2013-03-19 17:07:36 +01:00
#!/usr/bin/python
2012-11-09 06:15:12 +01:00
# This file is part of Ansible
#
# Ansible is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# Ansible is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
DOCUMENTATION = '''
---
module: ec2
2013-06-21 02:00:52 +02:00
short_description: create or terminate an instance in ec2, return instanceid
2012-11-09 06:15:12 +01:00
description:
2013-06-21 02:00:52 +02:00
- Creates or terminates ec2 instances. When created optionally waits for it to be 'running'. This module has a dependency on python-boto >= 2.5
2012-11-09 06:15:12 +01:00
version_added: "0.9"
options:
2013-01-22 21:09:31 +01:00
key_name:
2012-11-09 06:15:12 +01:00
description:
2012-11-21 18:49:30 +01:00
- key pair to use on the instance
2012-11-09 06:15:12 +01:00
required: true
default: null
2013-01-22 21:09:31 +01:00
aliases: ['keypair']
2013-03-16 03:55:01 +01:00
id:
description:
- identifier for this instance or set of instances, so that the module will be idempotent with respect to EC2 instances.
required: false
default: null
aliases: []
2012-11-09 06:15:12 +01:00
group:
description:
2013-06-17 22:15:12 +02:00
- security group (or list of groups) to use with the instance
2012-11-09 06:15:12 +01:00
required: false
2013-06-21 02:00:52 +02:00
default: null
2013-06-20 04:10:48 +02:00
aliases: [ 'groups' ]
2013-02-20 10:31:22 +01:00
group_id:
version_added: "1.1"
description:
2013-06-21 02:00:52 +02:00
- security group id to use with the instance
2013-02-20 10:31:22 +01:00
required: false
default: null
2012-11-09 06:15:12 +01:00
aliases: []
2013-04-23 01:23:30 +02:00
region:
version_added: "1.2"
description:
- the EC2 region to use
required: false
default: null
aliases: []
2013-04-08 11:42:34 +02:00
zone:
version_added: "1.2"
description:
- availability zone in which to launch the instance
required: false
default: null
aliases: []
2012-11-09 06:15:12 +01:00
instance_type:
description:
- instance type to use for the instance
required: true
default: null
aliases: []
image:
description:
2012-11-21 18:49:30 +01:00
- I(emi) (or I(ami)) to use for the instance
2012-11-09 06:15:12 +01:00
required: true
default: null
aliases: []
kernel:
description:
2012-11-21 18:49:30 +01:00
- kernel I(eki) to use for the instance
2012-11-09 06:15:12 +01:00
required: false
default: null
aliases: []
ramdisk:
description:
2012-11-21 18:49:30 +01:00
- ramdisk I(eri) to use for the instance
2012-11-09 06:15:12 +01:00
required: false
default: null
aliases: []
wait:
description:
- wait for the instance to be in state 'running' before returning
2013-02-20 10:31:22 +01:00
required: false
2013-03-12 13:18:12 +01:00
default: "no"
choices: [ "yes", "no" ]
2012-11-09 06:15:12 +01:00
aliases: []
2013-03-07 18:01:55 +01:00
wait_timeout:
2013-03-07 23:37:25 +01:00
description:
2013-03-07 23:44:22 +01:00
- how long before wait gives up, in seconds
2013-03-07 23:37:25 +01:00
default: 300
aliases: []
2012-11-09 06:15:12 +01:00
ec2_url:
description:
2013-02-20 10:31:22 +01:00
- url to use to connect to EC2 or your Eucalyptus cloud (by default the module will use EC2 endpoints)
required: false
2012-11-09 06:15:12 +01:00
default: null
aliases: []
ec2_secret_key:
description:
- ec2 secret key
2013-02-20 10:31:22 +01:00
required: false
2012-11-09 06:15:12 +01:00
default: null
aliases: []
ec2_access_key:
description:
- ec2 access key
2013-02-20 10:31:22 +01:00
required: false
2012-11-09 06:15:12 +01:00
default: null
aliases: []
2013-01-25 16:02:53 +01:00
count:
description:
- number of instances to launch
required: False
default: 1
aliases: []
2013-02-04 19:03:47 +01:00
monitor:
2013-02-20 10:31:22 +01:00
version_added: "1.1"
2013-02-04 19:03:47 +01:00
description:
- enable detailed monitoring (CloudWatch) for instance
2013-02-20 10:31:22 +01:00
required: false
2013-02-04 19:03:47 +01:00
