aws-resource-remediation
Version:
A module to remediate AWS resources.
67 lines (59 loc) • 2.28 kB
JavaScript
/**
* Created by kpadmawa on 1/23/2017.
*/
const constants = require('../src/constants');
var logger = require('node-generic-logger');
logger.init({
file: {
name: 'aws-resource-remediation-test.log',
level: 'info'
},
console: {
level: 'debug'
}
});
function IAMCredentialsRemediatorTests (remediator) {
this.resourceRemediator = remediator;
}
IAMCredentialsRemediatorTests.prototype.test = function () {
var self = this;
describe('IAMCredentialsRemediatorTests:test', function () {
it('IAMCredentialsRemediatorTests:remediateRuleThree', function (done) {
var params = {
"policyId": "AWS CIS IAM Credentials",
"ruleId": "3",
"ruleName": "1.3 Ensure credentials unused for 90 days or greater are disabled",
"resourceId": "vl-pun-1989",
"connectorId": "AKIAIIDS4HIAUHM6SEYA",
"actionContent": "AWS IAM Credentials Remediation_1.0.0",
"actionDefinition": "Update access key",
"action": "Deactivate access key when unused for 90 days or greater",
"result": {
"origin": "93534757",
"resourceType": "IAM_CREDS"
},
"aws.credentials.accessKeyId":"abc",
"aws.credentials.secretAccessKey":"xyz",
"region": "us-east-1",
"moduleName": "iamCredentials",
"method": "updateAccessKey",
"payload": {
"userName": "bmcUser"
}
};
self.callRemediate(params, done);
});
})
};
IAMCredentialsRemediatorTests.prototype.callRemediate = function (params, done) {
this.resourceRemediator.remediate(params, function (err, data) {
if (err) {
logger.error('Got error in remediating IAM credential policy for rule :' + params.ruleId, err);
logger.error(err.stack);
} else {
logger.info('Successfully remediated IAM credentials policy :' + JSON.stringify(data));
}
});
done();
};
module.exports = IAMCredentialsRemediatorTests;