package remote import ( "errors" "testing" "github.com/cloudskiff/driftctl/mocks" "github.com/cloudskiff/driftctl/pkg/filter" "github.com/cloudskiff/driftctl/pkg/remote/alerts" "github.com/cloudskiff/driftctl/pkg/remote/cache" "github.com/cloudskiff/driftctl/pkg/remote/common" remoteerr "github.com/cloudskiff/driftctl/pkg/remote/error" "github.com/cloudskiff/driftctl/pkg/remote/github" githubres "github.com/cloudskiff/driftctl/pkg/resource/github" "github.com/cloudskiff/driftctl/pkg/terraform" testresource "github.com/cloudskiff/driftctl/test/resource" tftest "github.com/cloudskiff/driftctl/test/terraform" "github.com/stretchr/testify/mock" "github.com/cloudskiff/driftctl/pkg/resource" "github.com/cloudskiff/driftctl/test" "github.com/cloudskiff/driftctl/test/goldenfile" "github.com/stretchr/testify/assert" ) func TestScanGithubMembership(t *testing.T) { cases := []struct { test string dirName string mocks func(*github.MockGithubRepository, *mocks.AlerterInterface) err error }{ { test: "no members", dirName: "github_membership_empty", mocks: func(client *github.MockGithubRepository, alerter *mocks.AlerterInterface) { client.On("ListMembership").Return([]string{}, nil) }, err: nil, }, { test: "Multiple membership with admin and member roles", dirName: "github_membership_multiple", mocks: func(client *github.MockGithubRepository, alerter *mocks.AlerterInterface) { client.On("ListMembership").Return([]string{ "driftctl-test:driftctl-acceptance-tester", "driftctl-test:eliecharra", }, nil) }, err: nil, }, { test: "cannot list membership", dirName: "github_membership_empty", mocks: func(client *github.MockGithubRepository, alerter *mocks.AlerterInterface) { client.On("ListMembership").Return(nil, errors.New("Your token has not been granted the required scopes to execute this query.")) alerter.On("SendAlert", githubres.GithubMembershipResourceType, alerts.NewRemoteAccessDeniedAlert(common.RemoteGithubTerraform, remoteerr.NewResourceListingErrorWithType(errors.New("Your token has not been granted the required scopes to execute this query."), githubres.GithubMembershipResourceType, githubres.GithubMembershipResourceType), alerts.EnumerationPhase)).Return() }, err: nil, }, } schemaRepository := testresource.InitFakeSchemaRepository("github", "4.4.0") githubres.InitResourcesMetadata(schemaRepository) factory := terraform.NewTerraformResourceFactory(schemaRepository) deserializer := resource.NewDeserializer(factory) for _, c := range cases { t.Run(c.test, func(tt *testing.T) { shouldUpdate := c.dirName == *goldenfile.Update scanOptions := ScannerOptions{Deep: true} providerLibrary := terraform.NewProviderLibrary() remoteLibrary := common.NewRemoteLibrary() // Initialize mocks alerter := &mocks.AlerterInterface{} mockedRepo := github.MockGithubRepository{} c.mocks(&mockedRepo, alerter) var repo github.GithubRepository = &mockedRepo realProvider, err := tftest.InitTestGithubProvider(providerLibrary, "4.4.0") if err != nil { t.Fatal(err) } provider := tftest.NewFakeTerraformProvider(realProvider) provider.WithResponse(c.dirName) if shouldUpdate { err := realProvider.Init() if err != nil { t.Fatal(err) } provider.ShouldUpdate() repo = github.NewGithubRepository(realProvider.GetConfig(), cache.New(0)) } remoteLibrary.AddEnumerator(github.NewGithubMembershipEnumerator(repo, factory)) remoteLibrary.AddDetailsFetcher(githubres.GithubMembershipResourceType, common.NewGenericDetailsFetcher(githubres.GithubMembershipResourceType, provider, deserializer)) testFilter := &filter.MockFilter{} testFilter.On("IsTypeIgnored", mock.Anything).Return(false) s := NewScanner(remoteLibrary, alerter, scanOptions, testFilter) got, err := s.Resources() assert.Equal(tt, err, c.err) if err != nil { return } test.TestAgainstGoldenFile(got, githubres.GithubMembershipResourceType, c.dirName, provider, deserializer, shouldUpdate, tt) mockedRepo.AssertExpectations(tt) alerter.AssertExpectations(tt) }) } }