Source code for kingpin.actors.aws.iam.entities

# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
# Copyright 2018 Nextdoor.com, Inc

"""
:mod:`kingpin.actors.aws.iam.entities`
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
"""

import json
import os
import logging

from boto.exception import BotoServerError
from tornado import concurrent
from tornado import gen

from kingpin import utils
from kingpin.actors import exceptions
from kingpin.actors.aws.iam import base
from kingpin.constants import REQUIRED
from kingpin.constants import STATE

log = logging.getLogger(__name__)

__author__ = 'Matt Wise <matt@nextdoor.com>'


# This executor is used by the tornado.concurrent.run_on_executor()
# decorator. We would like this to be a class variable so its shared
# across RightScale objects, but we see testing IO errors when we
# do this.
EXECUTOR = concurrent.futures.ThreadPoolExecutor(10)

# The maximum number of items returned to us in a get_all_*/list_* api call.
# Defaults to 100, but setting to 1000 to reduce the number of API calls we
# make.
MAX_ITEMS = 1000


class EntityBaseActor(base.IAMBaseActor):

    """User/Group/Role Base Management Class

    Managing Users, Groups and Roles in Amazon IAM is nearly identical. This
    class abstracts that work, so that the actual User/Group/Role actors can be
    extremely simple and just handle the differences between each type of IAM
    entity.
    """

    all_options = {
        'name': (str, REQUIRED, 'The name of the user.'),
        'state': (STATE, 'present',
                  'Desired state of the User: present/absent'),
        'inline_policies': ((str, list), None,
                            'List of inline policy JSON files to apply.')
    }

    def __init__(self, *args, **kwargs):
        super(EntityBaseActor, self).__init__(*args, **kwargs)

        # These IAM Connection methods must be overridden in a subclass of this
        # actor. Each of these is a "generalized" name for the method in Boto
        # found at http://boto.cloudhackers.com/en/latest/ref/iam.html.
        #
        # This is a little confusing, but the idea is that these methods all
        # basically behave the same (are called the same way, return the same
        # type of data), so we should be able to generalize them into
        # variables.
        #
        # Once these are mapped to real IAM calls, then the methods in this
        # base class will work.

        # The "text name" of the entity type. This is either:
        #  user, group, role, instance_profile
        self.entity_name = 'base'

        self.create_entity = None
        self.delete_entity = None
        self.delete_entity_policy = None
        self.get_all_entities = None
        self.get_all_entity_policies = None
        self.get_entity_policy = None
        self.put_entity_policy = None

    def _generate_policy_name(self, policy):
        """Generates an Amazon-friendly Policy name from a filename.

        Amazon Inline IAM Policies have names -- and although allowing our
        users to enter their own name might be nice, its overkill in most
        cases. We'd rather just determine the name for them from the name of
        the policy definition file that they included in the JSON.

        http://docs.aws.amazon.com/IAM/latest/UserGuide/reference_iam-limits.html

        args:
            policy: The file name of the policy document

        returns:
            A string name to use as the policy name
        """
        # Get rid of the extension first
        name = os.path.splitext(policy)[0]

        # If theres a leading slash, strip it
        name = name.lstrip('/')

        # Replace slashes with dashes instead
        name = name.replace('/', '-')
        name = name.replace('\\', '-')

        # Strip out any non-allowed characters that made it through
        name = name.replace('*', '')
        name = name.replace('?', '')

        return name

    def _parse_inline_policies(self, policies):
        """Read, parse and store our inline policies.

        Any of the inline policies passed into this actor at init time are read
        in, parsed, turned into dicts and then stored in an object level
        dictionary for future use. This is done at __init__ time to make sure
        we catch any syntax errors as early as possible.

        args:
            policies: A string or list of strings that point to JSON files with
            IAM policies in them.
        """
        # If the inline_policies is None, then we bail and set
        # self.inline_policies to none.
        if policies is None:
            self.inline_policies = None
            return

        # Prepare to store our parsed inline policies in a hash of key/values
        # -- the key is the policy name (with no file ending) and the value is
        # the dict of the policy itself.
        self.inline_policies = {}

        # If a single policy was supplied (ie, maybe on a command line) then
        # turn it into a list.
        if isinstance(policies, basestring):
            policies = [policies]