default: null
aliases: []
2012-11-17 16:02:29 +01:00
user_data:
version_added: "0.9"
description:
- opaque blob of data which is made available to the ec2 instance
2013-02-20 10:31:22 +01:00
required: false
2012-11-17 16:02:29 +01:00
default: null
aliases: []
2013-02-09 17:42:14 +01:00
instance_tags:
version_added: "1.0"
description:
2013-02-20 10:31:22 +01:00
- a hash/dictionary of tags to add to the new instance; '{"key":"value"}' and '{"key":"value","key":"value"}'
required: false
2013-02-09 17:42:14 +01:00
default: null
aliases: []
2013-06-17 15:35:53 +02:00
placement_group:
version_added: "1.3"
description:
- placement group for the instance when using EC2 Clustered Compute
required: false
default: null
aliases: []
2013-02-23 18:46:35 +01:00
vpc_subnet_id:
2013-02-23 18:45:47 +01:00
version_added: "1.1"
description:
- the subnet ID in which to launch the instance (VPC)
required: false
default: null
aliases: []
2013-04-02 07:31:31 +02:00
private_ip:
2013-04-05 21:30:36 +02:00
version_added: "1.2"
2013-04-02 07:31:31 +02:00
description:
- the private ip address to assign the instance (from the vpc subnet)
required: false
defualt: null
aliases: []
2013-06-21 02:00:52 +02:00
termination_list:
version_added: "1.3"
description:
- list of instances to terminate in the form of [{id: <inst-id>}, {id: <inst-id>}].
required: false
default: null
aliases: []
2013-01-22 21:09:31 +01:00
requirements: [ "boto" ]
2013-01-25 16:02:53 +01:00
author: Seth Vidal, Tim Gerla, Lester Wade
2012-11-09 06:15:12 +01:00
'''
2013-04-05 21:30:36 +02:00
EXAMPLES = '''
# Basic provisioning example
2013-06-21 02:00:52 +02:00
- local_action:
module: ec2
keypair: mykey
instance_type: c1.medium
image: emi-40603AD1
wait: yes
group: webserver
2013-04-05 21:30:36 +02:00
count: 3
# Advanced example with tagging and CloudWatch
2013-06-21 02:00:52 +02:00
- local_action:
module: ec2
keypair: mykey
group: databases
instance_type: m1.large
image: ami-6e649707
wait: yes
wait_timeout: 500
count: 5
2013-06-01 17:49:02 +02:00
instance_tags: '{"db":"postgres"}' monitoring=yes'
2013-04-05 21:30:36 +02:00
2013-06-17 22:15:12 +02:00
# Multiple groups example
2013-06-21 02:00:52 +02:00
local_action:
module: ec2
keypair: mykey
2013-06-20 04:10:48 +02:00
group: ['databases', 'internal-services', 'sshable', 'and-so-forth']
2013-06-21 02:00:52 +02:00
instance_type: m1.large
image: ami-6e649707
wait: yes
wait_timeout: 500
count: 5
2013-06-17 22:15:12 +02:00
instance_tags: '{"db":"postgres"}' monitoring=yes'
2013-04-05 21:30:36 +02:00
# VPC example
2013-06-21 02:00:52 +02:00
- local_action:
module: ec2
keypair: mykey
group_id: sg-1dc53f72
instance_type: m1.small
image: ami-6e649707
wait: yes
2013-04-05 21:30:36 +02:00
vpc_subnet_id: subnet-29e63245'
2013-06-21 02:00:52 +02:00
# Launch instances, runs some tasks
# and then terminate them
- name: Create a sandbox instance
hosts: localhost
gather_facts: False
vars:
keypair: my_keypair
instance_type: m1.small
security_group: my_securitygroup
image: my_ami_id
region: us-east-1
tasks:
- name: Launch instance
local_action: ec2 keypair=$keypair group=$security_group instance_type=$instance_type image=$image wait=true region=$region
register: ec2
- name: Add new instance to host group
local_action: add_host hostname=${item.public_ip} groupname=launched
with_items: ${ec2.instances}
- name: Wait for SSH to come up
local_action: wait_for host=${item.public_dns_name} port=22 delay=60 timeout=320 state=started
with_items: ${ec2.instances}
- name: Configure instance(s)
hosts: launched
sudo: True
gather_facts: True
roles:
- my_awesome_role
- my_awesome_test
- name: Terminate instances
hosts: localhost
connection: local
tasks:
- name: Terminate instances that were previously launched
local_action:
module: ec2
termination_list: ${ec2.instances}
2013-04-05 21:30:36 +02:00
