qontract-reconcile 0.10.2.dev345__py3-none-any.whl → 0.10.2.dev408__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- {qontract_reconcile-0.10.2.dev345.dist-info → qontract_reconcile-0.10.2.dev408.dist-info}/METADATA +11 -10
- {qontract_reconcile-0.10.2.dev345.dist-info → qontract_reconcile-0.10.2.dev408.dist-info}/RECORD +126 -120
- reconcile/aus/base.py +17 -14
- reconcile/automated_actions/config/integration.py +12 -0
- reconcile/aws_account_manager/integration.py +2 -2
- reconcile/aws_ami_cleanup/integration.py +6 -7
- reconcile/aws_ami_share.py +69 -62
- reconcile/aws_cloudwatch_log_retention/integration.py +155 -126
- reconcile/aws_ecr_image_pull_secrets.py +2 -2
- reconcile/aws_iam_keys.py +1 -0
- reconcile/aws_saml_idp/integration.py +7 -1
- reconcile/aws_saml_roles/integration.py +9 -3
- reconcile/change_owners/change_owners.py +1 -1
- reconcile/change_owners/diff.py +2 -4
- reconcile/checkpoint.py +11 -3
- reconcile/cli.py +33 -8
- reconcile/dashdotdb_dora.py +4 -11
- reconcile/database_access_manager.py +118 -111
- reconcile/endpoints_discovery/integration.py +4 -1
- reconcile/endpoints_discovery/merge_request_manager.py +9 -11
- reconcile/external_resources/factories.py +5 -12
- reconcile/external_resources/integration.py +1 -1
- reconcile/external_resources/manager.py +5 -3
- reconcile/external_resources/meta.py +0 -1
- reconcile/external_resources/model.py +10 -10
- reconcile/external_resources/reconciler.py +5 -2
- reconcile/external_resources/secrets_sync.py +4 -6
- reconcile/external_resources/state.py +5 -4
- reconcile/gabi_authorized_users.py +8 -5
- reconcile/gitlab_housekeeping.py +13 -15
- reconcile/gitlab_mr_sqs_consumer.py +2 -2
- reconcile/gitlab_owners.py +15 -11
- reconcile/gql_definitions/automated_actions/instance.py +41 -2
- reconcile/gql_definitions/aws_ami_cleanup/aws_accounts.py +10 -0
- reconcile/gql_definitions/aws_cloudwatch_log_retention/aws_accounts.py +22 -61
- reconcile/gql_definitions/aws_saml_idp/aws_accounts.py +10 -0
- reconcile/gql_definitions/aws_saml_roles/aws_accounts.py +10 -0
- reconcile/gql_definitions/common/aws_vpc_requests.py +10 -0
- reconcile/gql_definitions/common/clusters.py +2 -0
- reconcile/gql_definitions/external_resources/external_resources_namespaces.py +84 -1
- reconcile/gql_definitions/external_resources/external_resources_settings.py +2 -0
- reconcile/gql_definitions/fragments/aws_account_common.py +2 -0
- reconcile/gql_definitions/fragments/aws_organization.py +33 -0
- reconcile/gql_definitions/fragments/aws_vpc_request.py +2 -0
- reconcile/gql_definitions/introspection.json +3474 -1986
- reconcile/gql_definitions/jira_permissions_validator/jira_boards_for_permissions_validator.py +4 -0
- reconcile/gql_definitions/terraform_init/aws_accounts.py +14 -0
- reconcile/gql_definitions/terraform_resources/terraform_resources_namespaces.py +33 -1
- reconcile/gql_definitions/terraform_tgw_attachments/aws_accounts.py +10 -0
- reconcile/jenkins_worker_fleets.py +1 -0
- reconcile/jira_permissions_validator.py +236 -121
- reconcile/ocm/types.py +6 -0
- reconcile/openshift_base.py +47 -1
- reconcile/openshift_cluster_bots.py +2 -1
- reconcile/openshift_resources_base.py +6 -2
- reconcile/openshift_saas_deploy.py +2 -2
- reconcile/openshift_saas_deploy_trigger_cleaner.py +3 -5
- reconcile/openshift_upgrade_watcher.py +3 -3
- reconcile/queries.py +131 -0
- reconcile/saas_auto_promotions_manager/subscriber.py +4 -3
- reconcile/slack_usergroups.py +4 -3
- reconcile/sql_query.py +1 -0
- reconcile/statuspage/integrations/maintenances.py +4 -3
- reconcile/statuspage/status.py +5 -8
- reconcile/templates/rosa-classic-cluster-creation.sh.j2 +4 -0
- reconcile/templates/rosa-hcp-cluster-creation.sh.j2 +3 -0
- reconcile/templating/renderer.py +2 -1
- reconcile/terraform_aws_route53.py +7 -1
- reconcile/terraform_init/integration.py +185 -21
- reconcile/terraform_resources.py +11 -1
- reconcile/terraform_tgw_attachments.py +7 -1
- reconcile/terraform_users.py +7 -0
- reconcile/terraform_vpc_peerings.py +14 -3
- reconcile/terraform_vpc_resources/integration.py +7 -0
- reconcile/typed_queries/aws_account_tags.py +41 -0
- reconcile/typed_queries/saas_files.py +2 -2
- reconcile/utils/aggregated_list.py +4 -3
- reconcile/utils/aws_api.py +51 -20
- reconcile/utils/aws_api_typed/api.py +38 -9
- reconcile/utils/aws_api_typed/cloudformation.py +149 -0
- reconcile/utils/aws_api_typed/logs.py +73 -0
- reconcile/utils/datetime_util.py +67 -0
- reconcile/utils/differ.py +2 -3
- reconcile/utils/early_exit_cache.py +3 -2