        # Run through any supplied Inline IAM Policies and verify that they're
        # not corrupt very early on.
        for policy in policies:
            p_name = self._generate_policy_name(policy)
            self.inline_policies[p_name] = self._parse_policy_json(policy)

            self.log.debug('Parsed policy %s: %s' %
                           (p_name, self.inline_policies[p_name]))

    @gen.coroutine
    def _get_entity_policies(self, name):
        """Returns a dictionary of all the inline policies attached to a entity.

        args:
            name: The IAM Entity Name (Name/Group)

        returns:
            A dict of key/value pairs - key is the policy name, value is the
            dict-version of the policy document.
        """
        policies = {}

        # Get the list of inline policies attached to an entity. Note, not
        # all entities have a concept of inline policies. If
        # self.get_all_entity_policies is None, it returns a TypeError. We'll
        # catch that and silently move on.
        policy_names = []
        try:
            self.log.debug('Searching for any inline policies for %s' % name)
            ret = yield self.api_call(self.get_all_entity_policies, name)
            policy_names = (ret['list_%s_policies_response' % self.entity_name]
                               ['list_%s_policies_result' % self.entity_name]
                               ['policy_names'])
        except BotoServerError as e:
            if e.status == 404:
                # The user doesn't exist.. likely in a dry run. Return no
                # policies.
                policy_names = []
            else:
                raise exceptions.RecoverableActorFailure(
                    'An unexpected API error occurred: %s' % e)
        except TypeError:
            pass

        # Iterate through all of the named policies and fire off
        # get-requests, but don't yield on them yet.
        tasks = []
        for p_name in policy_names:
            tasks.append((p_name,
                          self.api_call(self.get_entity_policy, name, p_name)))

        # Now that we've fired off all the calls, we walk through each yielded
        # result, parse the returned policy, and append it to our policies
        # list. We also catch any raised exceptions here.
        for t in tasks:
            (p_name, p_task) = t
            try:
                raw = yield p_task
            except BotoServerError as e:
                raise exceptions.RecoverableActorFailure(
                    'An unexpected API error occurred downloading '
                    'policy %s: %s' % (p_name, e))

            # Convert the uuencoded doc string into a dict
            p_doc = self._policy_doc_to_dict((
                raw['get_%s_policy_response' % self.entity_name]
                   ['get_%s_policy_result' % self.entity_name]
                   ['policy_document']))

            # Store the converted document under the policy name key
            policies[p_name] = p_doc
            self.log.debug('Got policy %s/%s: %s' % (name, p_name, p_doc))

        raise gen.Return(policies)

    @gen.coroutine
    def _ensure_inline_policies(self, name):
        """Ensures that all of the inline IAM policies for a entity are managed

        This method has three stages.. first it ensures that any missing
        policies (as determined by the policy name) are applied to a entity.
        Second, it determines if any existing policies have changed locally and
        need to be updated in IAM. Finally it purges unmanaged policies that
        were applied to a entity out of band.

        args:
            name: The entity to manage
        """
        # Get the list of current entity policies first
        existing_policies = yield self._get_entity_policies(name)

        # First, push any policies that we have listed, but aren't in the
        # entity
        tasks = []
        for policy in (set(self.inline_policies.keys()) -
                       set(existing_policies.keys())):
            policy_doc = self.inline_policies[policy]
            tasks.append(self._put_entity_policy(name, policy, policy_doc))
        yield tasks

        # Do we have matching policies that we're managing here, and are
        # already attached to the entity profile? Lets make sure each one of
        # those matches the policy we have here, and update it if necessary.
        tasks = []
        for policy in (set(self.inline_policies.keys()) &
                       set(existing_policies.keys())):
            new = self.inline_policies[policy]
            exist = existing_policies[policy]
            diff = utils.diff_dicts(exist, new)
            if diff:
                self.log.info('Policy %s differs from Amazons:' % policy)
                for line in diff.split('\n'):
                    self.log.info('Diff: %s' % line)
                policy_doc = self.inline_policies[policy]
                tasks.append(self._put_entity_policy(name, policy, policy_doc))
        yield tasks

        # Purge any policies we found in AWS that were not listed in our actor
        tasks = []
        for policy in (set(existing_policies.keys()) -
                       set(self.inline_policies.keys())):
            tasks.append(self._delete_entity_policy(name, policy))
        yield tasks

