-
Notifications
You must be signed in to change notification settings - Fork 45
/
SecurityHandler.go
345 lines (308 loc) · 10.7 KB
/
SecurityHandler.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
// Proof of Concepts of CB-Spider.
// The CB-Spider is a sub-Framework of the Cloud-Barista Multi-Cloud Project.
// The CB-Spider Mission is to connect all the clouds with a single interface.
//
// * Cloud-Barista: https://github.com/cloud-barista
//
// This is a Cloud Driver Example for PoC Test.
//
// program by ysjeon@mz.co.kr, 2019.07.
// modify by devunet@mz.co.kr, 2019.11.
package resources
import (
"context"
"errors"
"fmt"
"strconv"
"strings"
"time"
call "github.com/cloud-barista/cb-spider/cloud-control-manager/cloud-driver/call-log"
idrv "github.com/cloud-barista/cb-spider/cloud-control-manager/cloud-driver/interfaces"
irs "github.com/cloud-barista/cb-spider/cloud-control-manager/cloud-driver/interfaces/resources"
"github.com/davecgh/go-spew/spew"
compute "google.golang.org/api/compute/v1"
)
type GCPSecurityHandler struct {
Region idrv.RegionInfo
Ctx context.Context
Client *compute.Service
Credential idrv.CredentialInfo
}
//@TODO : 이슈
func (securityHandler *GCPSecurityHandler) CreateSecurity(securityReqInfo irs.SecurityReqInfo) (irs.SecurityInfo, error) {
cblogger.Info(securityReqInfo)
vNetworkHandler := GCPVPCHandler{
Client: securityHandler.Client,
Region: securityHandler.Region,
Ctx: securityHandler.Ctx,
Credential: securityHandler.Credential,
}
vNetInfo, errVnet := vNetworkHandler.GetVPC(securityReqInfo.VpcIID)
spew.Dump(vNetInfo)
if errVnet != nil {
cblogger.Error(errVnet)
return irs.SecurityInfo{}, errVnet
}
if len(*securityReqInfo.SecurityRules) < 1 {
return irs.SecurityInfo{}, errors.New("invalid value - The SecurityRules policy to add is empty")
}
//GCP의 경우 1개의 보안그룹에 Inbound나 Outbound를 1개만 지정할 수 있으며 CIDR도 1개의 보안그룹에 1개만 공통으로 지정됨.
//즉, 1개의 보안 정책에 다중 포트를 선언하는 형태라서 irs.SecurityReqInfo의 정보를 사용할 것인지
// irs.SecurityReqInfo의 *[]SecurityRuleInfo 배열의 첫 번째 값을 사용할 것인지 미정이라 공통 변수를 만들어서 처리함.
commonPolicy := *securityReqInfo.SecurityRules
commonDirection := commonPolicy[0].Direction
commonCidr := strings.Split(commonPolicy[0].CIDR, ",")
if len(commonCidr[0]) < 2 {
return irs.SecurityInfo{}, errors.New("invalid value - The CIDR is empty")
}
projectID := securityHandler.Credential.ProjectID
// @TODO: SecurityGroup 생성 요청 파라미터 정의 필요
ports := *securityReqInfo.SecurityRules
var firewallAllowed []*compute.FirewallAllowed
//다른 드라이버와의 통일을 위해 All은 -1로 처리함.
//GCP는 포트 번호를 적지 않으면 All임.
//GCP 방화벽 정책
//https://cloud.google.com/vpc/docs/firewalls?hl=ko&_ga=2.238147008.-1577666838.1589162755#protocols_and_ports
for _, item := range ports {
var port string
fp := item.FromPort
tp := item.ToPort
//GCP는 1개의 정책에 1가지 Direction만 지정 가능하기 때문에 Inbound와 Outbound 모두 지정되었을 경우 에러 처리함.
if !strings.EqualFold(item.Direction, commonDirection) {
return irs.SecurityInfo{}, errors.New("invalid value - GCP can only use one Direction for one security policy")
}
// CB Rule에 의해 Port 번호에 -1이 기입된 경우 GCP Rule에 맞게 치환함.
