providers/aws/s3.go (85 lines of code) (raw):

// Copyright 2018 The Terraformer Authors. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. package aws import ( "context" "fmt" "log" "github.com/GoogleCloudPlatform/terraformer/terraformutils" "github.com/aws/aws-sdk-go-v2/aws" "github.com/aws/aws-sdk-go-v2/service/s3" ) var S3AllowEmptyValues = []string{"tags."} var S3AdditionalFields = map[string]interface{}{} type S3Generator struct { AWSService } // createResources iterate on all buckets // for each bucket we check region and choose only bucket from set region // for each bucket try get bucket policy, if policy exist create additional NewTerraformResource for policy func (g *S3Generator) createResources(config aws.Config, buckets *s3.ListBucketsOutput, region string) []terraformutils.Resource { var resources []terraformutils.Resource svc := s3.NewFromConfig(config) for _, bucket := range buckets.Buckets { resourceName := StringValue(bucket.Name) location, err := svc.GetBucketLocation(context.TODO(), &s3.GetBucketLocationInput{Bucket: bucket.Name}) if err != nil { log.Println(err) continue } // check if bucket in region constraintString := string(location.LocationConstraint) if constraintString == region || (constraintString == "" && region == "us-east-1") { attributes := map[string]string{ "force_destroy": "false", "acl": "private", } // try get policy var policy *s3.GetBucketPolicyOutput policy, err = svc.GetBucketPolicy(context.TODO(), &s3.GetBucketPolicyInput{ Bucket: bucket.Name, }) if err == nil && policy.Policy != nil { attributes["policy"] = *policy.Policy resources = append(resources, terraformutils.NewResource( resourceName, resourceName, "aws_s3_bucket_policy", "aws", nil, S3AllowEmptyValues, S3AdditionalFields)) } resources = append(resources, terraformutils.NewResource( resourceName, resourceName, "aws_s3_bucket", "aws", attributes, S3AllowEmptyValues, S3AdditionalFields)) } } return resources } // Generate TerraformResources from AWS API, // Need bucket name as ID for terraform resource func (g *S3Generator) InitResources() error { config, e := g.generateConfig() if e != nil { return e } svc := s3.NewFromConfig(config) buckets, err := svc.ListBuckets(context.TODO(), nil) if err != nil { return err } g.Resources = g.createResources(config, buckets, g.GetArgs()["region"].(string)) return nil } // PostGenerateHook for add bucket policy json as heredoc // support only bucket with policy func (g *S3Generator) PostConvertHook() error { for i, resource := range g.Resources { if resource.InstanceInfo.Type == "aws_s3_bucket" { if val, ok := g.Resources[i].Item["acl"]; ok && val == "private" { delete(g.Resources[i].Item, "acl") } if val, ok := g.Resources[i].Item["policy"]; ok { g.Resources[i].Item["policy"] = fmt.Sprintf(`<<POLICY %s POLICY`, g.escapeAwsInterpolation(val.(string))) } } } return nil }