mirror of https://github.com/kubernetes/kops.git
394 lines
11 KiB
Go
394 lines
11 KiB
Go
/*
|
|
Copyright 2019 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package awstasks
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
"github.com/aws/aws-sdk-go/service/ec2"
|
|
"k8s.io/apimachinery/pkg/util/validation/field"
|
|
"k8s.io/klog/v2"
|
|
"k8s.io/kops/pkg/featureflag"
|
|
"k8s.io/kops/upup/pkg/fi"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/awsup"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/terraform"
|
|
"k8s.io/kops/upup/pkg/fi/cloudup/terraformWriter"
|
|
)
|
|
|
|
// +kops:fitask
|
|
type VPC struct {
|
|
Name *string
|
|
Lifecycle fi.Lifecycle
|
|
|
|
ID *string
|
|
CIDR *string
|
|
|
|
// AmazonIPv6 is used only for Terraform rendering.
|
|
// Direct rendering is handled via the VPCAmazonIPv6CIDRBlock task
|
|
AmazonIPv6 *bool
|
|
IPv6CIDR *string
|
|
|
|
EnableDNSHostnames *bool
|
|
EnableDNSSupport *bool
|
|
|
|
// Shared is set if this is a shared VPC
|
|
Shared *bool
|
|
|
|
Tags map[string]string
|
|
|
|
// AssociateExtraCIDRBlocks contains a list of cidr blocks that should be
|
|
// associated with the VPC; any other CIDR blocks should be disassociated.
|
|
// The associations themselves are created through the VPCCIDRBlock awstask.
|
|
AssociateExtraCIDRBlocks []string
|
|
}
|
|
|
|
var (
|
|
_ fi.CompareWithID = &VPC{}
|
|
_ fi.CloudupProducesDeletions = &VPC{}
|
|
)
|
|
|
|
func (e *VPC) CompareWithID() *string {
|
|
return e.ID
|
|
}
|
|
|
|
func (e *VPC) Find(c *fi.CloudupContext) (*VPC, error) {
|
|
cloud := c.T.Cloud.(awsup.AWSCloud)
|
|
|
|
request := &ec2.DescribeVpcsInput{}
|
|
|
|
if fi.ValueOf(e.ID) != "" {
|
|
request.VpcIds = []*string{e.ID}
|
|
} else {
|
|
request.Filters = cloud.BuildFilters(e.Name)
|
|
}
|
|
|
|
response, err := cloud.EC2().DescribeVpcs(request)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error listing VPCs: %v", err)
|
|
}
|
|
if response == nil || len(response.Vpcs) == 0 {
|
|
return nil, nil
|
|
}
|
|
|
|
if len(response.Vpcs) != 1 {
|
|
return nil, fmt.Errorf("found multiple VPCs matching tags")
|
|
}
|
|
vpc := response.Vpcs[0]
|
|
actual := &VPC{
|
|
ID: vpc.VpcId,
|
|
CIDR: vpc.CidrBlock,
|
|
AmazonIPv6: aws.Bool(false),
|
|
Name: findNameTag(vpc.Tags),
|
|
Tags: intersectTags(vpc.Tags, e.Tags),
|
|
}
|
|
|
|
klog.V(4).Infof("found matching VPC %v", actual)
|
|
|
|
for _, association := range vpc.Ipv6CidrBlockAssociationSet {
|
|
if association == nil || association.Ipv6CidrBlockState == nil {
|
|
continue
|
|
}
|
|
|
|
state := aws.StringValue(association.Ipv6CidrBlockState.State)
|
|
