github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/google/gke/no_legacy_authentication_test.go (about)

     1  package gke
     2  
     3  import (
     4  	"testing"
     5  
     6  	defsecTypes "github.com/khulnasoft-lab/defsec/pkg/types"
     7  
     8  	"github.com/khulnasoft-lab/defsec/pkg/state"
     9  
    10  	"github.com/khulnasoft-lab/defsec/pkg/providers/google/gke"
    11  	"github.com/khulnasoft-lab/defsec/pkg/scan"
    12  
    13  	"github.com/stretchr/testify/assert"
    14  )
    15  
    16  func TestCheckNoLegacyAuthentication(t *testing.T) {
    17  	tests := []struct {
    18  		name     string
    19  		input    gke.GKE
    20  		expected bool
    21  	}{
    22  		{
    23  			name: "Cluster master authentication by certificate",
    24  			input: gke.GKE{
    25  				Clusters: []gke.Cluster{
    26  					{
    27  						Metadata: defsecTypes.NewTestMetadata(),
    28  						MasterAuth: gke.MasterAuth{
    29  							Metadata: defsecTypes.NewTestMetadata(),
    30  							ClientCertificate: gke.ClientCertificate{
    31  								Metadata:         defsecTypes.NewTestMetadata(),
    32  								IssueCertificate: defsecTypes.Bool(true, defsecTypes.NewTestMetadata()),
    33  							},
    34  						},
    35  					},
    36  				},
    37  			},
    38  			expected: true,
    39  		},
    40  		{
    41  			name: "Cluster master authentication by username/password",
    42  			input: gke.GKE{
    43  				Clusters: []gke.Cluster{
    44  					{
    45  						Metadata: defsecTypes.NewTestMetadata(),
    46  						MasterAuth: gke.MasterAuth{
    47  							Metadata: defsecTypes.NewTestMetadata(),
    48  							ClientCertificate: gke.ClientCertificate{
    49  								Metadata:         defsecTypes.NewTestMetadata(),
    50  								IssueCertificate: defsecTypes.Bool(false, defsecTypes.NewTestMetadata()),
    51  							},
    52  							Username: defsecTypes.String("username", defsecTypes.NewTestMetadata()),
    53  						},
    54  					},
    55  				},
    56  			},
    57  			expected: true,
    58  		},
    59  		{
    60  			name: "Cluster master authentication by certificate or username/password disabled",
    61  			input: gke.GKE{
    62  				Clusters: []gke.Cluster{
    63  					{
    64  						Metadata: defsecTypes.NewTestMetadata(),
    65  						MasterAuth: gke.MasterAuth{
    66  							Metadata: defsecTypes.NewTestMetadata(),
    67  							ClientCertificate: gke.ClientCertificate{
    68  								Metadata:         defsecTypes.NewTestMetadata(),
    69  								IssueCertificate: defsecTypes.Bool(false, defsecTypes.NewTestMetadata()),
    70  							},
    71  							Username: defsecTypes.String("", defsecTypes.NewTestMetadata()),
    72  						},
    73  					},
    74  				},
    75  			},
    76  			expected: false,
    77  		},
    78  	}
    79  	for _, test := range tests {
    80  		t.Run(test.name, func(t *testing.T) {
    81  			var testState state.State
    82  			testState.Google.GKE = test.input
    83  			results := CheckNoLegacyAuthentication.Evaluate(&testState)
    84  			var found bool
    85  			for _, result := range results {
    86  				if result.Status() == scan.StatusFailed && result.Rule().LongID() == CheckNoLegacyAuthentication.Rule().LongID() {
    87  					found = true
    88  				}
    89  			}
    90  			if test.expected {
    91  				assert.True(t, found, "Rule should have been found")
    92  			} else {
    93  				assert.False(t, found, "Rule should not have been found")
    94  			}
    95  		})
    96  	}
    97  }