kops/upup/pkg/fi/cloudup/alitasks/securitygrouprule.go

224 lines
7.0 KiB
Go

/*
Copyright 2019 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package alitasks
import (
"fmt"
"strings"
"github.com/denverdino/aliyungo/common"
"github.com/denverdino/aliyungo/ecs"
"k8s.io/klog/v2"
"k8s.io/kops/upup/pkg/fi/cloudup/terraformWriter"
"k8s.io/kops/upup/pkg/fi"
"k8s.io/kops/upup/pkg/fi/cloudup/aliup"
"k8s.io/kops/upup/pkg/fi/cloudup/terraform"
)
// +kops:fitask
type SecurityGroupRule struct {
Name *string
IpProtocol *string
SourceCidrIp *string
SecurityGroup *SecurityGroup
SourceGroup *SecurityGroup
Lifecycle *fi.Lifecycle
PortRange *string
In *bool
}
var _ fi.CompareWithID = &SecurityGroupRule{}
func (s *SecurityGroupRule) CompareWithID() *string {
return s.Name
}
func (s *SecurityGroupRule) Find(c *fi.Context) (*SecurityGroupRule, error) {
if s.SecurityGroup == nil || s.SecurityGroup.SecurityGroupId == nil {
klog.V(4).Infof("SecurityGroup / SecurityGroupId not found for %s, skipping Find", fi.StringValue(s.Name))
return nil, nil
}
cloud := c.Cloud.(aliup.ALICloud)
var direction ecs.Direction
if fi.BoolValue(s.In) {
direction = ecs.DirectionIngress
} else {
direction = ecs.DirectionEgress
}
describeSecurityGroupAttributeArgs := &ecs.DescribeSecurityGroupAttributeArgs{
RegionId: common.Region(cloud.Region()),
SecurityGroupId: fi.StringValue(s.SecurityGroup.SecurityGroupId),
Direction: direction,
}
describeResponse, err := cloud.EcsClient().DescribeSecurityGroupAttribute(describeSecurityGroupAttributeArgs)
if err != nil {
return nil, fmt.Errorf("error finding SecurityGroupRules: %v", err)
}
if len(describeResponse.Permissions.Permission) == 0 {
klog.V(2).Infof("can't find any security rule in security group: %q", fi.StringValue(s.SecurityGroup.SecurityGroupId))
return nil, nil
}
actual := &SecurityGroupRule{}
// Find securityGroupRule with specified ipProtocol, securityGroupId,SourceGroupId
for _, securityGroupRule := range describeResponse.Permissions.Permission {
if !strings.EqualFold(string(securityGroupRule.IpProtocol), fi.StringValue(s.IpProtocol)) {
continue
}
if s.SourceGroup != nil && securityGroupRule.SourceGroupId != fi.StringValue(s.SourceGroup.SecurityGroupId) {
continue
}
if s.PortRange != nil && securityGroupRule.PortRange != fi.StringValue(s.PortRange) {
continue
}
if s.SourceCidrIp != nil && securityGroupRule.SourceCidrIp != fi.StringValue(s.SourceCidrIp) {
continue
}
klog.V(2).Infof("found matching SecurityGroupRule of securityGroup: %q", fi.StringValue(s.SecurityGroup.SecurityGroupId))
actual.PortRange = fi.String(securityGroupRule.PortRange)
actual.SourceCidrIp = fi.String(securityGroupRule.SourceCidrIp)
actual.IpProtocol = fi.String(strings.ToLower(string(securityGroupRule.IpProtocol)))
// Ignore "system" fields
actual.Name = s.Name
actual.SecurityGroup = s.SecurityGroup
actual.Lifecycle = s.Lifecycle
actual.In = s.In
actual.SourceGroup = s.SourceGroup
return actual, nil
}
return nil, nil
}
func (s *SecurityGroupRule) Run(c *fi.Context) error {
return fi.DefaultDeltaRunMethod(s, c)
}