- reconcile/utils/expiration.py +7 -3
- reconcile/utils/external_resource_spec.py +24 -1
- reconcile/utils/filtering.py +1 -1
- reconcile/utils/helm.py +2 -1
- reconcile/utils/helpers.py +1 -1
- reconcile/utils/jinja2/utils.py +4 -96
- reconcile/utils/jira_client.py +82 -63
- reconcile/utils/jjb_client.py +9 -12
- reconcile/utils/jobcontroller/controller.py +1 -1
- reconcile/utils/jobcontroller/models.py +17 -1
- reconcile/utils/json.py +32 -0
- reconcile/utils/merge_request_manager/merge_request_manager.py +3 -3
- reconcile/utils/merge_request_manager/parser.py +2 -2
- reconcile/utils/mr/app_interface_reporter.py +2 -2
- reconcile/utils/mr/base.py +2 -2
- reconcile/utils/mr/notificator.py +2 -2
- reconcile/utils/mr/update_access_report_base.py +3 -4
- reconcile/utils/oc.py +113 -95
- reconcile/utils/oc_filters.py +3 -3
- reconcile/utils/ocm/products.py +6 -0
- reconcile/utils/ocm/search_filters.py +3 -6
- reconcile/utils/ocm/service_log.py +3 -5
- reconcile/utils/openshift_resource.py +10 -5
- reconcile/utils/output.py +3 -2
- reconcile/utils/pagerduty_api.py +5 -5
- reconcile/utils/runtime/integration.py +1 -2
- reconcile/utils/runtime/runner.py +2 -2
- reconcile/utils/saasherder/models.py +2 -1
- reconcile/utils/saasherder/saasherder.py +9 -7
- reconcile/utils/slack_api.py +24 -2
- reconcile/utils/sloth.py +171 -2
- reconcile/utils/sqs_gateway.py +2 -1
- reconcile/utils/state.py +2 -1
- reconcile/utils/terraform_client.py +4 -3
- reconcile/utils/terrascript_aws_client.py +165 -111
- reconcile/utils/vault.py +1 -1
- reconcile/vault_replication.py +107 -42
- tools/app_interface_reporter.py +4 -4
- tools/cli_commands/systems_and_tools.py +5 -1
- tools/qontract_cli.py +25 -13
- {qontract_reconcile-0.10.2.dev345.dist-info → qontract_reconcile-0.10.2.dev408.dist-info}/WHEEL +0 -0
- {qontract_reconcile-0.10.2.dev345.dist-info → qontract_reconcile-0.10.2.dev408.dist-info}/entry_points.txt +0 -0
|
@@ -9,6 +9,7 @@ from typing import Any
|
|
|
9
9
|
|
|
10
10
|
from reconcile import queries
|
|
11
11
|
from reconcile.status import ExitCodes
|
|
12
|
+
from reconcile.typed_queries.external_resources import get_settings
|
|
12
13
|
from reconcile.utils import dnsutils
|
|
13
14
|
from reconcile.utils.aws_api import AWSApi
|
|
14
15
|
from reconcile.utils.constants import DEFAULT_THREAD_POOL_SIZE
|
|
@@ -227,13 +228,18 @@ def run(
|
|
|
227
228
|
f"No participating AWS accounts found, consider disabling this integration, account name: {account_name}"
|
|
228
229
|
)
|
|
229
230
|
return
|
|
230
|
-
|
|
231
|
+
try:
|
|
232
|
+
default_tags = get_settings().default_tags
|
|
233
|
+
except ValueError:
|
|
234
|
+
# no external resources settings found
|
|
235
|
+
default_tags = None
|
|
231
236
|
ts = Terrascript(
|
|
232
237
|
QONTRACT_INTEGRATION,
|
|
233
238
|
"",
|
|
234
239
|
thread_pool_size,
|
|
235
240
|
participating_accounts,
|
|
236
241
|
settings=settings,
|
|
242
|
+
default_tags=default_tags,
|
|
237
243
|
)
|
|
238
244
|
|
|
239
245
|
desired_state = build_desired_state(zones, all_accounts, settings)
|
|
@@ -1,6 +1,5 @@
|
|
|
1
1
|
import logging
|
|
2
2
|
from collections.abc import Callable
|
|
3
|
-
from datetime import UTC, datetime
|
|
4
3
|
from typing import Any
|
|
5
4
|
|
|
6
5
|
import jinja2
|
|
@@ -12,12 +11,16 @@ from reconcile.gql_definitions.terraform_init.aws_accounts import (
|
|
|
12
11
|
from reconcile.terraform_init.merge_request import Renderer, create_parser
|
|
13
12
|
from reconcile.terraform_init.merge_request_manager import MergeRequestManager, MrData
|
|
14
13
|
from reconcile.typed_queries.app_interface_repo_url import get_app_interface_repo_url
|
|
14
|
+
from reconcile.typed_queries.aws_account_tags import get_aws_account_tags
|
|
15
|
+
from reconcile.typed_queries.external_resources import get_settings
|
|
15
16
|
from reconcile.typed_queries.github_orgs import get_github_orgs
|
|
16
17
|
from reconcile.typed_queries.gitlab_instances import get_gitlab_instances
|
|
17
18
|
from reconcile.utils import gql
|
|
18
19
|
from reconcile.utils.aws_api_typed.api import AWSApi, AWSStaticCredentials
|
|
20
|
+
from reconcile.utils.datetime_util import utc_now
|
|
19
21
|
from reconcile.utils.defer import defer
|
|
20
22
|
from reconcile.utils.disabled_integrations import integration_is_enabled
|
|
23
|
+
from reconcile.utils.gql import GqlApi
|
|
21
24
|
from reconcile.utils.runtime.integration import (
|
|
22
25
|
PydanticRunParams,
|
|
23
26
|
QontractReconcileIntegration,
|
|
@@ -35,6 +38,12 @@ class TerraformInitIntegrationParams(PydanticRunParams):
