oo_ec2_group.py 37 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903
  1. #!/usr/bin/python
  2. # -*- coding: utf-8 -*-
  3. # pylint: skip-file
  4. # flake8: noqa
  5. # This file is part of Ansible
  6. #
  7. # Ansible is free software: you can redistribute it and/or modify
  8. # it under the terms of the GNU General Public License as published by
  9. # the Free Software Foundation, either version 3 of the License, or
  10. # (at your option) any later version.
  11. #
  12. # Ansible is distributed in the hope that it will be useful,
  13. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  15. # GNU General Public License for more details.
  16. #
  17. # You should have received a copy of the GNU General Public License
  18. # along with Ansible. If not, see <http://www.gnu.org/licenses/>.
  19. ANSIBLE_METADATA = {'metadata_version': '1.1',
  20. 'status': ['stableinterface'],
  21. 'supported_by': 'core'}
  22. DOCUMENTATION = '''
  23. ---
  24. module: ec2_group
  25. author: "Andrew de Quincey (@adq)"
  26. version_added: "1.3"
  27. requirements: [ boto3 ]
  28. short_description: maintain an ec2 VPC security group.
  29. description:
  30. - maintains ec2 security groups. This module has a dependency on python-boto >= 2.5
  31. options:
  32. name:
  33. description:
  34. - Name of the security group.
  35. - One of and only one of I(name) or I(group_id) is required.
  36. - Required if I(state=present).
  37. required: false
  38. group_id:
  39. description:
  40. - Id of group to delete (works only with absent).
  41. - One of and only one of I(name) or I(group_id) is required.
  42. required: false
  43. version_added: "2.4"
  44. description:
  45. description:
  46. - Description of the security group. Required when C(state) is C(present).
  47. required: false
  48. vpc_id:
  49. description:
  50. - ID of the VPC to create the group in.
  51. required: false
  52. rules:
  53. description:
  54. - List of firewall inbound rules to enforce in this group (see example). If none are supplied,
  55. no inbound rules will be enabled. Rules list may include its own name in `group_name`.
  56. This allows idempotent loopback additions (e.g. allow group to access itself).
  57. Rule sources list support was added in version 2.4. This allows to define multiple sources per
  58. source type as well as multiple source types per rule. Prior to 2.4 an individual source is allowed.
  59. required: false
  60. rules_egress:
  61. description:
  62. - List of firewall outbound rules to enforce in this group (see example). If none are supplied,
  63. a default all-out rule is assumed. If an empty list is supplied, no outbound rules will be enabled.
  64. Rule Egress sources list support was added in version 2.4.
  65. required: false
  66. version_added: "1.6"
  67. state:
  68. version_added: "1.4"
  69. description:
  70. - Create or delete a security group
  71. required: false
  72. default: 'present'
  73. choices: [ "present", "absent" ]
  74. aliases: []
  75. purge_rules:
  76. version_added: "1.8"
  77. description:
  78. - Purge existing rules on security group that are not found in rules
  79. required: false
  80. default: 'true'
  81. aliases: []
  82. purge_rules_egress:
  83. version_added: "1.8"
  84. description:
  85. - Purge existing rules_egress on security group that are not found in rules_egress
  86. required: false
  87. default: 'true'
  88. aliases: []
  89. tags:
  90. version_added: "2.4"
  91. description:
  92. - A dictionary of one or more tags to assign to the security group.
  93. required: false
  94. purge_tags:
  95. version_added: "2.4"
  96. description:
  97. - If yes, existing tags will be purged from the resource to match exactly what is defined by I(tags) parameter. If the I(tags) parameter is not set then
  98. tags will not be modified.
  99. required: false
  100. default: yes
  101. choices: [ 'yes', 'no' ]
  102. extends_documentation_fragment:
  103. - aws
  104. - ec2
  105. notes:
  106. - If a rule declares a group_name and that group doesn't exist, it will be
  107. automatically created. In that case, group_desc should be provided as well.
