majuna/app/terraform/proxy/cloudfront.py

173 lines
6 KiB
Python
Raw Normal View History

2022-03-10 14:26:22 +00:00
import datetime
2022-05-16 11:44:03 +01:00
from typing import Any
2022-03-10 14:26:22 +00:00
from app.extensions import db
2022-04-22 14:01:16 +01:00
from app.models.mirrors import Proxy
from app.terraform.proxy import ProxyAutomation, update_smart_proxy_instance
2022-03-10 14:26:22 +00:00
class ProxyCloudfrontAutomation(ProxyAutomation):
short_name = "proxy_cloudfront"
description = "Deploy proxies to AWS CloudFront"
2022-03-10 14:26:22 +00:00
provider = "cloudfront"
smart_proxies = True
cloud_name = "aws"
2022-03-10 14:26:22 +00:00
template_parameters = [
"aws_access_key",
"aws_secret_key",
"rfc2136_nameserver",
"rfc2136_tsig_key",
"rfc2136_tsig_secret",
2022-08-12 11:55:14 +01:00
"smart_zone",
"maxmind_account_id",
"maxmind_license_key"
2022-03-10 14:26:22 +00:00
]
template = """
terraform {
{{ backend_config }}
2022-03-10 14:26:22 +00:00
required_providers {
acme = {
source = "vancluever/acme"
version = "~> 2.8.0"
}
2022-03-10 14:26:22 +00:00
aws = {
version = "~> 4.4.0"
}
dns = {
version = "~> 3.2.3"
}
2022-03-10 14:26:22 +00:00
}
}
2022-05-16 13:29:48 +01:00
provider "acme" {
server_url = "https://acme-v02.api.letsencrypt.org/directory"
}
2022-03-10 14:26:22 +00:00
provider "aws" {
access_key = "{{ aws_access_key }}"
secret_key = "{{ aws_secret_key }}"
region = "us-east-2"
2022-03-10 14:26:22 +00:00
}
2022-05-16 13:29:48 +01:00
provider "dns" {
update {
server = local.rfc2136_nameserver
key_name = local.rfc2136_tsig_key
key_secret = local.rfc2136_tsig_secret
key_algorithm = "hmac-sha512"
2022-08-12 11:55:14 +01:00
timeout = "60s"
}
}
locals {
rfc2136_nameserver = "{{ rfc2136_nameserver }}"
rfc2136_tsig_key = "{{ rfc2136_tsig_key }}"
rfc2136_tsig_secret = "{{ rfc2136_tsig_secret }}"
smart_zone = "{{ smart_zone }}"
}
2022-03-10 14:26:22 +00:00
{% for group in groups %}
module "label_{{ group.id }}" {
source = "cloudposse/label/null"
version = "0.25.0"
namespace = "{{ global_namespace }}"
tenant = "{{ group.group_name }}"
label_order = ["namespace", "tenant", "name", "attributes"]
}
2022-05-16 13:29:48 +01:00
2022-03-10 14:26:22 +00:00
module "log_bucket_{{ group.id }}" {
source = "cloudposse/s3-log-storage/aws"
version = "0.28.0"
context = module.label_{{ group.id }}.context
name = "logs"
attributes = ["cloudfront"]
acl = "log-delivery-write"
standard_transition_days = 30
glacier_transition_days = 60
expiration_days = 90
}
2022-05-16 13:29:48 +01:00
2022-03-10 14:26:22 +00:00
resource "aws_sns_topic" "alarms_{{ group.id }}" {
name = "${module.label_{{ group.id }}.id}-cloudfront-alarms"
}
{% for origin in group.origins | selectattr("destroyed", "none") | selectattr("smart") %}
{% if loop.first %}
module "smart_proxy_{{ group.id }}" {
source = "{{ terraform_modules_path }}/terraform-aws-bc-smart-proxy-instance"
context = module.label_{{ group.id }}.context
name = "smart-proxy"
disable_api_termination = false
domain_name = "cloudfront.smart.${local.smart_zone}"
rfc2136_nameserver = local.rfc2136_nameserver
rfc2136_tsig_key = local.rfc2136_tsig_key
rfc2136_tsig_secret = local.rfc2136_tsig_secret
2022-08-12 11:55:14 +01:00
maxmind_account_id = "{{ maxmind_account_id }}"
maxmind_license_key = "{{ maxmind_license_key }}"
}
resource "aws_s3_object" "smart_config_{{ group.id }}" {
bucket = module.smart_proxy_{{ group.id }}.config_bucket_name
key = "default"
source = "smart_proxy.{{ group.id }}.conf"
etag = filemd5("smart_proxy.{{ group.id }}.conf")
}
{% endif %}
resource "dns_a_record_set" "smart_dns_{{ origin.id }}" {
zone = "{{ smart_zone }}"
name = "origin-{{ origin.id }}.cloudfront.smart"
addresses = module.smart_proxy_{{ origin.group.id }}.ip_addresses
ttl = 60
}
{% endfor %}
2022-03-10 14:26:22 +00:00
{% endfor %}
2022-05-16 13:29:48 +01:00
2022-03-10 14:26:22 +00:00
{% for proxy in proxies %}
module "cloudfront_{{ proxy.id }}" {
source = "{{ terraform_modules_path }}/terraform-aws-bc-proxy"
{% if proxy.origin.smart %}
origin_domain = "origin-{{ proxy.origin.id }}.cloudfront.smart.{{ smart_zone[:-1] }}"
{% else %}
2022-03-10 14:26:22 +00:00
origin_domain = "{{ proxy.origin.domain_name }}"
{% endif %}
2022-03-10 14:26:22 +00:00
logging_bucket = module.log_bucket_{{ proxy.origin.group.id }}.bucket_domain_name
sns_topic_arn = aws_sns_topic.alarms_{{ proxy.origin.group.id }}.arn
low_bandwidth_alarm = false
context = module.label_{{ proxy.origin.group.id }}.context
name = "proxy"
attributes = ["{{ proxy.origin.domain_name }}"]
2022-04-19 14:32:04 +01:00
bypass_token = "{{ bypass_token }}"
2022-03-10 14:26:22 +00:00
}
{% endfor %}
"""
2022-05-16 11:44:03 +01:00
def import_state(self, state: Any) -> None:
if not isinstance(state, dict):
2022-05-16 12:47:40 +01:00
raise RuntimeError("The Terraform state object returned was not a dict.")
2022-05-16 11:44:03 +01:00
if "child_modules" not in state['values']['root_module']:
# There are no CloudFront proxies deployed to import state for
return
2022-06-23 12:34:29 +01:00
# CloudFront distributions (proxies)
for mod in state['values']['root_module']['child_modules']:
if mod['address'].startswith('module.cloudfront_'):
for res in mod['resources']:
if res['address'].endswith('aws_cloudfront_distribution.this'):
proxy = Proxy.query.filter(Proxy.id == mod['address'][len('module.cloudfront_'):]).first()
proxy.url = "https://" + res['values']['domain_name']
proxy.slug = res['values']['id']
proxy.terraform_updated = datetime.datetime.utcnow()
break
2022-06-23 12:34:29 +01:00
# EC2 instances (smart proxies)
for g in state["values"]["root_module"]["child_modules"]:
if g["address"].startswith("module.smart_proxy_"):
group_id = int(g["address"][len("module.smart_proxy_"):])
for s in g["child_modules"]:
if s["address"].endswith(".module.instance"):
for x in s["resources"]:
if x["address"].endswith(".module.instance.aws_instance.default[0]"):
update_smart_proxy_instance(group_id, self.provider, "us-east-2", x['values']['id'])
db.session.commit()