services.py 51 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247
  1. """Services implemented by the AWS provider."""
  2. import ipaddress
  3. import logging
  4. import string
  5. from botocore.exceptions import ClientError
  6. import cachetools
  7. import requests
  8. import cloudbridge.cloud.base.helpers as cb_helpers
  9. from cloudbridge.cloud.base.middleware import dispatch
  10. from cloudbridge.cloud.base.resources import ClientPagedResultList
  11. from cloudbridge.cloud.base.services import BaseBucketObjectService
  12. from cloudbridge.cloud.base.services import BaseBucketService
  13. from cloudbridge.cloud.base.services import BaseComputeService
  14. from cloudbridge.cloud.base.services import BaseFloatingIPService
  15. from cloudbridge.cloud.base.services import BaseGatewayService
  16. from cloudbridge.cloud.base.services import BaseImageService
  17. from cloudbridge.cloud.base.services import BaseInstanceService
  18. from cloudbridge.cloud.base.services import BaseKeyPairService
  19. from cloudbridge.cloud.base.services import BaseNetworkService
  20. from cloudbridge.cloud.base.services import BaseNetworkingService
  21. from cloudbridge.cloud.base.services import BaseRegionService
  22. from cloudbridge.cloud.base.services import BaseRouterService
  23. from cloudbridge.cloud.base.services import BaseSecurityService
  24. from cloudbridge.cloud.base.services import BaseSnapshotService
  25. from cloudbridge.cloud.base.services import BaseStorageService
  26. from cloudbridge.cloud.base.services import BaseSubnetService
  27. from cloudbridge.cloud.base.services import BaseVMFirewallRuleService
  28. from cloudbridge.cloud.base.services import BaseVMFirewallService
  29. from cloudbridge.cloud.base.services import BaseVMTypeService
  30. from cloudbridge.cloud.base.services import BaseVolumeService
  31. from cloudbridge.cloud.interfaces.exceptions import DuplicateResourceException
  32. from cloudbridge.cloud.interfaces.exceptions import \
  33. InvalidConfigurationException
  34. from cloudbridge.cloud.interfaces.exceptions import InvalidParamException
  35. from cloudbridge.cloud.interfaces.exceptions import InvalidValueException
  36. from cloudbridge.cloud.interfaces.resources import KeyPair
  37. from cloudbridge.cloud.interfaces.resources import MachineImage
  38. from cloudbridge.cloud.interfaces.resources import Network
  39. from cloudbridge.cloud.interfaces.resources import PlacementZone
  40. from cloudbridge.cloud.interfaces.resources import Snapshot
  41. from cloudbridge.cloud.interfaces.resources import TrafficDirection
  42. from cloudbridge.cloud.interfaces.resources import VMFirewall
  43. from cloudbridge.cloud.interfaces.resources import VMType
  44. from cloudbridge.cloud.interfaces.resources import Volume
  45. from .helpers import BotoEC2Service
  46. from .helpers import BotoS3Service
  47. from .helpers import trim_empty_params
  48. from .resources import AWSBucket
  49. from .resources import AWSBucketObject
  50. from .resources import AWSFloatingIP
  51. from .resources import AWSInstance
  52. from .resources import AWSInternetGateway
  53. from .resources import AWSKeyPair
  54. from .resources import AWSLaunchConfig
  55. from .resources import AWSMachineImage
  56. from .resources import AWSNetwork
  57. from .resources import AWSPlacementZone
  58. from .resources import AWSRegion
  59. from .resources import AWSRouter
  60. from .resources import AWSSnapshot
  61. from .resources import AWSSubnet
  62. from .resources import AWSVMFirewall
  63. from .resources import AWSVMFirewallRule
  64. from .resources import AWSVMType
  65. from .resources import AWSVolume
  66. log = logging.getLogger(__name__)
  67. class AWSSecurityService(BaseSecurityService):
  68. def __init__(self, provider):
  69. super(AWSSecurityService, self).__init__(provider)
  70. # Initialize provider services
  71. self._key_pairs = AWSKeyPairService(provider)
  72. self._vm_firewalls = AWSVMFirewallService(provider)
  73. @property
  74. def key_pairs(self):
  75. return self._key_pairs
  76. @property
  77. def vm_firewalls(self):
  78. return self._vm_firewalls
  79. class AWSKeyPairService(BaseKeyPairService):
  80. def __init__(self, provider):
  81. super(AWSKeyPairService, self).__init__(provider)
  82. self.svc = BotoEC2Service(provider=self.provider,
  83. cb_resource=AWSKeyPair,
  84. boto_collection_name='key_pairs')
  85. @dispatch(event="provider.security.key_pairs.get",
  86. priority=BaseKeyPairService.STANDARD_EVENT_PRIORITY)
  87. def get(self, key_pair_id):
  88. log.debug("Getting Key Pair Service %s", key_pair_id)
  89. return self.svc.get(key_pair_id)
  90. @dispatch(event="provider.security.key_pairs.list",
  91. priority=BaseKeyPairService.STANDARD_EVENT_PRIORITY)
  92. def list(self, limit=None, marker=None):
  93. return self.svc.list(limit=limit, marker=marker)
  94. @dispatch(event="provider.security.key_pairs.find",
  95. priority=BaseKeyPairService.STANDARD_EVENT_PRIORITY)
  96. def find(self, **kwargs):
  97. name = kwargs.pop('name', None)
  98. # All kwargs should have been popped at this time.
