3
3
This module verifies correctness of retrieved findings by manipulating audit and remediation actions
4
4
"""
5
5
from datetime import datetime
6
+ import uuid
6
7
7
8
import pytest
8
9
9
- # from product.tests.data.k8s_object.k8s_object_rules import *
10
10
from product .tests .data .k8s_object import k8s_object_rules as k8s_tc
11
- from commonlib .utils import get_ES_evaluation , get_resource_identifier
11
+ from commonlib .utils import get_ES_evaluation
12
12
from commonlib .framework .reporting import skip_param_case , SkipReportData
13
13
14
14
22
22
* k8s_tc .cis_5_2_3 .values (),
23
23
* k8s_tc .cis_5_2_4 .values (),
24
24
* k8s_tc .cis_5_2_5 .values (),
25
- * skip_param_case (skip_list = [* k8s_tc .cis_5_1_5_skip .values (),
26
- * k8s_tc .cis_5_2_2 .values (),
27
- * k8s_tc .cis_5_2_3_skip .values (),
28
- * k8s_tc .cis_5_2_4_skip .values (),
29
- * k8s_tc .cis_5_2_5_skip .values (),
30
- * k8s_tc .cis_5_2_6 .values (),
31
- * k8s_tc .cis_5_2_7 .values (),
32
- * k8s_tc .cis_5_2_8 .values ()
33
- ],
25
+ * k8s_tc .cis_5_2_2 .values (),
26
+ * k8s_tc .cis_5_2_6 .values (),
27
+ * k8s_tc .cis_5_2_8 .values (),
28
+ * skip_param_case (skip_list = [* k8s_tc .cis_5_2_7 .values ()],
34
29
data_to_report = SkipReportData (
35
- url_title = "security-team: #4312 " ,
36
- url_link = "https://github.com/elastic/security-team/issues/4312 " ,
37
- skip_reason = "known issue: broken k8s object tests "
30
+ url_title = "security-team: #4540 " ,
31
+ url_link = "https://github.com/elastic/security-team/issues/4540 " ,
32
+ skip_reason = "Known issue: incorrect implementation "
38
33
))
39
- # *k8s_tc.cis_5_2_9.values(), - TODO: cases are not implemented
40
- # *k8s_tc.cis_5_2_10.values() - TODO: cases are not implemented
41
34
],
42
35
ids = [
43
36
* k8s_tc .cis_5_1_3 .keys (),
46
39
* k8s_tc .cis_5_2_3 .keys (),
47
40
* k8s_tc .cis_5_2_4 .keys (),
48
41
* k8s_tc .cis_5_2_5 .keys (),
49
- * k8s_tc .cis_5_1_5_skip .keys (),
50
42
* k8s_tc .cis_5_2_2 .keys (),
51
- * k8s_tc .cis_5_2_3_skip .keys (),
52
- * k8s_tc .cis_5_2_4_skip .keys (),
53
- * k8s_tc .cis_5_2_5_skip .keys (),
54
43
* k8s_tc .cis_5_2_6 .keys (),
55
44
* k8s_tc .cis_5_2_7 .keys (),
56
45
* k8s_tc .cis_5_2_8 .keys (),
@@ -82,6 +71,11 @@ def test_kube_resource_patch(elastic_client, test_env, rule_tag, resource_type,
82
71
83
72
assert resource , f"Resource { resource_type } not found"
84
73
74
+ test_resource_id = str (uuid .uuid4 ())
75
+
76
+ labels = metadata .setdefault ('labels' , {})
77
+ labels ['test_resource_id' ] = test_resource_id
78
+
85
79
# patch resource
86
80
resource = k8s_client .patch_resources (
87
81
resource_type = resource_type ,
@@ -92,13 +86,19 @@ def test_kube_resource_patch(elastic_client, test_env, rule_tag, resource_type,
92
86
raise ValueError (
93
87
f'Could not patch resource type { resource_type } :'
94
88
f' { relevant_metadata } with patch { resource_body } ' )
95
-
89
+
90
+ def match_resource (eval_resource ):
91
+ try :
92
+ return eval_resource .metadata .labels .test_resource_id == test_resource_id
93
+ except AttributeError :
94
+ return False
95
+
96
96
evaluation = get_ES_evaluation (
97
97
elastic_client = elastic_client ,
98
98
timeout = agent_config .findings_timeout ,
99
99
rule_tag = rule_tag ,
100
100
exec_timestamp = datetime .utcnow (),
101
- resource_identifier = get_resource_identifier ( resource_body ) ,
101
+ resource_identifier = match_resource ,
102
102
)
103
103
104
104
assert evaluation is not None , f"No evaluation for rule { rule_tag } could be found"
0 commit comments