driftctl/pkg/driftctl.go

116 lines
3.2 KiB
Go
Raw Normal View History

package pkg
import (
"fmt"
2020-12-16 12:02:02 +00:00
"github.com/cloudskiff/driftctl/pkg/alerter"
"github.com/cloudskiff/driftctl/pkg/analyser"
"github.com/cloudskiff/driftctl/pkg/filter"
"github.com/cloudskiff/driftctl/pkg/middlewares"
"github.com/cloudskiff/driftctl/pkg/resource"
"github.com/jmespath/go-jmespath"
"github.com/sirupsen/logrus"
)
type DriftCTL struct {
remoteSupplier resource.Supplier
iacSupplier resource.Supplier
analyzer analyser.Analyzer
filter *jmespath.JMESPath
}
2020-12-16 12:02:02 +00:00
func NewDriftCTL(remoteSupplier resource.Supplier, iacSupplier resource.Supplier, filter *jmespath.JMESPath, alerter *alerter.Alerter) *DriftCTL {
return &DriftCTL{remoteSupplier, iacSupplier, analyser.NewAnalyzer(alerter), filter}
}
func (d DriftCTL) Run() *analyser.Analysis {
remoteResources, resourcesFromState, err := d.scan()
if err != nil {
logrus.Errorf("Unable to scan resources: %+v", err)
return nil
}
middleware := middlewares.NewChain(
middlewares.NewRoute53DefaultZoneRecordSanitizer(),
middlewares.NewS3BucketAcl(),
middlewares.NewAwsInstanceBlockDeviceResourceMapper(),
middlewares.NewVPCDefaultSecurityGroupSanitizer(),
middlewares.NewVPCSecurityGroupRuleSanitizer(),
middlewares.NewIamPolicyAttachmentSanitizer(),
middlewares.AwsInstanceEIP{},
2021-01-22 10:32:56 +00:00
middlewares.NewAwsDefaultInternetGatewayRoute(),
2021-01-20 21:54:41 +00:00
middlewares.NewAwsDefaultInternetGateway(),
2020-12-15 10:07:03 +00:00
middlewares.NewAwsDefaultVPC(),
middlewares.NewAwsDefaultSubnet(),
middlewares.NewAwsRouteTableExpander(),
middlewares.NewAwsDefaultRouteTable(),
middlewares.NewAwsDefaultRoute(),
2021-01-20 16:28:56 +00:00
middlewares.NewAwsNatGatewayEipAssoc(),
2021-01-27 22:47:39 +00:00
middlewares.NewAwsBucketPolicyExpander(),
)
logrus.Debug("Ready to run middlewares")
err = middleware.Execute(&remoteResources, &resourcesFromState)
if err != nil {
logrus.Errorf("Unable to run middlewares: %+v", err)
return nil
}
if d.filter != nil {
engine := filter.NewFilterEngine(d.filter)
remoteResources, err = engine.Run(remoteResources)
if err != nil {
logrus.Error(err)
return nil
}
resourcesFromState, err = engine.Run(resourcesFromState)
if err != nil {
logrus.Error(err)
return nil
}
}
logrus.Debug("Checking for driftignore")
driftIgnore := filter.NewDriftIgnore()
2020-12-18 14:28:46 +00:00
analysis, err := d.analyzer.Analyze(remoteResources, resourcesFromState, driftIgnore)
2020-12-16 12:02:02 +00:00
if err != nil {
logrus.Errorf("Unable to analyse resources: %+v", err)
return nil
}
return &analysis
}
func (d DriftCTL) Stop() {
stoppableSupplier, ok := d.remoteSupplier.(resource.StoppableSupplier)
if ok {
logrus.WithFields(logrus.Fields{
"supplier": fmt.Sprintf("%T", d.remoteSupplier),
}).Debug("Stopping remote supplier")
stoppableSupplier.Stop()
}
stoppableSupplier, ok = d.iacSupplier.(resource.StoppableSupplier)
if ok {
stoppableSupplier.Stop()
}
}
func (d DriftCTL) scan() (remoteResources []resource.Resource, resourcesFromState []resource.Resource, err error) {
2021-01-15 11:44:13 +00:00
logrus.Info("Start reading IaC")
resourcesFromState, err = d.iacSupplier.Resources()
if err != nil {
return nil, nil, err
}
logrus.Info("Start scanning cloud provider")
remoteResources, err = d.remoteSupplier.Resources()
if err != nil {
return nil, nil, err
}
return remoteResources, resourcesFromState, err
}