Example #1
0
File: aws.py Project: ua-ants/peerd
def get_role_credentials(account: str, sts_client: Any) -> dict:
    """
    Assumes a role and returns credentials for said role.
    Requires the COMMON_PRINCIPAL_NAME to be set, usually from metadata.

    Example returned dictionary:
    ```
    {
        "Expiration": "2020-01-27T11:55:44Z",
        "Token": "abc123",
        "SecretAccessKey": "def456",
        "AccessKeyId": "ABCDEF123",
        "Type": "AWS-SOMETHING",
        "LastUpdated": "2020-01-27T10:55:45Z",
        "Code": "Success"
    }

    :param account: An AWS account id number
    :type account: str
    :param sts_client: an aws client connection to the sts service
    :type resource: boto3 client
    :returns: Dictionary containing the credentials from the assume role action
    :rtype: dict
    """
    try:
        arn = f'arn:aws:iam::{account}:role/{COMMON_PRINCIPAL_NAME}'
        LOGGER.info(f'Attempting to tokenise into: {arn}')
        credentials = sts_client.assume_role(RoleArn=arn, RoleSessionName=ROLE_SESSION_NAME)['Credentials']
        LOGGER.info(f'Successfully tokenised into: {arn}')
        return credentials
    except BaseException:
        LOGGER.warning("Unexpected error: %s", sys.exc_info()[1], exc_info=True)
        return {}
Example #2
0
def common_vpc_cidrs(peer_desc: list) -> bool:
    """
    Returns true if the VPCs share any CIDRs in common
    Returns false if the VPCs share no CIDRs in common

    Example Input:
    ```
    [
        {
            'account_id': '1234567890',
            'vpc_id': 'vpc-123',
            'region': 'us-west-2'
        }
        {
            'account_id': '3456789012',
            'vpc_id': 'vpc-456',
            'region': 'us-west-1'
        }
    ]
    ```

    :param peer_desc: A list containing two dictionaries describing the account, vpc and region of two sides of a peering
    :type peer_desc: list
    :returns: True if there 1 or more common CIDRs, False otherwise.
    """
    requester_vpc_cidrs = list_vpc_cidrs(peer_desc[0]['vpc_id'], peer_desc[0]['account_id'], peer_desc[0]['region'])
    accepter_vpc_cidrs = list_vpc_cidrs(peer_desc[1]['vpc_id'], peer_desc[1]['account_id'], peer_desc[1]['region'])
    if bool(set(requester_vpc_cidrs) & set(accepter_vpc_cidrs)):
        LOGGER.info(f'VPC {peer_desc[0]["vpc_id"]} cidrs {requester_vpc_cidrs} and {peer_desc[0]["vpc_id"]} cidrs {accepter_vpc_cidrs} share a common cidr.')
    return bool(set(requester_vpc_cidrs) & set(accepter_vpc_cidrs))
Example #3
0
File: aws.py Project: ua-ants/peerd
def aws_sts_client() -> Any:
    """
    Uses default boto credentials locations, such as the instance metadata
    to return a sts client connection and caches it as a global variable for reuse.

    :returns: AWS STS client connection
    """

    sts_client = boto3.client('sts', config=Config(retries=dict(max_attempts=10)))
    LOGGER.info(f'Found the following STS identity:\n{json.dumps(sts_client.get_caller_identity(), indent=2)}')
    return sts_client
Example #4
0
File: aws.py Project: ua-ants/peerd
def describe_account_vpcs_cached(account_id: str, region: str) -> List[dict]:
    """
    Describe all the VPCs in a given account in a given region and return them as a list of descriptions
    See https://boto3.amazonaws.com/v1/documentation/api/latest/reference/services/ec2.html#EC2.Client.describe_vpcs

    :param account_id: An AWS account id number
    :type account: str
    :param region: An AWS region where the service client should be created. e.g. us-east-1
    :type region: str
    :returns: A list of dictionaries representing all the VPCs for a given account and region.
    :rtype: list
    """
    LOGGER.info(f'Fetching description of all VPCs for account {account_id} in region {region}')
    ec2_client = aws_client(account_id, 'ec2', region)
    return ec2_client.describe_vpcs()['Vpcs']
Example #5
0
File: aws.py Project: ua-ants/peerd
def check_iam_role_capability(account_id: str) -> bool:
    """
    Check that we can assume a role in each account and perform an ec2 action to validate it.
    Allows us to filter out accounts which do not work for the script and inform the user.

