mirror of
https://github.com/aquasecurity/trivy.git
synced 2025-12-21 14:50:53 -08:00
256 lines
5.4 KiB
Go
256 lines
5.4 KiB
Go
package rego_test
|
|
|
|
import (
|
|
"bytes"
|
|
"embed"
|
|
"fmt"
|
|
"log/slog"
|
|
"strings"
|
|
"testing"
|
|
"testing/fstest"
|
|
|
|
"github.com/open-policy-agent/opa/v1/ast"
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
|
|
checks "github.com/aquasecurity/trivy-checks"
|
|
"github.com/aquasecurity/trivy/pkg/iac/rego"
|
|
"github.com/aquasecurity/trivy/pkg/log"
|
|
)
|
|
|
|
//go:embed all:testdata/policies
|
|
var testEmbedFS embed.FS
|
|
|
|
//go:embed testdata/embedded
|
|
var embeddedChecksFS embed.FS
|
|
|
|
func Test_RegoScanning_WithSomeInvalidPolicies(t *testing.T) {
|
|
t.Run("allow no errors", func(t *testing.T) {
|
|
var debugBuf bytes.Buffer
|
|
slog.SetDefault(log.New(log.NewHandler(&debugBuf, nil)))
|
|
scanner := rego.NewScanner(
|
|
rego.WithRegoErrorLimits(0),
|
|
rego.WithPolicyDirs("."),
|
|
)
|
|
|
|
err := scanner.LoadPolicies(testEmbedFS)
|
|
require.ErrorContains(t, err, `want (one of): ["Cmd" "EndLine" "Flags" "JSON" "Original" "Path" "Stage" "StartLine" "SubCmd" "Value"]`)
|
|
assert.Contains(t, debugBuf.String(), "Error(s) occurred while loading checks")
|
|
})
|
|
|
|
t.Run("allow up to max 1 error", func(t *testing.T) {
|
|
var debugBuf bytes.Buffer
|
|
slog.SetDefault(log.New(log.NewHandler(&debugBuf, nil)))
|
|
scanner := rego.NewScanner(
|
|
rego.WithRegoErrorLimits(1),
|
|
rego.WithPolicyDirs("."),
|
|
)
|
|
|
|
err := scanner.LoadPolicies(testEmbedFS)
|
|
require.NoError(t, err)
|
|
|
|
assert.Contains(t, debugBuf.String(), "Error occurred while parsing\tfile_path=\"testdata/policies/invalid.rego\" err=\"testdata/policies/invalid.rego:7")
|
|
})
|
|
|
|
t.Run("schema does not exist", func(t *testing.T) {
|
|
check := `# METADATA
|
|
# schemas:
|
|
# - input: schema["fooschema"]
|
|
package mypackage
|
|
|
|
deny {
|
|
input.evil == "foo bar"
|
|
}`
|
|
scanner := rego.NewScanner(
|
|
rego.WithPolicyDirs("."),
|
|
rego.WithPolicyReader(strings.NewReader(check)),
|
|
)
|
|
|
|
err := scanner.LoadPolicies(fstest.MapFS{})
|
|
assert.ErrorContains(t, err, "could not find schema \"fooschema\"")
|
|
})
|
|
|
|
t.Run("schema is invalid", func(t *testing.T) {
|
|
check := `# METADATA
|
|
# schemas:
|
|
# - input: schema["fooschema"]
|
|
package mypackage
|
|
|
|
deny {
|
|
input.evil == "foo bar"
|
|
}`
|
|
scanner := rego.NewScanner(
|
|
rego.WithPolicyDirs("."),
|
|
rego.WithPolicyReader(strings.NewReader(check)),
|
|
)
|
|
|
|
fsys := fstest.MapFS{
|
|
"schemas/fooschema.json": &fstest.MapFile{
|
|
Data: []byte("bad json"),
|
|
},
|
|
}
|
|
|
|
err := scanner.LoadPolicies(fsys)
|
|
assert.ErrorContains(t, err, "could not parse schema \"fooschema\"")
|
|
})
|
|
|
|
t.Run("schema is not specified", func(t *testing.T) {
|
|
check := `package mypackage
|
|
|
|
deny {
|
|
input.evil == "foo bar"
|
|
}`
|
|
scanner := rego.NewScanner(
|
|
rego.WithPolicyDirs("."),
|
|
rego.WithPolicyReader(strings.NewReader(check)),
|
|
)
|
|
err := scanner.LoadPolicies(fstest.MapFS{})
