namespace :rubber do desc <<-DESC Sets up the network security groups All defined groups will be created, and any not defined will be removed. Likewise, rules within a group will get created, and those not will be removed DESC required_task :setup_security_groups do setup_security_groups() end desc <<-DESC Describes the network security groups DESC required_task :describe_security_groups do groups = cloud.describe_security_groups() groups.each do |group| puts "#{group[:name]}, #{group[:description]}" group[:permissions].each do |perm| puts " protocol: #{perm[:protocol]}" puts " from_port: #{perm[:from_port]}" puts " to_port: #{perm[:to_port]}" puts " source_groups: #{perm[:source_groups].collect {|g| g[:name]}.join(", ") }" if perm[:source_groups] puts " source_ips: #{perm[:source_ips].join(", ") }" if perm[:source_ips] puts "\n" end if group[:permissions] puts "\n" end end def get_assigned_security_groups(host=nil, roles=[]) env = rubber_cfg.environment.bind(roles, host) security_groups = env.assigned_security_groups if env.auto_security_groups security_groups << host security_groups += roles end security_groups = security_groups.uniq.compact security_groups = security_groups.collect {|x| isolate_group_name(x) } if env.isolate_security_groups return security_groups end def setup_security_groups(host=nil, roles=[]) env = rubber_cfg.environment.bind(roles, host) security_group_defns = env.security_groups if env.auto_security_groups sghosts = (rubber_instances.collect{|ic| ic.name } + [host]).uniq.compact sgroles = (rubber_instances.all_roles + roles).uniq.compact security_group_defns = inject_auto_security_groups(security_group_defns, sghosts, sgroles) sync_security_groups(security_group_defns) else sync_security_groups(security_group_defns) end end def inject_auto_security_groups(groups, hosts, roles) hosts.each do |name| group_name = name groups[group_name] ||= {'description' => "Rubber automatic security group for host: #{name}", 'rules' => []} end roles.each do |name| group_name = name groups[group_name] ||= {'description' => "Rubber automatic security group for role: #{name}", 'rules' => []} end return groups end def isolate_prefix return "#{rubber_env.app_name}_#{RUBBER_ENV}_" end def isolate_group_name(group_name) new_name = "#{isolate_prefix}#{group_name}" return new_name end def isolate_groups(groups) renamed = {} groups.each do |name, group| new_name = name =~ /^#{isolate_prefix}/ ? name : isolate_group_name(name) new_group = Marshal.load(Marshal.dump(group)) new_group['rules'].each do |rule| old_ref_name = rule['source_group_name'] if old_ref_name && old_ref_name !~ /^#{isolate_prefix}/ rule['source_group_name'] = isolate_group_name(old_ref_name) end end renamed[new_name] = new_group end return renamed end def sync_security_groups(groups) return unless groups groups = Rubber::Util::stringify(groups) groups = isolate_groups(groups) if rubber_env.isolate_security_groups group_keys = groups.keys.clone() # For each group that does already exist in cloud cloud_groups = cloud.describe_security_groups() cloud_groups.each do |cloud_group| group_name = cloud_group[:name] # skip those groups that don't belong to this project/env next if rubber_env.isolate_security_groups && group_name !~ /^#{isolate_prefix}/ if group_keys.delete(group_name) # sync rules logger.debug "Security Group already in cloud, syncing rules: #{group_name}" group = groups[group_name] rules = group['rules'].clone rule_maps = [] # first collect the rule maps from the request (group/user pairs are duplicated for tcp/udp/icmp, # so we need to do this up frnot and remove duplicates before checking against the local rubber rules) cloud_group[:permissions].each do |rule| if rule[:source_groups] rule.source_groups.each do |source_group| rule_map = {:source_group_name => source_group[:name], :source_group_account => source_group[:account]} rule_map = Rubber::Util::stringify(rule_map) rule_maps << rule_map unless rule_maps.include?(rule_map) end else rule_map = Rubber::Util::stringify(rule) rule_maps << rule_map unless rule_maps.include?(rule_map) end end if cloud_group[:permissions] # For each rule, if it exists, do nothing, otherwise remove it as its no longer defined locally rule_maps.each do |rule_map| if rules.delete(rule_map) # rules match, don't need to do anything # logger.debug "Rule in sync: #{rule_map.inspect}" else # rules don't match, remove them from cloud and re-add below answer = Capistrano::CLI.ui.ask("Rule '#{rule_map.inspect}' exists in cloud, but not locally, remove from cloud? [y/N]?: ") rule_map = Rubber::Util::symbolize_keys(rule_map) if rule_map[:source_group_name] cloud.remove_security_group_rule(group_name, nil, nil, nil, {:name => rule_map[:source_group_name], :account => rule_map[:source_group_account]}) else rule_map[:source_ips].each do |source_ip| cloud.remove_security_group_rule(group_name, rule_map[:protocol], rule_map[:from_port], rule_map[:to_port], source_ip) end if rule_map[:source_ips] && answer =~ /^y/ end end end rules.each do |rule_map| # create non-existing rules logger.debug "Missing rule, creating: #{rule_map.inspect}" rule_map = Rubber::Util::symbolize_keys(rule_map) if rule_map[:source_group_name] cloud.add_security_group_rule(group_name, nil, nil, nil, {:name => rule_map[:source_group_name], :account => rule_map[:source_group_account]}) else rule_map[:source_ips].each do |source_ip| cloud.add_security_group_rule(group_name, rule_map[:protocol], rule_map[:from_port], rule_map[:to_port], source_ip) end if rule_map[:source_ips] end end else # delete group answer = Capistrano::CLI.ui.ask("Security group '#{group_name}' exists in cloud but not locally, remove from cloud? [y/N]: ") cloud.destroy_security_group(group_name) if answer =~ /^y/ end end # For each group that didnt already exist in cloud group_keys.each do |group_name| group = groups[group_name] logger.debug "Creating new security group: #{group_name}" # create each group cloud.create_security_group(group_name, group['description']) # create rules for group group['rules'].each do |rule_map| logger.debug "Creating new rule: #{rule_map.inspect}" rule_map = Rubber::Util::symbolize_keys(rule_map) if rule_map[:source_group_name] cloud.add_security_group_rule(group_name, nil, nil, nil, {:name => rule_map[:source_group_name], :account => rule_map[:source_group_account]}) else rule_map[:source_ips].each do |source_ip| cloud.add_security_group_rule(group_name, rule_map[:protocol], rule_map[:from_port], rule_map[:to_port], source_ip) end if rule_map[:source_ips] end end end end end