  108. The module will refuse to create a depended-on group without a description.
  109. '''
  110. EXAMPLES = '''
  111. - name: example ec2 group
  112. ec2_group:
  113. name: example
  114. description: an example EC2 group
  115. vpc_id: 12345
  116. region: eu-west-1
  117. aws_secret_key: SECRET
  118. aws_access_key: ACCESS
  119. rules:
  120. - proto: tcp
  121. from_port: 80
  122. to_port: 80
  123. cidr_ip: 0.0.0.0/0
  124. - proto: tcp
  125. from_port: 22
  126. to_port: 22
  127. cidr_ip: 10.0.0.0/8
  128. - proto: tcp
  129. from_port: 443
  130. to_port: 443
  131. group_id: amazon-elb/sg-87654321/amazon-elb-sg
  132. - proto: tcp
  133. from_port: 3306
  134. to_port: 3306
  135. group_id: 123412341234/sg-87654321/exact-name-of-sg
  136. - proto: udp
  137. from_port: 10050
  138. to_port: 10050
  139. cidr_ip: 10.0.0.0/8
  140. - proto: udp
  141. from_port: 10051
  142. to_port: 10051
  143. group_id: sg-12345678
  144. - proto: icmp
  145. from_port: 8 # icmp type, -1 = any type
  146. to_port: -1 # icmp subtype, -1 = any subtype
  147. cidr_ip: 10.0.0.0/8
  148. - proto: all
  149. # the containing group name may be specified here
  150. group_name: example
  151. rules_egress:
  152. - proto: tcp
  153. from_port: 80
  154. to_port: 80
  155. cidr_ip: 0.0.0.0/0
  156. cidr_ipv6: 64:ff9b::/96
  157. group_name: example-other
  158. # description to use if example-other needs to be created
  159. group_desc: other example EC2 group
  160. - name: example2 ec2 group
  161. ec2_group:
  162. name: example2
  163. description: an example2 EC2 group
  164. vpc_id: 12345
  165. region: eu-west-1
  166. rules:
  167. # 'ports' rule keyword was introduced in version 2.4. It accepts a single port value or a list of values including ranges (from_port-to_port).
  168. - proto: tcp
  169. ports: 22
  170. group_name: example-vpn
  171. - proto: tcp
  172. ports:
  173. - 80
  174. - 443
  175. - 8080-8099
  176. cidr_ip: 0.0.0.0/0
  177. # Rule sources list support was added in version 2.4. This allows to define multiple sources per source type as well as multiple source types per rule.
  178. - proto: tcp
  179. ports:
  180. - 6379
  181. - 26379
  182. group_name:
  183. - example-vpn
  184. - example-redis
  185. - proto: tcp
  186. ports: 5665
  187. group_name: example-vpn
  188. cidr_ip:
  189. - 172.16.1.0/24
  190. - 172.16.17.0/24
  191. cidr_ipv6:
  192. - 2607:F8B0::/32
  193. - 64:ff9b::/96
  194. group_id:
  195. - sg-edcd9784
  196. - name: "Delete group by its id"
  197. ec2_group:
  198. group_id: sg-33b4ee5b
  199. state: absent
  200. '''
  201. RETURN = '''
  202. group_name:
  203. description: Security group name
  204. sample: My Security Group
  205. type: string
  206. returned: on create/update
  207. group_id:
  208. description: Security group id
  209. sample: sg-abcd1234
  210. type: string
  211. returned: on create/update
  212. description:
  213. description: Description of security group
  214. sample: My Security Group
  215. type: string
  216. returned: on create/update
  217. tags:
  218. description: Tags associated with the security group
  219. sample:
  220. Name: My Security Group
  221. Purpose: protecting stuff
  222. type: dict
  223. returned: on create/update
  224. vpc_id:
  225. description: ID of VPC to which the security group belongs
  226. sample: vpc-abcd1234
  227. type: string
  228. returned: on create/update
  229. ip_permissions:
  230. description: Inbound rules associated with the security group.
  231. sample:
  232. - from_port: 8182
  233. ip_protocol: tcp
  234. ip_ranges:
  235. - cidr_ip: "1.1.1.1/32"
  236. ipv6_ranges: []
  237. prefix_list_ids: []
  238. to_port: 8182
  239. user_id_group_pairs: []
  240. type: list
  241. returned: on create/update
  242. ip_permissions_egress:
  243. description: Outbound rules associated with the security group.