|
|
require.NoError(t, err)
|
|
})
|
|
}
|
|
|
|
func Test_FallbackToEmbedded(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
files map[string]*fstest.MapFile
|
|
expectedErr string
|
|
}{
|
|
{
|
|
name: "match by namespace",
|
|
files: map[string]*fstest.MapFile{
|
|
"policies/my-check2.rego": {
|
|
Data: []byte(`# METADATA
|
|
# schemas:
|
|
# - input: schema["fooschema"]
|
|
|
|
package builtin.test
|
|
|
|
deny {
|
|
input.evil == "foo bar"
|
|
}`,
|
|
),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "match by check ID",
|
|
files: map[string]*fstest.MapFile{
|
|
"policies/my-check2.rego": {
|
|
Data: []byte(`# METADATA
|
|
# schemas:
|
|
# - input: schema["fooschema"]
|
|
# custom:
|
|
# avd_id: test-001
|
|
package builtin.test2
|
|
|
|
deny {
|
|
input.evil == "foo bar"
|
|
}`,
|
|
),
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "bad embedded check",
|
|
files: map[string]*fstest.MapFile{
|
|
"policies/my-check2.rego": {
|
|
Data: []byte(`# METADATA
|
|
# schemas:
|
|
# - input: schema["fooschema"]
|
|
package builtin.bad.test
|
|
|
|
deny {
|
|
input.evil == "foo bar"
|
|
}`,
|
|
),
|
|
},
|
|
},
|
|
expectedErr: "testdata/embedded/bad-check.rego:8: rego_type_error: undefined ref",
|
|
},
|
|
{
|
|
name: "with non existent function",
|
|
files: map[string]*fstest.MapFile{
|
|
"policies/my-check2.rego": {
|
|
Data: []byte(`# METADATA
|
|
# schemas:
|
|
# - input: schema["fooschema"]
|
|
package builtin.test
|
|
|
|
deny {
|
|
input.foo == fn.is_foo("foo")
|
|
}`,
|
|
),
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
scanner := rego.NewScanner(
|
|
rego.WithRegoErrorLimits(0),
|
|
rego.WithEmbeddedPolicies(false),
|
|
rego.WithPolicyDirs("."),
|
|
)
|
|
|
|
tt.files["schemas/fooschema.json"] = &fstest.MapFile{
|
|
Data: []byte(`{
|
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
|
"type": "object",
|
|
"properties": {
|
|
"foo": {
|
|
"type": "string"
|
|
}
|
|
}
|
|
}`),
|
|
}
|
|
|
|
checks.EmbeddedPolicyFileSystem = embeddedChecksFS
|
|
err := scanner.LoadPolicies(fstest.MapFS(tt.files))
|
|
|
|
if tt.expectedErr != "" {
|
|
assert.ErrorContains(t, err, tt.expectedErr)
|
|
} else {
|
|
require.NoError(t, err)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func Test_FallbackErrorWithoutLocation(t *testing.T) {
|
|
fsys := fstest.MapFS{
|
|
"schemas/fooschema.json": {
|
|
Data: []byte(`{
|
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
|
"type": "object",
|
|
"properties": {
|
|
"foo": {
|
|
"type": "string"
|
|
}
|
|
}
|
|
}`),
|
|
},
|
|
}
|
|
|
|
for i := 0; i < ast.CompileErrorLimitDefault+1; i++ {
|
|
src := `# METADATA
|
|
# schemas:
|
|
# - input: schema["fooschema"]
|
|
package builtin.test%d
|
|
|
|
deny {
|
|
input.evil == "foo bar"
|
|
}`
|
|
fsys[fmt.Sprintf("policies/my-check%d.rego", i)] = &fstest.MapFile{
|
|
Data: []byte(fmt.Sprintf(src, i)),
|
|
}
|
|
}
|
|
|
|
scanner := rego.NewScanner(
|
|
rego.WithEmbeddedPolicies(false),
|
|
rego.WithPolicyDirs("."),
|
|
)
|
|
err := scanner.LoadPolicies(fsys)
|
|
require.Error(t, err)
|
|
}
|