| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335 |
- """Services implemented by the AWS provider."""
- import ipaddress
- import logging
- import string
- from botocore.exceptions import ClientError
- import cachetools
- import requests
- import cloudbridge.base.helpers as cb_helpers
- from cloudbridge.base.middleware import dispatch
- from cloudbridge.base.resources import ClientPagedResultList
- from cloudbridge.base.services import BaseBucketObjectService
- from cloudbridge.base.services import BaseBucketService
- from cloudbridge.base.services import BaseComputeService
- from cloudbridge.base.services import BaseFloatingIPService
- from cloudbridge.base.services import BaseGatewayService
- from cloudbridge.base.services import BaseImageService
- from cloudbridge.base.services import BaseInstanceService
- from cloudbridge.base.services import BaseKeyPairService
- from cloudbridge.base.services import BaseNetworkService
- from cloudbridge.base.services import BaseNetworkingService
- from cloudbridge.base.services import BaseRegionService
- from cloudbridge.base.services import BaseRouterService
- from cloudbridge.base.services import BaseSecurityService
- from cloudbridge.base.services import BaseSnapshotService
- from cloudbridge.base.services import BaseStorageService
- from cloudbridge.base.services import BaseSubnetService
- from cloudbridge.base.services import BaseVMFirewallRuleService
- from cloudbridge.base.services import BaseVMFirewallService
- from cloudbridge.base.services import BaseVMTypeService
- from cloudbridge.base.services import BaseVolumeService
- from cloudbridge.interfaces.exceptions import DifferentZoneException
- from cloudbridge.interfaces.exceptions import DuplicateResourceException
- from cloudbridge.interfaces.exceptions import InvalidConfigurationException
- from cloudbridge.interfaces.exceptions import InvalidParamException
- from cloudbridge.interfaces.exceptions import InvalidValueException
- from cloudbridge.interfaces.resources import KeyPair
- from cloudbridge.interfaces.resources import MachineImage
- from cloudbridge.interfaces.resources import Network
- from cloudbridge.interfaces.resources import Snapshot
- from cloudbridge.interfaces.resources import TrafficDirection
- from cloudbridge.interfaces.resources import VMFirewall
- from cloudbridge.interfaces.resources import VMType
- from cloudbridge.interfaces.resources import Volume
- from .helpers import BotoEC2Service
- from .helpers import BotoS3Service
- from .helpers import trim_empty_params
- from .resources import AWSBucket
- from .resources import AWSBucketObject
- from .resources import AWSFloatingIP
- from .resources import AWSInstance
- from .resources import AWSInternetGateway
- from .resources import AWSKeyPair
- from .resources import AWSLaunchConfig
- from .resources import AWSMachineImage
- from .resources import AWSNetwork
- from .resources import AWSRegion
- from .resources import AWSRouter
- from .resources import AWSSnapshot
- from .resources import AWSSubnet
- from .resources import AWSVMFirewall
- from .resources import AWSVMFirewallRule
- from .resources import AWSVMType
- from .resources import AWSVolume
- log = logging.getLogger(__name__)
- class AWSSecurityService(BaseSecurityService):
- def __init__(self, provider):
- super(AWSSecurityService, self).__init__(provider)
- # Initialize provider services
- self._key_pairs = AWSKeyPairService(provider)
- self._vm_firewalls = AWSVMFirewallService(provider)
- self._vm_firewall_rule_svc = AWSVMFirewallRuleService(provider)
- @property
- def key_pairs(self):
- return self._key_pairs
- @property
- def vm_firewalls(self):
- return self._vm_firewalls
- @property
- def _vm_firewall_rules(self):
- return self._vm_firewall_rule_svc
- class AWSKeyPairService(BaseKeyPairService):
- def __init__(self, provider):
- super(AWSKeyPairService, self).__init__(provider)
- self.svc = BotoEC2Service(provider=self.provider,
- cb_resource=AWSKeyPair,
- boto_collection_name='key_pairs')
- @dispatch(event="provider.security.key_pairs.get",
- priority=BaseKeyPairService.STANDARD_EVENT_PRIORITY)
- def get(self, key_pair_id):
- log.debug("Getting Key Pair Service %s", key_pair_id)
- return self.svc.get(key_pair_id)
- @dispatch(event="provider.security.key_pairs.list",
- priority=BaseKeyPairService.STANDARD_EVENT_PRIORITY)
- def list(self, limit=None, marker=None):
- return self.svc.list(limit=limit, marker=marker)
- @dispatch(event="provider.security.key_pairs.find",
- priority=BaseKeyPairService.STANDARD_EVENT_PRIORITY)
- def find(self, **kwargs):
- name = kwargs.pop('name', None)
- # All kwargs should have been popped at this time.