if state != ec2.VpcCidrBlockStateCodeAssociated && state != ec2.VpcCidrBlockStateCodeAssociating {
|
|
continue
|
|
}
|
|
|
|
pool := aws.StringValue(association.Ipv6Pool)
|
|
if pool == "Amazon" {
|
|
actual.AmazonIPv6 = aws.Bool(true)
|
|
actual.IPv6CIDR = association.Ipv6CidrBlock
|
|
e.IPv6CIDR = association.Ipv6CidrBlock
|
|
break
|
|
} else if actual.IPv6CIDR == nil {
|
|
actual.IPv6CIDR = association.Ipv6CidrBlock
|
|
e.IPv6CIDR = association.Ipv6CidrBlock
|
|
}
|
|
}
|
|
|
|
if actual.ID != nil {
|
|
request := &ec2.DescribeVpcAttributeInput{VpcId: actual.ID, Attribute: aws.String(ec2.VpcAttributeNameEnableDnsSupport)}
|
|
response, err := cloud.EC2().DescribeVpcAttribute(request)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error querying for dns support: %v", err)
|
|
}
|
|
actual.EnableDNSSupport = response.EnableDnsSupport.Value
|
|
}
|
|
|
|
if actual.ID != nil {
|
|
request := &ec2.DescribeVpcAttributeInput{VpcId: actual.ID, Attribute: aws.String(ec2.VpcAttributeNameEnableDnsHostnames)}
|
|
response, err := cloud.EC2().DescribeVpcAttribute(request)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("error querying for dns support: %v", err)
|
|
}
|
|
actual.EnableDNSHostnames = response.EnableDnsHostnames.Value
|
|
}
|
|
|
|
// Prevent spurious comparison failures
|
|
actual.Shared = e.Shared
|
|
if e.ID == nil {
|
|
e.ID = actual.ID
|
|
}
|
|
actual.Lifecycle = e.Lifecycle
|
|
actual.Name = e.Name // Name is part of Tags
|
|
actual.AssociateExtraCIDRBlocks = e.AssociateExtraCIDRBlocks
|
|
|
|
return actual, nil
|
|
}
|
|
|
|
func (s *VPC) CheckChanges(a, e, changes *VPC) error {
|
|
if a == nil {
|
|
if e.CIDR == nil {
|
|
// TODO: Auto-assign CIDR?
|
|
return fi.RequiredField("CIDR")
|
|
}
|
|
}
|
|
if a != nil {
|
|
if changes.CIDR != nil {
|
|
// TODO: Do we want to destroy & recreate the VPC?
|
|
return fi.FieldIsImmutable(e.CIDR, a.CIDR, field.NewPath("CIDR"))
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (e *VPC) Run(c *fi.CloudupContext) error {
|
|
return fi.CloudupDefaultDeltaRunMethod(e, c)
|
|
}
|
|
|
|
func (_ *VPC) RenderAWS(t *awsup.AWSAPITarget, a, e, changes *VPC) error {
|
|
shared := fi.ValueOf(e.Shared)
|
|
if shared {
|
|
// Verify the VPC was found and matches our required settings
|
|
if a == nil {
|
|
return fmt.Errorf("VPC with id %q not found", fi.ValueOf(e.ID))
|
|
}
|
|
|
|
if changes != nil && changes.EnableDNSSupport != nil {
|
|
if featureflag.VPCSkipEnableDNSSupport.Enabled() {
|
|
klog.Warningf("VPC did not have EnableDNSSupport=true, but ignoring because of VPCSkipEnableDNSSupport feature-flag")
|
|
} else {
|
|
// TODO: We could easily just allow kops to fix this...