|
|
|
35
38
|
# To avoid the accidental deletion of the resource file, explicitly set the
|
|
36
39
|
# qontract.cli option in the integration extraArgs!
|
|
37
40
|
state_tmpl_resource: str = "/terraform-init/terraform-state.yml"
|
|
41
|
+
cloudformation_template_resource: str = (
|
|
42
|
+
"/terraform-init/terraform-state-s3-bucket.yaml"
|
|
43
|
+
)
|
|
44
|
+
cloudformation_import_template_resource: str = (
|
|
45
|
+
"/terraform-init/terraform-state-s3-bucket-import.yaml"
|
|
46
|
+
)
|
|
38
47
|
template_collection_root_path: str = "data/templating/collections/terraform-init"
|
|
39
48
|
|
|
40
49
|
|
|
@@ -62,18 +71,28 @@ class TerraformInitIntegration(
|
|
|
62
71
|
def get_aws_accounts(
|
|
63
72
|
self, query_func: Callable, account_name: str | None = None
|
|
64
73
|
) -> list[AWSAccountV1]:
|
|
65
|
-
"""Return all AWS accounts with terraform username
|
|
74
|
+
"""Return all AWS accounts with terraform username."""
|
|
66
75
|
return [
|
|
67
76
|
account
|
|
68
77
|
for account in aws_accounts_query(query_func).accounts or []
|
|
69
78
|
if integration_is_enabled(self.name, account)
|
|
70
79
|
and (not account_name or account.name == account_name)
|
|
71
80
|
and account.terraform_username
|
|
72
|
-
and not account.terraform_state
|
|
73
81
|
]
|
|
74
82
|
|
|
83
|
+
@staticmethod
|
|
84
|
+
def get_default_tags(gql_api: GqlApi) -> dict[str, str]:
|
|
85
|
+
try:
|
|
86
|
+
return get_settings(gql_api.query).default_tags
|
|
87
|
+
except ValueError:
|
|
88
|
+
# no settings found
|
|
89
|
+
return {}
|
|
90
|
+
|
|
91
|
+
@staticmethod
|
|
75
92
|
def render_state_collection(
|
|
76
|
-
|
|
93
|
+
template: str,
|
|
94
|
+
bucket_name: str,
|
|
95
|
+
account: AWSAccountV1,
|
|
77
96
|
) -> str:
|
|
78
97
|
return jinja2.Template(
|
|
79
98
|
template,
|
|
@@ -85,24 +104,114 @@ class TerraformInitIntegration(
|
|
|
85
104
|
"account_name": account.name,
|
|
86
105
|
"bucket_name": bucket_name,
|
|
87
106
|
"region": account.resources_default_region,
|
|
88
|
-
"timestamp": int(
|
|
107
|
+
"timestamp": int(utc_now().timestamp()),
|
|
89
108
|
})
|
|
90
109
|
|
|
91
110
|
def reconcile_account(
|
|
92
111
|
self,
|
|
93
|
-
|
|
112
|
+
aws_api: AWSApi,
|
|
113
|
+
merge_request_manager: MergeRequestManager,
|
|
114
|
+
dry_run: bool,
|
|
115
|
+
account: AWSAccountV1,
|
|
116
|
+
state_template: str,
|
|
117
|
+
cloudformation_template: str,
|
|
118
|
+
cloudformation_import_template: str,
|
|
119
|
+
default_tags: dict[str, str],
|
|
120
|
+
) -> None:
|
|
121
|
+
"""
|
|
122
|
+
Reconcile the terraform state for a given account.
|
|
123
|
+
|
|
124
|
+
Create S3 bucket via CloudFormation and Merge Request to update template file on init.
|
|
125
|
+
Import existing bucket if it exists but not managed by CloudFormation.
|
|
126
|
+
Update CloudFormation stack if tags or template body differ.
|
|
127
|
+
|
|
128
|
+
CloudFormation stack name and bucket name is `terraform-<account_name>`.
|
|
129
|
+
`cloudformation_import_template` should be minimal template with identifier fields only.
|
|
130
|
+
`cloudformation_template` should be the full template.
|
|
131
|
+
Use import template to import then update stack to match full template.
|
|
132
|
+
This will ensure imported resources match CloudFormation template.
|
|
133
|
+
And all desired changes in full template are applied.
|
|
134
|
+
Both templates must have BucketName in Parameters.
|
|
135
|
+
|
|
136
|
+
Args:
|
|
137
|
+
aws_api: AWSApi: AWS API client for the target account.
|
|
138
|
+
merge_request_manager: MergeRequestManager: Manager to handle merge requests.
|
|
139
|
+
dry_run: bool: If True, do not make any changes.
|
|
140
|
+
account: AWSAccountV1: The AWS account to reconcile.
|
|
141
|
+
state_template: str: Jinja2 template for the Terraform state configuration.
|
|
142
|
+
cloudformation_template: str: CloudFormation template to create the S3 bucket.
|
|
143
|
+
cloudformation_import_template: str: CloudFormation template to import existing S3 bucket.
|
|
144
|
+
default_tags: dict[str, str]: Default tags to apply to the CloudFormation stack.
