313 lines
13 KiB
Ruby
313 lines
13 KiB
Ruby
require "log4r"
|
|
require 'json'
|
|
|
|
require 'vagrant/util/retryable'
|
|
|
|
require 'vagrant-aws/util/timer'
|
|
|
|
module VagrantPlugins
|
|
module AWS
|
|
module Action
|
|
# This runs the configured instance.
|
|
class RunInstance
|
|
include Vagrant::Util::Retryable
|
|
|
|
def initialize(app, env)
|
|
@app = app
|
|
@logger = Log4r::Logger.new("vagrant_aws::action::run_instance")
|
|
end
|
|
|
|
def call(env)
|
|
# Initialize metrics if they haven't been
|
|
env[:metrics] ||= {}
|
|
|
|
# Get the region we're going to booting up in
|
|
region = env[:machine].provider_config.region
|
|
|
|
# Get the configs
|
|
region_config = env[:machine].provider_config.get_region_config(region)
|
|
ami = region_config.ami
|
|
availability_zone = region_config.availability_zone
|
|
instance_type = region_config.instance_type
|
|
keypair = region_config.keypair_name
|
|
private_ip_address = region_config.private_ip_address
|
|
security_groups = region_config.security_groups
|
|
subnet_id = region_config.subnet_id
|
|
tags = region_config.tags
|
|
user_data = region_config.user_data
|
|
block_device_mapping = region_config.block_device_mapping
|
|
elastic_ip = region_config.elastic_ip
|
|
terminate_on_shutdown = region_config.terminate_on_shutdown
|
|
iam_instance_profile_arn = region_config.iam_instance_profile_arn
|
|
iam_instance_profile_name = region_config.iam_instance_profile_name
|
|
monitoring = region_config.monitoring
|
|
ebs_optimized = region_config.ebs_optimized
|
|
source_dest_check = region_config.source_dest_check
|
|
associate_public_ip = region_config.associate_public_ip
|
|
kernel_id = region_config.kernel_id
|
|
tenancy = region_config.tenancy
|
|
|
|
# If there is no keypair then warn the user
|
|
if !keypair
|
|
env[:ui].warn(I18n.t("vagrant_aws.launch_no_keypair"))
|
|
end
|
|
|
|
# If there is a subnet ID then warn the user
|
|
if subnet_id && !elastic_ip
|
|
env[:ui].warn(I18n.t("vagrant_aws.launch_vpc_warning"))
|
|
end
|
|
|
|
# Launch!
|
|
env[:ui].info(I18n.t("vagrant_aws.launching_instance"))
|
|
env[:ui].info(" -- Type: #{instance_type}")
|
|
env[:ui].info(" -- AMI: #{ami}")
|
|
env[:ui].info(" -- Region: #{region}")
|
|
env[:ui].info(" -- Availability Zone: #{availability_zone}") if availability_zone
|
|
env[:ui].info(" -- Keypair: #{keypair}") if keypair
|
|
env[:ui].info(" -- Subnet ID: #{subnet_id}") if subnet_id
|
|
env[:ui].info(" -- IAM Instance Profile ARN: #{iam_instance_profile_arn}") if iam_instance_profile_arn
|
|
env[:ui].info(" -- IAM Instance Profile Name: #{iam_instance_profile_name}") if iam_instance_profile_name
|
|
env[:ui].info(" -- Private IP: #{private_ip_address}") if private_ip_address
|
|
env[:ui].info(" -- Elastic IP: #{elastic_ip}") if elastic_ip
|
|
env[:ui].info(" -- User Data: yes") if user_data
|
|
env[:ui].info(" -- Security Groups: #{security_groups.inspect}") if !security_groups.empty?
|
|
env[:ui].info(" -- User Data: #{user_data}") if user_data
|
|
env[:ui].info(" -- Block Device Mapping: #{block_device_mapping}") if block_device_mapping
|
|
env[:ui].info(" -- Terminate On Shutdown: #{terminate_on_shutdown}")
|
|
env[:ui].info(" -- Monitoring: #{monitoring}")
|
|
env[:ui].info(" -- EBS optimized: #{ebs_optimized}")
|
|
env[:ui].info(" -- Source Destination check: #{source_dest_check}")
|
|
env[:ui].info(" -- Assigning a public IP address in a VPC: #{associate_public_ip}")
|
|
env[:ui].info(" -- VPC tenancy specification: #{tenancy}")
|
|
|
|
options = {
|
|
:availability_zone => availability_zone,
|
|
:flavor_id => instance_type,
|
|
:image_id => ami,
|
|
:key_name => keypair,
|
|
:private_ip_address => private_ip_address,
|
|
:subnet_id => subnet_id,
|
|
:iam_instance_profile_arn => iam_instance_profile_arn,
|
|
:iam_instance_profile_name => iam_instance_profile_name,
|
|
:tags => tags,
|
|
:user_data => user_data,
|
|
:block_device_mapping => block_device_mapping,
|
|
:instance_initiated_shutdown_behavior => terminate_on_shutdown == true ? "terminate" : nil,
|
|
:monitoring => monitoring,
|
|
:ebs_optimized => ebs_optimized,
|
|
:associate_public_ip => associate_public_ip,
|
|
:kernel_id => kernel_id,
|
|
:associate_public_ip => associate_public_ip,
|
|
:tenancy => tenancy
|
|
}
|
|
|
|
if !security_groups.empty?
