Exemplo n.º 1
0
class BackendGateway():
    def __init__(self, aws_client, ec2_client, vpc, private_subnet,
                 public_subnet):
        self.aws_client = aws_client
        self.ec2_client = ec2_client

        self.vpc = vpc
        self.private_subnet = private_subnet
        self.public_subnet = public_subnet

        self.USER_DATA_SCRIPT_PATH = os.path.join(
            os.path.dirname(__file__),
            '../../scripts/aws/backend_gateway/user_data.sh')
        self.PRIVATE_IP_ADDRESS = '14.0.0.30'

        self._prepare_resources()
        self.keys()

    def _prepare_resources(self):
        name = get_backend_vpn_gateway_name()
        self.ec2 = EC2(self.ec2_client,
                       name,
                       'backend-gateway',
                       subnet_id=self.public_subnet.id,
                       private_ip_address=self.PRIVATE_IP_ADDRESS)

        sg_name = get_backend_vpn_gateway_security_group_name()
        self.security_group = SecurityGroup(self.aws_client, self.ec2_client,
                                            sg_name, self.vpc.id)

        # Elastic IP
        elastic_ip_name = get_backend_vpn_gateway_elastic_ip_name()
        self.elastic_ip = ElasticIP(self.aws_client, elastic_ip_name)

        # VPN Keys
        self.keys = Keys()

    def _destroy_previous_env(self):
        termination_waiter = self.aws_client.get_waiter('instance_terminated')

        # Delete EC2 instances
        deleted_instances_ids = self.ec2.delete_by_group()
        if len(deleted_instances_ids) > 0:
            termination_waiter.wait(InstanceIds=deleted_instances_ids)

        # Delete security group
        sgs = self.vpc.security_groups.filter(
            Filters=[{
                "Name": "group-name",
                'Values': [self.security_group.name]
            }])
        sgs = list(sgs.all())
        if len(sgs) > 0:
            self.security_group.delete(sg_id=sgs[0].id)

    def _handle_security_group(self):
        security_group = self.security_group.create(
            'Backend Gateway Security Group')
        security_group.authorize_ingress(IpProtocol="tcp",
                                         CidrIp="0.0.0.0/0",
                                         FromPort=22,
                                         ToPort=22)
        security_group.authorize_ingress(IpProtocol="tcp",
                                         CidrIp=self.public_subnet.cidr_block,
                                         FromPort=80,
                                         ToPort=80)
        security_group.authorize_ingress(IpProtocol="udp",
                                         CidrIp="0.0.0.0/0",
                                         FromPort=51820,
                                         ToPort=51820)

    def _handle_ec2_instances(self, frontend_outway_keys,
                              frontend_outway_vpn_address):
        image_id = get_backend_vpn_gateway_image_id()

        user_data_script = None
        with open(self.USER_DATA_SCRIPT_PATH, 'r') as script_file:
            user_data_script = '\n'.join(script_file)

        if user_data_script is not None:
            user_data_script = user_data_script.replace(
                '$SERVER_PRIVATE_KEY', self.keys.private_key)
            user_data_script = user_data_script.replace(
                '$CLIENT_PUBLIC_KEY', frontend_outway_keys.public_key)
            user_data_script = user_data_script.replace(
                '$CLIENT_VPN_ADDRESS', frontend_outway_vpn_address)
            self.ec2.create(self.security_group.id,
                            image_id,
                            user_data=user_data_script)

            network_interfaces = self.ec2_client.network_interfaces.filter(
                Filters=[{
                    'Name': 'group-id',
                    'Values': [self.security_group.id]
                }])
            network_interfaces = list(network_interfaces)
            if len(network_interfaces) > 0:
                network_interfaces[0].modify_attribute(
                    SourceDestCheck={'Value': False})

    def _handle_elastic_ip_association(self):
        instance_id = self.ec2.id

        if instance_id is not None:
            self.aws_client.associate_address(
                InstanceId=instance_id,
                AllocationId=self.elastic_ip.allocation_id)

    def _handle_elastic_ip_creation(self):
        self.elastic_ip.get_ip()