  244. sample:
  245. - ip_protocol: -1
  246. ip_ranges:
  247. - cidr_ip: "0.0.0.0/0"
  248. ipv6_ranges: []
  249. prefix_list_ids: []
  250. user_id_group_pairs: []
  251. type: list
  252. returned: on create/update
  253. owner_id:
  254. description: AWS Account ID of the security group
  255. sample: 123456789012
  256. type: int
  257. returned: on create/update
  258. '''
  259. import json
  260. import re
  261. from ansible.module_utils.basic import AnsibleModule
  262. from ansible.module_utils.ec2 import boto3_conn
  263. from ansible.module_utils.ec2 import get_aws_connection_info
  264. from ansible.module_utils.ec2 import ec2_argument_spec
  265. from ansible.module_utils.ec2 import camel_dict_to_snake_dict
  266. from ansible.module_utils.ec2 import HAS_BOTO3
  267. from ansible.module_utils.ec2 import boto3_tag_list_to_ansible_dict, ansible_dict_to_boto3_tag_list, compare_aws_tags
  268. from ansible.module_utils.ec2 import AWSRetry
  269. import traceback
  270. try:
  271. import botocore
  272. except ImportError:
  273. pass # caught by imported HAS_BOTO3
  274. @AWSRetry.backoff(tries=5, delay=5, backoff=2.0)
  275. def get_security_groups_with_backoff(connection, **kwargs):
  276. return connection.describe_security_groups(**kwargs)
  277. def deduplicate_rules_args(rules):
  278. """Returns unique rules"""
  279. if rules is None:
  280. return None
  281. return list(dict(zip((json.dumps(r, sort_keys=True) for r in rules), rules)).values())
  282. def make_rule_key(prefix, rule, group_id, cidr_ip):
  283. if 'proto' in rule:
  284. proto, from_port, to_port = [rule.get(x, None) for x in ('proto', 'from_port', 'to_port')]
  285. elif 'IpProtocol' in rule:
  286. proto, from_port, to_port = [rule.get(x, None) for x in ('IpProtocol', 'FromPort', 'ToPort')]
  287. if proto not in ['icmp', 'tcp', 'udp'] and from_port == -1 and to_port == -1:
  288. from_port = 'none'
  289. to_port = 'none'
  290. key = "%s-%s-%s-%s-%s-%s" % (prefix, proto, from_port, to_port, group_id, cidr_ip)
  291. return key.lower().replace('-none', '-None')
  292. def add_rules_to_lookup(ipPermissions, group_id, prefix, dict):
  293. for rule in ipPermissions:
  294. for groupGrant in rule.get('UserIdGroupPairs', []):
  295. dict[make_rule_key(prefix, rule, group_id, groupGrant.get('GroupId'))] = (rule, groupGrant)
  296. for ipv4Grants in rule.get('IpRanges', []):
  297. dict[make_rule_key(prefix, rule, group_id, ipv4Grants.get('CidrIp'))] = (rule, ipv4Grants)
  298. for ipv6Grants in rule.get('Ipv6Ranges', []):
  299. dict[make_rule_key(prefix, rule, group_id, ipv6Grants.get('CidrIpv6'))] = (rule, ipv6Grants)
  300. def validate_rule(module, rule):
  301. VALID_PARAMS = ('cidr_ip', 'cidr_ipv6',
  302. 'group_id', 'group_name', 'group_desc',
  303. 'proto', 'from_port', 'to_port')
  304. if not isinstance(rule, dict):
  305. module.fail_json(msg='Invalid rule parameter type [%s].' % type(rule))
  306. for k in rule:
  307. if k not in VALID_PARAMS:
  308. module.fail_json(msg='Invalid rule parameter \'{}\''.format(k))
  309. if 'group_id' in rule and 'cidr_ip' in rule:
  310. module.fail_json(msg='Specify group_id OR cidr_ip, not both')
  311. elif 'group_name' in rule and 'cidr_ip' in rule:
  312. module.fail_json(msg='Specify group_name OR cidr_ip, not both')
  313. elif 'group_id' in rule and 'cidr_ipv6' in rule:
  314. module.fail_json(msg="Specify group_id OR cidr_ipv6, not both")
  315. elif 'group_name' in rule and 'cidr_ipv6' in rule:
  316. module.fail_json(msg="Specify group_name OR cidr_ipv6, not both")
  317. elif 'cidr_ip' in rule and 'cidr_ipv6' in rule:
  318. module.fail_json(msg="Specify cidr_ip OR cidr_ipv6, not both")
  319. elif 'group_id' in rule and 'group_name' in rule:
  320. module.fail_json(msg='Specify group_id OR group_name, not both')
  321. def get_target_from_rule(module, client, rule, name, group, groups, vpc_id):
  322. """
  323. Returns tuple of (group_id, ip) after validating rule params.
  324. rule: Dict describing a rule.
  325. name: Name of the security group being managed.
  326. groups: Dict of all available security groups.
  327. AWS accepts an ip range or a security group as target of a rule. This
  328. function validate the rule specification and return either a non-None
  329. group_id or a non-None ip range.