if fp == "-1" || tp == "-1" {
if (fp == "-1" && tp == "-1") || (fp == "-1" && tp == "") || (fp == "" && tp == "-1") {
port = ""
} else if fp == "-1" {
port = tp
} else {
port = fp
}
} else {
//둘 다 있는 경우
if tp != "" && fp != "" {
port = fp + "-" + tp
//From Port가 없는 경우
} else if tp != "" && fp == "" {
port = tp
//To Port가 없는 경우
} else if tp == "" && fp != "" {
port = fp
} else {
port = ""
}
}
if port == "" {
firewallAllowed = append(firewallAllowed, &compute.FirewallAllowed{
IPProtocol: item.IPProtocol,
})
} else {
firewallAllowed = append(firewallAllowed, &compute.FirewallAllowed{
IPProtocol: item.IPProtocol,
Ports: []string{
port,
},
})
}
}
if strings.EqualFold(commonDirection, "inbound") || strings.EqualFold(commonDirection, "INGRESS") {
commonDirection = "INGRESS"
} else if strings.EqualFold(commonDirection, "outbound") || strings.EqualFold(commonDirection, "EGRESS") {
commonDirection = "EGRESS"
} else {
// cblogger.Errorf("!!!!!!!!! SecurityReqInfo.Direction 정보[%s]가 없어서 INGRESS로 처리합니다.", securityReqInfo.Direction)
return irs.SecurityInfo{}, errors.New("invalid value - The direction[" + securityReqInfo.Direction + "] information is unknown")
}
prefix := "https://www.googleapis.com/compute/v1/projects/" + projectID
//networkURL := prefix + "/global/networks/" + securityReqInfo.VpcIID.NameId
networkURL := prefix + "/global/networks/" + securityReqInfo.VpcIID.SystemId
fireWall := &compute.Firewall{
Allowed: firewallAllowed,
Direction: commonDirection, //INGRESS(inbound), EGRESS(outbound)
// SourceRanges: []string{
// // "0.0.0.0/0",
// commonCidr,
// },
Name: securityReqInfo.IId.NameId,
TargetTags: []string{
securityReqInfo.IId.NameId,
},
Network: networkURL,
}
//CIDR 처리
if strings.EqualFold(commonDirection, "INGRESS") {
//fireWall.SourceRanges = []string{commonCidr}
fireWall.SourceRanges = commonCidr
} else {
//fireWall.DestinationRanges = []string{commonCidr}
fireWall.DestinationRanges = commonCidr
}
cblogger.Info("생성할 방화벽 정책")
cblogger.Debug(fireWall)
//spew.Dump(fireWall)
// logger for HisCall
callogger := call.GetLogger("HISCALL")
callLogInfo := call.CLOUDLOGSCHEMA{
CloudOS: call.GCP,
RegionZone: securityHandler.Region.Zone,
ResourceType: call.SECURITYGROUP,
ResourceName: securityReqInfo.IId.NameId,
CloudOSAPI: "Firewalls.Insert()",
ElapsedTime: "",
ErrorMSG: "",
}
callLogStart := call.Start()
res, err := securityHandler.Client.Firewalls.Insert(projectID, fireWall).Do()
callLogInfo.ElapsedTime = call.Elapsed(callLogStart)
if err != nil {
callLogInfo.ErrorMSG = err.Error()
callogger.Error(call.String(callLogInfo))
cblogger.Error(err)
return irs.SecurityInfo{}, err
}
callogger.Info(call.String(callLogInfo))
fmt.Println("create result : ", res)
time.Sleep(time.Second * 3)
//secInfo, _ := securityHandler.GetSecurity(securityReqInfo.IId)
secInfo, _ := securityHandler.GetSecurity(irs.IID{SystemId: securityReqInfo.IId.NameId})
return secInfo, nil
}
func (securityHandler *GCPSecurityHandler) ListSecurity() ([]*irs.SecurityInfo, error) {
//result, err := securityHandler.Client.ListAll(securityHandler.Ctx)
projectID := securityHandler.Credential.ProjectID
// logger for HisCall
callogger := call.GetLogger("HISCALL")
callLogInfo := call.CLOUDLOGSCHEMA{
CloudOS: call.GCP,
RegionZone: securityHandler.Region.Zone,
ResourceType: call.SECURITYGROUP,
ResourceName: "",
CloudOSAPI: "Firewalls.List()",
ElapsedTime: "",
ErrorMSG: "",
}
callLogStart := call.Start()
result, err := securityHandler.Client.Firewalls.List(projectID).Do()
callLogInfo.ElapsedTime = call.Elapsed(callLogStart)
