Skip to content

Commit 90cff06

Browse files
authored
Merge pull request #2079 from AkhtarAmir/setEncryptionDefault-awskms
updated the default encryption level to awskms for aws encryption plu…
2 parents 6a27334 + e92a6ff commit 90cff06

File tree

72 files changed

+82
-82
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

72 files changed

+82
-82
lines changed

plugins/aws/apprunner/serviceEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module.exports = {
1717
name: ' App Runner service desired Encryption level',
1818
description: 'In order (lowest to highest) awskms=AWS-managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1919
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
20-
default: 'awscmk'
20+
default: 'awskms'
2121
}
2222
},
2323
realtime_triggers: ['apprunner:CreateService','apprunner:DeleteService'],

plugins/aws/auditmanager/auditmanagerDataEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module.exports = {
1717
name: 'Audit Manager Data Encryption Level',
1818
description: 'In order (lowest to highest) awskms=AWS-managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1919
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
20-
default: 'awscmk',
20+
default: 'awskms',
2121
}
2222
},
2323
realtime_triggers: ['auditmanager:registerAccount','auditmanager:UpdateSettings','auditmanager:DeregisterAccount'],

plugins/aws/auditmanager/auditmanagerDataEncrypted.spec.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ describe('auditmanagerDataEncrypted', function () {
9898

9999
it('should FAIL if Audit Manager data is not encrypted with desired encryption level', function (done) {
100100
const cache = createCache(getSettings, listKeys, describeKey[1]);
101-
auditmanagerDataEncrypted.run(cache, {}, (err, results) => {
101+
auditmanagerDataEncrypted.run(cache, {auditmanager_data_encryption_level: 'awscmk'}, (err, results) => {
102102
expect(results.length).to.equal(1);
103103
expect(results[0].status).to.equal(2);
104104
expect(results[0].region).to.equal('us-east-1');

plugins/aws/backup/backupVaultEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module.exports = {
1616
name: 'CodeArtifact Domain Target Encryption Level',
1717
description: 'In order (lowest to highest) awskms=AWS-managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1818
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
19-
default: 'awscmk',
19+
default: 'awskms',
2020
}
2121
},
2222
realtime_triggers: ['backup:CreateBackupVault','backup:DeleteBackupVault'],

plugins/aws/cloudwatchlogs/logGroupsEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ module.exports = {
1818
name: 'CloudWatch Log Groups Target Ecryption Level',
1919
description: 'In order (lowest to highest) awskms=AWS managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
2020
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
21-
default: 'awscmk'
21+
default: 'awskms'
2222
},
2323
cloudwatchlog_whitelist: {
2424
name: 'Lambda Functions Whitelisted',

plugins/aws/codeartifact/codeartifactDomainEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module.exports = {
1717
name: 'CodeArtifact Domain Target Encryption Level',
1818
description: 'In order (lowest to highest) awskms=AWS-managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1919
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
20-
default: 'awscmk',
20+
default: 'awskms',
2121
}
2222
},
2323
realtime_triggers: ['codeartifact:CreateDomain', 'codeartifact:DeleteDomain'],

plugins/aws/codeartifact/codeartifactDomainEncrypted.spec.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -101,7 +101,7 @@ describe('codeartifactDomainEncrypted', function () {
101101

102102
it('should FAIL if CodeArtifact domain is not encrypted with desired encyption level', function (done) {
103103
const cache = createCache(listDomains, listKeys, describeKey[1]);
104-
codeartifactDomainEncrypted.run(cache, {}, (err, results) => {
104+
codeartifactDomainEncrypted.run(cache, {codeartifact_domain_encryption_level:'awscmk'}, (err, results) => {
105105
expect(results.length).to.equal(1);
106106
expect(results[0].status).to.equal(2);
107107
expect(results[0].region).to.equal('us-east-1');

plugins/aws/codebuild/projectArtifactsEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module.exports = {
1717
name: 'Project Artifacts Target Encryption Level',
1818
description: 'In order (lowest to highest) awskms=AWS-managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1919
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
20-
default: 'awscmk',
20+
default: 'awskms',
2121
}
2222
},
2323
realtime_triggers: ['codebuild:CreateProject', 'codebuild:UpdateProject','codebuild:DeleteProject'],

plugins/aws/codebuild/projectArtifactsEncrypted.spec.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ describe('projectArtifactsEncrypted', function () {
158158