    @gen.coroutine
    def _delete_entity_policy(self, name, policy_name):
        """Optionally pushes a policy to an IAM entity.

        args:
            name: The IAM Entity Name
            policy_name: The entity policy name
        """
        if self._dry:
            self.log.warning('Would delete policy %s from %s %s' %
                             (policy_name, self.entity_name, name))
            raise gen.Return()

        self.log.info('Deleting policy %s from %s %s' %
                      (policy_name, self.entity_name, name))
        try:
            ret = yield self.api_call(
                self.delete_entity_policy, name, policy_name)
            self.log.debug('Policy %s deleted: %s' % (policy_name, ret))
        except BotoServerError as e:
            if e.error_code != 404:
                raise exceptions.RecoverableActorFailure(
                    'An unexpected API error occurred: %s' % e)

    @gen.coroutine
    def _put_entity_policy(self, name, policy_name, policy_doc):
        """Optionally pushes a policy to an IAM Entity.

        args:
            name: The IAM Entity Name
            policy_name: The entity policy name
            policy_doc: The ploicy document object itself
        """
        if self._dry:
            self.log.warning('Would push policy %s to %s %s' %
                             (policy_name, self.entity_name, name))
            raise gen.Return()

        self.log.info('Pushing policy %s to %s %s' %
                      (policy_name, self.entity_name, name))
        try:
            ret = yield self.api_call(
                self.put_entity_policy,
                name,
                policy_name,
                json.dumps(policy_doc))
            self.log.debug('Policy %s pushed: %s' % (policy_name, ret))
        except BotoServerError as e:
            raise exceptions.RecoverableActorFailure(
                'An unexpected API error occurred: %s' % e)

    @gen.coroutine
    def _get_entity(self, name):
        """Returns an IAM Entity JSON Blob.

        Searches for an IAM Entity and either returns None, or a JSON blob that
        describes the Entity.

        args:
            name: The IAM Entity Name
        """
        self.log.debug('Searching for %s %s' % (self.entity_name, name))

        # Get a list of all of the entities - return 100 results at a time, and
        # paginate the results.
        is_truncated = True
        marker = None
        while is_truncated:
            # Get the list back - if the marker has been set, then we pass it
            # in and we start from where the last results told us we should.
            try:
                response = yield self.api_call(
                    self.get_all_entities, max_items=MAX_ITEMS, marker=marker)
            except BotoServerError as e:
                raise exceptions.RecoverableActorFailure(
                    'An unexpected API error occurred: %s' % e)

            # Get the result object from the response...
            result = (
                response['list_%ss_response' % self.entity_name]
                        ['list_%ss_result' % self.entity_name])

            # If the results indicate they were truncated, they'll include
            # a 'marker'. Setting these two variables will cause this to
            # loop again, in the event that we don't find the response in
            # the first set of results.
            is_truncated = self.str2bool(result.get('is_truncated', False))
            marker = result.get('marker', None)

            # Check our result for the entity.. if its there, great.
            # Otherwise, we'll move on.
            entity = [entity for entity in result['%ss' % self.entity_name]
                      if entity['%s_name' % self.entity_name] == name]

            if len(entity) > 0:
                self.log.debug(
                    'Found %s %s' % (self.entity_name, entity[0]['arn']))
                raise gen.Return(entity[0])

        # If there aren't any entities, return None.
        raise gen.Return()

    @gen.coroutine
    def _ensure_entity(self, name, state):
        """Ensures a entity is either present or absent.

        Looks up the entities current state and then makes a decision about
        creating or deleting the entity. If the entity is already in the
        correct state, not changes are made.

        args:
            name: The IAM User Name
            state: 'present' or 'absent'
        """
        self.log.info('Ensuring that %s %s is %s' %
                      (self.entity_name, name, state))

        entity = yield self._get_entity(name)

        if entity and state == 'present':
            raise gen.Return()
        elif not entity and state == 'present':
            yield self._create_entity(name)
        elif entity and state == 'absent':
            yield self._delete_entity(name)
        elif not entity and state == 'absent':
            raise gen.Return()

    @gen.coroutine
    def _create_entity(self, name):
        """Creates an IAM Entity.

