providers/panos/firewall_policy.go (81 lines of code) (raw):
// Copyright 2018 The Terraformer Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package panos
import (
"encoding/base64"
"strconv"
"github.com/GoogleCloudPlatform/terraformer/terraformutils"
"github.com/PaloAltoNetworks/pango"
"github.com/PaloAltoNetworks/pango/util"
)
type FirewallPolicyGenerator struct {
PanosService
}
func (g *FirewallPolicyGenerator) createResourcesFromList(o getGeneric, terraformResourceName string) (resources []terraformutils.Resource) {
l, err := o.i.(getListWithOneArg).GetList(o.params[0])
if err != nil || len(l) == 0 {
return []terraformutils.Resource{}
}
var positionReference string
id := g.vsys + ":" + strconv.Itoa(util.MoveTop) + "::"
for k, r := range l {
if k > 0 {
id = g.vsys + ":" + strconv.Itoa(util.MoveAfter) + ":" + positionReference + ":"
}
id += base64.StdEncoding.EncodeToString([]byte(r))
positionReference = r
resources = append(resources, terraformutils.NewSimpleResource(
id,
normalizeResourceName(r),
terraformResourceName,
"panos",
[]string{},
))
}
return resources
}
func (g *FirewallPolicyGenerator) createNATRuleGroupResources() []terraformutils.Resource {
return g.createResourcesFromList(getGeneric{g.client.(*pango.Firewall).Policies.Nat, []string{g.vsys}}, "panos_nat_rule_group")
}
func (g *FirewallPolicyGenerator) createPBFRuleGroupResources() []terraformutils.Resource {
return g.createResourcesFromList(getGeneric{g.client.(*pango.Firewall).Policies.PolicyBasedForwarding, []string{g.vsys}}, "panos_pbf_rule_group")
}
func (g *FirewallPolicyGenerator) createSecurityRuleGroupResources() []terraformutils.Resource {
return g.createResourcesFromList(getGeneric{g.client.(*pango.Firewall).Policies.Security, []string{g.vsys}}, "panos_security_rule_group")
}
func (g *FirewallPolicyGenerator) InitResources() error {
if err := g.Initialize(); err != nil {
return err
}
g.Resources = append(g.Resources, g.createNATRuleGroupResources()...)
g.Resources = append(g.Resources, g.createPBFRuleGroupResources()...)
g.Resources = append(g.Resources, g.createSecurityRuleGroupResources()...)
return nil
}
func (g *FirewallPolicyGenerator) PostConvertHook() error {
for _, res := range g.Resources {
if res.InstanceInfo.Type == "panos_nat_rule_group" {
for _, rule := range res.Item["rule"].([]interface{}) {
if _, ok := rule.(map[string]interface{})["translated_packet"]; ok {
a := rule.(map[string]interface{})["translated_packet"].([]interface{})
for _, b := range a {
if _, okb := b.(map[string]interface{})["source"]; !okb {
b.(map[string]interface{})["source"] = make(map[string]interface{})
}
}
for _, b := range a {
if _, okb := b.(map[string]interface{})["destination"]; !okb {
b.(map[string]interface{})["destination"] = make(map[string]interface{})
}
}
}
}
}
if res.InstanceInfo.Type == "panos_security_rule_group" {
for _, rule := range res.Item["rule"].([]interface{}) {
if _, ok := rule.(map[string]interface{})["hip_profiles"]; !ok {
rule.(map[string]interface{})["hip_profiles"] = []string{"any"}
}
}
}
}
return nil
}