|
|
security_group_key = options[:subnet_id].nil? ? :groups : :security_group_ids
|
|
options[security_group_key] = security_groups
|
|
env[:ui].warn(I18n.t("vagrant_aws.warn_ssh_access")) unless allows_ssh_port?(env, security_groups, subnet_id)
|
|
end
|
|
|
|
begin
|
|
server = env[:aws_compute].servers.create(options)
|
|
rescue Fog::Compute::AWS::NotFound => e
|
|
# Invalid subnet doesn't have its own error so we catch and
|
|
# check the error message here.
|
|
if e.message =~ /subnet ID/
|
|
raise Errors::FogError,
|
|
:message => "Subnet ID not found: #{subnet_id}"
|
|
end
|
|
|
|
raise
|
|
rescue Fog::Compute::AWS::Error => e
|
|
raise Errors::FogError, :message => e.message
|
|
rescue Excon::Errors::HTTPStatusError => e
|
|
raise Errors::InternalFogError,
|
|
:error => e.message,
|
|
:response => e.response.body
|
|
end
|
|
|
|
# Immediately save the ID since it is created at this point.
|
|
env[:machine].id = server.id
|
|
|
|
# Wait for the instance to be ready first
|
|
env[:metrics]["instance_ready_time"] = Util::Timer.time do
|
|
tries = region_config.instance_ready_timeout / 2
|
|
|
|
env[:ui].info(I18n.t("vagrant_aws.waiting_for_ready"))
|
|
begin
|
|
retryable(:on => Fog::Errors::TimeoutError, :tries => tries) do
|
|
# If we're interrupted don't worry about waiting
|
|
next if env[:interrupted]
|
|
|
|
# Wait for the server to be ready
|
|
server.wait_for(2, region_config.instance_check_interval) { ready? }
|
|
end
|
|
rescue Fog::Errors::TimeoutError
|
|
# Delete the instance
|
|
terminate(env)
|
|
|
|
# Notify the user
|
|
raise Errors::InstanceReadyTimeout,
|
|
timeout: region_config.instance_ready_timeout
|
|
end
|
|
end
|
|
|
|
@logger.info("Time to instance ready: #{env[:metrics]["instance_ready_time"]}")
|
|
|
|
# Allocate and associate an elastic IP if requested
|
|
if elastic_ip
|
|
domain = subnet_id ? 'vpc' : 'standard'
|
|
do_elastic_ip(env, domain, server, elastic_ip)
|
|
end
|
|
|
|
# Set the source destination checks
|
|
if !source_dest_check.nil?
|
|
if server.vpc_id.nil?
|
|
env[:ui].warn(I18n.t("vagrant_aws.source_dest_checks_no_vpc"))
|
|
else
|
|
begin
|
|
attrs = {
|
|
"SourceDestCheck.Value" => source_dest_check
|
|
}
|
|
env[:aws_compute].modify_instance_attribute(server.id, attrs)
|
|
rescue Fog::Compute::AWS::Error => e
|
|
raise Errors::FogError, :message => e.message
|
|
end
|
|
end
|
|
end
|
|
|
|
if !env[:interrupted]
|
|
env[:metrics]["instance_ssh_time"] = Util::Timer.time do
|
|
# Wait for SSH to be ready.
|
|
env[:ui].info(I18n.t("vagrant_aws.waiting_for_ssh"))
|
|
network_ready_retries = 0
|
|
network_ready_retries_max = 10
|
|
while true
|
|
# If we're interrupted then just back out
|
|
break if env[:interrupted]
|
|
# When an ec2 instance comes up, it's networking may not be ready
|
|
# by the time we connect.
|
|
begin
|
|
break if env[:machine].communicate.ready?