    :param account_id: An AWS Account Id
    :type account_id: str
    :returns: True if the role and EC2 client works. False otherwise.
    :rtype: bool
    """
    try:
        if ec2_client := aws_client(account_id, 'ec2', 'us-east-1'):
            ec2_client.describe_vpcs()
            LOGGER.info(f'Able to assume role in {account_id} and access the EC2 API.')
            return True
        LOGGER.warning(f'Unable to assume role in {account_id} and access the EC2 API.')
Example #6
0
File: aws.py Project: m1keil/peerd
def tag_resource(client, resource: str, tags: dict, dryrun: bool = False):
    """
    Tags an AWS resource with the provided tags.

    Example Usage:
    ```
    ec2_client = aws_client(account_id, 'ec2', region)
    tags = {'peerd_support': '*****@*****.**',
            'peerd_datetime': str(datetime.now())}
    tag_resource(ec2_client, peerding_id, tags)
    ```
    :param client: An AWS boto3 client connection to an AWS resource
    :type client: boto3 client
    :param resource: The name of the resource e.g. rt-abc123
    :type resource: string
    :param tags: Dictionary of tags to apply to a resource
    :type tags: dict
    :returns: Nothing
    :raises BaseException: Raises an exception if there was some problem tagging the resource
    """
    tags = [{'Key': key, 'Value': value} for (key, value) in tags.items()]

    for x in range(5):
        try:
            LOGGER.debug(f'Tagging {resource}')
            client.create_tags(Resources=[resource], Tags=tags, DryRun=dryrun)
            LOGGER.debug(f'Tagging {resource} successful')
            return
        except botocore.exceptions.ClientError as err:
            if err.response['Error']['Code'] == 'DryRunOperation':
                LOGGER.debug(f'Tagging {resource} successful')
                return
            LOGGER.info(
                f'Tagging {resource} encountered error: {err.response["Error"]["Message"]}. Will retry.'
            )
            sleep(1)
            continue
        except BaseException:
            LOGGER.warning("Unexpected error: %s",
                           sys.exc_info()[1],
                           exc_info=True)

    raise Exception(f'Could not tag resource {resource}')
Example #7
0
File: aws.py Project: m1keil/peerd
        )
        CLIENT_CACHE[account][region][service] = None
        return None

    # In this block we use the account credentials we got above, to create and cache a client
    # connection to an AWS service.
    if service not in CLIENT_CACHE[account][region]:
        try:
            CLIENT_CACHE[account][region][service] = boto3.client(
                service,
                region_name=region,
                aws_access_key_id=credentials['AccessKeyId'],
                aws_secret_access_key=credentials['SecretAccessKey'],
                aws_session_token=credentials['SessionToken'],
                config=Config(retries=dict(max_attempts=10)))
            LOGGER.info('Obtained fresh client connection.')
        except BaseException:
            LOGGER.error(f'Unexpected error: {sys.exc_info()[1]}',
                         exc_info=True)
            CLIENT_CACHE[account][region][service] = None
    else:
        LOGGER.debug('Fetched a cached client connection.')

    return CLIENT_CACHE[account][region][service]


def tag_resource(client, resource: str, tags: dict, dryrun: bool = False):
    """
    Tags an AWS resource with the provided tags.

    Example Usage:
Example #8
0
File: core.py Project: intfrr/peerd
def delete_unneeded_peerings(config: Sequence[dict], metadata: Mapping,
                             dryrun: bool) -> None:
    """
    Compares the infrastructure with the configuration and applies
    route cleanup and peering deletion logic to remove VPC peerings.

    :param peering_id: A vpc peering id e.g. pcx-011a291e5affc8d95
    :type peering_id: str
    :param vpc_id: A vpc id e.g. vpc-abc123
    :type vpc_id: str
    :param account_id: An AWS account id number
    :type account: str
    :param region: An AWS region where the service client should be created. e.g. us-east-1
    :type region: str
    """
    LOGGER.info('Beginning deletion phase...')
    # Get a list of all VPCs configured for this environment
    config_vpc_list = list_dict_values(config, 'vpc_id')
    # Get all peerings that exist for this environment
    LOGGER.info(
        f'Getting all peerings active in AWS for environment {metadata["environment"]}'
    )
    # Only filter working accounts now, as there could be times where accounts don't work
    # but we might want to keep the peerings until we remove them from the configuration.
    filtered_config = filter_working_accounts(config)
    peerings = get_all_env_peerings(filtered_config, metadata)
    # Determine which peerings no longer relate to any vpc in the environment
    LOGGER.info(
        f'Calculating which peerings may be deleted (do not appear in configuration)'
    )
    deletable_peerings = get_deletable_peerings(peerings, config_vpc_list)
    # Iterate through the deletable peerings
    for peering in deletable_peerings:
        peering_id = peering['VpcPeeringConnectionId']
        LOGGER.info(
            'Working on peering {} between {} {} {} and {} {} {}'.format(
                peering_id,
                peering['RequesterVpcInfo']['OwnerId'],
                peering['RequesterVpcInfo']['VpcId'],
                peering['RequesterVpcInfo']['Region'],
                peering['AccepterVpcInfo']['OwnerId'],
                peering['AccepterVpcInfo']['VpcId'],
                peering['AccepterVpcInfo']['Region'],
            ))

