debian-mirror-gitlab/app/models/clusters/providers/aws.rb

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

74 lines
1.8 KiB
Ruby
Raw Normal View History

2019-12-21 20:55:43 +05:30
# frozen_string_literal: true
module Clusters
module Providers
class Aws < ApplicationRecord
2019-12-26 22:10:19 +05:30
include Gitlab::Utils::StrongMemoize
2019-12-21 20:55:43 +05:30
include Clusters::Concerns::ProviderStatus
self.table_name = 'cluster_providers_aws'
2020-01-01 13:55:28 +05:30
DEFAULT_REGION = 'us-east-1'
2019-12-21 20:55:43 +05:30
belongs_to :cluster, inverse_of: :provider_aws, class_name: 'Clusters::Cluster'
2020-01-01 13:55:28 +05:30
default_value_for :region, DEFAULT_REGION
2019-12-21 20:55:43 +05:30
default_value_for :num_nodes, 3
default_value_for :instance_type, 'm5.large'
attr_encrypted :secret_access_key,
mode: :per_attribute_iv,
2021-06-08 01:23:25 +05:30
key: Settings.attr_encrypted_db_key_base_32,
2019-12-21 20:55:43 +05:30
algorithm: 'aes-256-gcm'
validates :role_arn,
length: 1..2048,
format: {
with: Gitlab::Regex.aws_arn_regex,
message: Gitlab::Regex.aws_arn_regex_message
}
validates :num_nodes,
numericality: {
only_integer: true,
greater_than: 0
}
2020-11-24 15:15:51 +05:30
validates :kubernetes_version, :key_name, :region, :instance_type, :security_group_id, length: { in: 1..255 }
2019-12-21 20:55:43 +05:30
validates :subnet_ids, presence: true
def nullify_credentials
assign_attributes(
access_key_id: nil,
secret_access_key: nil,
session_token: nil
)
end
2019-12-26 22:10:19 +05:30
def api_client
strong_memoize(:api_client) do
::Aws::CloudFormation::Client.new(credentials: credentials, region: region)
end
end
def credentials
strong_memoize(:credentials) do
::Aws::Credentials.new(access_key_id, secret_access_key, session_token)
end
end
def has_rbac_enabled?
true
end
def knative_pre_installed?
false
end
def created_by_user
cluster.user
end
2019-12-21 20:55:43 +05:30
end
end
end