internal/resources/providers/aws_cis/logging/provider.go (72 lines of code) (raw):

// Licensed to Elasticsearch B.V. under one or more contributor // license agreements. See the NOTICE file distributed with // this work for additional information regarding copyright // ownership. Elasticsearch B.V. licenses this file to you under // the Apache License, Version 2.0 (the "License"); you may // not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, // software distributed under the License is distributed on an // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY // KIND, either express or implied. See the License for the // specific language governing permissions and limitations // under the License. package logging import ( "context" s3Client "github.com/aws/aws-sdk-go-v2/service/s3" "github.com/elastic/cloudbeat/internal/resources/fetching" "github.com/elastic/cloudbeat/internal/resources/providers/awslib" "github.com/elastic/cloudbeat/internal/resources/providers/awslib/cloudtrail" "github.com/elastic/cloudbeat/internal/resources/providers/awslib/s3" ) type EnrichedTrail struct { cloudtrail.TrailInfo BucketInfo TrailBucket `json:"bucket_info"` } type TrailBucket struct { Policy s3.BucketPolicy `json:"policy,omitempty"` Logging s3.Logging `json:"logging,omitempty"` ACL *s3Client.GetBucketAclOutput `json:"acl,omitempty"` } func (p *Provider) DescribeTrails(ctx context.Context) ([]awslib.AwsResource, error) { trails, trailsErr := p.trailProvider.DescribeTrails(ctx) if trailsErr != nil { return nil, trailsErr } enrichedTrails := make([]awslib.AwsResource, 0, len(trails)) for _, info := range trails { if info.Trail.S3BucketName == nil { continue } bucketPolicy, policyErr := p.s3Provider.GetBucketPolicy(ctx, info.Trail.S3BucketName, *info.Trail.HomeRegion) if policyErr != nil { p.log.Errorf("Error getting bucket policy for bucket %s: %v", *info.Trail.S3BucketName, policyErr) } aclGrants, aclErr := p.s3Provider.GetBucketACL(ctx, info.Trail.S3BucketName, *info.Trail.HomeRegion) if aclErr != nil { p.log.Errorf("Error getting bucket ACL for bucket %s: %v", *info.Trail.S3BucketName, aclErr) } bucketLogging, loggingErr := p.s3Provider.GetBucketLogging(ctx, info.Trail.S3BucketName, *info.Trail.HomeRegion) if loggingErr != nil { p.log.Errorf("Error getting bucket logging for bucket %s: %v", *info.Trail.S3BucketName, loggingErr) } enrichedTrails = append(enrichedTrails, EnrichedTrail{ TrailInfo: info, BucketInfo: TrailBucket{ ACL: aclGrants, Policy: bucketPolicy, Logging: bucketLogging, }, }) } return enrichedTrails, nil } func (e EnrichedTrail) GetResourceArn() string { if e.Trail.TrailARN == nil { return "" } return *e.Trail.TrailARN } func (e EnrichedTrail) GetResourceName() string { if e.Trail.Name == nil { return "" } return *e.Trail.Name } func (e EnrichedTrail) GetResourceType() string { return fetching.TrailType } func (e EnrichedTrail) GetRegion() string { if e.Trail.HomeRegion == nil { return "" } return *e.Trail.HomeRegion }