159159
it('should FAIL if CodeBuild project artifact is not encrypted with desired encryption level', function (done) {
160160
const cache = createCache(listProjects, listKeys, batchGetProjects[1], describeKey[1]);
161-
projectArtifactsEncrypted.run(cache, { projects_artifact_desired_encryption_level: 'awscmk' }, (err, results) => {
161+
projectArtifactsEncrypted.run(cache, { project_artifacts_desired_encryption_level: 'awscmk' }, (err, results) => {
162162
expect(results.length).to.equal(1);
163163
expect(results[0].status).to.equal(2);
164164
expect(results[0].region).to.equal('us-east-1');

plugins/aws/codepipeline/pipelineArtifactsEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ module.exports = {
1818
name: 'Pipeline Artifacts Desired Encrypted Level',
1919
description: 'In order (lowest to highest) awskms=AWS-managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
2020
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
21-
default: 'awscmk'
21+
default: 'awskms'
2222
}
2323
},
2424
realtime_triggers: ['codepipeline:CreatePipeline','codepipeline:DeletePipeline'],

plugins/aws/codepipeline/pipelineArtifactsEncrypted.spec.js

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,7 @@ describe('pipelineArtifactsEncrypted', function () {
135135
describe('run', function () {
136136
it('should PASS if Pipeline Artifacts is encrypted with desired encryption level', function (done) {
137137
const cache = createCache([listPipelines[0]], listKeys, listAliases, getPipeline[0], describeKey[0]);
138-
pipelineArtifactsEncrypted.run(cache, { pipeline_artifacts_encryption : 'awscmk' }, (err, results) => {
138+
pipelineArtifactsEncrypted.run(cache, { pipeline_artifacts_desired_encryption_level : 'awscmk' }, (err, results) => {
139139
expect(results.length).to.equal(1);
140140
expect(results[0].status).to.equal(0);
141141
expect(results[0].region).to.equal('us-east-1');
@@ -145,7 +145,7 @@ describe('pipelineArtifactsEncrypted', function () {
145145

146146
it('should FAIL if Pipeline Artifacts not encrypted with desired encryption level', function (done) {
147147
const cache = createCache([listPipelines[0]], listKeys, listAliases, getPipeline[0], describeKey[1]);
148-
pipelineArtifactsEncrypted.run(cache, { pipeline_artifacts_encryption : 'awscmk' }, (err, results) => {
148+
pipelineArtifactsEncrypted.run(cache, { pipeline_artifacts_desired_encryption_level : 'awscmk' }, (err, results) => {
149149
expect(results.length).to.equal(1);
150150
expect(results[0].status).to.equal(2);
151151
expect(results[0].region).to.equal('us-east-1');

plugins/aws/connect/customerProfilesDomainEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module.exports = {
1616
name: 'Connect Customer Profiles Encrypted',
1717
description: 'In order (lowest to highest) awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1818
regex: '^(awscmk|externalcmk|cloudhsm)$',
19-
default: 'awscmk'
19+
default: 'awskms'
2020
}
2121
},
2222
realtime_triggers: ['customerprofiles:CreateDomain', 'customerprofiles:UpdateDomain', 'customerprofile:DeleteDomain'],

plugins/aws/connect/instanceAttachmentsEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module.exports = {
1717
name: 'Connect Attachments Target Encryption Level',
1818
description: 'In order (lowest to highest) awskms=AWS managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1919
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
20-
default: 'awscmk'
20+
default: 'awskms'
2121
}
2222
},
2323
realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig', 'connect:DeleteInstance', 'connect:DisassociateInstanceStorageConfig'],

plugins/aws/connect/instanceAttachmentsEncrypted.spec.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ describe('instanceAttachmentsEncrypted', function () {
136136
describe('run', function () {
137137
it('should FAIL if Connect instance is not using desired encryption level', function (done) {
138138
const cache = createCache(listInstances, instanceAttachmentStorageConfigs[0], listKeys, describeKey[1]);
139-
instanceAttachmentsEncrypted.run(cache, {}, (err, results) => {
139+
instanceAttachmentsEncrypted.run(cache, {connect_attachments_encryption_level : 'awscmk'}, (err, results) => {
140140
expect(results.length).to.equal(1);
141141
expect(results[0].status).to.equal(2);
142142
done();

plugins/aws/connect/instanceCallRecordingEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module.exports = {
1717
name: 'Connect Call Resording Encryption Level',
1818
description: 'In order (lowest to highest) awskms=AWS managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1919
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
20-
default: 'awscmk'
20+
default: 'awskms'
2121
}
2222
},
2323
realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig','connect:DeleteInstance', 'connect:DisassociateInstanceStorageConfig'],

