-
Notifications
You must be signed in to change notification settings - Fork 12
/
Copy pathutils.go
224 lines (185 loc) · 6.77 KB
/
utils.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
// Copyright © 2021, 2023 Cisco
//
// SPDX-License-Identifier: Apache-2.0
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
// All rights reserved.
package main
import (
"context"
"fmt"
"os"
"strings"
"time"
sd "cloud.google.com/go/servicedirectory/apiv1"
"github.com/CloudNativeSDWAN/cnwan-operator/internal/types"
"github.com/CloudNativeSDWAN/cnwan-operator/pkg/cluster"
"github.com/aws/aws-sdk-go-v2/config"
"github.com/aws/aws-sdk-go-v2/service/servicediscovery"
clientv3 "go.etcd.io/etcd/client/v3"
"google.golang.org/api/option"
)
func getNetworkCfg(network, subnetwork *string) (netCfg *cluster.NetworkConfiguration, err error) {
netCfg = &cluster.NetworkConfiguration{}
if network != nil {
netCfg.NetworkName = *network
}
if subnetwork != nil {
netCfg.SubNetworkName = *subnetwork
}
if strings.ToLower(netCfg.NetworkName) == "auto" || strings.ToLower(netCfg.SubNetworkName) == "auto" {
var res *cluster.NetworkConfiguration
runningIn := cluster.WhereAmIRunning()
if runningIn == cluster.UnknownCluster {
return nil, fmt.Errorf("could not get information about the managed cluster: unsupported or no permissions to do so")
}
if runningIn == cluster.GKECluster {
sa, err := cluster.GetGoogleServiceAccountSecret(context.Background())
if err != nil {
return nil, err
}
res, err = cluster.GetNetworkFromGKE(context.Background(), option.WithCredentialsJSON(sa))
if err != nil {
return nil, err
}
}
// TODO: implement EKS on future versions. Code is ready but just not
// included in this iteration.
if strings.ToLower(netCfg.NetworkName) == "auto" {
netCfg.NetworkName = res.NetworkName
}
if strings.ToLower(netCfg.SubNetworkName) == "auto" {
netCfg.SubNetworkName = res.SubNetworkName
}
}
return
}
func getGSDClient(ctx context.Context) (*sd.RegistrationClient, error) {
// TODO: next versions will have a flag parsing system. Therefore this will
// need a change in case service account is provided somewhere else.
saBytes, err := cluster.GetGoogleServiceAccountSecret(ctx)
if err != nil {
return nil, fmt.Errorf("could not load google service account secret: %s", err)
}
cli, err := sd.NewRegistrationClient(ctx, option.WithCredentialsJSON(saBytes))
if err != nil {
return nil, fmt.Errorf("could not get start service directory client: %s", err)
}
return cli, err
}
func getAWSClient(ctx context.Context, region *string) (*servicediscovery.Client, error) {
saBytes, err := cluster.GetAWSCredentialsSecret(ctx)
if err != nil {
return nil, fmt.Errorf("could not load aws credentials secret: %s", err)
}
// TODO: on next versions this will be a const, as it will be moved to
// its dedicated aws package
tempPath := "/tmp/cnwan-operator-aws-credentials"
opts := []func(*config.LoadOptions) error{}
if region != nil {
opts = append(opts, config.WithRegion(*region))
}
// TODO: this needs to be re-written in case allowing loading default
// credentials that do exist on file system
if err := os.WriteFile(tempPath, saBytes, 0644); err != nil {
return nil, err
}
opts = append(opts, config.WithSharedCredentialsFiles([]string{tempPath}))
defer os.Remove(tempPath)
cfg, err := config.LoadDefaultConfig(context.TODO(), opts...)
if err != nil {
return nil, nil
}
return servicediscovery.NewFromConfig(cfg), nil
}
func parseAndResetAWSCloudMapSettings(cmSettings *types.CloudMapSettings) (*types.CloudMapSettings, error) {
newSettings := &types.CloudMapSettings{
DefaultRegion: "",
}
if cmSettings.DefaultRegion == "" {
return nil, fmt.Errorf("invalid cloud map region provided")
}
newSettings.DefaultRegion = cmSettings.DefaultRegion
// TODO: support getting region from cluster
return newSettings, nil
}
func parseAndResetGSDSettings(gcSettings *types.ServiceDirectorySettings) (*types.ServiceDirectorySettings, error) {
newSettings := &types.ServiceDirectorySettings{
DefaultRegion: "",
ProjectID: "",
}
if gcSettings != nil && gcSettings.DefaultRegion != "" {
newSettings.DefaultRegion = gcSettings.DefaultRegion
// setupLog.Info("using region defined in settings", "region", gcSettings.DefaultRegion)
}
if gcSettings != nil && gcSettings.ProjectID != "" {
newSettings.ProjectID = gcSettings.ProjectID
// setupLog.Info("using project ID defined in settings", "project-id", gcSettings.ProjectID)
}
if newSettings.DefaultRegion != "" && newSettings.ProjectID != "" {
return newSettings, nil
}
// setupLog.Info("attempting to retrieve some data from Google Cloud...")
if cluster.WhereAmIRunning() != cluster.GKECluster {
return nil, fmt.Errorf("could not load data from Google Cloud: either platform is not GKE or there are no permissions to do so")
}
if newSettings.DefaultRegion == "" {
_defRegion, err := cluster.GetGCPRegion()
if err != nil {
return nil, fmt.Errorf("could not get region from GCP: %s", err)
}
newSettings.DefaultRegion = *_defRegion
// setupLog.Info("retrieved region from GCP", "region", newSettings.DefaultRegion)
}
if newSettings.ProjectID == "" {
_projectID, err := cluster.GetGCPProjectID()
if err != nil {
return nil, fmt.Errorf("could not get project ID from GCP: %s", err)
}
newSettings.ProjectID = *_projectID
// setupLog.Info("retrieved project ID from GCP", "project ID", newSettings.ProjectID)
}
return newSettings, nil
}
func getEtcdClient(settings *types.EtcdSettings) (*clientv3.Client, error) {
endps := []string{}
for _, endp := range settings.Endpoints {
endps = append(endps, fmt.Sprintf("%s:%d", endp.Host, *endp.Port))
}
cfg := clientv3.Config{
Endpoints: endps,
}
if settings.Authentication == types.EtcdAuthWithNothing {
return clientv3.New(cfg)
}
ctx, canc := context.WithTimeout(context.Background(), time.Duration(15)*time.Second)
defer canc()
if settings.Authentication == types.EtcdAuthWithUsernamePassw {
user, pass, err := cluster.GetEtcdCredentialsSecret(ctx)
if err != nil {
return nil, err
}
if len(user) > 0 {
cfg.Username = string(user)
}
if len(pass) > 0 {
cfg.Password = string(pass)
}
cfg.Endpoints = endps
return clientv3.New(cfg)
}
// TODO: support for TLS: if authentication is through TLS if Username and Password are both nil, then look
// for the secrets containing the client's certificate and and key.
return nil, fmt.Errorf("unsupported etcd authentication method")
}