        If the entity exists, we just warn and move on.

        args:
            name: The IAM Entity Name
        """
        if self._dry:
            self.log.warning('Would create %s %s' % (self.entity_name, name))
            raise gen.Return()

        try:
            ret = yield self.api_call(
                self.create_entity, name)
        except BotoServerError as e:
            if e.status != 409:
                raise exceptions.RecoverableActorFailure(
                    'An unexpected API error occurred: %s' % e)
            self.log.warning(
                '%s %s already exists, skipping creation.' %
                (self.entity_name, name))
            raise gen.Return()

        arn = (ret['create_%s_response' % self.entity_name]
                  ['create_%s_result' % self.entity_name]
                  [self.entity_name]['arn'])
        self.log.info('%s %s created' % (self.entity_name, arn))

    @gen.coroutine
    def _delete_entity(self, name):
        """Deletes and IAM Entity.

        If the entity doesn't exist, we just warn and move on.

        args:
            name: The IAM Entity Name
        """
        if self._dry:
            self.log.warning('Would delete %s %s' % (self.entity_name, name))
            raise gen.Return()

        try:
            # Get the entities policies. They have to be deleted before we can
            # possibly move forward and delete the entity.
            existing_policies = yield self._get_entity_policies(name)
            tasks = []
            for policy in existing_policies:
                tasks.append(self._delete_entity_policy(name, policy))
            yield tasks

            # Now delete the entity
            yield self.api_call(self.delete_entity, name)
            self.log.info('%s %s deleted' % (self.entity_name, name))
        except BotoServerError as e:
            if e.status != 404:
                raise exceptions.RecoverableActorFailure(
                    'An unexpected API error occurred: %s' % e)
            self.log.warning('%s %s doesn\'t exist' % (self.entity_name, name))

    @gen.coroutine
    def _add_user_to_group(self, name, group):
        """Quick helper method to add a user to a group.

        args:
            name: user name
            group: group name
        """
        if self._dry:
            self.log.warning('Would have added %s to %s' % (name, group))
            raise gen.Return()

        try:
            self.log.info('Adding %s to %s' % (name, group))
            yield self.api_call(self.iam_conn.add_user_to_group, group, name)
        except BotoServerError as e:
            raise exceptions.RecoverableActorFailure(
                'An unexpected API error occurred: %s' % e)

    @gen.coroutine
    def _remove_user_from_group(self, name, group):
        """Quick helper method to remove a user from a group.

        args:
            name: user name
            group: group name
        """
        if self._dry:
            self.log.warning('Would have removed %s from %s' % (name, group))
            raise gen.Return()

        try:
            self.log.info('Removing %s from %s' % (name, group))
            yield self.api_call(self.iam_conn.remove_user_from_group,
                                group, name)
        except BotoServerError as e:
            raise exceptions.RecoverableActorFailure(
                'An unexpected API error occurred: %s' % e)