  99. if len(kwargs) > 0:
  100. raise InvalidParamException(
  101. "Unrecognised parameters for search: %s. Supported "
  102. "attributes: %s" % (kwargs, 'name'))
  103. log.debug("Searching for Key Pair %s", name)
  104. return self.svc.find(filter_name='key-name', filter_value=name)
  105. @dispatch(event="provider.security.key_pairs.create",
  106. priority=BaseKeyPairService.STANDARD_EVENT_PRIORITY)
  107. def create(self, name, public_key_material=None):
  108. AWSKeyPair.assert_valid_resource_name(name)
  109. private_key = None
  110. if not public_key_material:
  111. public_key_material, private_key = cb_helpers.generate_key_pair()
  112. try:
  113. kp = self.svc.create('import_key_pair', KeyName=name,
  114. PublicKeyMaterial=public_key_material)
  115. kp.material = private_key
  116. return kp
  117. except ClientError as e:
  118. if e.response['Error']['Code'] == 'InvalidKeyPair.Duplicate':
  119. raise DuplicateResourceException(
  120. 'Keypair already exists with name {0}'.format(name))
  121. else:
  122. raise e
  123. @dispatch(event="provider.security.key_pairs.delete",
  124. priority=BaseKeyPairService.STANDARD_EVENT_PRIORITY)
  125. def delete(self, kp):
  126. key_pair = kp if isinstance(kp, AWSKeyPair) else self.get(kp)
  127. if key_pair:
  128. # pylint:disable=protected-access
  129. key_pair._key_pair.delete()
  130. class AWSVMFirewallService(BaseVMFirewallService):
  131. def __init__(self, provider):
  132. super(AWSVMFirewallService, self).__init__(provider)
  133. self.svc = BotoEC2Service(provider=self.provider,
  134. cb_resource=AWSVMFirewall,
  135. boto_collection_name='security_groups')
  136. @dispatch(event="provider.security.vm_firewalls.get",
  137. priority=BaseVMFirewallService.STANDARD_EVENT_PRIORITY)
  138. def get(self, vm_firewall_id):
  139. log.debug("Getting Firewall Service with the id: %s", vm_firewall_id)
  140. return self.svc.get(vm_firewall_id)
  141. @dispatch(event="provider.security.vm_firewalls.list",
  142. priority=BaseVMFirewallService.STANDARD_EVENT_PRIORITY)
  143. def list(self, limit=None, marker=None):
  144. return self.svc.list(limit=limit, marker=marker)
  145. @cb_helpers.deprecated_alias(network_id='network')
  146. @dispatch(event="provider.security.vm_firewalls.create",
  147. priority=BaseVMFirewallService.STANDARD_EVENT_PRIORITY)
  148. def create(self, label, network, description=None):
  149. name = AWSVMFirewall._generate_name_from_label(label, 'cb-fw')
  150. network_id = network.id if isinstance(network, Network) else network
  151. obj = self.svc.create('create_security_group', GroupName=name,
  152. Description=description or name,
  153. VpcId=network_id)
  154. obj.label = label
  155. return obj
  156. @dispatch(event="provider.security.vm_firewalls.find",
  157. priority=BaseVMFirewallService.STANDARD_EVENT_PRIORITY)
  158. def find(self, **kwargs):
  159. # Filter by name or label
  160. label = kwargs.pop('label', None)
  161. log.debug("Searching for Firewall Service %s", label)
  162. # All kwargs should have been popped at this time.
  163. if len(kwargs) > 0:
  164. raise InvalidParamException(
  165. "Unrecognised parameters for search: %s. Supported "
  166. "attributes: %s" % (kwargs, 'label'))
  167. return self.svc.find(filter_name='tag:Name',
  168. filter_value=label)
  169. @dispatch(event="provider.security.vm_firewalls.delete",
  170. priority=BaseVMFirewallService.STANDARD_EVENT_PRIORITY)
  171. def delete(self, vmf):
  172. firewall = vmf if isinstance(vmf, AWSVMFirewall) else self.get(vmf)
  173. if firewall:
  174. # pylint:disable=protected-access
  175. firewall._vm_firewall.delete()
  176. class AWSVMFirewallRuleService(BaseVMFirewallRuleService):
  177. def __init__(self, provider):
  178. super(AWSVMFirewallRuleService, self).__init__(provider)
  179. def list(self, firewall, limit=None, marker=None):
  180. # pylint:disable=protected-access
  181. rules = [AWSVMFirewallRule(firewall,
  182. TrafficDirection.INBOUND, r)
  183. for r in firewall._vm_firewall.ip_permissions]
  184. rules = rules + [
  185. AWSVMFirewallRule(
  186. firewall, TrafficDirection.OUTBOUND, r)
  187. for r in firewall._vm_firewall.ip_permissions_egress]
  188. return ClientPagedResultList(self.provider, rules,
  189. limit=limit, marker=marker)
  190. def create(self, firewall, direction, protocol=None, from_port=None,
  191. to_port=None, cidr=None, src_dest_fw=None):
  192. src_dest_fw_id = (
  193. src_dest_fw.id if isinstance(src_dest_fw, AWSVMFirewall)
  194. else src_dest_fw)
  195. # pylint:disable=protected-access
  196. ip_perm_entry = AWSVMFirewallRule._construct_ip_perms(
  197. protocol, from_port, to_port, cidr, src_dest_fw_id)
  198. # Filter out empty values to please Boto
  199. ip_perms = [trim_empty_params(ip_perm_entry)]
  200. try:
  201. if direction == TrafficDirection.INBOUND:
  202. # pylint:disable=protected-access
  203. firewall._vm_firewall.authorize_ingress(
  204. IpPermissions=ip_perms)
  205. elif direction == TrafficDirection.OUTBOUND:
  206. # pylint:disable=protected-access
  207. firewall._vm_firewall.authorize_egress(
  208. IpPermissions=ip_perms)
  209. else:
  210. raise InvalidValueException("direction", direction)
  211. firewall.refresh()
  212. return AWSVMFirewallRule(firewall, direction, ip_perm_entry)
  213. except ClientError as ec2e:
  214. if ec2e.response['Error']['Code'] == "InvalidPermission.Duplicate":
  215. return AWSVMFirewallRule(
  216. firewall, direction, ip_perm_entry)
  217. else:
  218. raise ec2e
  219. def delete(self, firewall, rule):
  220. ip_perm_entry = rule._construct_ip_perms(
  221. rule.protocol, rule.from_port, rule.to_port,
  222. rule.cidr, rule.src_dest_fw_id)
  223. # Filter out empty values to please Boto
  224. ip_perms = [trim_empty_params(ip_perm_entry)]
  225. # pylint:disable=protected-access
  226. if rule.direction == TrafficDirection.INBOUND:
  227. firewall._vm_firewall.revoke_ingress(
  228. IpPermissions=ip_perms)
  229. else:
  230. firewall._vm_firewall.revoke_egress(
  231. IpPermissions=ip_perms)
  232. firewall.refresh()
  233. class AWSStorageService(BaseStorageService):
  234. def __init__(self, provider):
  235. super(AWSStorageService, self).__init__(provider)
  236. # Initialize provider services
  237. self._volume_svc = AWSVolumeService(self.provider)
  238. self._snapshot_svc = AWSSnapshotService(self.provider)
  239. self._bucket_svc = AWSBucketService(self.provider)
  240. self._bucket_obj_svc = AWSBucketObjectService(self.provider)
  241. @property
  242. def volumes(self):
  243. return self._volume_svc
  244. @property
  245. def snapshots(self):
  246. return self._snapshot_svc
  247. @property
  248. def buckets(self):
  249. return self._bucket_svc
  250. @property
  251. def _bucket_objects(self):
  252. return self._bucket_obj_svc
  253. class AWSVolumeService(BaseVolumeService):
  254. def __init__(self, provider):
  255. super(AWSVolumeService, self).__init__(provider)
  256. self.svc = BotoEC2Service(provider=self.provider,
  257. cb_resource=AWSVolume,
  258. boto_collection_name='volumes')
  259. @dispatch(event="provider.storage.volumes.get",
  260. priority=BaseVolumeService.STANDARD_EVENT_PRIORITY)
  261. def get(self, volume_id):
  262. return self.svc.get(volume_id)
  263. @dispatch(event="provider.storage.volumes.find",
  264. priority=BaseVolumeService.STANDARD_EVENT_PRIORITY)
  265. def find(self, **kwargs):
  266. label = kwargs.pop('label', None)
  267. # All kwargs should have been popped at this time.
