# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. def test_audit_config(plan_runner): "Test audit config." iam_audit_config = '{allServices={DATA_READ=[], DATA_WRITE=["user:me@example.org"]}}' _, resources = plan_runner(iam_audit_config=iam_audit_config) assert len(resources) == 1 log_types = set(r['log_type'] for r in resources[0]['values']['audit_log_config']) assert log_types == set(['DATA_READ', 'DATA_WRITE']) def test_iam(plan_runner): "Test IAM." group_iam = ( '{' '"owners@example.org" = ["roles/owner", "roles/resourcemanager.folderAdmin"],' '"viewers@example.org" = ["roles/viewer"]' '}' ) iam = ( '{' '"roles/owner" = ["user:one@example.org", "user:two@example.org"],' '"roles/browser" = ["domain:example.org"]' '}' ) _, resources = plan_runner(group_iam=group_iam, iam=iam) roles = sorted([(r['values']['role'], sorted(r['values']['members'])) for r in resources if r['type'] == 'google_organization_iam_binding']) assert roles == [ ('roles/browser', ['domain:example.org']), ('roles/owner', ['group:owners@example.org', 'user:one@example.org', 'user:two@example.org']), ('roles/resourcemanager.folderAdmin', ['group:owners@example.org']), ('roles/viewer', ['group:viewers@example.org']), ] def test_iam_additive_members(plan_runner): "Test IAM additive members." iam = ( '{"user:one@example.org" = ["roles/owner"],' '"user:two@example.org" = ["roles/owner", "roles/editor"]}' ) _, resources = plan_runner(iam_additive_members=iam) roles = set((r['values']['role'], r['values']['member']) for r in resources if r['type'] == 'google_organization_iam_member') assert roles == set([ ('roles/owner', 'user:one@example.org'), ('roles/owner', 'user:two@example.org'), ('roles/editor', 'user:two@example.org') ]) def test_policy_boolean(plan_runner): "Test boolean org policy." policy_boolean = '{policy-a = true, policy-b = false, policy-c = null}' _, resources = plan_runner(policy_boolean=policy_boolean) assert len(resources) == 3 constraints = set(r['values']['constraint'] for r in resources) assert set(constraints) == set(['policy-a', 'policy-b', 'policy-c']) policies = [] for resource in resources: for policy in ('boolean_policy', 'restore_policy'): value = resource['values'][policy] if value: policies.append((policy,) + value[0].popitem()) assert set(policies) == set([ ('boolean_policy', 'enforced', True), ('boolean_policy', 'enforced', False), ('restore_policy', 'default', True)]) def test_policy_list(plan_runner): "Test list org policy." policy_list = ( '{' 'policy-a = {inherit_from_parent = true, suggested_value = null, status = true, values = []}, ' 'policy-b = {inherit_from_parent = null, suggested_value = "foo", status = false, values = ["bar"]}, ' 'policy-c = {inherit_from_parent = null, suggested_value = true, status = null, values = null}' '}' ) _, resources = plan_runner(policy_list=policy_list) assert len(resources) == 3 values = [r['values'] for r in resources] assert [r['constraint'] for r in values] == ['policy-a', 'policy-b', 'policy-c'] assert values[0]['list_policy'][0]['allow'] == [ {'all': True, 'values': None}] assert values[1]['list_policy'][0]['deny'] == [ {'all': False, 'values': ["bar"]}] assert values[2]['restore_policy'] == [{'default': True}]