Source code for kingpin.actors.aws.base

# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#
# Copyright 2014 Nextdoor.com, Inc

"""
:mod:`kingpin.actors.aws.base`
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

The AWS Actors allow you to interact with the resources (such as SQS and ELB)
inside your Amazon AWS account. These actors all support dry runs properly, but
each actor has its own caveats with ``dry=True``. Please read the instructions
below for using each actor.

**Required Environment Variables**

_Note, these can be skipped only if you have a .aws/credentials file in place._

:AWS_ACCESS_KEY_ID:
  Your AWS access key

:AWS_SECRET_ACCESS_KEY:
  Your AWS secret
"""

import json
import logging
import urllib
import re

from boto import utils as boto_utils
from boto import exception as boto_exception
from datadiff import diff
from tornado import concurrent
from tornado import gen
from tornado import ioloop
from retrying import retry
from boto.s3.connection import OrdinaryCallingFormat
import boto.cloudformation
import boto.ec2
import boto.ec2.elb
import boto.iam
import boto.sqs
import boto.s3

from kingpin import utils
from kingpin import exceptions as kingpin_exceptions
from kingpin.actors import base
from kingpin.actors import exceptions
from kingpin.actors.aws import settings as aws_settings

log = logging.getLogger(__name__)

__author__ = 'Mikhail Simin <mikhail@nextdoor.com>'

EXECUTOR = concurrent.futures.ThreadPoolExecutor(10)


