github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/azure/container/limit_authorized_ips_test.go (about) 1 package container 2 3 import ( 4 "testing" 5 6 defsecTypes "github.com/khulnasoft-lab/defsec/pkg/types" 7 8 "github.com/khulnasoft-lab/defsec/pkg/state" 9 10 "github.com/khulnasoft-lab/defsec/pkg/providers/azure/container" 11 "github.com/khulnasoft-lab/defsec/pkg/scan" 12 13 "github.com/stretchr/testify/assert" 14 ) 15 16 func TestCheckLimitAuthorizedIps(t *testing.T) { 17 tests := []struct { 18 name string 19 input container.Container 20 expected bool 21 }{ 22 { 23 name: "API server authorized IP ranges undefined", 24 input: container.Container{ 25 KubernetesClusters: []container.KubernetesCluster{ 26 { 27 Metadata: defsecTypes.NewTestMetadata(), 28 EnablePrivateCluster: defsecTypes.Bool(false, defsecTypes.NewTestMetadata()), 29 APIServerAuthorizedIPRanges: []defsecTypes.StringValue{}, 30 }, 31 }, 32 }, 33 expected: true, 34 }, 35 { 36 name: "API server authorized IP ranges defined", 37 input: container.Container{ 38 KubernetesClusters: []container.KubernetesCluster{ 39 { 40 Metadata: defsecTypes.NewTestMetadata(), 41 EnablePrivateCluster: defsecTypes.Bool(false, defsecTypes.NewTestMetadata()), 42 APIServerAuthorizedIPRanges: []defsecTypes.StringValue{ 43 defsecTypes.String("1.2.3.4/32", defsecTypes.NewTestMetadata()), 44 }, 45 }, 46 }, 47 }, 48 expected: false, 49 }, 50 } 51 for _, test := range tests { 52 t.Run(test.name, func(t *testing.T) { 53 var testState state.State 54 testState.Azure.Container = test.input 55 results := CheckLimitAuthorizedIps.Evaluate(&testState) 56 var found bool 57 for _, result := range results { 58 if result.Status() == scan.StatusFailed && result.Rule().LongID() == CheckLimitAuthorizedIps.Rule().LongID() { 59 found = true 60 } 61 } 62 if test.expected { 63 assert.True(t, found, "Rule should have been found") 64 } else { 65 assert.False(t, found, "Rule should not have been found") 66 } 67 }) 68 } 69 }