Files
aquasecurity-trivy/pkg/iac/adapters/terraform/aws/lambda/adapt_test.go
2026-01-14 19:44:33 +00:00

140 lines
3.7 KiB
Go

package lambda
import (
"testing"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"github.com/aquasecurity/trivy/internal/testutil"
"github.com/aquasecurity/trivy/pkg/iac/adapters/terraform/tftestutil"
"github.com/aquasecurity/trivy/pkg/iac/providers/aws/lambda"
iacTypes "github.com/aquasecurity/trivy/pkg/iac/types"
)
func Test_Adapt(t *testing.T) {
tests := []struct {
name string
terraform string
expected lambda.Lambda
}{
{
name: "reference arn",
terraform: `
resource "aws_lambda_function" "example" {
filename = "lambda_function_payload.zip"
function_name = "lambda_function_name"
role = aws_iam_role.iam_for_lambda.arn
runtime = "nodejs12.x"
tracing_config {
mode = "Passthrough"
}
}
resource "aws_lambda_permission" "example" {
statement_id = "AllowExecutionFromSNS"
action = "lambda:InvokeFunction"
function_name = aws_lambda_function.example.function_name
principal = "sns.amazonaws.com"
source_arn = aws_sns_topic.default.arn
}
`,
expected: lambda.Lambda{
Functions: []lambda.Function{
{
Tracing: lambda.Tracing{
Mode: iacTypes.StringTest("Passthrough"),
},
Permissions: []lambda.Permission{
{
Principal: iacTypes.StringTest("sns.amazonaws.com"),
SourceARN: iacTypes.StringTest("default"),
},
},
},
},
},
},
{
name: "defaults (with an orphan)",
terraform: `
resource "aws_lambda_function" "example" {
tracing_config {
}
}
resource "aws_lambda_permission" "example" {
}
`,
expected: lambda.Lambda{
Functions: []lambda.Function{
{
Tracing: lambda.Tracing{},
},
{
Tracing: lambda.Tracing{},
Permissions: []lambda.Permission{
{},
},
},
},
},
},
}
for _, test := range tests {
t.Run(test.name, func(t *testing.T) {
modules := tftestutil.CreateModulesFromSource(t, test.terraform, ".tf")
adapted := Adapt(modules)
testutil.AssertDefsecEqual(t, test.expected, adapted)
})
}
}
func TestLines(t *testing.T) {
src := `
resource "aws_lambda_function" "example" {
filename = "lambda_function_payload.zip"
function_name = "lambda_function_name"
role = aws_iam_role.iam_for_lambda.arn
runtime = "nodejs12.x"
tracing_config {
mode = "Passthrough"
}
}
resource "aws_lambda_permission" "example" {
statement_id = "AllowExecutionFromSNS"
action = "lambda:InvokeFunction"
function_name = aws_lambda_function.example.function_name
principal = "sns.amazonaws.com"
source_arn = "string arn"
}`
modules := tftestutil.CreateModulesFromSource(t, src, ".tf")
adapted := Adapt(modules)
require.Len(t, adapted.Functions, 1)
function := adapted.Functions[0]
assert.Equal(t, 2, function.Metadata.Range().GetStartLine())
assert.Equal(t, 11, function.Metadata.Range().GetEndLine())
assert.Equal(t, 8, function.Tracing.Metadata.Range().GetStartLine())
assert.Equal(t, 10, function.Tracing.Metadata.Range().GetEndLine())
assert.Equal(t, 9, function.Tracing.Mode.GetMetadata().Range().GetStartLine())
assert.Equal(t, 9, function.Tracing.Mode.GetMetadata().Range().GetEndLine())
assert.Equal(t, 13, function.Permissions[0].Metadata.Range().GetStartLine())
assert.Equal(t, 19, function.Permissions[0].Metadata.Range().GetEndLine())
assert.Equal(t, 17, function.Permissions[0].Principal.GetMetadata().Range().GetStartLine())
assert.Equal(t, 17, function.Permissions[0].Principal.GetMetadata().Range().GetEndLine())
assert.Equal(t, 18, function.Permissions[0].SourceARN.GetMetadata().Range().GetStartLine())
assert.Equal(t, 18, function.Permissions[0].SourceARN.GetMetadata().Range().GetEndLine())
}