  330. """
  331. FOREIGN_SECURITY_GROUP_REGEX = '^(\S+)/(sg-\S+)/(\S+)'
  332. group_id = None
  333. group_name = None
  334. ip = None
  335. ipv6 = None
  336. target_group_created = False
  337. if 'group_id' in rule and 'cidr_ip' in rule:
  338. module.fail_json(msg="Specify group_id OR cidr_ip, not both")
  339. elif 'group_name' in rule and 'cidr_ip' in rule:
  340. module.fail_json(msg="Specify group_name OR cidr_ip, not both")
  341. elif 'group_id' in rule and 'cidr_ipv6' in rule:
  342. module.fail_json(msg="Specify group_id OR cidr_ipv6, not both")
  343. elif 'group_name' in rule and 'cidr_ipv6' in rule:
  344. module.fail_json(msg="Specify group_name OR cidr_ipv6, not both")
  345. elif 'group_id' in rule and 'group_name' in rule:
  346. module.fail_json(msg="Specify group_id OR group_name, not both")
  347. elif 'cidr_ip' in rule and 'cidr_ipv6' in rule:
  348. module.fail_json(msg="Specify cidr_ip OR cidr_ipv6, not both")
  349. elif rule.get('group_id') and re.match(FOREIGN_SECURITY_GROUP_REGEX, rule['group_id']):
  350. # this is a foreign Security Group. Since you can't fetch it you must create an instance of it
  351. owner_id, group_id, group_name = re.match(FOREIGN_SECURITY_GROUP_REGEX, rule['group_id']).groups()
  352. group_instance = dict(GroupId=group_id, GroupName=group_name)
  353. groups[group_id] = group_instance
  354. groups[group_name] = group_instance
  355. elif 'group_id' in rule:
  356. group_id = rule['group_id']
  357. elif 'group_name' in rule:
  358. group_name = rule['group_name']
  359. if group_name == name:
  360. group_id = group['GroupId']
  361. groups[group_id] = group
  362. groups[group_name] = group
  363. elif group_name in groups and group.get('VpcId') and groups[group_name].get('VpcId'):
  364. # both are VPC groups, this is ok
  365. group_id = groups[group_name]['GroupId']
  366. elif group_name in groups and not (group.get('VpcId') or groups[group_name].get('VpcId')):
  367. # both are EC2 classic, this is ok
  368. group_id = groups[group_name]['GroupId']
  369. else:
  370. # if we got here, either the target group does not exist, or there
  371. # is a mix of EC2 classic + VPC groups. Mixing of EC2 classic + VPC
  372. # is bad, so we have to create a new SG because no compatible group
  373. # exists
  374. if not rule.get('group_desc', '').strip():
  375. module.fail_json(msg="group %s will be automatically created by rule %s and "
  376. "no description was provided" % (group_name, rule))
  377. if not module.check_mode:
  378. params = dict(GroupName=group_name, Description=rule['group_desc'])
  379. if vpc_id:
  380. params['VpcId'] = vpc_id
  381. auto_group = client.create_security_group(**params)
  382. group_id = auto_group['GroupId']
  383. groups[group_id] = auto_group
  384. groups[group_name] = auto_group
  385. target_group_created = True
  386. elif 'cidr_ip' in rule:
  387. ip = rule['cidr_ip']
  388. elif 'cidr_ipv6' in rule:
  389. ipv6 = rule['cidr_ipv6']
  390. return group_id, ip, ipv6, target_group_created
  391. def ports_expand(ports):
  392. # takes a list of ports and returns a list of (port_from, port_to)
  393. ports_expanded = []
  394. for port in ports:
  395. if not isinstance(port, str):
  396. ports_expanded.append((port,) * 2)
  397. elif '-' in port:
  398. ports_expanded.append(tuple(p.strip() for p in port.split('-', 1)))
  399. else:
  400. ports_expanded.append((port.strip(),) * 2)
  401. return ports_expanded
  402. def rule_expand_ports(rule):
  403. # takes a rule dict and returns a list of expanded rule dicts
  404. if 'ports' not in rule:
  405. return [rule]
  406. ports = rule['ports'] if isinstance(rule['ports'], list) else [rule['ports']]
  407. rule_expanded = []
  408. for from_to in ports_expand(ports):
  409. temp_rule = rule.copy()
  410. del temp_rule['ports']
  411. temp_rule['from_port'], temp_rule['to_port'] = from_to
  412. rule_expanded.append(temp_rule)
  413. return rule_expanded
  414. def rules_expand_ports(rules):
  415. # takes a list of rules and expands it based on 'ports'
  416. if not rules:
  417. return rules
  418. return [rule for rule_complex in rules
  419. for rule in rule_expand_ports(rule_complex)]
  420. def rule_expand_source(rule, source_type):
  421. # takes a rule dict and returns a list of expanded rule dicts for specified source_type
  422. sources = rule[source_type] if isinstance(rule[source_type], list) else [rule[source_type]]
  423. source_types_all = ('cidr_ip', 'cidr_ipv6', 'group_id', 'group_name')
  424. rule_expanded = []
  425. for source in sources:
  426. temp_rule = rule.copy()
  427. for s in source_types_all:
  428. temp_rule.pop(s, None)
  429. temp_rule[source_type] = source
  430. rule_expanded.append(temp_rule)
  431. return rule_expanded
  432. def rule_expand_sources(rule):
  433. # takes a rule dict and returns a list of expanded rule discts
  434. source_types = (stype for stype in ('cidr_ip', 'cidr_ipv6', 'group_id', 'group_name') if stype in rule)
