kubes_google 0.3.0 → 0.3.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +16 -0
- data/lib/hooks/kubes.rb +11 -3
- data/lib/kubes_google.rb +4 -0
- data/lib/kubes_google/config.rb +6 -0
- data/lib/kubes_google/gke.rb +29 -8
- data/lib/kubes_google/secrets/fetcher.rb +9 -28
- data/lib/kubes_google/secrets/fetcher/base.rb +15 -0
- data/lib/kubes_google/secrets/fetcher/gcloud.rb +21 -0
- data/lib/kubes_google/secrets/fetcher/sdk.rb +47 -0
- data/lib/kubes_google/service_account.rb +1 -20
- data/lib/kubes_google/util/sh.rb +23 -0
- data/lib/kubes_google/version.rb +1 -1
- metadata +6 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c4940b31e1e64807b1036d0980ab6c1ebe81aa6f05581b1e2d00b3bf915d12c0
|
4
|
+
data.tar.gz: 6761294987f6c33fef1d9764712bab015b7b264fa8e5b84c166a633f03bc44aa
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 4c09463d4a76e82240502a5779e90a9874b9c91d4f195f91af128fa48a134b44a9485a5c327fad74826834edd57e0137ebd9375558f4253ec0ca5242610061a7
|
7
|
+
data.tar.gz: a7ecffa4255c71544b92fd5df88bac16a5a06eb4e2c8e48eed9d9b1f61a12c98f18c3c6edd8f92aef51ffeb595605a9cccb578a42dbc810b89fc9eeb9a97fe02
|
data/CHANGELOG.md
CHANGED
@@ -3,6 +3,22 @@
|
|
3
3
|
All notable changes to this project will be documented in this file.
|
4
4
|
This project *loosely tries* to adhere to [Semantic Versioning](http://semver.org/), even before v1.0.
|
5
5
|
|
6
|
+
## [0.3.5] - 2020-11-12
|
7
|
+
- add KubesGoogle.cloudbuild? check
|
8
|
+
- fetcher sdk friendly suggestion to use gcloud when vpn errors
|
9
|
+
|
10
|
+
## [0.3.4] - 2020-11-12
|
11
|
+
- fix KubesGoogle.config.secrets.fetcher check
|
12
|
+
|
13
|
+
## [0.3.3] - 2020-11-12
|
14
|
+
- [#6](https://github.com/boltops-tools/kubes_google/pull/6) sdk and gcloud secrets fetcher strategy: secrets.fetcher option
|
15
|
+
|
16
|
+
## [0.3.2] - 2020-11-11
|
17
|
+
- [#5](https://github.com/boltops-tools/kubes_google/pull/5) config.base64 option
|
18
|
+
|
19
|
+
## [0.3.1] - 2020-11-11
|
20
|
+
- [#4](https://github.com/boltops-tools/kubes_google/pull/4) get_credentials hook
|
21
|
+
|
6
22
|
## [0.3.0]
|
7
23
|
- #3 gke hook to whitelist ip
|
8
24
|
|
data/lib/hooks/kubes.rb
CHANGED
@@ -1,14 +1,22 @@
|
|
1
1
|
gke = KubesGoogle::Gke.new(
|
2
|
-
|
2
|
+
cluster_name: KubesGoogle.config.gke.cluster_name,
|
3
|
+
google_region: KubesGoogle.config.gke.google_region,
|
4
|
+
google_project: KubesGoogle.config.gke.google_project,
|
5
|
+
enable_get_credentials: KubesGoogle.config.gke.enable_get_credentials,
|
3
6
|
whitelist_ip: KubesGoogle.config.gke.whitelist_ip,
|
4
7
|
)
|
5
8
|
|
9
|
+
before("apply",
|
10
|
+
label: "gke get-credentials hook",
|
11
|
+
execute: gke.method(:get_credentials).to_proc,
|
12
|
+
) if gke.get_credentials_enabled?
|
13
|
+
|
6
14
|
before("apply",
|
7
15
|
label: "gke whitelist hook",
|
8
16
|
execute: gke.method(:allow).to_proc,
|
9
|
-
)
|
17
|
+
) if gke.enabled?
