2021-01-29 11:35:11 +00:00
|
|
|
package middlewares
|
|
|
|
|
|
|
|
import (
|
|
|
|
awssdk "github.com/aws/aws-sdk-go/aws"
|
|
|
|
"github.com/cloudskiff/driftctl/pkg/resource"
|
|
|
|
"github.com/cloudskiff/driftctl/pkg/resource/aws"
|
|
|
|
"github.com/sirupsen/logrus"
|
|
|
|
)
|
|
|
|
|
|
|
|
// Explodes policy found in aws_sqs_queue.policy from state resources to dedicated resources
|
|
|
|
type AwsSqsQueuePolicyExpander struct{}
|
|
|
|
|
|
|
|
func NewAwsSqsQueuePolicyExpander() AwsSqsQueuePolicyExpander {
|
|
|
|
return AwsSqsQueuePolicyExpander{}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m AwsSqsQueuePolicyExpander) Execute(_, resourcesFromState *[]resource.Resource) error {
|
|
|
|
newList := make([]resource.Resource, 0)
|
|
|
|
for _, res := range *resourcesFromState {
|
|
|
|
// Ignore all resources other than sqs_queue
|
|
|
|
if res.TerraformType() != aws.AwsSqsQueueResourceType {
|
|
|
|
newList = append(newList, res)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
queue, _ := res.(*aws.AwsSqsQueue)
|
|
|
|
newList = append(newList, res)
|
|
|
|
|
2021-02-03 20:08:57 +00:00
|
|
|
if queue.Policy == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2021-01-29 11:35:11 +00:00
|
|
|
if m.hasPolicyAttached(queue, resourcesFromState) {
|
|
|
|
queue.Policy = nil
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
err := m.handlePolicy(queue, &newList)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
*resourcesFromState = newList
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (m *AwsSqsQueuePolicyExpander) handlePolicy(queue *aws.AwsSqsQueue, results *[]resource.Resource) error {
|
|
|
|
newPolicy := &aws.AwsSqsQueuePolicy{
|
|
|
|
Id: queue.Id,
|
|
|
|
QueueUrl: awssdk.String(queue.Id),
|
|
|
|
Policy: queue.Policy,
|
|
|
|
}
|
|
|
|
normalizedRes, err := newPolicy.NormalizeForState()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
*results = append(*results, normalizedRes)
|
|
|
|
logrus.WithFields(logrus.Fields{
|
|
|
|
"id": newPolicy.TerraformId(),
|
|
|
|
}).Debug("Created new policy from sqs queue")
|
|
|
|
|
|
|
|
queue.Policy = nil
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return true if the sqs queue has a aws_sqs_queue_policy resource attached to itself.
|
|
|
|
// It is mandatory since it's possible to have a aws_sqs_queue with an inline policy
|
|
|
|
// AND a aws_sqs_queue_policy resource at the same time. At the end, on the AWS console,
|
|
|
|
// the aws_sqs_queue_policy will be used.
|
|
|
|
func (m *AwsSqsQueuePolicyExpander) hasPolicyAttached(queue *aws.AwsSqsQueue, resourcesFromState *[]resource.Resource) bool {
|
|
|
|
for _, res := range *resourcesFromState {
|
|
|
|
if res.TerraformType() == aws.AwsSqsQueuePolicyResourceType &&
|
|
|
|
res.TerraformId() == queue.Id {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|