driftctl/pkg/remote/aws/vpc_security_group_rule_sup...

208 lines
7.3 KiB
Go

package aws
import (
"github.com/cloudskiff/driftctl/pkg"
"github.com/cloudskiff/driftctl/pkg/remote/deserializer"
"github.com/cloudskiff/driftctl/pkg/resource"
resourceaws "github.com/cloudskiff/driftctl/pkg/resource/aws"
awsdeserializer "github.com/cloudskiff/driftctl/pkg/resource/aws/deserializer"
"github.com/cloudskiff/driftctl/pkg/terraform"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/ec2"
"github.com/aws/aws-sdk-go/service/ec2/ec2iface"
"github.com/hashicorp/terraform/flatmap"
"github.com/sirupsen/logrus"
"github.com/zclconf/go-cty/cty"
)
const (
sgRuleTypeIngress = "ingress"
sgRuleTypeEgress = "egress"
)
type VPCSecurityGroupRuleSupplier struct {
reader terraform.ResourceReader
deserializer deserializer.CTYDeserializer
client ec2iface.EC2API
runner *terraform.ParallelResourceReader
}
func NewVPCSecurityGroupRuleSupplier(runner *pkg.ParallelRunner, client ec2iface.EC2API) *VPCSecurityGroupRuleSupplier {
return &VPCSecurityGroupRuleSupplier{terraform.Provider(terraform.AWS), awsdeserializer.NewVPCSecurityGroupRuleDeserializer(), client, terraform.NewParallelResourceReader(runner)}
}
func (s VPCSecurityGroupRuleSupplier) Resources() ([]resource.Resource, error) {
securityGroups, defaultSecurityGroups, err := listSecurityGroups(s.client)
if err != nil {
return nil, err
}
secGroups := make([]*ec2.SecurityGroup, 0, len(securityGroups)+len(defaultSecurityGroups))
secGroups = append(secGroups, securityGroups...)
secGroups = append(secGroups, defaultSecurityGroups...)
securityGroupsRules := s.listSecurityGroupsRules(secGroups)
results := make([]cty.Value, 0)
if len(securityGroupsRules) > 0 {
for _, securityGroupsRule := range securityGroupsRules {
rule := securityGroupsRule
s.runner.Run(func() (cty.Value, error) {
return s.readSecurityGroupRule(rule)
})
}
results, err = s.runner.Wait()
if err != nil {
return nil, err
}
}
return s.deserializer.Deserialize(results)
}
func (s VPCSecurityGroupRuleSupplier) readSecurityGroupRule(securityGroupRule resourceaws.AwsSecurityGroupRule) (cty.Value, error) {
id := securityGroupRule.Id
f := func(v *[]string) []string {
if v != nil {
return *v
}
return []string{}
}
resSgRule, err := s.reader.ReadResource(terraform.ReadResourceArgs{
Ty: resourceaws.AwsSecurityGroupRuleResourceType,
ID: id,
Attributes: flatmap.Flatten(map[string]interface{}{
"type": aws.StringValue(securityGroupRule.Type),
"security_group_id": aws.StringValue(securityGroupRule.SecurityGroupId),
"protocol": aws.StringValue(securityGroupRule.Protocol),
"from_port": aws.IntValue(securityGroupRule.FromPort),
"to_port": aws.IntValue(securityGroupRule.ToPort),
"self": aws.BoolValue(securityGroupRule.Self),
"source_security_group_id": aws.StringValue(securityGroupRule.SourceSecurityGroupId),
"cidr_blocks": f(securityGroupRule.CidrBlocks),
"ipv6_cidr_blocks": f(securityGroupRule.Ipv6CidrBlocks),
"prefix_list_ids": f(securityGroupRule.PrefixListIds),
}),
})
if err != nil {
logrus.Warnf("Error reading rule from security group %s: %+v", id, err)
return cty.NilVal, err
}
return *resSgRule, nil
}
func (s VPCSecurityGroupRuleSupplier) listSecurityGroupsRules(securityGroups []*ec2.SecurityGroup) []resourceaws.AwsSecurityGroupRule {
var securityGroupsRules []resourceaws.AwsSecurityGroupRule
for _, sg := range securityGroups {
for _, rule := range sg.IpPermissions {
securityGroupsRules = append(securityGroupsRules, s.addSecurityGroupRule(sgRuleTypeIngress, rule, sg)...)
}
for _, rule := range sg.IpPermissionsEgress {
securityGroupsRules = append(securityGroupsRules, s.addSecurityGroupRule(sgRuleTypeEgress, rule, sg)...)
