kops/pkg/model/gcemodel/context.go

179 lines
5.6 KiB
Go

/*
Copyright 2019 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package gcemodel
import (
"k8s.io/klog/v2"
"k8s.io/kops/pkg/apis/kops"
"k8s.io/kops/pkg/model"
"k8s.io/kops/upup/pkg/fi"
"k8s.io/kops/upup/pkg/fi/cloudup/gce"
"k8s.io/kops/upup/pkg/fi/cloudup/gcetasks"
)
type GCEModelContext struct {
ProjectID string
*model.KopsModelContext
}
// LinkToNetwork returns the GCE Network object the cluster is located in
func (c *GCEModelContext) LinkToNetwork() (*gcetasks.Network, error) {
if c.Cluster.Spec.Networking.NetworkID == "" {
return &gcetasks.Network{Name: s(c.SafeTruncatedClusterName())}, nil
}
name, project, err := gce.ParseNameAndProjectFromNetworkID(c.Cluster.Spec.Networking.NetworkID)
if err != nil {
return nil, err
}
network := &gcetasks.Network{Name: s(name)}
if project != "" {
network.Project = &project
}
return network, nil
}
// NameForIPAliasRange returns the name for the secondary IP range attached to a subnet
func (c *GCEModelContext) NameForIPAliasRange(key string) string {
// We include the cluster name so we could share a subnet...
// but there's a 5 IP alias range limit per subnet anwyay, so
// this is rather pointless and in practice we just use a
// separate subnet per cluster
return c.SafeObjectName(key)
}
// LinkToSubnet returns a link to the GCE subnet object
func (c *GCEModelContext) LinkToSubnet(subnet *kops.ClusterSubnetSpec) *gcetasks.Subnet {
name := subnet.ID
if name == "" {
name = gce.ClusterSuffixedName(subnet.Name, c.Cluster.ObjectMeta.Name, 63)
}
return &gcetasks.Subnet{Name: s(name)}
}
// SafeObjectName returns the object name and cluster name escaped for GCE
func (c *GCEModelContext) SafeObjectName(name string) string {
return gce.SafeObjectName(name, c.Cluster.ObjectMeta.Name)
}
// SafeSuffixedObjectName returns the object name and cluster name escaped for GCE, limited to 63 chars
func (c *GCEModelContext) SafeSuffixedObjectName(name string) string {
return gce.ClusterSuffixedName(name, c.Cluster.ObjectMeta.Name, 63)
}
// SafeClusterName returns the cluster name escaped for use as a GCE resource name
func (c *GCEModelContext) SafeClusterName() string {
return gce.SafeClusterName(c.Cluster.ObjectMeta.Name)
}
// SafeClusterName returns the cluster name escaped and truncated for use as a GCE resource name
func (c *GCEModelContext) SafeTruncatedClusterName() string {
return gce.SafeTruncatedClusterName(c.Cluster.ObjectMeta.Name, 63)
}
// GCETagForRole returns the (network) tag for GCE instances in the given instance group role.
func (c *GCEModelContext) GCETagForRole(role kops.InstanceGroupRole) string {
return gce.TagForRole(c.Cluster.ObjectMeta.Name, role)
}
func (c *GCEModelContext) LinkToTargetPool(id string) *gcetasks.TargetPool {
return &gcetasks.TargetPool{Name: s(c.NameForTargetPool(id))}
}
func (c *GCEModelContext) NameForTargetPool(id string) string {
return c.SafeSuffixedObjectName(id)
}
func (c *GCEModelContext) NameForHealthCheck(id string) string {
return c.SafeSuffixedObjectName(id)
}
func (c *GCEModelContext) NameForBackendService(id string) string {
return c.SafeSuffixedObjectName(id)
}
func (c *GCEModelContext) NameForForwardingRule(id string) string {
return c.SafeSuffixedObjectName(id)
}
func (c *GCEModelContext) NameForIPAddress(id string) string {
return c.SafeSuffixedObjectName(id)
}
func (c *GCEModelContext) NameForPoolHealthcheck(id string) string {
return c.SafeObjectName(id)
}
func (c *GCEModelContext) NameForHealthcheck(id string) string {
return c.SafeSuffixedObjectName(id)
}
func (c *GCEModelContext) NameForRouter(id string) string {
return c.SafeSuffixedObjectName(id)
}
func (c *GCEModelContext) NameForFirewallRule(id string) string {
return gce.ClusterSuffixedName(id, c.Cluster.ObjectMeta.Name, 63)
}
func (c *GCEModelContext) NetworkingIsIPAlias() bool {
return c.Cluster.Spec.Networking.GCP != nil
}
func (c *GCEModelContext) NetworkingIsGCERoutes() bool {
return c.Cluster.Spec.Networking.Kubenet != nil
}
// LinkToServiceAccount returns a link to the GCE ServiceAccount object for VMs in the given role
func (c *GCEModelContext) LinkToServiceAccount(ig *kops.InstanceGroup) *gcetasks.ServiceAccount {
if c.Cluster.Spec.CloudProvider.GCE.ServiceAccount != "" {
// This is a legacy setting because the nodes & control-plane run under the same serviceaccount
klog.Warningf("using legacy spec.cloudProvider.gce.serviceAccount=%q setting", c.Cluster.Spec.CloudProvider.GCE.ServiceAccount)
return &gcetasks.ServiceAccount{
Name: s("shared"),
Email: &c.Cluster.Spec.CloudProvider.GCE.ServiceAccount,
Shared: fi.PtrTo(true),
}
}
role := ig.Spec.Role
name := ""
switch role {
case kops.InstanceGroupRoleAPIServer, kops.InstanceGroupRoleControlPlane:
name = gce.ControlPlane
case kops.InstanceGroupRoleBastion:
name = gce.Bastion
case kops.InstanceGroupRoleNode:
name = gce.Node
default:
klog.Fatalf("unknown role %q", role)
}
accountID := gce.ServiceAccountName(name, c.ClusterName())
projectID := c.ProjectID
email := accountID + "@" + projectID + ".iam.gserviceaccount.com"
return &gcetasks.ServiceAccount{Name: s(name), Email: s(email)}
}