github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/aws/eks/enable_control_plane_logging_test.go (about)

     1  package eks
     2  
     3  import (
     4  	"testing"
     5  
     6  	defsecTypes "github.com/khulnasoft-lab/defsec/pkg/types"
     7  
     8  	"github.com/khulnasoft-lab/defsec/pkg/state"
     9  
    10  	"github.com/khulnasoft-lab/defsec/pkg/providers/aws/eks"
    11  	"github.com/khulnasoft-lab/defsec/pkg/scan"
    12  
    13  	"github.com/stretchr/testify/assert"
    14  )
    15  
    16  func TestCheckEnableControlPlaneLogging(t *testing.T) {
    17  	tests := []struct {
    18  		name     string
    19  		input    eks.EKS
    20  		expected bool
    21  	}{
    22  		{
    23  			name: "EKS cluster with all cluster logging disabled",
    24  			input: eks.EKS{
    25  				Clusters: []eks.Cluster{
    26  					{
    27  						Metadata: defsecTypes.NewTestMetadata(),
    28  						Logging: eks.Logging{
    29  							API:               defsecTypes.Bool(false, defsecTypes.NewTestMetadata()),
    30  							Audit:             defsecTypes.Bool(false, defsecTypes.NewTestMetadata()),
    31  							Authenticator:     defsecTypes.Bool(false, defsecTypes.NewTestMetadata()),
    32  							ControllerManager: defsecTypes.Bool(false, defsecTypes.NewTestMetadata()),
    33  							Scheduler:         defsecTypes.Bool(false, defsecTypes.NewTestMetadata()),
    34  						},
    35  					},
    36  				},
    37  			},
    38  			expected: true,
    39  		},
    40  		{
    41  			name: "EKS cluster with only some cluster logging enabled",
    42  			input: eks.EKS{
    43  				Clusters: []eks.Cluster{
    44  					{
    45  						Metadata: defsecTypes.NewTestMetadata(),
    46  						Logging: eks.Logging{
    47  							API:               defsecTypes.Bool(false, defsecTypes.NewTestMetadata()),
    48  							Audit:             defsecTypes.Bool(true, defsecTypes.NewTestMetadata()),
    49  							Authenticator:     defsecTypes.Bool(false, defsecTypes.NewTestMetadata()),
    50  							ControllerManager: defsecTypes.Bool(true, defsecTypes.NewTestMetadata()),
    51  							Scheduler:         defsecTypes.Bool(true, defsecTypes.NewTestMetadata()),
    52  						},
    53  					},
    54  				},
    55  			},
    56  			expected: true,
    57  		},
    58  		{
    59  			name: "EKS cluster with all cluster logging enabled",
    60  			input: eks.EKS{
    61  				Clusters: []eks.Cluster{
    62  					{
    63  						Metadata: defsecTypes.NewTestMetadata(),
    64  						Logging: eks.Logging{
    65  							API:               defsecTypes.Bool(true, defsecTypes.NewTestMetadata()),
    66  							Audit:             defsecTypes.Bool(true, defsecTypes.NewTestMetadata()),
    67  							Authenticator:     defsecTypes.Bool(true, defsecTypes.NewTestMetadata()),
    68  							ControllerManager: defsecTypes.Bool(true, defsecTypes.NewTestMetadata()),
    69  							Scheduler:         defsecTypes.Bool(true, defsecTypes.NewTestMetadata()),
    70  						},
    71  					},
    72  				},
    73  			},
    74  			expected: false,
    75  		},
    76  	}
    77  	for _, test := range tests {
    78  		t.Run(test.name, func(t *testing.T) {
    79  			var testState state.State
    80  			testState.AWS.EKS = test.input
    81  			results := CheckEnableControlPlaneLogging.Evaluate(&testState)
    82  			var found bool
    83  			for _, result := range results {
    84  				if result.Status() == scan.StatusFailed && result.Rule().LongID() == CheckEnableControlPlaneLogging.Rule().LongID() {
    85  					found = true
    86  				}
    87  			}
    88  			if test.expected {
    89  				assert.True(t, found, "Rule should have been found")
    90  			} else {
    91  				assert.False(t, found, "Rule should not have been found")
    92  			}
    93  		})
    94  	}
    95  }