mirror of https://github.com/kubernetes/kops.git
224 lines
7.0 KiB
Go
224 lines
7.0 KiB
Go
/*
|
|
Copyright 2019 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package alitasks
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/denverdino/aliyungo/common"
|
|
"github.com/denverdino/aliyungo/ecs"
|
|
"k8s.io/klog/v2"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/terraformWriter"
|
|
|
|
"k8s.io/kops/upup/pkg/fi"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/aliup"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/terraform"
|
|
)
|
|
|
|
// +kops:fitask
|
|
type SecurityGroupRule struct {
|
|
Name *string
|
|
IpProtocol *string
|
|
SourceCidrIp *string
|
|
SecurityGroup *SecurityGroup
|
|
SourceGroup *SecurityGroup
|
|
Lifecycle *fi.Lifecycle
|
|
PortRange *string
|
|
In *bool
|
|
}
|
|
|
|
var _ fi.CompareWithID = &SecurityGroupRule{}
|
|
|
|
func (s *SecurityGroupRule) CompareWithID() *string {
|
|
return s.Name
|
|
}
|
|
|
|
func (s *SecurityGroupRule) Find(c *fi.Context) (*SecurityGroupRule, error) {
|
|
if s.SecurityGroup == nil || s.SecurityGroup.SecurityGroupId == nil {
|
|
klog.V(4).Infof("SecurityGroup / SecurityGroupId not found for %s, skipping Find", fi.StringValue(s.Name))
|
|
return nil, nil
|
|
}
|
|
|
|
cloud := c.Cloud.(aliup.ALICloud)
|
|
var direction ecs.Direction
|
|
|
|
if fi.BoolValue(s.In) {
|
|
direction = ecs.DirectionIngress
|
|
} else {
|
|
direction = ecs.DirectionEgress
|
|
}
|
|
|
|
describeSecurityGroupAttributeArgs := &ecs.DescribeSecurityGroupAttributeArgs{
|
|
RegionId: common.Region(cloud.Region()),
|
|
SecurityGroupId: fi.StringValue(s.SecurityGroup.SecurityGroupId),
|
|
Direction: direction,
|
|
}
|
|
|
|
describeResponse, err := cloud.EcsClient().DescribeSecurityGroupAttribute(describeSecurityGroupAttributeArgs)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error finding SecurityGroupRules: %v", err)
|
|
}
|
|
|
|
if len(describeResponse.Permissions.Permission) == 0 {
|
|
klog.V(2).Infof("can't find any security rule in security group: %q", fi.StringValue(s.SecurityGroup.SecurityGroupId))
|
|
return nil, nil
|
|
}
|
|
|
|
actual := &SecurityGroupRule{}
|
|
// Find securityGroupRule with specified ipProtocol, securityGroupId,SourceGroupId
|
|
for _, securityGroupRule := range describeResponse.Permissions.Permission {
|
|
if !strings.EqualFold(string(securityGroupRule.IpProtocol), fi.StringValue(s.IpProtocol)) {
|
|
continue
|
|
}
|
|
if s.SourceGroup != nil && securityGroupRule.SourceGroupId != fi.StringValue(s.SourceGroup.SecurityGroupId) {
|
|
continue
|
|
}
|
|
if s.PortRange != nil && securityGroupRule.PortRange != fi.StringValue(s.PortRange) {
|
|
continue
|
|
}
|
|
if s.SourceCidrIp != nil && securityGroupRule.SourceCidrIp != fi.StringValue(s.SourceCidrIp) {
|
|
continue
|
|
}
|
|
|
|
klog.V(2).Infof("found matching SecurityGroupRule of securityGroup: %q", fi.StringValue(s.SecurityGroup.SecurityGroupId))
|
|
|
|
actual.PortRange = fi.String(securityGroupRule.PortRange)
|
|
actual.SourceCidrIp = fi.String(securityGroupRule.SourceCidrIp)
|
|
actual.IpProtocol = fi.String(strings.ToLower(string(securityGroupRule.IpProtocol)))
|
|
|
|
// Ignore "system" fields
|
|
actual.Name = s.Name
|
|
actual.SecurityGroup = s.SecurityGroup
|
|
actual.Lifecycle = s.Lifecycle
|
|
actual.In = s.In
|
|
actual.SourceGroup = s.SourceGroup
|
|
|
|
return actual, nil
|
|
}
|
|
return nil, nil
|
|
}
|
|
|
|
func (s *SecurityGroupRule) Run(c *fi.Context) error {
|
|
return fi.DefaultDeltaRunMethod(s, c)
|
|
}
|
|
|