  435. return [r for stype in source_types
  436. for r in rule_expand_source(rule, stype)]
  437. def rules_expand_sources(rules):
  438. # takes a list of rules and expands it based on 'cidr_ip', 'group_id', 'group_name'
  439. if not rules:
  440. return rules
  441. return [rule for rule_complex in rules
  442. for rule in rule_expand_sources(rule_complex)]
  443. def authorize_ip(type, changed, client, group, groupRules,
  444. ip, ip_permission, module, rule, ethertype):
  445. # If rule already exists, don't later delete it
  446. for thisip in ip:
  447. rule_id = make_rule_key(type, rule, group['GroupId'], thisip)
  448. if rule_id in groupRules:
  449. del groupRules[rule_id]
  450. else:
  451. if not module.check_mode:
  452. ip_permission = serialize_ip_grant(rule, thisip, ethertype)
  453. if ip_permission:
  454. try:
  455. if type == "in":
  456. client.authorize_security_group_ingress(GroupId=group['GroupId'],
  457. IpPermissions=[ip_permission])
  458. elif type == "out":
  459. client.authorize_security_group_egress(GroupId=group['GroupId'],
  460. IpPermissions=[ip_permission])
  461. except botocore.exceptions.ClientError as e:
  462. module.fail_json(msg="Unable to authorize %s for ip %s security group '%s' - %s" %
  463. (type, thisip, group['GroupName'], e),
  464. exception=traceback.format_exc(), **camel_dict_to_snake_dict(e.response))
  465. changed = True
  466. return changed, ip_permission
  467. def serialize_group_grant(group_id, rule):
  468. permission = {'IpProtocol': rule['proto'],
  469. 'FromPort': rule['from_port'],
  470. 'ToPort': rule['to_port'],
  471. 'UserIdGroupPairs': [{'GroupId': group_id}]}
  472. return fix_port_and_protocol(permission)
  473. def serialize_revoke(grant, rule):
  474. permission = dict()
  475. fromPort = rule['FromPort'] if 'FromPort' in rule else None
  476. toPort = rule['ToPort'] if 'ToPort' in rule else None
  477. if 'GroupId' in grant:
  478. permission = {'IpProtocol': rule['IpProtocol'],
  479. 'FromPort': fromPort,
  480. 'ToPort': toPort,
  481. 'UserIdGroupPairs': [{'GroupId': grant['GroupId']}]
  482. }
  483. elif 'CidrIp' in grant:
  484. permission = {'IpProtocol': rule['IpProtocol'],
  485. 'FromPort': fromPort,
  486. 'ToPort': toPort,
  487. 'IpRanges': [grant]
  488. }
  489. elif 'CidrIpv6' in grant:
  490. permission = {'IpProtocol': rule['IpProtocol'],
  491. 'FromPort': fromPort,
  492. 'ToPort': toPort,
  493. 'Ipv6Ranges': [grant]
  494. }
  495. return fix_port_and_protocol(permission)
  496. def serialize_ip_grant(rule, thisip, ethertype):
  497. permission = {'IpProtocol': rule['proto'],
  498. 'FromPort': rule['from_port'],
  499. 'ToPort': rule['to_port']}
  500. if ethertype == "ipv4":
  501. permission['IpRanges'] = [{'CidrIp': thisip}]
  502. elif ethertype == "ipv6":
  503. permission['Ipv6Ranges'] = [{'CidrIpv6': thisip}]
  504. return fix_port_and_protocol(permission)
  505. def fix_port_and_protocol(permission):
  506. for key in ['FromPort', 'ToPort']:
  507. if key in permission:
  508. if permission[key] is None:
  509. del permission[key]
  510. else:
  511. permission[key] = int(permission[key])
  512. permission['IpProtocol'] = str(permission['IpProtocol'])
  513. return permission
  514. def main():
  515. argument_spec = ec2_argument_spec()
  516. argument_spec.update(dict(
  517. name=dict(),
  518. group_id=dict(),
  519. description=dict(),
  520. vpc_id=dict(),
  521. rules=dict(type='list'),
  522. rules_egress=dict(type='list'),
  523. state=dict(default='present', type='str', choices=['present', 'absent']),
  524. purge_rules=dict(default=True, required=False, type='bool'),
  525. purge_rules_egress=dict(default=True, required=False, type='bool'),
  526. tags=dict(required=False, type='dict', aliases=['resource_tags']),
  527. purge_tags=dict(default=True, required=False, type='bool')
  528. )
  529. )
  530. module = AnsibleModule(
  531. argument_spec=argument_spec,
  532. supports_check_mode=True,
  533. required_one_of=[['name', 'group_id']],
  534. required_if=[['state', 'present', ['name']]],
  535. )
  536. if not HAS_BOTO3:
  537. module.fail_json(msg='boto3 required for this module')
  538. name = module.params['name']
  539. group_id = module.params['group_id']
  540. description = module.params['description']
  541. vpc_id = module.params['vpc_id']
  542. rules = deduplicate_rules_args(rules_expand_sources(rules_expand_ports(module.params['rules'])))
  543. rules_egress = deduplicate_rules_args(rules_expand_sources(rules_expand_ports(module.params['rules_egress'])))
  544. state = module.params.get('state')
  545. purge_rules = module.params['purge_rules']
  546. purge_rules_egress = module.params['purge_rules_egress']
  547. tags = module.params['tags']
  548. purge_tags = module.params['purge_tags']
  549. if state == 'present' and not description:
  550. module.fail_json(msg='Must provide description when state is present.')
