def test_add_s3_permissions_management_arn(self):
     arn_action_group = ArnActionGroup()
     arn_list_from_user = ["arn:aws:s3:::example-org-s3-access-logs"]
     access_level = "Permissions management"
     desired_output = [{
         'arn': 'arn:aws:s3:::example-org-s3-access-logs',
         'service': 's3',
         'access_level': 'Permissions management',
         'arn_format': 'arn:aws:s3:::${BucketName}',
         'actions': []
     }]
     arn_action_group.add(db_session, arn_list_from_user, access_level)
     print(arn_action_group.get_arns())
     self.assertEqual(arn_action_group.get_arns(), desired_output)
 def test_update_actions_for_raw_arn_format(self):
     arn_action_group = ArnActionGroup()
     arn_list_from_user = ["arn:aws:s3:::example-org-s3-access-logs"]
     access_level = "Permissions management"
     desired_output = [{
         'arn':
         'arn:aws:s3:::example-org-s3-access-logs',
         'service':
         's3',
         'access_level':
         'Permissions management',
         'arn_format':
         'arn:aws:s3:::${BucketName}',
         'actions': [
             "s3:deletebucketpolicy", "s3:putbucketacl",
             "s3:putbucketpolicy", "s3:putbucketpublicaccessblock"
         ]
     }]
     arn_action_group.add(db_session, arn_list_from_user, access_level)
     arn_action_group.update_actions_for_raw_arn_format(db_session)
     print(arn_action_group.get_arns())
     self.assertEqual(arn_action_group.get_arns(), desired_output)