277 lines
9.7 KiB
Ruby
277 lines
9.7 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
require 'securerandom'
|
|
require 'google/apis/compute_v1'
|
|
require 'google/apis/container_v1'
|
|
require 'google/apis/container_v1beta1'
|
|
require 'google/apis/cloudbilling_v1'
|
|
require 'google/apis/cloudresourcemanager_v1'
|
|
require 'google/apis/iam_v1'
|
|
require 'google/apis/serviceusage_v1'
|
|
require 'google/apis/sqladmin_v1beta4'
|
|
|
|
module GoogleApi
|
|
module CloudPlatform
|
|
class Client < GoogleApi::Auth
|
|
SCOPE = 'https://www.googleapis.com/auth/cloud-platform https://www.googleapis.com/auth/service.management'
|
|
LEAST_TOKEN_LIFE_TIME = 10.minutes
|
|
CLUSTER_MASTER_AUTH_USERNAME = 'admin'
|
|
CLUSTER_IPV4_CIDR_BLOCK = '/16'
|
|
CLUSTER_OAUTH_SCOPES = [
|
|
"https://www.googleapis.com/auth/devstorage.read_only",
|
|
"https://www.googleapis.com/auth/logging.write",
|
|
"https://www.googleapis.com/auth/monitoring"
|
|
].freeze
|
|
ROLES_LIST = %w[roles/iam.serviceAccountUser roles/artifactregistry.admin roles/cloudbuild.builds.builder roles/run.admin roles/storage.admin roles/cloudsql.client roles/browser].freeze
|
|
REVOKE_URL = 'https://oauth2.googleapis.com/revoke'
|
|
|
|
class << self
|
|
def session_key_for_token
|
|
:cloud_platform_access_token
|
|
end
|
|
|
|
def session_key_for_expires_at
|
|
:cloud_platform_expires_at
|
|
end
|
|
|
|
def new_session_key_for_redirect_uri
|
|
SecureRandom.hex.tap do |state|
|
|
yield session_key_for_redirect_uri(state)
|
|
end
|
|
end
|
|
|
|
def session_key_for_redirect_uri(state)
|
|
"cloud_platform_second_redirect_uri_#{state}"
|
|
end
|
|
end
|
|
|
|
def scope
|
|
SCOPE
|
|
end
|
|
|
|
def validate_token(expires_at)
|
|
return false unless access_token
|
|
return false unless expires_at
|
|
|
|
# Making sure that the token will have been still alive during the cluster creation.
|
|
return false if token_life_time(expires_at) < LEAST_TOKEN_LIFE_TIME
|
|
|
|
true
|
|
end
|
|
|
|
def projects_zones_clusters_get(project_id, zone, cluster_id)
|
|
service = Google::Apis::ContainerV1::ContainerService.new
|
|
service.authorization = access_token
|
|
|
|
service.get_zone_cluster(project_id, zone, cluster_id, options: user_agent_header)
|
|
end
|
|
|
|
def projects_zones_clusters_create(project_id, zone, cluster_name, cluster_size, machine_type:, legacy_abac:, enable_addons: [])
|
|
service = Google::Apis::ContainerV1beta1::ContainerService.new
|
|
service.authorization = access_token
|
|
|
|
cluster_options = make_cluster_options(cluster_name, cluster_size, machine_type, legacy_abac, enable_addons)
|
|
|
|
request_body = Google::Apis::ContainerV1beta1::CreateClusterRequest.new(**cluster_options)
|
|
|
|
service.create_cluster(project_id, zone, request_body, options: user_agent_header)
|
|
end
|
|
|
|
def projects_zones_operations(project_id, zone, operation_id)
|
|
service = Google::Apis::ContainerV1::ContainerService.new
|
|
service.authorization = access_token
|
|
|
|
service.get_zone_operation(project_id, zone, operation_id, options: user_agent_header)
|
|
end
|
|
|
|
def parse_operation_id(self_link)
|
|