  268. if len(kwargs) > 0:
  269. raise InvalidParamException(
  270. "Unrecognised parameters for search: %s. Supported "
  271. "attributes: %s" % (kwargs, 'label'))
  272. log.debug("Searching for AWS Volume Service %s", label)
  273. return self.svc.find(filter_name='tag:Name', filter_value=label)
  274. @dispatch(event="provider.storage.volumes.list",
  275. priority=BaseVolumeService.STANDARD_EVENT_PRIORITY)
  276. def list(self, limit=None, marker=None):
  277. return self.svc.list(limit=limit, marker=marker)
  278. @dispatch(event="provider.storage.volumes.create",
  279. priority=BaseVolumeService.STANDARD_EVENT_PRIORITY)
  280. def create(self, label, size, zone, snapshot=None, description=None):
  281. zone_id = zone.id if isinstance(zone, PlacementZone) else zone
  282. snapshot_id = snapshot.id if isinstance(
  283. snapshot, AWSSnapshot) and snapshot else snapshot
  284. cb_vol = self.svc.create('create_volume', Size=size,
  285. AvailabilityZone=zone_id,
  286. SnapshotId=snapshot_id)
  287. # Wait until ready to tag instance
  288. cb_vol.wait_till_ready()
  289. cb_vol.label = label
  290. if description:
  291. cb_vol.description = description
  292. return cb_vol
  293. @dispatch(event="provider.storage.volumes.delete",
  294. priority=BaseVolumeService.STANDARD_EVENT_PRIORITY)
  295. def delete(self, vol):
  296. volume = vol if isinstance(vol, AWSVolume) else self.get(vol)
  297. if volume:
  298. # pylint:disable=protected-access
  299. volume._volume.delete()
  300. class AWSSnapshotService(BaseSnapshotService):
  301. def __init__(self, provider):
  302. super(AWSSnapshotService, self).__init__(provider)
  303. self.svc = BotoEC2Service(provider=self.provider,
  304. cb_resource=AWSSnapshot,
  305. boto_collection_name='snapshots')
  306. @dispatch(event="provider.storage.snapshots.get",
  307. priority=BaseSnapshotService.STANDARD_EVENT_PRIORITY)
  308. def get(self, snapshot_id):
  309. return self.svc.get(snapshot_id)
  310. @dispatch(event="provider.storage.snapshots.find",
  311. priority=BaseSnapshotService.STANDARD_EVENT_PRIORITY)
  312. def find(self, **kwargs):
  313. # Filter by description or label
  314. label = kwargs.get('label', None)
  315. obj_list = []
  316. if label:
  317. log.debug("Searching for AWS Snapshot with label %s", label)
  318. obj_list.extend(self.svc.find(filter_name='tag:Name',
  319. filter_value=label,
  320. OwnerIds=['self']))
  321. else:
  322. obj_list = list(self)
  323. filters = ['label']
  324. return cb_helpers.generic_find(filters, kwargs, obj_list)
  325. @dispatch(event="provider.storage.snapshots.list",
  326. priority=BaseSnapshotService.STANDARD_EVENT_PRIORITY)
  327. def list(self, limit=None, marker=None):
  328. return self.svc.list(limit=limit, marker=marker,
  329. OwnerIds=['self'])
  330. @dispatch(event="provider.storage.snapshots.create",
  331. priority=BaseSnapshotService.STANDARD_EVENT_PRIORITY)
  332. def create(self, label, volume, description=None):
  333. volume_id = volume.id if isinstance(volume, AWSVolume) else volume
  334. cb_snap = self.svc.create('create_snapshot', VolumeId=volume_id)
  335. # Wait until ready to tag instance
  336. cb_snap.wait_till_ready()
  337. cb_snap.label = label
  338. if cb_snap.description:
  339. cb_snap.description = description
  340. return cb_snap
  341. @dispatch(event="provider.storage.snapshots.delete",
  342. priority=BaseSnapshotService.STANDARD_EVENT_PRIORITY)
  343. def delete(self, snap):
  344. snapshot = snap if isinstance(snap, AWSSnapshot) else self.get(snap)
  345. if snapshot:
  346. # pylint:disable=protected-access
  347. snapshot._snapshot.delete()
  348. class AWSBucketService(BaseBucketService):
  349. def __init__(self, provider):
  350. super(AWSBucketService, self).__init__(provider)
  351. self.svc = BotoS3Service(provider=self.provider,
  352. cb_resource=AWSBucket,
  353. boto_collection_name='buckets')
  354. @dispatch(event="provider.storage.buckets.get",
  355. priority=BaseBucketService.STANDARD_EVENT_PRIORITY)
  356. def get(self, bucket_id):
  357. """
  358. Returns a bucket given its ID. Returns ``None`` if the bucket
  359. does not exist.
  360. """
  361. try:
  362. # Make a call to make sure the bucket exists. There's an edge case
  363. # where a 403 response can occur when the bucket exists but the
  364. # user simply does not have permissions to access it. See below.
  365. self.provider.s3_conn.meta.client.head_bucket(Bucket=bucket_id)
  366. return AWSBucket(self.provider,
  367. self.provider.s3_conn.Bucket(bucket_id))
  368. except ClientError as e:
  369. # If 403, it means the bucket exists, but the user does not have
  370. # permissions to access the bucket. However, limited operations
  371. # may be permitted (with a session token for example), so return a
  372. # Bucket instance to allow further operations.
