def test_registry_load(self): registry = Registry( parser=NXGraphCheckParser(), checks_dir=str( Path(__file__).parent.parent.parent.parent.parent / "checkov" / "terraform" / "checks" / "graph_checks")) registry.load_checks() self.assertGreater(len(registry.checks), 0)
def test_internal_graph_checks_load(self): registry = Registry( parser=NXGraphCheckParser(), checks_dir=str( Path(__file__).parent.parent.parent.parent / "checkov" / "terraform" / "checks" / "graph_checks")) registry.load_checks() runner_filter = RunnerFilter() for check in registry.checks: self.assertFalse(runner_filter.is_external_check(check))
def test_non_colliding_graph_check_ids(self): check_id_check_class_map = {} graph_registry = Registry( parser=NXGraphCheckParser(), checks_dir=str( Path(__file__).parent.parent.parent / "checkov" / "terraform" / "checks" / "graph_checks")) graph_registry.load_checks() for check in graph_registry.checks: check_id_check_class_map.setdefault(check.id, []).append(check) for check_id, check_classes in check_id_check_class_map.items(): self.assertEqual(len(set(check_classes)), 1, "collision on check_id={}".format(check_id))
def pre_scan(self): self.policies = self._get_policies_from_platform() for policy in self.policies: converted_check = self._convert_raw_check(policy) resource_types = Registry._get_resource_types(converted_check['metadata']) check = self.platform_policy_parser.parse_raw_check(converted_check, resources_types=resource_types) graph_registry.checks.append(check) logging.debug(f'Found {len(self.policies)} custom policies from the platform.')
class TestBaseSolver(TestCase): checks_dir = "" def setUp(self): self.source = "Terraform" self.registry = Registry(parser=NXGraphCheckParser(), checks_dir=self.checks_dir) self.registry.load_checks() self.runner = Runner(external_registries=[self.registry]) def run_test(self, root_folder, expected_results, check_id): root_folder = os.path.realpath( os.path.join(self.checks_dir, root_folder)) report = self.runner.run(root_folder=root_folder, runner_filter=RunnerFilter(checks=[check_id])) verification_results = verify_report(report=report, expected_results=expected_results) self.assertIsNone(verification_results, verification_results)
def pre_scan(self): try: self.policies = self._get_policies_from_platform() for policy in self.policies: converted_check = self._convert_raw_check(policy) source_incident_id = policy.get('sourceIncidentId') if source_incident_id: self.bc_cloned_checks[source_incident_id].append(policy) continue resource_types = Registry._get_resource_types(converted_check['metadata']) check = self.platform_policy_parser.parse_raw_check(converted_check, resources_types=resource_types) if re.match(CFN_RESOURCE_TYPE_IDENTIFIER, check.resource_types[0]): get_graph_checks_registry("cloudformation").checks.append(check) else: get_graph_checks_registry("terraform").checks.append(check) logging.debug(f'Found {len(self.policies)} custom policies from the platform.') except Exception as e: self.integration_feature_failures = True logging.debug(f'{e} \nScanning without applying custom policies from the platform.', exc_info=True)
def test_invalid_check_yaml_does_not_throw_exception(self): current_dir = os.path.dirname(os.path.realpath(__file__)) test_files_dir = current_dir + "/test-registry-data/invalid-yaml" r = Registry(checks_dir=test_files_dir) r.load_checks()