[docs]class User(EntityBaseActor): """Manages an IAM User. This actor manages the state of an Amazon IAM User. Currently we can: * Ensure is present or absent * Manage the inline policies for the user * Manage the groups the user is in **Options** :name: (str) Name of the User profile to manage :state: (str) Present or Absent. Default: "present" :groups: (str,array) A list of groups for the user to be a member of. Default: None :inline_policies: (str,array) A list of strings that point to JSON files to use as inline policies. Default: None **Example** .. code-block:: json { "actor": "aws.iam.User", "desc": "Ensure that Bob exists", "options": { "name": "bob", "state": "present", "groups": "my-test-group", "inline_policies": [ "read-all-s3.json", "create-other-stuff.json" ] } } **Dry run** Will let you know if the user exists or not, and what changes it would make to the users policy and settings. Will also parse the inline policies supplied, make sure any tokens in the files are replaced, and that the files are valid JSON. """ all_options = { 'name': (str, REQUIRED, 'The name of the user.'), 'state': (STATE, 'present', 'Desired state of the User: present/absent'), 'groups': ((str, list), None, 'List of groups to add the user to.'), 'inline_policies': ((str, list), None, 'List of inline policy JSON files to apply.') } desc = "IAM User {name}" def __init__(self, *args, **kwargs): super(User, self).__init__(*args, **kwargs) self.entity_name = 'user' self.create_entity = self.iam_conn.create_user self.delete_entity = self.iam_conn.delete_user self.delete_entity_policy = self.iam_conn.delete_user_policy self.get_all_entities = self.iam_conn.get_all_users self.get_all_entity_policies = self.iam_conn.get_all_user_policies self.get_entity_policy = self.iam_conn.get_user_policy self.put_entity_policy = self.iam_conn.put_user_policy # Parse the supplied inline policies self._parse_inline_policies(self.option('inline_policies')) @gen.coroutine def _ensure_groups(self, name, groups): """Ensure that this user is a member of specific groups. args: name: The user we're managing groups: The list (or single) of groups to join be members of """ if isinstance(groups, basestring): groups = [groups] current_groups = set() try: res = yield self.api_call(self.iam_conn.get_groups_for_user, name) current_groups = {g['group_name'] for g in res['list_groups_for_user_response'] ['list_groups_for_user_result'] ['groups']} except BotoServerError as e: # If the error is a 404, then the user doesn't exist and we can # assume that the mappings don't exist at all. We leave the # existin_mappings list alone. For any other error, raise. if e.status != 404: raise exceptions.RecoverableActorFailure( 'An unexpected API error occurred: %s' % e) # Find any groups that we're not already a member of, and add us tasks = [] for new_group in set(groups) - current_groups: tasks.append(self._add_user_to_group(name, new_group)) yield tasks # Find any group memberships we didn't know about, and purge them tasks = [] for bad_group in current_groups - set(groups): tasks.append(self._remove_user_from_group(name, bad_group)) yield tasks @gen.coroutine def _execute(self): name = self.option('name') state = self.option('state') groups = self.option('groups') yield self._ensure_entity(name, state) if state == 'absent': raise gen.Return() if self.option('inline_policies') is not None: yield self._ensure_inline_policies(name) if groups is not None: yield self._ensure_groups(name, groups) raise gen.Return()
[docs]class Group(EntityBaseActor): """Manages an IAM Group. This actor manages the state of an Amazon IAM Group. Currently we can: * Ensure is present or absent * Manage the inline policies for the group * Purge (or not) all group members and delete the group **Options** :name: (str) Name of the Group profile to manage :force: (bool) Forcefully delete the group (explicitly purging all group memberships). Default: false :state: (str) Present or Absent. Default: "present" :inline_policies: (str,array) A list of strings that point to JSON files to use as inline policies. You can also pass in a single inline policy as a string. Default: None **Example** .. code-block:: json { "actor": "aws.iam.Group", "desc": "Ensure that devtools exists", "options": { "name": "devtools", "state": "present", "inline_policies": [ "read-all-s3.json", "create-other-stuff.json" ] } } **Dry run** Will let you know if the group exists or not, and what changes it would make to the groups policy and settings. Will also parse the inline policies supplied, make sure any tokens in the files are replaced, and that the files are valid JSON. """ all_options = { 'name': (str, REQUIRED, 'The name of the group.'), 'force': (bool, False, 'Forcefully delete the group.'), 'state': (STATE, 'present', 'Desired state of the group: present/absent'), 'inline_policies': ((str, list), None, 'List of inline policy JSON files to apply.') } desc = "IAM Group {name}" def __init__(self, *args, **kwargs): super(Group, self).