|
|
145
|
+
|
|
146
|
+
Returns:
|
|
147
|
+
None
|
|
148
|
+
"""
|
|
149
|
+
bucket_name = (
|
|
150
|
+
account.terraform_state.bucket
|
|
151
|
+
if account.terraform_state
|
|
152
|
+
else f"terraform-{account.name}"
|
|
153
|
+
)
|
|
154
|
+
|
|
155
|
+
tags = default_tags | get_aws_account_tags(account.organization)
|
|
156
|
+
|
|
157
|
+
if account.terraform_state is None:
|
|
158
|
+
return self._provision_terraform_state(
|
|
159
|
+
aws_api=aws_api,
|
|
160
|
+
merge_request_manager=merge_request_manager,
|
|
161
|
+
dry_run=dry_run,
|
|
162
|
+
account=account,
|
|
163
|
+
bucket_name=bucket_name,
|
|
164
|
+
cloudformation_template=cloudformation_template,
|
|
165
|
+
state_template=state_template,
|
|
166
|
+
tags=tags,
|
|
167
|
+
)
|
|
168
|
+
|
|
169
|
+
stack = aws_api.cloudformation.get_stack(stack_name=bucket_name)
|
|
170
|
+
|
|
171
|
+
if stack is None:
|
|
172
|
+
return self._import_cloudformation_stack(
|
|
173
|
+
aws_api=aws_api,
|
|
174
|
+
dry_run=dry_run,
|
|
175
|
+
bucket_name=bucket_name,
|
|
176
|
+
cloudformation_import_template=cloudformation_import_template,
|
|
177
|
+
cloudformation_template=cloudformation_template,
|
|
178
|
+
tags=tags,
|
|
179
|
+
)
|
|
180
|
+
|
|
181
|
+
return self._reconcile_cloudformation_stack(
|
|
182
|
+
aws_api=aws_api,
|
|
183
|
+
dry_run=dry_run,
|
|
184
|
+
bucket_name=bucket_name,
|
|
185
|
+
cloudformation_template=cloudformation_template,
|
|
186
|
+
tags=tags,
|
|
187
|
+
current_tags={tag["Key"]: tag["Value"] for tag in stack.get("Tags", [])},
|
|
188
|
+
)
|
|
189
|
+
|
|
190
|
+
def _provision_terraform_state(
|
|
191
|
+
self,
|
|
192
|
+
aws_api: AWSApi,
|
|
94
193
|
merge_request_manager: MergeRequestManager,
|
|
95
194
|
dry_run: bool,
|
|
96
|
-
state_collection: str,
|
|
97
|
-
bucket_name: str,
|
|
98
195
|
account: AWSAccountV1,
|
|
196
|
+
bucket_name: str,
|
|
197
|
+
cloudformation_template: str,
|
|
198
|
+
state_template: str,
|
|
199
|
+
tags: dict[str, str],
|
|
99
200
|
) -> None:
|
|
100
201
|
logging.info("Creating bucket '%s' for account '%s'", bucket_name, account.name)
|
|
101
202
|
if not dry_run:
|
|
102
|
-
|
|
103
|
-
|
|
104
|
-
|
|
203
|
+
aws_api.cloudformation.create_stack(
|
|
204
|
+
stack_name=bucket_name,
|
|
205
|
+
change_set_name=f"create-{bucket_name}",
|
|
206
|
+
template_body=cloudformation_template,
|
|
207
|
+
parameters={"BucketName": bucket_name},
|
|
208
|
+
tags=tags,
|
|
105
209
|
)
|
|
210
|
+
state_collection = self.render_state_collection(
|
|
211
|
+
template=state_template,
|
|
212
|
+
bucket_name=bucket_name,
|
|
213
|
+
account=account,
|
|
214
|
+
)
|
|
106
215
|
merge_request_manager.create_merge_request(
|
|
107
216
|
data=MrData(
|
|
108
217
|
account=account.name,
|
|
@@ -111,6 +220,55 @@ class TerraformInitIntegration(
|
|
|
111
220
|
)
|
|
112
221
|
)
|
|
113
222
|
|
|
223
|
+
@staticmethod
|
|
224
|
+
def _import_cloudformation_stack(
|
|
225
|
+
aws_api: AWSApi,
|
|
226
|
+
dry_run: bool,
|
|
227
|
+
bucket_name: str,
|
|
228
|
+
cloudformation_import_template: str,
|
|
229
|
+
cloudformation_template: str,
|
|
230
|
+
tags: dict[str, str],
|
|
231
|
+
) -> None:
|
|
232
|
+
logging.info("Importing existing bucket %s", bucket_name)
|
|
233
|
+
if not dry_run:
|
|
234
|
+
aws_api.cloudformation.create_stack(
|
|
235
|
+
stack_name=bucket_name,
|
|
236
|
+
change_set_name=f"import-{bucket_name}",
|
|
237
|
+
template_body=cloudformation_import_template,
|
|
238
|
+
parameters={"BucketName": bucket_name},
|
|
239
|
+
tags=tags,
|
|
240
|
+
)
|
|
241
|
+
logging.info("Syncing stack %s after import", bucket_name)
|
|
242
|
+
aws_api.cloudformation.update_stack(
|
|
243
|
+
stack_name=bucket_name,
|
|
244
|
+
template_body=cloudformation_template,
|
|
245
|
+
parameters={"BucketName": bucket_name},
|
|
246
|
+
tags=tags,
|
|
247
|
+
)
|
|
248
|
+
|
|
249
|
+
@staticmethod
|
|
250
|
+
def _reconcile_cloudformation_stack(
|
|
251
|
+
aws_api: AWSApi,
|
|
252
|
+
dry_run: bool,
|
|
253
|
+
bucket_name: str,
|
|
254
|
+
cloudformation_template: str,
|
|
255
|
+
tags: dict[str, str],
|
|
256
|
+
current_tags: dict[str, str],
|
|
257
|
+
) -> None:
|
|
258
|
+
if (
|
|
259
|
+
current_tags != tags
|
|
260
|
+
or aws_api.cloudformation.get_template_body(stack_name=bucket_name)
|
|
261
|
+
!= cloudformation_template
|
|
262
|
+
):
|
|
263
|
+
logging.info("Updating stack %s", bucket_name)
|
|
264
|
+
if not dry_run:
|
|
265
|
+
aws_api.cloudformation.update_stack(
|
|
266
|
+
stack_name=bucket_name,
|
|
267
|
+
template_body=cloudformation_template,
|
|
268
|
+
parameters={"BucketName": bucket_name},
|
|
269
|
+
tags=tags,
|
|
270
|
+
)
|
|
271
|
+
|
|
114
272
|
@defer
|
|
115
273
|
def run(self, dry_run: bool, defer: Callable | None = None) -> None:
|
|
116
274
|
"""Run the integration."""