def test_valid_yaml_but_invalid_check_does_not_throw_exception(self): current_dir = os.path.dirname(os.path.realpath(__file__)) test_files_dir = current_dir + "/test-registry-data/valid-yaml-invalid-check" r = Registry(checks_dir=test_files_dir, parser=NXGraphCheckParser()) r.load_checks()
def get_checks_registry(self): registry = Registry(parser=NXGraphCheckParser(), checks_dir=self.real_graph_checks_path) registry.load_checks() registry.load_external_checks(self.checks_dir) return registry
from checkov.common.checks_infra.registry import Registry from checkov.terraform.context_parsers.registry import parser_registry from checkov.terraform.evaluation.base_variable_evaluation import BaseVariableEvaluation from checkov.terraform.graph_builder.graph_components.attribute_names import CustomAttributes from checkov.terraform.graph_builder.graph_to_tf_definitions import convert_graph_vertices_to_tf_definitions from checkov.terraform.graph_builder.local_graph import LocalGraph from checkov.terraform.graph_manager import GraphManager # Allow the evaluation of empty variables from checkov.terraform.parser import Parser from checkov.terraform.tag_providers import get_resource_tags dpath.options.ALLOW_EMPTY_STRING_KEYS = True CHECK_BLOCK_TYPES = frozenset(['resource', 'data', 'provider', 'module']) graph_registry = Registry(parser=NXGraphCheckParser(), checks_dir=str(Path(__file__).parent / "checks" / "graph_checks")) class Runner(BaseRunner): check_type = "terraform" def __init__(self, parser=Parser(), db_connector=NetworkxConnector(), external_registries=None, source="Terraform", graph_class=LocalGraph, graph_manager=None): self.external_registries = [] if external_registries is None else external_registries self.graph_class = graph_class self.parser = parser self.tf_definitions = None self.definitions_context = None self.breadcrumbs = None self.definitions_context = {} self.evaluations_context: Dict[str, Dict[str, EvaluationContext]] = {}
def test_policy_load(self): # response from API policies = [ { "provider": "AWS", "id": "mikepolicies_AWS_1625063607541", "title": "yaml1", "severity": "MEDIUM", "category": "General", "resourceTypes": [ "aws_s3_bucket" ], "accountsData": { "mikeurbanski1/terragoat3": { "amounts": { "CLOSED": 0, "DELETED": 0, "OPEN": 1, "REMEDIATED": 0, "SUPPRESSED": 0 }, "lastUpdateDate": "2021-06-30T14:33:54.638Z" } }, "guideline": "yaml1", "isCustom": True, "conditionQuery": { "or": [ { "value": "xyz", "operator": "equals", "attribute": "xyz", "cond_type": "attribute", "resource_types": [ "aws_s3_bucket" ] } ] }, "benchmarks": {}, "createdBy": "*****@*****.**", "code": "---\nmetadata:\n name: \"yaml1\" #give your custom policy a unique name \n guidelines: " "\"yaml1\" #add text that explains the configuration the policy looks for, its implications, " "and how to fix it\n category: \"general\" #choose one: " "\"general\"/\"elaticsearch\"/\"iam\"/\"kubernetes\"/\"logging\"/\"monitoring\"/\"networking" "\"/\"public\"/\"secrets\"/\"serverless\"/\"storage\"\n severity: \"medium\" #choose one: " "\"critical\"/\"high\"/\"medium\"/\"low\"/\"info\"\nscope:\n provider: \"aws\" #choose one: " "\"aws\"/\"azure\"/\"gcp\"\ndefinition: #define the conditions the policy searches for.