|
|
rescue Exception => e
|
|
if network_ready_retries < network_ready_retries_max then
|
|
network_ready_retries += 1
|
|
@logger.warn(I18n.t("vagrant_aws.waiting_for_ssh, retrying"))
|
|
else
|
|
raise e
|
|
end
|
|
end
|
|
sleep 2
|
|
end
|
|
end
|
|
|
|
@logger.info("Time for SSH ready: #{env[:metrics]["instance_ssh_time"]}")
|
|
|
|
# Ready and booted!
|
|
env[:ui].info(I18n.t("vagrant_aws.ready"))
|
|
end
|
|
|
|
# Terminate the instance if we were interrupted
|
|
terminate(env) if env[:interrupted]
|
|
|
|
@app.call(env)
|
|
end
|
|
|
|
def recover(env)
|
|
return if env["vagrant.error"].is_a?(Vagrant::Errors::VagrantError)
|
|
|
|
if env[:machine].provider.state.id != :not_created
|
|
# Undo the import
|
|
terminate(env)
|
|
end
|
|
end
|
|
|
|
def allows_ssh_port?(env, test_sec_groups, is_vpc)
|
|
port = 22 # TODO get ssh_info port
|
|
test_sec_groups = [ "default" ] if test_sec_groups.empty? # AWS default security group
|
|
# filter groups by name or group_id (vpc)
|
|
groups = test_sec_groups.map do |tsg|
|
|
env[:aws_compute].security_groups.all.select { |sg| tsg == (is_vpc ? sg.group_id : sg.name) }
|
|
end.flatten
|
|
# filter TCP rules
|
|
rules = groups.map { |sg| sg.ip_permissions.select { |r| r["ipProtocol"] == "tcp" } }.flatten
|
|
# test if any range includes port
|
|
!rules.select { |r| (r["fromPort"]..r["toPort"]).include?(port) }.empty?
|
|
end
|
|
|
|
def do_elastic_ip(env, domain, server, elastic_ip)
|
|
if elastic_ip =~ /\d+\.\d+\.\d+\.\d+/
|
|
begin
|
|
address = env[:aws_compute].addresses.get(elastic_ip)
|
|
rescue
|
|
handle_elastic_ip_error(env, "Could not retrieve Elastic IP: #{elastic_ip}")
|
|
end
|
|
if address.nil?
|
|
handle_elastic_ip_error(env, "Elastic IP not available: #{elastic_ip}")
|
|
end
|
|
@logger.debug("Public IP #{address.public_ip}")
|
|
else
|
|
begin
|
|
allocation = env[:aws_compute].allocate_address(domain)
|
|
rescue
|
|
handle_elastic_ip_error(env, "Could not allocate Elastic IP.")
|
|
end
|
|
@logger.debug("Public IP #{allocation.body['publicIp']}")
|
|
end
|
|
|
|
# Associate the address and save the metadata to a hash
|
|
h = nil
|
|
if domain == 'vpc'
|
|
# VPC requires an allocation ID to assign an IP
|
|
if address
|
|
association = env[:aws_compute].associate_address(server.id, nil, nil, address.allocation_id)
|
|
else
|
|
association = env[:aws_compute].associate_address(server.id, nil, nil, allocation.body['allocationId'])
|
|
# Only store release data for an allocated address
|
|
h = { :allocation_id => allocation.body['allocationId'], :association_id => association.body['associationId'], :public_ip => allocation.body['publicIp'] }
|
|
end
|
|
else
|
|
# Standard EC2 instances only need the allocated IP address
|
|
if address
|
|
association = env[:aws_compute].associate_address(server.id, address.public_ip)
|
|
else
|
|
association = env[:aws_compute].associate_address(server.id, allocation.body['publicIp'])
|
|
h = { :public_ip => allocation.body['publicIp'] }
|
|
end
|
|
end
|
|
|
|
unless association.body['return']
|
|
@logger.debug("Could not associate Elastic IP.")
|
|
terminate(env)
|
|
raise Errors::FogError,
|
|
:message => "Could not allocate Elastic IP."
|
|
end
|
|
|
|
# Save this IP to the data dir so it can be released when the instance is destroyed
|
|
if h
|
|
ip_file = env[:machine].data_dir.join('elastic_ip')
|
|
ip_file.open('w+') do |f|
|
|
f.write(h.to_json)
|
|
end
|
|
end
|
|
end
|
|
|
|
def handle_elastic_ip_error(env, message)
|
|
@logger.debug(message)
|
|
terminate(env)
|
|
raise Errors::FogError,
|
|
:message => message
|
|
end
|
|
|
|
def terminate(env)
|
|
destroy_env = env.dup
|
|
destroy_env.delete(:interrupted)
|
|
destroy_env[:config_validate] = false
|
|
destroy_env[:force_confirm_destroy] = true
|
|
env[:action_runner].run(Action.action_destroy, destroy_env)
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|