|
|
@@ -144,6 +302,14 @@ class TerraformInitIntegration(
|
|
|
144
302
|
state_template = gql_api.get_resource(path=self.params.state_tmpl_resource)[
|
|
145
303
|
"content"
|
|
146
304
|
]
|
|
305
|
+
cloudformation_template = gql_api.get_resource(
|
|
306
|
+
path=self.params.cloudformation_template_resource
|
|
307
|
+
)["content"]
|
|
308
|
+
cloudformation_import_template = gql_api.get_resource(
|
|
309
|
+
path=self.params.cloudformation_import_template_resource
|
|
310
|
+
)["content"]
|
|
311
|
+
default_tags = self.get_default_tags(gql_api)
|
|
312
|
+
|
|
147
313
|
for account in accounts:
|
|
148
314
|
secret = self.secret_reader.read_all_secret(account.automation_token)
|
|
149
315
|
with AWSApi(
|
|
@@ -153,15 +319,13 @@ class TerraformInitIntegration(
|
|
|
153
319
|
region=account.resources_default_region,
|
|
154
320
|
)
|
|
155
321
|
) as account_aws_api:
|
|
156
|
-
bucket_name = f"terraform-{account.name}"
|
|
157
|
-
state_collection = self.render_state_collection(
|
|
158
|
-
state_template, bucket_name, account
|
|
159
|
-
)
|
|
160
322
|
self.reconcile_account(
|
|
161
|
-
account_aws_api,
|
|
162
|
-
merge_request_manager,
|
|
163
|
-
dry_run,
|
|
164
|
-
|
|
165
|
-
|
|
166
|
-
|
|
323
|
+
aws_api=account_aws_api,
|
|
324
|
+
merge_request_manager=merge_request_manager,
|
|
325
|
+
dry_run=dry_run,
|
|
326
|
+
account=account,
|
|
327
|
+
state_template=state_template,
|
|
328
|
+
cloudformation_template=cloudformation_template,
|
|
329
|
+
cloudformation_import_template=cloudformation_import_template,
|
|
330
|
+
default_tags=default_tags,
|
|
167
331
|
)
|
reconcile/terraform_resources.py
CHANGED
|
@@ -27,6 +27,7 @@ from reconcile.gql_definitions.terraform_resources.terraform_resources_namespace
|
|
|
27
27
|
from reconcile.typed_queries.app_interface_vault_settings import (
|
|
28
28
|
get_app_interface_vault_settings,
|
|
29
29
|
)
|
|
30
|
+
from reconcile.typed_queries.external_resources import get_settings
|
|
30
31
|
from reconcile.typed_queries.terraform_namespaces import get_namespaces
|
|
31
32
|
from reconcile.utils import gql
|
|
32
33
|
from reconcile.utils.aws_api import AWSApi
|
|
@@ -158,6 +159,7 @@ def init_working_dirs(
|
|
|
158
159
|
accounts: list[dict[str, Any]],
|
|
159
160
|
thread_pool_size: int,
|
|
160
161
|
settings: Mapping[str, Any] | None = None,
|
|
162
|
+
default_tags: Mapping[str, str] | None = None,
|
|
161
163
|
) -> tuple[Terrascript, dict[str, str]]:
|
|
162
164
|
ts = Terrascript(
|
|
163
165
|
QONTRACT_INTEGRATION,
|
|
@@ -165,6 +167,7 @@ def init_working_dirs(
|
|
|
165
167
|
thread_pool_size,
|
|
166
168
|
accounts,
|
|
167
169
|
settings=settings,
|
|
170
|
+
default_tags=default_tags,
|
|
168
171
|
)
|
|
169
172
|
working_dirs = ts.dump()
|
|
170
173
|
return ts, working_dirs
|
|
@@ -241,8 +244,15 @@ def setup(
|
|
|
241
244
|
secret_reader = create_secret_reader(use_vault=vault_settings.vault)
|
|
242
245
|
|
|
243
246
|
settings = queries.get_app_interface_settings() or {}
|
|
247
|
+
try:
|
|
248
|
+
default_tags = get_settings().default_tags
|
|
249
|
+
except ValueError:
|
|
250
|
+
# no external resources settings found
|
|
251
|
+
default_tags = None
|
|
244
252
|
# initialize terrascript (scripting engine to generate terraform manifests)
|
|
245
|
-
ts, working_dirs = init_working_dirs(
|
|
253
|
+
ts, working_dirs = init_working_dirs(
|
|
254
|
+
accounts, thread_pool_size, settings=settings, default_tags=default_tags
|
|
255
|
+
)
|
|
246
256
|
|
|
247
257
|
# initialize terraform client
|
|
248
258
|
# it is used to plan and apply according to the output of terrascript
|
|
@@ -32,6 +32,7 @@ from reconcile.typed_queries.app_interface_vault_settings import (
|
|
|
32
32
|
get_app_interface_vault_settings,