[docs]class ELBNotFound(exceptions.RecoverableActorFailure): """Raised when an ELB is not found"""
[docs]class InvalidMetaData(exceptions.UnrecoverableActorFailure): """Raised when fetching AWS metadata."""
[docs]class InvalidPolicy(exceptions.RecoverableActorFailure): """Raised when Amazon indicates that policy JSON is invalid."""
class AWSBaseActor(base.BaseActor): # Get references to existing objects that are used by the # tornado.concurrent.run_on_executor() decorator. ioloop = ioloop.IOLoop.current() executor = EXECUTOR all_options = { 'region': (str, None, 'AWS Region (or zone) to connect to.') } def __init__(self, *args, **kwargs): """Check for required settings.""" super(AWSBaseActor, self).__init__(*args, **kwargs) # By default, we will try to let Boto handle discovering its # credentials at instantiation time. This _can_ result in synchronous # API calls to the Metadata service, but those should be fast. key = None secret = None # In the event though that someone has explicitly set the AWS access # keys in the environment (either for the purposes of a unit test, or # because they wanted to), we use those values. if (aws_settings.AWS_ACCESS_KEY_ID and aws_settings.AWS_SECRET_ACCESS_KEY): key = aws_settings.AWS_ACCESS_KEY_ID secret = aws_settings.AWS_SECRET_ACCESS_KEY # On our first simple IAM connection, test the credentials and make # sure things worked! try: # Establish connection objects that don't require a region self.iam_conn = boto.iam.connection.IAMConnection( aws_access_key_id=key, aws_secret_access_key=secret) except boto.exception.NoAuthHandlerFound: raise exceptions.InvalidCredentials( 'AWS settings imported but not all credentials are supplied. ' 'AWS_ACCESS_KEY_ID: %s, AWS_SECRET_ACCESS_KEY: %s' % ( aws_settings.AWS_ACCESS_KEY_ID, aws_settings.AWS_SECRET_ACCESS_KEY)) # Establish region-specific connection objects. region = self.option('region') if not region: return # In case a zone was provided instead of region we can convert # it on the fly zone_check = re.match(r'(.*[0-9])([a-z]*)$', region) if zone_check and zone_check.group(2): zone = region # Only saving this for the log below # Set the fixed region region = zone_check.group(1) self.log.warning('Converting zone "%s" to region "%s".' % ( zone, region)) region_names = [r.name for r in boto.ec2.elb.regions()] if region not in region_names: err = ('Region "%s" not found. Available regions: %s' % (region, region_names)) raise exceptions.InvalidOptions(err) self.ec2_conn = boto.ec2.connect_to_region( region, aws_access_key_id=key, aws_secret_access_key=secret) self.elb_conn = boto.ec2.elb.connect_to_region( region, aws_access_key_id=key, aws_secret_access_key=secret) self.cf_conn = boto.cloudformation.connect_to_region( region, aws_access_key_id=key, aws_secret_access_key=secret) self.sqs_conn = boto.sqs.connect_to_region( region, aws_access_key_id=key, aws_secret_access_key=secret) self.s3_conn = boto.s3.connect_to_region( region, aws_access_key_id=key, aws_secret_access_key=secret, calling_format=OrdinaryCallingFormat()) @concurrent.run_on_executor @retry(**aws_settings.RETRYING_SETTINGS) @utils.exception_logger def thread(self, function, *args, **kwargs): """Execute `function` in a concurrent thread. Example: >>> zones = yield thread(ec2_conn.get_all_zones) This allows execution of any function in a thread without having to write a wrapper method that is decorated with run_on_executor() """ try: return function(*args, **kwargs) except boto_exception.BotoServerError as e: # If we're using temporary IAM credentials, when those expire we # can get back a blank 400 from Amazon. This is confusing, but it # happens because of https://github.com/boto/boto/issues/898. In # most cases, these temporary IAM creds can be re-loaded by # reaching out to the AWS API (for example, if we're using an IAM # Instance Profile role), so thats what Boto tries to do. However, # if you're using short-term creds (say from SAML auth'd logins), # then this fails and Boto returns a blank 400. if (e.status == 400 and e.reason == 'Bad Request' and e.error_code is None): msg = 'Access credentials have expired' raise exceptions.InvalidCredentials(msg) msg = '%s: %s' % (e.error_code, e.message) if e.status == 403: raise exceptions.InvalidCredentials(msg) raise @gen.coroutine def _find_elb(self, name): """Return an ELB with the matching name. Must find exactly 1 match. Zones are limited by the AWS credentials. Args: name: String-name of the ELB to search for Returns: A single ELB reference object Raises: ELBNotFound """ self.log.info('Searching for ELB "%s"' % name) try: elbs = yield self.thread(self.elb_conn.get_all_load_balancers, load_balancer_names=name) except boto_exception.BotoServerError as e: msg = '%s: %s' % (e.error_code, e.message) log.error('Received exception: %s' % msg) if e.status == 400: raise ELBNotFound(msg) raise self.log.debug('ELBs found: %s' % elbs) if len(elbs) != 1: raise ELBNotFound('Expected to find exactly 1 ELB. Found %s: %s' % (len(elbs), elbs)) raise gen.Return(elbs[0]) @concurrent.run_on_executor @retry(**aws_settings.RETRYING_SETTINGS) def _get_meta_data(self, key): """Get AWS meta data for current instance. http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ ec2-instance-metadata.html """ meta = boto_utils.get_instance_metadata(timeout=1, num_retries=2) if not meta: raise InvalidMetaData('No metadata available. Not AWS instance?') data = meta.get(key, None) if not data: raise InvalidMetaData('Metadata for key `%s` is not available') return data def _policy_doc_to_dict(self, policy): """Converts a Boto UUEncoded Policy document to a Dict. args: policy: The policy string returned by Boto """ return json.loads(urllib.unquote(policy)) def _parse_policy_json(self, policy): """Parse a single JSON file into an Amazon policy. Validates that the policy document can be parsed, strips out any comments, and fills in any environmental tokens. Returns a dictionary of the contents. Returns None if the input is None. args: policy: The Policy JSON file to read. returns: A dictionary of the parsed policy. """ if policy is None: return None # Run through any supplied Inline IAM Policies and verify that they're # not corrupt very early on. self.log.debug('Parsing and validating %s' % policy) try: p_doc = utils.convert_script_to_dict(script_file=policy, tokens=self._init_tokens) except kingpin_exceptions.InvalidScript as e: raise exceptions.UnrecoverableActorFailure('Error parsing %s: %s' % (policy, e)) return p_doc def _diff_policy_json(self, policy1, policy2): """Compares two dicts and returns True/False. Sorts two dicts (including sorting of the lists!!) and then diffs them. args: policy1: First policy (a) policy2: Second policy (b) returns: None: No diff Str: A diff string """ policy1 = utils.order_dict(policy1) policy2 = utils.order_dict(policy2) if policy1 == policy2: return return str(diff(policy1, policy2))