,17 @@ def test_rds_instance_with_monitoring(self): DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled.rds_client", new=RDS(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_enhanced_monitoring_enabled.rds_instance_enhanced_monitoring_enabled import ( rds_instance_enhanced_monitoring_enabled, ) diff --git a/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs_test.py b/tests/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs_test.py similarity index 65% rename from providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs_test.py rename to tests/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs_test.py index 3a2b4081a76..7818689a8e0 100644 --- a/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs_test.py +++ b/tests/providers/aws/services/rds/rds_instance_integration_cloudwatch_logs/rds_instance_integration_cloudwatch_logs_test.py @@ -10,17 +10,17 @@ class Test_rds_instance_integration_cloudwatch_logs: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs.rds_client", + "prowler.providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs import ( + from prowler.providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs import ( rds_instance_integration_cloudwatch_logs, ) @@ -39,17 +39,17 @@ def test_rds_instance_no_logs(self): DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs.rds_client", + "prowler.providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs import ( + from prowler.providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs import ( rds_instance_integration_cloudwatch_logs, ) @@ -75,17 +75,17 @@ def test_rds_instance_with_logs(self): DBInstanceClass="db.m1.small", EnableCloudwatchLogsExports=["audit", "error"], ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs.rds_client", + "prowler.providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs import ( + from prowler.providers.aws.services.rds.rds_instance_integration_cloudwatch_logs.rds_instance_integration_cloudwatch_logs import ( rds_instance_integration_cloudwatch_logs, ) diff --git a/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled_test.py b/tests/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled_test.py similarity index 65% rename from providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled_test.py rename to tests/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled_test.py index 7bc4d2d426c..5f9d0f591b9 100644 --- a/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled_test.py +++ b/tests/providers/aws/services/rds/rds_instance_minor_version_upgrade_enabled/rds_instance_minor_version_upgrade_enabled_test.py @@ -10,17 +10,17 @@ class Test_rds_instance_minor_version_upgrade_enabled: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled import ( rds_instance_minor_version_upgrade_enabled, ) @@ -39,17 +39,17 @@ def test_rds_instance_no_auto_upgrade(self): DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled import ( rds_instance_minor_version_upgrade_enabled, ) @@ -75,17 +75,17 @@ def test_rds_instance_with_auto_upgrade(self): DBInstanceClass="db.m1.small", AutoMinorVersionUpgrade=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled.rds_client", + "prowler.providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled import ( + from prowler.providers.aws.services.rds.rds_instance_minor_version_upgrade_enabled.rds_instance_minor_version_upgrade_enabled import ( rds_instance_minor_version_upgrade_enabled, ) diff --git a/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az_test.py b/tests/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az_test.py similarity index 68% rename from providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az_test.py rename to tests/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az_test.py index 5168963c743..ee53e8ae44b 100644 --- a/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az_test.py +++ b/tests/providers/aws/services/rds/rds_instance_multi_az/rds_instance_multi_az_test.py @@ -10,17 +10,17 @@ class Test_rds_instance_multi_az: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az.rds_client", + "prowler.providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az import ( + from prowler.providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az import ( rds_instance_multi_az, ) @@ -39,17 +39,17 @@ def test_rds_instance_no_multi_az(self): DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az.rds_client", + "prowler.providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az import ( + from prowler.providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az import ( rds_instance_multi_az, ) @@ -75,17 +75,17 @@ def test_rds_instance_multi_az(self): DBInstanceClass="db.m1.small", MultiAZ=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az.rds_client", + "prowler.providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az import ( + from prowler.providers.aws.services.rds.rds_instance_multi_az.rds_instance_multi_az import ( rds_instance_multi_az, ) diff --git a/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access_test.py b/tests/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access_test.py similarity index 67% rename from providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access_test.py rename to tests/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access_test.py index d9b678cb847..bfd857eb76b 100644 --- a/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access_test.py +++ b/tests/providers/aws/services/rds/rds_instance_no_public_access/rds_instance_no_public_access_test.py @@ -10,17 +10,17 @@ class Test_rds_instance_no_public_access: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access import ( + from prowler.providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access import ( rds_instance_no_public_access, ) @@ -39,17 +39,17 @@ def test_rds_instance_private(self): DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access import ( + from prowler.providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access import ( rds_instance_no_public_access, ) @@ -75,17 +75,17 @@ def test_rds_instance_public(self): DBInstanceClass="db.m1.small", PubliclyAccessible=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access import ( + from prowler.providers.aws.services.rds.rds_instance_no_public_access.rds_instance_no_public_access import ( rds_instance_no_public_access, ) diff --git a/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted_test.py b/tests/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted_test.py similarity index 66% rename from providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted_test.py rename to tests/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted_test.py index 7d3bae30882..ecac6dcdf85 100644 --- a/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted_test.py +++ b/tests/providers/aws/services/rds/rds_instance_storage_encrypted/rds_instance_storage_encrypted_test.py @@ -10,17 +10,17 @@ class Test_rds_instance_storage_encrypted: @mock_rds def test_rds_no_instances(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted.rds_client", + "prowler.providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted import ( + from prowler.providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted import ( rds_instance_storage_encrypted, ) @@ -39,17 +39,17 @@ def test_rds_instance_no_encryption(self): DBName="staging-postgres", DBInstanceClass="db.m1.small", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted.rds_client", + "prowler.providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted import ( + from prowler.providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted import ( rds_instance_storage_encrypted, ) @@ -75,17 +75,17 @@ def test_rds_instance_with_encryption(self): DBInstanceClass="db.m1.small", StorageEncrypted=True, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted.rds_client", + "prowler.providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted import ( + from prowler.providers.aws.services.rds.rds_instance_storage_encrypted.rds_instance_storage_encrypted import ( rds_instance_storage_encrypted, ) diff --git a/providers/aws/services/rds/rds_service_test.py b/tests/providers/aws/services/rds/rds_service_test.py similarity index 97% rename from providers/aws/services/rds/rds_service_test.py rename to tests/providers/aws/services/rds/rds_service_test.py index 409479db20a..f701f5322ee 100644 --- a/providers/aws/services/rds/rds_service_test.py +++ b/tests/providers/aws/services/rds/rds_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, session from moto import mock_rds -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.rds.rds_service import RDS +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.rds.rds_service import RDS AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access_test.py b/tests/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access_test.py similarity index 71% rename from providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access_test.py rename to tests/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access_test.py index 78227a71360..0cc4deefe03 100644 --- a/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access_test.py +++ b/tests/providers/aws/services/rds/rds_snapshots_public_access/rds_snapshots_public_access_test.py @@ -10,17 +10,17 @@ class Test_rds_snapshots_public_access: @mock_rds def test_rds_no_snapshots(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( + from prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( rds_snapshots_public_access, ) @@ -43,17 +43,17 @@ def test_rds_private_snapshot(self): conn.create_db_snapshot( DBInstanceIdentifier="db-primary-1", DBSnapshotIdentifier="snapshot-1" ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( + from prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( rds_snapshots_public_access, ) @@ -82,17 +82,17 @@ def test_rds_public_snapshot(self): conn.create_db_snapshot( DBInstanceIdentifier="db-primary-1", DBSnapshotIdentifier="snapshot-1" ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", new=RDS(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( + from prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( rds_snapshots_public_access, ) @@ -123,17 +123,17 @@ def test_rds_cluster_private_snapshot(self): conn.create_db_cluster_snapshot( DBClusterIdentifier="db-primary-1", DBClusterSnapshotIdentifier="snapshot-1" ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", new=RDS(current_audit_info), ): # Test Check - from providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( + from prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( rds_snapshots_public_access, ) @@ -163,17 +163,17 @@ def test_rds_cluster_public_snapshot(self): conn.create_db_cluster_snapshot( DBClusterIdentifier="db-primary-1", DBClusterSnapshotIdentifier="snapshot-1" ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.rds.rds_service import RDS + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.rds.rds_service import RDS current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", + "prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access.rds_client", new=RDS(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( + from prowler.providers.aws.services.rds.rds_snapshots_public_access.rds_snapshots_public_access import ( rds_snapshots_public_access, ) diff --git a/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging_test.py b/tests/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging_test.py similarity index 75% rename from providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging_test.py rename to tests/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging_test.py index 7143cb41e15..0c405ad8447 100644 --- a/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging_test.py +++ b/tests/providers/aws/services/redshift/redshift_cluster_audit_logging/redshift_cluster_audit_logging_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.redshift.redshift_service import Cluster +from prowler.providers.aws.services.redshift.redshift_service import Cluster AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ def test_no_clusters(self): redshift_client = mock.MagicMock redshift_client.clusters = [] with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_audit_logging.redshift_cluster_audit_logging import ( + from prowler.providers.aws.services.redshift.redshift_cluster_audit_logging.redshift_cluster_audit_logging import ( redshift_cluster_audit_logging, ) @@ -37,10 +37,10 @@ def test_cluster_is_not_audit_logging(self): ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_audit_logging.redshift_cluster_audit_logging import ( + from prowler.providers.aws.services.redshift.redshift_cluster_audit_logging.redshift_cluster_audit_logging import ( redshift_cluster_audit_logging, ) @@ -63,10 +63,10 @@ def test_cluster_is_audit_logging(self): ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_audit_logging.redshift_cluster_audit_logging import ( + from prowler.providers.aws.services.redshift.redshift_cluster_audit_logging.redshift_cluster_audit_logging import ( redshift_cluster_audit_logging, ) diff --git a/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot_test.py b/tests/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot_test.py similarity index 74% rename from providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot_test.py rename to tests/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot_test.py index 6b778d22fd1..f96126f0708 100644 --- a/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot_test.py +++ b/tests/providers/aws/services/redshift/redshift_cluster_automated_snapshot/redshift_cluster_automated_snapshot_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.redshift.redshift_service import Cluster +from prowler.providers.aws.services.redshift.redshift_service import Cluster AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ def test_no_clusters(self): redshift_client = mock.MagicMock redshift_client.clusters = [] with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_automated_snapshot.redshift_cluster_automated_snapshot import ( + from prowler.providers.aws.services.redshift.redshift_cluster_automated_snapshot.redshift_cluster_automated_snapshot import ( redshift_cluster_automated_snapshot, ) @@ -37,10 +37,10 @@ def test_cluster_is_not_performing_snapshots(self): ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_automated_snapshot.redshift_cluster_automated_snapshot import ( + from prowler.providers.aws.services.redshift.redshift_cluster_automated_snapshot.redshift_cluster_automated_snapshot import ( redshift_cluster_automated_snapshot, ) @@ -62,10 +62,10 @@ def test_cluster_is_audit_logging(self): ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_automated_snapshot.redshift_cluster_automated_snapshot import ( + from prowler.providers.aws.services.redshift.redshift_cluster_automated_snapshot.redshift_cluster_automated_snapshot import ( redshift_cluster_automated_snapshot, ) diff --git a/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades_test.py b/tests/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades_test.py similarity index 74% rename from providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades_test.py rename to tests/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades_test.py index f9a661e762a..c3dac377188 100644 --- a/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades_test.py +++ b/tests/providers/aws/services/redshift/redshift_cluster_automatic_upgrades/redshift_cluster_automatic_upgrades_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.redshift.redshift_service import Cluster +from prowler.providers.aws.services.redshift.redshift_service import Cluster AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ def test_no_clusters(self): redshift_client = mock.MagicMock redshift_client.clusters = [] with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_automatic_upgrades.redshift_cluster_automatic_upgrades import ( + from prowler.providers.aws.services.redshift.redshift_cluster_automatic_upgrades.redshift_cluster_automatic_upgrades import ( redshift_cluster_automatic_upgrades, ) @@ -37,10 +37,10 @@ def test_cluster_not_automatic_upgrades(self): ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_automatic_upgrades.redshift_cluster_automatic_upgrades import ( + from prowler.providers.aws.services.redshift.redshift_cluster_automatic_upgrades.redshift_cluster_automatic_upgrades import ( redshift_cluster_automatic_upgrades, ) @@ -58,10 +58,10 @@ def test_cluster_automatic_upgrades(self): Cluster(id=cluster_id, region=AWS_REGION, allow_version_upgrade=True) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_automatic_upgrades.redshift_cluster_automatic_upgrades import ( + from prowler.providers.aws.services.redshift.redshift_cluster_automatic_upgrades.redshift_cluster_automatic_upgrades import ( redshift_cluster_automatic_upgrades, ) diff --git a/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access_test.py b/tests/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access_test.py similarity index 76% rename from providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access_test.py rename to tests/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access_test.py index 8c2b9b12087..eab2bd963d2 100644 --- a/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access_test.py +++ b/tests/providers/aws/services/redshift/redshift_cluster_public_access/redshift_cluster_public_access_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.redshift.redshift_service import Cluster +from prowler.providers.aws.services.redshift.redshift_service import Cluster AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ def test_no_clusters(self): redshift_client = mock.MagicMock redshift_client.clusters = [] with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( + from prowler.providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( redshift_cluster_public_access, ) @@ -38,10 +38,10 @@ def test_cluster_is_public(self): ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( + from prowler.providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( redshift_cluster_public_access, ) @@ -64,10 +64,10 @@ def test_cluster_is_not_public1(self): ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( + from prowler.providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( redshift_cluster_public_access, ) @@ -89,10 +89,10 @@ def test_cluster_is_not_public2(self): ) ) with mock.patch( - "providers.aws.services.redshift.redshift_service.Redshift", + "prowler.providers.aws.services.redshift.redshift_service.Redshift", redshift_client, ): - from providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( + from prowler.providers.aws.services.redshift.redshift_cluster_public_access.redshift_cluster_public_access import ( redshift_cluster_public_access, ) diff --git a/providers/aws/services/redshift/redshift_service_test.py b/tests/providers/aws/services/redshift/redshift_service_test.py similarity index 96% rename from providers/aws/services/redshift/redshift_service_test.py rename to tests/providers/aws/services/redshift/redshift_service_test.py index cd44a763cc3..6fc5ba15b9d 100644 --- a/providers/aws/services/redshift/redshift_service_test.py +++ b/tests/providers/aws/services/redshift/redshift_service_test.py @@ -5,8 +5,8 @@ from boto3 import client, session from moto import mock_redshift -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.redshift.redshift_service import Redshift +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.redshift.redshift_service import Redshift AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -53,7 +53,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.redshift.redshift_service.generate_regional_clients", + "prowler.providers.aws.services.redshift.redshift_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_Redshift_Service: diff --git a/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled_test.py b/tests/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled_test.py similarity index 74% rename from providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled_test.py rename to tests/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled_test.py index 751cb494f20..f7620712013 100644 --- a/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled_test.py +++ b/tests/providers/aws/services/route53/route53_domains_privacy_protection_enabled/route53_domains_privacy_protection_enabled_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.route53.route53_service import Domain +from prowler.providers.aws.services.route53.route53_service import Domain AWS_REGION = "us-east-1" @@ -11,11 +11,11 @@ def test_no_domains(self): route53domains.domains = {} with mock.patch( - "providers.aws.services.route53.route53_service.Route53Domains", + "prowler.providers.aws.services.route53.route53_service.Route53Domains", new=route53domains, ): # Test Check - from providers.aws.services.route53.route53_domains_privacy_protection_enabled.route53_domains_privacy_protection_enabled import ( + from prowler.providers.aws.services.route53.route53_domains_privacy_protection_enabled.route53_domains_privacy_protection_enabled import ( route53_domains_privacy_protection_enabled, ) @@ -34,11 +34,11 @@ def test_domain_privacy_protection_disabled(self): } with mock.patch( - "providers.aws.services.route53.route53_service.Route53Domains", + "prowler.providers.aws.services.route53.route53_service.Route53Domains", new=route53domains, ): # Test Check - from providers.aws.services.route53.route53_domains_privacy_protection_enabled.route53_domains_privacy_protection_enabled import ( + from prowler.providers.aws.services.route53.route53_domains_privacy_protection_enabled.route53_domains_privacy_protection_enabled import ( route53_domains_privacy_protection_enabled, ) @@ -62,11 +62,11 @@ def test_domain_privacy_protection_enabled(self): } with mock.patch( - "providers.aws.services.route53.route53_service.Route53Domains", + "prowler.providers.aws.services.route53.route53_service.Route53Domains", new=route53domains, ): # Test Check - from providers.aws.services.route53.route53_domains_privacy_protection_enabled.route53_domains_privacy_protection_enabled import ( + from prowler.providers.aws.services.route53.route53_domains_privacy_protection_enabled.route53_domains_privacy_protection_enabled import ( route53_domains_privacy_protection_enabled, ) diff --git a/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled_test.py b/tests/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled_test.py similarity index 76% rename from providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled_test.py rename to tests/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled_test.py index c68f89bd702..7ca8c9343f5 100644 --- a/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled_test.py +++ b/tests/providers/aws/services/route53/route53_domains_transferlock_enabled/route53_domains_transferlock_enabled_test.py @@ -1,6 +1,6 @@ from unittest import mock -from providers.aws.services.route53.route53_service import Domain +from prowler.providers.aws.services.route53.route53_service import Domain AWS_REGION = "us-east-1" @@ -11,11 +11,11 @@ def test_no_domains(self): route53domains.domains = {} with mock.patch( - "providers.aws.services.route53.route53_service.Route53Domains", + "prowler.providers.aws.services.route53.route53_service.Route53Domains", new=route53domains, ): # Test Check - from providers.aws.services.route53.route53_domains_transferlock_enabled.route53_domains_transferlock_enabled import ( + from prowler.providers.aws.services.route53.route53_domains_transferlock_enabled.route53_domains_transferlock_enabled import ( route53_domains_transferlock_enabled, ) @@ -37,11 +37,11 @@ def test_domain_transfer_lock_disabled(self): } with mock.patch( - "providers.aws.services.route53.route53_service.Route53Domains", + "prowler.providers.aws.services.route53.route53_service.Route53Domains", new=route53domains, ): # Test Check - from providers.aws.services.route53.route53_domains_transferlock_enabled.route53_domains_transferlock_enabled import ( + from prowler.providers.aws.services.route53.route53_domains_transferlock_enabled.route53_domains_transferlock_enabled import ( route53_domains_transferlock_enabled, ) @@ -70,11 +70,11 @@ def test_domain_transfer_lock_enabled(self): } with mock.patch( - "providers.aws.services.route53.route53_service.Route53Domains", + "prowler.providers.aws.services.route53.route53_service.Route53Domains", new=route53domains, ): # Test Check - from providers.aws.services.route53.route53_domains_transferlock_enabled.route53_domains_transferlock_enabled import ( + from prowler.providers.aws.services.route53.route53_domains_transferlock_enabled.route53_domains_transferlock_enabled import ( route53_domains_transferlock_enabled, ) diff --git a/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled_test.py b/tests/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled_test.py similarity index 77% rename from providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled_test.py rename to tests/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled_test.py index 587393bd258..8e2c5a69f9c 100644 --- a/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled_test.py +++ b/tests/providers/aws/services/route53/route53_public_hosted_zones_cloudwatch_logging_enabled/route53_public_hosted_zones_cloudwatch_logging_enabled_test.py @@ -2,7 +2,10 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.route53.route53_service import HostedZone, LoggingConfig +from prowler.providers.aws.services.route53.route53_service import ( + HostedZone, + LoggingConfig, +) AWS_REGION = "us-east-1" @@ -13,11 +16,11 @@ def test_no_hosted_zones(self): route53.hosted_zones = {} with mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53, ): # Test Check - from providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( route53_public_hosted_zones_cloudwatch_logging_enabled, ) @@ -46,11 +49,11 @@ def test_hosted_zone__public_logging_enabled(self): } with mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53, ): # Test Check - from providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( route53_public_hosted_zones_cloudwatch_logging_enabled, ) @@ -81,11 +84,11 @@ def test_hosted_zone__public_logging_disabled(self): } with mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53, ): # Test Check - from providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( route53_public_hosted_zones_cloudwatch_logging_enabled, ) @@ -116,11 +119,11 @@ def test_hosted_zone__private(self): } with mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53, ): # Test Check - from providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( + from prowler.providers.aws.services.route53.route53_public_hosted_zones_cloudwatch_logging_enabled.route53_public_hosted_zones_cloudwatch_logging_enabled import ( route53_public_hosted_zones_cloudwatch_logging_enabled, ) diff --git a/providers/aws/services/route53/route53_service_test.py b/tests/providers/aws/services/route53/route53_service_test.py similarity index 98% rename from providers/aws/services/route53/route53_service_test.py rename to tests/providers/aws/services/route53/route53_service_test.py index 96a4ef557b3..b661f8f80e0 100644 --- a/providers/aws/services/route53/route53_service_test.py +++ b/tests/providers/aws/services/route53/route53_service_test.py @@ -4,8 +4,8 @@ from boto3 import client, session from moto import mock_logs, mock_route53 -from providers.aws.lib.audit_info.audit_info import AWS_Audit_Info -from providers.aws.services.route53.route53_service import Route53 +from prowler.providers.aws.lib.audit_info.audit_info import AWS_Audit_Info +from prowler.providers.aws.services.route53.route53_service import Route53 # Mock Test Region AWS_REGION = "us-east-1" diff --git a/providers/aws/services/route53/route53domains_service_test.py b/tests/providers/aws/services/route53/route53domains_service_test.py similarity index 96% rename from providers/aws/services/route53/route53domains_service_test.py rename to tests/providers/aws/services/route53/route53domains_service_test.py index 7f1de4b0181..75d5616d626 100644 --- a/providers/aws/services/route53/route53domains_service_test.py +++ b/tests/providers/aws/services/route53/route53domains_service_test.py @@ -4,8 +4,8 @@ import botocore from boto3 import session -from providers.aws.lib.audit_info.audit_info import AWS_Audit_Info -from providers.aws.services.route53.route53_service import Route53Domains +from prowler.providers.aws.lib.audit_info.audit_info import AWS_Audit_Info +from prowler.providers.aws.services.route53.route53_service import Route53Domains # Mock Test Region AWS_REGION = "us-east-1" diff --git a/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks_test.py b/tests/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks_test.py similarity index 74% rename from providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks_test.py rename to tests/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks_test.py index d007da43840..2f7304b1e67 100644 --- a/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks_test.py +++ b/tests/providers/aws/services/s3/s3_account_level_public_access_blocks/s3_account_level_public_access_blocks_test.py @@ -3,7 +3,7 @@ from boto3 import client, session from moto import mock_s3, mock_s3control -from providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info AWS_ACCOUNT_NUMBER = "123456789012" AWS_REGION = "us-east-1" @@ -46,23 +46,24 @@ def test_bucket_account_public_block(self): "RestrictPublicBuckets": True, }, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3_client", + "prowler.providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3control_client", + "prowler.providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks import ( + from prowler.providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks import ( s3_account_level_public_access_blocks, ) @@ -92,23 +93,24 @@ def test_bucket_without_account_public_block(self): "RestrictPublicBuckets": False, }, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3_client", + "prowler.providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3control_client", + "prowler.providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks import ( + from prowler.providers.aws.services.s3.s3_account_level_public_access_blocks.s3_account_level_public_access_blocks import ( s3_account_level_public_access_blocks, ) diff --git a/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited_test.py b/tests/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited_test.py similarity index 70% rename from providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited_test.py rename to tests/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited_test.py index b4ce0fdc095..13374aea8fc 100644 --- a/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_acl_prohibited/s3_bucket_acl_prohibited_test.py @@ -12,17 +12,17 @@ def test_bucket_no_ownership(self): bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited import ( + from prowler.providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited import ( s3_bucket_acl_prohibited, ) @@ -44,17 +44,17 @@ def test_bucket_without_ownership(self): bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited import ( + from prowler.providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited import ( s3_bucket_acl_prohibited, ) @@ -78,17 +78,17 @@ def test_bucket_acl_disabled(self): Bucket=bucket_name_us, ObjectOwnership="BucketOwnerEnforced" ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited import ( + from prowler.providers.aws.services.s3.s3_bucket_acl_prohibited.s3_bucket_acl_prohibited import ( s3_bucket_acl_prohibited, ) diff --git a/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption_test.py b/tests/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption_test.py similarity index 75% rename from providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption_test.py rename to tests/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption_test.py index a6463eafed2..9fc0761bd18 100644 --- a/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_default_encryption/s3_bucket_default_encryption_test.py @@ -12,17 +12,17 @@ def test_bucket_no_encryption(self): bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption import ( + from prowler.providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption import ( s3_bucket_default_encryption, ) @@ -59,17 +59,17 @@ def test_bucket_kms_encryption(self): s3_client_us_east_1.put_bucket_encryption( Bucket=bucket_name_us, ServerSideEncryptionConfiguration=sse_config ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption import ( + from prowler.providers.aws.services.s3.s3_bucket_default_encryption.s3_bucket_default_encryption import ( s3_bucket_default_encryption, ) diff --git a/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete_test.py b/tests/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete_test.py similarity index 68% rename from providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete_test.py rename to tests/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete_test.py index 2b57c0f4d8a..374733586dc 100644 --- a/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_no_mfa_delete/s3_bucket_no_mfa_delete_test.py @@ -11,17 +11,17 @@ class Test_s3_bucket_no_mfa_delete: @mock_s3 def test_no_buckets(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete import ( + from prowler.providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete import ( s3_bucket_no_mfa_delete, ) @@ -36,17 +36,17 @@ def test_bucket_without_mfa(self): bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete import ( + from prowler.providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete import ( s3_bucket_no_mfa_delete, ) @@ -70,17 +70,17 @@ def test_bucket_with_mfa(self): Bucket=bucket_name_us, VersioningConfiguration={"MFADelete": "Enabled", "Status": "Enabled"}, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete.s3_client", new=S3(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete import ( + from prowler.providers.aws.services.s3.s3_bucket_no_mfa_delete.s3_bucket_no_mfa_delete import ( s3_bucket_no_mfa_delete, ) diff --git a/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning_test.py b/tests/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning_test.py similarity index 72% rename from providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning_test.py rename to tests/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning_test.py index 8498c077d06..cd07b15ba33 100644 --- a/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_object_versioning/s3_bucket_object_versioning_test.py @@ -12,17 +12,17 @@ def test_bucket_no_object_versioning(self): bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning import ( + from prowler.providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning import ( s3_bucket_object_versioning, ) @@ -49,17 +49,17 @@ def test_bucket_object_versioning_enabled(self): Bucket=bucket_name_us, VersioningConfiguration={"Status": "Enabled"}, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning import ( + from prowler.providers.aws.services.s3.s3_bucket_object_versioning.s3_bucket_object_versioning import ( s3_bucket_object_versioning, ) diff --git a/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access_test.py b/tests/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access_test.py similarity index 74% rename from providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access_test.py rename to tests/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access_test.py index 72d0d753f6f..8b6b6ce94c7 100644 --- a/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_policy_public_write_access/s3_bucket_policy_public_write_access_test.py @@ -12,17 +12,17 @@ def test_bucket_no_policy(self): bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access import ( + from prowler.providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access import ( s3_bucket_policy_public_write_access, ) @@ -51,17 +51,17 @@ def test_bucket_comply_policy(self): Bucket=bucket_name_us, Policy=encryption_policy, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access import ( + from prowler.providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access import ( s3_bucket_policy_public_write_access, ) @@ -89,17 +89,17 @@ def test_bucket_public_write_policy(self): Bucket=bucket_name_us, Policy=public_write_policy, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access import ( + from prowler.providers.aws.services.s3.s3_bucket_policy_public_write_access.s3_bucket_policy_public_write_access import ( s3_bucket_policy_public_write_access, ) diff --git a/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access_test.py b/tests/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access_test.py similarity index 76% rename from providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access_test.py rename to tests/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access_test.py index d25e26bd6b1..22479674013 100644 --- a/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_public_access/s3_bucket_public_access_test.py @@ -4,7 +4,7 @@ from boto3 import client, session from moto import mock_s3, mock_s3control -from providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info AWS_ACCOUNT_NUMBER = "123456789012" AWS_REGION = "us-east-1" @@ -36,23 +36,24 @@ def set_mocked_audit_info(self): @mock_s3 @mock_s3control def test_no_buckets(self): - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( + from prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( s3_bucket_public_access, ) @@ -75,23 +76,24 @@ def test_bucket_account_public_block_without_buckets(self): "RestrictPublicBuckets": True, }, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( + from prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( s3_bucket_public_access, ) @@ -124,23 +126,24 @@ def test_bucket_account_public_block(self): "RestrictPublicBuckets": True, }, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( + from prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( s3_bucket_public_access, ) @@ -182,23 +185,24 @@ def test_bucket_public_block(self): "RestrictPublicBuckets": True, }, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( + from prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( s3_bucket_public_access, ) @@ -256,23 +260,24 @@ def test_bucket_public_ACL(self): "Owner": bucket_owner, }, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( + from prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( s3_bucket_public_access, ) @@ -319,23 +324,24 @@ def test_bucket_public_policy(self): Bucket=bucket_name_us, Policy=public_write_policy, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( + from prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( s3_bucket_public_access, ) @@ -366,23 +372,24 @@ def test_bucket_not_public(self): "RestrictPublicBuckets": True, }, ) - from providers.aws.services.s3.s3_service import S3, S3Control + from prowler.providers.aws.services.s3.s3_service import S3, S3Control audit_info = self.set_mocked_audit_info() with mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", new=audit_info + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", + new=audit_info, ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3_client", new=S3(audit_info), ): with mock.patch( - "providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", + "prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access.s3control_client", new=S3Control(audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( + from prowler.providers.aws.services.s3.s3_bucket_public_access.s3_bucket_public_access import ( s3_bucket_public_access, ) diff --git a/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy_test.py b/tests/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy_test.py similarity index 75% rename from providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy_test.py rename to tests/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy_test.py index 30d9bf954b6..ef875b82e38 100644 --- a/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_secure_transport_policy/s3_bucket_secure_transport_policy_test.py @@ -12,17 +12,17 @@ def test_bucket_no_policy(self): bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy import ( + from prowler.providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy import ( s3_bucket_secure_transport_policy, ) @@ -68,17 +68,17 @@ def test_bucket_comply_policy(self): Bucket=bucket_name_us, Policy=ssl_policy, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy import ( + from prowler.providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy import ( s3_bucket_secure_transport_policy, ) @@ -124,17 +124,17 @@ def test_bucket_uncomply_policy(self): Bucket=bucket_name_us, Policy=ssl_policy, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy import ( + from prowler.providers.aws.services.s3.s3_bucket_secure_transport_policy.s3_bucket_secure_transport_policy import ( s3_bucket_secure_transport_policy, ) diff --git a/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled_test.py b/tests/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled_test.py similarity index 82% rename from providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled_test.py rename to tests/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled_test.py index c1d894e9e43..bb9c50d040c 100644 --- a/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled_test.py +++ b/tests/providers/aws/services/s3/s3_bucket_server_access_logging_enabled/s3_bucket_server_access_logging_enabled_test.py @@ -14,17 +14,17 @@ def test_bucket_no_logging(self): bucket_name_us = "bucket_test_us" s3_client_us_east_1.create_bucket(Bucket=bucket_name_us) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled import ( + from prowler.providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled import ( s3_bucket_server_access_logging_enabled, ) @@ -99,17 +99,17 @@ def test_bucket_with_logging(self): } }, ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.s3.s3_service import S3 + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.s3.s3_service import S3 current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled.s3_client", + "prowler.providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled.s3_client", new=S3(current_audit_info), ): # Test Check - from providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled import ( + from prowler.providers.aws.services.s3.s3_bucket_server_access_logging_enabled.s3_bucket_server_access_logging_enabled import ( s3_bucket_server_access_logging_enabled, ) diff --git a/providers/aws/services/s3/s3_service_test.py b/tests/providers/aws/services/s3/s3_service_test.py similarity index 98% rename from providers/aws/services/s3/s3_service_test.py rename to tests/providers/aws/services/s3/s3_service_test.py index b762eaee4eb..5b5c25ed8cc 100644 --- a/providers/aws/services/s3/s3_service_test.py +++ b/tests/providers/aws/services/s3/s3_service_test.py @@ -3,8 +3,8 @@ from boto3 import client, session from moto import mock_s3, mock_s3control -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.s3.s3_service import S3, S3Control +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.s3.s3_service import S3, S3Control AWS_ACCOUNT_NUMBER = "123456789012" AWS_REGION = "us-east-1" diff --git a/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled_test.py b/tests/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled_test.py similarity index 77% rename from providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled_test.py index e8bb645a0d5..0f147e92fe0 100644 --- a/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_models_network_isolation_enabled/sagemaker_models_network_isolation_enabled_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.sagemaker.sagemaker_service import Model +from prowler.providers.aws.services.sagemaker.sagemaker_service import Model AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ def test_no_models(self): sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_models = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_models_network_isolation_enabled.sagemaker_models_network_isolation_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_models_network_isolation_enabled.sagemaker_models_network_isolation_enabled import ( sagemaker_models_network_isolation_enabled, ) @@ -40,10 +40,10 @@ def test_instance_network_isolation_enabled(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_models_network_isolation_enabled.sagemaker_models_network_isolation_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_models_network_isolation_enabled.sagemaker_models_network_isolation_enabled import ( sagemaker_models_network_isolation_enabled, ) @@ -67,10 +67,10 @@ def test_instance_network_isolation_disabled(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_models_network_isolation_enabled.sagemaker_models_network_isolation_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_models_network_isolation_enabled.sagemaker_models_network_isolation_enabled import ( sagemaker_models_network_isolation_enabled, ) diff --git a/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured_test.py b/tests/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured_test.py similarity index 77% rename from providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured_test.py index 293c3a1b621..0c501782768 100644 --- a/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_models_vpc_settings_configured/sagemaker_models_vpc_settings_configured_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.sagemaker.sagemaker_service import Model +from prowler.providers.aws.services.sagemaker.sagemaker_service import Model AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ def test_no_models(self): sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_models = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_models_vpc_settings_configured.sagemaker_models_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_models_vpc_settings_configured.sagemaker_models_vpc_settings_configured import ( sagemaker_models_vpc_settings_configured, ) @@ -40,10 +40,10 @@ def test_instance_vpc_settings_configured(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_models_vpc_settings_configured.sagemaker_models_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_models_vpc_settings_configured.sagemaker_models_vpc_settings_configured import ( sagemaker_models_vpc_settings_configured, ) @@ -66,10 +66,10 @@ def test_instance_vpc_settings_not_configured(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_models_vpc_settings_configured.sagemaker_models_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_models_vpc_settings_configured.sagemaker_models_vpc_settings_configured import ( sagemaker_models_vpc_settings_configured, ) diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled_test.py b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled_test.py similarity index 76% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled_test.py index 01bfccfb1cb..8c0ff7b5177 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_encryption_enabled/sagemaker_notebook_instance_encryption_enabled_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.sagemaker.sagemaker_service import NotebookInstance +from prowler.providers.aws.services.sagemaker.sagemaker_service import NotebookInstance AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ def test_no_instances(self): sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_notebook_instances = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_encryption_enabled.sagemaker_notebook_instance_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_encryption_enabled.sagemaker_notebook_instance_encryption_enabled import ( sagemaker_notebook_instance_encryption_enabled, ) @@ -40,10 +40,10 @@ def test_instance_with_kms_key(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_encryption_enabled.sagemaker_notebook_instance_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_encryption_enabled.sagemaker_notebook_instance_encryption_enabled import ( sagemaker_notebook_instance_encryption_enabled, ) @@ -66,10 +66,10 @@ def test_instance_no_kms_key(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_encryption_enabled.sagemaker_notebook_instance_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_encryption_enabled.sagemaker_notebook_instance_encryption_enabled import ( sagemaker_notebook_instance_encryption_enabled, ) diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled_test.py b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled_test.py similarity index 76% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled_test.py index e44cfcef212..8939fc1a55f 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_root_access_disabled/sagemaker_notebook_instance_root_access_disabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.sagemaker.sagemaker_service import NotebookInstance +from prowler.providers.aws.services.sagemaker.sagemaker_service import NotebookInstance AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ def test_no_instances(self): sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_notebook_instances = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_root_access_disabled.sagemaker_notebook_instance_root_access_disabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_root_access_disabled.sagemaker_notebook_instance_root_access_disabled import ( sagemaker_notebook_instance_root_access_disabled, ) @@ -38,10 +38,10 @@ def test_instance_root_access_disabled(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_root_access_disabled.sagemaker_notebook_instance_root_access_disabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_root_access_disabled.sagemaker_notebook_instance_root_access_disabled import ( sagemaker_notebook_instance_root_access_disabled, ) @@ -65,10 +65,10 @@ def test_instance_root_access_enabled(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_root_access_disabled.sagemaker_notebook_instance_root_access_disabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_root_access_disabled.sagemaker_notebook_instance_root_access_disabled import ( sagemaker_notebook_instance_root_access_disabled, ) diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured_test.py b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured_test.py similarity index 76% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured_test.py index ca2a0244ef6..5eb49a9b96c 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_vpc_settings_configured/sagemaker_notebook_instance_vpc_settings_configured_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.sagemaker.sagemaker_service import NotebookInstance +from prowler.providers.aws.services.sagemaker.sagemaker_service import NotebookInstance AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ def test_no_instances(self): sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_notebook_instances = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_vpc_settings_configured.sagemaker_notebook_instance_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_vpc_settings_configured.sagemaker_notebook_instance_vpc_settings_configured import ( sagemaker_notebook_instance_vpc_settings_configured, ) @@ -40,10 +40,10 @@ def test_instance_vpc_settings_configured(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_vpc_settings_configured.sagemaker_notebook_instance_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_vpc_settings_configured.sagemaker_notebook_instance_vpc_settings_configured import ( sagemaker_notebook_instance_vpc_settings_configured, ) @@ -67,10 +67,10 @@ def test_instance_vpc_settings_not_configured(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_vpc_settings_configured.sagemaker_notebook_instance_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_vpc_settings_configured.sagemaker_notebook_instance_vpc_settings_configured import ( sagemaker_notebook_instance_vpc_settings_configured, ) diff --git a/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured_test.py b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured_test.py similarity index 76% rename from providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured_test.py index 383cef31e1e..dbebcfa64a4 100644 --- a/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_notebook_instance_without_direct_internet_access_configured/sagemaker_notebook_instance_without_direct_internet_access_configured_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.sagemaker.sagemaker_service import NotebookInstance +from prowler.providers.aws.services.sagemaker.sagemaker_service import NotebookInstance AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ def test_no_instances(self): sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_notebook_instances = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_without_direct_internet_access_configured.sagemaker_notebook_instance_without_direct_internet_access_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_without_direct_internet_access_configured.sagemaker_notebook_instance_without_direct_internet_access_configured import ( sagemaker_notebook_instance_without_direct_internet_access_configured, ) @@ -40,10 +40,10 @@ def test_instance_direct_internet_disabled(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_without_direct_internet_access_configured.sagemaker_notebook_instance_without_direct_internet_access_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_without_direct_internet_access_configured.sagemaker_notebook_instance_without_direct_internet_access_configured import ( sagemaker_notebook_instance_without_direct_internet_access_configured, ) @@ -71,10 +71,10 @@ def test_instance_direct_internet_enabled(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_notebook_instance_without_direct_internet_access_configured.sagemaker_notebook_instance_without_direct_internet_access_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_notebook_instance_without_direct_internet_access_configured.sagemaker_notebook_instance_without_direct_internet_access_configured import ( sagemaker_notebook_instance_without_direct_internet_access_configured, ) diff --git a/providers/aws/services/sagemaker/sagemaker_service_test.py b/tests/providers/aws/services/sagemaker/sagemaker_service_test.py similarity index 96% rename from providers/aws/services/sagemaker/sagemaker_service_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_service_test.py index f0b231f9572..f1cb8daec72 100644 --- a/providers/aws/services/sagemaker/sagemaker_service_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_service_test.py @@ -4,8 +4,8 @@ import botocore from boto3 import session -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.sagemaker.sagemaker_service import SageMaker +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.sagemaker.sagemaker_service import SageMaker AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -94,7 +94,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.sagemaker.sagemaker_service.generate_regional_clients", + "prowler.providers.aws.services.sagemaker.sagemaker_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_SageMaker_Service: diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled_test.py b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled_test.py similarity index 75% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled_test.py index 27d3d4e232e..9c3d48d7c08 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_intercontainer_encryption_enabled/sagemaker_training_jobs_intercontainer_encryption_enabled_test.py @@ -1,7 +1,7 @@ from re import search from unittest import mock -from providers.aws.services.sagemaker.sagemaker_service import TrainingJob +from prowler.providers.aws.services.sagemaker.sagemaker_service import TrainingJob AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ def test_no_training_jobs(self): sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_training_jobs = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_intercontainer_encryption_enabled.sagemaker_training_jobs_intercontainer_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_intercontainer_encryption_enabled.sagemaker_training_jobs_intercontainer_encryption_enabled import ( sagemaker_training_jobs_intercontainer_encryption_enabled, ) @@ -38,10 +38,10 @@ def test_instance_traffic_encryption_enabled(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_intercontainer_encryption_enabled.sagemaker_training_jobs_intercontainer_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_intercontainer_encryption_enabled.sagemaker_training_jobs_intercontainer_encryption_enabled import ( sagemaker_training_jobs_intercontainer_encryption_enabled, ) @@ -66,10 +66,10 @@ def test_instance_traffic_encryption_disabled(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_intercontainer_encryption_enabled.sagemaker_training_jobs_intercontainer_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_intercontainer_encryption_enabled.sagemaker_training_jobs_intercontainer_encryption_enabled import ( sagemaker_training_jobs_intercontainer_encryption_enabled, ) diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled_test.py b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled_test.py similarity index 76% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled_test.py index c5272dc5277..e070b7832a0 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_network_isolation_enabled/sagemaker_training_jobs_network_isolation_enabled_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.sagemaker.sagemaker_service import TrainingJob +from prowler.providers.aws.services.sagemaker.sagemaker_service import TrainingJob AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ def test_no_training_jobs(self): sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_training_jobs = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_network_isolation_enabled.sagemaker_training_jobs_network_isolation_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_network_isolation_enabled.sagemaker_training_jobs_network_isolation_enabled import ( sagemaker_training_jobs_network_isolation_enabled, ) @@ -40,10 +40,10 @@ def test_instance_traffic_encryption_enabled(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_network_isolation_enabled.sagemaker_training_jobs_network_isolation_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_network_isolation_enabled.sagemaker_training_jobs_network_isolation_enabled import ( sagemaker_training_jobs_network_isolation_enabled, ) @@ -66,10 +66,10 @@ def test_instance_traffic_encryption_disabled(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_network_isolation_enabled.sagemaker_training_jobs_network_isolation_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_network_isolation_enabled.sagemaker_training_jobs_network_isolation_enabled import ( sagemaker_training_jobs_network_isolation_enabled, ) diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled_test.py b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled_test.py similarity index 75% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled_test.py index 43d1ac6434f..f9df2fe58ee 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_volume_and_output_encryption_enabled/sagemaker_training_jobs_volume_and_output_encryption_enabled_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.sagemaker.sagemaker_service import TrainingJob +from prowler.providers.aws.services.sagemaker.sagemaker_service import TrainingJob AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ def test_no_training_jobs(self): sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_training_jobs = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_volume_and_output_encryption_enabled.sagemaker_training_jobs_volume_and_output_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_volume_and_output_encryption_enabled.sagemaker_training_jobs_volume_and_output_encryption_enabled import ( sagemaker_training_jobs_volume_and_output_encryption_enabled, ) @@ -40,10 +40,10 @@ def test_instance_traffic_encryption_enabled(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_volume_and_output_encryption_enabled.sagemaker_training_jobs_volume_and_output_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_volume_and_output_encryption_enabled.sagemaker_training_jobs_volume_and_output_encryption_enabled import ( sagemaker_training_jobs_volume_and_output_encryption_enabled, ) @@ -66,10 +66,10 @@ def test_instance_traffic_encryption_disabled(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_volume_and_output_encryption_enabled.sagemaker_training_jobs_volume_and_output_encryption_enabled import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_volume_and_output_encryption_enabled.sagemaker_training_jobs_volume_and_output_encryption_enabled import ( sagemaker_training_jobs_volume_and_output_encryption_enabled, ) diff --git a/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured_test.py b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured_test.py similarity index 77% rename from providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured_test.py rename to tests/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured_test.py index f473909e90a..45bdf3d50ca 100644 --- a/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured_test.py +++ b/tests/providers/aws/services/sagemaker/sagemaker_training_jobs_vpc_settings_configured/sagemaker_training_jobs_vpc_settings_configured_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.sagemaker.sagemaker_service import TrainingJob +from prowler.providers.aws.services.sagemaker.sagemaker_service import TrainingJob AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ def test_no_training_jobs(self): sagemaker_client = mock.MagicMock sagemaker_client.sagemaker_training_jobs = [] with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_vpc_settings_configured.sagemaker_training_jobs_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_vpc_settings_configured.sagemaker_training_jobs_vpc_settings_configured import ( sagemaker_training_jobs_vpc_settings_configured, ) @@ -40,10 +40,10 @@ def test_instance_traffic_encryption_enabled(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_vpc_settings_configured.sagemaker_training_jobs_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_vpc_settings_configured.sagemaker_training_jobs_vpc_settings_configured import ( sagemaker_training_jobs_vpc_settings_configured, ) @@ -69,10 +69,10 @@ def test_instance_traffic_encryption_disabled(self): ) ) with mock.patch( - "providers.aws.services.sagemaker.sagemaker_service.SageMaker", + "prowler.providers.aws.services.sagemaker.sagemaker_service.SageMaker", sagemaker_client, ): - from providers.aws.services.sagemaker.sagemaker_training_jobs_vpc_settings_configured.sagemaker_training_jobs_vpc_settings_configured import ( + from prowler.providers.aws.services.sagemaker.sagemaker_training_jobs_vpc_settings_configured.sagemaker_training_jobs_vpc_settings_configured import ( sagemaker_training_jobs_vpc_settings_configured, ) diff --git a/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled_test.py b/tests/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled_test.py similarity index 77% rename from providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled_test.py rename to tests/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled_test.py index 5e91945d49e..ad1f6c1edf3 100644 --- a/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled_test.py +++ b/tests/providers/aws/services/secretsmanager/secretsmanager_automatic_rotation_enabled/secretsmanager_automatic_rotation_enabled_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.secretsmanager.secretsmanager_service import Secret +from prowler.providers.aws.services.secretsmanager.secretsmanager_service import Secret # Mock Test Region AWS_REGION = "eu-west-1" @@ -13,11 +13,11 @@ def test_no_secrets(self): secretsmanager_client = mock.MagicMock secretsmanager_client.secrets = {} with mock.patch( - "providers.aws.services.secretsmanager.secretsmanager_service.SecretsManager", + "prowler.providers.aws.services.secretsmanager.secretsmanager_service.SecretsManager", new=secretsmanager_client, ): # Test Check - from providers.aws.services.secretsmanager.secretsmanager_automatic_rotation_enabled.secretsmanager_automatic_rotation_enabled import ( + from prowler.providers.aws.services.secretsmanager.secretsmanager_automatic_rotation_enabled.secretsmanager_automatic_rotation_enabled import ( secretsmanager_automatic_rotation_enabled, ) @@ -39,11 +39,11 @@ def test_secret_rotation_disabled(self): ) } with