328 lines
8.6 KiB
Go
328 lines
8.6 KiB
Go
package aws
|
|
|
|
import (
|
|
"fmt"
|
|
"log"
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
"github.com/aws/aws-sdk-go/service/cloudtrail"
|
|
"github.com/hashicorp/terraform/helper/schema"
|
|
)
|
|
|
|
func resourceAwsCloudTrail() *schema.Resource {
|
|
return &schema.Resource{
|
|
Create: resourceAwsCloudTrailCreate,
|
|
Read: resourceAwsCloudTrailRead,
|
|
Update: resourceAwsCloudTrailUpdate,
|
|
Delete: resourceAwsCloudTrailDelete,
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
"name": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
ForceNew: true,
|
|
},
|
|
"enable_logging": &schema.Schema{
|
|
Type: schema.TypeBool,
|
|
Optional: true,
|
|
Default: true,
|
|
},
|
|
"s3_bucket_name": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
},
|
|
"s3_key_prefix": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Optional: true,
|
|
},
|
|
"cloud_watch_logs_role_arn": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Optional: true,
|
|
},
|
|
"cloud_watch_logs_group_arn": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Optional: true,
|
|
},
|
|
"include_global_service_events": &schema.Schema{
|
|
Type: schema.TypeBool,
|
|
Optional: true,
|
|
Default: true,
|
|
},
|
|
"is_multi_region_trail": &schema.Schema{
|
|
Type: schema.TypeBool,
|
|
Optional: true,
|
|
Default: false,
|
|
},
|
|
"sns_topic_name": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Optional: true,
|
|
},
|
|
"enable_log_file_validation": &schema.Schema{
|
|
Type: schema.TypeBool,
|
|
Optional: true,
|
|
Default: false,
|
|
},
|
|
"kms_key_id": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Optional: true,
|
|
},
|
|
"home_region": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Computed: true,
|
|
},
|
|
"arn": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Computed: true,
|
|
},
|
|
"tags": tagsSchema(),
|
|
},
|
|
}
|
|
}
|
|
|
|
func resourceAwsCloudTrailCreate(d *schema.ResourceData, meta interface{}) error {
|
|
conn := meta.(*AWSClient).cloudtrailconn
|
|
|
|
input := cloudtrail.CreateTrailInput{
|
|
Name: aws.String(d.Get("name").(string)),
|
|
S3BucketName: aws.String(d.Get("s3_bucket_name").(string)),
|
|
}
|
|
|
|
if v, ok := d.GetOk("cloud_watch_logs_group_arn"); ok {
|
|
input.CloudWatchLogsLogGroupArn = aws.String(v.(string))
|
|
}
|
|
if v, ok := d.GetOk("cloud_watch_logs_role_arn"); ok {
|
|
input.CloudWatchLogsRoleArn = aws.String(v.(string))
|
|
}
|
|
if v, ok := d.GetOk("include_global_service_events"); ok {
|
|
input.IncludeGlobalServiceEvents = aws.Bool(v.(bool))
|
|
}
|
|
if v, ok := d.GetOk("is_multi_region_trail"); ok {
|
|
input.IsMultiRegionTrail = aws.Bool(v.(bool))
|
|
}
|
|
if v, ok := d.GetOk("enable_log_file_validation"); ok {
|
|
input.EnableLogFileValidation = aws.Bool(v.(bool))
|
|
}
|
|
if v, ok := d.GetOk("kms_key_id"); ok {
|
|
input.KmsKeyId = aws.String(v.(string))
|
|
}
|
|
if v, ok := d.GetOk("s3_key_prefix"); ok {
|
|
input.S3KeyPrefix = aws.String(v.(string))
|
|
}
|
|
if v, ok := d.GetOk("sns_topic_name"); ok {
|
|
input.SnsTopicName = aws.String(v.(string))
|
|
}
|
|
|
|
t, err := conn.CreateTrail(&input)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
log.Printf("[DEBUG] CloudTrail created: %s", t)
|
|
|
|
d.Set("arn", *t.TrailARN)
|
|
d.SetId(*t.Name)
|
|
|
|
// AWS CloudTrail sets newly-created trails to false.
