ec2.describeSecurityGroups(securityGroupsRequest); return true;
.withGroupNames( Collections.singletonList(config.getACLGroupName())); DescribeSecurityGroupsResult result = client.describeSecurityGroups(req); for (SecurityGroup group : result.getSecurityGroups()) for (IpPermission perm : group.getIpPermissions()) DescribeSecurityGroupsRequest req = new DescribeSecurityGroupsRequest().withFilters(nameFilter, vpcFilter); DescribeSecurityGroupsResult result = client.describeSecurityGroups(req); for (SecurityGroup group : result.getSecurityGroups()) for (IpPermission perm : group.getIpPermissions())
protected String getVpcGoupId() { AmazonEC2 client = null; try { client = getEc2Client(); Filter nameFilter = new Filter().withName("group-name").withValues(config.getACLGroupName()); // SG Filter vpcFilter = new Filter().withName("vpc-id").withValues(instanceInfo.getVpcId()); DescribeSecurityGroupsRequest req = new DescribeSecurityGroupsRequest().withFilters(nameFilter, vpcFilter); DescribeSecurityGroupsResult result = client.describeSecurityGroups(req); for (SecurityGroup group : result.getSecurityGroups()) { logger.debug( "got group-id:{} for group-name:{},vpc-id:{}", group.getGroupId(), config.getACLGroupName(), instanceInfo.getVpcId()); return group.getGroupId(); } logger.error( "unable to get group-id for group-name={} vpc-id={}", config.getACLGroupName(), instanceInfo.getVpcId()); return ""; } finally { if (client != null) client.shutdown(); } }
/** * * @param groupIds * @param ec2Client * @return */ public List<SecurityGroup> getSecurityGroups(List<String> groupIds, AmazonEC2 ec2Client) { DescribeSecurityGroupsRequest request = new DescribeSecurityGroupsRequest(); if (groupIds != null && !groupIds.isEmpty()) { request = request.withGroupIds(groupIds); } DescribeSecurityGroupsResult result = ec2Client.describeSecurityGroups(request); return result.getSecurityGroups(); }
ec2.describeSecurityGroups(securityGroupsRequest); return true;
/** * * @param name * @param ec2Client * @return */ public SecurityGroup getSecurityGroupForName(String name, AmazonEC2 ec2Client) { SecurityGroup group = null; try { DescribeSecurityGroupsRequest request = new DescribeSecurityGroupsRequest() .withGroupNames(name); DescribeSecurityGroupsResult result = ec2Client.describeSecurityGroups(request); if (result != null && result.getSecurityGroups() != null) { group = result.getSecurityGroups().get(0); } } catch (AmazonServiceException e) { log.warn("Could not find Security Group with name " + name, e); if (!e.getErrorCode().equals("InvalidGroup.NotFound")) { throw e; } } return group; }
private DescribeSecurityGroupsResult getSecurityGroupsBy(String filterName, Set<String> filterValues, AmazonEC2 ec2) { DescribeSecurityGroupsRequest groupReq = new DescribeSecurityGroupsRequest(); groupReq.withFilters(new Filter(filterName).withValues(filterValues)); return ec2.describeSecurityGroups(groupReq); }
private DescribeSecurityGroupsResult getSecurityGroupsBy(String filterName, Set<String> filterValues, AmazonEC2 ec2) { DescribeSecurityGroupsRequest group_req = new DescribeSecurityGroupsRequest(); group_req.withFilters(new Filter(filterName).withValues(filterValues)); return ec2.describeSecurityGroups(group_req); }
if(!skipRegions.contains(region.getName())){ ec2Client = AmazonEC2ClientBuilder.standard().withCredentials(new AWSStaticCredentialsProvider(temporaryCredentials)).withRegion(region.getName()).build(); DescribeSecurityGroupsResult rslt = ec2Client.describeSecurityGroups(); List<SecurityGroup> secGrpListTemp = rslt.getSecurityGroups(); if( !secGrpListTemp.isEmpty() ) {
/** * This will return the owner id of the given connection to EC2 by describing the "default" * security group. This is the only reliable way of getting the owner id since there is * no way to describe the value in the SDK * * @param ec2Client * @return ownerId - the ID of the current user (as determined by the credentials the * ec2Client was made with) */ public String getCurrentOwnerId(AmazonEC2 ec2Client) { String ownerId = null; DescribeSecurityGroupsRequest request = new DescribeSecurityGroupsRequest() .withGroupNames("default"); DescribeSecurityGroupsResult result = ec2Client.describeSecurityGroups(request); if (result != null) { // there should always be a "default" security group if there is a vpc, but there may not be a vpc if (result.getSecurityGroups() != null) { ownerId = result.getSecurityGroups().get(0).getOwnerId(); } } return ownerId; }