\n " "or:\n - cond_type: \"attribute\"\n resource_types:\n - \"aws_s3_bucket\"\n " "attribute: \"xyz\"\n operator: \"equals\"\n value: \"xyz\"\n# - cond_type: " "\"attribute\"\n# resource_types:\n# - \"aws_instance\"\n# attribute: " "\"instance_type\"\n# operator: \"equals\"\n# value: \"t3.nano\"\n ", "sourceIncidentId": "" }, { "provider": "AWS", "id": "mikepolicies_aws_1625063842021", "title": "ui1", "severity": "HIGH", "category": "General", "resourceTypes": [ "aws_s3_bucket" ], "accountsData": { "mikeurbanski1/terragoat3": { "amounts": { "CLOSED": 0, "DELETED": 0, "OPEN": 1, "REMEDIATED": 0, "SUPPRESSED": 0 }, "lastUpdateDate": "2021-06-30T14:42:29.534Z" } }, "guideline": "ui1", "isCustom": True, "conditionQuery": { "value": "abc", "operator": "equals", "attribute": "region", "cond_type": "attribute", "resource_types": [ "aws_s3_bucket" ] }, "benchmarks": {}, "createdBy": "*****@*****.**", "code": None, "sourceIncidentId": "" }, { "provider": "AWS", "id": "kpande_AWS_1635180094606", "title": "Check that all EC2 instances are tagged with yor_trace", "descriptiveTitle": "null", "constructiveTitle": "null", "severity": "LOW", "pcSeverity": "null", "category": "General", "resourceTypes": [ "AWS::EC2::Instance" ], "guideline": "Check for YOR tagging", "isCustom": True, "conditionQuery": { "operator": "exists", "attribute": "Tags.yor_trace", "cond_type": "attribute", "resource_types": [ "AWS::EC2::Instance" ] }, "benchmarks": {}, "createdBy": "*****@*****.**", "code": "---\nmetadata:\n name: \"Check that all resources are tagged with the key - yor_trace\"\n " "guidelines: \"Check for YOR tagging\"\n category: \"general\"\n severity: \"low\"\nscope:\n " "provider: \"aws\"\ndefinition:\n cond_type: \"attribute\"\n resource_types: \n " " - \"AWS::EC2::Instance\"\n attribute: \"Tags.yor_trace\"\n operator: " "\"exists\"", "frameworks": [ "Terraform", "CloudFormation" ], "sourceIncidentId": "" }, { "provider": "AWS", "id": "kpande_AWS_1635187541652", "title": "Custom - ensure MSK Cluster logging is enabled", "descriptiveTitle": "null", "constructiveTitle": "null", "severity": "MEDIUM", "pcSeverity": "null", "category": "Logging", "resourceTypes": [ "AWS::MSK::Cluster" ], "accountsData": {}, "guideline": "Some sample guidelines", "isCustom": True, "conditionQuery": { "or": [ { "value": "true", "operator": "equals", "attribute": "LoggingInfo.BrokerLogs.S3.Enabled", "cond_type": "attribute", "resource_types": [ "AWS::MSK::Cluster" ] }, { "value": "true", "operator": "equals", "attribute": "LoggingInfo.BrokerLogs.Firehose.Enabled", "cond_type": "attribute", "resource_types": [ "AWS::MSK::Cluster" ] }, { "value": "true", "operator": "equals", "attribute": "LoggingInfo.BrokerLogs.CloudWatchLogs.Enabled", "cond_type": "attribute", "resource_types": [ "AWS::MSK::Cluster" ] } ] }, "benchmarks": {}, "createdBy": "*****@*****.**", "code": "---\nmetadata:\n name: \"Custom - ensure MSK Cluster logging is enabled\"\n category: " "\"logging\"\n severity: \"medium\"\n guidelines: \"Some sample guidelines\"\nscope:\n " "provider: \"aws\"\ndefinition:\n or:\n - cond_type: attribute\n attribute: " "LoggingInfo.BrokerLogs.S3.Enabled\n operator: equals\n value: \"true\"\n " "resource_types:\n - \"AWS::MSK::Cluster\"\n - cond_type: attribute\n " "attribute: LoggingInfo.BrokerLogs.Firehose.Enabled\n operator: equals\n value: " "\"true\"\n resource_types:\n - \"AWS::MSK::Cluster\"\n - cond_type: " "attribute\n attribute: LoggingInfo.BrokerLogs.CloudWatchLogs.Enabled\n operator: " "equals\n value: \"true\"\n resource_types:\n - \"AWS::MSK::Cluster\"", "frameworks": [ "Terraform", "CloudFormation" ], "sourceIncidentId": "" } ] # for this test, we simulate some of the check registry manipulation; otherwise