- if len(kwargs) > 0:
- raise InvalidParamException(
- "Unrecognised parameters for search: %s. Supported "
- "attributes: %s" % (kwargs, 'name'))
- log.debug("Searching for Key Pair %s", name)
- return self.svc.find(filters={'key-name': name})
- @dispatch(event="provider.security.key_pairs.create",
- priority=BaseKeyPairService.STANDARD_EVENT_PRIORITY)
- def create(self, name, public_key_material=None):
- AWSKeyPair.assert_valid_resource_name(name)
- private_key = None
- if not public_key_material:
- public_key_material, private_key = cb_helpers.generate_key_pair()
- try:
- kp = self.svc.create('import_key_pair', KeyName=name,
- PublicKeyMaterial=public_key_material)
- kp.material = private_key
- return kp
- except ClientError as e:
- if e.response['Error']['Code'] == 'InvalidKeyPair.Duplicate':
- raise DuplicateResourceException(
- 'Keypair already exists with name {0}'.format(name))
- else:
- raise e
- @dispatch(event="provider.security.key_pairs.delete",
- priority=BaseKeyPairService.STANDARD_EVENT_PRIORITY)
- def delete(self, key_pair):
- key_pair = (key_pair if isinstance(key_pair, AWSKeyPair) else
- self.get(key_pair))
- if key_pair:
- # pylint:disable=protected-access
- key_pair._key_pair.delete()
- class AWSVMFirewallService(BaseVMFirewallService):
- def __init__(self, provider):
- super(AWSVMFirewallService, self).__init__(provider)
- self.svc = BotoEC2Service(provider=self.provider,
- cb_resource=AWSVMFirewall,
- boto_collection_name='security_groups')
- @dispatch(event="provider.security.vm_firewalls.get",
- priority=BaseVMFirewallService.STANDARD_EVENT_PRIORITY)
- def get(self, vm_firewall_id):
- log.debug("Getting Firewall Service with the id: %s", vm_firewall_id)
- return self.svc.get(vm_firewall_id)
- @dispatch(event="provider.security.vm_firewalls.list",
- priority=BaseVMFirewallService.STANDARD_EVENT_PRIORITY)
- def list(self, limit=None, marker=None):
- return self.svc.list(limit=limit, marker=marker)
- @cb_helpers.deprecated_alias(network_id='network')
- @dispatch(event="provider.security.vm_firewalls.create",
- priority=BaseVMFirewallService.STANDARD_EVENT_PRIORITY)
- def create(self, label, network, description=None):
- AWSVMFirewall.assert_valid_resource_label(label)
- # pylint:disable=protected-access
- name = AWSVMFirewall._generate_name_from_label(label, 'cb-fw')
- network_id = network.id if isinstance(network, Network) else network
- obj = self.svc.create('create_security_group', GroupName=name,
- Description=name,
- VpcId=network_id)
- obj.label = label
- obj.description = description
- return obj
- @dispatch(event="provider.security.vm_firewalls.find",
- priority=BaseVMFirewallService.STANDARD_EVENT_PRIORITY)
- def find(self, **kwargs):
- # Filter by name or label
- label = kwargs.pop('label', None)
- log.debug("Searching for Firewall Service %s", label)
- # All kwargs should have been popped at this time.
- if len(kwargs) > 0:
- raise InvalidParamException(
- "Unrecognised parameters for search: %s. Supported "
- "attributes: %s" % (kwargs, 'label'))
- return self.svc.find(filters={'tag:Name': label})
- @dispatch(event="provider.security.vm_firewalls.delete",
- priority=BaseVMFirewallService.STANDARD_EVENT_PRIORITY)
- def delete(self, vm_firewall):
- firewall = (vm_firewall if isinstance(vm_firewall, AWSVMFirewall)
- else self.get(vm_firewall))
- if firewall:
- # pylint:disable=protected-access
- firewall._vm_firewall.delete()
- class AWSVMFirewallRuleService(BaseVMFirewallRuleService):
- def __init__(self, provider):
- super(AWSVMFirewallRuleService, self).__init__(provider)
- @dispatch(event="provider.security.vm_firewall_rules.list",
- priority=BaseVMFirewallRuleService.STANDARD_EVENT_PRIORITY)
- def list(self, firewall, limit=None, marker=None):
- # pylint:disable=protected-access
- rules = [AWSVMFirewallRule(firewall,
- TrafficDirection.INBOUND, r)
- for r in firewall._vm_firewall.ip_permissions]
- # pylint:disable=protected-access
- rules = rules + [
- AWSVMFirewallRule(
- firewall, TrafficDirection.OUTBOUND, r)
- for r in firewall._vm_firewall.ip_permissions_egress]
- return ClientPagedResultList(self.provider, rules,
- limit=limit, marker=marker)
- @dispatch(event="provider.security.vm_firewall_rules.create",
- priority=BaseVMFirewallRuleService.STANDARD_EVENT_PRIORITY)
- def create(self, firewall, direction, protocol=None, from_port=None,
- to_port=None, cidr=None, src_dest_fw=None):
- src_dest_fw_id = (
- src_dest_fw.id if isinstance(src_dest_fw, AWSVMFirewall)
- else src_dest_fw)
- # pylint:disable=protected-access
- ip_perm_entry = AWSVMFirewallRule._construct_ip_perms(
- protocol, from_port, to_port, cidr, src_dest_fw_id)
- # Filter out empty values to please Boto
- ip_perms = [trim_empty_params(ip_perm_entry)]
- try:
- if direction == TrafficDirection.INBOUND:
- # pylint:disable=protected-access
- firewall._vm_firewall.authorize_ingress(
- IpPermissions=ip_perms)
- elif direction == TrafficDirection.OUTBOUND:
- # pylint:disable=protected-access
- firewall._vm_firewall.authorize_egress(
- IpPermissions=ip_perms)
- else:
- raise InvalidValueException("direction", direction)
- firewall.refresh()
- return AWSVMFirewallRule(firewall, direction, ip_perm_entry)
- except ClientError as ec2e:
- if ec2e.response['Error']['Code'] == "InvalidPermission.Duplicate":
- return AWSVMFirewallRule(
- firewall, direction, ip_perm_entry)
- else:
- raise ec2e
- @dispatch(event="provider.security.vm_firewall_rules.delete",
- priority=BaseVMFirewallRuleService.STANDARD_EVENT_PRIORITY)
- def delete(self, firewall, rule):
- # pylint:disable=protected-access
- ip_perm_entry = rule._construct_ip_perms(
- rule.protocol, rule.from_port, rule.to_port,
- rule.cidr, rule.src_dest_fw_id)
- # Filter out empty values to please Boto
- ip_perms = [trim_empty_params(ip_perm_entry)]
- # pylint:disable=protected-access
- if rule.direction == TrafficDirection.INBOUND:
- firewall._vm_firewall.revoke_ingress(
- IpPermissions=ip_perms)
- else:
- # pylint:disable=protected-access
- firewall._vm_firewall.revoke_egress(
- IpPermissions=ip_perms)
- firewall.refresh()
- class AWSStorageService(BaseStorageService):
- def __init__(self, provider):
- super(AWSStorageService, self).__init__(provider)
- # Initialize provider services
- self._volume_svc = AWSVolumeService(self.provider)
- self._snapshot_svc = AWSSnapshotService(self.provider)
- self._bucket_svc = AWSBucketService(self.provider)
- self._bucket_obj_svc = AWSBucketObjectService(self.provider)
- @property
- def volumes(self):
- return self._volume_svc
- @property
- def snapshots(self):
- return self._snapshot_svc
- @property
- def buckets(self):
- return self._bucket_svc
- @property
- def _bucket_objects(self):
- return self._bucket_obj_svc
- class AWSVolumeService(BaseVolumeService):
- def __init__(self, provider):
- super(AWSVolumeService, self).__init__(provider)
- self.svc = BotoEC2Service(provider=self.provider,
- cb_resource=AWSVolume,
- boto_collection_name='volumes')
- @dispatch(event="provider.storage.volumes.get",
- priority=BaseVolumeService.STANDARD_EVENT_PRIORITY)
- def get(self, volume_id):
- cb_vol = self.svc.get(volume_id)
- if cb_vol:
- # pylint:disable=protected-access
- vol_zone = cb_vol._volume.availability_zone
- if vol_zone == self.provider.zone_name:
- return cb_vol
- else:
- msg = ("Volume with id '{}' was found in availability zone "
- "'{}' while the AWS provider is in zone '{}'"
- .format(volume_id, vol_zone,
- self.provider.zone_name))
- raise DifferentZoneException(msg)
- @dispatch(event="provider.storage.volumes.find",
- priority=BaseVolumeService.STANDARD_EVENT_PRIORITY)
- def find(self, **kwargs):
- label = kwargs.pop('label', None)
- # All kwargs should have been popped at this time.