|
|
return fmt.Errorf("VPC with id %q was set to be shared, but did not have EnableDNSSupport=true.", fi.ValueOf(e.ID))
|
|
}
|
|
}
|
|
}
|
|
|
|
if a == nil {
|
|
klog.V(2).Infof("Creating VPC with CIDR: %q", *e.CIDR)
|
|
|
|
request := &ec2.CreateVpcInput{
|
|
CidrBlock: e.CIDR,
|
|
TagSpecifications: awsup.EC2TagSpecification(ec2.ResourceTypeVpc, e.Tags),
|
|
}
|
|
|
|
response, err := t.Cloud.EC2().CreateVpc(request)
|
|
if err != nil {
|
|
return fmt.Errorf("error creating VPC: %v", err)
|
|
}
|
|
|
|
e.ID = response.Vpc.VpcId
|
|
}
|
|
|
|
if changes.EnableDNSSupport != nil {
|
|
request := &ec2.ModifyVpcAttributeInput{
|
|
VpcId: e.ID,
|
|
EnableDnsSupport: &ec2.AttributeBooleanValue{Value: changes.EnableDNSSupport},
|
|
}
|
|
|
|
_, err := t.Cloud.EC2().ModifyVpcAttribute(request)
|
|
if err != nil {
|
|
return fmt.Errorf("error modifying VPC attribute: %v", err)
|
|
}
|
|
}
|
|
|
|
if changes.EnableDNSHostnames != nil {
|
|
request := &ec2.ModifyVpcAttributeInput{
|
|
VpcId: e.ID,
|
|
EnableDnsHostnames: &ec2.AttributeBooleanValue{Value: changes.EnableDNSHostnames},
|
|
}
|
|
|
|
_, err := t.Cloud.EC2().ModifyVpcAttribute(request)
|
|
if err != nil {
|
|
return fmt.Errorf("error modifying VPC attribute: %v", err)
|
|
}
|
|
}
|
|
|
|
return t.AddAWSTags(*e.ID, e.Tags)
|
|
}
|
|
|
|
func (e *VPC) FindDeletions(c *fi.CloudupContext) ([]fi.CloudupDeletion, error) {
|
|
if fi.IsNilOrEmpty(e.ID) || fi.ValueOf(e.Shared) {
|
|
return nil, nil
|
|
}
|
|
|
|
var removals []fi.CloudupDeletion
|
|
request := &ec2.DescribeVpcsInput{
|
|
VpcIds: []*string{e.ID},
|
|
}
|
|
cloud := c.T.Cloud.(awsup.AWSCloud)
|
|
response, err := cloud.EC2().DescribeVpcs(request)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if response == nil || len(response.Vpcs) == 0 {
|
|
return nil, nil
|
|
}
|
|
|
|
if len(response.Vpcs) != 1 {
|
|
return nil, fmt.Errorf("found multiple VPCs matching tags")
|
|
}
|
|
vpc := response.Vpcs[0]
|
|
for _, association := range vpc.CidrBlockAssociationSet {
|
|
// We'll only delete CIDR associations that are not the primary association
|
|
// and that have a state of "associated"
|
|
if fi.ValueOf(association.CidrBlock) == fi.ValueOf(vpc.CidrBlock) ||
|
|
association.CidrBlockState != nil && fi.ValueOf(association.CidrBlockState.State) != ec2.VpcCidrBlockStateCodeAssociated {
|
|
continue
|
|
}
|
|
match := false
|
|
for _, cidr := range e.AssociateExtraCIDRBlocks {
|
|
if fi.ValueOf(association.CidrBlock) == cidr {
|
|
match = true
|
|
break
|
|
}
|
|
}
|
|
if !match {
|
|
removals = append(removals, &deleteVPCCIDRBlock{
|
|
vpcID: vpc.VpcId,
|
|
cidrBlock: association.CidrBlock,
|
|
associationID: association.AssociationId,
|
|
})
|
|
}
|
|
}
|
|
return removals, nil
|
|
}
|
|
|
|
type terraformVPCData struct {
|
|
ID *string `cty:"id"`
|
|
}
|
|
|
|
type terraformVPC struct {
|
|
CIDR *string `cty:"cidr_block"`
|
|
EnableDNSHostnames *bool `cty:"enable_dns_hostnames"`
|
|
EnableDNSSupport *bool `cty:"enable_dns_support"`
|
|
AmazonIPv6 *bool `cty:"assign_generated_ipv6_cidr_block"`
|
|
Tags map[string]string `cty:"tags"`
|
|
}
|
|
|
|
func (_ *VPC) RenderTerraform(t *terraform.TerraformTarget, a, e, changes *VPC) error {