|
|
33
33
|
)
|
|
34
34
|
from reconcile.typed_queries.clusters_with_peering import get_clusters_with_peering
|
|
35
|
+
from reconcile.typed_queries.external_resources import get_settings
|
|
35
36
|
from reconcile.typed_queries.terraform_tgw_attachments.aws_accounts import (
|
|
36
37
|
get_aws_accounts,
|
|
37
38
|
)
|
|
@@ -444,13 +445,18 @@ def setup(
|
|
|
444
445
|
raise RuntimeError("Could not find VPC ID for cluster")
|
|
445
446
|
|
|
446
447
|
_validate_tgw_connection_names(desired_state)
|
|
447
|
-
|
|
448
|
+
try:
|
|
449
|
+
default_tags = get_settings().default_tags
|
|
450
|
+
except ValueError:
|
|
451
|
+
# no external resources settings found
|
|
452
|
+
default_tags = None
|
|
448
453
|
ts = Terrascript(
|
|
449
454
|
QONTRACT_INTEGRATION,
|
|
450
455
|
"",
|
|
451
456
|
thread_pool_size,
|
|
452
457
|
tgw_accounts,
|
|
453
458
|
settings=vault_settings.dict(by_alias=True),
|
|
459
|
+
default_tags=default_tags,
|
|
454
460
|
)
|
|
455
461
|
tgw_rosa_cluster_accounts = [
|
|
456
462
|
account_by_name[c.spec.account.name]
|
reconcile/terraform_users.py
CHANGED
|
@@ -11,6 +11,7 @@ from reconcile import (
|
|
|
11
11
|
)
|
|
12
12
|
from reconcile.change_owners.diff import IDENTIFIER_FIELD_NAME
|
|
13
13
|
from reconcile.gql_definitions.common.pgp_reencryption_settings import query
|
|
14
|
+
from reconcile.typed_queries.external_resources import get_settings
|
|
14
15
|
from reconcile.utils import (
|
|
15
16
|
expiration,
|
|
16
17
|
gql,
|
|
@@ -126,12 +127,18 @@ def setup(
|
|
|
126
127
|
participating_aws_accounts = _filter_participating_aws_accounts(accounts, roles)
|
|
127
128
|
|
|
128
129
|
settings = queries.get_app_interface_settings()
|
|
130
|
+
try:
|
|
131
|
+
default_tags = get_settings().default_tags
|
|
132
|
+
except ValueError:
|
|
133
|
+
# no external resources settings found
|
|
134
|
+
default_tags = None
|
|
129
135
|
ts = Terrascript(
|
|
130
136
|
QONTRACT_INTEGRATION,
|
|
131
137
|
QONTRACT_TF_PREFIX,
|
|
132
138
|
thread_pool_size,
|
|
133
139
|
participating_aws_accounts,
|
|
134
140
|
settings=settings,
|
|
141
|
+
default_tags=default_tags,
|
|
135
142
|
)
|
|
136
143
|
err = ts.populate_users(
|
|
137
144
|
roles,
|
|
@@ -7,6 +7,7 @@ from typing import Any, TypedDict
|
|
|
7
7
|
import reconcile.utils.terraform_client as terraform
|
|
8
8
|
import reconcile.utils.terrascript_aws_client as terrascript
|
|
9
9
|
from reconcile import queries
|
|
10
|
+
from reconcile.typed_queries import external_resources
|
|
10
11
|
from reconcile.utils import (
|
|
11
12
|
aws_api,
|
|
12
13
|
ocm,
|
|
@@ -654,8 +655,18 @@ def run(
|
|
|
654
655
|
])
|
|
655
656
|
|
|
656
657
|
account_by_name = {a["name"]: a for a in accounts}
|
|
658
|
+
try:
|
|
659
|
+
default_tags = external_resources.get_settings().default_tags
|
|
660
|
+
except ValueError:
|
|
661
|
+
# no external resources settings found
|
|
662
|
+
default_tags = None
|
|
657
663
|
with terrascript.TerrascriptClient(
|
|
658
|
-
QONTRACT_INTEGRATION,
|
|
664
|
+
QONTRACT_INTEGRATION,
|
|
665
|
+
"",
|
|
666
|
+
thread_pool_size,
|
|
667
|
+
infra_accounts,
|
|
668
|
+
settings=settings,
|
|
669
|
+
default_tags=default_tags,
|
|
659
670
|
) as ts:
|
|
660
671
|
rosa_cluster_accounts = [
|
|
661
672
|
account_by_name[c["spec"]["account"]["name"]]
|
|
@@ -664,8 +675,8 @@ def run(
|
|
|
664
675
|
]
|
|
665
676
|
ts.populate_configs(rosa_cluster_accounts)
|
|
666
677
|
|
|
667
|
-
for infra_account_name,
|
|
668
|
-
ts.populate_additional_providers(infra_account_name,
|
|
678
|
+
for infra_account_name, accounts in participating_accounts.items():
|
|
679
|
+
ts.populate_additional_providers(infra_account_name, accounts)
|
|
669
680
|
ts.populate_vpc_peerings(desired_state)
