github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/azure/database/all_threat_alerts_enabled_test.go (about) 1 package database 2 3 import ( 4 "testing" 5 6 defsecTypes "github.com/khulnasoft-lab/defsec/pkg/types" 7 8 "github.com/khulnasoft-lab/defsec/pkg/state" 9 10 "github.com/khulnasoft-lab/defsec/pkg/providers/azure/database" 11 "github.com/khulnasoft-lab/defsec/pkg/scan" 12 13 "github.com/stretchr/testify/assert" 14 ) 15 16 func TestCheckAllThreatAlertsEnabled(t *testing.T) { 17 tests := []struct { 18 name string 19 input database.Database 20 expected bool 21 }{ 22 { 23 name: "MS SQL server alerts for SQL injection disabled", 24 input: database.Database{ 25 MSSQLServers: []database.MSSQLServer{ 26 { 27 Metadata: defsecTypes.NewTestMetadata(), 28 SecurityAlertPolicies: []database.SecurityAlertPolicy{ 29 { 30 Metadata: defsecTypes.NewTestMetadata(), 31 DisabledAlerts: []defsecTypes.StringValue{ 32 defsecTypes.String("Sql_Injection", defsecTypes.NewTestMetadata()), 33 }, 34 }, 35 }, 36 }, 37 }, 38 }, 39 expected: true, 40 }, 41 { 42 name: "MS SQL server all alerts enabled", 43 input: database.Database{ 44 MSSQLServers: []database.MSSQLServer{ 45 { 46 Metadata: defsecTypes.NewTestMetadata(), 47 SecurityAlertPolicies: []database.SecurityAlertPolicy{ 48 { 49 Metadata: defsecTypes.NewTestMetadata(), 50 DisabledAlerts: []defsecTypes.StringValue{}, 51 }, 52 }, 53 }, 54 }, 55 }, 56 expected: false, 57 }, 58 } 59 for _, test := range tests { 60 t.Run(test.name, func(t *testing.T) { 61 var testState state.State 62 testState.Azure.Database = test.input 63 results := CheckAllThreatAlertsEnabled.Evaluate(&testState) 64 var found bool 65 for _, result := range results { 66 if result.Status() == scan.StatusFailed && result.Rule().LongID() == CheckAllThreatAlertsEnabled.Rule().LongID() { 67 found = true 68 } 69 } 70 if test.expected { 71 assert.True(t, found, "Rule should have been found") 72 } else { 73 assert.False(t, found, "Rule should not have been found") 74 } 75 }) 76 } 77 }