/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.apache.provisionr.cloudstack.activities;
import org.apache.provisionr.api.network.Network;
import org.apache.provisionr.api.pool.Pool;
import org.apache.provisionr.cloudstack.core.SecurityGroups;
import static com.google.common.base.Preconditions.checkNotNull;
import org.activiti.engine.delegate.DelegateExecution;
import org.jclouds.cloudstack.CloudStackClient;
import org.jclouds.cloudstack.domain.SecurityGroup;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
/**
* Creates a CloudStack {@link SecurityGroup} with specified rules. If a SecurityGroup with the same name exists,
* it will be deleted first.
*/
public class EnsureSecurityGroupExists extends CloudStackActivity {
private static final Logger LOG = LoggerFactory.getLogger(EnsureSecurityGroupExists.class);
@Override
public void execute(CloudStackClient cloudStackClient, Pool pool, DelegateExecution execution) {
Network network = checkNotNull(pool.getNetwork(), "Please configure a network for the pool");
String securityGroupName = SecurityGroups.formatNameFromBusinessKey(execution.getProcessBusinessKey());
SecurityGroup securityGroup;
try {
LOG.info("Creating SecurityGroup {}", securityGroupName);
securityGroup = SecurityGroups.createSecurityGroup(cloudStackClient, securityGroupName);
} catch (IllegalStateException e) {
LOG.info("Failed creating SecurityGroup {} - checking if it exists", securityGroupName);
securityGroup = SecurityGroups.getByName(cloudStackClient, securityGroupName);
LOG.info("Delete old SecurityGroup rules for {}", securityGroupName);
SecurityGroups.deleteNetworkRules(cloudStackClient, securityGroup);
}
if (securityGroup != null) {
LOG.info("Applying network rules on SecurityGroup {}", securityGroupName);
SecurityGroups.applyNetworkRules(cloudStackClient, securityGroup, network);
}
}
}