|
|
670
681
|
working_dirs = ts.dump(print_to_file=print_to_file)
|
|
671
682
|
terraform_configurations = ts.terraform_configurations()
|
|
@@ -20,6 +20,7 @@ from reconcile.typed_queries.app_interface_vault_settings import (
|
|
|
20
20
|
get_app_interface_vault_settings,
|
|
21
21
|
)
|
|
22
22
|
from reconcile.typed_queries.aws_vpc_requests import get_aws_vpc_requests
|
|
23
|
+
from reconcile.typed_queries.external_resources import get_settings
|
|
23
24
|
from reconcile.typed_queries.github_orgs import get_github_orgs
|
|
24
25
|
from reconcile.typed_queries.gitlab_instances import get_gitlab_instances
|
|
25
26
|
from reconcile.utils import gql
|
|
@@ -162,12 +163,18 @@ class TerraformVpcResources(QontractReconcileIntegration[TerraformVpcResourcesPa
|
|
|
162
163
|
sys.exit(ExitCodes.SUCCESS)
|
|
163
164
|
|
|
164
165
|
accounts_untyped: list[dict] = [acc.dict(by_alias=True) for acc in accounts]
|
|
166
|
+
try:
|
|
167
|
+
default_tags = get_settings().default_tags
|
|
168
|
+
except ValueError:
|
|
169
|
+
# no external resources settings found
|
|
170
|
+
default_tags = None
|
|
165
171
|
with TerrascriptClient(
|
|
166
172
|
integration=QONTRACT_INTEGRATION,
|
|
167
173
|
integration_prefix=QONTRACT_TF_PREFIX,
|
|
168
174
|
thread_pool_size=thread_pool_size,
|
|
169
175
|
accounts=accounts_untyped,
|
|
170
176
|
secret_reader=secret_reader,
|
|
177
|
+
default_tags=default_tags,
|
|
171
178
|
) as ts_client:
|
|
172
179
|
ts_client.populate_vpc_requests(data, AWS_PROVIDER_VERSION)
|
|
173
180
|
|
|
@@ -0,0 +1,41 @@
|
|
|
1
|
+
import json
|
|
2
|
+
from collections.abc import Mapping
|
|
3
|
+
|
|
4
|
+
from reconcile.gql_definitions.fragments.aws_organization import (
|
|
5
|
+
AWSOrganization,
|
|
6
|
+
)
|
|
7
|
+
|
|
8
|
+
|
|
9
|
+
def get_aws_account_tags(
|
|
10
|
+
organization: AWSOrganization | Mapping | None,
|
|
11
|
+
) -> dict[str, str]:
|
|
12
|
+
"""
|
|
13
|
+
Get AWS account tags by merging payer account tags
|
|
14
|
+
|
|
15
|
+
Args:
|
|
16
|
+
organization: AWSOrganization | Mapping | None - The organization object from which to extract tags.
|
|
17
|
+
|
|
18
|
+
Returns:
|
|
19
|
+
dict[str, str]: A dictionary containing the merged tags from the payer account and the account itself.
|
|
20
|
+
"""
|
|
21
|
+
if organization is None:
|
|
22
|
+
return {}
|
|
23
|
+
|
|
24
|
+
match organization:
|
|
25
|
+
case AWSOrganization():
|
|
26
|
+
payer_account_tags = (
|
|
27
|
+
organization.payer_account.organization_account_tags or {}
|
|
28
|
+
)
|
|
29
|
+
account_tags = organization.tags or {}
|
|
30
|
+
case Mapping():
|
|
31
|
+
payer_account_tags = organization.get("payerAccount", {}).get(
|
|
32
|
+
"organizationAccountTags", {}
|
|
33
|
+
)
|
|
34
|
+
if isinstance(payer_account_tags, str):
|
|
35
|
+
payer_account_tags = json.loads(payer_account_tags)
|
|
36
|
+
|
|
37
|
+
account_tags = organization.get("tags", {})
|
|
38
|
+
if isinstance(account_tags, str):
|
|
39
|
+
account_tags = json.loads(account_tags)
|
|
40
|
+
|
|
41
|
+
return payer_account_tags | account_tags
|
|
@@ -1,5 +1,4 @@
|
|
|
1
1
|
import hashlib
|
|
2
|
-
import json
|
|
3
2
|
from collections.abc import Callable
|
|
4
3
|
from threading import Lock
|
|
5
4
|
from typing import Any
|
|
@@ -48,6 +47,7 @@ from reconcile.utils.exceptions import (
|
|
|
48
47
|
AppInterfaceSettingsError,
|
|
49
48
|
ParameterError,
|
|
50
49
|
)
|
|
50
|
+
from reconcile.utils.json import json_dumps
|
|
51
51
|
from reconcile.utils.jsonpath import parse_jsonpath
|
|
52
52
|
|
|
53
53
|
|
|
@@ -302,7 +302,7 @@ def convert_parameters_to_json_string(root: dict[str, Any]) -> dict[str, Any]:
|
|
|
302
302
|
"""Find all parameter occurrences and convert them to a json string."""