the singleton # instance will be modified and break other tests. parser = NXGraphCheckParser() registry = Registry(parser=NXGraphCheckParser(), checks_dir=str( Path(__file__).parent.parent.parent.parent / "checkov" / "terraform" / "checks" / "graph_checks")) checks = [parser.parse_raw_check(CustomPoliciesIntegration._convert_raw_check(p)) for p in policies] registry.checks = checks # simulate that the policy downloader will do tf_runner = TerraformRunner(external_registries=[registry]) cfn_runner = CFNRunner(external_registries=[registry]) current_dir = os.path.dirname(os.path.realpath(__file__)) test_files_dir = current_dir + "/example_custom_policy_dir" report = tf_runner.run(root_folder=test_files_dir, runner_filter=RunnerFilter()) self.assertEqual(len([r for r in report.failed_checks if r.check_id == 'mikepolicies_aws_1625063842021']), 1) self.assertEqual(len([r for r in report.failed_checks if r.check_id == 'mikepolicies_AWS_1625063607541']), 1) report = tf_runner.run(root_folder=test_files_dir, runner_filter=RunnerFilter(checks=['mikepolicies_aws_1625063842021'])) self.assertEqual(len([r for r in report.failed_checks if r.check_id == 'mikepolicies_aws_1625063842021']), 1) self.assertEqual(len([r for r in report.failed_checks if r.check_id == 'mikepolicies_AWS_1625063607541']), 0) report = tf_runner.run(root_folder=test_files_dir, runner_filter=RunnerFilter(skip_checks=['mikepolicies_aws_1625063842021'])) self.assertEqual(len([r for r in report.failed_checks if r.check_id == 'mikepolicies_aws_1625063842021']), 0) self.assertEqual(len([r for r in report.failed_checks if r.check_id == 'mikepolicies_AWS_1625063607541']), 1) report = cfn_runner.run(root_folder=test_files_dir, runner_filter=RunnerFilter(checks=['kpande_AWS_1635187541652'])) self.assertEqual(len([r for r in report.failed_checks if r.check_id == 'kpande_AWS_1635187541652']), 6) self.assertEqual(len([r for r in report.failed_checks if r.check_id == 'kpande_AWS_1635180094606']), 0) report = cfn_runner.run(root_folder=test_files_dir, runner_filter=RunnerFilter(checks=['kpande_AWS_1635180094606'])) self.assertEqual(len([r for r in report.failed_checks if r.check_id == 'kpande_AWS_1635180094606']), 1) self.assertEqual(len([r for r in report.failed_checks if r.check_id == 'kpande_AWS_1635187541652']), 0) report = cfn_runner.run(root_folder=test_files_dir, runner_filter=RunnerFilter(skip_checks=['kpande_AWS_1635180094606'])) self.assertEqual(len([r for r in report.failed_checks if r.check_id == 'kpande_AWS_1635180094606']), 0) self.assertEqual(len([r for r in report.failed_checks if r.check_id == 'kpande_AWS_1635187541652']), 6)
def get_checks_registry(): registry = Registry(parser=NXGraphCheckParser(), checks_dir=str( Path( __file__).parent.parent.parent.parent.parent / "checkov" / "cloudformation" / "checks" / "graph_checks")) registry.load_checks() return registry
def setUp(self): self.source = "Terraform" self.registry = Registry(parser=NXGraphCheckParser(), checks_dir=self.checks_dir) self.registry.load_checks() self.runner = Runner(external_registries=[self.registry])
