Files
vuls/config/awsconf.go
MaineK00n db2c502b4a feat(reporter/s3): support minio (#1930)
* feat(reporter/s3): support minio

* feat(reporter/s3): disable config/credential: file and some providers
2024-05-28 10:13:39 +09:00

75 lines
1.8 KiB
Go

package config
import (
"fmt"
"slices"
"github.com/aws/aws-sdk-go-v2/service/s3"
"github.com/aws/aws-sdk-go-v2/service/s3/types"
)
// AWSConf is aws config
type AWSConf struct {
// AWS S3 Endpoint to use
S3Endpoint string `json:"s3Endpoint"`
// AWS region to use
Region string `json:"region"`
// AWS profile to use
Profile string `json:"profile"`
// use credential provider
CredentialProvider CredentialProviderType `json:"credentialProvider"`
// S3 bucket name
S3Bucket string `json:"s3Bucket"`
// /bucket/path/to/results
S3ResultsDir string `json:"s3ResultsDir"`
// The Server-side encryption algorithm used when storing the reports in S3 (e.g., AES256, aws:kms).
S3ServerSideEncryption string `json:"s3ServerSideEncryption"`
// use s3 path style
S3UsePathStyle bool `json:"s3UsePathStyle"`
// report s3 enable
Enabled bool `toml:"-" json:"-"`
}
// CredentialProviderType is credential provider type
type CredentialProviderType string
const (
// CredentialProviderAnonymous is credential provider type: anonymous
CredentialProviderAnonymous CredentialProviderType = "anonymous"
)
// Validate configuration
func (c *AWSConf) Validate() (errs []error) {
if !c.Enabled {
return
}
switch c.CredentialProvider {
case CredentialProviderType(""):
case CredentialProviderAnonymous:
default:
errs = append(errs, fmt.Errorf("CredentialProvider: %s is not supported", c.CredentialProvider))
}
if c.S3Bucket == "" {
errs = append(errs, fmt.Errorf("S3Bucket is empty"))
}
if c.S3ServerSideEncryption != "" {
if !slices.Contains(s3.PutObjectInput{}.ServerSideEncryption.Values(), types.ServerSideEncryption(c.S3ServerSideEncryption)) {
errs = append(errs, fmt.Errorf("S3ServerSideEncryption: %s is not supported server side encryption type", c.S3ServerSideEncryption))
}
}
return
}