278 lines
7.1 KiB
Go
278 lines
7.1 KiB
Go
package middlewares
|
|
|
|
import (
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/aws/aws-sdk-go/aws/awsutil"
|
|
"github.com/r3labs/diff/v2"
|
|
"github.com/snyk/driftctl/enumeration/resource"
|
|
dctlresource "github.com/snyk/driftctl/pkg/resource"
|
|
"github.com/snyk/driftctl/pkg/resource/aws"
|
|
)
|
|
|
|
func TestAwsEbsEncryptionByDefaultReconciler_Execute(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
mocks func(*dctlresource.MockResourceFactory)
|
|
remoteResources []*resource.Resource
|
|
resourcesFromState []*resource.Resource
|
|
expectedRemoteResources []*resource.Resource
|
|
expectedStateResources []*resource.Resource
|
|
}{
|
|
{
|
|
name: "test encryption by default is managed",
|
|
mocks: func(factory *dctlresource.MockResourceFactory) {
|
|
factory.On("CreateAbstractResource",
|
|
aws.AwsEbsEncryptionByDefaultResourceType,
|
|
"terraform-20220328091515068500000001",
|
|
map[string]interface{}{
|
|
"id": "terraform-20220328091515068500000001",
|
|
"enabled": true,
|
|
}).Return(&resource.Resource{
|
|
Id: "terraform-20220328091515068500000001",
|
|
Type: aws.AwsEbsEncryptionByDefaultResourceType,
|
|
Attrs: &resource.Attributes{
|
|
"id": "terraform-20220328091515068500000001",
|
|
"enabled": true,
|
|
},
|
|
}).Once()
|
|
},
|
|
remoteResources: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
{
|
|
Id: "test-encryption",
|
|
Type: aws.AwsEbsEncryptionByDefaultResourceType,
|
|
Attrs: &resource.Attributes{
|
|
"enabled": true,
|
|
},
|
|
},
|
|
},
|
|
resourcesFromState: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
{
|
|
Id: "terraform-20220328091515068500000001",
|
|
Type: aws.AwsEbsEncryptionByDefaultResourceType,
|
|
Attrs: &resource.Attributes{
|
|
"id": "terraform-20220328091515068500000001",
|
|
"enabled": true,
|
|
},
|
|
},
|
|
},
|
|
expectedRemoteResources: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
{
|
|
Id: "terraform-20220328091515068500000001",
|
|
Type: aws.AwsEbsEncryptionByDefaultResourceType,
|
|
Attrs: &resource.Attributes{
|
|
"id": "terraform-20220328091515068500000001",
|
|
"enabled": true,
|
|
},
|
|
},
|
|
},
|
|
expectedStateResources: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
{
|
|
Id: "terraform-20220328091515068500000001",
|
|
Type: aws.AwsEbsEncryptionByDefaultResourceType,
|
|
Attrs: &resource.Attributes{
|
|
"id": "terraform-20220328091515068500000001",
|
|
"enabled": true,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "test encryption by default is enabled and unmanaged",
|
|
mocks: func(factory *dctlresource.MockResourceFactory) {},
|
|
remoteResources: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
{
|
|
Id: "test-encryption",
|
|
Type: aws.AwsEbsEncryptionByDefaultResourceType,
|
|
Attrs: &resource.Attributes{
|
|
"enabled": true,
|
|
},
|
|
},
|
|
},
|
|
resourcesFromState: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
},
|
|
expectedRemoteResources: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
{
|
|
Id: "test-encryption",
|
|
Type: aws.AwsEbsEncryptionByDefaultResourceType,
|
|
Attrs: &resource.Attributes{
|
|
"enabled": true,
|
|
},
|
|
},
|
|
},
|
|
expectedStateResources: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "test encryption by default is disabled and unmanaged",
|
|
mocks: func(factory *dctlresource.MockResourceFactory) {},
|
|
remoteResources: []*resource.Resource{
|
|
{
|
|
Id: "test-encryption",
|
|
Type: aws.AwsEbsEncryptionByDefaultResourceType,
|
|
Attrs: &resource.Attributes{
|
|
"enabled": false,
|
|
},
|
|
},
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
},
|
|
resourcesFromState: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
},
|
|
expectedRemoteResources: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
},
|
|
expectedStateResources: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "test encryption by default doesn't exist",
|
|
mocks: func(factory *dctlresource.MockResourceFactory) {},
|
|
remoteResources: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
},
|
|
resourcesFromState: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
{
|
|
Id: "bucket-2",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
{
|
|
Id: "test-encryption",
|
|
Type: aws.AwsEbsEncryptionByDefaultResourceType,
|
|
Attrs: &resource.Attributes{
|
|
"enabled": true,
|
|
},
|
|
},
|
|
},
|
|
expectedRemoteResources: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
},
|
|
expectedStateResources: []*resource.Resource{
|
|
{
|
|
Id: "bucket-1",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
{
|
|
Id: "bucket-2",
|
|
Type: aws.AwsS3BucketResourceType,
|
|
Attrs: &resource.Attributes{},
|
|
},
|
|
{
|
|
Id: "test-encryption",
|
|
Type: aws.AwsEbsEncryptionByDefaultResourceType,
|
|
Attrs: &resource.Attributes{
|
|
"enabled": true,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
factory := &dctlresource.MockResourceFactory{}
|
|
if tt.mocks != nil {
|
|
tt.mocks(factory)
|
|
}
|
|
|
|
m := NewAwsEbsEncryptionByDefaultReconciler(factory)
|
|
err := m.Execute(&tt.remoteResources, &tt.resourcesFromState)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
changelog, err := diff.Diff(tt.remoteResources, tt.expectedRemoteResources)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if len(changelog) > 0 {
|
|
for _, change := range changelog {
|
|
t.Errorf("%s got = %v, want %v", strings.Join(change.Path, "."), awsutil.Prettify(change.From), awsutil.Prettify(change.To))
|
|
}
|
|
}
|
|
|
|
changelog, err = diff.Diff(tt.resourcesFromState, tt.expectedStateResources)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if len(changelog) > 0 {
|
|
for _, change := range changelog {
|
|
t.Errorf("%s got = %v, want %v", strings.Join(change.Path, "."), awsutil.Prettify(change.From), awsutil.Prettify(change.To))
|
|
}
|
|
}
|
|
})
|
|
}
|
|
}
|