m = self_link.match(%r{projects/.*/zones/.*/operations/(.*)})
|
|
m[1] if m
|
|
end
|
|
|
|
def list_projects
|
|
result = []
|
|
|
|
response = cloud_resource_manager_service.fetch_all(items: :projects) do |token|
|
|
cloud_resource_manager_service.list_projects
|
|
end
|
|
|
|
# Google API results are paged by default, so we need to iterate through
|
|
response.each do |project|
|
|
result.append(project)
|
|
end
|
|
|
|
result.sort_by(&:project_id)
|
|
end
|
|
|
|
def create_service_account(gcp_project_id, display_name, description)
|
|
name = "projects/#{gcp_project_id}"
|
|
|
|
# initialize google iam service
|
|
service = Google::Apis::IamV1::IamService.new
|
|
service.authorization = access_token
|
|
|
|
# generate account id
|
|
random_account_id = "gitlab-" + SecureRandom.hex(11)
|
|
|
|
body_params = { account_id: random_account_id,
|
|
service_account: { display_name: display_name,
|
|
description: description } }
|
|
|
|
request_body = Google::Apis::IamV1::CreateServiceAccountRequest.new(**body_params)
|
|
service.create_service_account(name, request_body)
|
|
end
|
|
|
|
def create_service_account_key(gcp_project_id, service_account_id)
|
|
service = Google::Apis::IamV1::IamService.new
|
|
service.authorization = access_token
|
|
|
|
name = "projects/#{gcp_project_id}/serviceAccounts/#{service_account_id}"
|
|
request_body = Google::Apis::IamV1::CreateServiceAccountKeyRequest.new
|
|
service.create_service_account_key(name, request_body)
|
|
end
|
|
|
|
def grant_service_account_roles(gcp_project_id, email)
|
|
body = policy_request_body(gcp_project_id, email)
|
|
cloud_resource_manager_service.set_project_iam_policy(gcp_project_id, body)
|
|
end
|
|
|
|
def enable_cloud_run(gcp_project_id)
|
|
enable_service(gcp_project_id, 'run.googleapis.com')
|
|
end
|
|
|
|
def enable_artifacts_registry(gcp_project_id)
|
|
enable_service(gcp_project_id, 'artifactregistry.googleapis.com')
|
|
end
|
|
|
|
def enable_cloud_build(gcp_project_id)
|
|
enable_service(gcp_project_id, 'cloudbuild.googleapis.com')
|
|
end
|
|
|
|
def enable_cloud_sql_admin(gcp_project_id)
|
|
enable_service(gcp_project_id, 'sqladmin.googleapis.com')
|
|
end
|
|
|
|
def enable_compute(gcp_project_id)
|
|
enable_service(gcp_project_id, 'compute.googleapis.com')
|
|
end
|
|
|
|
def enable_service_networking(gcp_project_id)
|
|
enable_service(gcp_project_id, 'servicenetworking.googleapis.com')
|
|
end
|
|
|
|
def revoke_authorizations
|
|
uri = URI(REVOKE_URL)
|
|
Gitlab::HTTP.post(uri, body: { 'token' => access_token })
|
|
end
|
|
|
|
def list_cloudsql_databases(gcp_project_id, instance_name)
|
|
sql_admin_service.list_databases(gcp_project_id, instance_name, options: user_agent_header)
|
|
end
|
|
|
|
def create_cloudsql_database(gcp_project_id, instance_name, database_name)
|
|
database = Google::Apis::SqladminV1beta4::Database.new(name: database_name)
|
|
sql_admin_service.insert_database(gcp_project_id, instance_name, database)
|
|
end
|
|
|
|
def list_cloudsql_users(gcp_project_id, instance_name)
|
|
sql_admin_service.list_users(gcp_project_id, instance_name, options: user_agent_header)
|
|
end
|
|
|
|