|
|
303
303
|
for key, value in root.items():
|
|
304
304
|
if key in {"parameters", "labels"}:
|
|
305
|
-
root[key] =
|
|
305
|
+
root[key] = json_dumps(value) if value is not None else None
|
|
306
306
|
elif isinstance(value, dict):
|
|
307
307
|
root[key] = convert_parameters_to_json_string(value)
|
|
308
308
|
elif isinstance(value, list):
|
|
@@ -1,8 +1,9 @@
|
|
|
1
|
-
import json
|
|
2
1
|
import logging
|
|
3
2
|
from collections.abc import Callable, KeysView
|
|
4
3
|
from typing import Any, TypedDict
|
|
5
4
|
|
|
5
|
+
from reconcile.utils.json import json_dumps
|
|
6
|
+
|
|
6
7
|
Action = Callable[[Any, list[Any]], bool]
|
|
7
8
|
Cond = Callable[[Any], bool]
|
|
8
9
|
|
|
@@ -89,11 +90,11 @@ class AggregatedList:
|
|
|
89
90
|
return list(self._dict.values())
|
|
90
91
|
|
|
91
92
|
def to_json(self) -> str:
|
|
92
|
-
return
|
|
93
|
+
return json_dumps(self.dump(), indent=4)
|
|
93
94
|
|
|
94
95
|
@staticmethod
|
|
95
96
|
def hash_params(params: Any) -> int:
|
|
96
|
-
return hash(
|
|
97
|
+
return hash(json_dumps(params))
|
|
97
98
|
|
|
98
99
|
|
|
99
100
|
class AggregatedDiffRunner:
|
reconcile/utils/aws_api.py
CHANGED
|
@@ -3,7 +3,6 @@ from __future__ import annotations
|
|
|
3
3
|
import logging
|
|
4
4
|
import operator
|
|
5
5
|
import os
|
|
6
|
-
import re
|
|
7
6
|
from functools import lru_cache
|
|
8
7
|
from threading import Lock
|
|
9
8
|
from typing import (
|
|
@@ -25,6 +24,7 @@ import reconcile.utils.lean_terraform_client as terraform
|
|
|
25
24
|
from reconcile.utils.secret_reader import SecretReader, SecretReaderBase
|
|
26
25
|
|
|
27
26
|
if TYPE_CHECKING:
|
|
27
|
+
import re
|
|
28
28
|
from collections.abc import (
|
|
29
29
|
Iterable,
|
|
30
30
|
Iterator,
|
|
@@ -1074,28 +1074,40 @@ class AWSApi:
|
|
|
1074
1074
|
return [rt["RouteTableId"] for rt in vpc_route_tables]
|
|
1075
1075
|
|
|
1076
1076
|
@staticmethod
|
|
1077
|
-
def
|
|
1078
|
-
|
|
1079
|
-
) -> list[dict[str, Any]]:
|
|
1080
|
-
results = []
|
|
1081
|
-
pattern = re.compile(regex)
|
|
1082
|
-
for i in images:
|
|
1083
|
-
if not re.search(pattern, i["Name"]):
|
|
1084
|
-
continue
|
|
1085
|
-
if i["State"] != "available":
|
|
1086
|
-
continue
|
|
1087
|
-
item = {"image_id": i["ImageId"], "tags": i.get("Tags", [])}
|
|
1088
|
-
results.append(item)
|
|
1077
|
+
def normalize_tags(tags: Iterable[TagTypeDef]) -> dict[str, str]:
|
|
1078
|
+
return {tag["Key"]: tag["Value"] for tag in tags}
|
|
1089
1079
|
|
|
1090
|
-
|
|
1080
|
+
@staticmethod
|
|
1081
|
+
def _filter_amis(
|
|
1082
|
+
images: Iterable[ImageTypeDef],
|
|
1083
|
+
regex: re.Pattern,
|
|
1084
|
+
) -> dict[str, dict[str, str]]:
|
|
1085
|
+
return {
|
|
1086
|
+
image["ImageId"]: AWSApi.normalize_tags(image.get("Tags", []))
|
|
1087
|
+
for image in images
|
|
1088
|
+
if regex.search(image["Name"]) and image["State"] == "available"
|
|
1089
|
+
}
|
|
1091
1090
|
|
|
1092
1091
|
def get_amis_details(
|
|
1093
1092
|
self,
|
|
1094
1093
|
account: Mapping[str, Any],
|
|
1095
1094
|
owner_account: Mapping[str, Any],
|
|
1096
|
-
regex:
|
|
1095
|
+
regex: re.Pattern,
|
|
1097
1096
|
region: str | None = None,
|
|
1098
|
-
) ->
|
|
1097
|
+
) -> dict[str, dict[str, str]]:
|
|
1098
|
+
"""
|
|
1099
|
+
Get AMI details for an account, find AMI name matches regex and state is available.
|
|
1100
|
+
Return ImageId and normalized tags.
|
|
1101
|
+
|
|
1102
|
+
Args:
|
|
1103
|
+
account: AWS account
|
|
1104
|
+
owner_account: AMI owner AWS account uid
|
|
1105
|
+
regex: regex to filter AMI name
|
|
1106
|
+
region: AWS account region
|
|
1107
|
+
|
|
1108
|
+
Returns:
|
|
1109
|
+
dict[str, dict[str, str]]: Key is AMI ImageId, value is AMI normalized tags.
|
|
1110
|
+
"""
|
|
1099
1111
|
ec2 = self._account_ec2_client(account["name"], region_name=region)
|
|
1100
1112
|
images = self.get_account_amis(ec2, owner=owner_account["uid"])
|
|
1101
1113
|
return self._filter_amis(images, regex)
|
|
@@ -1175,12 +1187,31 @@ class AWSApi:
|
|
|
1175
1187
|
client = self._account_cloudwatch_client(account_name, region_name=region_name)
|
|
1176
1188
|
client.delete_log_group(logGroupName=group_name)
|
|
1177
1189
|
|
|
1178
|
-
def
|
|
1179
|
-
self,
|
|
1190
|
+
def create_tags(
|
|
1191
|
+
self,
|
|
1192
|
+
account: Mapping[str, Any],
|
|
1193
|
+
resource_id: str,
|
|
1194
|
+
tags: Mapping[str, str],
|
|
1180
1195
|
) -> None:
|
|
1196
|
+
"""
|
|
1197
|
+
Create tags on EC2 resources (AMI)
|
|
1198
|
+
|
|
1199
|
+
Args:
|
|
1200
|
+
account: AWS account
|
|
1201
|
+
resource_id: AWS resource id
|
|
1202
|
+
tags: tags to update
|
|
1203
|
+
|
|
1204
|
+
Returns:
|
|
1205
|
+
None
|
|
1206
|
+
"""
|
|
1181
1207
|
ec2 = self._account_ec2_client(account["name"])
|
|
1182
|
-
|
|
1183
|
-
|
|
1208
|
+
formatted_tags: list[TagTypeDef] = [
|
|
1209
|
+
{"Key": k, "Value": v} for k, v in tags.items()
|
|
1210
|
+
]
|
|
1211
|
+
ec2.create_tags(
|
|
1212
|
+
Resources=[resource_id],
|
|
1213
|
+
Tags=formatted_tags,
|
|
1214
|
+
)
|
|
1184
1215
|
|
|
1185
1216
|
def get_alb_network_interface_ips(
|
|
1186
1217
|
self, account: awsh.Account, service_name: str
|