/** * Generates a list of security groups to add to the load balancer in addition to those on the source load balancer * * @param sourceDescription the AWS description of the source load balancer * @param result the result set for the load balancer migration - this will potentially be mutated as a side effect * @return a list security group ids that should be added to the load balancer */ protected List<String> buildExtraSecurityGroups(LoadBalancerDescription sourceDescription, MigrateLoadBalancerResult result) { ArrayList<String> newGroups = new ArrayList<>(); if (target.getVpcId() != null) { AmazonEC2 targetAmazonEC2 = getAmazonClientProvider().getAmazonEC2(target.getCredentials(), target.getRegion(), true); List<SecurityGroup> appGroups = new ArrayList<>(); try { List<String> groupNames = Arrays.asList(applicationName, applicationName + "-elb"); appGroups = targetAmazonEC2.describeSecurityGroups(new DescribeSecurityGroupsRequest().withFilters( new Filter("group-name", groupNames))).getSecurityGroups(); } catch (Exception ignored) { } String elbGroupId = buildElbSecurityGroup(sourceDescription, appGroups, result); newGroups.add(elbGroupId); } return newGroups; }
request.withGroupNames(DEFAULT_SECURITY_GROUP_NAME); DescribeSecurityGroupsResult result = ec2.describeSecurityGroups(request);
ec2.describeSecurityGroups(new DescribeSecurityGroupsRequest().withGroupIds(securityGroup));
Map<String, String> groupNamesToIds = ec2.describeSecurityGroups( new DescribeSecurityGroupsRequest() .withFilters(
/** * List SG ACL's */ public List<String> listACL(int from, int to) { AmazonEC2 client = null; try { client = getEc2Client(); List<String> ipPermissions = new ArrayList<String>(); DescribeSecurityGroupsRequest req = new DescribeSecurityGroupsRequest().withGroupNames(Arrays.asList(config.getACLGroupName())); DescribeSecurityGroupsResult result = client.describeSecurityGroups(req); for (SecurityGroup group : result.getSecurityGroups()) { for (IpPermission perm : group.getIpPermissions()) { if (perm.getFromPort() == from && perm.getToPort() == to) { ipPermissions.addAll(perm.getIpRanges()); } } } return ipPermissions; } finally { if (client != null) client.shutdown(); } }
/** * List SG ACL's */ public List<String> listACL(int from, int to) { AmazonEC2 client = null; try { client = getEc2Client(); List<String> ipPermissions = new ArrayList<String>(); Filter nameFilter = new Filter().withName("group-name").withValues(envVariables.getDynomiteClusterName()); String vpcid = retriever.getVpcId(); if (vpcid == null || vpcid.isEmpty()) { throw new IllegalStateException("vpcid is null even though instance is running in vpc."); } Filter vpcFilter = new Filter().withName("vpc-id").withValues(vpcid); DescribeSecurityGroupsRequest req = new DescribeSecurityGroupsRequest().withFilters(nameFilter, vpcFilter); DescribeSecurityGroupsResult result = client.describeSecurityGroups(req); for (SecurityGroup group : result.getSecurityGroups()) for (IpPermission perm : group.getIpPermissions()) if (perm.getFromPort() == from && perm.getToPort() == to) ipPermissions.addAll(perm.getIpRanges()); logger.info("Fetch current permissions for vpc env of running instance"); return ipPermissions; } finally { if (client != null) client.shutdown(); } }
protected String getVpcGroupId() { AmazonEC2 client = null; try { client = getEc2Client(); Filter nameFilter = new Filter().withName("group-name").withValues(envVariables.getDynomiteClusterName()); // SG Filter vpcFilter = new Filter().withName("vpc-id").withValues(retriever.getVpcId()); logger.info("Dynomite name: " + envVariables.getDynomiteClusterName()); DescribeSecurityGroupsRequest req = new DescribeSecurityGroupsRequest().withFilters(nameFilter, vpcFilter); DescribeSecurityGroupsResult result = client.describeSecurityGroups(req); for (SecurityGroup group : result.getSecurityGroups()) { logger.debug(String.format("got group-id:%s for group-name:%s,vpc-id:%s", group.getGroupId(), envVariables.getDynomiteClusterName(), retriever.getVpcId())); return group.getGroupId(); } logger.error(String.format("unable to get group-id for group-name=%s vpc-id=%s", envVariables.getDynomiteClusterName(), retriever.getVpcId())); return ""; } finally { if (client != null) client.shutdown(); } }
o -> appGroups.addAll(targetAmazonEC2.describeSecurityGroups( new DescribeSecurityGroupsRequest().withGroupIds(newGroupId)).getSecurityGroups()), 200, 5);