        # Clean up the route tables on both sides
        for vpc_info in [
                peering['RequesterVpcInfo'], peering['AccepterVpcInfo']
        ]:
            clean_route_tables(peering_id, vpc_info['VpcId'],
                               vpc_info['OwnerId'], vpc_info['Region'], dryrun)
        # Delete the peering
        LOGGER.info(f"Deleting peering {peering_id}...")
        ec2_client = aws_client(peering['RequesterVpcInfo']['OwnerId'], 'ec2',
                                peering['RequesterVpcInfo']['Region'])
        try:
            ec2_client.delete_vpc_peering_connection(
                VpcPeeringConnectionId=peering_id, DryRun=dryrun)
        except ClientError as err:
            if err.response['Error']['Code'] != 'DryRunOperation':
                raise

        LOGGER.info(f"Deleted peering {peering_id} successfully.")
Example #9
0
File: core.py Project: intfrr/peerd
def update_route_tables(target_peerings: list, metadata: Mapping,
                        dryrun: bool) -> None:
    """
    Loops through a list of peerings and updates the route tables on each side.

    Example target_peerings:
    ```
    [
        [
        {
            "account_id": 415432961280,
            "vpc_id": "vpc-e08fb484",
            "region": "ap-southeast-2",
            "cidr_overrides": [
                "10.53.101.0/27"
            ],
            "peering_tags": [
                {
                "peerd_az_affinity": "0"
                }
            ]
        },
        {
            "account_id": 415432961280,
            "vpc_id": "vpc-7a83b81e",
            "region": "ap-southeast-2"
        }
        ]
    ]
    ```

    :param target_peerings: A list of lists representing the requester and accepter for each peering.
    :type target_peerings: list
    :param metadata: A dictionary with the environment, owner, etc for tagging
    :type metadata: list
    """

    # We need to handle both sides of the peerings so we append reverse of each peering.
    # This means every side of every peering will be seen by a single loop.
    # We do this to avoid extra code handling the AWS concept of "accepter" and "requester"
    # We also construct our route table cache by account and region, which means if we looped
    # by requester and accepter we could cache stale route table contents.
    target_peerings.extend([x[::-1] for x in target_peerings])

    # Loop through the target peerings
    for peering_descriptor in target_peerings:
        # Unpack some common variables
        account_id = peering_descriptor[0]['account_id']
        vpc_id = peering_descriptor[0]['vpc_id']
        region = peering_descriptor[0]['region']

        remote_account_id = peering_descriptor[1]['account_id']
        remote_vpc_id = peering_descriptor[1]['vpc_id']
        remote_region = peering_descriptor[1]['region']
        # Get the remote CIDRs from the AWS VPC API, or use the overrides in the config if they exist.
        remote_cidrs = peering_descriptor[1].get(
            'cidr_overrides',
            list_vpc_cidrs(remote_vpc_id, remote_account_id, remote_region))

        LOGGER.info(
            f"Inspecting route tables in {account_id} {vpc_id} "
            f"{region}, peer: {remote_account_id} {remote_vpc_id} {remote_region}"
        )

        # Initialise a ec2 client connection
        ec2_client = aws_client(account_id, 'ec2', region)

        # Get active VPC peering if one exists, else continue
        # We want to avoid adding routes for inactive peerings.
        filters = [{
            'Name': 'tag:peerd_created',
            'Values': ['true']
        }, {
            'Name': 'tag:peerd_environment',
            'Values': [metadata['environment']]
        }, {
            'Name': 'status-code',
            'Values': ['active', 'provisioning']
        }]
        if not (peering := get_vpc_peering(vpc_id, remote_vpc_id, account_id,
                                           region, filters)):
            # Since we filter for the peerd environment, remind the user that there could be a peering
            # But that it might exist as part of another environment, and thus we won't be touching it.
            LOGGER.warning(
                f'No active peering between {vpc_id} and {remote_vpc_id} for this environment'
                f' {metadata["environment"]}. It may exist as part of another environment.'
            )
            continue
        peering_id = peering['VpcPeeringConnectionId']

