package aws import ( "github.com/cloudskiff/driftctl/pkg/remote/aws/repository" remoteerror "github.com/cloudskiff/driftctl/pkg/remote/error" "github.com/cloudskiff/driftctl/pkg/resource" resourceaws "github.com/cloudskiff/driftctl/pkg/resource/aws" "github.com/cloudskiff/driftctl/pkg/terraform" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ec2" "github.com/sirupsen/logrus" "github.com/zclconf/go-cty/cty" ) type VPCSecurityGroupSupplier struct { reader terraform.ResourceReader deserializer *resource.Deserializer repository repository.EC2Repository defaultSecurityGroupRunner *terraform.ParallelResourceReader securityGroupRunner *terraform.ParallelResourceReader } func NewVPCSecurityGroupSupplier(provider *AWSTerraformProvider, deserializer *resource.Deserializer, repository repository.EC2Repository) *VPCSecurityGroupSupplier { return &VPCSecurityGroupSupplier{ provider, deserializer, repository, terraform.NewParallelResourceReader(provider.Runner().SubRunner()), terraform.NewParallelResourceReader(provider.Runner().SubRunner()), } } func (s *VPCSecurityGroupSupplier) Resources() ([]resource.Resource, error) { securityGroups, defaultSecurityGroups, err := s.repository.ListAllSecurityGroups() if err != nil { return nil, remoteerror.NewResourceEnumerationError(err, resourceaws.AwsSecurityGroupResourceType) } for _, item := range securityGroups { res := *item s.securityGroupRunner.Run(func() (cty.Value, error) { return s.readSecurityGroup(res) }) } securityGroupResources, err := s.securityGroupRunner.Wait() if err != nil { return nil, err } for _, item := range defaultSecurityGroups { res := *item s.defaultSecurityGroupRunner.Run(func() (cty.Value, error) { return s.readSecurityGroup(res) }) } defaultSecurityGroupResources, err := s.defaultSecurityGroupRunner.Wait() if err != nil { return nil, err } // Deserialize deserializedDefaultSecurityGroups, err := s.deserializer.Deserialize(resourceaws.AwsDefaultSecurityGroupResourceType, defaultSecurityGroupResources) if err != nil { return nil, err } deserializedSecurityGroups, err := s.deserializer.Deserialize(resourceaws.AwsSecurityGroupResourceType, securityGroupResources) if err != nil { return nil, err } resources := make([]resource.Resource, 0, len(securityGroupResources)+len(defaultSecurityGroupResources)) resources = append(resources, deserializedDefaultSecurityGroups...) resources = append(resources, deserializedSecurityGroups...) return resources, nil } func (s *VPCSecurityGroupSupplier) readSecurityGroup(securityGroup ec2.SecurityGroup) (cty.Value, error) { var Ty resource.ResourceType = resourceaws.AwsSecurityGroupResourceType if isDefaultSecurityGroup(securityGroup) { Ty = resourceaws.AwsDefaultSecurityGroupResourceType } val, err := s.reader.ReadResource(terraform.ReadResourceArgs{ ID: aws.StringValue(securityGroup.GroupId), Ty: Ty, }) if err != nil { logrus.Error(err) return cty.NilVal, err } return *val, nil } // Return true if the security group is considered as a default one func isDefaultSecurityGroup(securityGroup ec2.SecurityGroup) bool { return securityGroup.GroupName != nil && *securityGroup.GroupName == "default" }