|
|
if v, ok := d.GetOk("enable_logging"); ok && v.(bool) {
|
|
err := cloudTrailSetLogging(conn, v.(bool), d.Id())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return resourceAwsCloudTrailUpdate(d, meta)
|
|
}
|
|
|
|
func resourceAwsCloudTrailRead(d *schema.ResourceData, meta interface{}) error {
|
|
conn := meta.(*AWSClient).cloudtrailconn
|
|
|
|
name := d.Get("name").(string)
|
|
input := cloudtrail.DescribeTrailsInput{
|
|
TrailNameList: []*string{
|
|
aws.String(name),
|
|
},
|
|
}
|
|
resp, err := conn.DescribeTrails(&input)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// CloudTrail does not return a NotFound error in the event that the Trail
|
|
// you're looking for is not found. Instead, it's simply not in the list.
|
|
var trail *cloudtrail.Trail
|
|
for _, c := range resp.TrailList {
|
|
if d.Id() == *c.Name {
|
|
trail = c
|
|
}
|
|
}
|
|
|
|
if trail == nil {
|
|
log.Printf("[WARN] CloudTrail (%s) not found", name)
|
|
d.SetId("")
|
|
return nil
|
|
}
|
|
|
|
log.Printf("[DEBUG] CloudTrail received: %s", trail)
|
|
|
|
d.Set("name", trail.Name)
|
|
d.Set("s3_bucket_name", trail.S3BucketName)
|
|
d.Set("s3_key_prefix", trail.S3KeyPrefix)
|
|
d.Set("cloud_watch_logs_role_arn", trail.CloudWatchLogsRoleArn)
|
|
d.Set("cloud_watch_logs_group_arn", trail.CloudWatchLogsLogGroupArn)
|
|
d.Set("include_global_service_events", trail.IncludeGlobalServiceEvents)
|
|
d.Set("is_multi_region_trail", trail.IsMultiRegionTrail)
|
|
d.Set("sns_topic_name", trail.SnsTopicName)
|
|
d.Set("enable_log_file_validation", trail.LogFileValidationEnabled)
|
|
|
|
// TODO: Make it possible to use KMS Key names, not just ARNs
|
|
// In order to test it properly this PR needs to be merged 1st:
|
|
// https://github.com/hashicorp/terraform/pull/3928
|
|
d.Set("kms_key_id", trail.KmsKeyId)
|
|
|
|
d.Set("arn", trail.TrailARN)
|
|
d.Set("home_region", trail.HomeRegion)
|
|
|
|
// Get tags
|
|
req := &cloudtrail.ListTagsInput{
|
|
ResourceIdList: []*string{trail.TrailARN},
|
|
}
|
|
|
|
tagsOut, err := conn.ListTags(req)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
log.Printf("[DEBUG] Received CloudTrail tags: %s", tagsOut)
|
|
|
|
var tags []*cloudtrail.Tag
|
|
if tagsOut.ResourceTagList != nil && len(tagsOut.ResourceTagList) > 0 {
|
|
tags = tagsOut.ResourceTagList[0].TagsList
|
|
}
|
|
|
|
if err := d.Set("tags", tagsToMapCloudtrail(tags)); err != nil {
|
|
return err
|
|
}
|
|
|
|
logstatus, err := cloudTrailGetLoggingStatus(conn, trail.Name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
d.Set("enable_logging", logstatus)
|
|
|
|
return nil
|
|
}
|
|
|
|
func resourceAwsCloudTrailUpdate(d *schema.ResourceData, meta interface{}) error {
|
|
conn := meta.(*AWSClient).cloudtrailconn
|
|
|
|
input := cloudtrail.UpdateTrailInput{
|
|
Name: aws.String(d.Get("name").(string)),
|
|
}
|
|
|
|
if d.HasChange("s3_bucket_name") {
|
|
input.S3BucketName = aws.String(d.Get("s3_bucket_name").(string))
|
|
}
|
|
if d.HasChange("s3_key_prefix") {
|
|
input.S3KeyPrefix = aws.String(d.Get("s3_key_prefix").(string))
|
|
}
|
|
