# Copyright 2021 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. import os import pytest FIXTURES_DIR = os.path.join(os.path.dirname(__file__), 'fixture') def test_audit_config(plan_runner): "Test audit config." iam_audit_config = '{allServices={DATA_READ=[], DATA_WRITE=["user:me@example.org"]}}' _, resources = plan_runner(FIXTURES_DIR, iam_audit_config=iam_audit_config) assert len(resources) == 1 log_types = set(r['log_type'] for r in resources[0]['values']['audit_log_config']) assert log_types == set(['DATA_READ', 'DATA_WRITE']) def test_iam_additive_members(plan_runner): "Test IAM additive members." iam = ( '{"user:one@example.org" = ["roles/owner"],' '"user:two@example.org" = ["roles/owner", "roles/editor"]}' ) _, resources = plan_runner(FIXTURES_DIR, iam_additive_members=iam) roles = set((r['values']['role'], r['values']['member']) for r in resources if r['type'] == 'google_organization_iam_member') assert roles == set([ ('roles/owner', 'user:one@example.org'), ('roles/owner', 'user:two@example.org'), ('roles/editor', 'user:two@example.org') ]) def test_policy_boolean(plan_runner): "Test boolean org policy." policy_boolean = '{policy-a = true, policy-b = false, policy-c = null}' _, resources = plan_runner(FIXTURES_DIR, policy_boolean=policy_boolean) assert len(resources) == 3 constraints = set(r['values']['constraint'] for r in resources) assert set(constraints) == set(['policy-a', 'policy-b', 'policy-c']) policies = [] for resource in resources: for policy in ('boolean_policy', 'restore_policy'): value = resource['values'][policy] if value: policies.append((policy,) + value[0].popitem()) assert set(policies) == set([ ('boolean_policy', 'enforced', True), ('boolean_policy', 'enforced', False), ('restore_policy', 'default', True)]) def test_policy_list(plan_runner): "Test list org policy." policy_list = ( '{' 'policy-a = {inherit_from_parent = true, suggested_value = null, status = true, values = []}, ' 'policy-b = {inherit_from_parent = null, suggested_value = "foo", status = false, values = ["bar"]}, ' 'policy-c = {inherit_from_parent = null, suggested_value = true, status = null, values = null}' '}' ) _, resources = plan_runner(FIXTURES_DIR, policy_list=policy_list) assert len(resources) == 3 values = [r['values'] for r in resources] assert [r['constraint'] for r in values] == ['policy-a', 'policy-b', 'policy-c'] assert values[0]['list_policy'][0]['allow'] == [ {'all': True, 'values': None}] assert values[1]['list_policy'][0]['deny'] == [ {'all': False, 'values': ["bar"]}] assert values[2]['restore_policy'] == [{'default': True}] def test_firweall_policy(plan_runner): "Test boolean folder policy." policy = """ { policy1 = { allow-ingress = { description = "" direction = "INGRESS" action = "allow" priority = 100 ranges = ["10.0.0.0/8"] ports = { tcp = ["22"] } target_service_accounts = null target_resources = null logging = false } deny-egress = { description = "" direction = "EGRESS" action = "deny" priority = 200 ranges = ["192.168.0.0/24"] ports = { tcp = ["443"] } target_service_accounts = null target_resources = null logging = false } } } """ attachment = '{ iap_policy = "policy1" }' _, resources = plan_runner(FIXTURES_DIR, firewall_policies=policy, firewall_policy_attachments=attachment) assert len(resources) == 4 policies = [r for r in resources if r['type'] == 'google_compute_organization_security_policy'] assert len(policies) == 1 rules = [r for r in resources if r['type'] == 'google_compute_organization_security_policy_rule'] assert len(rules) == 2 rule_values = [] for rule in rules: name = rule['name'] index = rule['index'] action = rule['values']['action'] direction = rule['values']['direction'] priority = rule['values']['priority'] config = rule['values']['match'] assert len(config) == 1 config = config[0]['config'] rule_values.append((name, index, action, direction, priority, config)) assert sorted(rule_values) == sorted([ ('rule', 'policy1-allow-ingress', 'allow', 'INGRESS', 100,[ { 'dest_ip_ranges': None, 'layer4_config': [{'ip_protocol': 'tcp', 'ports': ['22']}], 'src_ip_ranges': ['10.0.0.0/8'] }]), ('rule', 'policy1-deny-egress', 'deny', 'EGRESS', 200, [ { 'dest_ip_ranges': ['192.168.0.0/24'], 'layer4_config': [{'ip_protocol': 'tcp', 'ports': ['443']}], 'src_ip_ranges': None }]) ])