-
Notifications
You must be signed in to change notification settings - Fork 1
/
adapt.go
81 lines (63 loc) · 1.81 KB
/
adapt.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
package ssm
import (
api "github.com/aws/aws-sdk-go-v2/service/secretsmanager"
"github.com/aws/aws-sdk-go-v2/service/secretsmanager/types"
"github.com/khulnasoft-lab/defsec/pkg/providers/aws/ssm"
"github.com/khulnasoft-lab/defsec/pkg/state"
defsecTypes "github.com/khulnasoft-lab/defsec/pkg/types"
"github.com/khulnasoft-lab/vul-aws/internal/adapters"
"github.com/khulnasoft-lab/vul-aws/pkg/concurrency"
)
type adapter struct {
*adapters.RootAdapter
api *api.Client
}
func init() {
adapters.RegisterServiceAdapter(&adapter{})
}
func (a *adapter) Provider() string {
return "aws"
}
func (a *adapter) Name() string {
return "ssm"
}
func (a *adapter) Adapt(root *adapters.RootAdapter, state *state.State) error {
a.RootAdapter = root
a.api = api.NewFromConfig(root.SessionConfig())
var err error
state.AWS.SSM.Secrets, err = a.getSecrets()
if err != nil {
return err
}
return nil
}
func (a *adapter) getSecrets() ([]ssm.Secret, error) {
a.Tracker().SetServiceLabel("Discovering secrets...")
var apiSecrets []types.SecretListEntry
var input api.ListSecretsInput
for {
output, err := a.api.ListSecrets(a.Context(), &input)
if err != nil {
return nil, err
}
apiSecrets = append(apiSecrets, output.SecretList...)
a.Tracker().SetTotalResources(len(apiSecrets))
if output.NextToken == nil {
break
}
input.NextToken = output.NextToken
}
a.Tracker().SetServiceLabel("Adapting secrets...")
return concurrency.Adapt(apiSecrets, a.RootAdapter, a.adaptSecret), nil
}
func (a *adapter) adaptSecret(apiSecret types.SecretListEntry) (*ssm.Secret, error) {
metadata := a.CreateMetadataFromARN(*apiSecret.ARN)
var kmsKeyId string
if apiSecret.KmsKeyId != nil {
kmsKeyId = *apiSecret.KmsKeyId
}
return &ssm.Secret{
Metadata: metadata,
KMSKeyID: defsecTypes.String(kmsKeyId, metadata),
}, nil
}