- if len(kwargs) > 0:
- raise InvalidParamException(
- "Unrecognised parameters for search: %s. Supported "
- "attributes: %s" % (kwargs, 'label'))
- log.debug("Searching for AWS Volume Service %s", label)
- return self.svc.find(
- filters={'tag:Name': label,
- 'availability-zone': self.provider.zone_name})
- @dispatch(event="provider.storage.volumes.list",
- priority=BaseVolumeService.STANDARD_EVENT_PRIORITY)
- def list(self, limit=None, marker=None):
- return self.svc.find(
- filters={'availability-zone': self.provider.zone_name},
- limit=limit, marker=marker)
- @dispatch(event="provider.storage.volumes.create",
- priority=BaseVolumeService.STANDARD_EVENT_PRIORITY)
- def create(self, label, size, snapshot=None, description=None):
- AWSVolume.assert_valid_resource_label(label)
- zone_name = self.provider.zone_name
- snapshot_id = snapshot.id if isinstance(
- snapshot, AWSSnapshot) and snapshot else snapshot
- cb_vol = self.svc.create('create_volume', Size=size,
- AvailabilityZone=zone_name,
- SnapshotId=snapshot_id)
- # Wait until ready to tag instance
- cb_vol.wait_till_ready()
- cb_vol.label = label
- if description:
- cb_vol.description = description
- return cb_vol
- @dispatch(event="provider.storage.volumes.delete",
- priority=BaseVolumeService.STANDARD_EVENT_PRIORITY)
- def delete(self, vol):
- # pylint:disable=protected-access
- if (isinstance(vol, AWSVolume)
- and vol._volume.availability_zone == self.provider.zone_name):
- volume = vol
- else:
- volume = self.get(vol)
- if volume:
- # pylint:disable=protected-access
- volume._volume.delete()
- class AWSSnapshotService(BaseSnapshotService):
- def __init__(self, provider):
- super(AWSSnapshotService, self).__init__(provider)
- self.svc = BotoEC2Service(provider=self.provider,
- cb_resource=AWSSnapshot,
- boto_collection_name='snapshots')
- @dispatch(event="provider.storage.snapshots.get",
- priority=BaseSnapshotService.STANDARD_EVENT_PRIORITY)
- def get(self, snapshot_id):
- return self.svc.get(snapshot_id)
- @dispatch(event="provider.storage.snapshots.find",
- priority=BaseSnapshotService.STANDARD_EVENT_PRIORITY)
- def find(self, **kwargs):
- # Filter by description or label
- label = kwargs.get('label', None)
- obj_list = []
- if label:
- log.debug("Searching for AWS Snapshot with label %s", label)
- obj_list.extend(self.svc.find(filters={'tag:Name': label},
- OwnerIds=['self']))
- else:
- obj_list = list(self)
- filters = ['label']
- return cb_helpers.generic_find(filters, kwargs, obj_list)
- @dispatch(event="provider.storage.snapshots.list",
- priority=BaseSnapshotService.STANDARD_EVENT_PRIORITY)
- def list(self, limit=None, marker=None):
- return self.svc.list(limit=limit, marker=marker,
- OwnerIds=['self'])
- @dispatch(event="provider.storage.snapshots.create",
- priority=BaseSnapshotService.STANDARD_EVENT_PRIORITY)
- def create(self, label, volume, description=None):
- AWSSnapshot.assert_valid_resource_label(label)
- volume_id = volume.id if isinstance(volume, AWSVolume) else volume
- cb_snap = self.svc.create('create_snapshot', VolumeId=volume_id)
- # Wait until ready to tag instance
- cb_snap.wait_till_ready()
- cb_snap.label = label
- if cb_snap.description:
- cb_snap.description = description
- return cb_snap
- @dispatch(event="provider.storage.snapshots.delete",
- priority=BaseSnapshotService.STANDARD_EVENT_PRIORITY)
- def delete(self, snapshot):
- snapshot = (snapshot if isinstance(snapshot, AWSSnapshot) else
- self.get(snapshot))
- if snapshot:
- # pylint:disable=protected-access
- snapshot._snapshot.delete()
- class AWSBucketService(BaseBucketService):
- def __init__(self, provider):
- super(AWSBucketService, self).__init__(provider)
- self.svc = BotoS3Service(provider=self.provider,
- cb_resource=AWSBucket,
- boto_collection_name='buckets')
- @dispatch(event="provider.storage.buckets.get",
- priority=BaseBucketService.STANDARD_EVENT_PRIORITY)
- def get(self, bucket_id):
- """
- Returns a bucket given its ID. Returns ``None`` if the bucket
- does not exist.
- """
- try:
- # Make a call to make sure the bucket exists. There's an edge case
- # where a 403 response can occur when the bucket exists but the
- # user simply does not have permissions to access it. See below.
- self.provider.s3_conn.meta.client.head_bucket(Bucket=bucket_id)
- return AWSBucket(self.provider,
- self.provider.s3_conn.Bucket(bucket_id))
- except ClientError as e:
- # If 403, it means the bucket exists, but the user does not have
- # permissions to access the bucket. However, limited operations
- # may be permitted (with a session token for example), so return a
- # Bucket instance to allow further operations.