'''
2013-01-22 23:29:28 +01:00
import sys
2012-11-09 06:15:12 +01:00
import time
2013-01-22 23:29:28 +01:00
try:
2013-04-23 01:23:30 +02:00
import boto.ec2
2013-06-21 02:00:52 +02:00
from boto.exception import EC2ResponseError
2013-01-22 23:29:28 +01:00
except ImportError:
print "failed=True msg='boto required for this module'"
sys.exit(1)
2013-06-21 02:00:52 +02:00
def get_instance_info(inst):
"""
Retrieves instance information from an instance
ID and returns it as a dictionary
"""
return({
'id': inst.id,
'ami_launch_index': inst.ami_launch_index,
'private_ip': inst.private_ip_address,
'private_dns_name': inst.private_dns_name,
'public_ip': inst.ip_address,
'dns_name': inst.dns_name,
'public_dns_name': inst.public_dns_name,
'state_code': inst.state_code,
'architecture': inst.architecture,
'image_id': inst.image_id,
'key_name': inst.key_name,
'virtualization_type': inst.virtualization_type,
'placement': inst.placement,
'kernel': inst.kernel,
'ramdisk': inst.ramdisk,
'launch_time': inst.launch_time,
'instance_type': inst.instance_type,
'root_device_type': inst.root_device_type,
'root_device_name': inst.root_device_name,
'state': inst.state,
'hypervisor': inst.hypervisor
})
def create_instances(module, ec2):
"""
Creates new instances
module : AnsbileModule object
ec2: authenticated ec2 connection object
Returns:
A list of dictionaries with instance information
about the instances that were launched
"""
2012-11-09 06:15:12 +01:00
2013-01-22 21:09:31 +01:00
key_name = module.params.get('key_name')
2013-03-16 03:55:01 +01:00
id = module.params.get('id')
2013-02-20 10:31:22 +01:00
group_name = module.params.get('group')
group_id = module.params.get('group_id')
2013-04-08 11:42:34 +02:00
zone = module.params.get('zone')
2012-11-09 06:15:12 +01:00
instance_type = module.params.get('instance_type')
image = module.params.get('image')
2013-06-21 02:00:52 +02:00
count = module.params.get('count')
2013-02-04 19:03:47 +01:00
monitoring = module.params.get('monitoring')
2012-11-09 06:15:12 +01:00
kernel = module.params.get('kernel')
ramdisk = module.params.get('ramdisk')
wait = module.params.get('wait')
2013-03-07 18:01:55 +01:00
wait_timeout = int(module.params.get('wait_timeout'))
2013-06-17 15:35:53 +02:00
placement_group = module.params.get('placement_group')
2012-11-17 16:02:29 +01:00
user_data = module.params.get('user_data')
2013-02-09 17:42:14 +01:00
instance_tags = module.params.get('instance_tags')
2013-02-23 18:45:47 +01:00
vpc_subnet_id = module.params.get('vpc_subnet_id')
2013-04-02 07:31:31 +02:00
private_ip = module.params.get('private_ip')
2013-02-09 17:42:14 +01:00
2012-11-09 06:15:12 +01:00
2013-02-20 10:31:22 +01:00
# Here we try to lookup the group name from the security group id - if group_id is set.
2013-04-05 15:21:55 +02:00
if group_id and group_name:
module.fail_json(msg = str("Use only one type of parameter (group_name) or (group_id)"))
sys.exit(1)
2013-06-21 02:00:52 +02:00
2013-02-20 10:31:22 +01:00
try:
2013-04-05 15:21:55 +02:00
# Here we try to lookup the group id from the security group name - if group is set.
if group_name:
grp_details = ec2.get_all_security_groups()
2013-06-17 22:15:12 +02:00
if type(group_name) == list:
group_id = list(filter(lambda grp: str(grp.id) if str(tmp) in str(grp) else None, grp_details) for tmp in group_name)
elif type(group_name) == str:
for grp in grp_details:
if str(group_name) in str(grp):
group_id = [str(grp.id)]
group_name = [group_name]
2013-04-05 15:21:55 +02:00
# Now we try to lookup the group id testing if group exists.
elif group_id:
2013-02-20 10:31:22 +01:00
grp_details = ec2.get_all_security_groups(group_ids=group_id)
grp_item = grp_details[0]
2013-06-17 22:15:12 +02:00
group_name = [grp_item.name ]
2013-02-20 10:31:22 +01:00
except boto.exception.NoAuthHandlerFound, e:
module.fail_json(msg = str(e))