  551. changed = False
  552. region, ec2_url, aws_connect_params = get_aws_connection_info(module, boto3=True)
  553. if not region:
  554. module.fail_json(msg="The AWS region must be specified as an "
  555. "environment variable or in the AWS credentials "
  556. "profile.")
  557. client = boto3_conn(module, conn_type='client', resource='ec2', endpoint=ec2_url, region=region, **aws_connect_params)
  558. group = None
  559. groups = dict()
  560. security_groups = []
  561. # do get all security groups
  562. # find if the group is present
  563. try:
  564. response = get_security_groups_with_backoff(client)
  565. security_groups = response.get('SecurityGroups', [])
  566. except botocore.exceptions.NoCredentialsError as e:
  567. module.fail_json(msg="Error in describe_security_groups: %s" % "Unable to locate credentials", exception=traceback.format_exc())
  568. except botocore.exceptions.ClientError as e:
  569. module.fail_json(msg="Error in describe_security_groups: %s" % e, exception=traceback.format_exc(),
  570. **camel_dict_to_snake_dict(e.response))
  571. for sg in security_groups:
  572. groups[sg['GroupId']] = sg
  573. groupName = sg['GroupName']
  574. if groupName in groups:
  575. # Prioritise groups from the current VPC
  576. # even if current VPC is EC2-Classic
  577. if groups[groupName].get('VpcId') == vpc_id:
  578. # Group saved already matches current VPC, change nothing
  579. pass
  580. elif vpc_id is None and groups[groupName].get('VpcId') is None:
  581. # We're in EC2 classic, and the group already saved is as well
  582. # No VPC groups can be used alongside EC2 classic groups
  583. pass
  584. else:
  585. # the current SG stored has no direct match, so we can replace it
  586. groups[groupName] = sg
  587. else:
  588. groups[groupName] = sg
  589. if group_id and sg['GroupId'] == group_id:
  590. group = sg
  591. elif groupName == name and (vpc_id is None or sg.get('VpcId') == vpc_id):
  592. group = sg
  593. # Ensure requested group is absent
  594. if state == 'absent':
  595. if group:
  596. # found a match, delete it
  597. try:
  598. if not module.check_mode:
  599. client.delete_security_group(GroupId=group['GroupId'])
  600. except botocore.exceptions.ClientError as e:
  601. module.fail_json(msg="Unable to delete security group '%s' - %s" % (group, e),
  602. exception=traceback.format_exc(), **camel_dict_to_snake_dict(e.response))
  603. else:
  604. group = None
  605. changed = True
  606. else:
  607. # no match found, no changes required
  608. pass
  609. # Ensure requested group is present
  610. elif state == 'present':
  611. if group:
  612. # existing group
  613. if group['Description'] != description:
  614. module.warn("Group description does not match existing group. Descriptions cannot be changed without deleting "
  615. "and re-creating the security group. Try using state=absent to delete, then rerunning this task.")
