PageRenderTime 25ms CodeModel.GetById 16ms RepoModel.GetById 0ms app.codeStats 0ms

/lib/google_api/cloud_platform/client.rb

https://gitlab.com/realsatomic/gitlab
Ruby | 224 lines | 174 code | 45 blank | 5 comment | 2 complexity | f69dfab99eaf1ffabb42c9d45529f5be MD5 | raw file
  1. # frozen_string_literal: true
  2. require 'securerandom'
  3. require 'google/apis/compute_v1'
  4. require 'google/apis/container_v1'
  5. require 'google/apis/container_v1beta1'
  6. require 'google/apis/cloudbilling_v1'
  7. require 'google/apis/cloudresourcemanager_v1'
  8. require 'google/apis/iam_v1'
  9. require 'google/apis/serviceusage_v1'
  10. module GoogleApi
  11. module CloudPlatform
  12. class Client < GoogleApi::Auth
  13. SCOPE = 'https://www.googleapis.com/auth/cloud-platform https://www.googleapis.com/auth/service.management'
  14. LEAST_TOKEN_LIFE_TIME = 10.minutes
  15. CLUSTER_MASTER_AUTH_USERNAME = 'admin'
  16. CLUSTER_IPV4_CIDR_BLOCK = '/16'
  17. CLUSTER_OAUTH_SCOPES = [
  18. "https://www.googleapis.com/auth/devstorage.read_only",
  19. "https://www.googleapis.com/auth/logging.write",
  20. "https://www.googleapis.com/auth/monitoring"
  21. ].freeze
  22. ROLES_LIST = %w[roles/iam.serviceAccountUser roles/artifactregistry.admin roles/cloudbuild.builds.builder roles/run.admin roles/storage.admin roles/cloudsql.admin roles/browser].freeze
  23. REVOKE_URL = 'https://oauth2.googleapis.com/revoke'
  24. class << self
  25. def session_key_for_token
  26. :cloud_platform_access_token
  27. end
  28. def session_key_for_expires_at
  29. :cloud_platform_expires_at
  30. end
  31. def new_session_key_for_redirect_uri
  32. SecureRandom.hex.tap do |state|
  33. yield session_key_for_redirect_uri(state)
  34. end
  35. end
  36. def session_key_for_redirect_uri(state)
  37. "cloud_platform_second_redirect_uri_#{state}"
  38. end
  39. end
  40. def scope
  41. SCOPE
  42. end
  43. def validate_token(expires_at)
  44. return false unless access_token
  45. return false unless expires_at
  46. # Making sure that the token will have been still alive during the cluster creation.
  47. return false if token_life_time(expires_at) < LEAST_TOKEN_LIFE_TIME
  48. true
  49. end
  50. def projects_zones_clusters_get(project_id, zone, cluster_id)
  51. service = Google::Apis::ContainerV1::ContainerService.new
  52. service.authorization = access_token
  53. service.get_zone_cluster(project_id, zone, cluster_id, options: user_agent_header)
  54. end
  55. def projects_zones_clusters_create(project_id, zone, cluster_name, cluster_size, machine_type:, legacy_abac:, enable_addons: [])
  56. service = Google::Apis::ContainerV1beta1::ContainerService.new
  57. service.authorization = access_token
  58. cluster_options = make_cluster_options(cluster_name, cluster_size, machine_type, legacy_abac, enable_addons)
  59. request_body = Google::Apis::ContainerV1beta1::CreateClusterRequest.new(**cluster_options)
  60. service.create_cluster(project_id, zone, request_body, options: user_agent_header)
  61. end
  62. def projects_zones_operations(project_id, zone, operation_id)
  63. service = Google::Apis::ContainerV1::ContainerService.new
  64. service.authorization = access_token
  65. service.get_zone_operation(project_id, zone, operation_id, options: user_agent_header)
  66. end
  67. def parse_operation_id(self_link)
  68. m = self_link.match(%r{projects/.*/zones/.*/operations/(.*)})
  69. m[1] if m
  70. end
  71. def list_projects
  72. result = []
  73. response = cloud_resource_manager_service.fetch_all(items: :projects) do |token|
  74. cloud_resource_manager_service.list_projects
  75. end
  76. # Google API results are paged by default, so we need to iterate through
  77. response.each do |project|
  78. result.append(project)
  79. end
  80. result
  81. end
  82. def create_service_account(gcp_project_id, display_name, description)
  83. name = "projects/#{gcp_project_id}"
