github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/aws/s3/ignore_public_acls_test.go (about) 1 package s3 2 3 import ( 4 "testing" 5 6 defsecTypes "github.com/khulnasoft-lab/defsec/pkg/types" 7 8 "github.com/khulnasoft-lab/defsec/pkg/state" 9 10 "github.com/khulnasoft-lab/defsec/pkg/providers/aws/s3" 11 "github.com/khulnasoft-lab/defsec/pkg/scan" 12 13 "github.com/stretchr/testify/assert" 14 ) 15 16 func TestCheckPublicACLsAreIgnored(t *testing.T) { 17 tests := []struct { 18 name string 19 input s3.S3 20 expected bool 21 }{ 22 { 23 name: "Public access block missing", 24 input: s3.S3{ 25 Buckets: []s3.Bucket{ 26 { 27 Metadata: defsecTypes.NewTestMetadata(), 28 }, 29 }, 30 }, 31 expected: true, 32 }, 33 { 34 name: "Public access block ignores public ACLs", 35 input: s3.S3{ 36 Buckets: []s3.Bucket{ 37 { 38 Metadata: defsecTypes.NewTestMetadata(), 39 PublicAccessBlock: &s3.PublicAccessBlock{ 40 Metadata: defsecTypes.NewTestMetadata(), 41 IgnorePublicACLs: defsecTypes.Bool(true, defsecTypes.NewTestMetadata()), 42 }, 43 }, 44 }, 45 }, 46 expected: false, 47 }, 48 } 49 for _, test := range tests { 50 t.Run(test.name, func(t *testing.T) { 51 var testState state.State 52 testState.AWS.S3 = test.input 53 results := CheckPublicACLsAreIgnored.Evaluate(&testState) 54 var found bool 55 for _, result := range results { 56 if result.Status() == scan.StatusFailed && result.Rule().LongID() == CheckPublicACLsAreIgnored.Rule().LongID() { 57 found = true 58 } 59 } 60 if test.expected { 61 assert.True(t, found, "Rule should have been found") 62 } else { 63 assert.False(t, found, "Rule should not have been found") 64 } 65 }) 66 } 67 }