__init__(*args, **kwargs) self.entity_name = 'group' self.create_entity = self.iam_conn.create_group self.delete_entity = self.iam_conn.delete_group self.delete_entity_policy = self.iam_conn.delete_group_policy self.get_all_entities = self.iam_conn.get_all_groups self.get_all_entity_policies = self.iam_conn.get_all_group_policies self.get_entity_policy = self.iam_conn.get_group_policy self.put_entity_policy = self.iam_conn.put_group_policy # Parse the supplied inline policies self._parse_inline_policies(self.option('inline_policies')) @gen.coroutine def _get_group_users(self, name): """Returns a list of users assigned to the group. args: name: the name of the group returns: a list of user name strings """ users = [] try: raw = yield self.api_call(self.iam_conn.get_group, name) users = [user['user_name'] for user in raw['get_group_response']['get_group_result']['users']] except BotoServerError as e: if e.status != 404: raise exceptions.RecoverableActorFailure( 'An unexpected API error occurred: %s' % e) except KeyError: # No users! users = [] raise gen.Return(users) @gen.coroutine def _purge_group_users(self, name, force): """Forcefully purge all users from the group. This is used only if the group has users, is being deleted, and the 'purge' option was set. args: name: the group name force: boolean whether or not to actually force the removal """ users = yield self._get_group_users(name) if not force and users: self.log.warning(('Will not be able to delete this group ' 'without first removing all of its members. ' 'Use the `force` option to purge all members.')) self.log.warning('Group members: %s' % ', '.join(users)) if not force: raise gen.Return() tasks = [] for user in users: tasks.append(self._remove_user_from_group(user, name)) yield tasks @gen.coroutine def _execute(self): name = self.option('name') state = self.option('state') force = self.option('force') if state == 'absent': yield self._purge_group_users(name, force) yield self._ensure_entity(name, state) if state == 'absent': raise gen.Return() if self.option('inline_policies') is not None: yield self._ensure_inline_policies(name) raise gen.Return()
[docs]class Role(EntityBaseActor): """Manages an IAM Role. This actor manages the state of an Amazon IAM Role. Currently we can: * Ensure is present or absent * Manage the inline policies for the role * Manage the Assume Role Policy Document **Options** :name: (str) Name of the Role to manage :state: (str) Present or Absent. Default: "present" :inline_policies: (str,array) A list of strings that point to JSON files to use as inline policies. You can also pass in a single inline policy as a string. Default: None :assume_role_policy_document: (str) A string with an Amazon IAM Assume Role policy. Not providing this causes Kingpin to ignore the value, and Amazon defaults the role to an 'EC2' style rule. Supplying the document will cause Kingpin to ensure the assume role policy is correct. Default: None **Example** .. code-block:: json { "actor": "aws.iam.Role", "desc": "Ensure that myapp exists", "options": { "name": "myapp", "state": "present", "inline_policies": [ "read-all-s3.json", "create-other-stuff.json" ] } } **Dry run** Will let you know if the group exists or not, and what changes it would make to the groups policy and settings. Will also parse the inline policies supplied, make sure any tokens in the files are replaced, and that the files are valid JSON. """ all_options = { 'name': (str, REQUIRED, 'The name of the role.'), 'state': (STATE, 'present', 'Desired state of the group: present/absent'), 'inline_policies': ((str, list), None, 'List of inline policy JSON files to apply.'), 'assume_role_policy_document': (str, None, ('The policy that grants an entity' 'permission to assume the role')) } desc = "IAM Role {name}" def __init__(self, *args, **kwargs): super(Role, self).__init__(*args, **kwargs) self.entity_name = 'role' self.create_entity = self.iam_conn.create_role self.delete_entity = self.iam_conn.delete_role self.delete_entity_policy = self.iam_conn.delete_role_policy self.get_all_entities = self.iam_conn.list_roles self.get_all_entity_policies = self.iam_conn.list_role_policies self.get_entity_policy = self.iam_conn.get_role_policy self.put_entity_policy = self.iam_conn.put_role_policy # Pre-parse the supplied inline policies self._parse_inline_policies(self.option('inline_policies')) # Pre-parse the Assume Role Policy Document if it was supplied if self.option('assume_role_policy_document') is not None: self.assume_role_policy_doc = self._parse_policy_json( self.option('assume_role_policy_document')) @gen.coroutine def _ensure_assume_role_doc(self, name): """Ensures that the Assume Role Policy for a Role is up to date. Downloads the existing Assume Role Policy for a given Role, then compares it against our configured policy and optionally updates it if they differ. Args: name: The role we're workin with """ # Get our