- # http://stackoverflow.com/questions/32331456/using-boto-upload-file-to-s3-
- # sub-folder-when-i-have-no-permissions-on-listing-fo
- if e.response['Error']['Code'] == "403":
- log.warning("AWS Bucket %s already exists but user doesn't "
- "have enough permissions to access the bucket",
- bucket_id)
- return AWSBucket(self.provider,
- self.provider.s3_conn.Bucket(bucket_id))
- # For all other responses, it's assumed that the bucket does not exist.
- return None
- @dispatch(event="provider.storage.buckets.list",
- priority=BaseBucketService.STANDARD_EVENT_PRIORITY)
- def list(self, limit=None, marker=None):
- return self.svc.list(limit=limit, marker=marker)
- @dispatch(event="provider.storage.buckets.create",
- priority=BaseBucketService.STANDARD_EVENT_PRIORITY)
- def create(self, name, location=None):
- AWSBucket.assert_valid_resource_name(name)
- location = location or self.provider.region_name
- # Due to an API issue in S3, specifying us-east-1 as a
- # LocationConstraint results in an InvalidLocationConstraint.
- # Therefore, it must be special-cased and omitted altogether.
- # See: https://github.com/boto/boto3/issues/125
- # In addition, us-east-1 also behaves differently when it comes
- # to raising duplicate resource exceptions, so perform a manual
- # check
- if location == 'us-east-1':
- try:
- # check whether bucket already exists
- self.provider.s3_conn.meta.client.head_bucket(Bucket=name)
- except ClientError as e:
- if e.response['Error']['Code'] == "404":
- # bucket doesn't exist, go ahead and create it
- return self.svc.create('create_bucket', Bucket=name)
- raise DuplicateResourceException(
- 'Bucket already exists with name {0}'.format(name))
- else:
- try:
- return self.svc.create('create_bucket', Bucket=name,
- CreateBucketConfiguration={
- 'LocationConstraint': location
- })
- except ClientError as e:
- if e.response['Error']['Code'] == "BucketAlreadyOwnedByYou":
- raise DuplicateResourceException(
- 'Bucket already exists with name {0}'.format(name))
- else:
- raise
- @dispatch(event="provider.storage.buckets.delete",
- priority=BaseBucketService.STANDARD_EVENT_PRIORITY)
- def delete(self, bucket):
- b = bucket if isinstance(bucket, AWSBucket) else self.get(bucket)
- if b:
- # pylint:disable=protected-access
- b._bucket.delete()
- class AWSBucketObjectService(BaseBucketObjectService):
- def __init__(self, provider):
- super(AWSBucketObjectService, self).__init__(provider)
- def get(self, bucket, object_id):
- try:
- # pylint:disable=protected-access
- obj = bucket._bucket.Object(object_id)
- # load() throws an error if object does not exist
- obj.load()
- return AWSBucketObject(self.provider, obj)
- except ClientError:
- return None
- def list(self, bucket, limit=None, marker=None, prefix=None):
- if prefix:
- # pylint:disable=protected-access
- boto_objs = bucket._bucket.objects.filter(Prefix=prefix)
- else:
- # pylint:disable=protected-access
- boto_objs = bucket._bucket.objects.all()
- objects = [AWSBucketObject(self.provider, obj) for obj in boto_objs]
- return ClientPagedResultList(self.provider, objects,
- limit=limit, marker=marker)
- def find(self, bucket, **kwargs):
- # pylint:disable=protected-access
- obj_list = [AWSBucketObject(self.provider, o)
- for o in bucket._bucket.objects.all()]
- filters = ['name']
- matches = cb_helpers.generic_find(filters, kwargs, obj_list)
- return ClientPagedResultList(self.provider, list(matches),
- limit=None, marker=None)
- def create(self, bucket, name):
- # pylint:disable=protected-access
- obj = bucket._bucket.Object(name)
- return AWSBucketObject(self.provider, obj)
- class AWSComputeService(BaseComputeService):
- def __init__(self, provider):
- super(AWSComputeService, self).__init__(provider)
- self._vm_type_svc = AWSVMTypeService(self.provider)
- self._instance_svc = AWSInstanceService(self.provider)
- self._region_svc = AWSRegionService(self.provider)
- self._images_svc = AWSImageService(self.provider)
- @property
- def images(self):
- return self._images_svc
- @property
- def vm_types(self):
- return self._vm_type_svc
- @property
- def instances(self):
- return self._instance_svc
- @property
- def regions(self):
- return self._region_svc
- class AWSImageService(BaseImageService):
- def __init__(self, provider):
- super(AWSImageService, self).__init__(provider)
- self.svc = BotoEC2Service(provider=self.provider,
- cb_resource=AWSMachineImage,
- boto_collection_name='images')
- def get(self, image_id):
- log.debug("Getting AWS Image Service with the id: %s", image_id)
- return self.svc.get(image_id)
- def find(self, **kwargs):
- # Filter by name or label
- label = kwargs.pop('label', None)
- # Popped here, not used in the generic find
- owner = kwargs.pop('owners', None)
- # All kwargs should have been popped at this time.
- if len(kwargs) > 0:
- raise InvalidParamException(
- "Unrecognised parameters for search: %s. Supported "
- "attributes: %s" % (kwargs, 'label'))
- extra_args = {}
- if owner:
- extra_args.update(Owners=owner)
- # The original list is made by combining both searches by "tag:Name"
- # and "AMI name" to allow for searches of public images
- if label:
- log.debug("Searching for AWS Image Service %s", label)
- obj_list = []
- obj_list.extend(
- self.svc.find(filters={'name': label}, **extra_args))
- obj_list.extend(
- self.svc.find(filters={'tag:Name': label}, **extra_args))
- return obj_list
- else:
- return []
- def list(self, filter_by_owner=True, limit=None, marker=None):
- return self.svc.list(Owners=['self'] if filter_by_owner else
- ['amazon', 'self'],
- limit=limit, marker=marker)
- class AWSInstanceService(BaseInstanceService):
- def __init__(self, provider):
- super(AWSInstanceService, self).__init__(provider)
- self.svc = BotoEC2Service(provider=self.provider,
- cb_resource=AWSInstance,
- boto_collection_name='instances')
- def _resolve_launch_options(self, subnet=None, zone_id=None,
- vm_firewalls=None):
- """
- Work out interdependent launch options.
