package aws import ( "context" "testing" "github.com/aws/aws-sdk-go/service/iam" "github.com/cloudskiff/driftctl/pkg/remote/aws/repository" remoteerror "github.com/cloudskiff/driftctl/pkg/remote/error" testresource "github.com/cloudskiff/driftctl/test/resource" resourceaws "github.com/cloudskiff/driftctl/pkg/resource/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/cloudskiff/driftctl/pkg/parallel" "github.com/aws/aws-sdk-go/aws" "github.com/stretchr/testify/assert" "github.com/stretchr/testify/mock" "github.com/cloudskiff/driftctl/test/goldenfile" "github.com/cloudskiff/driftctl/test/mocks" "github.com/cloudskiff/driftctl/pkg/resource" "github.com/cloudskiff/driftctl/pkg/terraform" "github.com/cloudskiff/driftctl/test" ) func TestIamUserPolicySupplier_Resources(t *testing.T) { cases := []struct { test string dirName string mocks func(repo *repository.MockIAMRepository) err error }{ { test: "no iam user policy", dirName: "iam_user_policy_empty", mocks: func(repo *repository.MockIAMRepository) { users := []*iam.User{ { UserName: aws.String("loadbalancer"), }, } repo.On("ListAllUsers").Return(users, nil) repo.On("ListAllUserPolicies", users).Return([]string{}, nil) }, err: nil, }, { test: "iam multiples users multiple policies", dirName: "iam_user_policy_multiple", mocks: func(repo *repository.MockIAMRepository) { users := []*iam.User{ { UserName: aws.String("loadbalancer"), }, { UserName: aws.String("loadbalancer2"), }, { UserName: aws.String("loadbalancer3"), }, } repo.On("ListAllUsers").Return(users, nil) repo.On("ListAllUserPolicies", users).Once().Return([]string{ *aws.String("loadbalancer:test"), *aws.String("loadbalancer:test2"), *aws.String("loadbalancer:test3"), *aws.String("loadbalancer:test4"), *aws.String("loadbalancer2:test2"), *aws.String("loadbalancer2:test22"), *aws.String("loadbalancer2:test23"), *aws.String("loadbalancer2:test24"), *aws.String("loadbalancer3:test3"), *aws.String("loadbalancer3:test32"), *aws.String("loadbalancer3:test33"), *aws.String("loadbalancer3:test34"), }, nil) }, err: nil, }, { test: "cannot list user", dirName: "iam_user_policy_empty", mocks: func(repo *repository.MockIAMRepository) { repo.On("ListAllUsers").Return(nil, awserr.NewRequestFailure(nil, 403, "")) }, err: remoteerror.NewResourceEnumerationErrorWithType(awserr.NewRequestFailure(nil, 403, ""), resourceaws.AwsIamUserPolicyResourceType, resourceaws.AwsIamUserResourceType), }, { test: "cannot list user policy", dirName: "iam_user_policy_empty", mocks: func(repo *repository.MockIAMRepository) { repo.On("ListAllUsers").Once().Return([]*iam.User{}, nil) repo.On("ListAllUserPolicies", mock.Anything).Return(nil, awserr.NewRequestFailure(nil, 403, "")) }, err: remoteerror.NewResourceEnumerationError(awserr.NewRequestFailure(nil, 403, ""), resourceaws.AwsIamUserPolicyResourceType), }, } for _, c := range cases { shouldUpdate := c.dirName == *goldenfile.Update providerLibrary := terraform.NewProviderLibrary() supplierLibrary := resource.NewSupplierLibrary() repo := testresource.InitFakeSchemaRepository("aws", "3.19.0") resourceaws.InitResourcesMetadata(repo) factory := terraform.NewTerraformResourceFactory(repo) deserializer := resource.NewDeserializer(factory) if shouldUpdate { provider, err := InitTestAwsProvider(providerLibrary) if err != nil { t.Fatal(err) } supplierLibrary.AddSupplier(NewIamUserPolicySupplier(provider, deserializer, repository.NewIAMRepository(provider.session))) } t.Run(c.test, func(tt *testing.T) { fakeIam := repository.MockIAMRepository{} c.mocks(&fakeIam) provider := mocks.NewMockedGoldenTFProvider(c.dirName, providerLibrary.Provider(terraform.AWS), shouldUpdate) s := &IamUserPolicySupplier{ provider, deserializer, &fakeIam, terraform.NewParallelResourceReader(parallel.NewParallelRunner(context.TODO(), 10)), } got, err := s.Resources() assert.Equal(tt, c.err, err) mock.AssertExpectationsForObjects(tt) test.CtyTestDiff(got, c.dirName, provider, deserializer, shouldUpdate, t) }) } }