  373. # http://stackoverflow.com/questions/32331456/using-boto-upload-file-to-s3-
  374. # sub-folder-when-i-have-no-permissions-on-listing-fo
  375. if e.response['Error']['Code'] == "403":
  376. log.warning("AWS Bucket %s already exists but user doesn't "
  377. "have enough permissions to access the bucket",
  378. bucket_id)
  379. return AWSBucket(self.provider,
  380. self.provider.s3_conn.Bucket(bucket_id))
  381. # For all other responses, it's assumed that the bucket does not exist.
  382. return None
  383. @dispatch(event="provider.storage.buckets.list",
  384. priority=BaseBucketService.STANDARD_EVENT_PRIORITY)
  385. def list(self, limit=None, marker=None):
  386. return self.svc.list(limit=limit, marker=marker)
  387. @dispatch(event="provider.storage.buckets.create",
  388. priority=BaseBucketService.STANDARD_EVENT_PRIORITY)
  389. def create(self, name, location=None):
  390. AWSBucket.assert_valid_resource_name(name)
  391. location = location or self.provider.region_name
  392. # Due to an API issue in S3, specifying us-east-1 as a
  393. # LocationConstraint results in an InvalidLocationConstraint.
  394. # Therefore, it must be special-cased and omitted altogether.
  395. # See: https://github.com/boto/boto3/issues/125
  396. # In addition, us-east-1 also behaves differently when it comes
  397. # to raising duplicate resource exceptions, so perform a manual
  398. # check
  399. if location == 'us-east-1':
  400. try:
  401. # check whether bucket already exists
  402. self.provider.s3_conn.meta.client.head_bucket(Bucket=name)
  403. except ClientError as e:
  404. if e.response['Error']['Code'] == "404":
  405. # bucket doesn't exist, go ahead and create it
  406. return self.svc.create('create_bucket', Bucket=name)
  407. raise DuplicateResourceException(
  408. 'Bucket already exists with name {0}'.format(name))
  409. else:
  410. try:
  411. return self.svc.create('create_bucket', Bucket=name,
  412. CreateBucketConfiguration={
  413. 'LocationConstraint': location
  414. })
  415. except ClientError as e:
  416. if e.response['Error']['Code'] == "BucketAlreadyOwnedByYou":
  417. raise DuplicateResourceException(
  418. 'Bucket already exists with name {0}'.format(name))
  419. else:
  420. raise
  421. @dispatch(event="provider.storage.buckets.delete",
  422. priority=BaseBucketService.STANDARD_EVENT_PRIORITY)
  423. def delete(self, bucket):
  424. b = bucket if isinstance(bucket, AWSBucket) else self.get(bucket)
  425. if b:
  426. # pylint:disable=protected-access
  427. b._bucket.delete()
  428. class AWSBucketObjectService(BaseBucketObjectService):
  429. def __init__(self, provider):
  430. super(AWSBucketObjectService, self).__init__(provider)
  431. def get(self, bucket, object_id):
  432. try:
  433. # pylint:disable=protected-access
  434. obj = bucket._bucket.Object(object_id)
  435. # load() throws an error if object does not exist
  436. obj.load()
  437. return AWSBucketObject(self.provider, obj)
  438. except ClientError:
  439. return None
  440. def list(self, bucket, limit=None, marker=None, prefix=None):
  441. if prefix:
  442. # pylint:disable=protected-access
  443. boto_objs = bucket._bucket.objects.filter(Prefix=prefix)
  444. else:
  445. # pylint:disable=protected-access
  446. boto_objs = bucket._bucket.objects.all()
  447. objects = [AWSBucketObject(self.provider, obj) for obj in boto_objs]
  448. return ClientPagedResultList(self.provider, objects,
  449. limit=limit, marker=marker)
  450. def find(self, bucket, **kwargs):
  451. obj_list = [AWSBucketObject(self.provider, o)
  452. for o in bucket._bucket.objects.all()]
  453. filters = ['name']
  454. matches = cb_helpers.generic_find(filters, kwargs, obj_list)
  455. return ClientPagedResultList(self.provider, list(matches),
  456. limit=None, marker=None)
  457. def create(self, bucket, name):
  458. # pylint:disable=protected-access
  459. obj = bucket._bucket.Object(name)
  460. return AWSBucketObject(self.provider, obj)
  461. class AWSComputeService(BaseComputeService):
  462. def __init__(self, provider):
  463. super(AWSComputeService, self).__init__(provider)
  464. self._vm_type_svc = AWSVMTypeService(self.provider)
  465. self._instance_svc = AWSInstanceService(self.provider)
  466. self._region_svc = AWSRegionService(self.provider)
  467. self._images_svc = AWSImageService(self.provider)
  468. @property
  469. def images(self):
  470. return self._images_svc
  471. @property
  472. def vm_types(self):
  473. return self._vm_type_svc
  474. @property
  475. def instances(self):
  476. return self._instance_svc
  477. @property
  478. def regions(self):
  479. return self._region_svc
  480. class AWSImageService(BaseImageService):
  481. def __init__(self, provider):
  482. super(AWSImageService, self).__init__(provider)
  483. self.svc = BotoEC2Service(provider=self.provider,
  484. cb_resource=AWSMachineImage,
  485. boto_collection_name='images')
  486. def get(self, image_id):
  487. log.debug("Getting AWS Image Service with the id: %s", image_id)
  488. return self.svc.get(image_id)
  489. def find(self, **kwargs):
  490. # Filter by name or label
  491. label = kwargs.pop('label', None)
  492. # Popped here, not used in the generic find
  493. owner = kwargs.pop('owners', None)
  494. # All kwargs should have been popped at this time.
  495. if len(kwargs) > 0:
  496. raise InvalidParamException(
  497. "Unrecognised parameters for search: %s. Supported "
  498. "attributes: %s" % (kwargs, 'label'))
  499. extra_args = {}
  500. if owner:
  501. extra_args.update(Owners=owner)
  502. # The original list is made by combining both searches by "tag:Name"
  503. # and "AMI name" to allow for searches of public images
  504. if label:
  505. log.debug("Searching for AWS Image Service %s", label)
  506. obj_list = []
  507. obj_list.extend(self.svc.find(filter_name='name',
  508. filter_value=label, **extra_args))
  509. obj_list.extend(self.svc.find(filter_name='tag:Name',
  510. filter_value=label, **extra_args))
  511. return obj_list
  512. else:
  513. return []
  514. def list(self, filter_by_owner=True, limit=None, marker=None):
  515. return self.svc.list(Owners=['self'] if filter_by_owner else
  516. ['amazon', 'self'],
  517. limit=limit, marker=marker)
  518. class AWSInstanceService(BaseInstanceService):
  519. def __init__(self, provider):
  520. super(AWSInstanceService, self).__init__(provider)
  521. self.svc = BotoEC2Service(provider=self.provider,
  522. cb_resource=AWSInstance,
  523. boto_collection_name='instances')
  524. def _resolve_launch_options(self, subnet=None, zone_id=None,
  525. vm_firewalls=None):
  526. """
  527. Work out interdependent launch options.
  528. Some launch options are required and interdependent so make sure
  529. they conform to the interface contract.
