driftctl/pkg/middlewares/aws_bucket_policy_expander.go

98 lines
2.7 KiB
Go
Raw Normal View History

2021-01-27 22:47:39 +00:00
package middlewares
import (
2021-03-29 16:10:50 +00:00
"github.com/sirupsen/logrus"
2021-01-27 22:47:39 +00:00
"github.com/cloudskiff/driftctl/pkg/resource"
"github.com/cloudskiff/driftctl/pkg/resource/aws"
)
// Explodes policy found in aws_s3_bucket.policy from state resources to dedicated resources
2021-03-29 16:10:50 +00:00
type AwsBucketPolicyExpander struct {
resourceFactory resource.ResourceFactory
}
2021-01-27 22:47:39 +00:00
2021-03-29 16:10:50 +00:00
func NewAwsBucketPolicyExpander(resourceFactory resource.ResourceFactory) AwsBucketPolicyExpander {
return AwsBucketPolicyExpander{
resourceFactory: resourceFactory,
}
2021-01-27 22:47:39 +00:00
}
func (m AwsBucketPolicyExpander) Execute(_, resourcesFromState *[]resource.Resource) error {
newList := make([]resource.Resource, 0)
for _, res := range *resourcesFromState {
// Ignore all resources other than s3_bucket
if res.TerraformType() != aws.AwsS3BucketResourceType {
newList = append(newList, res)
continue
}
2021-04-29 14:36:05 +00:00
bucket, _ := res.(*resource.AbstractResource)
2021-01-27 22:47:39 +00:00
newList = append(newList, res)
2021-04-29 14:36:05 +00:00
if hasPolicyAttached(res.TerraformId(), resourcesFromState) {
bucket.Attrs.SafeDelete([]string{"policy"})
2021-01-27 22:47:39 +00:00
continue
}
err := m.handlePolicy(bucket, &newList)
if err != nil {
return err
}
}
*resourcesFromState = newList
return nil
}
2021-04-29 14:36:05 +00:00
func (m *AwsBucketPolicyExpander) handlePolicy(bucket *resource.AbstractResource, results *[]resource.Resource) error {
policyAttr, exist := bucket.Attrs.Get("policy")
if !exist || policyAttr == nil || policyAttr == "" {
2021-01-27 22:47:39 +00:00
return nil
}
2021-04-29 14:36:05 +00:00
policy := policyAttr.(string)
2021-01-27 22:47:39 +00:00
2021-04-29 14:36:05 +00:00
bucketAttr, _ := bucket.Attrs.Get("bucket")
bucketName := bucketAttr.(string)
2021-03-29 16:10:50 +00:00
data := map[string]interface{}{
2021-04-29 14:36:05 +00:00
"id": bucket.TerraformId(),
"bucket": (*bucket.Attrs)["bucket"],
"policy": (*bucket.Attrs)["policy"],
2021-03-29 16:10:50 +00:00
}
ctyVal, err := m.resourceFactory.CreateResource(data, "aws_s3_bucket_policy")
if err != nil {
return err
}
2021-01-27 22:47:39 +00:00
newPolicy := &aws.AwsS3BucketPolicy{
2021-04-29 14:36:05 +00:00
Id: bucket.TerraformId(),
Bucket: &bucketName,
Policy: &policy,
2021-03-29 16:10:50 +00:00
CtyVal: ctyVal,
2021-01-27 22:47:39 +00:00
}
normalizedRes, err := newPolicy.NormalizeForState()
if err != nil {
return err
}
*results = append(*results, normalizedRes)
logrus.WithFields(logrus.Fields{
"id": newPolicy.TerraformId(),
}).Debug("Created new policy from bucket")
2021-04-29 14:36:05 +00:00
bucket.Attrs.SafeDelete([]string{"policy"})
2021-01-27 22:47:39 +00:00
return nil
}
// Return true if the bucket has a aws_bucket_policy resource attached to itself.
// It is mandatory since it's possible to have a aws_bucket with an inline policy
// AND a aws_bucket_policy resource at the same time. At the end, on the AWS console,
// the aws_bucket_policy will be used.
2021-04-29 14:36:05 +00:00
func hasPolicyAttached(bucket string, resourcesFromState *[]resource.Resource) bool {
2021-01-27 22:47:39 +00:00
for _, res := range *resourcesFromState {
if res.TerraformType() == aws.AwsS3BucketPolicyResourceType &&
2021-04-29 14:36:05 +00:00
res.TerraformId() == bucket {
2021-01-27 22:47:39 +00:00
return true
}
}
return false
}