2013-01-25 16:02:53 +01:00
2013-03-16 03:55:01 +01:00
# Lookup any instances that much our run id.
2013-06-21 02:00:52 +02:00
2013-03-16 03:55:01 +01:00
running_instances = []
count_remaining = int(count)
2013-06-21 02:00:52 +02:00
2013-03-16 03:55:01 +01:00
if id != None:
filter_dict = {'client-token':id, 'instance-state-name' : 'running'}
2013-04-10 22:37:49 +02:00
previous_reservations = ec2.get_all_instances(None, filter_dict)
2013-03-16 03:55:01 +01:00
for res in previous_reservations:
for prev_instance in res.instances:
running_instances.append(prev_instance)
2013-06-21 02:00:52 +02:00
count_remaining = count_remaining - len(running_instances)
2013-01-26 12:26:51 +01:00
# Both min_count and max_count equal count parameter. This means the launch request is explicit (we want count, or fail) in how many instances we want.
2013-06-21 02:00:52 +02:00
2013-03-16 03:55:01 +01:00
if count_remaining > 0:
try:
2013-06-21 02:00:52 +02:00
params = {'image_id': image,
2013-04-05 15:21:55 +02:00
'key_name': key_name,
'client_token': id,
2013-06-21 02:00:52 +02:00
'min_count': count_remaining,
2013-04-05 15:21:55 +02:00
'max_count': count_remaining,
'monitoring_enabled': monitoring,
2013-06-17 15:35:53 +02:00
'placement': zone,
2013-06-21 02:00:52 +02:00
'placement_group': placement_group,
2013-04-05 15:21:55 +02:00
'instance_type': instance_type,
'kernel_id': kernel,
'ramdisk_id': ramdisk,
'subnet_id': vpc_subnet_id,
'private_ip_address': private_ip,
'user_data': user_data}
if vpc_subnet_id:
2013-06-17 22:15:12 +02:00
params['security_group_ids'] = group_id
2013-04-05 15:21:55 +02:00
else:
2013-06-17 22:15:12 +02:00
params['security_groups'] = group_name
2013-04-05 15:21:55 +02:00
res = ec2.run_instances(**params)
2013-03-16 03:55:01 +01:00
except boto.exception.BotoServerError, e:
module.fail_json(msg = "%s: %s" % (e.error_code, e.error_message))
2012-11-09 06:15:12 +01:00
2013-03-16 03:55:01 +01:00
instids = [ i.id for i in res.instances ]
while True:
try:
res.connection.get_all_instances(instids)
break
except boto.exception.EC2ResponseError as e:
if "<Code>InvalidInstanceID.NotFound</Code>" in str(e):
# there's a race between start and get an instance
continue
else:
module.fail_json(msg = str(e))
2012-11-09 06:15:12 +01:00
2013-03-16 03:55:01 +01:00
if instance_tags:
try:
ec2.create_tags(instids, module.from_json(instance_tags))
except boto.exception.EC2ResponseError as e:
module.fail_json(msg = "%s: %s" % (e.error_code, e.error_message))
2013-02-09 17:42:14 +01:00
2013-03-16 03:55:01 +01:00
# wait here until the instances are up
2013-03-07 18:01:55 +01:00
res_list = res.connection.get_all_instances(instids)
this_res = res_list[0]
2013-03-16 03:55:01 +01:00
num_running = 0
wait_timeout = time.time() + wait_timeout
while wait and wait_timeout > time.time() and num_running < len(instids):
res_list = res.connection.get_all_instances(instids)
this_res = res_list[0]
num_running = len([ i for i in this_res.instances if i.state=='running' ])
time.sleep(5)
if wait and wait_timeout <= time.time():
# waiting took too long
module.fail_json(msg = "wait for instances running timeout on %s" % time.asctime())
2013-06-21 02:00:52 +02:00
2013-03-16 03:55:01 +01:00
for inst in this_res.instances:
running_instances.append(inst)
2013-06-21 02:00:52 +02:00
2013-03-16 03:55:01 +01:00
instance_dict_array = []
for inst in running_instances:
2013-06-21 02:00:52 +02:00
d = get_instance_info(inst)
2013-03-16 03:55:01 +01:00
instance_dict_array.append(d)
2012-11-09 06:15:12 +01:00
2013-06-21 02:00:52 +02:00
return instance_dict_array
def terminate_instances(module, ec2, termination_list):
"""
Terminates a list of instances
module: Ansible module object
ec2: authenticated ec2 connection object
termination_list: a list of instances to terminate in the form of
[ {id: <inst-id>}, ..]
