github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/aws/accessanalyzer/enable_access_analyzer_test.go (about) 1 package accessanalyzer 2 3 import ( 4 "testing" 5 6 defsecTypes "github.com/khulnasoft-lab/defsec/pkg/types" 7 8 "github.com/khulnasoft-lab/defsec/pkg/providers/aws/accessanalyzer" 9 10 "github.com/khulnasoft-lab/defsec/pkg/state" 11 12 "github.com/khulnasoft-lab/defsec/pkg/scan" 13 14 "github.com/stretchr/testify/assert" 15 ) 16 17 func TestASCheckNoSecretsInUserData(t *testing.T) { 18 tests := []struct { 19 name string 20 input accessanalyzer.AccessAnalyzer 21 expected bool 22 }{ 23 { 24 name: "No analyzers enabled", 25 input: accessanalyzer.AccessAnalyzer{}, 26 expected: true, 27 }, 28 { 29 name: "Analyzer disabled", 30 input: accessanalyzer.AccessAnalyzer{ 31 Analyzers: []accessanalyzer.Analyzer{ 32 { 33 Metadata: defsecTypes.NewTestMetadata(), 34 ARN: defsecTypes.String("arn:aws:accessanalyzer:us-east-1:123456789012:analyzer/test", defsecTypes.NewTestMetadata()), 35 Name: defsecTypes.String("test", defsecTypes.NewTestMetadata()), 36 Active: defsecTypes.Bool(false, defsecTypes.NewTestMetadata()), 37 }, 38 }, 39 }, 40 expected: true, 41 }, 42 { 43 name: "Analyzer enabled", 44 input: accessanalyzer.AccessAnalyzer{ 45 Analyzers: []accessanalyzer.Analyzer{ 46 { 47 Metadata: defsecTypes.NewTestMetadata(), 48 ARN: defsecTypes.String("arn:aws:accessanalyzer:us-east-1:123456789012:analyzer/test", defsecTypes.NewTestMetadata()), 49 Name: defsecTypes.String("test", defsecTypes.NewTestMetadata()), 50 Active: defsecTypes.Bool(true, defsecTypes.NewTestMetadata()), 51 }, 52 }, 53 }, 54 expected: false, 55 }, 56 } 57 for _, test := range tests { 58 t.Run(test.name, func(t *testing.T) { 59 var testState state.State 60 testState.AWS.AccessAnalyzer = test.input 61 results := CheckEnableAccessAnalyzer.Evaluate(&testState) 62 var found bool 63 for _, result := range results { 64 if result.Status() == scan.StatusFailed && result.Rule().LongID() == CheckEnableAccessAnalyzer.Rule().LongID() { 65 found = true 66 } 67 } 68 if test.expected { 69 assert.True(t, found, "Rule should have been found") 70 } else { 71 assert.False(t, found, "Rule should not have been found") 72 } 73 }) 74 } 75 }