}
}
return securityGroupsRules
}
// addSecurityGroupRule will iterate through each "Source" as per Aws definition and create a
// rule with custom attributes
func (s VPCSecurityGroupRuleSupplier) addSecurityGroupRule(ruleType string, rule *ec2.IpPermission, sg *ec2.SecurityGroup) []resourceaws.AwsSecurityGroupRule {
var rules []resourceaws.AwsSecurityGroupRule
for _, groupPair := range rule.UserIdGroupPairs {
r := resourceaws.AwsSecurityGroupRule{
Type: aws.String(ruleType),
SecurityGroupId: sg.GroupId,
Protocol: rule.IpProtocol,
FromPort: aws.Int(int(aws.Int64Value(rule.FromPort))),
ToPort: aws.Int(int(aws.Int64Value(rule.ToPort))),
}
if aws.StringValue(groupPair.GroupId) == aws.StringValue(sg.GroupId) {
r.Self = aws.Bool(true)
} else {
r.SourceSecurityGroupId = groupPair.GroupId
}
r.Id = r.CreateIdHash()
rules = append(rules, r)
}
for _, ipRange := range rule.IpRanges {
r := resourceaws.AwsSecurityGroupRule{
Type: aws.String(ruleType),
SecurityGroupId: sg.GroupId,
Protocol: rule.IpProtocol,
FromPort: aws.Int(int(aws.Int64Value(rule.FromPort))),
ToPort: aws.Int(int(aws.Int64Value(rule.ToPort))),
CidrBlocks: &[]string{aws.StringValue(ipRange.CidrIp)},
}
r.Id = r.CreateIdHash()
rules = append(rules, r)
}
for _, ipRange := range rule.Ipv6Ranges {
r := resourceaws.AwsSecurityGroupRule{
Type: aws.String(ruleType),
SecurityGroupId: sg.GroupId,
Protocol: rule.IpProtocol,
FromPort: aws.Int(int(aws.Int64Value(rule.FromPort))),
ToPort: aws.Int(int(aws.Int64Value(rule.ToPort))),
Ipv6CidrBlocks: &[]string{aws.StringValue(ipRange.CidrIpv6)},
}
r.Id = r.CreateIdHash()
rules = append(rules, r)
}
for _, listId := range rule.PrefixListIds {
r := resourceaws.AwsSecurityGroupRule{
Type: aws.String(ruleType),
SecurityGroupId: sg.GroupId,
Protocol: rule.IpProtocol,
FromPort: aws.Int(int(aws.Int64Value(rule.FromPort))),
ToPort: aws.Int(int(aws.Int64Value(rule.ToPort))),
PrefixListIds: &[]string{aws.StringValue(listId.PrefixListId)},
}
r.Id = r.CreateIdHash()
rules = append(rules, r)
}
// Filter default rules for default security group
if sg.GroupName != nil && *sg.GroupName == "default" {
results := make([]resourceaws.AwsSecurityGroupRule, 0, len(rules))
for _, r := range rules {
if s.isDefaultIngress(&r) || s.isDefaultEgress(&r) {
continue
}
results = append(results, r)
}
return results
}
return rules
}
func (s VPCSecurityGroupRuleSupplier) isDefaultIngress(rule *resourceaws.AwsSecurityGroupRule) bool {
return rule.Type != nil &&
*rule.Type == sgRuleTypeIngress &&
rule.FromPort != nil &&
*rule.FromPort == 0 &&
rule.ToPort != nil &&
*rule.ToPort == 0 &&
rule.Protocol != nil &&
*rule.Protocol == "-1" &&
rule.CidrBlocks == nil &&
rule.Ipv6CidrBlocks == nil &&
rule.PrefixListIds == nil &&
rule.SourceSecurityGroupId == nil &&
rule.Self != nil &&
*rule.Self
}
func (s VPCSecurityGroupRuleSupplier) isDefaultEgress(rule *resourceaws.AwsSecurityGroupRule) bool {
return rule.Type != nil &&
*rule.Type == sgRuleTypeEgress &&
rule.FromPort != nil &&
*rule.FromPort == 0 &&
rule.ToPort != nil &&
*rule.ToPort == 0 &&
rule.Protocol != nil &&
*rule.Protocol == "-1" &&
rule.Ipv6CidrBlocks == nil &&
rule.PrefixListIds == nil &&
rule.SourceSecurityGroupId == nil &&
rule.CidrBlocks != nil &&
len(*rule.CidrBlocks) == 1 &&
(*rule.CidrBlocks)[0] == "0.0.0.0/0"
}