|
|
if err := t.AddOutputVariable("vpc_id", e.TerraformLink()); err != nil {
|
|
return err
|
|
}
|
|
|
|
cidrPrefixLengthCaptureList := terraformWriter.LiteralFunctionExpression("regex",
|
|
terraformWriter.LiteralFromStringValue(".*/(\\\\d+)"),
|
|
terraformWriter.LiteralTokens("local", "vpc_ipv6_cidr_block"),
|
|
)
|
|
cidrPrefixLengthString := terraformWriter.LiteralIndexExpression(
|
|
cidrPrefixLengthCaptureList,
|
|
terraformWriter.LiteralFromIntValue(0),
|
|
)
|
|
if err := t.AddOutputVariable("vpc_ipv6_cidr_length", terraformWriter.LiteralNullConditionalExpression(
|
|
terraformWriter.LiteralTokens("local", "vpc_ipv6_cidr_block"),
|
|
terraformWriter.LiteralFunctionExpression("tonumber", cidrPrefixLengthString),
|
|
)); err != nil {
|
|
return err
|
|
}
|
|
|
|
shared := fi.ValueOf(e.Shared)
|
|
if shared {
|
|
// Not terraform owned / managed
|
|
// We won't apply changes, but our validation (kops update) will still warn
|
|
|
|
if err := t.AddOutputVariable("vpc_cidr_block", terraformWriter.LiteralData("aws_vpc", *e.Name, "cidr_block")); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := t.AddOutputVariable("vpc_ipv6_cidr_block", terraformWriter.LiteralData("aws_vpc", *e.Name, "ipv6_cidr_block")); err != nil {
|
|
return err
|
|
}
|
|
|
|
tf := terraformVPCData{
|
|
ID: e.ID,
|
|
}
|
|
|
|
return t.RenderDataSource("aws_vpc", *e.Name, tf)
|
|
}
|
|
|
|
if err := t.AddOutputVariable("vpc_cidr_block", terraformWriter.LiteralProperty("aws_vpc", *e.Name, "cidr_block")); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := t.AddOutputVariable("vpc_ipv6_cidr_block", terraformWriter.LiteralProperty("aws_vpc", *e.Name, "ipv6_cidr_block")); err != nil {
|
|
return err
|
|
}
|
|
|
|
tf := &terraformVPC{
|
|
CIDR: e.CIDR,
|
|
Tags: e.Tags,
|
|
EnableDNSHostnames: e.EnableDNSHostnames,
|
|
EnableDNSSupport: e.EnableDNSSupport,
|
|
AmazonIPv6: e.AmazonIPv6,
|
|
}
|
|
|
|
return t.RenderResource("aws_vpc", *e.Name, tf)
|
|
}
|
|
|
|
func (e *VPC) TerraformLink() *terraformWriter.Literal {
|
|
shared := fi.ValueOf(e.Shared)
|
|
if shared {
|
|
if e.ID == nil {
|
|
klog.Fatalf("ID must be set, if VPC is shared: %s", e)
|
|
}
|
|
|
|
klog.V(4).Infof("reusing existing VPC with id %q", *e.ID)
|
|
return terraformWriter.LiteralFromStringValue(*e.ID)
|
|
}
|
|
|
|
return terraformWriter.LiteralProperty("aws_vpc", *e.Name, "id")
|
|
}
|
|
|
|
type deleteVPCCIDRBlock struct {
|
|
vpcID *string
|
|
cidrBlock *string
|
|
associationID *string
|
|
}
|
|
|
|
var _ fi.CloudupDeletion = &deleteVPCCIDRBlock{}
|
|
|
|
func (d *deleteVPCCIDRBlock) Delete(t fi.CloudupTarget) error {
|
|
awsTarget, ok := t.(*awsup.AWSAPITarget)
|
|
if !ok {
|
|
return fmt.Errorf("unexpected target type for deletion: %T", t)
|
|
}
|
|
request := &ec2.DisassociateVpcCidrBlockInput{
|
|
AssociationId: d.associationID,
|
|
}
|
|
_, err := awsTarget.Cloud.EC2().DisassociateVpcCidrBlock(request)
|
|
return err
|
|
}
|
|
|
|
func (d *deleteVPCCIDRBlock) TaskName() string {
|
|
return "VPCCIDRBlock"
|
|
}
|
|
|
|
func (d *deleteVPCCIDRBlock) Item() string {
|
|
return fmt.Sprintf("%v: cidr=%v", *d.vpcID, *d.cidrBlock)
|
|
}
|