driftctl/pkg/middlewares/aws_default_network_acl_rul...

95 lines
2.6 KiB
Go

package middlewares
import (
"github.com/sirupsen/logrus"
"github.com/snyk/driftctl/enumeration/resource"
"github.com/snyk/driftctl/pkg/resource/aws"
)
// Default network acl rules should not be shown as unmanaged as they are present by default
// This middleware ignores default network acl rules from unmanaged resources if they are not managed by IaC
type AwsDefaultNetworkACLRule struct{}
func NewAwsDefaultNetworkACLRule() AwsDefaultNetworkACLRule {
return AwsDefaultNetworkACLRule{}
}
func (m AwsDefaultNetworkACLRule) Execute(remoteResources, resourcesFromState *[]*resource.Resource) error {
newRemoteResources := make([]*resource.Resource, 0)
for _, remoteResource := range *remoteResources {
// Ignore all resources other than ACL rules
if remoteResource.ResourceType() != aws.AwsNetworkACLRuleResourceType {
newRemoteResources = append(newRemoteResources, remoteResource)
continue
}
// Ignore non default ACL rules
if !m.isDefaultACLRule(remoteResource) {
newRemoteResources = append(newRemoteResources, remoteResource)
continue
}
// Check if resource is managed by IaC
existInState := false
for _, stateResource := range *resourcesFromState {
if remoteResource.Equal(stateResource) {
existInState = true
break
}
}
// Include resource if it's managed in IaC
if existInState {
newRemoteResources = append(newRemoteResources, remoteResource)
continue
}
// Else, resource is not added to newRemoteResources slice so it will be ignored
logrus.WithFields(logrus.Fields{
"id": remoteResource.ResourceId(),
"type": remoteResource.ResourceType(),
"network_acl_id": *remoteResource.Attrs.GetString("network_acl_id"),
}).Debug("Ignoring default ACL rule as it is not managed by IaC")
}
*remoteResources = newRemoteResources
return nil
}
func (m *AwsDefaultNetworkACLRule) isDefaultACLRule(res *resource.Resource) bool {
isIPv4 := res.Attrs.GetString("cidr_block") != nil
ruleNumber, ruleNumberOk := (*res.Attrs)["rule_number"].(int64)
if isIPv4 {
if ruleNumberOk && ruleNumber != 32767 {
return false
}
if cidr := res.Attrs.GetString("cidr_block"); cidr != nil && *cidr != "0.0.0.0/0" {
return false
}
}
if !isIPv4 {
if ruleNumberOk && ruleNumber != 32768 {
return false
}
if cidr := res.Attrs.GetString("ipv6_cidr_block"); cidr != nil && *cidr != "::/0" {
return false
}
}
if action := res.Attrs.GetString("rule_action"); action != nil && *action != "deny" {
return false
}
if proto := res.Attrs.GetString("protocol"); proto != nil && *proto != "-1" {
return false
}
return true
}