- Some launch options are required and interdependent so make sure
- they conform to the interface contract.
- :type subnet: ``Subnet``
- :param subnet: Subnet object within which to launch.
- :type zone_id: ``str``
- :param zone_id: ID of the zone where the launch should happen.
- :type vm_firewalls: ``list`` of ``id``
- :param vm_firewalls: List of firewall IDs.
- :rtype: triplet of ``str``
- :return: Subnet ID, zone ID and VM firewall IDs for launch.
- :raise ValueError: In case a conflicting combination is found.
- """
- if subnet:
- # subnet's zone takes precedence
- zone_id = subnet.zone.id
- if vm_firewalls and isinstance(vm_firewalls, list) and isinstance(
- vm_firewalls[0], VMFirewall):
- vm_firewall_ids = [fw.id for fw in vm_firewalls]
- else:
- vm_firewall_ids = vm_firewalls
- return subnet.id if subnet else None, zone_id, vm_firewall_ids
- def _process_block_device_mappings(self, launch_config):
- """
- Processes block device mapping information
- and returns a Boto BlockDeviceMapping object. If new volumes
- are requested (source is None and destination is VOLUME), they will be
- created and the relevant volume ids included in the mapping.
- """
- bdml = []
- # Assign letters from f onwards
- # http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/device_naming.html
- next_letter = iter(list(string.ascii_lowercase[6:]))
- # assign ephemeral devices from 0 onwards
- ephemeral_counter = 0
- for device in launch_config.block_devices:
- bdm = {}
- if device.is_volume:
- # Generate the device path
- bdm['DeviceName'] = \
- '/dev/sd' + ('a1' if device.is_root else next(next_letter))
- ebs_def = {}
- if isinstance(device.source, Snapshot):
- ebs_def['SnapshotId'] = device.source.id
- elif isinstance(device.source, Volume):
- # TODO: We could create a snapshot from the volume
- # and use that instead.
- # Not supported
- pass
- elif isinstance(device.source, MachineImage):
- # Not supported
- pass
- else:
- # source is None, but destination is volume, therefore
- # create a blank volume. This requires a size though.
- if not device.size:
- raise InvalidConfigurationException(
- "The source is none and the destination is a"
- " volume. Therefore, you must specify a size.")
- ebs_def['DeleteOnTermination'] = device.delete_on_terminate \
- or True
- if device.size:
- ebs_def['VolumeSize'] = device.size
- if ebs_def:
- bdm['Ebs'] = ebs_def
- else: # device is ephemeral
- bdm['VirtualName'] = 'ephemeral%s' % ephemeral_counter
- # Append the config
- bdml.append(bdm)
- return bdml
- def create_launch_config(self):
- return AWSLaunchConfig(self.provider)
- @dispatch(event="provider.compute.instances.create",
- priority=BaseInstanceService.STANDARD_EVENT_PRIORITY)
- def create(self, label, image, vm_type, subnet,
- key_pair=None, vm_firewalls=None, user_data=None,
- launch_config=None, **kwargs):
- AWSInstance.assert_valid_resource_label(label)
- image_id = image.id if isinstance(image, MachineImage) else image
- vm_size = vm_type.id if \
- isinstance(vm_type, VMType) else vm_type
- subnet = (self.provider.networking.subnets.get(subnet)
- if isinstance(subnet, str) else subnet)
- zone_name = self.provider.zone_name
- key_pair_name = key_pair.name if isinstance(
- key_pair,
- KeyPair) else key_pair
- if launch_config:
- bdm = self._process_block_device_mappings(launch_config)
- else:
- bdm = None
- subnet_id, zone_id, vm_firewall_ids = \
- self._resolve_launch_options(subnet, zone_name, vm_firewalls)
- placement = {'AvailabilityZone': zone_id} if zone_id else None
- inst = self.svc.create('create_instances',
- ImageId=image_id,
- MinCount=1,
- MaxCount=1,
- KeyName=key_pair_name,
- SecurityGroupIds=vm_firewall_ids or None,
- UserData=str(user_data) or None,
- InstanceType=vm_size,
- Placement=placement,
- BlockDeviceMappings=bdm,
- SubnetId=subnet_id
- )
- if inst and len(inst) == 1:
- # Wait until the resource exists
- # pylint:disable=protected-access
- inst[0]._wait_till_exists()
- # Tag the instance w/ the name
- inst[0].label = label
- return inst[0]
- raise ValueError(
- 'Expected a single object response, got a list: %s' % inst)
- @dispatch(event="provider.compute.instances.get",
- priority=BaseInstanceService.STANDARD_EVENT_PRIORITY)
- def get(self, instance_id):
- cb_ins = self.svc.get(instance_id)
- if cb_ins:
- # pylint:disable=protected-access
- ins_zone = cb_ins._ec2_instance.placement.get('AvailabilityZone',
- '')
- if ins_zone == self.provider.zone_name:
- return cb_ins
- else:
- msg = ("Instance with id '{}' was found in availability zone "
- "'{}' while the AWS provider is in zone '{}'"
- .format(instance_id, ins_zone,
- self.provider.zone_name))
- raise DifferentZoneException(msg)
- @dispatch(event="provider.compute.instances.find",
- priority=BaseInstanceService.STANDARD_EVENT_PRIORITY)
- def find(self, **kwargs):
- label = kwargs.pop('label', None)
- # All kwargs should have been popped at this time.
- if len(kwargs) > 0:
- raise InvalidParamException(
- "Unrecognised parameters for search: %s. Supported "
- "attributes: %s" % (kwargs, 'label'))
- return self.svc.find(
- filters={'tag:Name': label,
- 'availability-zone': self.provider.zone_name})
- @dispatch(event="provider.compute.instances.list",
- priority=BaseInstanceService.STANDARD_EVENT_PRIORITY)
- def list(self, limit=None, marker=None):
- return self.svc.find(
- filters={'availability-zone': self.provider.zone_name},
- limit=limit, marker=marker)
- @dispatch(event="provider.compute.instances.delete",
- priority=BaseInstanceService.STANDARD_EVENT_PRIORITY)
- def delete(self, instance):
- # pylint:disable=protected-access
- if (isinstance(instance, AWSInstance)
- and instance._ec2_instance
- .placement
- .get('AvailabilityZone',
- '') == self.provider.zone_name):
- aws_inst = instance
- else:
- aws_inst = self.get(instance)
- if aws_inst:
- # pylint:disable=protected-access
- aws_inst._ec2_instance.terminate()
- class AWSVMTypeService(BaseVMTypeService):
- def __init__(self, provider):
- super(AWSVMTypeService, self).__init__(provider)
- @property
- @cachetools.cached(cachetools.TTLCache(maxsize=1, ttl=24*3600))
- def instance_data(self):
- """
- Fetch info about the available instances.