  530. :type subnet: ``Subnet``
  531. :param subnet: Subnet object within which to launch.
  532. :type zone_id: ``str``
  533. :param zone_id: ID of the zone where the launch should happen.
  534. :type vm_firewalls: ``list`` of ``id``
  535. :param vm_firewalls: List of firewall IDs.
  536. :rtype: triplet of ``str``
  537. :return: Subnet ID, zone ID and VM firewall IDs for launch.
  538. :raise ValueError: In case a conflicting combination is found.
  539. """
  540. if subnet:
  541. # subnet's zone takes precedence
  542. zone_id = subnet.zone.id
  543. if isinstance(vm_firewalls, list) and isinstance(
  544. vm_firewalls[0], VMFirewall):
  545. vm_firewall_ids = [fw.id for fw in vm_firewalls]
  546. else:
  547. vm_firewall_ids = vm_firewalls
  548. return subnet.id, zone_id, vm_firewall_ids
  549. def _process_block_device_mappings(self, launch_config):
  550. """
  551. Processes block device mapping information
  552. and returns a Boto BlockDeviceMapping object. If new volumes
  553. are requested (source is None and destination is VOLUME), they will be
  554. created and the relevant volume ids included in the mapping.
  555. """
  556. bdml = []
  557. # Assign letters from f onwards
  558. # http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/device_naming.html
  559. next_letter = iter(list(string.ascii_lowercase[6:]))
  560. # assign ephemeral devices from 0 onwards
  561. ephemeral_counter = 0
  562. for device in launch_config.block_devices:
  563. bdm = {}
  564. if device.is_volume:
  565. # Generate the device path
  566. bdm['DeviceName'] = \
  567. '/dev/sd' + ('a1' if device.is_root else next(next_letter))
  568. ebs_def = {}
  569. if isinstance(device.source, Snapshot):
  570. ebs_def['SnapshotId'] = device.source.id
  571. elif isinstance(device.source, Volume):
  572. # TODO: We could create a snapshot from the volume
  573. # and use that instead.
  574. # Not supported
  575. pass
  576. elif isinstance(device.source, MachineImage):
  577. # Not supported
  578. pass
  579. else:
  580. # source is None, but destination is volume, therefore
  581. # create a blank volume. This requires a size though.
  582. if not device.size:
  583. raise InvalidConfigurationException(
  584. "The source is none and the destination is a"
  585. " volume. Therefore, you must specify a size.")
  586. ebs_def['DeleteOnTermination'] = device.delete_on_terminate \
  587. or True
  588. if device.size:
  589. ebs_def['VolumeSize'] = device.size
  590. if ebs_def:
  591. bdm['Ebs'] = ebs_def
  592. else: # device is ephemeral
  593. bdm['VirtualName'] = 'ephemeral%s' % ephemeral_counter
  594. # Append the config
  595. bdml.append(bdm)
  596. return bdml
  597. def create_launch_config(self):
  598. return AWSLaunchConfig(self.provider)
  599. @dispatch(event="provider.compute.instances.create",
  600. priority=BaseInstanceService.STANDARD_EVENT_PRIORITY)
  601. def create(self, label, image, vm_type, subnet, zone,
  602. key_pair=None, vm_firewalls=None, user_data=None,
  603. launch_config=None, **kwargs):
  604. image_id = image.id if isinstance(image, MachineImage) else image
  605. vm_size = vm_type.id if \
  606. isinstance(vm_type, VMType) else vm_type
  607. subnet = (self.provider.networking.subnets.get(subnet)
  608. if isinstance(subnet, str) else subnet)
  609. zone_id = zone.id if isinstance(zone, PlacementZone) else zone
  610. key_pair_name = key_pair.name if isinstance(
  611. key_pair,
  612. KeyPair) else key_pair
  613. if launch_config:
  614. bdm = self._process_block_device_mappings(launch_config)
  615. else:
  616. bdm = None
  617. subnet_id, zone_id, vm_firewall_ids = \
  618. self._resolve_launch_options(subnet, zone_id, vm_firewalls)
  619. placement = {'AvailabilityZone': zone_id} if zone_id else None
  620. inst = self.svc.create('create_instances',
  621. ImageId=image_id,
  622. MinCount=1,
  623. MaxCount=1,
  624. KeyName=key_pair_name,
  625. SecurityGroupIds=vm_firewall_ids or None,
  626. UserData=str(user_data) or None,
  627. InstanceType=vm_size,
  628. Placement=placement,
  629. BlockDeviceMappings=bdm,
  630. SubnetId=subnet_id
  631. )
  632. if inst and len(inst) == 1:
  633. # Wait until the resource exists
  634. # pylint:disable=protected-access
  635. inst[0]._wait_till_exists()
  636. # Tag the instance w/ the name
  637. inst[0].label = label
  638. return inst[0]
  639. raise ValueError(
  640. 'Expected a single object response, got a list: %s' % inst)
  641. @dispatch(event="provider.compute.instances.get",
  642. priority=BaseInstanceService.STANDARD_EVENT_PRIORITY)
  643. def get(self, instance_id):
  644. return self.svc.get(instance_id)
  645. @dispatch(event="provider.compute.instances.find",
  646. priority=BaseInstanceService.STANDARD_EVENT_PRIORITY)
  647. def find(self, **kwargs):
  648. label = kwargs.pop('label', None)
  649. # All kwargs should have been popped at this time.