  84. # initialize google iam service
  85. service = Google::Apis::IamV1::IamService.new
  86. service.authorization = access_token
  87. # generate account id
  88. random_account_id = "gitlab-" + SecureRandom.hex(11)
  89. body_params = { account_id: random_account_id,
  90. service_account: { display_name: display_name,
  91. description: description } }
  92. request_body = Google::Apis::IamV1::CreateServiceAccountRequest.new(**body_params)
  93. service.create_service_account(name, request_body)
  94. end
  95. def create_service_account_key(gcp_project_id, service_account_id)
  96. service = Google::Apis::IamV1::IamService.new
  97. service.authorization = access_token
  98. name = "projects/#{gcp_project_id}/serviceAccounts/#{service_account_id}"
  99. request_body = Google::Apis::IamV1::CreateServiceAccountKeyRequest.new
  100. service.create_service_account_key(name, request_body)
  101. end
  102. def grant_service_account_roles(gcp_project_id, email)
  103. body = policy_request_body(gcp_project_id, email)
  104. cloud_resource_manager_service.set_project_iam_policy(gcp_project_id, body)
  105. end
  106. def enable_cloud_run(gcp_project_id)
  107. enable_service(gcp_project_id, 'run.googleapis.com')
  108. end
  109. def enable_artifacts_registry(gcp_project_id)
  110. enable_service(gcp_project_id, 'artifactregistry.googleapis.com')
  111. end
  112. def enable_cloud_build(gcp_project_id)
  113. enable_service(gcp_project_id, 'cloudbuild.googleapis.com')
  114. end
  115. def revoke_authorizations
  116. uri = URI(REVOKE_URL)
  117. Gitlab::HTTP.post(uri, body: { 'token' => access_token })
  118. end
  119. private
  120. def enable_service(gcp_project_id, service_name)
  121. name = "projects/#{gcp_project_id}/services/#{service_name}"
  122. service = Google::Apis::ServiceusageV1::ServiceUsageService.new
  123. service.authorization = access_token
  124. service.enable_service(name)
  125. end
  126. def make_cluster_options(cluster_name, cluster_size, machine_type, legacy_abac, enable_addons)
  127. {
  128. cluster: {
  129. name: cluster_name,
  130. initial_node_count: cluster_size,
  131. node_config: {
  132. machine_type: machine_type,
  133. oauth_scopes: CLUSTER_OAUTH_SCOPES
  134. },
  135. master_auth: {
  136. client_certificate_config: {
  137. issue_client_certificate: true
  138. }
  139. },
  140. legacy_abac: {
  141. enabled: legacy_abac
  142. },
  143. ip_allocation_policy: {
  144. use_ip_aliases: true,
  145. cluster_ipv4_cidr_block: CLUSTER_IPV4_CIDR_BLOCK
  146. },
  147. addons_config: make_addons_config(enable_addons)
  148. }
  149. }
  150. end
  151. def make_addons_config(enable_addons)
  152. enable_addons.each_with_object({}) do |addon, hash|
  153. hash[addon] = { disabled: false }
  154. end
  155. end
  156. def token_life_time(expires_at)
  157. DateTime.strptime(expires_at, '%s').to_time.utc - Time.now.utc
  158. end
  159. def user_agent_header
  160. Google::Apis::RequestOptions.new.tap do |options|
  161. options.header = { 'User-Agent': "GitLab/#{Gitlab::VERSION.match('(\d+\.\d+)').captures.first} (GPN:GitLab;)" }
  162. end
  163. end
  164. def policy_request_body(gcp_project_id, email)
  165. policy = cloud_resource_manager_service.get_project_iam_policy(gcp_project_id)
  166. policy.bindings = policy.bindings + additional_policy_bindings("serviceAccount:#{email}")
  167. Google::Apis::CloudresourcemanagerV1::SetIamPolicyRequest.new(policy: policy)
  168. end
  169. def additional_policy_bindings(member)
  170. ROLES_LIST.map do |role|
  171. Google::Apis::CloudresourcemanagerV1::Binding.new(role: role, members: [member])
  172. end
  173. end
  174. def cloud_resource_manager_service
  175. @gpc_service ||= Google::Apis::CloudresourcemanagerV1::CloudResourceManagerService.new.tap { |s| s.authorization = access_token }
  176. end
  177. end
  178. end
  179. end