        # Wait until the peering is active, not provisioning (boto waiter doesn't accept filters for vpc peering api)
        # We must wait for active state to install routes, otherwise the peering will be ignored.
        # Note, usually this step takes a few seconds, but can sometimes take up to a minute or two in rare cases.
        if peering['Status']['Code'] == 'provisioning':
            while not ec2_client.describe_vpc_peering_connections(
                    Filters=[{
                        'Name': 'status-code',
                        'Values': ['active']
                    }, {
                        'Name': 'vpc-peering-connection-id',
                        'Values': [peering_id]
                    }])['VpcPeeringConnections']:
                LOGGER.info(
                    f'Waiting for peering {peering_id} to become active...')
                sleep(5)

        # Get the route tables for the local vpc relevant to the peering.
        # The vpc_route_tables function will only return peerd_eligible:true tables
        # Since we will have cases where RTs should not be altered.
        if not (route_tables := vpc_route_tables(vpc_id, account_id, region)):
            LOGGER.warning(f'No peerd_eligible route tables in VPC {vpc_id}')
            continue
Example #10
0
File: core.py Project: intfrr/peerd
def create_vpc_peerings(target_peerings: Sequence, metadata: Mapping,
                        dryrun: bool) -> None:
    """
    Loops through a list of peerings to create them.
    Requests, accepts and tags them.
    Repairs any half open peerings.

    Example target_peerings:
    ```
    [
        [
        {
            "account_id": 415432961280,
            "vpc_id": "vpc-e08fb484",
            "region": "ap-southeast-2",
            "cidr_overrides": [
                "10.53.101.0/27"
            ],
            "peering_tags": [
                {
                "peerd_az_affinity": "0"
                }
            ]
        },
        {
            "account_id": 415432961280,
            "vpc_id": "vpc-7a83b81e",
            "region": "ap-southeast-2"
        }
        ]
    ]
    ```

    :param target_peerings: A list of lists representing the requester and accepter for each peering.
    :type target_peerings: list
    :param metadata: A dictionary with the environment, owner, etc for tagging
    :type metadata: list
    """
    pending_acceptance_peerings = []
    for peering_descriptor in target_peerings:

        # Unpack some common variables
        account_id = peering_descriptor[0]['account_id']
        vpc_id = peering_descriptor[0]['vpc_id']
        region = peering_descriptor[0]['region']
        local_tags = peering_descriptor[0].get('peering_tags', {})

        remote_account_id = peering_descriptor[1]['account_id']
        remote_vpc_id = peering_descriptor[1]['vpc_id']
        remote_region = peering_descriptor[1]['region']
        remote_tags = peering_descriptor[1].get('peering_tags', {})

        # Create a VPC peering request
        try:
            ec2_client = aws_client(account_id, 'ec2', region)
            # If the peering doesn't exist, create it
            if not (peering := get_vpc_peering(vpc_id, remote_vpc_id,
                                               account_id, region)):
                LOGGER.info(
                    f"Creating peering request between {account_id} {vpc_id} {region}"
                    f" and {remote_account_id} {remote_vpc_id} {remote_region}"
                )
                try:
                    ec2_peering_response = ec2_client.create_vpc_peering_connection(
                        VpcId=vpc_id,
                        PeerVpcId=remote_vpc_id,
                        PeerOwnerId=remote_account_id,
                        PeerRegion=remote_region,
                        DryRun=dryrun)['VpcPeeringConnection']
                except ClientError as err:
                    if err.response['Error']['Code'] == 'DryRunOperation':
                        continue
                    raise
                peering_id = ec2_peering_response['VpcPeeringConnectionId']
                # Wait for the vpc peering to exist before moving on
                LOGGER.info(f'Waiting for peering {peering_id} to exist...')
                ec2_client.get_waiter('vpc_peering_connection_exists').wait(
                    VpcPeeringConnectionIds=[peering_id],
                    WaiterConfig={'Delay': 5})
            # If the peering exists and is active, do nothing.
            elif peering['Status']['Code'] == 'active':
                LOGGER.info(
                    f"Active peering {peering['VpcPeeringConnectionId']} between {account_id} {vpc_id} {region}"
                    f" and {remote_account_id} {remote_vpc_id} {remote_region}"
                )
                continue
            # If the peering is pending acceptance move to tagging and acceptance
            # Only the remote account can accept the VPC peering.
            elif peering['Status']['Code'] == 'pending-acceptance' and peering[
                    'RequesterVpcInfo']['VpcId'] == vpc_id:
                peering_id = peering['VpcPeeringConnectionId']
                LOGGER.warning(
                    f"Pending-Acceptance peering {peering_id} between {account_id} {vpc_id} {region}"
                    f" and {remote_account_id} {remote_vpc_id} {remote_region}. Will attempt recovery."
                )
Example #11
0
File: core.py Project: intfrr/peerd
def accept_vpc_peerings(target_peerings: list, metadata: dict, dryrun: bool):
    """
    Loops through a list of peerings, with existing peering id, to accept them.
    Requests, accepts and tags them.
    Repairs any half open peerings.