if d.HasChange("cloud_watch_logs_role_arn") {
|
|
input.CloudWatchLogsRoleArn = aws.String(d.Get("cloud_watch_logs_role_arn").(string))
|
|
}
|
|
if d.HasChange("cloud_watch_logs_group_arn") {
|
|
input.CloudWatchLogsLogGroupArn = aws.String(d.Get("cloud_watch_logs_group_arn").(string))
|
|
}
|
|
if d.HasChange("include_global_service_events") {
|
|
input.IncludeGlobalServiceEvents = aws.Bool(d.Get("include_global_service_events").(bool))
|
|
}
|
|
if d.HasChange("is_multi_region_trail") {
|
|
input.IsMultiRegionTrail = aws.Bool(d.Get("is_multi_region_trail").(bool))
|
|
}
|
|
if d.HasChange("enable_log_file_validation") {
|
|
input.EnableLogFileValidation = aws.Bool(d.Get("enable_log_file_validation").(bool))
|
|
}
|
|
if d.HasChange("kms_key_id") {
|
|
input.KmsKeyId = aws.String(d.Get("kms_key_id").(string))
|
|
}
|
|
if d.HasChange("sns_topic_name") {
|
|
input.SnsTopicName = aws.String(d.Get("sns_topic_name").(string))
|
|
}
|
|
|
|
log.Printf("[DEBUG] Updating CloudTrail: %s", input)
|
|
t, err := conn.UpdateTrail(&input)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if d.HasChange("tags") {
|
|
err := setTagsCloudtrail(conn, d)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if d.HasChange("enable_logging") {
|
|
log.Printf("[DEBUG] Updating logging on CloudTrail: %s", input)
|
|
err := cloudTrailSetLogging(conn, d.Get("enable_logging").(bool), *input.Name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
log.Printf("[DEBUG] CloudTrail updated: %s", t)
|
|
|
|
return resourceAwsCloudTrailRead(d, meta)
|
|
}
|
|
|
|
func resourceAwsCloudTrailDelete(d *schema.ResourceData, meta interface{}) error {
|
|
conn := meta.(*AWSClient).cloudtrailconn
|
|
name := d.Get("name").(string)
|
|
|
|
log.Printf("[DEBUG] Deleting CloudTrail: %q", name)
|
|
_, err := conn.DeleteTrail(&cloudtrail.DeleteTrailInput{
|
|
Name: aws.String(name),
|
|
})
|
|
|
|
return err
|
|
}
|
|
|
|
func cloudTrailGetLoggingStatus(conn *cloudtrail.CloudTrail, id *string) (bool, error) {
|
|
GetTrailStatusOpts := &cloudtrail.GetTrailStatusInput{
|
|
Name: id,
|
|
}
|
|
resp, err := conn.GetTrailStatus(GetTrailStatusOpts)
|
|
if err != nil {
|
|
return false, fmt.Errorf("Error retrieving logging status of CloudTrail (%s): %s", *id, err)
|
|
}
|
|
|
|
return *resp.IsLogging, err
|
|
}
|
|
|
|
func cloudTrailSetLogging(conn *cloudtrail.CloudTrail, enabled bool, id string) error {
|
|
if enabled {
|
|
log.Printf(
|
|
"[DEBUG] Starting logging on CloudTrail (%s)",
|
|
id)
|
|
StartLoggingOpts := &cloudtrail.StartLoggingInput{
|
|
Name: aws.String(id),
|
|
}
|
|
if _, err := conn.StartLogging(StartLoggingOpts); err != nil {
|
|
return fmt.Errorf(
|
|
"Error starting logging on CloudTrail (%s): %s",
|
|
id, err)
|
|
}
|
|
} else {
|
|
log.Printf(
|
|
"[DEBUG] Stopping logging on CloudTrail (%s)",
|
|
id)
|
|
StopLoggingOpts := &cloudtrail.StopLoggingInput{
|
|
Name: aws.String(id),
|
|
}
|
|
if _, err := conn.StopLogging(StopLoggingOpts); err != nil {
|
|
return fmt.Errorf(
|
|
"Error stopping logging on CloudTrail (%s): %s",
|
|
id, err)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|