|
func (_ *SecurityGroupRule) CheckChanges(a, e, changes *SecurityGroupRule) error {
|
|
|
|
if a == nil {
|
|
if e.Name == nil {
|
|
return fi.RequiredField("Name")
|
|
}
|
|
if e.IpProtocol == nil {
|
|
return fi.RequiredField("IpProtocol")
|
|
}
|
|
if e.PortRange == nil {
|
|
return fi.RequiredField("PortRange")
|
|
}
|
|
} else {
|
|
if changes.Name != nil {
|
|
return fi.CannotChangeField("Name")
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (_ *SecurityGroupRule) RenderALI(t *aliup.ALIAPITarget, a, e, changes *SecurityGroupRule) error {
|
|
|
|
if a == nil {
|
|
if fi.BoolValue(e.In) {
|
|
klog.V(2).Infof("Creating SecurityGroupRule of SecurityGroup:%q", fi.StringValue(e.SecurityGroup.SecurityGroupId))
|
|
|
|
authorizeSecurityGroupArgs := &ecs.AuthorizeSecurityGroupArgs{
|
|
SecurityGroupId: fi.StringValue(e.SecurityGroup.SecurityGroupId),
|
|
RegionId: common.Region(t.Cloud.Region()),
|
|
IpProtocol: ecs.IpProtocol(fi.StringValue(e.IpProtocol)),
|
|
PortRange: fi.StringValue(e.PortRange),
|
|
}
|
|
|
|
if e.SourceGroup != nil && e.SourceGroup.SecurityGroupId != nil {
|
|
authorizeSecurityGroupArgs.SourceGroupId = fi.StringValue(e.SourceGroup.SecurityGroupId)
|
|
}
|
|
|
|
if e.SourceCidrIp != nil {
|
|
authorizeSecurityGroupArgs.SourceCidrIp = fi.StringValue(e.SourceCidrIp)
|
|
}
|
|
|
|
err := t.Cloud.EcsClient().AuthorizeSecurityGroup(authorizeSecurityGroupArgs)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating securityGroupRule: %v", err)
|
|
}
|
|
|
|
} else {
|
|
authorizeSecurityGroupEgressArgs := &ecs.AuthorizeSecurityGroupEgressArgs{
|
|
SecurityGroupId: fi.StringValue(e.SecurityGroup.SecurityGroupId),
|
|
RegionId: common.Region(t.Cloud.Region()),
|
|
IpProtocol: ecs.IpProtocol(fi.StringValue(e.IpProtocol)),
|
|
PortRange: fi.StringValue(e.PortRange),
|
|
}
|
|
|
|
err := t.Cloud.EcsClient().AuthorizeSecurityGroupEgress(authorizeSecurityGroupEgressArgs)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating securityGroupRule: %v", err)
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
type terraformSecurityGroupRole struct {
|
|
Name *string `json:"name,omitempty" cty:"name"`
|
|
Type *string `json:"type,omitempty" cty:"type"`
|
|
IpProtocol *string `json:"ip_protocol,omitempty" cty:"ip_protocol"`
|
|
SourceCidrIp *string `json:"cidr_ip,omitempty" cty:"cidr_ip"`
|
|
SecurityGroupId *terraformWriter.Literal `json:"security_group_id,omitempty" cty:"security_group_id"`
|
|
SourceGroupId *terraformWriter.Literal `json:"source_security_group_id,omitempty" cty:"source_security_group_id"`
|
|
PortRange *string `json:"port_range,omitempty" cty:"port_range"`
|
|
}
|
|
|
|
func (_ *SecurityGroupRule) RenderTerraform(t *terraform.TerraformTarget, a, e, changes *SecurityGroupRule) error {
|
|
|
|
tf := &terraformSecurityGroupRole{
|
|
Name: e.Name,
|
|
IpProtocol: e.IpProtocol,
|
|
PortRange: e.PortRange,
|
|
SecurityGroupId: e.SecurityGroup.TerraformLink(),
|
|
}
|
|
|
|
if fi.BoolValue(e.In) {
|
|
ruleType := "ingress"
|
|
tf.Type = &ruleType
|
|
|
|
if e.SourceGroup != nil {
|
|
tf.SourceGroupId = e.SecurityGroup.TerraformLink()
|
|
}
|
|
|
|
if e.SourceCidrIp != nil {
|
|
tf.SourceCidrIp = e.SourceCidrIp
|
|
}
|
|
} else {
|
|
ruleType := "egress"
|
|
tf.Type = &ruleType
|
|
}
|
|
|
|
return t.RenderResource("alicloud_security_group_rule", *e.Name, tf)
|
|
}
|
|
|
|
func (l *SecurityGroupRule) TerraformLink() *terraformWriter.Literal {
|
|
return terraformWriter.LiteralProperty("alicloud_security_group_rule", *l.Name, "id")
|
|
}
|