mirror of https://github.com/kubernetes/kops.git
328 lines
8.8 KiB
Go
328 lines
8.8 KiB
Go
/*
|
|
Copyright 2017 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package gcetasks
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"reflect"
|
|
|
|
compute "google.golang.org/api/compute/v1"
|
|
"k8s.io/klog/v2"
|
|
"k8s.io/kops/upup/pkg/fi"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/gce"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/terraform"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/terraformWriter"
|
|
)
|
|
|
|
// ForwardingRule represents a GCE ForwardingRule
|
|
// +kops:fitask
|
|
type ForwardingRule struct {
|
|
Name *string
|
|
Lifecycle fi.Lifecycle
|
|
|
|
PortRange *string
|
|
Ports []string
|
|
TargetPool *TargetPool
|
|
// An IP address can be specified either in dotted decimal
|
|
// or by reference to an address object. The following two
|
|
// fields are mutually exclusive.
|
|
IPAddress *Address
|
|
RuleIPAddress *string
|
|
|
|
IPProtocol string
|
|
LoadBalancingScheme *string
|
|
Network *Network
|
|
Subnetwork *Subnet
|
|
BackendService *BackendService
|
|
|
|
// Labels to set on the resource.
|
|
Labels map[string]string
|
|
|
|
// Fingerprint of the labels, used to avoid race-conditions on updates.
|
|
// Only set on the actual resource returned by Find.
|
|
labelFingerprint string
|
|
}
|
|
|
|
var _ fi.CompareWithID = &ForwardingRule{}
|
|
|
|
func (e *ForwardingRule) CompareWithID() *string {
|
|
return e.Name
|
|
}
|
|
|
|
func (e *ForwardingRule) Find(c *fi.CloudupContext) (*ForwardingRule, error) {
|
|
ctx := c.Context()
|
|
|
|
cloud := c.T.Cloud.(gce.GCECloud)
|
|
name := fi.ValueOf(e.Name)
|
|
|
|
r, err := cloud.Compute().ForwardingRules().Get(ctx, cloud.Project(), cloud.Region(), name)
|
|
if err != nil {
|
|
if gce.IsNotFound(err) {
|
|
return nil, nil
|
|
}
|
|
return nil, fmt.Errorf("error getting ForwardingRule %q: %v", name, err)
|
|
}
|
|
|
|
actual := &ForwardingRule{
|
|
Name: fi.PtrTo(r.Name),
|
|
IPProtocol: r.IPProtocol,
|
|
}
|
|
if r.PortRange != "" {
|
|
actual.PortRange = &r.PortRange
|
|
}
|
|
if len(r.Ports) > 0 {
|
|
actual.Ports = r.Ports
|
|
}
|
|
|
|
if r.Target != "" {
|
|
actual.TargetPool = &TargetPool{
|
|
Name: fi.PtrTo(lastComponent(r.Target)),
|
|
}
|
|
}
|
|
if r.IPAddress != "" {
|
|
address, err := findAddressByIP(cloud, r.IPAddress, r.Subnetwork)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error finding Address with IP=%q: %w", r.IPAddress, err)
|
|
}
|
|
actual.IPAddress = address
|
|
}
|
|
if r.BackendService != "" {
|
|
actual.BackendService = &BackendService{
|
|
Name: fi.PtrTo(lastComponent(r.BackendService)),
|
|
}
|
|
}
|
|
if r.LoadBalancingScheme != "" {
|
|
actual.LoadBalancingScheme = fi.PtrTo(r.LoadBalancingScheme)
|
|
}
|
|
if r.Network != "" {
|
|
actual.Network = &Network{
|
|
Name: fi.PtrTo(lastComponent(r.Network)),
|
|
}
|
|
}
|
|
if r.Subnetwork != "" {
|
|
actual.Subnetwork = &Subnet{
|
|
Name: fi.PtrTo(lastComponent(r.Subnetwork)),
|
|
}
|
|
}
|
|
|
|