if err != nil {
callLogInfo.ErrorMSG = err.Error()
callogger.Info(call.String(callLogInfo))
cblogger.Error(err)
return nil, err
}
callogger.Info(call.String(callLogInfo))
var securityInfo []*irs.SecurityInfo
for _, item := range result.Items {
name := item.Name
//systemId := strconv.FormatUint(item.Id, 10)
//secInfo, _ := securityHandler.GetSecurity(irs.IID{NameId: name, SystemId: systemId})
secInfo, _ := securityHandler.GetSecurity(irs.IID{SystemId: name})
securityInfo = append(securityInfo, &secInfo)
}
return securityInfo, nil
}
func (securityHandler *GCPSecurityHandler) GetSecurity(securityIID irs.IID) (irs.SecurityInfo, error) {
projectID := securityHandler.Credential.ProjectID
// logger for HisCall
callogger := call.GetLogger("HISCALL")
callLogInfo := call.CLOUDLOGSCHEMA{
CloudOS: call.GCP,
RegionZone: securityHandler.Region.Zone,
ResourceType: call.SECURITYGROUP,
ResourceName: securityIID.SystemId,
CloudOSAPI: "Firewalls.Get()",
ElapsedTime: "",
ErrorMSG: "",
}
callLogStart := call.Start()
security, err := securityHandler.Client.Firewalls.Get(projectID, securityIID.SystemId).Do()
callLogInfo.ElapsedTime = call.Elapsed(callLogStart)
if err != nil {
callLogInfo.ErrorMSG = err.Error()
callogger.Info(call.String(callLogInfo))
cblogger.Error(err)
return irs.SecurityInfo{}, err
}
callogger.Info(call.String(callLogInfo))
var commonCidr string
if strings.EqualFold(security.Direction, "INGRESS") {
commonCidr = strings.Join(security.SourceRanges, ", ")
} else {
commonCidr = strings.Join(security.DestinationRanges, ", ")
}
var securityRules []irs.SecurityRuleInfo
for _, item := range security.Allowed {
var portArr []string
var fromPort string
var toPort string
if ports := item.Ports; ports != nil {
portArr = strings.Split(item.Ports[0], "-")
fromPort = portArr[0]
if len(portArr) > 1 {
toPort = portArr[len(portArr)-1]
} else {
toPort = ""
}
} else {
fromPort = ""
toPort = ""
}
securityRules = append(securityRules, irs.SecurityRuleInfo{
FromPort: fromPort,
ToPort: toPort,
IPProtocol: item.IPProtocol,
Direction: security.Direction,
CIDR: commonCidr,
})
}
vpcArr := strings.Split(security.Network, "/")
vpcName := vpcArr[len(vpcArr)-1]
securityInfo := irs.SecurityInfo{
IId: irs.IID{
NameId: security.Name,
//SystemId: strconv.FormatUint(security.Id, 10),
SystemId: security.Name,
},
VpcIID: irs.IID{
NameId: vpcName,
SystemId: vpcName,
},
// Direction: security.Direction,
KeyValueList: []irs.KeyValue{
{Key: "Priority", Value: strconv.FormatInt(security.Priority, 10)},
// {"SourceRanges", security.SourceRanges[0]},
{Key: "Allowed", Value: security.Allowed[0].IPProtocol},
{Key: "Vpc", Value: vpcName},
},
SecurityRules: &securityRules,
}
return securityInfo, nil
}
func (securityHandler *GCPSecurityHandler) DeleteSecurity(securityIID irs.IID) (bool, error) {
projectID := securityHandler.Credential.ProjectID
// logger for HisCall
callogger := call.GetLogger("HISCALL")
callLogInfo := call.CLOUDLOGSCHEMA{
CloudOS: call.GCP,
RegionZone: securityHandler.Region.Zone,
ResourceType: call.SECURITYGROUP,
ResourceName: securityIID.SystemId,
CloudOSAPI: "CreateVpc()",
ElapsedTime: "",
ErrorMSG: "",
}
callLogStart := call.Start()
res, err := securityHandler.Client.Firewalls.Delete(projectID, securityIID.SystemId).Do()
callLogInfo.ElapsedTime = call.Elapsed(callLogStart)
if err != nil {
callLogInfo.ErrorMSG = err.Error()
callogger.Info(call.String(callLogInfo))
cblogger.Error(err)
return false, err
}
callogger.Info(call.String(callLogInfo))
fmt.Println(res)
return true, nil
}