github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/aws/eks/enable_control_plane_logging_test.go (about) 1 package eks 2 3 import ( 4 "testing" 5 6 defsecTypes "github.com/khulnasoft-lab/defsec/pkg/types" 7 8 "github.com/khulnasoft-lab/defsec/pkg/state" 9 10 "github.com/khulnasoft-lab/defsec/pkg/providers/aws/eks" 11 "github.com/khulnasoft-lab/defsec/pkg/scan" 12 13 "github.com/stretchr/testify/assert" 14 ) 15 16 func TestCheckEnableControlPlaneLogging(t *testing.T) { 17 tests := []struct { 18 name string 19 input eks.EKS 20 expected bool 21 }{ 22 { 23 name: "EKS cluster with all cluster logging disabled", 24 input: eks.EKS{ 25 Clusters: []eks.Cluster{ 26 { 27 Metadata: defsecTypes.NewTestMetadata(), 28 Logging: eks.Logging{ 29 API: defsecTypes.Bool(false, defsecTypes.NewTestMetadata()), 30 Audit: defsecTypes.Bool(false, defsecTypes.NewTestMetadata()), 31 Authenticator: defsecTypes.Bool(false, defsecTypes.NewTestMetadata()), 32 ControllerManager: defsecTypes.Bool(false, defsecTypes.NewTestMetadata()), 33 Scheduler: defsecTypes.Bool(false, defsecTypes.NewTestMetadata()), 34 }, 35 }, 36 }, 37 }, 38 expected: true, 39 }, 40 { 41 name: "EKS cluster with only some cluster logging enabled", 42 input: eks.EKS{ 43 Clusters: []eks.Cluster{ 44 { 45 Metadata: defsecTypes.NewTestMetadata(), 46 Logging: eks.Logging{ 47 API: defsecTypes.Bool(false, defsecTypes.NewTestMetadata()), 48 Audit: defsecTypes.Bool(true, defsecTypes.NewTestMetadata()), 49 Authenticator: defsecTypes.Bool(false, defsecTypes.NewTestMetadata()), 50 ControllerManager: defsecTypes.Bool(true, defsecTypes.NewTestMetadata()), 51 Scheduler: defsecTypes.Bool(true, defsecTypes.NewTestMetadata()), 52 }, 53 }, 54 }, 55 }, 56 expected: true, 57 }, 58 { 59 name: "EKS cluster with all cluster logging enabled", 60 input: eks.EKS{ 61 Clusters: []eks.Cluster{ 62 { 63 Metadata: defsecTypes.NewTestMetadata(), 64 Logging: eks.Logging{ 65 API: defsecTypes.Bool(true, defsecTypes.NewTestMetadata()), 66 Audit: defsecTypes.Bool(true, defsecTypes.NewTestMetadata()), 67 Authenticator: defsecTypes.Bool(true, defsecTypes.NewTestMetadata()), 68 ControllerManager: defsecTypes.Bool(true, defsecTypes.NewTestMetadata()), 69 Scheduler: defsecTypes.Bool(true, defsecTypes.NewTestMetadata()), 70 }, 71 }, 72 }, 73 }, 74 expected: false, 75 }, 76 } 77 for _, test := range tests { 78 t.Run(test.name, func(t *testing.T) { 79 var testState state.State 80 testState.AWS.EKS = test.input 81 results := CheckEnableControlPlaneLogging.Evaluate(&testState) 82 var found bool 83 for _, result := range results { 84 if result.Status() == scan.StatusFailed && result.Rule().LongID() == CheckEnableControlPlaneLogging.Rule().LongID() { 85 found = true 86 } 87 } 88 if test.expected { 89 assert.True(t, found, "Rule should have been found") 90 } else { 91 assert.False(t, found, "Rule should not have been found") 92 } 93 }) 94 } 95 }