driftctl/pkg/middlewares/aws_bucket_policy_expander.go

82 lines
2.3 KiB
Go

package middlewares
import (
"github.com/sirupsen/logrus"
"github.com/snyk/driftctl/enumeration/resource"
"github.com/snyk/driftctl/enumeration/resource/aws"
)
// Explodes policy found in aws_s3_bucket.policy from state resources to dedicated resources
type AwsBucketPolicyExpander struct {
resourceFactory resource.ResourceFactory
}
func NewAwsBucketPolicyExpander(resourceFactory resource.ResourceFactory) AwsBucketPolicyExpander {
return AwsBucketPolicyExpander{
resourceFactory: resourceFactory,
}
}
func (m AwsBucketPolicyExpander) Execute(_, resourcesFromState *[]*resource.Resource) error {
newList := make([]*resource.Resource, 0)
for _, res := range *resourcesFromState {
// Ignore all resources other than s3_bucket
if res.ResourceType() != aws.AwsS3BucketResourceType {
newList = append(newList, res)
continue
}
newList = append(newList, res)
if hasPolicyAttached(res.ResourceId(), resourcesFromState) {
res.Attrs.SafeDelete([]string{"policy"})
continue
}
err := m.handlePolicy(res, &newList)
if err != nil {
return err
}
}
*resourcesFromState = newList
return nil
}
func (m *AwsBucketPolicyExpander) handlePolicy(bucket *resource.Resource, results *[]*resource.Resource) error {
policyAttr, exist := bucket.Attrs.Get("policy")
if !exist || policyAttr == nil || policyAttr == "" {
return nil
}
data := map[string]interface{}{
"id": bucket.ResourceId(),
"bucket": (*bucket.Attrs)["bucket"],
"policy": (*bucket.Attrs)["policy"],
}
newPolicy := m.resourceFactory.CreateAbstractResource(aws.AwsS3BucketPolicyResourceType, bucket.ResourceId(), data)
*results = append(*results, newPolicy)
logrus.WithFields(logrus.Fields{
"id": newPolicy.ResourceId(),
}).Debug("Created new policy from bucket")
bucket.Attrs.SafeDelete([]string{"policy"})
return nil
}
// Return true if the bucket has a aws_bucket_policy resource attached to itself.
// It is mandatory since it's possible to have a aws_bucket with an inline policy
// AND a aws_bucket_policy resource at the same time. At the end, on the AWS console,
// the aws_bucket_policy will be used.
func hasPolicyAttached(bucket string, resourcesFromState *[]*resource.Resource) bool {
for _, res := range *resourcesFromState {
if res.ResourceType() == aws.AwsS3BucketPolicyResourceType &&
res.ResourceId() == bucket {
return true
}
}
return false
}