|
33 | 33 | except:
|
34 | 34 | OUTPUT_TO_XLSX = False
|
35 | 35 |
|
36 |
| -RELEASE_VERSION = "2.5.11" |
| 36 | +RELEASE_VERSION = "2.5.12" |
37 | 37 | PYTHON_SDK_VERSION = "2.103.0"
|
38 |
| -UPDATED_DATE = "June 20, 2023" |
| 38 | +UPDATED_DATE = "June 29, 2023" |
39 | 39 |
|
40 | 40 | ##########################################################################
|
41 | 41 | # Print header centered
|
@@ -1299,7 +1299,6 @@ def __os_read_buckets(self):
|
1299 | 1299 | search_details=oci.resource_search.models.StructuredSearchDetails(
|
1300 | 1300 | query="query Bucket resources return allAdditionalFields where compartmentId != '" + self.__managed_paas_compartment_id + "'")
|
1301 | 1301 | ).data
|
1302 |
| - |
1303 | 1302 | # Getting Bucket Info
|
1304 | 1303 | for bucket in buckets_data:
|
1305 | 1304 | try:
|
@@ -1328,12 +1327,10 @@ def __os_read_buckets(self):
|
1328 | 1327 | }
|
1329 | 1328 | self.__buckets.append(record)
|
1330 | 1329 | except Exception as e:
|
1331 |
| - deep_link = self.__oci_buckets_uri + bucket.additional_details['namespace'] + \ |
1332 |
| - "/" + bucket.display_name + "/objects?region=" + region_key |
1333 | 1330 | record = {
|
1334 | 1331 | "id": "",
|
1335 | 1332 | "name": bucket.display_name,
|
1336 |
| - "deep_link": self.__generate_csv_hyperlink(deep_link, bucket.display_name), |
| 1333 | + "deep_link": "", |
1337 | 1334 | "kms_key_id": "",
|
1338 | 1335 | "namespace": bucket.additional_details['namespace'],
|
1339 | 1336 | "compartment_id": bucket.compartment_id,
|
@@ -3371,7 +3368,7 @@ def __report_cis_analyze_tenancy_data(self):
|
3371 | 3368 | for sl in self.__network_security_lists:
|
3372 | 3369 | for irule in sl['ingress_security_rules']:
|
3373 | 3370 | if irule['source'] == "0.0.0.0/0" and irule['protocol'] == '6':
|
3374 |
| - if irule['tcp_options']: |
| 3371 | + if irule['tcp_options'] and irule['tcp_options']['destinationPortRange']: |
3375 | 3372 | port_min = irule['tcp_options']['destinationPortRange']['min']
|
3376 | 3373 | port_max = irule['tcp_options']['destinationPortRange']['max']
|
3377 | 3374 | ports_range = range(port_min, port_max +1)
|
@@ -3419,7 +3416,7 @@ def __report_cis_analyze_tenancy_data(self):
|
3419 | 3416 | for nsg in self.__network_security_groups:
|
3420 | 3417 | for rule in nsg['rules']:
|
3421 | 3418 | if rule['source'] == "0.0.0.0/0" and rule['protocol'] == '6':
|
3422 |
| - if rule['tcp_options']: |
| 3419 | + if rule['tcp_options'] and rule['tcp_options'].destination_port_range: |
3423 | 3420 | port_min = rule['tcp_options'].destination_port_range.min
|
3424 | 3421 | port_max = rule['tcp_options'].destination_port_range.max
|
3425 | 3422 | ports_range = range(port_min,port_max+1)
|
@@ -3693,7 +3690,7 @@ def __obp_analyze_tenancy_data(self):
|
3693 | 3690 | ## Determines if a Budget Exists with an alert rule
|
3694 | 3691 | if len(self.__budgets) > 0:
|
3695 | 3692 | for budget in self.__budgets:
|
3696 |
| - if budget['alert_rule_count'] > 0: |
| 3693 | + if budget['alert_rule_count'] >0 and budget['target_compartment_id'] == self.__tenancy.id: |
3697 | 3694 | self.obp_foundations_checks['Cost_Tracking_Budgets']['Status'] = True
|
3698 | 3695 | self.obp_foundations_checks['Cost_Tracking_Budgets']['OBP'].append(budget)
|
3699 | 3696 | else:
|
|
0 commit comments