        if (self.elastic_ip.ip is None
                or self.elastic_ip.allocation_id is None):
            self.elastic_ip.create()

    def __call__(self, frontend_outway_keys, frontend_outway_vpn_address):
        print('__BACKEND GATEWAY__')

        print('Cleaning previous env...')
        self._destroy_previous_env()

        print('Creating new security group...')
        self._handle_security_group()

        print('Creating ec2 instance...')
        self._handle_ec2_instances(frontend_outway_keys,
                                   frontend_outway_vpn_address)

        print('Waiting for instances to be available...')
        running_waiter = self.aws_client.get_waiter('instance_running')
        running_waiter.wait(InstanceIds=[self.ec2.id])

        print('Creating Elastic IP if needed...')
        self._handle_elastic_ip_creation()
        print('Allocating Elastic IP...')
        self._handle_elastic_ip_association()

        print('Done :) \n')
Exemplo n.º 2
0
class BackendVPC():
    def __init__(self, ec2_client, ec2_resource):
        self.ec2_resource = ec2_resource
        self.ec2_client = ec2_client
        self.name = 'zezze-backend-vpc'
        self.vpc_cidr_block = '14.0.0.0/16'
        self.vpc_private_subnet_cidr_block = '14.0.1.0/24'
        self.vpc_public_subnet_cidr_block = '14.0.0.0/24'
        self._prepare_resources()

    def _prepare_resources(self):
        self.vpc = VPC(self.ec2_resource, self.name, self.vpc_cidr_block)
        self.nat_gateway_elastic_ip = ElasticIP(
            self.ec2_client, 'zezze-backend-vpc-nat-gateway-elastic-ip')

    def __call__(self):
        existing_vpc = self.vpc.get(self.ec2_client)
        if existing_vpc is None:
            self.nat_gateway_elastic_ip.get_ip()
            print('__BACKEND VPC__')

            print('Checking for nat gateway elastic ip...')
            if self.nat_gateway_elastic_ip.allocation_id is None:
                print(
                    '[ INFO ] Natgateway elastic ip not found, creating one now...'
                )
                self.nat_gateway_elastic_ip.create()

            print('Creating vpc...')
            self.vpc.create()
            print('Creating Internet gateway...')
            self.vpc.create_internet_gateway()

            print('Creating subnets...')
            self.vpc.create_subnets(self.ec2_client)
            print('Attaching Internet gateway...')
            self.vpc.handle_internet_gateway()

            print('Creating NAT gateway...')
            self.vpc.create_nat_gateway(
                self.ec2_client, self.nat_gateway_elastic_ip.allocation_id)
            print('Creating route tables...')
            self.vpc.create_route_tables()

            print('Handling private route table...')
            self.vpc.handle_private_route_table()
            print('Handling public route table...')
            self.vpc.handle_public_route_table()

            return self.vpc.vpc, self.vpc.public_subnet, self.vpc.private_subnet

        else:
            vpc_id = existing_vpc.get('VpcId', None)
            vpc_resource = self.ec2_resource.Vpc(vpc_id)
            vpc_subnets = vpc_resource.subnets.all()

            private_subnet = None
            public_subnet = None
            for subnet in vpc_subnets:
                cidr_block = subnet.cidr_block
                if cidr_block == self.vpc_private_subnet_cidr_block:
                    private_subnet = subnet
                elif cidr_block == self.vpc_public_subnet_cidr_block:
                    public_subnet = subnet

            return vpc_resource, private_subnet, public_subnet
Exemplo n.º 3
0
class Database():
    def __init__(self, aws_client, ec2_client, vpc, private_subnet,
                 public_subnet):
        self.ec2_client = ec2_client
        self.aws_client = aws_client

        self.vpc = vpc
        self.private_subnet = private_subnet
        self.public_subnet = public_subnet

        self.PRIVATE_IP_ADDRESS = '14.0.1.30'

        self.ec2 = None
        self.security_group = None
        self.DATABASE_MACHINE_NAME = "zezze-mysql-database"
        self.USER_DATA_SCRIPT_PATH = os.path.join(
            os.path.dirname(__file__),
            '../../scripts/aws/database/user_data.sh')

        self._prepare_resources()
        self.keys()

    def _prepare_resources(self):
        # EC2 Resource
        self.ec2 = EC2(self.ec2_client,
                       self.DATABASE_MACHINE_NAME,
                       'database',
                       subnet_id=self.private_subnet.id,
                       private_ip_address=self.PRIVATE_IP_ADDRESS)