    Example target_peerings:
    ```
    [
        [
        {
            "account_id": "415432961280",
            "peering_id": "pcx-41u5h345h2",
            "vpc_id": "vpc-e08fb484",
            "region": "ap-southeast-2",
            "cidr_overrides": [
                "10.53.101.0/27"
            ],
            "peering_tags": [
                {
                "peerd_az_affinity": "0"
                }
            ]
        },
        {
            "account_id": 415432961280,
            "peering_id": "pcx-41u5h345h2",
            "vpc_id": "vpc-7a83b81e",
            "region": "ap-southeast-2"
        }
        ]
    ]
    ```

    :param target_peerings: A list of lists representing the requester and accepter for each peering.
    :type target_peerings: list
    :param metadata: A dictionary with the environment, owner, etc for tagging
    :type metadata: list
    """
    for peering_descriptor in target_peerings:

        # Unpack some common variables
        account_id = peering_descriptor[0]['account_id']
        vpc_id = peering_descriptor[0]['vpc_id']
        region = peering_descriptor[0]['region']
        local_tags = peering_descriptor[0].get('peering_tags', {})

        remote_account_id = peering_descriptor[1]['account_id']
        remote_vpc_id = peering_descriptor[1]['vpc_id']
        remote_region = peering_descriptor[1]['region']
        remote_tags = peering_descriptor[1].get('peering_tags', {})
        peering_id = peering_descriptor[1]['peering_id']
        tags = peering_descriptor[1]['tags']

        try:
            # Accept the VPC Peering
            LOGGER.info(
                f"Accepting peering request {peering_id} between {account_id} {vpc_id} {region} and "
                f"{remote_account_id} {remote_vpc_id} {remote_region}")
            ec2_client = aws_client(remote_account_id, 'ec2', remote_region)
            # Wait until the peering exists
            # The AWS API is eventually consistent and we need to wait.
            LOGGER.info(f'Waiting for peering to exist...')
            ec2_client.get_waiter('vpc_peering_connection_exists').wait(
                VpcPeeringConnectionIds=[peering_id],
                WaiterConfig={'Delay': 5})
            # Tag the VPC Peering
            tags['Name'] = f'peerd peering to {account_id} {vpc_id} {region}'
            tags['peerd_role'] = 'accepter'
            tag_resource(ec2_client, peering_id, tags, dryrun=dryrun)
            # Accept the peering
            try:
                ec2_client.accept_vpc_peering_connection(
                    VpcPeeringConnectionId=peering_id, DryRun=dryrun)
            except ClientError as err:
                if err.response['Error']['Code'] == 'DryRunOperation':
                    continue
                raise
        except BaseException:
            LOGGER.error("Unexpected error: %s",
                         sys.exc_info()[1],
                         exc_info=True)
            continue

        LOGGER.info(
            f"Successfully accepted peering {peering_id} between {account_id} {vpc_id} "
            f"{region} and {remote_account_id} {remote_vpc_id} {remote_region}"
        )
Example #12
0
File: core.py Project: intfrr/peerd
            tag_resource(ec2_client, peering_id, tags, dryrun=dryrun)

            # Add the peering to the list of peerings that we will need to accept
            peering_descriptor_copy = deepcopy(peering_descriptor)
            peering_descriptor_copy[1]['peering_id'] = peering_id
            peering_descriptor_copy[1]['tags'] = tags
            pending_acceptance_peerings.append(peering_descriptor_copy)

        except BaseException:
            LOGGER.error("Unexpected error: %s",
                         sys.exc_info()[1],
                         exc_info=True)
            continue

        LOGGER.info(
            f"Successfully created peering request {peering_id} between {account_id} {vpc_id} "
            f"{region} and {remote_account_id} {remote_vpc_id} {remote_region}"
        )

    # Return the list of peerings that need to be accepted.
    return pending_acceptance_peerings


def accept_vpc_peerings(target_peerings: list, metadata: dict, dryrun: bool):
    """
    Loops through a list of peerings, with existing peering id, to accept them.
    Requests, accepts and tags them.
    Repairs any half open peerings.

    Example target_peerings:
    ```
    [