|
10 | 10 | from spaceone.core.error import * |
11 | 11 | from plugin.conf.cloud_service_conf import * |
12 | 12 |
|
13 | | -_LOGGER = logging.getLogger(__name__) |
| 13 | +_LOGGER = logging.getLogger("spaceone") |
14 | 14 |
|
15 | 15 | DEFAULT_SCHEMA = "google_oauth_client_id" |
16 | 16 | DEFAULT_REGION = "us-east-1" |
|
36 | 36 |
|
37 | 37 |
|
38 | 38 | def get_session(secret_data, region_name): |
39 | | - params = { |
40 | | - "aws_access_key_id": secret_data["aws_access_key_id"], |
41 | | - "aws_secret_access_key": secret_data["aws_secret_access_key"], |
42 | | - "region_name": region_name, |
43 | | - } |
| 39 | + try: |
| 40 | + params = { |
| 41 | + "aws_access_key_id": secret_data["aws_access_key_id"], |
| 42 | + "aws_secret_access_key": secret_data["aws_secret_access_key"], |
| 43 | + "region_name": region_name, |
| 44 | + } |
44 | 45 |
|
45 | | - session = Session(**params) |
| 46 | + session = Session(**params) |
46 | 47 |
|
47 | | - # ASSUME ROLE |
48 | | - if role_arn := secret_data.get("role_arn"): |
49 | | - sts = session.client("sts", verify=BOTO3_HTTPS_VERIFIED) |
| 48 | + # ASSUME ROLE |
| 49 | + if role_arn := secret_data.get("role_arn"): |
| 50 | + sts = session.client("sts", verify=BOTO3_HTTPS_VERIFIED) |
50 | 51 |
|
51 | | - _assume_role_request = { |
52 | | - "RoleArn": role_arn, |
53 | | - "RoleSessionName": utils.generate_id("AssumeRoleSession"), |
54 | | - } |
| 52 | + _assume_role_request = { |
| 53 | + "RoleArn": role_arn, |
| 54 | + "RoleSessionName": utils.generate_id("AssumeRoleSession"), |
| 55 | + } |
55 | 56 |
|
56 | | - if external_id := secret_data.get("external_id"): |
57 | | - _assume_role_request.update({"ExternalId": external_id}) |
| 57 | + if external_id := secret_data.get("external_id"): |
| 58 | + _assume_role_request.update({"ExternalId": external_id}) |
58 | 59 |
|
59 | | - assume_role_object = sts.assume_role(**_assume_role_request) |
60 | | - credentials = assume_role_object["Credentials"] |
| 60 | + assume_role_object = sts.assume_role(**_assume_role_request) |
| 61 | + credentials = assume_role_object["Credentials"] |
61 | 62 |
|
62 | | - assume_role_params = { |
63 | | - "aws_access_key_id": credentials["AccessKeyId"], |
64 | | - "aws_secret_access_key": credentials["SecretAccessKey"], |
65 | | - "region_name": region_name, |
66 | | - "aws_session_token": credentials["SessionToken"], |
67 | | - } |
68 | | - session = Session(**assume_role_params) |
69 | | - return session |
| 63 | + assume_role_params = { |
| 64 | + "aws_access_key_id": credentials["AccessKeyId"], |
| 65 | + "aws_secret_access_key": credentials["SecretAccessKey"], |
| 66 | + "region_name": region_name, |
| 67 | + "aws_session_token": credentials["SessionToken"], |
| 68 | + } |
| 69 | + session = Session(**assume_role_params) |
| 70 | + return session |
| 71 | + except Exception as e: |
| 72 | + _LOGGER.debug("Secret Token : "+ str(secret_data)) |
| 73 | + _LOGGER.debug("Region : " + region_name) |
| 74 | + _LOGGER.error(e) |
70 | 75 |
|
71 | 76 |
|
72 | 77 | class ResourceConnector(BaseConnector): |
@@ -195,17 +200,6 @@ def get_regions(cls, secret_data): |
195 | 200 | _session = get_session(secret_data, DEFAULT_REGION) |
196 | 201 | ec2_client = _session.client("ec2", verify=BOTO3_HTTPS_VERIFIED) |
197 | 202 |
|
198 | | - try: |
199 | | - _LOGGER.debug("for test") |
200 | | - _LOGGER.debug("secret_data: "+ secret_data) |
201 | | - _LOGGER.debug("result : "+ list( |
202 | | - map( |
203 | | - lambda region_info: region_info.get("RegionName"), |
204 | | - ec2_client.describe_regions().get("Regions"), |
205 | | - ))) |
206 | | - except Exception as e: |
207 | | - _LOGGER.error(e) |
208 | | - |
209 | 203 | return list( |
210 | 204 | map( |
211 | 205 | lambda region_info: region_info.get("RegionName"), |
|
0 commit comments