        # Database Resource
        security_group_name = get_database_security_group_name()
        self.security_group = SecurityGroup(self.aws_client, self.ec2_client,
                                            security_group_name, self.vpc.id)

        # Gateway Elastic IP
        gateway_elastic_ip_name = get_backend_vpn_gateway_elastic_ip_name()
        self.gateway_elastic_ip = ElasticIP(self.aws_client,
                                            gateway_elastic_ip_name)

        # VPN Keys
        self.keys = Keys()

    def _destroy_previous_env(self):
        # Waiter
        instance_terminated_waiter = self.aws_client.get_waiter(
            'instance_terminated')

        # Delete DB instance
        deleted_db_instances = self.ec2.delete_by_group()
        if len(deleted_db_instances) > 0:
            instance_terminated_waiter.wait(InstanceIds=deleted_db_instances)

        # Delete security group
        sgs = self.vpc.security_groups.filter(
            Filters=[{
                "Name": "group-name",
                'Values': [self.security_group.name]
            }])
        sgs = list(sgs.all())
        if len(sgs) > 0:
            self.security_group.delete(sg_id=sgs[0].id)

    def _handle_security_group(self):
        security_group = self.security_group.create('Database security group')
        security_group.authorize_ingress(IpProtocol="tcp",
                                         CidrIp="0.0.0.0/0",
                                         FromPort=22,
                                         ToPort=22)
        security_group.authorize_ingress(IpProtocol="tcp",
                                         CidrIp=self.private_subnet.cidr_block,
                                         FromPort=80,
                                         ToPort=80)

    def _handle_ec2_instance(self):
        image_id = get_database_image_id()

        user_data_script = None
        with open(self.USER_DATA_SCRIPT_PATH, 'r') as script_file:
            user_data_script = '\n'.join(script_file)

        self.gateway_elastic_ip.get_ip()
        if self.gateway_elastic_ip.ip is None:
            print('[INFO] Gateway elastic ip not found, creating one now ...')
            self.gateway_elastic_ip.create()

        if user_data_script is not None:
            user_data_script = user_data_script.replace(
                '$MYSQL_ROOT_PASSWORD',
                f"'{os.getenv('MYSQL_ROOT_PASSWORD')}'")
            self.ec2.create(self.security_group.id, image_id, user_data_script)

            network_interfaces = self.ec2_client.network_interfaces.filter(
                Filters=[{
                    'Name': 'group-id',
                    'Values': [self.security_group.id]
                }])
            network_interfaces = list(network_interfaces)
            if len(network_interfaces) > 0:
                network_interfaces[0].modify_attribute(
                    SourceDestCheck={'Value': False})
        else:
            print('[ Error ] Unable to read user data')

    def _handle_elastic_ip_association(self):
        instance_id = self.ec2.id

        if instance_id is not None:
            self.aws_client.associate_address(
                InstanceId=instance_id,
                AllocationId=self.elastic_ip.allocation_id)

    def _handle_elastic_ip_creation(self):
        self.elastic_ip.get_ip()

        if (self.elastic_ip.ip is None
                or self.elastic_ip.allocation_id is None):
            self.elastic_ip.create()

    def __call__(self):
        print('__DATABASE__')
        print('Destroy Previuous env...')
        self._destroy_previous_env()

        print('Create security group...')
        self._handle_security_group()

        print('Create EC2 instance...')
        self._handle_ec2_instance()

        print('Waiting Instance ...')
        running_waiter = self.aws_client.get_waiter('instance_running')
        running_waiter.wait(InstanceIds=[self.ec2.id])

        # print('Creating Elastic IP if needed...')
        # self._handle_elastic_ip_creation()
        # print('Allocating Elastic IP...')
        # self._handle_elastic_ip_association()

        print('Done')