mock.patch( - "providers.aws.services.secretsmanager.secretsmanager_service.SecretsManager", + "prowler.providers.aws.services.secretsmanager.secretsmanager_service.SecretsManager", new=secretsmanager_client, ): # Test Check - from providers.aws.services.secretsmanager.secretsmanager_automatic_rotation_enabled.secretsmanager_automatic_rotation_enabled import ( + from prowler.providers.aws.services.secretsmanager.secretsmanager_automatic_rotation_enabled.secretsmanager_automatic_rotation_enabled import ( secretsmanager_automatic_rotation_enabled, ) @@ -73,11 +73,11 @@ def test_secret_rotation_enabled(self): ) } with mock.patch( - "providers.aws.services.secretsmanager.secretsmanager_service.SecretsManager", + "prowler.providers.aws.services.secretsmanager.secretsmanager_service.SecretsManager", new=secretsmanager_client, ): # Test Check - from providers.aws.services.secretsmanager.secretsmanager_automatic_rotation_enabled.secretsmanager_automatic_rotation_enabled import ( + from prowler.providers.aws.services.secretsmanager.secretsmanager_automatic_rotation_enabled.secretsmanager_automatic_rotation_enabled import ( secretsmanager_automatic_rotation_enabled, ) diff --git a/providers/aws/services/secretsmanager/secretsmanager_service_test.py b/tests/providers/aws/services/secretsmanager/secretsmanager_service_test.py similarity index 94% rename from providers/aws/services/secretsmanager/secretsmanager_service_test.py rename to tests/providers/aws/services/secretsmanager/secretsmanager_service_test.py index 92475fc4274..5a73592fbf0 100644 --- a/providers/aws/services/secretsmanager/secretsmanager_service_test.py +++ b/tests/providers/aws/services/secretsmanager/secretsmanager_service_test.py @@ -6,8 +6,10 @@ from moto import mock_ec2, mock_iam, mock_lambda, mock_s3, mock_secretsmanager from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.secretsmanager.secretsmanager_service import SecretsManager +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.secretsmanager.secretsmanager_service import ( + SecretsManager, +) # Mock Test Region AWS_REGION = "eu-west-1" @@ -22,7 +24,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch( - "providers.aws.services.secretsmanager.secretsmanager_service.generate_regional_clients", + "prowler.providers.aws.services.secretsmanager.secretsmanager_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_SecretsManager_Service: diff --git a/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled_test.py b/tests/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled_test.py similarity index 77% rename from providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled_test.py rename to tests/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled_test.py index 575882d0e75..5254cf835ad 100644 --- a/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled_test.py +++ b/tests/providers/aws/services/securityhub/securityhub_enabled/securityhub_enabled_test.py @@ -1,6 +1,8 @@ from unittest import mock -from providers.aws.services.securityhub.securityhub_service import SecurityHubHub +from prowler.providers.aws.services.securityhub.securityhub_service import ( + SecurityHubHub, +) class Test_accessanalyzer_enabled_without_findings: @@ -16,11 +18,11 @@ def test_securityhub_hub_inactive(self): ) ] with mock.patch( - "providers.aws.services.securityhub.securityhub_service.SecurityHub", + "prowler.providers.aws.services.securityhub.securityhub_service.SecurityHub", new=securityhub_client, ): # Test Check - from providers.aws.services.securityhub.securityhub_enabled.securityhub_enabled import ( + from prowler.providers.aws.services.securityhub.securityhub_enabled.securityhub_enabled import ( securityhub_enabled, ) @@ -43,11 +45,11 @@ def test_securityhub_hub_active(self): ) ] with mock.patch( - "providers.aws.services.securityhub.securityhub_service.SecurityHub", + "prowler.providers.aws.services.securityhub.securityhub_service.SecurityHub", new=securityhub_client, ): # Test Check - from providers.aws.services.securityhub.securityhub_enabled.securityhub_enabled import ( + from prowler.providers.aws.services.securityhub.securityhub_enabled.securityhub_enabled import ( securityhub_enabled, ) diff --git a/providers/aws/services/securityhub/securityhub_service_test.py b/tests/providers/aws/services/securityhub/securityhub_service_test.py similarity index 91% rename from providers/aws/services/securityhub/securityhub_service_test.py rename to tests/providers/aws/services/securityhub/securityhub_service_test.py index eb049be0d97..5715715c9a9 100644 --- a/providers/aws/services/securityhub/securityhub_service_test.py +++ b/tests/providers/aws/services/securityhub/securityhub_service_test.py @@ -2,8 +2,8 @@ import botocore -from providers.aws.lib.audit_info.audit_info import current_audit_info -from providers.aws.services.securityhub.securityhub_service import SecurityHub +from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info +from prowler.providers.aws.services.securityhub.securityhub_service import SecurityHub # Mock Test Region AWS_REGION = "eu-west-1" @@ -47,7 +47,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.securityhub.securityhub_service.generate_regional_clients", + "prowler.providers.aws.services.securityhub.securityhub_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_SecurityHub_Service: diff --git a/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips_test.py b/tests/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips_test.py similarity index 70% rename from providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips_test.py rename to tests/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips_test.py index c3cf0e27def..d16f898faa3 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips_test.py +++ b/tests/providers/aws/services/shield/shield_advanced_protection_in_associated_elastic_ips/shield_advanced_protection_in_associated_elastic_ips_test.py @@ -5,8 +5,8 @@ from moto import mock_ec2 from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.shield.shield_service import Protection +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.shield.shield_service import Protection AWS_REGION = "eu-west-1" @@ -20,7 +20,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_shield_advanced_protection_in_associated_elastic_ips: @@ -51,20 +51,20 @@ def test_no_shield_not_active(self): shield_client = mock.MagicMock shield_client.enabled = False - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( shield_advanced_protection_in_associated_elastic_ips, ) @@ -96,20 +96,20 @@ def test_shield_enabled_ip_protected(self): ) } - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( shield_advanced_protection_in_associated_elastic_ips, ) @@ -140,20 +140,20 @@ def test_shield_enabled_ip_not_protected(self): shield_client.region = AWS_REGION shield_client.protections = {} - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( shield_advanced_protection_in_associated_elastic_ips, ) @@ -184,20 +184,20 @@ def test_shield_disabled_ip_not_protected(self): shield_client.region = AWS_REGION shield_client.protections = {} - from providers.aws.services.ec2.ec2_service import EC2 + from prowler.providers.aws.services.ec2.ec2_service import EC2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips.ec2_client", new=EC2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_associated_elastic_ips.shield_advanced_protection_in_associated_elastic_ips import ( shield_advanced_protection_in_associated_elastic_ips, ) diff --git a/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers_test.py b/tests/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers_test.py similarity index 74% rename from providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers_test.py rename to tests/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers_test.py index 175c42d0522..fbb53920a21 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers_test.py +++ b/tests/providers/aws/services/shield/shield_advanced_protection_in_classic_load_balancers/shield_advanced_protection_in_classic_load_balancers_test.py @@ -4,8 +4,8 @@ from moto import mock_ec2, mock_elb from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.shield.shield_service import Protection +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.shield.shield_service import Protection AWS_REGION = "eu-west-1" @@ -39,20 +39,20 @@ def test_no_shield_not_active(self): shield_client = mock.MagicMock shield_client.enabled = False - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.services.elb.elb_service import ELB with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", new=ELB(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( shield_advanced_protection_in_classic_load_balancers, ) @@ -99,20 +99,20 @@ def test_shield_enabled_elb_protected(self): ) } - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.services.elb.elb_service import ELB with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", new=ELB(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( shield_advanced_protection_in_classic_load_balancers, ) @@ -158,20 +158,20 @@ def test_shield_enabled_elb_not_protected(self): shield_client.region = AWS_REGION shield_client.protections = {} - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.services.elb.elb_service import ELB with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", new=ELB(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( shield_advanced_protection_in_classic_load_balancers, ) @@ -217,20 +217,20 @@ def test_shield_disabled_elb_not_protected(self): shield_client.region = AWS_REGION shield_client.protections = {} - from providers.aws.services.elb.elb_service import ELB + from prowler.providers.aws.services.elb.elb_service import ELB with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers.elb_client", new=ELB(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_classic_load_balancers.shield_advanced_protection_in_classic_load_balancers import ( shield_advanced_protection_in_classic_load_balancers, ) diff --git a/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions_test.py b/tests/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions_test.py similarity index 77% rename from providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions_test.py rename to tests/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions_test.py index 2f789935974..24f7ae713d3 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions_test.py +++ b/tests/providers/aws/services/shield/shield_advanced_protection_in_cloudfront_distributions/shield_advanced_protection_in_cloudfront_distributions_test.py @@ -1,8 +1,9 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.cloudfront.cloudfront_service import Distribution -from providers.aws.services.shield.shield_service import Protection + +from prowler.providers.aws.services.cloudfront.cloudfront_service import Distribution +from prowler.providers.aws.services.shield.shield_service import Protection AWS_REGION = "eu-west-1" @@ -15,14 +16,14 @@ def test_no_shield_not_active(self): # CloudFront Client cloudfront_client = mock.MagicMock with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( shield_advanced_protection_in_cloudfront_distributions, ) @@ -60,14 +61,14 @@ def test_shield_enabled_cloudfront_protected(self): } with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( shield_advanced_protection_in_cloudfront_distributions, ) @@ -104,14 +105,14 @@ def test_shield_enabled_cloudfront_not_protected(self): shield_client.protections = {} with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( shield_advanced_protection_in_cloudfront_distributions, ) @@ -148,14 +149,14 @@ def test_shield_disabled_cloudfront_not_protected(self): shield_client.protections = {} with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.cloudfront.cloudfront_service.CloudFront", + "prowler.providers.aws.services.cloudfront.cloudfront_service.CloudFront", new=cloudfront_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_cloudfront_distributions.shield_advanced_protection_in_cloudfront_distributions import ( shield_advanced_protection_in_cloudfront_distributions, ) diff --git a/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators_test.py b/tests/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators_test.py similarity index 77% rename from providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators_test.py rename to tests/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators_test.py index f3a4842e0f6..45436e6b9c3 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators_test.py +++ b/tests/providers/aws/services/shield/shield_advanced_protection_in_global_accelerators/shield_advanced_protection_in_global_accelerators_test.py @@ -1,10 +1,11 @@ from unittest import mock from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.globalaccelerator.globalaccelerator_service import ( + +from prowler.providers.aws.services.globalaccelerator.globalaccelerator_service import ( Accelerator, ) -from providers.aws.services.shield.shield_service import Protection +from prowler.providers.aws.services.shield.shield_service import Protection AWS_REGION = "eu-west-1" @@ -17,14 +18,14 @@ def test_no_shield_not_active(self): # GlobalAccelerator Client globalaccelerator_client = mock.MagicMock with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", + "prowler.providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", new=globalaccelerator_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( shield_advanced_protection_in_global_accelerators, ) @@ -64,14 +65,14 @@ def test_shield_enabled_globalaccelerator_protected(self): } with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", + "prowler.providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", new=globalaccelerator_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( shield_advanced_protection_in_global_accelerators, ) @@ -110,14 +111,14 @@ def test_shield_enabled_globalaccelerator_not_protected(self): shield_client.protections = {} with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", + "prowler.providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", new=globalaccelerator_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( shield_advanced_protection_in_global_accelerators, ) @@ -156,14 +157,14 @@ def test_shield_disabled_globalaccelerator_not_protected(self): shield_client.protections = {} with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", + "prowler.providers.aws.services.globalaccelerator.globalaccelerator_service.GlobalAccelerator", new=globalaccelerator_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_global_accelerators.shield_advanced_protection_in_global_accelerators import ( shield_advanced_protection_in_global_accelerators, ) diff --git a/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers_test.py b/tests/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers_test.py similarity index 75% rename from providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers_test.py rename to tests/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers_test.py index 0e4740ad031..5f6e73b71b0 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers_test.py +++ b/tests/providers/aws/services/shield/shield_advanced_protection_in_internet_facing_load_balancers/shield_advanced_protection_in_internet_facing_load_balancers_test.py @@ -5,8 +5,8 @@ from moto import mock_ec2, mock_elbv2 from moto.core import DEFAULT_ACCOUNT_ID as AWS_ACCOUNT_NUMBER -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.shield.shield_service import Protection +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.shield.shield_service import Protection AWS_REGION = "eu-west-1" @@ -20,7 +20,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch( - "providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", + "prowler.providers.aws.services.accessanalyzer.accessanalyzer_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_shield_advanced_protection_in_internet_facing_load_balancers: @@ -52,20 +52,20 @@ def test_no_shield_not_active(self): shield_client = mock.MagicMock shield_client.enabled = False - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", new=ELBv2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( shield_advanced_protection_in_internet_facing_load_balancers, ) @@ -120,20 +120,20 @@ def test_shield_enabled_elbv2_internet_facing_protected(self): ) } - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", new=ELBv2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( shield_advanced_protection_in_internet_facing_load_balancers, ) @@ -196,20 +196,20 @@ def test_shield_enabled_elbv2_internal_protected(self): ) } - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", new=ELBv2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( shield_advanced_protection_in_internet_facing_load_balancers, ) @@ -251,20 +251,20 @@ def test_shield_enabled_elbv2_internet_facing_not_protected(self): shield_client.region = AWS_REGION shield_client.protections = {} - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", new=ELBv2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( shield_advanced_protection_in_internet_facing_load_balancers, ) @@ -314,20 +314,20 @@ def test_shield_disabled_elbv2_internet_facing_not_protected(self): shield_client.region = AWS_REGION shield_client.protections = {} - from providers.aws.services.elbv2.elbv2_service import ELBv2 + from prowler.providers.aws.services.elbv2.elbv2_service import ELBv2 with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.lib.audit_info.audit_info.current_audit_info", + "prowler.providers.aws.lib.audit_info.audit_info.current_audit_info", new=self.set_mocked_audit_info(), ), mock.patch( - "providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", + "prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers.elbv2_client", new=ELBv2(self.set_mocked_audit_info()), ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_internet_facing_load_balancers.shield_advanced_protection_in_internet_facing_load_balancers import ( shield_advanced_protection_in_internet_facing_load_balancers, ) diff --git a/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones_test.py b/tests/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones_test.py similarity index 78% rename from providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones_test.py rename to tests/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones_test.py index 6f326eb9eed..7d389abbe35 100644 --- a/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones_test.py +++ b/tests/providers/aws/services/shield/shield_advanced_protection_in_route53_hosted_zones/shield_advanced_protection_in_route53_hosted_zones_test.py @@ -1,9 +1,7 @@ from unittest import mock -from providers.aws.services.route53.route53_service import ( - HostedZone, -) -from providers.aws.services.shield.shield_service import Protection +from prowler.providers.aws.services.route53.route53_service import HostedZone +from prowler.providers.aws.services.shield.shield_service import Protection AWS_REGION = "eu-west-1" @@ -16,14 +14,14 @@ def test_no_shield_not_active(self): # Route53 Client route53_client = mock.MagicMock with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( shield_advanced_protection_in_route53_hosted_zones, ) @@ -66,14 +64,14 @@ def test_shield_enabled_route53_hosted_zone_protected(self): } with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( shield_advanced_protection_in_route53_hosted_zones, ) @@ -115,14 +113,14 @@ def test_shield_enabled_route53_hosted_zone_not_protected(self): shield_client.protections = {} with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( shield_advanced_protection_in_route53_hosted_zones, ) @@ -164,14 +162,14 @@ def test_shield_disabled_route53_hosted_zone_not_protected(self): shield_client.protections = {} with mock.patch( - "providers.aws.services.shield.shield_service.Shield", + "prowler.providers.aws.services.shield.shield_service.Shield", new=shield_client, ), mock.patch( - "providers.aws.services.route53.route53_service.Route53", + "prowler.providers.aws.services.route53.route53_service.Route53", new=route53_client, ): # Test Check - from providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( + from prowler.providers.aws.services.shield.shield_advanced_protection_in_route53_hosted_zones.shield_advanced_protection_in_route53_hosted_zones import ( shield_advanced_protection_in_route53_hosted_zones, ) diff --git a/providers/aws/services/shield/shield_service_test.py b/tests/providers/aws/services/shield/shield_service_test.py similarity index 96% rename from providers/aws/services/shield/shield_service_test.py rename to tests/providers/aws/services/shield/shield_service_test.py index b9ac7c67078..9a6e7fa6a21 100644 --- a/providers/aws/services/shield/shield_service_test.py +++ b/tests/providers/aws/services/shield/shield_service_test.py @@ -1,9 +1,10 @@ -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.shield.shield_service import Shield -from mock import patch -from moto.core import DEFAULT_ACCOUNT_ID import botocore from boto3 import session +from mock import patch +from moto.core import DEFAULT_ACCOUNT_ID + +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.shield.shield_service import Shield # Mock Test Region AWS_REGION = "eu-west-1" diff --git a/providers/aws/services/sns/sns_service_test.py b/tests/providers/aws/services/sns/sns_service_test.py similarity index 94% rename from providers/aws/services/sns/sns_service_test.py rename to tests/providers/aws/services/sns/sns_service_test.py index 8f024edc268..ef24b9ae908 100644 --- a/providers/aws/services/sns/sns_service_test.py +++ b/tests/providers/aws/services/sns/sns_service_test.py @@ -6,8 +6,8 @@ from boto3 import client, session from moto import mock_sns -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.sns.sns_service import SNS +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.sns.sns_service import SNS AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -44,7 +44,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.sns.sns_service.generate_regional_clients", + "prowler.providers.aws.services.sns.sns_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_SNS_Service: diff --git a/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled_test.py b/tests/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled_test.py similarity index 76% rename from providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled_test.py rename to tests/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled_test.py index 623224e33d9..4d0eea1e57f 100644 --- a/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled_test.py +++ b/tests/providers/aws/services/sns/sns_topics_kms_encryption_at_rest_enabled/sns_topics_kms_encryption_at_rest_enabled_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.sns.sns_service import Topic +from prowler.providers.aws.services.sns.sns_service import Topic AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ def test_no_topics(self): sns_client = mock.MagicMock sns_client.topics = [] with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_kms_encryption_at_rest_enabled.sns_topics_kms_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.sns.sns_topics_kms_encryption_at_rest_enabled.sns_topics_kms_encryption_at_rest_enabled import ( sns_topics_kms_encryption_at_rest_enabled, ) @@ -40,10 +40,10 @@ def test_topics_with_key(self): ) ) with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_kms_encryption_at_rest_enabled.sns_topics_kms_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.sns.sns_topics_kms_encryption_at_rest_enabled.sns_topics_kms_encryption_at_rest_enabled import ( sns_topics_kms_encryption_at_rest_enabled, ) @@ -62,10 +62,10 @@ def test_topics_no_key(self): Topic(arn=topic_arn, name=topic_name, region=AWS_REGION) ) with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_kms_encryption_at_rest_enabled.sns_topics_kms_encryption_at_rest_enabled import ( + from prowler.providers.aws.services.sns.sns_topics_kms_encryption_at_rest_enabled.sns_topics_kms_encryption_at_rest_enabled import ( sns_topics_kms_encryption_at_rest_enabled, ) diff --git a/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible_test.py b/tests/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible_test.py similarity index 81% rename from providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible_test.py rename to tests/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible_test.py index d1c942eeeb1..951df40d096 100644 --- a/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/sns/sns_topics_not_publicly_accessible/sns_topics_not_publicly_accessible_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.sns.sns_service import Topic +from prowler.providers.aws.services.sns.sns_service import Topic AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -50,10 +50,10 @@ def test_no_topics(self): sns_client = mock.MagicMock sns_client.topics = [] with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( + from prowler.providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( sns_topics_not_publicly_accessible, ) @@ -73,10 +73,10 @@ def test_topics_not_public(self): ) ) with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( + from prowler.providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( sns_topics_not_publicly_accessible, ) @@ -95,10 +95,10 @@ def test_topics_no_policy(self): Topic(arn=topic_arn, name=topic_name, region=AWS_REGION) ) with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( + from prowler.providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( sns_topics_not_publicly_accessible, ) @@ -122,10 +122,10 @@ def test_topics_public_with_condition(self): ) ) with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( + from prowler.providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( sns_topics_not_publicly_accessible, ) @@ -149,10 +149,10 @@ def test_topics_no_key(self): ) ) with mock.patch( - "providers.aws.services.sns.sns_service.SNS", + "prowler.providers.aws.services.sns.sns_service.SNS", sns_client, ): - from providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( + from prowler.providers.aws.services.sns.sns_topics_not_publicly_accessible.sns_topics_not_publicly_accessible import ( sns_topics_not_publicly_accessible, ) diff --git a/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible_test.py b/tests/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible_test.py similarity index 82% rename from providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible_test.py rename to tests/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible_test.py index 78eeecb37e7..061d4086249 100644 --- a/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible_test.py +++ b/tests/providers/aws/services/sqs/sqs_queues_not_publicly_accessible/sqs_queues_not_publicly_accessible_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.sqs.sqs_service import Queue +from prowler.providers.aws.services.sqs.sqs_service import Queue AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -62,10 +62,10 @@ def test_no_queues(self): sqs_client = mock.MagicMock sqs_client.queues = [] with mock.patch( - "providers.aws.services.sqs.sqs_service.SQS", + "prowler.providers.aws.services.sqs.sqs_service.SQS", sqs_client, ): - from providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( + from prowler.providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( sqs_queues_not_publicly_accessible, ) @@ -80,10 +80,10 @@ def test_queues_not_public(self): Queue(id=queue_id, region=AWS_REGION, policy=test_restricted_policy) ) with mock.patch( - "providers.aws.services.sqs.sqs_service.SQS", + "prowler.providers.aws.services.sqs.sqs_service.SQS", sqs_client, ): - from providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( + from prowler.providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( sqs_queues_not_publicly_accessible, ) @@ -102,10 +102,10 @@ def test_queues_public(self): Queue(id=queue_id, region=AWS_REGION, policy=test_public_policy) ) with mock.patch( - "providers.aws.services.sqs.sqs_service.SQS", + "prowler.providers.aws.services.sqs.sqs_service.SQS", sqs_client, ): - from providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( + from prowler.providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( sqs_queues_not_publicly_accessible, ) @@ -126,10 +126,10 @@ def test_queues_public_with_condition(self): ) ) with mock.patch( - "providers.aws.services.sqs.sqs_service.SQS", + "prowler.providers.aws.services.sqs.sqs_service.SQS", sqs_client, ): - from providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( + from prowler.providers.aws.services.sqs.sqs_queues_not_publicly_accessible.sqs_queues_not_publicly_accessible import ( sqs_queues_not_publicly_accessible, ) diff --git a/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled_test.py b/tests/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled_test.py similarity index 76% rename from providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled_test.py rename to tests/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled_test.py index 7225e691f0b..caeb9f53acd 100644 --- a/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled_test.py +++ b/tests/providers/aws/services/sqs/sqs_queues_server_side_encryption_enabled/sqs_queues_server_side_encryption_enabled_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.sqs.sqs_service import Queue +from prowler.providers.aws.services.sqs.sqs_service import Queue AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -17,10 +17,10 @@ def test_no_queues(self): sqs_client = mock.MagicMock sqs_client.queues = [] with mock.patch( - "providers.aws.services.sqs.sqs_service.SQS", + "prowler.providers.aws.services.sqs.sqs_service.SQS", sqs_client, ): - from providers.aws.services.sqs.sqs_queues_server_side_encryption_enabled.sqs_queues_server_side_encryption_enabled import ( + from prowler.providers.aws.services.sqs.sqs_queues_server_side_encryption_enabled.sqs_queues_server_side_encryption_enabled import ( sqs_queues_server_side_encryption_enabled, ) @@ -35,10 +35,10 @@ def test_queues_with_encryption(self): Queue(id=queue_id, region=AWS_REGION, kms_key_id=test_kms_key_id) ) with mock.patch( - "providers.aws.services.sqs.sqs_service.SQS", + "prowler.providers.aws.services.sqs.sqs_service.SQS", sqs_client, ): - from providers.aws.services.sqs.sqs_queues_server_side_encryption_enabled.sqs_queues_server_side_encryption_enabled import ( + from prowler.providers.aws.services.sqs.sqs_queues_server_side_encryption_enabled.sqs_queues_server_side_encryption_enabled import ( sqs_queues_server_side_encryption_enabled, ) @@ -60,10 +60,10 @@ def test_queues_no_encryption(self): ) ) with mock.patch( - "providers.aws.services.sqs.sqs_service.SQS", + "prowler.providers.aws.services.sqs.sqs_service.SQS", sqs_client, ): - from providers.aws.services.sqs.sqs_queues_server_side_encryption_enabled.sqs_queues_server_side_encryption_enabled import ( + from prowler.providers.aws.services.sqs.sqs_queues_server_side_encryption_enabled.sqs_queues_server_side_encryption_enabled import ( sqs_queues_server_side_encryption_enabled, ) diff --git a/providers/aws/services/sqs/sqs_service_test.py b/tests/providers/aws/services/sqs/sqs_service_test.py similarity index 94% rename from providers/aws/services/sqs/sqs_service_test.py rename to tests/providers/aws/services/sqs/sqs_service_test.py index 7505c997659..4341b3296f3 100644 --- a/providers/aws/services/sqs/sqs_service_test.py +++ b/tests/providers/aws/services/sqs/sqs_service_test.py @@ -6,8 +6,8 @@ from boto3 import client, session from moto import mock_sqs -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.sqs.sqs_service import SQS +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.sqs.sqs_service import SQS AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -46,7 +46,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.sqs.sqs_service.generate_regional_clients", + "prowler.providers.aws.services.sqs.sqs_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_SQS_Service: diff --git a/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets_test.py b/tests/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets_test.py similarity index 83% rename from providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets_test.py rename to tests/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets_test.py index f1b4a0129f1..374fc9572bc 100644 --- a/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets_test.py +++ b/tests/providers/aws/services/ssm/ssm_document_secrets/ssm_document_secrets_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.ssm.ssm_service import Document +from prowler.providers.aws.services.ssm.ssm_service import Document AWS_REGION = "eu-west-1" @@ -12,11 +12,11 @@ def test_no_documents(self): ssm_client = mock.MagicMock ssm_client.documents = {} with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_document_secrets.ssm_document_secrets import ( + from prowler.providers.aws.services.ssm.ssm_document_secrets.ssm_document_secrets import ( ssm_document_secrets, ) @@ -41,11 +41,11 @@ def test_document_with_secrets(self): ) } with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_document_secrets.ssm_document_secrets import ( + from prowler.providers.aws.services.ssm.ssm_document_secrets.ssm_document_secrets import ( ssm_document_secrets, ) @@ -78,11 +78,11 @@ def test_document_no_secrets(self): ) } with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_document_secrets.ssm_document_secrets import ( + from prowler.providers.aws.services.ssm.ssm_document_secrets.ssm_document_secrets import ( ssm_document_secrets, ) diff --git a/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public_test.py b/tests/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public_test.py similarity index 82% rename from providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public_test.py rename to tests/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public_test.py index 1979be7fa13..65a5de265a9 100644 --- a/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public_test.py +++ b/tests/providers/aws/services/ssm/ssm_documents_set_as_public/ssm_documents_set_as_public_test.py @@ -2,7 +2,7 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.ssm.ssm_service import Document +from prowler.providers.aws.services.ssm.ssm_service import Document AWS_REGION = "eu-west-1" @@ -12,11 +12,11 @@ def test_no_documents(self): ssm_client = mock.MagicMock ssm_client.documents = {} with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_documents_set_as_public.ssm_documents_set_as_public import ( + from prowler.providers.aws.services.ssm.ssm_documents_set_as_public.ssm_documents_set_as_public import ( ssm_documents_set_as_public, ) @@ -41,11 +41,11 @@ def test_document_public(self): ) } with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_documents_set_as_public.ssm_documents_set_as_public import ( + from prowler.providers.aws.services.ssm.ssm_documents_set_as_public.ssm_documents_set_as_public import ( ssm_documents_set_as_public, ) @@ -77,11 +77,11 @@ def test_document_not_public(self): ) } with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_documents_set_as_public.ssm_documents_set_as_public import ( + from prowler.providers.aws.services.ssm.ssm_documents_set_as_public.ssm_documents_set_as_public import ( ssm_documents_set_as_public, ) diff --git a/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching_test.py b/tests/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching_test.py similarity index 81% rename from providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching_test.py rename to tests/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching_test.py index 7ea0a6c1afe..b4f5fc33097 100644 --- a/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching_test.py +++ b/tests/providers/aws/services/ssm/ssm_managed_compliant_patching/ssm_managed_compliant_patching_test.py @@ -2,7 +2,10 @@ from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.services.ssm.ssm_service import ComplianceResource, ResourceStatus +from prowler.providers.aws.services.ssm.ssm_service import ( + ComplianceResource, + ResourceStatus, +) AWS_REGION = "eu-west-1" @@ -12,11 +15,11 @@ def test_no_compliance_resources(self): ssm_client = mock.MagicMock ssm_client.compliance_resources = {} with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_managed_compliant_patching.ssm_managed_compliant_patching import ( + from prowler.providers.aws.services.ssm.ssm_managed_compliant_patching.ssm_managed_compliant_patching import ( ssm_managed_compliant_patching, ) @@ -41,11 +44,11 @@ def test_compliance_resources_compliant(self): } with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_managed_compliant_patching.ssm_managed_compliant_patching import ( + from prowler.providers.aws.services.ssm.ssm_managed_compliant_patching.ssm_managed_compliant_patching import ( ssm_managed_compliant_patching, ) @@ -78,11 +81,11 @@ def test_compliance_resources_non_compliant(self): } with mock.patch( - "providers.aws.services.ssm.ssm_service.SSM", + "prowler.providers.aws.services.ssm.ssm_service.SSM", new=ssm_client, ): # Test Check - from providers.aws.services.ssm.ssm_managed_compliant_patching.ssm_managed_compliant_patching import ( + from prowler.providers.aws.services.ssm.ssm_managed_compliant_patching.ssm_managed_compliant_patching import ( ssm_managed_compliant_patching, ) diff --git a/providers/aws/services/ssm/ssm_service_test.py b/tests/providers/aws/services/ssm/ssm_service_test.py similarity index 96% rename from providers/aws/services/ssm/ssm_service_test.py rename to tests/providers/aws/services/ssm/ssm_service_test.py index ebf899f9add..3080fa5ea55 100644 --- a/providers/aws/services/ssm/ssm_service_test.py +++ b/tests/providers/aws/services/ssm/ssm_service_test.py @@ -6,8 +6,8 @@ from moto import mock_ssm from moto.core import DEFAULT_ACCOUNT_ID -from providers.aws.lib.audit_info.audit_info import AWS_Audit_Info -from providers.aws.services.ssm.ssm_service import SSM, ResourceStatus +from prowler.providers.aws.lib.audit_info.audit_info import AWS_Audit_Info +from prowler.providers.aws.services.ssm.ssm_service import SSM, ResourceStatus # Mock Test Region AWS_REGION = "eu-west-1" @@ -119,7 +119,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.ssm.ssm_service.generate_regional_clients", + "prowler.providers.aws.services.ssm.ssm_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_SSM_Service: diff --git a/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings_test.py b/tests/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings_test.py similarity index 72% rename from providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings_test.py rename to tests/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings_test.py index 62f1f762457..e484ead322d 100644 --- a/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings_test.py +++ b/tests/providers/aws/services/trustedadvisor/trustedadvisor_errors_and_warnings/trustedadvisor_errors_and_warnings_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.trustedadvisor.trustedadvisor_service import Check +from prowler.providers.aws.services.trustedadvisor.trustedadvisor_service import Check AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ def test_no_detectors(self): trustedadvisor_client = mock.MagicMock trustedadvisor_client.checks = [] with mock.patch( - "providers.aws.services.trustedadvisor.trustedadvisor_service.TrustedAdvisor", + "prowler.providers.aws.services.trustedadvisor.trustedadvisor_service.TrustedAdvisor", trustedadvisor_client, ): - from providers.aws.services.trustedadvisor.trustedadvisor_errors_and_warnings.trustedadvisor_errors_and_warnings import ( + from prowler.providers.aws.services.trustedadvisor.trustedadvisor_errors_and_warnings.trustedadvisor_errors_and_warnings import ( trustedadvisor_errors_and_warnings, ) @@ -38,10 +38,10 @@ def test_trustedadvisor_all_passed_checks(self): ) ) with mock.patch( - "providers.aws.services.trustedadvisor.trustedadvisor_service.TrustedAdvisor", + "prowler.providers.aws.services.trustedadvisor.trustedadvisor_service.TrustedAdvisor", trustedadvisor_client, ): - from providers.aws.services.trustedadvisor.trustedadvisor_errors_and_warnings.trustedadvisor_errors_and_warnings import ( + from prowler.providers.aws.services.trustedadvisor.trustedadvisor_errors_and_warnings.trustedadvisor_errors_and_warnings import ( trustedadvisor_errors_and_warnings, ) @@ -64,10 +64,10 @@ def test_trustedadvisor_error_check(self): ) ) with mock.patch( - "providers.aws.services.trustedadvisor.trustedadvisor_service.TrustedAdvisor", + "prowler.providers.aws.services.trustedadvisor.trustedadvisor_service.TrustedAdvisor", trustedadvisor_client, ): - from providers.aws.services.trustedadvisor.trustedadvisor_errors_and_warnings.trustedadvisor_errors_and_warnings import ( + from prowler.providers.aws.services.trustedadvisor.trustedadvisor_errors_and_warnings.trustedadvisor_errors_and_warnings import ( trustedadvisor_errors_and_warnings, ) diff --git a/providers/aws/services/trustedadvisor/trustedadvisor_service_test.py b/tests/providers/aws/services/trustedadvisor/trustedadvisor_service_test.py similarity index 90% rename from providers/aws/services/trustedadvisor/trustedadvisor_service_test.py rename to tests/providers/aws/services/trustedadvisor/trustedadvisor_service_test.py index 9e32331de31..24bfeb715eb 100644 --- a/providers/aws/services/trustedadvisor/trustedadvisor_service_test.py +++ b/tests/providers/aws/services/trustedadvisor/trustedadvisor_service_test.py @@ -4,8 +4,10 @@ from boto3 import session from moto import mock_support -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.trustedadvisor.trustedadvisor_service import TrustedAdvisor +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.trustedadvisor.trustedadvisor_service import ( + TrustedAdvisor, +) AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" @@ -27,7 +29,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.trustedadvisor.trustedadvisor_service.generate_regional_clients", + "prowler.providers.aws.services.trustedadvisor.trustedadvisor_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_TrustedAdvisor_Service: diff --git a/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries_test.py b/tests/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries_test.py similarity index 77% rename from providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries_test.py rename to tests/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries_test.py index f8612653ffd..8dc0dc5aa67 100644 --- a/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries_test.py +++ b/tests/providers/aws/services/vpc/vpc_endpoint_connections_trust_boundaries/vpc_endpoint_connections_trust_boundaries_test.py @@ -17,17 +17,17 @@ def mock_get_config_var(config_var): class Test_vpc_endpoint_connections_trust_boundaries: @mock_ec2 def test_vpc_no_endpoints(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", + "prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( + from prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( vpc_endpoint_connections_trust_boundaries, ) @@ -62,17 +62,17 @@ def test_vpc_endpoint_with_full_access(self): } ), ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", + "prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( + from prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( vpc_endpoint_connections_trust_boundaries, ) @@ -114,18 +114,18 @@ def test_vpc_endpoint_with_trusted_account(self): } ), ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" current_audit_info.audited_account = ACCOUNT_ID with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", + "prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( + from prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( vpc_endpoint_connections_trust_boundaries, ) @@ -167,18 +167,18 @@ def test_vpc_endpoint_with_untrusted_account(self): } ), ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" current_audit_info.audited_account = ACCOUNT_ID with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", + "prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( + from prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( vpc_endpoint_connections_trust_boundaries, ) @@ -219,22 +219,22 @@ def test_vpc_endpoint_with_config_trusted_account(self): } ), ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" current_audit_info.audited_account = ACCOUNT_ID with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", + "prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.vpc_client", new=VPC(current_audit_info), ): with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.get_config_var", + "prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries.get_config_var", new=mock_get_config_var, ): # Test Check - from providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( + from prowler.providers.aws.services.vpc.vpc_endpoint_connections_trust_boundaries.vpc_endpoint_connections_trust_boundaries import ( vpc_endpoint_connections_trust_boundaries, ) diff --git a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py b/tests/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py similarity index 77% rename from providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py rename to tests/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py index 2a5bab299cc..3c4c569a5ea 100644 --- a/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py +++ b/tests/providers/aws/services/vpc/vpc_endpoint_services_allowed_principals_trust_boundaries/vpc_endpoint_services_allowed_principals_trust_boundaries_test.py @@ -36,17 +36,17 @@ def mock_make_api_call(self, operation_name, kwarg): class Test_vpc_endpoint_services_allowed_principals_trust_boundaries: @mock_ec2 def test_vpc_no_endpoint_services(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_client", + "prowler.providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries import ( + from prowler.providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries import ( vpc_endpoint_services_allowed_principals_trust_boundaries, ) @@ -83,17 +83,17 @@ def test_vpc_endpoint_service_without_allowed_principals(self): # NetworkLoadBalancerArns=[lb_arn] # ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_client", + "prowler.providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries import ( + from prowler.providers.aws.services.vpc.vpc_endpoint_services_allowed_principals_trust_boundaries.vpc_endpoint_services_allowed_principals_trust_boundaries import ( vpc_endpoint_services_allowed_principals_trust_boundaries, ) diff --git a/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py b/tests/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py similarity index 72% rename from providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py rename to tests/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py index e602c5f263c..30912b2ae9b 100644 --- a/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py +++ b/tests/providers/aws/services/vpc/vpc_flow_logs_enabled/vpc_flow_logs_enabled_test.py @@ -10,17 +10,17 @@ class Test_vpc_flow_logs_enabled: @mock_ec2 def test_vpc_only_default_vpcs(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled.vpc_client", + "prowler.providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled import ( + from prowler.providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled import ( vpc_flow_logs_enabled, ) @@ -47,17 +47,17 @@ def test_vpc_with_flow_logs(self): DeliverLogsPermissionArn="arn:aws:iam::" + ACCOUNT_ID + ":role/test-role", ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled.vpc_client", + "prowler.providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled import ( + from prowler.providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled import ( vpc_flow_logs_enabled, ) @@ -81,17 +81,17 @@ def test_vpc_without_flow_logs(self): vpc = ec2_client.create_vpc(CidrBlock="10.0.0.0/16")["Vpc"] - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled.vpc_client", + "prowler.providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled import ( + from prowler.providers.aws.services.vpc.vpc_flow_logs_enabled.vpc_flow_logs_enabled import ( vpc_flow_logs_enabled, ) diff --git a/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege_test.py b/tests/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege_test.py similarity index 78% rename from providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege_test.py rename to tests/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege_test.py index 0c670772a9b..e15430942f5 100644 --- a/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege_test.py +++ b/tests/providers/aws/services/vpc/vpc_peering_routing_tables_with_least_privilege/vpc_peering_routing_tables_with_least_privilege_test.py @@ -10,17 +10,17 @@ class Test_vpc_peering_routing_tables_with_least_privilege: @mock_ec2 def test_vpc_no_peering_connections(self): - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege.vpc_client", + "prowler.providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege.vpc_client", new=VPC(current_audit_info), ): # Test Check - from providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege import ( + from prowler.providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege import ( vpc_peering_routing_tables_with_least_privilege, ) @@ -57,17 +57,17 @@ def test_vpc_comply_peering_connection_(self): DestinationCidrBlock="10.0.0.4/24", VpcPeeringConnectionId=vpc_pcx_id ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC, Route + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC, Route current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege.vpc_client", + "prowler.providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege.vpc_client", new=VPC(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege import ( + from prowler.providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege import ( vpc_peering_routing_tables_with_least_privilege, ) @@ -119,17 +119,17 @@ def test_vpc_not_comply_peering_connection_(self): DestinationCidrBlock="10.0.0.0/16", VpcPeeringConnectionId=vpc_pcx_id ) - from providers.aws.lib.audit_info.audit_info import current_audit_info - from providers.aws.services.vpc.vpc_service import VPC, Route + from prowler.providers.aws.lib.audit_info.audit_info import current_audit_info + from prowler.providers.aws.services.vpc.vpc_service import VPC, Route current_audit_info.audited_partition = "aws" with mock.patch( - "providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege.vpc_client", + "prowler.providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege.vpc_client", new=VPC(current_audit_info), ) as service_client: # Test Check - from providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege import ( + from prowler.providers.aws.services.vpc.vpc_peering_routing_tables_with_least_privilege.vpc_peering_routing_tables_with_least_privilege import ( vpc_peering_routing_tables_with_least_privilege, ) diff --git a/providers/aws/services/vpc/vpc_service_test.py b/tests/providers/aws/services/vpc/vpc_service_test.py similarity index 98% rename from providers/aws/services/vpc/vpc_service_test.py rename to tests/providers/aws/services/vpc/vpc_service_test.py index e441159508f..685c9b0e2ae 100644 --- a/providers/aws/services/vpc/vpc_service_test.py +++ b/tests/providers/aws/services/vpc/vpc_service_test.py @@ -3,8 +3,8 @@ from boto3 import client, resource, session from moto import mock_ec2, mock_elbv2 -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.vpc.vpc_service import VPC, Route +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.vpc.vpc_service import VPC, Route AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/waf/waf_service_test.py b/tests/providers/aws/services/waf/waf_service_test.py similarity index 94% rename from providers/aws/services/waf/waf_service_test.py rename to tests/providers/aws/services/waf/waf_service_test.py index 8a8aacc0b6c..6e175248aee 100644 --- a/providers/aws/services/waf/waf_service_test.py +++ b/tests/providers/aws/services/waf/waf_service_test.py @@ -3,8 +3,8 @@ import botocore from boto3 import session -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.waf.waf_service import WAF +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.waf.waf_service import WAF AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" @@ -41,7 +41,7 @@ def mock_generate_regional_clients(service, audit_info): # Patch every AWS call using Boto3 and generate_regional_clients to have 1 client @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.waf.waf_service.generate_regional_clients", + "prowler.providers.aws.services.waf.waf_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_WAF_Service: diff --git a/providers/aws/services/wafv2/wafv2_service_test.py b/tests/providers/aws/services/wafv2/wafv2_service_test.py similarity index 96% rename from providers/aws/services/wafv2/wafv2_service_test.py rename to tests/providers/aws/services/wafv2/wafv2_service_test.py index ee9d7fdc66d..7e46f952c2a 100644 --- a/providers/aws/services/wafv2/wafv2_service_test.py +++ b/tests/providers/aws/services/wafv2/wafv2_service_test.py @@ -1,8 +1,8 @@ from boto3 import client, resource, session from moto import mock_ec2, mock_elbv2, mock_wafv2 -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.wafv2.wafv2_service import WAFv2 +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.wafv2.wafv2_service import WAFv2 AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "us-east-1" diff --git a/providers/aws/services/workspaces/workspaces_service_test.py b/tests/providers/aws/services/workspaces/workspaces_service_test.py similarity index 92% rename from providers/aws/services/workspaces/workspaces_service_test.py rename to tests/providers/aws/services/workspaces/workspaces_service_test.py index f85448ce216..07e598d958f 100644 --- a/providers/aws/services/workspaces/workspaces_service_test.py +++ b/tests/providers/aws/services/workspaces/workspaces_service_test.py @@ -4,8 +4,8 @@ import botocore from boto3 import session -from providers.aws.lib.audit_info.models import AWS_Audit_Info -from providers.aws.services.workspaces.workspaces_service import WorkSpaces +from prowler.providers.aws.lib.audit_info.models import AWS_Audit_Info +from prowler.providers.aws.services.workspaces.workspaces_service import WorkSpaces AWS_ACCOUNT_NUMBER = 123456789012 AWS_REGION = "eu-west-1" @@ -38,7 +38,7 @@ def mock_generate_regional_clients(service, audit_info): @patch("botocore.client.BaseClient._make_api_call", new=mock_make_api_call) @patch( - "providers.aws.services.workspaces.workspaces_service.generate_regional_clients", + "prowler.providers.aws.services.workspaces.workspaces_service.generate_regional_clients", new=mock_generate_regional_clients, ) class Test_WorkSpaces_Service: diff --git a/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled_test.py b/tests/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled_test.py similarity index 77% rename from providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled_test.py rename to tests/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled_test.py index d144479dce1..70e7b4a8701 100644 --- a/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled_test.py +++ b/tests/providers/aws/services/workspaces/workspaces_volume_encryption_enabled/workspaces_volume_encryption_enabled_test.py @@ -2,7 +2,7 @@ from unittest import mock from uuid import uuid4 -from providers.aws.services.workspaces.workspaces_service import WorkSpace +from prowler.providers.aws.services.workspaces.workspaces_service import WorkSpace AWS_REGION = "eu-west-1" AWS_ACCOUNT_NUMBER = "123456789012" @@ -15,10 +15,10 @@ def test_no_workspaces(self): workspaces_client = mock.MagicMock workspaces_client.workspaces = [] with mock.patch( - "providers.aws.services.workspaces.workspaces_service.WorkSpaces", + "prowler.providers.aws.services.workspaces.workspaces_service.WorkSpaces", workspaces_client, ): - from providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( + from prowler.providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( workspaces_volume_encryption_enabled, ) @@ -38,10 +38,10 @@ def test_workspaces_encrypted(self): ) ) with mock.patch( - "providers.aws.services.workspaces.workspaces_service.WorkSpaces", + "prowler.providers.aws.services.workspaces.workspaces_service.WorkSpaces", workspaces_client, ): - from providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( + from prowler.providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( workspaces_volume_encryption_enabled, ) @@ -67,10 +67,10 @@ def test_workspaces_user_not_encrypted(self): ) ) with mock.patch( - "providers.aws.services.workspaces.workspaces_service.WorkSpaces", + "prowler.providers.aws.services.workspaces.workspaces_service.WorkSpaces", workspaces_client, ): - from providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( + from prowler.providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( workspaces_volume_encryption_enabled, ) @@ -94,10 +94,10 @@ def test_workspaces_root_not_encrypted(self): ) ) with mock.patch( - "providers.aws.services.workspaces.workspaces_service.WorkSpaces", + "prowler.providers.aws.services.workspaces.workspaces_service.WorkSpaces", workspaces_client, ): - from providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( + from prowler.providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( workspaces_volume_encryption_enabled, ) @@ -121,10 +121,10 @@ def test_workspaces_user_and_root_not_encrypted(self): ) ) with mock.patch( - "providers.aws.services.workspaces.workspaces_service.WorkSpaces", + "prowler.providers.aws.services.workspaces.workspaces_service.WorkSpaces", workspaces_client, ): - from providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( + from prowler.providers.aws.services.workspaces.workspaces_volume_encryption_enabled.workspaces_volume_encryption_enabled import ( workspaces_volume_encryption_enabled, ) diff --git a/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on_test.py b/tests/providers/azure/azure_provider_test.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on_test.py rename to tests/providers/azure/azure_provider_test.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on_test.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_app_services_is_on/defender_ensure_defender_for_app_services_is_on_test.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on_test.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_arm_is_on/defender_ensure_defender_for_arm_is_on_test.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on_test.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_azure_sql_databases_is_on/defender_ensure_defender_for_azure_sql_databases_is_on_test.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on_test.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_containers_is_on/defender_ensure_defender_for_containers_is_on_test.py diff --git a/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on_test.py similarity index 100% rename from providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_cosmosdb_is_on/defender_ensure_defender_for_cosmosdb_is_on_test.py diff --git a/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on_test.py similarity index 100% rename from providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_databases_is_on/defender_ensure_defender_for_databases_is_on_test.py diff --git a/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on_test.py similarity index 100% rename from providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_dns_is_on/defender_ensure_defender_for_dns_is_on_test.py diff --git a/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on_test.py similarity index 100% rename from providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_keyvault_is_on/defender_ensure_defender_for_keyvault_is_on_test.py diff --git a/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on_test.py similarity index 100% rename from providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_os_relational_databases_is_on/defender_ensure_defender_for_os_relational_databases_is_on_test.py diff --git a/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on_test.py similarity index 100% rename from providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_server_is_on/defender_ensure_defender_for_server_is_on_test.py diff --git a/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on_test.py similarity index 100% rename from providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_sql_servers_is_on/defender_ensure_defender_for_sql_servers_is_on_test.py diff --git a/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled_test.py b/tests/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on_test.py similarity index 100% rename from providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled_test.py rename to tests/providers/azure/services/defender/defender_ensure_defender_for_storage_is_on/defender_ensure_defender_for_storage_is_on_test.py diff --git a/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled_test.py b/tests/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/__init__.py similarity index 100% rename from providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled_test.py rename to tests/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/__init__.py diff --git a/tests/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created_test.py b/tests/providers/azure/services/iam/iam_subscription_roles_owner_custom_not_created/iam_subscription_roles_owner_custom_not_created_test.py new file mode 100644 index 00000000000..e69de29bb2d diff --git a/tests/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled_test.py b/tests/providers/azure/services/storage/storage_blob_public_access_level_is_disabled/storage_blob_public_access_level_is_disabled_test.py new file mode 100644 index 00000000000..e69de29bb2d diff --git a/tests/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied_test.py b/tests/providers/azure/services/storage/storage_default_network_access_rule_is_denied/storage_default_network_access_rule_is_denied_test.py new file mode 100644 index 00000000000..e69de29bb2d diff --git a/tests/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled_test.py b/tests/providers/azure/services/storage/storage_ensure_azure_services_are_trusted_to_access_is_enabled/storage_ensure_azure_services_are_trusted_to_access_is_enabled_test.py new file mode 100644 index 00000000000..e69de29bb2d diff --git a/tests/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys_test.py b/tests/providers/azure/services/storage/storage_ensure_encryption_with_customer_managed_keys/storage_ensure_encryption_with_customer_managed_keys_test.py new file mode 100644 index 00000000000..e69de29bb2d diff --git a/tests/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12_test.py b/tests/providers/azure/services/storage/storage_ensure_minimum_tls_version_12/storage_ensure_minimum_tls_version_12_test.py new file mode 100644 index 00000000000..e69de29bb2d diff --git a/tests/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled_test.py b/tests/providers/azure/services/storage/storage_infrastructure_encryption_is_enabled/storage_infrastructure_encryption_is_enabled_test.py new file mode 100644 index 00000000000..e69de29bb2d diff --git a/tests/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled_test.py b/tests/providers/azure/services/storage/storage_secure_transfer_required_is_enabled/storage_secure_transfer_required_is_enabled_test.py new file mode 100644 index 00000000000..e69de29bb2d diff --git a/util/generate_compliance_json_from_csv_for_ens.py b/util/generate_compliance_json_from_csv_for_ens.py index 7cd8559ac8b..18cd38f0739 100644 --- a/util/generate_compliance_json_from_csv_for_ens.py +++ b/util/generate_compliance_json_from_csv_for_ens.py @@ -1,6 +1,6 @@ import csv -import sys import json +import sys # Convert a CSV file following the Spanish ENS - Esquema Nacional de Seguridad - RD2022 benchmark into a Prowler v3.0 Compliance JSON file # CSV fields: diff --git a/util/update_aws_services_regions.py b/util/update_aws_services_regions.py index 0fccd77eb69..4651618980e 100644 --- a/util/update_aws_services_regions.py +++ b/util/update_aws_services_regions.py @@ -20,7 +20,7 @@ with request.urlopen(aws_services_json_url) as url: # Get the AWS regions matrix online logging.info(f"Downloading JSON from {aws_services_json_url}") original_matrix_regions_aws = json.loads(url.read().decode()) -parsed__matrix_regions_aws = f"{os.path.dirname(os.path.realpath(__name__))}/providers/aws/aws_regions_by_service.json" +parsed__matrix_regions_aws = f"{os.path.dirname(os.path.realpath(__name__))}/prowler/providers/aws/aws_regions_by_service.json" # JSON objects regions_by_service = {}