Returns a dictionary of instance information
about the instances terminated.
If the instance to be terminated is running
"changed" will be set to False.
"""
instance_ids = [str(inst['id']) for inst in termination_list]
changed = False
instance_dict_array = []
for res in ec2.get_all_instances(instance_ids):
for inst in res.instances:
if inst.state == 'running':
instance_dict_array.append(get_instance_info(inst))
try:
ec2.terminate_instances([inst.id])
except EC2ResponseError as e:
module.fail_json(msg='Unable to terminate instance {0}, error: {1}'.format(inst.id, e))
changed = True
return (changed, instance_dict_array)
def main():
module = AnsibleModule(
argument_spec = dict(
key_name = dict(aliases = ['keypair']),
id = dict(),
group = dict(type='list'),
group_id = dict(),
region = dict(choices=['eu-west-1', 'sa-east-1', 'us-east-1', 'ap-northeast-1', 'us-west-2', 'us-west-1', 'ap-southeast-1', 'ap-southeast-2']),
zone = dict(),
instance_type = dict(aliases=['type']),
image = dict(),
kernel = dict(),
count = dict(default='1'),
monitoring = dict(choices=BOOLEANS, default=False),
ramdisk = dict(),
wait = dict(choices=BOOLEANS, default=False),
wait_timeout = dict(default=300),
ec2_url = dict(aliases=['EC2_URL']),
ec2_secret_key = dict(aliases=['EC2_SECRET_KEY'], no_log=True),
ec2_access_key = dict(aliases=['EC2_ACCESS_KEY']),
placement_group = dict(),
user_data = dict(),
instance_tags = dict(),
vpc_subnet_id = dict(),
private_ip = dict(),
termination_list = dict(type='list')
)
)
ec2_url = module.params.get('ec2_url')
ec2_secret_key = module.params.get('ec2_secret_key')
ec2_access_key = module.params.get('ec2_access_key')
region = module.params.get('region')
termination_list = module.params.get('termination_list')
# allow eucarc environment variables to be used if ansible vars aren't set
if not ec2_url and 'EC2_URL' in os.environ:
ec2_url = os.environ['EC2_URL']
if not ec2_secret_key and 'EC2_SECRET_KEY' in os.environ:
ec2_secret_key = os.environ['EC2_SECRET_KEY']
if not ec2_access_key and 'EC2_ACCESS_KEY' in os.environ:
ec2_access_key = os.environ['EC2_ACCESS_KEY']
# If we have a region specified, connect to its endpoint.
if region:
try:
ec2 = boto.ec2.connect_to_region(region, aws_access_key_id=ec2_access_key, aws_secret_access_key=ec2_secret_key)
except boto.exception.NoAuthHandlerFound, e:
module.fail_json(msg = str(e))
# Otherwise, no region so we fallback to the old connection method
else:
try:
if ec2_url: # if we have an URL set, connect to the specified endpoint
ec2 = boto.connect_ec2_endpoint(ec2_url, ec2_access_key, ec2_secret_key)
else: # otherwise it's Amazon.
ec2 = boto.connect_ec2(ec2_access_key, ec2_secret_key)
except boto.exception.NoAuthHandlerFound, e:
module.fail_json(msg = str(e))
if termination_list:
if not isinstance(termination_list, list):
module.fail_json(msg='termination_list needs to be a list of instances to terminate')
(changed, instance_dict_array) = terminate_instances(module, ec2, termination_list)
else:
# Changed is always set to true when provisioning new instances
changed = True
if not module.params.get('key_name'):
module.fail_json(msg='key_name parameter is required for new instance')
if not module.params.get('image'):
module.fail_json(msg='image parameter is required for new instance')
instance_dict_array = create_instances(module, ec2)
2013-03-16 03:55:01 +01:00
module.exit_json(changed=True, instances=instance_dict_array)
2012-11-09 06:15:12 +01:00
2013-06-21 02:00:52 +02:00
2012-11-09 06:15:12 +01:00
# this is magic, see lib/ansible/module_common.py
#<<INCLUDE_ANSIBLE_MODULE_COMMON>>
main()