- To update this information, update the file pointed to by the
- ``provider.AWS_INSTANCE_DATA_DEFAULT_URL`` above. The content for this
- file should be obtained from this repo:
- https://github.com/powdahound/ec2instances.info (in particular, this
- file: https://raw.githubusercontent.com/powdahound/ec2instances.info/
- master/www/instances.json).
- """
- r = requests.get(self.provider.config.get(
- "aws_instance_info_url",
- self.provider.AWS_INSTANCE_DATA_DEFAULT_URL))
- # Some instances are only available in certain regions. Use pricing
- # info to determine and filter out instance types that are not
- # available in the current region
- vm_types_list = r.json()
- return [vm_type for vm_type in vm_types_list
- if vm_type.get('pricing', {}).get(self.provider.region_name)]
- @dispatch(event="provider.compute.vm_types.list",
- priority=BaseVMTypeService.STANDARD_EVENT_PRIORITY)
- def list(self, limit=None, marker=None):
- vm_types = [AWSVMType(self.provider, vm_type)
- for vm_type in self.instance_data]
- return ClientPagedResultList(self.provider, vm_types,
- limit=limit, marker=marker)
- class AWSRegionService(BaseRegionService):
- def __init__(self, provider):
- super(AWSRegionService, self).__init__(provider)
- @dispatch(event="provider.compute.regions.get",
- priority=BaseRegionService.STANDARD_EVENT_PRIORITY)
- def get(self, region_id):
- log.debug("Getting AWS Region Service with the id: %s",
- region_id)
- region = [r for r in self if r.id == region_id]
- if region:
- return region[0]
- else:
- return None
- @dispatch(event="provider.compute.regions.list",
- priority=BaseRegionService.STANDARD_EVENT_PRIORITY)
- def list(self, limit=None, marker=None):
- regions = [
- AWSRegion(self.provider, region) for region in
- self.provider.ec2_conn.meta.client.describe_regions()
- .get('Regions', [])]
- return ClientPagedResultList(self.provider, regions,
- limit=limit, marker=marker)
- @property
- def current(self):
- return self.get(self._provider.region_name)
- class AWSNetworkingService(BaseNetworkingService):
- def __init__(self, provider):
- super(AWSNetworkingService, self).__init__(provider)
- self._network_service = AWSNetworkService(self.provider)
- self._subnet_service = AWSSubnetService(self.provider)
- self._router_service = AWSRouterService(self.provider)
- self._gateway_service = AWSGatewayService(self.provider)
- self._floating_ip_service = AWSFloatingIPService(self.provider)
- @property
- def networks(self):
- return self._network_service
- @property
- def subnets(self):
- return self._subnet_service
- @property
- def routers(self):
- return self._router_service
- @property
- def _gateways(self):
- return self._gateway_service
- @property
- def _floating_ips(self):
- return self._floating_ip_service
- class AWSNetworkService(BaseNetworkService):
- def __init__(self, provider):
- super(AWSNetworkService, self).__init__(provider)
- self.svc = BotoEC2Service(provider=self.provider,
- cb_resource=AWSNetwork,
- boto_collection_name='vpcs')
- @dispatch(event="provider.networking.networks.get",
- priority=BaseNetworkService.STANDARD_EVENT_PRIORITY)
- def get(self, network_id):
- return self.svc.get(network_id)
- @dispatch(event="provider.networking.networks.list",
- priority=BaseNetworkService.STANDARD_EVENT_PRIORITY)
- def list(self, limit=None, marker=None):
- return self.svc.list(limit=limit, marker=marker)
- @dispatch(event="provider.networking.networks.find",
- priority=BaseNetworkService.STANDARD_EVENT_PRIORITY)
- def find(self, **kwargs):
- label = kwargs.pop('label', None)
- # All kwargs should have been popped at this time.
- if len(kwargs) > 0:
- raise InvalidParamException(
- "Unrecognised parameters for search: %s. Supported "
- "attributes: %s" % (kwargs, 'label'))
- log.debug("Searching for AWS Network Service %s", label)
- return self.svc.find(filters={'tag:Name': label})
- @dispatch(event="provider.networking.networks.create",
- priority=BaseNetworkService.STANDARD_EVENT_PRIORITY)
- def create(self, label, cidr_block):
- AWSNetwork.assert_valid_resource_label(label)
- cb_net = self.svc.create('create_vpc', CidrBlock=cidr_block)
- # Wait until ready to tag instance
- cb_net.wait_till_ready()
- if label:
- cb_net.label = label
- return cb_net
- @dispatch(event="provider.networking.networks.delete",
- priority=BaseNetworkService.STANDARD_EVENT_PRIORITY)
- def delete(self, network):
- network = (network if isinstance(network, AWSNetwork)
- else self.get(network))
- if network:
- # pylint:disable=protected-access
- network._vpc.delete()
- def get_or_create_default(self):
- # # Look for provided default network
- # for net in self.provider.networking.networks:
- # pylint:disable=protected-access
- # if net._vpc.is_default:
- # return net
- # No provider-default, try CB-default instead
- default_nets = self.provider.networking.networks.find(
- label=AWSNetwork.CB_DEFAULT_NETWORK_LABEL)
- if default_nets:
- return default_nets[0]
- else:
- log.info("Creating a CloudBridge-default network labeled %s",
- AWSNetwork.CB_DEFAULT_NETWORK_LABEL)
- return self.provider.networking.networks.create(
- label=AWSNetwork.CB_DEFAULT_NETWORK_LABEL,
- cidr_block=AWSNetwork.CB_DEFAULT_IPV4RANGE)
- class AWSSubnetService(BaseSubnetService):
- def __init__(self, provider):
- super(AWSSubnetService, self).__init__(provider)
- self.svc = BotoEC2Service(provider=self.provider,
- cb_resource=AWSSubnet,
- boto_collection_name='subnets')
- @dispatch(event="provider.networking.subnets.get",
- priority=BaseSubnetService.STANDARD_EVENT_PRIORITY)
- def get(self, subnet_id):
- return self.svc.get(subnet_id)
- @dispatch(event="provider.networking.subnets.list",
- priority=BaseSubnetService.STANDARD_EVENT_PRIORITY)
- def list(self, network=None, limit=None, marker=None):
- network_id = network.id if isinstance(network, AWSNetwork) else network
- if network_id:
- return self.svc.find(
- filters={'vpc-id': network_id,
- 'availability-zone': self.provider.zone_name},
- limit=limit, marker=marker)
- else:
- return self.svc.find(
- filters={'availability-zone': self.provider.zone_name},
- limit=limit, marker=marker)
- @dispatch(event="provider.networking.subnets.find",
- priority=BaseSubnetService.STANDARD_EVENT_PRIORITY)
- def find(self, network=None, **kwargs):
- label = kwargs.pop('label', None)
- # All kwargs should have been popped at this time.