def create_cloudsql_user(gcp_project_id, instance_name, username, password)
|
|
user = Google::Apis::SqladminV1beta4::User.new
|
|
user.name = username
|
|
user.password = password
|
|
sql_admin_service.insert_user(gcp_project_id, instance_name, user)
|
|
end
|
|
|
|
def get_cloudsql_instance(gcp_project_id, instance_name)
|
|
sql_admin_service.get_instance(gcp_project_id, instance_name)
|
|
end
|
|
|
|
def create_cloudsql_instance(gcp_project_id, instance_name, root_password, database_version, region, tier)
|
|
database_instance = Google::Apis::SqladminV1beta4::DatabaseInstance.new(
|
|
name: instance_name,
|
|
root_password: root_password,
|
|
database_version: database_version,
|
|
region: region,
|
|
settings: Google::Apis::SqladminV1beta4::Settings.new(tier: tier)
|
|
)
|
|
|
|
sql_admin_service.insert_instance(gcp_project_id, database_instance)
|
|
end
|
|
|
|
private
|
|
|
|
def enable_service(gcp_project_id, service_name)
|
|
name = "projects/#{gcp_project_id}/services/#{service_name}"
|
|
service = Google::Apis::ServiceusageV1::ServiceUsageService.new
|
|
service.authorization = access_token
|
|
service.enable_service(name)
|
|
end
|
|
|
|
def make_cluster_options(cluster_name, cluster_size, machine_type, legacy_abac, enable_addons)
|
|
{
|
|
cluster: {
|
|
name: cluster_name,
|
|
initial_node_count: cluster_size,
|
|
node_config: {
|
|
machine_type: machine_type,
|
|
oauth_scopes: CLUSTER_OAUTH_SCOPES
|
|
},
|
|
master_auth: {
|
|
client_certificate_config: {
|
|
issue_client_certificate: true
|
|
}
|
|
},
|
|
legacy_abac: {
|
|
enabled: legacy_abac
|
|
},
|
|
ip_allocation_policy: {
|
|
use_ip_aliases: true,
|
|
cluster_ipv4_cidr_block: CLUSTER_IPV4_CIDR_BLOCK
|
|
},
|
|
addons_config: make_addons_config(enable_addons)
|
|
}
|
|
}
|
|
end
|
|
|
|
def make_addons_config(enable_addons)
|
|
enable_addons.each_with_object({}) do |addon, hash|
|
|
hash[addon] = { disabled: false }
|
|
end
|
|
end
|
|
|
|
def token_life_time(expires_at)
|
|
DateTime.strptime(expires_at, '%s').to_time.utc - Time.now.utc
|
|
end
|
|
|
|
def user_agent_header
|
|
Google::Apis::RequestOptions.new.tap do |options|
|
|
options.header = { 'User-Agent': "GitLab/#{Gitlab::VERSION.match('(\d+\.\d+)').captures.first} (GPN:GitLab;)" }
|
|
end
|
|
end
|
|
|
|
def policy_request_body(gcp_project_id, email)
|
|
policy = cloud_resource_manager_service.get_project_iam_policy(gcp_project_id)
|
|
policy.bindings = policy.bindings + additional_policy_bindings("serviceAccount:#{email}")
|
|
|
|
Google::Apis::CloudresourcemanagerV1::SetIamPolicyRequest.new(policy: policy)
|
|
end
|
|
|
|
def additional_policy_bindings(member)
|
|
ROLES_LIST.map do |role|
|
|
Google::Apis::CloudresourcemanagerV1::Binding.new(role: role, members: [member])
|
|
end
|
|
end
|
|
|
|
def cloud_resource_manager_service
|
|
@gpc_service ||= Google::Apis::CloudresourcemanagerV1::CloudResourceManagerService.new.tap { |s| s.authorization = access_token }
|
|
end
|
|
|
|
def sql_admin_service
|
|
@sql_admin_service ||= Google::Apis::SqladminV1beta4::SQLAdminService.new.tap { |s| s.authorization = access_token }
|
|
end
|
|
end
|
|
end
|
|
end
|