Class: AwsUtils::Ec2AddSecurityGroup

Inherits:
Ec2SecurityGroup show all
Defined in:
lib/awsutils/ec2addsg.rb

Instance Method Summary collapse

Methods inherited from Ec2SecurityGroup

#assigned?, #connection, #current_groups, #exist?, #groups, #references

Constructor Details

#initializeEc2AddSecurityGroup

Returns a new instance of Ec2AddSecurityGroup.



123
124
125
# File 'lib/awsutils/ec2addsg.rb', line 123

def initialize
  @opts = parse_opts
end

Instance Method Details

#add_rule_to_other_group(rule) ⇒ Object



65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
# File 'lib/awsutils/ec2addsg.rb', line 65

def add_rule_to_other_group(rule)
  rule['IpPermissions'].each do |r|
    r['Groups'] = [
      {
        'GroupId' => g_obj.group_id,
        'UserId' => @opts[:owner_group_id]
      }
    ]
  end

  puts 'Adding Outbound Rule: ' + rule.inspect

  connection.authorize_security_group_ingress(
    nil,
    'GroupId' => rule['dest'],
    'IpPermissions' => rule['IpPermissions']
  )
end

#add_rule_to_this_group(rule) ⇒ Object



84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
# File 'lib/awsutils/ec2addsg.rb', line 84

def add_rule_to_this_group(rule)
  rule['IpPermissions'].each do |r|
    r['Groups'] = [
      {
        'GroupId' => rule['source'],
        'UserId' => @opts[:owner_group_id]
      }
    ]
    r['dest'] = g_obj.group_id
  end

  puts 'Adding Inbound Rule: ' + rule.inspect

  connection.authorize_security_group_ingress(
    nil,
    'GroupId' => g_obj.group_id,
    'IpPermissions' => rule['IpPermissions']
  )
end

#compile_rulesObject



131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
# File 'lib/awsutils/ec2addsg.rb', line 131

def compile_rules
  rules_data = YAML.load_file(@opts[:base_rules_file])

  if @opts[:environment]
    if !rules_data['env']
      fail "Environment #{@opts[:environment]} not present in rules file" \
           " (#{@opts[:base_rules_file]})."
    else
      rules_env_data = rules_data['env'][@opts[:environment]]
    end
  elsif rules_data.class != Array
    fail 'base_rules_file is an environment-keyed file but you did ' \
      'not specify an environment.'
  else
    rules_env_data = rules_data
  end

  rules_env_data.map do |rule|
    generate_rule_hash(rule)
  end
end

#g_objObject



8
9
10
11
12
13
14
15
16
# File 'lib/awsutils/ec2addsg.rb', line 8

def g_obj
  @g_obj ||= begin
    connection.security_groups.new(
      name: @opts[:security_group],
      description: "#{@opts[:description]}",
      vpc_id: @opts[:vpc_id]
    )
  end
end

#generate_rule_hash(rule) ⇒ Object



18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
# File 'lib/awsutils/ec2addsg.rb', line 18

def generate_rule_hash(rule)
  if rule['source']
    if rule['dest']
      fail 'One of the predefined rules has both a source ' \
        'and a destination already defined: ' + rule.inspect
    end
    if rule['source'] !~ /\./ &&
       !current_groups.include?(rule['source'])
      fail "Group #{rule['source']} specified as part of rule: " \
           "#{rule.inspect} does not exist"
    end
  end

  if !rule['dest']
    rule['dest'] = @new_group_id
  elsif !current_groups.include?(rule['dest'])
    fail "Group #{rule['dest']} specified as part of rule: " \
         "#{rule.inspect} does not exist"
  end

  ip_permissions = {}

  ip_permissions['IpProtocol'] = rule['proto'] if rule['proto']

  if rule['port']
    ip_permissions['FromPort'] = rule['port'].first.to_s
    ip_permissions['ToPort'] = rule['port'].last.to_s
  end

  if rule['source'] =~ /\./
    ip_permissions['Groups'] = []
    ip_permissions['IpRanges'] = [ 'CidrIp' => rule['source'] ]
  elsif rule['source']
    ip_permissions['Groups'] = [
      {
        'GroupId' => rule['source'],
        'UserId' => @opts[:owner_group_id]
      }
    ]
    ip_permissions['IpRanges'] = []
  end

  rule['IpPermissions'] = [ip_permissions]

  rule
end

#nameObject



127
128
129
# File 'lib/awsutils/ec2addsg.rb', line 127

def name
  @opts[:security_group]
end

#parse_optsObject



167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
# File 'lib/awsutils/ec2addsg.rb', line 167

def parse_opts
  fail 'AWS_OWNER_ID is not set!' unless ENV['AWS_OWNER_ID']

  @opts = Trollop.options do
    opt :security_group,
        'New Security Group Name',
        short: 'N',
        type: String,
        required: true
    opt :vpc_id,
        'New Group VPC ID',
        short: 'v',
        type: String
    opt :base_rules_file,
        'Base rules YAML file',
        short: 'r',
        default: ENV['EC2_BASE_RULES'] || "#{ENV['HOME']}/.ec2baserules.yml"
    opt :description,
        'New Group Description',
        short: 'd',
        type: String,
        required: true
    opt :environment,
        'New Group Environment (e.g. stage/prod)',
        short: 'E',
        type: String
    opt :owner_group_id,
        'Owner Group ID',
        short: 'o',
        default: ENV['AWS_OWNER_ID']
  end
end

#runObject



153
154
155
156
157
158
159
160
161
162
163
164
165
# File 'lib/awsutils/ec2addsg.rb', line 153

def run
  unless File.exist?(@opts[:base_rules_file])
    puts "File #{@opts[:base_rules_file]} does not exist!"
    exit 1
  end

  if exist?
    puts "Group #{@opts[:security_group]} already exists!"
    exit 1
  end

  save(compile_rules)
end

#save(rules) ⇒ Object



104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
# File 'lib/awsutils/ec2addsg.rb', line 104

def save(rules)
  g_obj.save
  puts "New group ID: #{g_obj.group_id}"

  begin
    rules.reject { |rule| rule['dest'] }.each do |rule|
      add_rule_to_this_group(rule)
    end

    # Then process the outbound rules now that we have a group_id
    rules.select { |rule| rule['dest'] }.each do |rule|
      add_rule_to_other_group(rule)
    end
  rescue => e
    connection.delete_security_group(nil, g_obj.group_id)
    raise e
  end
end