actual.Labels = r.Labels
|
|
actual.labelFingerprint = r.LabelFingerprint
|
|
|
|
// Ignore "system" fields
|
|
actual.Lifecycle = e.Lifecycle
|
|
|
|
return actual, nil
|
|
}
|
|
|
|
func (e *ForwardingRule) Run(c *fi.CloudupContext) error {
|
|
return fi.CloudupDefaultDeltaRunMethod(e, c)
|
|
}
|
|
|
|
func (_ *ForwardingRule) CheckChanges(a, e, changes *ForwardingRule) error {
|
|
if fi.ValueOf(e.Name) == "" {
|
|
return fi.RequiredField("Name")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (_ *ForwardingRule) RenderGCE(t *gce.GCEAPITarget, a, e, changes *ForwardingRule) error {
|
|
ctx := context.TODO()
|
|
|
|
name := fi.ValueOf(e.Name)
|
|
|
|
o := &compute.ForwardingRule{
|
|
Name: name,
|
|
IPProtocol: e.IPProtocol,
|
|
}
|
|
if e.PortRange != nil {
|
|
o.PortRange = *e.PortRange
|
|
}
|
|
if len(e.Ports) > 0 {
|
|
o.Ports = e.Ports
|
|
}
|
|
|
|
if e.LoadBalancingScheme != nil {
|
|
o.LoadBalancingScheme = *e.LoadBalancingScheme
|
|
}
|
|
|
|
if e.TargetPool != nil {
|
|
o.Target = e.TargetPool.URL(t.Cloud)
|
|
}
|
|
|
|
if e.BackendService != nil {
|
|
if o.Target != "" {
|
|
return fmt.Errorf("cannot specify both %q and %q for forwarding rule target.", o.Target, e.BackendService)
|
|
}
|
|
o.BackendService = e.BackendService.URL(t.Cloud)
|
|
}
|
|
|
|
if e.IPAddress != nil {
|
|
o.IPAddress = fi.ValueOf(e.IPAddress.IPAddress)
|
|
if o.IPAddress == "" {
|
|
addr, err := e.IPAddress.find(t.Cloud)
|
|
if err != nil {
|
|
return fmt.Errorf("error finding Address %q: %v", e.IPAddress, err)
|
|
}
|
|
if addr == nil {
|
|
return fmt.Errorf("Address %q was not found", e.IPAddress)
|
|
}
|
|
|
|
o.IPAddress = fi.ValueOf(addr.IPAddress)
|
|
if o.IPAddress == "" {
|
|
return fmt.Errorf("Address had no IP: %v", e.IPAddress)
|
|
}
|
|
}
|
|
}
|
|
if o.IPAddress != "" && e.RuleIPAddress != nil {
|
|
return fmt.Errorf("Specified both IP Address and rule-managed IP address: %v, %v", e.IPAddress, *e.RuleIPAddress)
|
|
}
|
|
if e.RuleIPAddress != nil {
|
|
o.IPAddress = *e.RuleIPAddress
|
|
}
|
|
|
|
if e.Network != nil {
|
|
project := t.Cloud.Project()
|
|
if e.Network.Project != nil {
|
|
project = *e.Network.Project
|
|
}
|
|
o.Network = e.Network.URL(project)
|
|
}
|
|
|
|
if e.Subnetwork != nil {
|
|
project := t.Cloud.Project()
|
|
if e.Network.Project != nil {
|
|
project = *e.Network.Project
|
|
}
|
|
o.Subnetwork = e.Subnetwork.URL(project, t.Cloud.Region())
|
|
}
|
|
|
|
if a == nil {
|
|
klog.V(4).Infof("Creating ForwardingRule %q", o.Name)
|
|
|
|
op, err := t.Cloud.Compute().ForwardingRules().Insert(ctx, t.Cloud.Project(), t.Cloud.Region(), o)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating ForwardingRule %q: %v", o.Name, err)
|
|
}
|
|
|
|
if err := t.Cloud.WaitForOp(op); err != nil {
|
|
return fmt.Errorf("error creating forwarding rule: %v", err)
|
|
}
|
|
|
|
if e.Labels != nil {
|
|
// We can't set labels on creation; we have to read the object to get the fingerprint
|
|
r, err := t.Cloud.Compute().ForwardingRules().Get(ctx, t.Cloud.Project(), t.Cloud.Region(), name)
|
