driftctl/pkg/middlewares/aws_ebs_encryption_by_defau...

278 lines
7.1 KiB
Go
Raw Normal View History

package middlewares
import (
"strings"
"testing"
"github.com/aws/aws-sdk-go/aws/awsutil"
"github.com/r3labs/diff/v2"
"github.com/snyk/driftctl/enumeration/resource"
2022-07-21 08:37:03 +00:00
dctlresource "github.com/snyk/driftctl/pkg/resource"
"github.com/snyk/driftctl/pkg/resource/aws"
)
func TestAwsEbsEncryptionByDefaultReconciler_Execute(t *testing.T) {
tests := []struct {
name string
2022-07-21 08:37:03 +00:00
mocks func(*dctlresource.MockResourceFactory)
remoteResources []*resource.Resource
resourcesFromState []*resource.Resource
expectedRemoteResources []*resource.Resource
expectedStateResources []*resource.Resource
}{
{
name: "test encryption by default is managed",
2022-07-21 08:37:03 +00:00
mocks: func(factory *dctlresource.MockResourceFactory) {
factory.On("CreateAbstractResource",
aws.AwsEbsEncryptionByDefaultResourceType,
"terraform-20220328091515068500000001",
map[string]interface{}{
"id": "terraform-20220328091515068500000001",
"enabled": true,
}).Return(&resource.Resource{
Id: "terraform-20220328091515068500000001",
Type: aws.AwsEbsEncryptionByDefaultResourceType,
Attrs: &resource.Attributes{
"id": "terraform-20220328091515068500000001",
"enabled": true,
},
}).Once()
},
remoteResources: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
{
Id: "test-encryption",
Type: aws.AwsEbsEncryptionByDefaultResourceType,
Attrs: &resource.Attributes{
"enabled": true,
},
},
},
resourcesFromState: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
{
Id: "terraform-20220328091515068500000001",
Type: aws.AwsEbsEncryptionByDefaultResourceType,
Attrs: &resource.Attributes{
"id": "terraform-20220328091515068500000001",
"enabled": true,
},
},
},
expectedRemoteResources: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
{
Id: "terraform-20220328091515068500000001",
Type: aws.AwsEbsEncryptionByDefaultResourceType,
Attrs: &resource.Attributes{
"id": "terraform-20220328091515068500000001",
"enabled": true,
},
},
},
expectedStateResources: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
{
Id: "terraform-20220328091515068500000001",
Type: aws.AwsEbsEncryptionByDefaultResourceType,
Attrs: &resource.Attributes{
"id": "terraform-20220328091515068500000001",
"enabled": true,
},
},
},
},
{
name: "test encryption by default is enabled and unmanaged",
2022-07-21 08:37:03 +00:00
mocks: func(factory *dctlresource.MockResourceFactory) {},
remoteResources: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
{
Id: "test-encryption",
Type: aws.AwsEbsEncryptionByDefaultResourceType,
Attrs: &resource.Attributes{
"enabled": true,
},
},
},
resourcesFromState: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
},
expectedRemoteResources: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
{
Id: "test-encryption",
Type: aws.AwsEbsEncryptionByDefaultResourceType,
Attrs: &resource.Attributes{
"enabled": true,
},
},
},
expectedStateResources: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
},
},
{
name: "test encryption by default is disabled and unmanaged",
2022-07-21 08:37:03 +00:00
mocks: func(factory *dctlresource.MockResourceFactory) {},
remoteResources: []*resource.Resource{
{
Id: "test-encryption",
Type: aws.AwsEbsEncryptionByDefaultResourceType,
Attrs: &resource.Attributes{
"enabled": false,
},
},
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
},
resourcesFromState: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
},
expectedRemoteResources: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
},
expectedStateResources: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
},
},
{
name: "test encryption by default doesn't exist",
2022-07-21 08:37:03 +00:00
mocks: func(factory *dctlresource.MockResourceFactory) {},
remoteResources: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
},
resourcesFromState: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
{
Id: "bucket-2",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
{
Id: "test-encryption",
Type: aws.AwsEbsEncryptionByDefaultResourceType,
Attrs: &resource.Attributes{
"enabled": true,
},
},
},
expectedRemoteResources: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
},
expectedStateResources: []*resource.Resource{
{
Id: "bucket-1",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
{
Id: "bucket-2",
Type: aws.AwsS3BucketResourceType,
Attrs: &resource.Attributes{},
},
{
Id: "test-encryption",
Type: aws.AwsEbsEncryptionByDefaultResourceType,
Attrs: &resource.Attributes{
"enabled": true,
},
},
},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
2022-07-21 08:37:03 +00:00
factory := &dctlresource.MockResourceFactory{}
if tt.mocks != nil {
tt.mocks(factory)
}
m := NewAwsEbsEncryptionByDefaultReconciler(factory)
err := m.Execute(&tt.remoteResources, &tt.resourcesFromState)
if err != nil {
t.Fatal(err)
}
changelog, err := diff.Diff(tt.remoteResources, tt.expectedRemoteResources)
if err != nil {
t.Fatal(err)
}
if len(changelog) > 0 {
for _, change := range changelog {
t.Errorf("%s got = %v, want %v", strings.Join(change.Path, "."), awsutil.Prettify(change.From), awsutil.Prettify(change.To))
}
}
changelog, err = diff.Diff(tt.resourcesFromState, tt.expectedStateResources)
if err != nil {
t.Fatal(err)
}
if len(changelog) > 0 {
for _, change := range changelog {
t.Errorf("%s got = %v, want %v", strings.Join(change.Path, "."), awsutil.Prettify(change.From), awsutil.Prettify(change.To))
}
}
})
}
}