plugins/aws/connect/instanceCallRecordingEncrypted.spec.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ describe('instanceCallRecordingEncrypted', function () {
136136
describe('run', function () {
137137
it('should FAIL if Connect instance is not using desired encryption level', function (done) {
138138
const cache = createCache(listInstances, listInstanceCallRecordingStorageConfigs[0], listKeys, describeKey[1]);
139-
instanceCallRecordingEncrypted.run(cache, {}, (err, results) => {
139+
instanceCallRecordingEncrypted.run(cache, {connect_call_recording_encryption_level: 'awscmk'}, (err, results) => {
140140
expect(results.length).to.equal(1);
141141
expect(results[0].status).to.equal(2);
142142
done();

plugins/aws/connect/instanceMediaStreamsEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module.exports = {
1717
name: 'Connect Media Streams Target Encryption Level',
1818
description: 'In order (lowest to highest) awskms=AWS managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1919
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
20-
default: 'awscmk'
20+
default: 'awskms'
2121
}
2222
},
2323
realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig','connect:DeleteInstance', 'connect:DisassociateInstanceStorageConfig'],

plugins/aws/connect/instanceMediaStreamsEncrypted.spec.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ describe('instanceMediaStreamsEncrypted', function () {
142142
describe('run', function () {
143143
it('should FAIL if Connect instance is not using desired encryption level', function (done) {
144144
const cache = createCache(listInstances, listInstanceMediaStreamStorageConfigs[0], listKeys, describeKey[1]);
145-
instanceMediaStreamsEncrypted.run(cache, {}, (err, results) => {
145+
instanceMediaStreamsEncrypted.run(cache, {connect_media_streams_encryption_level: 'awscmk'}, (err, results) => {
146146
expect(results.length).to.equal(1);
147147
expect(results[0].status).to.equal(2);
148148
done();

plugins/aws/connect/instanceReportsEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module.exports = {
1717
name: 'Connect Exported Reports Target Encryption Level',
1818
description: 'In order (lowest to highest) awskms=AWS managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1919
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
20-
default: 'awscmk'
20+
default: 'awskms'
2121
}
2222
},
2323
realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig','connect:DeleteInstance', 'connect:DisassociateInstanceStorageConfig'],

plugins/aws/connect/instanceReportsEncrypted.spec.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ describe('instanceReportsEncrypted', function () {
136136
describe('run', function () {
137137
it('should FAIL if Connect instance is not using desired encryption level', function (done) {
138138
const cache = createCache(listInstances, listInstanceExportedReportStorageConfigs[0], listKeys, describeKey[1]);
139-
instanceReportsEncrypted.run(cache, {}, (err, results) => {
139+
instanceReportsEncrypted.run(cache, {connect_exported_reports_encryption_level : 'awscmk'}, (err, results) => {
140140
expect(results.length).to.equal(1);
141141
expect(results[0].status).to.equal(2);
142142
done();

plugins/aws/connect/instanceTranscriptsEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module.exports = {
1717
name: 'Connect Chat Transcripts Target Encryption Level',
1818
description: 'In order (lowest to highest) awskms=AWS managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1919
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
20-
default: 'awscmk'
20+
default: 'awskms'
2121
}
2222
},
2323
realtime_triggers: ['connect:CreateInstance', 'connect:AssociateInstanceStorageConfig', 'connect:UpdateInstanceStorageConfig','connect:DeleteInstance', 'connect:DisassociateInstanceStorageConfig'],

plugins/aws/connect/instanceTranscriptsEncrypted.spec.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ describe('instanceTranscriptsEncrypted', function () {
136136
describe('run', function () {
137137
it('should FAIL if Connect instance is not using desired encryption level', function (done) {
138138
const cache = createCache(listInstances, listInstanceChatTranscriptStorageConfigs[0], listKeys, describeKey[1]);
139-
instanceTranscriptsEncrypted.run(cache, {}, (err, results) => {
139+
instanceTranscriptsEncrypted.run(cache, {connect_chat_transcripts_encryption_level: 'awscmk'}, (err, results) => {
140140
expect(results.length).to.equal(1);
141141
expect(results[0].status).to.equal(2);
142142
done();

plugins/aws/documentDB/docdbClusterEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module.exports = {
1717
name: 'DocumentDB Cluster Target Encryption Level',
1818
description: 'In order (lowest to highest) awskms=AWS-managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1919
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
20-
default: 'awscmk',
20+
default: 'awskms',
2121
}
2222
},
2323
realtime_triggers: ['docdb:CreateDBCluster','docdb:CreateDBInstance','docdb:DeleteDBCluster'],

plugins/aws/ec2/ebsEncryptionEnabled.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ module.exports = {
5555
name: 'EBS Minimum Encryption Level at rest',
5656
description: 'In order (lowest to highest) awskms=AWS-managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
5757
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
58-
default: 'awscmk',
58+
default: 'awskms',
5959
},
6060

