github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/aws/ecr/repository_customer_key_test.go (about) 1 package ecr 2 3 import ( 4 "testing" 5 6 defsecTypes "github.com/khulnasoft-lab/defsec/pkg/types" 7 8 "github.com/khulnasoft-lab/defsec/pkg/state" 9 10 "github.com/khulnasoft-lab/defsec/pkg/providers/aws/ecr" 11 "github.com/khulnasoft-lab/defsec/pkg/scan" 12 13 "github.com/stretchr/testify/assert" 14 ) 15 16 func TestCheckRepositoryCustomerKey(t *testing.T) { 17 tests := []struct { 18 name string 19 input ecr.ECR 20 expected bool 21 }{ 22 { 23 name: "ECR repository not using KMS encryption", 24 input: ecr.ECR{ 25 Repositories: []ecr.Repository{ 26 { 27 Metadata: defsecTypes.NewTestMetadata(), 28 Encryption: ecr.Encryption{ 29 Metadata: defsecTypes.NewTestMetadata(), 30 Type: defsecTypes.String(ecr.EncryptionTypeAES256, defsecTypes.NewTestMetadata()), 31 }, 32 }, 33 }, 34 }, 35 expected: true, 36 }, 37 { 38 name: "ECR repository using KMS encryption but missing key", 39 input: ecr.ECR{ 40 Repositories: []ecr.Repository{ 41 { 42 Metadata: defsecTypes.NewTestMetadata(), 43 Encryption: ecr.Encryption{ 44 Metadata: defsecTypes.NewTestMetadata(), 45 Type: defsecTypes.String(ecr.EncryptionTypeKMS, defsecTypes.NewTestMetadata()), 46 KMSKeyID: defsecTypes.String("", defsecTypes.NewTestMetadata()), 47 }, 48 }, 49 }, 50 }, 51 expected: true, 52 }, 53 { 54 name: "ECR repository encrypted with KMS key", 55 input: ecr.ECR{ 56 Repositories: []ecr.Repository{ 57 { 58 Metadata: defsecTypes.NewTestMetadata(), 59 Encryption: ecr.Encryption{ 60 Metadata: defsecTypes.NewTestMetadata(), 61 Type: defsecTypes.String(ecr.EncryptionTypeKMS, defsecTypes.NewTestMetadata()), 62 KMSKeyID: defsecTypes.String("some-kms-key", defsecTypes.NewTestMetadata()), 63 }, 64 }, 65 }, 66 }, 67 expected: false, 68 }, 69 } 70 for _, test := range tests { 71 t.Run(test.name, func(t *testing.T) { 72 var testState state.State 73 testState.AWS.ECR = test.input 74 results := CheckRepositoryCustomerKey.Evaluate(&testState) 75 var found bool 76 for _, result := range results { 77 if result.Status() == scan.StatusFailed && result.Rule().LongID() == CheckRepositoryCustomerKey.Rule().LongID() { 78 found = true 79 } 80 } 81 if test.expected { 82 assert.True(t, found, "Rule should have been found") 83 } else { 84 assert.False(t, found, "Rule should not have been found") 85 } 86 }) 87 } 88 }