|
if err != nil {
|
|
return fmt.Errorf("reading created ForwardingRule %q: %v", name, err)
|
|
}
|
|
|
|
req := compute.RegionSetLabelsRequest{
|
|
LabelFingerprint: r.LabelFingerprint,
|
|
Labels: e.Labels,
|
|
}
|
|
op, err := t.Cloud.Compute().ForwardingRules().SetLabels(ctx, t.Cloud.Project(), t.Cloud.Region(), o.Name, &req)
|
|
if err != nil {
|
|
return fmt.Errorf("setting ForwardingRule labels: %w", err)
|
|
}
|
|
|
|
if err := t.Cloud.WaitForOp(op); err != nil {
|
|
return fmt.Errorf("setting ForwardRule labels: %w", err)
|
|
}
|
|
}
|
|
} else {
|
|
if changes.Labels != nil {
|
|
req := compute.RegionSetLabelsRequest{
|
|
LabelFingerprint: a.labelFingerprint,
|
|
Labels: e.Labels,
|
|
}
|
|
op, err := t.Cloud.Compute().ForwardingRules().SetLabels(ctx, t.Cloud.Project(), t.Cloud.Region(), o.Name, &req)
|
|
if err != nil {
|
|
return fmt.Errorf("setting ForwardingRule labels: %w", err)
|
|
}
|
|
|
|
if err := t.Cloud.WaitForOp(op); err != nil {
|
|
return fmt.Errorf("setting ForwardRule labels: %w", err)
|
|
}
|
|
|
|
changes.Labels = nil
|
|
}
|
|
|
|
if !reflect.DeepEqual(changes, &ForwardingRule{}) {
|
|
return fmt.Errorf("cannot apply changes to ForwardingRule: %v", changes)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
type terraformForwardingRule struct {
|
|
Name string `cty:"name"`
|
|
PortRange *string `cty:"port_range"`
|
|
Ports []string `cty:"ports"`
|
|
Target *terraformWriter.Literal `cty:"target"`
|
|
IPAddress *terraformWriter.Literal `cty:"ip_address"`
|
|
IPProtocol string `cty:"ip_protocol"`
|
|
LoadBalancingScheme *string `cty:"load_balancing_scheme"`
|
|
Network *terraformWriter.Literal `cty:"network"`
|
|
Subnetwork *terraformWriter.Literal `cty:"subnetwork"`
|
|
BackendService *terraformWriter.Literal `cty:"backend_service"`
|
|
Labels map[string]string `cty:"labels"`
|
|
}
|
|
|
|
func (_ *ForwardingRule) RenderTerraform(t *terraform.TerraformTarget, a, e, changes *ForwardingRule) error {
|
|
name := fi.ValueOf(e.Name)
|
|
|
|
tf := &terraformForwardingRule{
|
|
Name: name,
|
|
IPProtocol: e.IPProtocol,
|
|
LoadBalancingScheme: e.LoadBalancingScheme,
|
|
Ports: e.Ports,
|
|
PortRange: e.PortRange,
|
|
Labels: e.Labels,
|
|
}
|
|
|
|
if e.TargetPool != nil {
|
|
tf.Target = e.TargetPool.TerraformLink()
|
|
}
|
|
|
|
if e.Network != nil {
|
|
tf.Network = e.Network.TerraformLink()
|
|
}
|
|
|
|
if e.Subnetwork != nil {
|
|
tf.Subnetwork = e.Subnetwork.TerraformLink()
|
|
}
|
|
|
|
if e.BackendService != nil {
|
|
tf.BackendService = e.BackendService.TerraformAddress()
|
|
}
|
|
|
|
if e.IPAddress != nil {
|
|
tf.IPAddress = e.IPAddress.TerraformAddress()
|
|
} else if e.RuleIPAddress != nil {
|
|
tf.IPAddress = terraformWriter.LiteralFromStringValue(*e.RuleIPAddress)
|
|
}
|
|
|
|
return t.RenderResource("google_compute_forwarding_rule", name, tf)
|
|
}
|
|
|
|
func (e *ForwardingRule) TerraformLink() *terraformWriter.Literal {
|
|
name := fi.ValueOf(e.Name)
|
|
|
|
return terraformWriter.LiteralSelfLink("google_compute_forwarding_rule", name)
|
|
}
|