  616. # if the group doesn't exist, create it now
  617. else:
  618. # no match found, create it
  619. if not module.check_mode:
  620. params = dict(GroupName=name, Description=description)
  621. if vpc_id:
  622. params['VpcId'] = vpc_id
  623. group = client.create_security_group(**params)
  624. # When a group is created, an egress_rule ALLOW ALL
  625. # to 0.0.0.0/0 is added automatically but it's not
  626. # reflected in the object returned by the AWS API
  627. # call. We re-read the group for getting an updated object
  628. # amazon sometimes takes a couple seconds to update the security group so wait till it exists
  629. while True:
  630. group = get_security_groups_with_backoff(client, GroupIds=[group['GroupId']])['SecurityGroups'][0]
  631. if group.get('VpcId') and not group.get('IpPermissionsEgress'):
  632. pass
  633. else:
  634. break
  635. changed = True
  636. if tags is not None:
  637. current_tags = boto3_tag_list_to_ansible_dict(group.get('Tags', []))
  638. tags_need_modify, tags_to_delete = compare_aws_tags(current_tags, tags, purge_tags)
  639. if tags_to_delete:
  640. try:
  641. client.delete_tags(Resources=[group['GroupId']], Tags=[{'Key': tag} for tag in tags_to_delete])
  642. except botocore.exceptions.ClientError as e:
  643. module.fail_json(msg=e.message, exception=traceback.format_exc(), **camel_dict_to_snake_dict(e.response))
  644. changed = True
  645. # Add/update tags
  646. if tags_need_modify:
  647. try:
  648. client.create_tags(Resources=[group['GroupId']], Tags=ansible_dict_to_boto3_tag_list(tags_need_modify))
  649. except botocore.exceptions.ClientError as e:
  650. module.fail_json(msg=e.message, exception=traceback.format_exc(), **camel_dict_to_snake_dict(e.response))
  651. changed = True
  652. else:
  653. module.fail_json(msg="Unsupported state requested: %s" % state)
  654. # create a lookup for all existing rules on the group
  655. ip_permission = []
  656. if group:
  657. # Manage ingress rules
  658. groupRules = {}
  659. add_rules_to_lookup(group['IpPermissions'], group['GroupId'], 'in', groupRules)
  660. # Now, go through all provided rules and ensure they are there.
  661. if rules is not None:
  662. for rule in rules:
  663. validate_rule(module, rule)
  664. group_id, ip, ipv6, target_group_created = get_target_from_rule(module, client, rule, name,
  665. group, groups, vpc_id)
  666. if target_group_created:
  667. changed = True
  668. if rule['proto'] in ('all', '-1', -1):
  669. rule['proto'] = -1
  670. rule['from_port'] = None
  671. rule['to_port'] = None
  672. if group_id:
  673. rule_id = make_rule_key('in', rule, group['GroupId'], group_id)
  674. if rule_id in groupRules:
  675. del groupRules[rule_id]
  676. else:
  677. if not module.check_mode:
  678. ip_permission = serialize_group_grant(group_id, rule)
  679. if ip_permission:
  680. ips = ip_permission
  681. if vpc_id:
  682. [useridpair.update({'VpcId': vpc_id}) for useridpair in
  683. ip_permission.get('UserIdGroupPairs', [])]
  684. try:
  685. client.authorize_security_group_ingress(GroupId=group['GroupId'], IpPermissions=[ips])
  686. except botocore.exceptions.ClientError as e:
  687. module.fail_json(
  688. msg="Unable to authorize ingress for group %s security group '%s' - %s" %
  689. (group_id, group['GroupName'], e),
  690. exception=traceback.format_exc(), **camel_dict_to_snake_dict(e.response))
  691. changed = True
  692. elif ip:
  693. # Convert ip to list we can iterate over
  694. if ip and not isinstance(ip, list):
  695. ip = [ip]
  696. changed, ip_permission = authorize_ip("in", changed, client, group, groupRules, ip, ip_permission,
  697. module, rule, "ipv4")
  698. elif ipv6:
  699. # Convert ip to list we can iterate over
  700. if not isinstance(ipv6, list):
  701. ipv6 = [ipv6]
  702. # If rule already exists, don't later delete it
  703. changed, ip_permission = authorize_ip("in", changed, client, group, groupRules, ipv6, ip_permission,
  704. module, rule, "ipv6")
  705. # Finally, remove anything left in the groupRules -- these will be defunct rules
  706. if purge_rules:
  707. for (rule, grant) in groupRules.values():
  708. ip_permission = serialize_revoke(grant, rule)
  709. if not module.check_mode:
  710. try:
  711. client.revoke_security_group_ingress(GroupId=group['GroupId'], IpPermissions=[ip_permission])
  712. except botocore.exceptions.ClientError as e:
  713. module.fail_json(
  714. msg="Unable to revoke ingress for security group '%s' - %s" %
  715. (group['GroupName'], e),
  716. exception=traceback.format_exc(), **camel_dict_to_snake_dict(e.response))
  717. changed = True
  718. # Manage egress rules
  719. groupRules = {}
  720. add_rules_to_lookup(group['IpPermissionsEgress'], group['GroupId'], 'out', groupRules)
  721. # Now, go through all provided rules and ensure they are there.