  650. if len(kwargs) > 0:
  651. raise InvalidParamException(
  652. "Unrecognised parameters for search: %s. Supported "
  653. "attributes: %s" % (kwargs, 'label'))
  654. return self.svc.find(filter_name='tag:Name', filter_value=label)
  655. @dispatch(event="provider.compute.instances.list",
  656. priority=BaseInstanceService.STANDARD_EVENT_PRIORITY)
  657. def list(self, limit=None, marker=None):
  658. return self.svc.list(limit=limit, marker=marker)
  659. @dispatch(event="provider.compute.instances.delete",
  660. priority=BaseInstanceService.STANDARD_EVENT_PRIORITY)
  661. def delete(self, inst):
  662. aws_inst = inst if isinstance(inst, AWSInstance) else self.get(inst)
  663. if aws_inst:
  664. # pylint:disable=protected-access
  665. aws_inst._ec2_instance.terminate()
  666. class AWSVMTypeService(BaseVMTypeService):
  667. def __init__(self, provider):
  668. super(AWSVMTypeService, self).__init__(provider)
  669. @property
  670. @cachetools.cached(cachetools.TTLCache(maxsize=1, ttl=24*3600))
  671. def instance_data(self):
  672. """
  673. Fetch info about the available instances.
  674. To update this information, update the file pointed to by the
  675. ``provider.AWS_INSTANCE_DATA_DEFAULT_URL`` above. The content for this
  676. file should be obtained from this repo:
  677. https://github.com/powdahound/ec2instances.info (in particular, this
  678. file: https://raw.githubusercontent.com/powdahound/ec2instances.info/
  679. master/www/instances.json).
  680. """
  681. r = requests.get(self.provider.config.get(
  682. "aws_instance_info_url",
  683. self.provider.AWS_INSTANCE_DATA_DEFAULT_URL))
  684. # Some instances are only available in certain regions. Use pricing
  685. # info to determine and filter out instance types that are not
  686. # available in the current region
  687. vm_types_list = r.json()
  688. return [vm_type for vm_type in vm_types_list
  689. if vm_type.get('pricing', {}).get(self.provider.region_name)]
  690. @dispatch(event="provider.compute.vm_types.list",
  691. priority=BaseVMTypeService.STANDARD_EVENT_PRIORITY)
  692. def list(self, limit=None, marker=None):
  693. vm_types = [AWSVMType(self.provider, vm_type)
  694. for vm_type in self.instance_data]
  695. return ClientPagedResultList(self.provider, vm_types,
  696. limit=limit, marker=marker)
  697. class AWSRegionService(BaseRegionService):
  698. def __init__(self, provider):
  699. super(AWSRegionService, self).__init__(provider)
  700. @dispatch(event="provider.compute.regions.get",
  701. priority=BaseRegionService.STANDARD_EVENT_PRIORITY)
  702. def get(self, region_id):
  703. log.debug("Getting AWS Region Service with the id: %s",
  704. region_id)
  705. region = [r for r in self if r.id == region_id]
  706. if region:
  707. return region[0]
  708. else:
  709. return None
  710. @dispatch(event="provider.compute.regions.list",
  711. priority=BaseRegionService.STANDARD_EVENT_PRIORITY)
  712. def list(self, limit=None, marker=None):
  713. regions = [
  714. AWSRegion(self.provider, region) for region in
  715. self.provider.ec2_conn.meta.client.describe_regions()
  716. .get('Regions', [])]
  717. return ClientPagedResultList(self.provider, regions,
  718. limit=limit, marker=marker)
  719. @property
  720. def current(self):
  721. return self.get(self._provider.region_name)
  722. class AWSNetworkingService(BaseNetworkingService):
  723. def __init__(self, provider):
  724. super(AWSNetworkingService, self).__init__(provider)
  725. self._network_service = AWSNetworkService(self.provider)
  726. self._subnet_service = AWSSubnetService(self.provider)
  727. self._router_service = AWSRouterService(self.provider)
  728. self._gateway_service = AWSGatewayService(self.provider)
  729. @property
  730. def networks(self):
  731. return self._network_service
  732. @property
  733. def subnets(self):
  734. return self._subnet_service
  735. @property
  736. def routers(self):
  737. return self._router_service
  738. @property
  739. def _gateways(self):
  740. return self._gateway_service
  741. class AWSNetworkService(BaseNetworkService):
  742. def __init__(self, provider):
  743. super(AWSNetworkService, self).__init__(provider)
  744. self.svc = BotoEC2Service(provider=self.provider,
  745. cb_resource=AWSNetwork,
  746. boto_collection_name='vpcs')
  747. @dispatch(event="provider.networking.networks.get",
  748. priority=BaseNetworkService.STANDARD_EVENT_PRIORITY)
  749. def get(self, network_id):
  750. return self.svc.get(network_id)
  751. @dispatch(event="provider.networking.networks.list",
  752. priority=BaseNetworkService.STANDARD_EVENT_PRIORITY)
  753. def list(self, limit=None, marker=None):
  754. return self.svc.list(limit=limit, marker=marker)
  755. @dispatch(event="provider.networking.networks.find",
  756. priority=BaseNetworkService.STANDARD_EVENT_PRIORITY)
  757. def find(self, **kwargs):
  758. label = kwargs.pop('label', None)
  759. # All kwargs should have been popped at this time.
  760. if len(kwargs) > 0:
  761. raise InvalidParamException(
  762. "Unrecognised parameters for search: %s. Supported "
  763. "attributes: %s" % (kwargs, 'label'))
  764. log.debug("Searching for AWS Network Service %s", label)
  765. return self.svc.find(filter_name='tag:Name', filter_value=label)
  766. @dispatch(event="provider.networking.networks.create",
  767. priority=BaseNetworkService.STANDARD_EVENT_PRIORITY)
  768. def create(self, label, cidr_block):
  769. AWSNetwork.assert_valid_resource_label(label)
  770. cb_net = self.svc.create('create_vpc', CidrBlock=cidr_block)
  771. # Wait until ready to tag instance
  772. cb_net.wait_till_ready()
  773. if label:
  774. cb_net.label = label
  775. return cb_net
  776. @dispatch(event="provider.networking.networks.delete",
  777. priority=BaseNetworkService.STANDARD_EVENT_PRIORITY)
  778. def delete(self, net):
  779. network = net if isinstance(net, AWSNetwork) else self.get(net)
  780. if network:
  781. # pylint:disable=protected-access
  782. network._vpc.delete()
  783. def get_or_create_default(self):
  784. # # Look for provided default network
  785. # for net in self.provider.networking.networks:
  786. # if net._vpc.is_default:
  787. # return net
  788. # No provider-default, try CB-default instead
  789. default_nets = self.provider.networking.networks.find(
  790. label=AWSNetwork.CB_DEFAULT_NETWORK_LABEL)
  791. if default_nets:
  792. return default_nets[0]
  793. else:
  794. log.info("Creating a CloudBridge-default network labeled %s",
  795. AWSNetwork.CB_DEFAULT_NETWORK_LABEL)
  796. return self.provider.networking.networks.create(
  797. label=AWSNetwork.CB_DEFAULT_NETWORK_LABEL,
  798. cidr_block=AWSNetwork.CB_DEFAULT_IPV4RANGE)
  799. class AWSSubnetService(BaseSubnetService):
  800. def __init__(self, provider):
  801. super(AWSSubnetService, self).__init__(provider)
  802. self.svc = BotoEC2Service(provider=self.provider,
  803. cb_resource=AWSSubnet,
  804. boto_collection_name='subnets')
  805. @dispatch(event="provider.networking.subnets.get",
  806. priority=BaseSubnetService.STANDARD_EVENT_PRIORITY)
  807. def get(self, subnet_id):
  808. return self.svc.get(subnet_id)
  809. @dispatch(event="provider.networking.subnets.list",
  810. priority=BaseSubnetService.STANDARD_EVENT_PRIORITY)
  811. def list(self, network=None, limit=None, marker=None):
  812. network_id = network.id if isinstance(network, AWSNetwork) else network
  813. if network_id:
  814. return self.svc.find(
  815. filter_name='vpc-id', filter_value=network_id,
  816. limit=limit, marker=marker)
  817. else:
  818. return self.svc.list(limit=limit, marker=marker)
  819. @dispatch(event="provider.networking.subnets.find",
  820. priority=BaseSubnetService.STANDARD_EVENT_PRIORITY)
  821. def find(self, network=None, **kwargs):
  822. label = kwargs.pop('label', None)
  823. # All kwargs should have been popped at this time.
