2017-05-05 10:23:00 +02:00
|
|
|
"""AWS plugin for integration tests."""
|
2019-07-12 08:46:20 +02:00
|
|
|
from __future__ import (absolute_import, division, print_function)
|
|
|
|
__metaclass__ = type
|
2017-05-05 10:23:00 +02:00
|
|
|
|
|
|
|
import os
|
|
|
|
|
2019-08-06 23:43:29 +02:00
|
|
|
from ..util import (
|
2017-05-05 10:23:00 +02:00
|
|
|
ApplicationError,
|
|
|
|
display,
|
2019-03-01 03:25:49 +01:00
|
|
|
ConfigParser,
|
2017-05-05 10:23:00 +02:00
|
|
|
)
|
|
|
|
|
2019-08-06 23:43:29 +02:00
|
|
|
from . import (
|
2017-05-05 10:23:00 +02:00
|
|
|
CloudProvider,
|
|
|
|
CloudEnvironment,
|
2019-03-01 03:25:49 +01:00
|
|
|
CloudEnvironmentConfig,
|
2017-05-05 10:23:00 +02:00
|
|
|
)
|
|
|
|
|
2019-08-06 23:43:29 +02:00
|
|
|
from ..core_ci import (
|
2017-05-05 10:23:00 +02:00
|
|
|
AnsibleCoreCI,
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
class AwsCloudProvider(CloudProvider):
|
|
|
|
"""AWS cloud provider plugin. Sets up cloud resources before delegation."""
|
|
|
|
def filter(self, targets, exclude):
|
|
|
|
"""Filter out the cloud tests when the necessary config and resources are not available.
|
|
|
|
:type targets: tuple[TestTarget]
|
|
|
|
:type exclude: list[str]
|
|
|
|
"""
|
|
|
|
if os.path.isfile(self.config_static_path):
|
|
|
|
return
|
|
|
|
|
|
|
|
aci = self._create_ansible_core_ci()
|
|
|
|
|
2020-04-26 03:55:39 +02:00
|
|
|
if aci.available:
|
2017-05-05 10:23:00 +02:00
|
|
|
return
|
|
|
|
|
|
|
|
super(AwsCloudProvider, self).filter(targets, exclude)
|
|
|
|
|
|
|
|
def setup(self):
|
|
|
|
"""Setup the cloud resource before delegation and register a cleanup callback."""
|
|
|
|
super(AwsCloudProvider, self).setup()
|
|
|
|
|
|
|
|
aws_config_path = os.path.expanduser('~/.aws')
|
|
|
|
|
|
|
|
if os.path.exists(aws_config_path) and not self.args.docker and not self.args.remote:
|
|
|
|
raise ApplicationError('Rename "%s" or use the --docker or --remote option to isolate tests.' % aws_config_path)
|
|
|
|
|
|
|
|
if not self._use_static_config():
|
|
|
|
self._setup_dynamic()
|
|
|
|
|
|
|
|
def _setup_dynamic(self):
|
|
|
|
"""Request AWS credentials through the Ansible Core CI service."""
|
|
|
|
display.info('Provisioning %s cloud environment.' % self.platform, verbosity=1)
|
|
|
|
|
|
|
|
config = self._read_config_template()
|
|
|
|
|
|
|
|
aci = self._create_ansible_core_ci()
|
|
|
|
|
2017-05-05 12:18:40 +02:00
|
|
|
response = aci.start()
|
2017-05-05 10:23:00 +02:00
|
|
|
|
|
|
|
if not self.args.explain:
|
|
|
|
credentials = response['aws']['credentials']
|
|
|
|
|
|
|
|
values = dict(
|
|
|
|
ACCESS_KEY=credentials['access_key'],
|
|
|
|
SECRET_KEY=credentials['secret_key'],
|
|
|
|
SECURITY_TOKEN=credentials['session_token'],
|
2017-09-22 09:19:21 +02:00
|
|
|
REGION='us-east-1',
|
2017-05-05 10:23:00 +02:00
|
|
|
)
|
|
|
|
|
2019-09-17 04:15:04 +02:00
|
|
|
display.sensitive.add(values['SECRET_KEY'])
|
|
|
|
display.sensitive.add(values['SECURITY_TOKEN'])
|
|
|
|
|
2017-05-05 10:23:00 +02:00
|
|
|
config = self._populate_config_template(config, values)
|
|
|
|
|
|
|
|
self._write_config(config)
|
|
|
|
|
|
|
|
def _create_ansible_core_ci(self):
|
|
|
|
"""
|
|
|
|
:rtype: AnsibleCoreCI
|
|
|
|
"""
|
2021-01-13 01:18:28 +01:00
|
|
|
return AnsibleCoreCI(self.args, 'aws', 'aws', persist=False, stage=self.args.remote_stage, provider='aws', internal=True)
|
2017-05-05 10:23:00 +02:00
|
|
|
|
|
|
|
|
|
|
|
class AwsCloudEnvironment(CloudEnvironment):
|
|
|
|
"""AWS cloud environment plugin. Updates integration test environment after delegation."""
|
2019-03-01 03:25:49 +01:00
|
|
|
def get_environment_config(self):
|
2017-05-05 10:23:00 +02:00
|
|
|
"""
|
2019-03-01 03:25:49 +01:00
|
|
|
:rtype: CloudEnvironmentConfig
|
2017-05-05 10:23:00 +02:00
|
|
|
"""
|
2019-03-01 03:25:49 +01:00
|
|
|
parser = ConfigParser()
|
|
|
|
parser.read(self.config_path)
|
2017-05-05 10:23:00 +02:00
|
|
|
|
2019-03-01 03:25:49 +01:00
|
|
|
ansible_vars = dict(
|
|
|
|
resource_prefix=self.resource_prefix,
|
|
|
|
)
|
|
|
|
|
|
|
|
ansible_vars.update(dict(parser.items('default')))
|
|
|
|
|
2019-09-17 04:15:04 +02:00
|
|
|
display.sensitive.add(ansible_vars.get('aws_secret_key'))
|
|
|
|
display.sensitive.add(ansible_vars.get('security_token'))
|
|
|
|
|
2019-05-10 20:43:15 +02:00
|
|
|
if 'aws_cleanup' not in ansible_vars:
|
|
|
|
ansible_vars['aws_cleanup'] = not self.managed
|
|
|
|
|
2019-03-18 14:29:03 +01:00
|
|
|
env_vars = {'ANSIBLE_DEBUG_BOTOCORE_LOGS': 'True'}
|
|
|
|
|
2019-03-01 03:25:49 +01:00
|
|
|
return CloudEnvironmentConfig(
|
2019-03-18 14:29:03 +01:00
|
|
|
env_vars=env_vars,
|
2019-03-01 03:25:49 +01:00
|
|
|
ansible_vars=ansible_vars,
|
2019-03-18 14:29:03 +01:00
|
|
|
callback_plugins=['aws_resource_actions'],
|
2019-03-01 03:25:49 +01:00
|
|
|
)
|
2017-05-05 10:23:00 +02:00
|
|
|
|
|
|
|
def on_failure(self, target, tries):
|
|
|
|
"""
|
|
|
|
:type target: TestTarget
|
|
|
|
:type tries: int
|
|
|
|
"""
|
|
|
|
if not tries and self.managed:
|
|
|
|
display.notice('If %s failed due to permissions, the IAM test policy may need to be updated. '
|
2020-02-24 19:56:58 +01:00
|
|
|
'https://docs.ansible.com/ansible/devel/dev_guide/platforms/aws_guidelines.html#aws-permissions-for-integration-tests.'
|
|
|
|
% target.name)
|