github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/azure/container/limit_authorized_ips_test.go (about)

     1  package container
     2  
     3  import (
     4  	"testing"
     5  
     6  	defsecTypes "github.com/khulnasoft-lab/defsec/pkg/types"
     7  
     8  	"github.com/khulnasoft-lab/defsec/pkg/state"
     9  
    10  	"github.com/khulnasoft-lab/defsec/pkg/providers/azure/container"
    11  	"github.com/khulnasoft-lab/defsec/pkg/scan"
    12  
    13  	"github.com/stretchr/testify/assert"
    14  )
    15  
    16  func TestCheckLimitAuthorizedIps(t *testing.T) {
    17  	tests := []struct {
    18  		name     string
    19  		input    container.Container
    20  		expected bool
    21  	}{
    22  		{
    23  			name: "API server authorized IP ranges undefined",
    24  			input: container.Container{
    25  				KubernetesClusters: []container.KubernetesCluster{
    26  					{
    27  						Metadata:                    defsecTypes.NewTestMetadata(),
    28  						EnablePrivateCluster:        defsecTypes.Bool(false, defsecTypes.NewTestMetadata()),
    29  						APIServerAuthorizedIPRanges: []defsecTypes.StringValue{},
    30  					},
    31  				},
    32  			},
    33  			expected: true,
    34  		},
    35  		{
    36  			name: "API server authorized IP ranges defined",
    37  			input: container.Container{
    38  				KubernetesClusters: []container.KubernetesCluster{
    39  					{
    40  						Metadata:             defsecTypes.NewTestMetadata(),
    41  						EnablePrivateCluster: defsecTypes.Bool(false, defsecTypes.NewTestMetadata()),
    42  						APIServerAuthorizedIPRanges: []defsecTypes.StringValue{
    43  							defsecTypes.String("1.2.3.4/32", defsecTypes.NewTestMetadata()),
    44  						},
    45  					},
    46  				},
    47  			},
    48  			expected: false,
    49  		},
    50  	}
    51  	for _, test := range tests {
    52  		t.Run(test.name, func(t *testing.T) {
    53  			var testState state.State
    54  			testState.Azure.Container = test.input
    55  			results := CheckLimitAuthorizedIps.Evaluate(&testState)
    56  			var found bool
    57  			for _, result := range results {
    58  				if result.Status() == scan.StatusFailed && result.Rule().LongID() == CheckLimitAuthorizedIps.Rule().LongID() {
    59  					found = true
    60  				}
    61  			}
    62  			if test.expected {
    63  				assert.True(t, found, "Rule should have been found")
    64  			} else {
    65  				assert.False(t, found, "Rule should not have been found")
    66  			}
    67  		})
    68  	}
    69  }