  722. if rules_egress is not None:
  723. for rule in rules_egress:
  724. validate_rule(module, rule)
  725. group_id, ip, ipv6, target_group_created = get_target_from_rule(module, client, rule, name,
  726. group, groups, vpc_id)
  727. if target_group_created:
  728. changed = True
  729. if rule['proto'] in ('all', '-1', -1):
  730. rule['proto'] = -1
  731. rule['from_port'] = None
  732. rule['to_port'] = None
  733. if group_id:
  734. rule_id = make_rule_key('out', rule, group['GroupId'], group_id)
  735. if rule_id in groupRules:
  736. del groupRules[rule_id]
  737. else:
  738. if not module.check_mode:
  739. ip_permission = serialize_group_grant(group_id, rule)
  740. if ip_permission:
  741. ips = ip_permission
  742. if vpc_id:
  743. [useridpair.update({'VpcId': vpc_id}) for useridpair in
  744. ip_permission.get('UserIdGroupPairs', [])]
  745. try:
  746. client.authorize_security_group_egress(GroupId=group['GroupId'], IpPermissions=[ips])
  747. except botocore.exceptions.ClientError as e:
  748. module.fail_json(
  749. msg="Unable to authorize egress for group %s security group '%s' - %s" %
  750. (group_id, group['GroupName'], e),
  751. exception=traceback.format_exc(), **camel_dict_to_snake_dict(e.response))
  752. changed = True
  753. elif ip:
  754. # Convert ip to list we can iterate over
  755. if not isinstance(ip, list):
  756. ip = [ip]
  757. changed, ip_permission = authorize_ip("out", changed, client, group, groupRules, ip,
  758. ip_permission, module, rule, "ipv4")
  759. elif ipv6:
  760. # Convert ip to list we can iterate over
  761. if not isinstance(ipv6, list):
  762. ipv6 = [ipv6]
  763. # If rule already exists, don't later delete it
  764. changed, ip_permission = authorize_ip("out", changed, client, group, groupRules, ipv6,
  765. ip_permission, module, rule, "ipv6")
  766. elif vpc_id is not None:
  767. # when no egress rules are specified and we're in a VPC,
  768. # we add in a default allow all out rule, which was the
  769. # default behavior before egress rules were added
  770. default_egress_rule = 'out--1-None-None-' + group['GroupId'] + '-0.0.0.0/0'
  771. if default_egress_rule not in groupRules:
  772. if not module.check_mode:
  773. ip_permission = [{'IpProtocol': '-1',
  774. 'IpRanges': [{'CidrIp': '0.0.0.0/0'}]
  775. }
  776. ]
  777. try:
  778. client.authorize_security_group_egress(GroupId=group['GroupId'], IpPermissions=ip_permission)
  779. except botocore.exceptions.ClientError as e:
  780. module.fail_json(msg="Unable to authorize egress for ip %s security group '%s' - %s" %
  781. ('0.0.0.0/0',
  782. group['GroupName'],
  783. e),
  784. exception=traceback.format_exc(), **camel_dict_to_snake_dict(e.response))
  785. changed = True
  786. else:
  787. # make sure the default egress rule is not removed
  788. del groupRules[default_egress_rule]
  789. # Finally, remove anything left in the groupRules -- these will be defunct rules
  790. if purge_rules_egress and vpc_id is not None:
  791. for (rule, grant) in groupRules.values():
  792. # we shouldn't be revoking 0.0.0.0 egress
  793. if grant != '0.0.0.0/0':
  794. ip_permission = serialize_revoke(grant, rule)
  795. if not module.check_mode:
  796. try:
  797. client.revoke_security_group_egress(GroupId=group['GroupId'], IpPermissions=[ip_permission])
  798. except botocore.exceptions.ClientError as e:
  799. module.fail_json(msg="Unable to revoke egress for ip %s security group '%s' - %s" %
  800. (grant, group['GroupName'], e),
  801. exception=traceback.format_exc(), **camel_dict_to_snake_dict(e.response))
  802. changed = True
  803. if group:
  804. security_group = get_security_groups_with_backoff(client, GroupIds=[group['GroupId']])['SecurityGroups'][0]
  805. security_group = camel_dict_to_snake_dict(security_group)
  806. security_group['tags'] = boto3_tag_list_to_ansible_dict(security_group.get('tags', []),
  807. tag_name_key_name='key', tag_value_key_name='value')
  808. module.exit_json(changed=changed, **security_group)
  809. else:
  810. module.exit_json(changed=changed, group_id=None)
  811. if __name__ == '__main__':
  812. main()