6161
},

plugins/aws/ecr/ecrRepositoryEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module.exports = {
1717
name: 'ECR Repository Encryption',
1818
description: 'In order (lowest to highest) sse=AES-256; awskms=AWS-managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1919
regex: '^(sse|awskms|awscmk|externalcmk|cloudhsm)$',
20-
default: 'awscmk'
20+
default: 'awskms'
2121
}
2222
},
2323
realtime_triggers: ['ecr:CreateRepository', 'ecr:DeleteRepository'],

plugins/aws/elasticache/redisClusterEncryptionAtRest.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module.exports = {
1717
name: 'ElastiCache Cluster Target Encryption Level',
1818
description: 'In order (lowest to highest) awskms=AWS-managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1919
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
20-
default: 'awscmk',
20+
default: 'awskms',
2121
}
2222
},
2323
realtime_triggers: ['elasticache:CreateCacheCluster', 'elasticache:DeleteCacheCluster', 'elasticache:CreateReplicationGroup'],

plugins/aws/elasticache/redisClusterEncryptionAtRest.spec.js

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -219,7 +219,7 @@ describe('redisClusterEncryptionAtRest', function () {
219219
describe('run', function () {
220220
it('should PASS if Redis Cluster at-rest is encrypted with desired encryption level', function (done) {
221221
const cache = createCache(describeCacheClusters[0], listKeys, describeReplicationGroups[0], describeKey[0]);
222-
redisClusterEncryptionAtRest.run(cache, { ec_atrest_desired_encryption_level: 'awscmk' }, (err, results) => {
222+
redisClusterEncryptionAtRest.run(cache, { ec_cluster_target_encryption_level: 'awscmk' }, (err, results) => {
223223
expect(results.length).to.equal(1);
224224
expect(results[0].status).to.equal(0);
225225
expect(results[0].region).to.equal('us-east-1');
@@ -229,7 +229,7 @@ describe('redisClusterEncryptionAtRest', function () {
229229

230230
it('should FAIL if Redis Cluster at-rest is not encrypted with desired encryption level', function (done) {
231231
const cache = createCache([describeCacheClusters[1]],listKeys, describeReplicationGroups[1], describeKey[1]);
232-
redisClusterEncryptionAtRest.run(cache, { ec_atrest_desired_encryption_level: 'awscmk' }, (err, results) => {
232+
redisClusterEncryptionAtRest.run(cache, { ec_cluster_target_encryption_level: 'awscmk' }, (err, results) => {
233233
expect(results.length).to.equal(1);
234234
expect(results[0].status).to.equal(2);
235235
expect(results[0].region).to.equal('us-east-1');

plugins/aws/firehose/deliveryStreamEncrypted.js

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ module.exports = {
1717
name: 'Firehose Delivery Stream Target Encryption Level',
1818
description: 'In order (lowest to highest) awskms=AWS managed KMS; awscmk=Customer managed KMS; externalcmk=Customer managed externally sourced KMS; cloudhsm=Customer managed CloudHSM sourced KMS',
1919
regex: '^(awskms|awscmk|externalcmk|cloudhsm)$',
20-
default: 'awscmk'
20+
default: 'awskms'
2121
}
2222
},
2323
realtime_triggers: ['firehose:CreateDeliveryStreams','firehose:UpdateDestination', 'firehose:DeleteliveryStreams'],

plugins/aws/firehose/deliveryStreamEncrypted.spec.js

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -308,15 +308,15 @@ describe('deliveryStreamEncrypted', function () {
308308
deliveryStreamEncrypted.run(cache, {}, (err, results) => {
309309
expect(results.length).to.equal(1);
310310
expect(results[0].status).to.equal(0);
311-
expect(results[0].message).to.include('Firehose delivery stream destination bucket is encrypted with awscmk');
311+
expect(results[0].message).to.include('Firehose delivery stream is encrypted with awskms');
312312
expect(results[0].region).to.equal('us-east-1');
313313
done();
314314
});
315315
});
316316

317317
it('should FAIL if Firehose Delivery Stream not encrypted with desired encryption level', function (done) {
318318
const cache = createCache([listDeliveryStreams[0]], listKeys, describeDeliveryStream[1], describeKey[1]);
319-
deliveryStreamEncrypted.run(cache, {}, (err, results) => {
319+
deliveryStreamEncrypted.run(cache, {delivery_stream_desired_encryption_level: 'awscmk'}, (err, results) => {
320320
expect(results.length).to.equal(1);
321321
expect(results[0].status).to.equal(2);
322322
expect(results[0].message).to.include('Firehose delivery stream destination bucket is encrypted with awskms');

0 commit comments

Comments
 (0)