  824. if len(kwargs) > 0:
  825. raise InvalidParamException(
  826. "Unrecognised parameters for search: %s. Supported "
  827. "attributes: %s" % (kwargs, 'label'))
  828. log.debug("Searching for AWS Subnet Service %s", label)
  829. return self.svc.find(filter_name='tag:Name', filter_value=label)
  830. @dispatch(event="provider.networking.subnets.create",
  831. priority=BaseSubnetService.STANDARD_EVENT_PRIORITY)
  832. def create(self, label, network, cidr_block, zone):
  833. AWSSubnet.assert_valid_resource_label(label)
  834. zone_name = zone.name if isinstance(
  835. zone, AWSPlacementZone) else zone
  836. network_id = network.id if isinstance(network, AWSNetwork) else network
  837. subnet = self.svc.create('create_subnet',
  838. VpcId=network_id,
  839. CidrBlock=cidr_block,
  840. AvailabilityZone=zone_name)
  841. if label:
  842. subnet.label = label
  843. return subnet
  844. @dispatch(event="provider.networking.subnets.delete",
  845. priority=BaseSubnetService.STANDARD_EVENT_PRIORITY)
  846. def delete(self, subnet):
  847. sn = subnet if isinstance(subnet, AWSSubnet) else self.get(subnet)
  848. if sn:
  849. # pylint:disable=protected-access
  850. sn._subnet.delete()
  851. def get_or_create_default(self, zone):
  852. zone_name = zone.name if isinstance(zone, AWSPlacementZone) else zone
  853. # # Look for provider default subnet in current zone
  854. # if zone_name:
  855. # snl = self.svc.find('availabilityZone', zone_name)
  856. #
  857. # else:
  858. # snl = self.svc.list()
  859. # # Find first available default subnet by sorted order
  860. # # of availability zone. Prefer zone us-east-1a over 1e,
  861. # # because newer zones tend to have less compatibility
  862. # # with different instance types (e.g. c5.large not available
  863. # # on us-east-1e as of 14 Dec. 2017).
  864. # # pylint:disable=protected-access
  865. # snl.sort(key=lambda sn: sn._subnet.availability_zone)
  866. #
  867. # for sn in snl:
  868. # # pylint:disable=protected-access
  869. # if sn._subnet.default_for_az:
  870. # return sn
  871. # If no provider-default subnet has been found, look for
  872. # cloudbridge-default by label. We suffix labels by availability zone,
  873. # thus we add the wildcard for the regular expression to find the
  874. # subnet
  875. snl = self.find(label=AWSSubnet.CB_DEFAULT_SUBNET_LABEL + "*")
  876. if snl:
  877. snl.sort(key=lambda sn: sn._subnet.availability_zone)
  878. if not zone_name:
  879. return snl[0]
  880. for subnet in snl:
  881. if subnet.zone.name == zone_name:
  882. return subnet
  883. # No default Subnet exists, try to create a CloudBridge-specific
  884. # subnet. This involves creating the network, subnets, internet
  885. # gateway, and connecting it all together so that the network has
  886. # Internet connectivity.
  887. # Check if a default net already exists and get it or create on
  888. default_net = self.provider.networking.networks.get_or_create_default()
  889. # Get/create an internet gateway for the default network and a
  890. # corresponding router if it does not already exist.
  891. # NOTE: Comment this out because the docs instruct users to setup
  892. # network connectivity manually. There's a bit of discrepancy here
  893. # though because the provider-default network will have Internet
  894. # connectivity (unlike the CloudBridge-default network with this
  895. # being commented) and is hence left in the codebase.
  896. # default_gtw = default_net.gateways.get_or_create_inet_gateway()
  897. # router_label = "{0}-router".format(
  898. # AWSNetwork.CB_DEFAULT_NETWORK_LABEL)
  899. # default_routers = self.provider.networking.routers.find(
  900. # label=router_label)
  901. # if len(default_routers) == 0:
  902. # default_router = self.provider.networking.routers.create(
  903. # router_label, default_net)
  904. # default_router.attach_gateway(default_gtw)
  905. # else:
  906. # default_router = default_routers[0]
  907. # Create a subnet in each of the region's zones
  908. region = self.provider.compute.regions.get(self.provider.region_name)
  909. default_sn = None
  910. # Determine how many subnets we'll need for the default network and the
  911. # number of available zones. We need to derive a non-overlapping
  912. # network size for each subnet within the parent net so figure those
  913. # subnets here. `<net>.subnets` method will do this but we need to give
  914. # it a prefix. Determining that prefix depends on the size of the
  915. # network and should be incorporate the number of zones. So iterate
  916. # over potential number of subnets until enough can be created to
  917. # accommodate the number of available zones. That is where the fixed
  918. # number comes from in the for loop as that many iterations will yield
  919. # more potential subnets than any region has zones.