def test_policy_load(self): # response from API policies = [{ "provider": "AWS", "id": "mikepolicies_AWS_1625063607541", "title": "yaml1", "severity": "MEDIUM", "category": "General", "resourceTypes": ["aws_s3_bucket"], "accountsData": { "mikeurbanski1/terragoat3": { "amounts": { "CLOSED": 0, "DELETED": 0, "OPEN": 1, "REMEDIATED": 0, "SUPPRESSED": 0 }, "lastUpdateDate": "2021-06-30T14:33:54.638Z" } }, "guideline": "yaml1", "isCustom": True, "conditionQuery": { "or": [{ "value": "xyz", "operator": "equals", "attribute": "xyz", "cond_type": "attribute", "resource_types": ["aws_s3_bucket"] }] }, "benchmarks": {}, "createdBy": "*****@*****.**", "code": "---\nmetadata:\n name: \"yaml1\" #give your custom policy a unique name \n guidelines: \"yaml1\" #add text that explains the configuration the policy looks for, its implications, and how to fix it\n category: \"general\" #choose one: \"general\"/\"elaticsearch\"/\"iam\"/\"kubernetes\"/\"logging\"/\"monitoring\"/\"networking\"/\"public\"/\"secrets\"/\"serverless\"/\"storage\"\n severity: \"medium\" #choose one: \"critical\"/\"high\"/\"medium\"/\"low\"/\"info\"\nscope:\n provider: \"aws\" #choose one: \"aws\"/\"azure\"/\"gcp\"\ndefinition: #define the conditions the policy searches for.\n or:\n - cond_type: \"attribute\"\n resource_types:\n - \"aws_s3_bucket\"\n attribute: \"xyz\"\n operator: \"equals\"\n value: \"xyz\"\n# - cond_type: \"attribute\"\n# resource_types:\n# - \"aws_instance\"\n# attribute: \"instance_type\"\n# operator: \"equals\"\n# value: \"t3.nano\"\n" }, { "provider": "AWS", "id": "mikepolicies_aws_1625063842021", "title": "ui1", "severity": "HIGH", "category": "General", "resourceTypes": ["aws_s3_bucket"], "accountsData": { "mikeurbanski1/terragoat3": { "amounts": { "CLOSED": 0, "DELETED": 0, "OPEN": 1, "REMEDIATED": 0, "SUPPRESSED": 0 }, "lastUpdateDate": "2021-06-30T14:42:29.534Z" } }, "guideline": "ui1", "isCustom": True, "conditionQuery": { "value": "abc", "operator": "equals", "attribute": "region", "cond_type": "attribute", "resource_types": ["aws_s3_bucket"] }, "benchmarks": {}, "createdBy": "*****@*****.**", "code": None }] # for this test, we simulate some of the check registry manipulation; otherwise the singleton # instance will be modified and break other tests. parser = NXGraphCheckParser() registry = Registry( parser=NXGraphCheckParser(), checks_dir=str( Path(__file__).parent.parent.parent.parent / "checkov" / "terraform" / "checks" / "graph_checks")) checks = [ parser.parse_raw_check( CustomPoliciesIntegration._convert_raw_check(p)) for p in policies ] registry.checks = checks # simulate that the policy downloader will do runner = Runner(external_registries=[registry]) current_dir = os.path.dirname(os.path.realpath(__file__)) test_files_dir = current_dir + "/example_custom_policy_dir" report = runner.run(root_folder=test_files_dir, runner_filter=RunnerFilter()) self.assertEqual( len([ r for r in report.failed_checks if r.check_id == 'mikepolicies_aws_1625063842021' ]), 1) self.assertEqual( len([ r for r in report.failed_checks if r.check_id == 'mikepolicies_AWS_1625063607541' ]), 1) report = runner.run(root_folder=test_files_dir, runner_filter=RunnerFilter( checks=['mikepolicies_aws_1625063842021'])) self.assertEqual( len([ r for r in report.failed_checks if r.check_id == 'mikepolicies_aws_1625063842021' ]), 1) self.assertEqual( len([ r for r in report.failed_checks if r.check_id == 'mikepolicies_AWS_1625063607541' ]), 0) report = runner.run( root_folder=test_files_dir, runner_filter=RunnerFilter( skip_checks=['mikepolicies_aws_1625063842021'])) self.assertEqual( len([ r for r in report.failed_checks if r.check_id == 'mikepolicies_aws_1625063842021' ]), 0) self.assertEqual( len([ r for r in report.failed_checks if r.check_id == 'mikepolicies_AWS_1625063607541' ]), 1)