func (_ *SecurityGroupRule) CheckChanges(a, e, changes *SecurityGroupRule) error {
if a == nil {
if e.Name == nil {
return fi.RequiredField("Name")
}
if e.IpProtocol == nil {
return fi.RequiredField("IpProtocol")
}
if e.PortRange == nil {
return fi.RequiredField("PortRange")
}
} else {
if changes.Name != nil {
return fi.CannotChangeField("Name")
}
}
return nil
}
func (_ *SecurityGroupRule) RenderALI(t *aliup.ALIAPITarget, a, e, changes *SecurityGroupRule) error {
if a == nil {
if fi.BoolValue(e.In) {
klog.V(2).Infof("Creating SecurityGroupRule of SecurityGroup:%q", fi.StringValue(e.SecurityGroup.SecurityGroupId))
authorizeSecurityGroupArgs := &ecs.AuthorizeSecurityGroupArgs{
SecurityGroupId: fi.StringValue(e.SecurityGroup.SecurityGroupId),
RegionId: common.Region(t.Cloud.Region()),
IpProtocol: ecs.IpProtocol(fi.StringValue(e.IpProtocol)),
PortRange: fi.StringValue(e.PortRange),
}
if e.SourceGroup != nil && e.SourceGroup.SecurityGroupId != nil {
authorizeSecurityGroupArgs.SourceGroupId = fi.StringValue(e.SourceGroup.SecurityGroupId)
}
if e.SourceCidrIp != nil {
authorizeSecurityGroupArgs.SourceCidrIp = fi.StringValue(e.SourceCidrIp)
}
err := t.Cloud.EcsClient().AuthorizeSecurityGroup(authorizeSecurityGroupArgs)
if err != nil {
return fmt.Errorf("error creating securityGroupRule: %v", err)
}
} else {
authorizeSecurityGroupEgressArgs := &ecs.AuthorizeSecurityGroupEgressArgs{
SecurityGroupId: fi.StringValue(e.SecurityGroup.SecurityGroupId),
RegionId: common.Region(t.Cloud.Region()),
IpProtocol: ecs.IpProtocol(fi.StringValue(e.IpProtocol)),
PortRange: fi.StringValue(e.PortRange),
}
err := t.Cloud.EcsClient().AuthorizeSecurityGroupEgress(authorizeSecurityGroupEgressArgs)
if err != nil {
return fmt.Errorf("error creating securityGroupRule: %v", err)
}
}
}
return nil
}
type terraformSecurityGroupRole struct {
Name *string `json:"name,omitempty" cty:"name"`
Type *string `json:"type,omitempty" cty:"type"`
IpProtocol *string `json:"ip_protocol,omitempty" cty:"ip_protocol"`
SourceCidrIp *string `json:"cidr_ip,omitempty" cty:"cidr_ip"`
SecurityGroupId *terraformWriter.Literal `json:"security_group_id,omitempty" cty:"security_group_id"`
SourceGroupId *terraformWriter.Literal `json:"source_security_group_id,omitempty" cty:"source_security_group_id"`
PortRange *string `json:"port_range,omitempty" cty:"port_range"`
}
func (_ *SecurityGroupRule) RenderTerraform(t *terraform.TerraformTarget, a, e, changes *SecurityGroupRule) error {
tf := &terraformSecurityGroupRole{
Name: e.Name,
IpProtocol: e.IpProtocol,
PortRange: e.PortRange,
SecurityGroupId: e.SecurityGroup.TerraformLink(),
}
if fi.BoolValue(e.In) {
ruleType := "ingress"
tf.Type = &ruleType
if e.SourceGroup != nil {
tf.SourceGroupId = e.SecurityGroup.TerraformLink()
}
if e.SourceCidrIp != nil {
tf.SourceCidrIp = e.SourceCidrIp
}
} else {
ruleType := "egress"
tf.Type = &ruleType
}
return t.RenderResource("alicloud_security_group_rule", *e.Name, tf)
}
func (l *SecurityGroupRule) TerraformLink() *terraformWriter.Literal {
return terraformWriter.LiteralProperty("alicloud_security_group_rule", *l.Name, "id")
}