existing role policy from the entity entity = yield self._get_entity(name) # If the entity doesn't exist, then we must be in a Dry run and the # role hasn't been created yet. Just bail silently. if not entity: raise gen.Return() # Parse the raw data into a dict we can compare exist = self._policy_doc_to_dict(entity['assume_role_policy_document']) new = self.assume_role_policy_doc # Now diff it against our desired policy. If no diff, then quietly # return. diff = utils.diff_dicts(exist, new) if not diff: self.log.debug('Assume Role Policy documents match') raise gen.Return() self.log.info('Assume Role Policy differs from Amazons:') for line in diff.split('\n'): self.log.info('Diff: %s' % line) if self._dry: self.log.warning('Would have updated the Assume Role Policy Doc') raise gen.Return() self.log.info('Updating the Assume Role Policy Document') yield self.api_call( self.iam_conn.update_assume_role_policy, name, json.dumps(new)) @gen.coroutine def _execute(self): name = self.option('name') state = self.option('state') yield self._ensure_entity(name, state) if state == 'absent': raise gen.Return() if self.option('inline_policies') is not None: yield self._ensure_inline_policies(name) if self.option('assume_role_policy_document') is not None: yield self._ensure_assume_role_doc(name) raise gen.Return()
[docs]class InstanceProfile(EntityBaseActor): """Manages an IAM Instance Profile. This actor manages the state of an Amazon IAM Instance Profile. Currently we can: * Ensure is present or absent * Assign an IAM Role to the Instance Profile **Options** :name: (str) Name of the Role to manage :state: (str) Present or Absent. Default: "present" :role: (str) Name of an IAM Role to assign to the Instance Profile. Default: None **Example** .. code-block:: json { "actor": "aws.iam.InstanceProfile", "desc": "Ensure that my-ecs-servers exists", "options": { "name": "my-ecs-servers", "state": "present", "role": "some-iam-role", } } **Dry run** Will let you know if the profile exists or not, and what changes it would make to the profile. """ all_options = { 'name': (str, REQUIRED, 'The name of the instance profile.'), 'state': (STATE, 'present', 'Desired state of the group: present/absent'), 'role': (str, None, 'Name of an IAM Role to assign') } desc = "InstanceProfile {name}" def __init__(self, *args, **kwargs): super(InstanceProfile, self).__init__(*args, **kwargs) self.entity_name = 'instance_profile' self.create_entity = self.iam_conn.create_instance_profile self.delete_entity = self.iam_conn.delete_instance_profile self.get_all_entities = self.iam_conn.list_instance_profiles @gen.coroutine def _add_role(self, name, role): """Adds a role to an Instance Profile. args: name: The name of the Instance Profile we're managing role: The name of the role to assign to the profile """ if self._dry: self.log.warning('Would add role %s from %s' % (role, name)) raise gen.Return() try: self.log.info('Adding role %s to %s' % (role, name)) yield self.api_call(self.iam_conn.add_role_to_instance_profile, name, role) except BotoServerError as e: if e.status != 409: raise exceptions.RecoverableActorFailure( 'An unexpected API error occurred: %s' % e) @gen.coroutine def _remove_role(self, name, role): """Removes a role assigned to an Instance Profile. args: name: The name of the InstanceProfile we're managing role: The name of the role to remove """ if self._dry: self.log.warning('Would remove role %s from %s' % (role, name)) raise gen.Return() try: self.log.info('Removing role %s from %s' % (role, name)) yield self.api_call( self.iam_conn.remove_role_from_instance_profile, name, role) except BotoServerError as e: if e.status != 404: raise exceptions.RecoverableActorFailure( 'An unexpected API error occurred: %s' % e) @gen.coroutine def _ensure_role(self, name, role): """Ensures that an Instance Profile role is set correctly. Adds, Deletes or Changes the Role assigned to an Instance Profile. args: name: The IAM Instance Profile we're managing role: The desired role (or None) """ existing = None try: raw = yield self.api_call(self.iam_conn.get_instance_profile, name) existing = (raw['get_instance_profile_response'] ['get_instance_profile_result'] ['instance_profile'] ['roles'] ['member'] ['role_name']) except BotoServerError as e: if e.status != 404: raise exceptions.RecoverableActorFailure( 'An unexpected API error occurred: %s' % e) except KeyError: # Profile is not a member of any roles pass if not existing and not role: raise gen.Return() elif existing and not role: yield self._remove_role(name, existing) elif not existing and role: yield self._add_role(name, role) elif existing != role: yield self._remove_role(name, existing) yield self._add_role(name, role) @gen.coroutine def _execute(self): name = self.option('name') state = self.option('state') role = self.option('role') yield self._ensure_entity(name, state) if state == 'absent': raise gen.Return() if role is not None: yield self._ensure_role(name, role)