driftctl/pkg/remote/aws/sqs_queue_policy_supplier_t...

101 lines
3.3 KiB
Go
Raw Normal View History

2021-01-29 11:35:11 +00:00
package aws
import (
"context"
"testing"
"github.com/aws/aws-sdk-go/aws/awserr"
2021-05-31 15:39:16 +00:00
"github.com/cloudskiff/driftctl/pkg/remote/aws/repository"
2021-01-29 11:35:11 +00:00
remoteerror "github.com/cloudskiff/driftctl/pkg/remote/error"
resourceaws "github.com/cloudskiff/driftctl/pkg/resource/aws"
2021-05-21 14:09:45 +00:00
testresource "github.com/cloudskiff/driftctl/test/resource"
2021-01-29 11:35:11 +00:00
awssdk "github.com/aws/aws-sdk-go/aws"
"github.com/cloudskiff/driftctl/mocks"
"github.com/cloudskiff/driftctl/pkg/parallel"
"github.com/cloudskiff/driftctl/pkg/resource"
2021-05-21 14:09:45 +00:00
2021-01-29 11:35:11 +00:00
"github.com/cloudskiff/driftctl/pkg/terraform"
"github.com/cloudskiff/driftctl/test"
"github.com/cloudskiff/driftctl/test/goldenfile"
mocks2 "github.com/cloudskiff/driftctl/test/mocks"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
)
func TestSqsQueuePolicySupplier_Resources(t *testing.T) {
cases := []struct {
test string
dirName string
2021-02-03 20:08:57 +00:00
mocks func(client *mocks.SQSRepository)
2021-01-29 11:35:11 +00:00
err error
}{
{
// sqs queue with no policy case is not possible
// as a default SQSDefaultPolicy (e.g. policy="") will always be present in each queue
test: "no sqs queue policies",
dirName: "sqs_queue_policy_empty",
2021-02-03 20:08:57 +00:00
mocks: func(client *mocks.SQSRepository) {
client.On("ListAllQueues").Return([]*string{}, nil)
2021-01-29 11:35:11 +00:00
},
err: nil,
},
{
test: "multiple sqs queue policies (default or not)",
dirName: "sqs_queue_policy_multiple",
2021-02-03 20:08:57 +00:00
mocks: func(client *mocks.SQSRepository) {
client.On("ListAllQueues").Return([]*string{
awssdk.String("https://sqs.eu-west-3.amazonaws.com/047081014315/bar.fifo"),
awssdk.String("https://sqs.eu-west-3.amazonaws.com/047081014315/foo"),
awssdk.String("https://sqs.eu-west-3.amazonaws.com/047081014315/baz"),
}, nil)
2021-01-29 11:35:11 +00:00
},
err: nil,
},
{
test: "cannot list sqs queues, thus sqs queue policies",
dirName: "sqs_queue_policy_empty",
2021-02-03 20:08:57 +00:00
mocks: func(client *mocks.SQSRepository) {
client.On("ListAllQueues").Return(nil, awserr.NewRequestFailure(nil, 403, ""))
2021-01-29 11:35:11 +00:00
},
err: remoteerror.NewResourceEnumerationErrorWithType(awserr.NewRequestFailure(nil, 403, ""), resourceaws.AwsSqsQueuePolicyResourceType, resourceaws.AwsSqsQueueResourceType),
},
}
for _, c := range cases {
shouldUpdate := c.dirName == *goldenfile.Update
providerLibrary := terraform.NewProviderLibrary()
supplierLibrary := resource.NewSupplierLibrary()
2021-05-21 14:09:45 +00:00
repo := testresource.InitFakeSchemaRepository("aws", "3.19.0")
resourceaws.InitResourcesMetadata(repo)
factory := terraform.NewTerraformResourceFactory(repo)
deserializer := resource.NewDeserializer(factory)
2021-01-29 11:35:11 +00:00
if shouldUpdate {
provider, err := InitTestAwsProvider(providerLibrary)
2021-01-29 11:35:11 +00:00
if err != nil {
t.Fatal(err)
}
2021-05-31 15:39:16 +00:00
supplierLibrary.AddSupplier(NewSqsQueuePolicySupplier(provider, deserializer, repository.NewSQSClient(provider.session)))
2021-01-29 11:35:11 +00:00
}
t.Run(c.test, func(tt *testing.T) {
2021-02-03 20:08:57 +00:00
fakeSQS := mocks.SQSRepository{}
2021-01-29 11:35:11 +00:00
c.mocks(&fakeSQS)
provider := mocks2.NewMockedGoldenTFProvider(c.dirName, providerLibrary.Provider(terraform.AWS), shouldUpdate)
s := &SqsQueuePolicySupplier{
provider,
2021-05-21 14:09:45 +00:00
deserializer,
2021-01-29 11:35:11 +00:00
&fakeSQS,
terraform.NewParallelResourceReader(parallel.NewParallelRunner(context.TODO(), 10)),
}
got, err := s.Resources()
assert.Equal(tt, c.err, err)
mock.AssertExpectationsForObjects(tt)
2021-05-21 14:09:45 +00:00
test.CtyTestDiff(got, c.dirName, provider, deserializer, shouldUpdate, tt)
2021-01-29 11:35:11 +00:00
})
}
}