github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/aws/kinesis/enable_in_transit_encryption_test.go (about)

     1  package kinesis
     2  
     3  import (
     4  	"testing"
     5  
     6  	defsecTypes "github.com/khulnasoft-lab/defsec/pkg/types"
     7  
     8  	"github.com/khulnasoft-lab/defsec/pkg/state"
     9  
    10  	"github.com/khulnasoft-lab/defsec/pkg/providers/aws/kinesis"
    11  	"github.com/khulnasoft-lab/defsec/pkg/scan"
    12  
    13  	"github.com/stretchr/testify/assert"
    14  )
    15  
    16  func TestCheckEnableInTransitEncryption(t *testing.T) {
    17  	tests := []struct {
    18  		name     string
    19  		input    kinesis.Kinesis
    20  		expected bool
    21  	}{
    22  		{
    23  			name: "AWS Kinesis Stream with no encryption",
    24  			input: kinesis.Kinesis{
    25  				Streams: []kinesis.Stream{
    26  					{
    27  						Metadata: defsecTypes.NewTestMetadata(),
    28  						Encryption: kinesis.Encryption{
    29  							Metadata: defsecTypes.NewTestMetadata(),
    30  							Type:     defsecTypes.String("NONE", defsecTypes.NewTestMetadata()),
    31  							KMSKeyID: defsecTypes.String("some-key", defsecTypes.NewTestMetadata()),
    32  						},
    33  					},
    34  				},
    35  			},
    36  			expected: true,
    37  		},
    38  		{
    39  			name: "AWS Kinesis Stream with KMS encryption but no key",
    40  			input: kinesis.Kinesis{
    41  				Streams: []kinesis.Stream{
    42  					{
    43  						Metadata: defsecTypes.NewTestMetadata(),
    44  						Encryption: kinesis.Encryption{
    45  							Metadata: defsecTypes.NewTestMetadata(),
    46  							Type:     defsecTypes.String(kinesis.EncryptionTypeKMS, defsecTypes.NewTestMetadata()),
    47  							KMSKeyID: defsecTypes.String("", defsecTypes.NewTestMetadata()),
    48  						},
    49  					},
    50  				},
    51  			},
    52  			expected: true,
    53  		},
    54  		{
    55  			name: "AWS Kinesis Stream with KMS encryption and key",
    56  			input: kinesis.Kinesis{
    57  				Streams: []kinesis.Stream{
    58  					{
    59  						Metadata: defsecTypes.NewTestMetadata(),
    60  						Encryption: kinesis.Encryption{
    61  							Metadata: defsecTypes.NewTestMetadata(),
    62  							Type:     defsecTypes.String(kinesis.EncryptionTypeKMS, defsecTypes.NewTestMetadata()),
    63  							KMSKeyID: defsecTypes.String("some-key", defsecTypes.NewTestMetadata()),
    64  						},
    65  					},
    66  				},
    67  			},
    68  			expected: false,
    69  		},
    70  	}
    71  	for _, test := range tests {
    72  		t.Run(test.name, func(t *testing.T) {
    73  			var testState state.State
    74  			testState.AWS.Kinesis = test.input
    75  			results := CheckEnableInTransitEncryption.Evaluate(&testState)
    76  			var found bool
    77  			for _, result := range results {
    78  				if result.Status() == scan.StatusFailed && result.Rule().LongID() == CheckEnableInTransitEncryption.Rule().LongID() {
    79  					found = true
    80  				}
    81  			}
    82  			if test.expected {
    83  				assert.True(t, found, "Rule should have been found")
    84  			} else {
    85  				assert.False(t, found, "Rule should not have been found")
    86  			}
    87  		})
    88  	}
    89  }