def test_add_s3_permissions_management_arn(self): arn_action_group = ArnActionGroup() arn_list_from_user = ["arn:aws:s3:::example-org-s3-access-logs"] access_level = "Permissions management" desired_output = [{ 'arn': 'arn:aws:s3:::example-org-s3-access-logs', 'service': 's3', 'access_level': 'Permissions management', 'arn_format': 'arn:aws:s3:::${BucketName}', 'actions': [] }] arn_action_group.add(db_session, arn_list_from_user, access_level) print(arn_action_group.get_arns()) self.assertEqual(arn_action_group.get_arns(), desired_output)
def test_update_actions_for_raw_arn_format(self): arn_action_group = ArnActionGroup() arn_list_from_user = ["arn:aws:s3:::example-org-s3-access-logs"] access_level = "Permissions management" desired_output = [{ 'arn': 'arn:aws:s3:::example-org-s3-access-logs', 'service': 's3', 'access_level': 'Permissions management', 'arn_format': 'arn:aws:s3:::${BucketName}', 'actions': [ "s3:deletebucketpolicy", "s3:putbucketacl", "s3:putbucketpolicy", "s3:putbucketpublicaccessblock" ] }] arn_action_group.add(db_session, arn_list_from_user, access_level) arn_action_group.update_actions_for_raw_arn_format(db_session) print(arn_action_group.get_arns()) self.assertEqual(arn_action_group.get_arns(), desired_output)