github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/aws/ecr/repository_customer_key_test.go (about)

     1  package ecr
     2  
     3  import (
     4  	"testing"
     5  
     6  	defsecTypes "github.com/khulnasoft-lab/defsec/pkg/types"
     7  
     8  	"github.com/khulnasoft-lab/defsec/pkg/state"
     9  
    10  	"github.com/khulnasoft-lab/defsec/pkg/providers/aws/ecr"
    11  	"github.com/khulnasoft-lab/defsec/pkg/scan"
    12  
    13  	"github.com/stretchr/testify/assert"
    14  )
    15  
    16  func TestCheckRepositoryCustomerKey(t *testing.T) {
    17  	tests := []struct {
    18  		name     string
    19  		input    ecr.ECR
    20  		expected bool
    21  	}{
    22  		{
    23  			name: "ECR repository not using KMS encryption",
    24  			input: ecr.ECR{
    25  				Repositories: []ecr.Repository{
    26  					{
    27  						Metadata: defsecTypes.NewTestMetadata(),
    28  						Encryption: ecr.Encryption{
    29  							Metadata: defsecTypes.NewTestMetadata(),
    30  							Type:     defsecTypes.String(ecr.EncryptionTypeAES256, defsecTypes.NewTestMetadata()),
    31  						},
    32  					},
    33  				},
    34  			},
    35  			expected: true,
    36  		},
    37  		{
    38  			name: "ECR repository using KMS encryption but missing key",
    39  			input: ecr.ECR{
    40  				Repositories: []ecr.Repository{
    41  					{
    42  						Metadata: defsecTypes.NewTestMetadata(),
    43  						Encryption: ecr.Encryption{
    44  							Metadata: defsecTypes.NewTestMetadata(),
    45  							Type:     defsecTypes.String(ecr.EncryptionTypeKMS, defsecTypes.NewTestMetadata()),
    46  							KMSKeyID: defsecTypes.String("", defsecTypes.NewTestMetadata()),
    47  						},
    48  					},
    49  				},
    50  			},
    51  			expected: true,
    52  		},
    53  		{
    54  			name: "ECR repository encrypted with KMS key",
    55  			input: ecr.ECR{
    56  				Repositories: []ecr.Repository{
    57  					{
    58  						Metadata: defsecTypes.NewTestMetadata(),
    59  						Encryption: ecr.Encryption{
    60  							Metadata: defsecTypes.NewTestMetadata(),
    61  							Type:     defsecTypes.String(ecr.EncryptionTypeKMS, defsecTypes.NewTestMetadata()),
    62  							KMSKeyID: defsecTypes.String("some-kms-key", defsecTypes.NewTestMetadata()),
    63  						},
    64  					},
    65  				},
    66  			},
    67  			expected: false,
    68  		},
    69  	}
    70  	for _, test := range tests {
    71  		t.Run(test.name, func(t *testing.T) {
    72  			var testState state.State
    73  			testState.AWS.ECR = test.input
    74  			results := CheckRepositoryCustomerKey.Evaluate(&testState)
    75  			var found bool
    76  			for _, result := range results {
    77  				if result.Status() == scan.StatusFailed && result.Rule().LongID() == CheckRepositoryCustomerKey.Rule().LongID() {
    78  					found = true
    79  				}
    80  			}
    81  			if test.expected {
    82  				assert.True(t, found, "Rule should have been found")
    83  			} else {
    84  				assert.False(t, found, "Rule should not have been found")
    85  			}
    86  		})
    87  	}
    88  }