2022-07-07 17:27:21 +00:00
//go:build detectors
// +build detectors
2022-01-19 06:19:14 +00:00
package splunkobservabilitytoken
import (
"context"
"fmt"
"testing"
"time"
"github.com/kylelemons/godebug/pretty"
2022-02-10 18:54:33 +00:00
"github.com/trufflesecurity/trufflehog/v3/pkg/detectors"
2022-01-19 06:19:14 +00:00
2022-02-10 18:54:33 +00:00
"github.com/trufflesecurity/trufflehog/v3/pkg/common"
"github.com/trufflesecurity/trufflehog/v3/pkg/pb/detectorspb"
2022-01-19 06:19:14 +00:00
)
func TestSplunkObservabilityToken_FromChunk ( t * testing . T ) {
ctx , cancel := context . WithTimeout ( context . Background ( ) , time . Second * 5 )
defer cancel ( )
2022-02-16 03:19:09 +00:00
testSecrets , err := common . GetSecret ( ctx , "trufflehog-testing" , "detectors3" )
2022-01-19 06:19:14 +00:00
if err != nil {
t . Fatalf ( "could not get test secrets from GCP: %s" , err )
}
secret := testSecrets . MustGetField ( "SPLUNK_ACCESS_TOKEN" ) // TODO: rename
inactiveSecret := testSecrets . MustGetField ( "SPLUNK_ACCESS_INACTIVE" )
type args struct {
ctx context . Context
data [ ] byte
verify bool
}
tests := [ ] struct {
name string
s Scanner
args args
want [ ] detectors . Result
wantErr bool
} {
{
name : "found, verified" ,
s : Scanner { } ,
args : args {
ctx : context . Background ( ) ,
data : [ ] byte ( fmt . Sprintf ( "You can find a splunk secret %s within" , secret ) ) ,
verify : true ,
} ,
want : [ ] detectors . Result {
{
DetectorType : detectorspb . DetectorType_SplunkOberservabilityToken ,
Verified : true ,
} ,
} ,
wantErr : false ,
} ,
{
name : "found, unverified" ,
s : Scanner { } ,
args : args {
ctx : context . Background ( ) ,
data : [ ] byte ( fmt . Sprintf ( "You can find a splunk secret %s within but not valid" , inactiveSecret ) ) , // the secret would satisfy the regex but not pass validation
verify : true ,
} ,
want : [ ] detectors . Result {
{
DetectorType : detectorspb . DetectorType_SplunkOberservabilityToken ,
Verified : false ,
} ,
} ,
wantErr : false ,
} ,
{
name : "not found" ,
s : Scanner { } ,
args : args {
ctx : context . Background ( ) ,
data : [ ] byte ( "You cannot find the secret within" ) ,
verify : true ,
} ,
want : nil ,
wantErr : false ,
} ,
}
for _ , tt := range tests {
t . Run ( tt . name , func ( t * testing . T ) {
s := Scanner { }
got , err := s . FromData ( tt . args . ctx , tt . args . verify , tt . args . data )
if ( err != nil ) != tt . wantErr {
t . Errorf ( "SplunkObservabilityToken.FromData() error = %v, wantErr %v" , err , tt . wantErr )
return
}
for i := range got {
if len ( got [ i ] . Raw ) == 0 {
t . Fatalf ( "no raw secret present: \n %+v" , got [ i ] )
}
got [ i ] . Raw = nil
}
if diff := pretty . Compare ( got , tt . want ) ; diff != "" {
t . Errorf ( "SplunkObservabilityToken.FromData() %s diff: (-got +want)\n%s" , tt . name , diff )
}
} )
}
}
func BenchmarkFromData ( benchmark * testing . B ) {
ctx := context . Background ( )
s := Scanner { }
for name , data := range detectors . MustGetBenchmarkData ( ) {
benchmark . Run ( name , func ( b * testing . B ) {
2023-08-23 21:34:10 +00:00
b . ResetTimer ( )
2022-01-19 06:19:14 +00:00
for n := 0 ; n < b . N ; n ++ {
2022-03-01 04:38:13 +00:00
_ , err := s . FromData ( ctx , false , data )
if err != nil {
b . Fatal ( err )
}
2022-01-19 06:19:14 +00:00
}
} )
}
}