- if len(kwargs) > 0:
- raise InvalidParamException(
- "Unrecognised parameters for search: %s. Supported "
- "attributes: %s" % (kwargs, 'label'))
- log.debug("Searching for AWS Subnet Service %s", label)
- return self.svc.find(
- filters={'tag:Name': label,
- 'availability-zone': self.provider.zone_name})
- @dispatch(event="provider.networking.subnets.create",
- priority=BaseSubnetService.STANDARD_EVENT_PRIORITY)
- def create(self, label, network, cidr_block):
- AWSSubnet.assert_valid_resource_label(label)
- zone_name = self.provider.zone_name
- network_id = network.id if isinstance(network, AWSNetwork) else network
- subnet = self.svc.create('create_subnet',
- VpcId=network_id,
- CidrBlock=cidr_block,
- AvailabilityZone=zone_name)
- if label:
- subnet.label = label
- return subnet
- @dispatch(event="provider.networking.subnets.delete",
- priority=BaseSubnetService.STANDARD_EVENT_PRIORITY)
- def delete(self, subnet):
- sn = subnet if isinstance(subnet, AWSSubnet) else self.get(subnet)
- if sn:
- # pylint:disable=protected-access
- sn._subnet.delete()
- def get_or_create_default(self):
- zone_name = self.provider.zone_name
- # # Look for provider default subnet in current zone
- # if zone_name:
- # snl = self.svc.find('availabilityZone', zone_name)
- #
- # else:
- # snl = self.svc.list()
- # # Find first available default subnet by sorted order
- # # of availability zone. Prefer zone us-east-1a over 1e,
- # # because newer zones tend to have less compatibility
- # # with different instance types (e.g. c5.large not available
- # # on us-east-1e as of 14 Dec. 2017).
- # # pylint:disable=protected-access
- # snl.sort(key=lambda sn: sn._subnet.availability_zone)
- #
- # for sn in snl:
- # # pylint:disable=protected-access
- # if sn._subnet.default_for_az:
- # return sn
- # If no provider-default subnet has been found, look for
- # cloudbridge-default by label. We suffix labels by availability zone,
- # thus we add the wildcard for the regular expression to find the
- # subnet
- snl = self.find(label=AWSSubnet.CB_DEFAULT_SUBNET_LABEL + "*")
- if snl:
- # pylint:disable=protected-access
- snl.sort(key=lambda sn: sn._subnet.availability_zone)
- for subnet in snl:
- if subnet.zone.name == zone_name:
- return subnet
- # No default Subnet exists, try to create a CloudBridge-specific
- # subnet. This involves creating the network, subnets, internet
- # gateway, and connecting it all together so that the network has
- # Internet connectivity.
- # Check if a default net already exists and get it or create on
- default_net = self.provider.networking.networks.get_or_create_default()
- # Get/create an internet gateway for the default network and a
- # corresponding router if it does not already exist.
- # NOTE: Comment this out because the docs instruct users to setup
- # network connectivity manually. There's a bit of discrepancy here
- # though because the provider-default network will have Internet
- # connectivity (unlike the CloudBridge-default network with this
- # being commented) and is hence left in the codebase.
- # default_gtw = default_net.gateways.get_or_create()
- # router_label = "{0}-router".format(
- # AWSNetwork.CB_DEFAULT_NETWORK_LABEL)
- # default_routers = self.provider.networking.routers.find(
- # label=router_label)
- # if len(default_routers) == 0:
- # default_router = self.provider.networking.routers.create(
- # router_label, default_net)
- # default_router.attach_gateway(default_gtw)
- # else:
- # default_router = default_routers[0]
- # Create a subnet in each of the region's zones
- region = self.provider.compute.regions.get(self.provider.region_name)
- default_sn = None
- # Determine how many subnets we'll need for the default network and the
- # number of available zones. We need to derive a non-overlapping
- # network size for each subnet within the parent net so figure those
- # subnets here. `<net>.subnets` method will do this but we need to give
- # it a prefix. Determining that prefix depends on the size of the
- # network and should be incorporate the number of zones. So iterate
- # over potential number of subnets until enough can be created to
- # accommodate the number of available zones. That is where the fixed
- # number comes from in the for loop as that many iterations will yield
- # more potential subnets than any region has zones.
- ip_net = ipaddress.ip_network(AWSNetwork.CB_DEFAULT_IPV4RANGE)
- for x in range(5):
- if len(region.zones) <= len(list(ip_net.subnets(
- prefixlen_diff=x))):
- prefixlen_diff = x
- break
- subnets = list(ip_net.subnets(prefixlen_diff=prefixlen_diff))
- for i, z in reversed(list(enumerate(region.zones))):
- if zone_name == z.name:
- sn_label = "{0}-{1}".format(AWSSubnet.CB_DEFAULT_SUBNET_LABEL,
- z.id[-1])
- log.info("Creating a default CloudBridge subnet %s: %s" %
- (sn_label, str(subnets[i])))
- sn = self.create(sn_label, default_net, str(subnets[i]))
- # Create a route table entry between the SN and the inet
- # gateway. See note above about why this is commented
- # default_router.attach_subnet(sn)
- default_sn = sn
- # No specific zone was supplied; return the last created subnet
- # The list was originally reversed to have the last subnet be in zone a
- if not default_sn:
- default_sn = sn
- return default_sn
- class AWSRouterService(BaseRouterService):
- """For AWS, a CloudBridge router corresponds to an AWS Route Table."""
