forked from ekristen/aws-nuke
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathwaf-webacls.go
81 lines (61 loc) · 1.43 KB
/
waf-webacls.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
package resources
import (
"context"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/waf"
"github.com/ekristen/libnuke/pkg/registry"
"github.com/ekristen/libnuke/pkg/resource"
"github.com/ekristen/aws-nuke/v3/pkg/nuke"
)
const WAFWebACLResource = "WAFWebACL"
func init() {
registry.Register(®istry.Registration{
Name: WAFWebACLResource,
Scope: nuke.Account,
Lister: &WAFWebACLLister{},
})
}
type WAFWebACLLister struct{}
func (l *WAFWebACLLister) List(_ context.Context, o interface{}) ([]resource.Resource, error) {
opts := o.(*nuke.ListerOpts)
svc := waf.New(opts.Session)
resources := make([]resource.Resource, 0)
params := &waf.ListWebACLsInput{
Limit: aws.Int64(50),
}
for {
resp, err := svc.ListWebACLs(params)
if err != nil {
return nil, err
}
for _, webACL := range resp.WebACLs {
resources = append(resources, &WAFWebACL{
svc: svc,
ID: webACL.WebACLId,
})
}
if resp.NextMarker == nil {
break
}
params.NextMarker = resp.NextMarker
}
return resources, nil
}
type WAFWebACL struct {
svc *waf.WAF
ID *string
}
func (f *WAFWebACL) Remove(_ context.Context) error {
tokenOutput, err := f.svc.GetChangeToken(&waf.GetChangeTokenInput{})
if err != nil {
return err
}
_, err = f.svc.DeleteWebACL(&waf.DeleteWebACLInput{
WebACLId: f.ID,
ChangeToken: tokenOutput.ChangeToken,
})
return err
}
func (f *WAFWebACL) String() string {
return *f.ID
}