@@ -253,12 +253,15 @@ def test_load_checks_to_execute_no_bulk_compliance_frameworks(self):
253
253
bulk_checks_metatada = {
254
254
S3_BUCKET_LEVEL_PUBLIC_ACCESS_BLOCK_NAME : self .get_custom_check_s3_metadata ()
255
255
}
256
- with patch (
257
- "prowler.lib.check.checks_loader.CheckMetadata.get_bulk" ,
258
- return_value = bulk_checks_metatada ,
259
- ), patch (
260
- "prowler.lib.check.checks_loader.Compliance.get_bulk" ,
261
- return_value = bulk_compliance_frameworks ,
256
+ with (
257
+ patch (
258
+ "prowler.lib.check.checks_loader.CheckMetadata.get_bulk" ,
259
+ return_value = bulk_checks_metatada ,
260
+ ),
261
+ patch (
262
+ "prowler.lib.check.checks_loader.Compliance.get_bulk" ,
263
+ return_value = bulk_compliance_frameworks ,
264
+ ),
262
265
):
263
266
assert {S3_BUCKET_LEVEL_PUBLIC_ACCESS_BLOCK_NAME } == load_checks_to_execute (
264
267
compliance_frameworks = compliance_frameworks ,
@@ -302,3 +305,17 @@ def test_discard_threat_detection_checks(self):
302
305
categories = categories ,
303
306
provider = self .provider ,
304
307
)
308
+
309
+ def test_threat_detection_single_check (self ):
310
+ bulk_checks_metatada = {
311
+ CLOUDTRAIL_THREAT_DETECTION_ENUMERATION_NAME : self .get_threat_detection_check_metadata ()
312
+ }
313
+ categories = {}
314
+ check_list = [CLOUDTRAIL_THREAT_DETECTION_ENUMERATION_NAME ]
315
+
316
+ assert {CLOUDTRAIL_THREAT_DETECTION_ENUMERATION_NAME } == load_checks_to_execute (
317
+ bulk_checks_metadata = bulk_checks_metatada ,
318
+ check_list = check_list ,
319
+ categories = categories ,
320
+ provider = self .provider ,
321
+ )
0 commit comments