- def __init__(self, provider):
- super(AWSRouterService, self).__init__(provider)
- self.svc = BotoEC2Service(provider=self.provider,
- cb_resource=AWSRouter,
- boto_collection_name='route_tables')
- @dispatch(event="provider.networking.routers.get",
- priority=BaseRouterService.STANDARD_EVENT_PRIORITY)
- def get(self, router_id):
- return self.svc.get(router_id)
- @dispatch(event="provider.networking.routers.find",
- priority=BaseRouterService.STANDARD_EVENT_PRIORITY)
- def find(self, **kwargs):
- label = kwargs.pop('label', None)
- # All kwargs should have been popped at this time.
- if len(kwargs) > 0:
- raise InvalidParamException(
- "Unrecognised parameters for search: %s. Supported "
- "attributes: %s" % (kwargs, 'label'))
- log.debug("Searching for AWS Router Service %s", label)
- return self.svc.find(filters={'tag:Name': label})
- @dispatch(event="provider.networking.routers.list",
- priority=BaseRouterService.STANDARD_EVENT_PRIORITY)
- def list(self, limit=None, marker=None):
- return self.svc.list(limit=limit, marker=marker)
- @dispatch(event="provider.networking.routers.create",
- priority=BaseRouterService.STANDARD_EVENT_PRIORITY)
- def create(self, label, network):
- network_id = network.id if isinstance(network, AWSNetwork) else network
- cb_router = self.svc.create('create_route_table', VpcId=network_id)
- if label:
- cb_router.label = label
- return cb_router
- @dispatch(event="provider.networking.routers.delete",
- priority=BaseRouterService.STANDARD_EVENT_PRIORITY)
- def delete(self, router):
- r = router if isinstance(router, AWSRouter) else self.get(router)
- if r:
- # pylint:disable=protected-access
- r._route_table.delete()
- class AWSGatewayService(BaseGatewayService):
- def __init__(self, provider):
- super(AWSGatewayService, self).__init__(provider)
- self.svc = BotoEC2Service(provider=provider,
- cb_resource=AWSInternetGateway,
- boto_collection_name='internet_gateways')
- @dispatch(event="provider.networking.gateways.get_or_create",
- priority=BaseGatewayService.STANDARD_EVENT_PRIORITY)
- def get_or_create(self, network):
- network_id = network.id if isinstance(
- network, AWSNetwork) else network
- # Don't filter by label because it may conflict with at least the
- # default VPC that most accounts have but that network is typically
- # without a name.
- gtw = self.svc.find(filters={'attachment.vpc-id': network_id})
- if gtw:
- return gtw[0] # There can be only one gtw attached to a VPC
- # Gateway does not exist so create one and attach to the supplied net
- cb_gateway = self.svc.create('create_internet_gateway')
- cb_gateway._gateway.create_tags(
- Tags=[{'Key': 'Name',
- 'Value': AWSInternetGateway.CB_DEFAULT_INET_GATEWAY_NAME
- }])
- cb_gateway._gateway.attach_to_vpc(VpcId=network_id)
- return cb_gateway
- @dispatch(event="provider.networking.gateways.delete",
- priority=BaseGatewayService.STANDARD_EVENT_PRIORITY)
- def delete(self, network, gateway):
- gw = (gateway if isinstance(gateway, AWSInternetGateway)
- else self.svc.get(gateway))
- try:
- if gw.network_id:
- # pylint:disable=protected-access
- gw._gateway.detach_from_vpc(VpcId=gw.network_id)
- except ClientError as e:
- log.warn("Error deleting gateway {0}: {1}".format(self.id, e))
- # pylint:disable=protected-access
- gw._gateway.delete()
- @dispatch(event="provider.networking.gateways.list",
- priority=BaseGatewayService.STANDARD_EVENT_PRIORITY)
- def list(self, network, limit=None, marker=None):
- log.debug("Listing current AWS internet gateways for net %s.",
- network.id)
- fltr = [{'Name': 'attachment.vpc-id', 'Values': [network.id]}]
- return self.svc.list(limit=None, marker=None, Filters=fltr)
- class AWSFloatingIPService(BaseFloatingIPService):
- def __init__(self, provider):
- super(AWSFloatingIPService, self).__init__(provider)
- self.svc = BotoEC2Service(provider=self.provider,
- cb_resource=AWSFloatingIP,
- boto_collection_name='vpc_addresses')
- @dispatch(event="provider.networking.floating_ips.get",
- priority=BaseFloatingIPService.STANDARD_EVENT_PRIORITY)
- def get(self, gateway, fip_id):
- log.debug("Getting AWS Floating IP Service with the id: %s", fip_id)
- return self.svc.get(fip_id)
- @dispatch(event="provider.networking.floating_ips.list",
- priority=BaseFloatingIPService.STANDARD_EVENT_PRIORITY)
- def list(self, gateway, limit=None, marker=None):
- return self.svc.list(limit, marker)
- @dispatch(event="provider.networking.floating_ips.create",
- priority=BaseFloatingIPService.STANDARD_EVENT_PRIORITY)
- def create(self, gateway):
- log.debug("Creating a floating IP under gateway %s", gateway)
- ip = self.provider.ec2_conn.meta.client.allocate_address(
- Domain='vpc')
- return AWSFloatingIP(
- self.provider,
- self.provider.ec2_conn.VpcAddress(ip.get('AllocationId')))
- @dispatch(event="provider.networking.floating_ips.delete",
- priority=BaseFloatingIPService.STANDARD_EVENT_PRIORITY)
- def delete(self, gateway, fip):
- if isinstance(fip, AWSFloatingIP):
- # pylint:disable=protected-access
- aws_fip = fip._ip
- else:
- aws_fip = self.svc.get_raw(fip)
- aws_fip.release()
|