82 lines
2.3 KiB
Go
82 lines
2.3 KiB
Go
package middlewares
|
|
|
|
import (
|
|
"github.com/sirupsen/logrus"
|
|
|
|
"github.com/snyk/driftctl/pkg/resource"
|
|
"github.com/snyk/driftctl/pkg/resource/aws"
|
|
)
|
|
|
|
// Explodes policy found in aws_s3_bucket.policy from state resources to dedicated resources
|
|
type AwsBucketPolicyExpander struct {
|
|
resourceFactory resource.ResourceFactory
|
|
}
|
|
|
|
func NewAwsBucketPolicyExpander(resourceFactory resource.ResourceFactory) AwsBucketPolicyExpander {
|
|
return AwsBucketPolicyExpander{
|
|
resourceFactory: resourceFactory,
|
|
}
|
|
}
|
|
|
|
func (m AwsBucketPolicyExpander) Execute(_, resourcesFromState *[]*resource.Resource) error {
|
|
newList := make([]*resource.Resource, 0)
|
|
for _, res := range *resourcesFromState {
|
|
// Ignore all resources other than s3_bucket
|
|
if res.ResourceType() != aws.AwsS3BucketResourceType {
|
|
newList = append(newList, res)
|
|
continue
|
|
}
|
|
|
|
newList = append(newList, res)
|
|
|
|
if hasPolicyAttached(res.ResourceId(), resourcesFromState) {
|
|
res.Attrs.SafeDelete([]string{"policy"})
|
|
continue
|
|
}
|
|
|
|
err := m.handlePolicy(res, &newList)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
*resourcesFromState = newList
|
|
return nil
|
|
}
|
|
|
|
func (m *AwsBucketPolicyExpander) handlePolicy(bucket *resource.Resource, results *[]*resource.Resource) error {
|
|
policyAttr, exist := bucket.Attrs.Get("policy")
|
|
if !exist || policyAttr == nil || policyAttr == "" {
|
|
return nil
|
|
}
|
|
|
|
data := map[string]interface{}{
|
|
"id": bucket.ResourceId(),
|
|
"bucket": (*bucket.Attrs)["bucket"],
|
|
"policy": (*bucket.Attrs)["policy"],
|
|
}
|
|
|
|
newPolicy := m.resourceFactory.CreateAbstractResource(aws.AwsS3BucketPolicyResourceType, bucket.ResourceId(), data)
|
|
|
|
*results = append(*results, newPolicy)
|
|
logrus.WithFields(logrus.Fields{
|
|
"id": newPolicy.ResourceId(),
|
|
}).Debug("Created new policy from bucket")
|
|
|
|
bucket.Attrs.SafeDelete([]string{"policy"})
|
|
return nil
|
|
}
|
|
|
|
// Return true if the bucket has a aws_bucket_policy resource attached to itself.
|
|
// It is mandatory since it's possible to have a aws_bucket with an inline policy
|
|
// AND a aws_bucket_policy resource at the same time. At the end, on the AWS console,
|
|
// the aws_bucket_policy will be used.
|
|
func hasPolicyAttached(bucket string, resourcesFromState *[]*resource.Resource) bool {
|
|
for _, res := range *resourcesFromState {
|
|
if res.ResourceType() == aws.AwsS3BucketPolicyResourceType &&
|
|
res.ResourceId() == bucket {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|