  920. ip_net = ipaddress.ip_network(AWSNetwork.CB_DEFAULT_IPV4RANGE)
  921. for x in range(5):
  922. if len(region.zones) <= len(list(ip_net.subnets(
  923. prefixlen_diff=x))):
  924. prefixlen_diff = x
  925. break
  926. subnets = list(ip_net.subnets(prefixlen_diff=prefixlen_diff))
  927. for i, z in reversed(list(enumerate(region.zones))):
  928. sn_label = "{0}-{1}".format(AWSSubnet.CB_DEFAULT_SUBNET_LABEL,
  929. z.id[-1])
  930. log.info("Creating a default CloudBridge subnet %s: %s" %
  931. (sn_label, str(subnets[i])))
  932. sn = self.create(sn_label, default_net, str(subnets[i]), z)
  933. # Create a route table entry between the SN and the inet gateway
  934. # See note above about why this is commented
  935. # default_router.attach_subnet(sn)
  936. if zone and zone_name == z.name:
  937. default_sn = sn
  938. # No specific zone was supplied; return the last created subnet
  939. # The list was originally reversed to have the last subnet be in zone a
  940. if not default_sn:
  941. default_sn = sn
  942. return default_sn
  943. class AWSRouterService(BaseRouterService):
  944. """For AWS, a CloudBridge router corresponds to an AWS Route Table."""
  945. def __init__(self, provider):
  946. super(AWSRouterService, self).__init__(provider)
  947. self.svc = BotoEC2Service(provider=self.provider,
  948. cb_resource=AWSRouter,
  949. boto_collection_name='route_tables')
  950. @dispatch(event="provider.networking.routers.get",
  951. priority=BaseRouterService.STANDARD_EVENT_PRIORITY)
  952. def get(self, router_id):
  953. return self.svc.get(router_id)
  954. @dispatch(event="provider.networking.routers.find",
  955. priority=BaseRouterService.STANDARD_EVENT_PRIORITY)
  956. def find(self, **kwargs):
  957. label = kwargs.pop('label', None)
  958. # All kwargs should have been popped at this time.
  959. if len(kwargs) > 0:
  960. raise InvalidParamException(
  961. "Unrecognised parameters for search: %s. Supported "
  962. "attributes: %s" % (kwargs, 'label'))
  963. log.debug("Searching for AWS Router Service %s", label)
  964. return self.svc.find(filter_name='tag:Name', filter_value=label)
  965. @dispatch(event="provider.networking.routers.list",
  966. priority=BaseRouterService.STANDARD_EVENT_PRIORITY)
  967. def list(self, limit=None, marker=None):
  968. return self.svc.list(limit=limit, marker=marker)
  969. @dispatch(event="provider.networking.routers.create",
  970. priority=BaseRouterService.STANDARD_EVENT_PRIORITY)
  971. def create(self, label, network):
  972. network_id = network.id if isinstance(network, AWSNetwork) else network
  973. cb_router = self.svc.create('create_route_table', VpcId=network_id)
  974. if label:
  975. cb_router.label = label
  976. return cb_router
  977. @dispatch(event="provider.networking.routers.delete",
  978. priority=BaseRouterService.STANDARD_EVENT_PRIORITY)
  979. def delete(self, router):
  980. r = router if isinstance(router, AWSRouter) else self.get(router)
  981. if r:
  982. # pylint:disable=protected-access
  983. r._route_table.delete()
  984. class AWSGatewayService(BaseGatewayService):
  985. def __init__(self, provider):
  986. super(AWSGatewayService, self).__init__(provider)
  987. self.svc = BotoEC2Service(provider=provider,
  988. cb_resource=AWSInternetGateway,
  989. boto_collection_name='internet_gateways')
  990. def get_or_create_inet_gateway(self, network):
  991. log.debug("Get or create inet gateway on net %s",
  992. network)
  993. network_id = network.id if isinstance(
  994. network, AWSNetwork) else network
  995. # Don't filter by label because it may conflict with at least the
  996. # default VPC that most accounts have but that network is typically
  997. # without a name.
  998. gtw = self.svc.find(filter_name='attachment.vpc-id',
  999. filter_value=network_id)
  1000. if gtw:
  1001. return gtw[0] # There can be only one gtw attached to a VPC
  1002. # Gateway does not exist so create one and attach to the supplied net
  1003. cb_gateway = self.svc.create('create_internet_gateway')
  1004. cb_gateway._gateway.create_tags(
  1005. Tags=[{'Key': 'Name',
  1006. 'Value': AWSInternetGateway.CB_DEFAULT_INET_GATEWAY_NAME
  1007. }])
  1008. cb_gateway._gateway.attach_to_vpc(VpcId=network_id)
  1009. return cb_gateway
  1010. def delete(self, network, gateway):
  1011. log.debug("Service deleting AWS Gateway %s", gateway)
  1012. gateway_id = gateway.id if isinstance(
  1013. gateway, AWSInternetGateway) else gateway
  1014. gateway = self.svc.get(gateway_id)
  1015. if gateway:
  1016. gateway.delete()
  1017. def list(self, network, limit=None, marker=None):
  1018. log.debug("Listing current AWS internet gateways for net %s.",
  1019. network.id)
  1020. fltr = [{'Name': 'attachment.vpc-id', 'Values': [network.id]}]
  1021. return self.svc.list(limit=None, marker=None, Filters=fltr)
  1022. class AWSFloatingIPService(BaseFloatingIPService):
  1023. def __init__(self, provider, gateway):
  1024. super(AWSFloatingIPService, self).__init__(provider, gateway)
  1025. self.svc = BotoEC2Service(provider=self.provider,
  1026. cb_resource=AWSFloatingIP,
  1027. boto_collection_name='vpc_addresses')
  1028. def get(self, gateway, fip_id):
  1029. log.debug("Getting AWS Floating IP Service with the id: %s", fip_id)
  1030. return self.svc.get(fip_id)
  1031. def list(self, gateway, limit=None, marker=None):
  1032. log.debug("Listing all floating IPs under gateway %s", gateway)
  1033. return self.svc.list(limit=limit, marker=marker)
  1034. def create(self, gateway):
  1035. log.debug("Creating a floating IP under gateway %s", gateway)
  1036. ip = self.provider.ec2_conn.meta.client.allocate_address(
  1037. Domain='vpc')
  1038. return AWSFloatingIP(
  1039. self.provider,
  1040. self.provider.ec2_conn.VpcAddress(ip.get('AllocationId')))
  1041. def delete(self, gateway, fip):
  1042. if isinstance(fip, AWSFloatingIP):
  1043. os_fip = fip._ip
  1044. else:
  1045. os_fip = self.svc.get_raw(fip)
  1046. os_fip.release()