|
10
18
|
|
11
19
|
after("apply",
|
12
20
|
label: "gke whitelist hook",
|
13
21
|
execute: gke.method(:deny).to_proc,
|
14
|
-
)
|
22
|
+
) if gke.enabled?
|
data/lib/kubes_google.rb
CHANGED
data/lib/kubes_google/config.rb
CHANGED
@@ -6,8 +6,14 @@ module KubesGoogle
|
|
6
6
|
c = ActiveSupport::OrderedOptions.new
|
7
7
|
c.gke = ActiveSupport::OrderedOptions.new
|
8
8
|
c.gke.cluster_name = nil
|
9
|
+
c.gke.enable_get_credentials = nil
|
9
10
|
c.gke.enable_hooks = nil # nil since need cluster_name also. setting to false will explicitly disable hooks
|
11
|
+
c.gke.google_project = nil
|
12
|
+
c.gke.google_region = nil
|
10
13
|
c.gke.whitelist_ip = nil # default will auto-detect IP
|
14
|
+
c.secrets = ActiveSupport::OrderedOptions.new
|
15
|
+
c.secrets.fetcher = "sdk"
|
16
|
+
c.secrets.base64 = true
|
11
17
|
c
|
12
18
|
end
|
13
19
|
|
data/lib/kubes_google/gke.rb
CHANGED
@@ -5,35 +5,56 @@ module KubesGoogle
|
|
5
5
|
extend Memoist
|
6
6
|
include Logging
|
7
7
|
include Services
|
8
|
+
include Util::Sh
|
8
9
|
|
9
|
-
def initialize(
|
10
|
-
|
10
|
+
def initialize(cluster_name:,
|
11
|
+
enable_get_credentials: false,
|
12
|
+
google_project: nil,
|
13
|
+
google_region: "us-central1",
|
14
|
+
whitelist_ip: nil)
|
15
|
+
@cluster_name = cluster_name
|
16
|
+
@enable_get_credentials = enable_get_credentials
|
17
|
+
@google_project = ENV['GOOGLE_PROJECT'] || google_project
|
18
|
+
@google_region = ENV['GOOGLE_REGION'] || google_region
|
19
|
+
@whitelist_ip = whitelist_ip
|
11
20
|
end
|
12
21
|
|
13
22
|
def allow
|
14
|
-
return unless enabled?
|
15
23
|
logger.debug "Updating cluster. Adding IP: #{ip}"
|
16
24
|
update_cluster(cidr_blocks(:with_whitelist))
|
17
25
|
end
|
18
26
|
|
19
27
|
def deny
|
20
|
-
return unless enabled?
|
21
28
|
logger.debug "Updating cluster. Removing IP: #{ip}"
|
22
29
|
update_cluster(cidr_blocks(:without_whitelist))
|
23
30
|
end
|
24
31
|
|
25
|
-
|
32
|
+
def get_credentials
|
33
|
+
return unless get_credentials_enabled?
|
34
|
+
sh "gcloud container clusters get-credentials --project=#{@google_project} --region=#{@google_region} #{@cluster_name}"
|
35
|
+
end
|
36
|
+
|
37
|
+
def full_name
|
38
|
+
"projects/#{@google_project}/locations/#{@google_region}/clusters/#{@cluster_name}"
|
39
|
+
end
|
40
|
+
|
26
41
|
def enabled?
|
27
42
|
enable = KubesGoogle.config.gke.enable_hooks
|
28
43
|
enable = enable.nil? ? true : enable
|
29
44
|
# gke = KubesGoogle::Gke.new(name: KubesGoogle.config.gke.cluster_name)
|
30
45
|
# so @name = KubesGoogle.config.gke.cluster_name
|
31
|
-
!!(enable && @
|
46
|
+
!!(enable && @cluster_name)
|
47
|
+
end
|
48
|
+
|
49
|
+
def get_credentials_enabled?
|
50
|
+
enable = KubesGoogle.config.gke.enable_get_credentials
|
51
|
+
enable = enable.nil? ? false : enable
|
52
|
+
!!(enable && full_name)
|
32
53
|
end
|
33
54
|
|
34
55
|
def update_cluster(cidr_blocks)
|
35
56
|
resp = cluster_manager.update_cluster(
|
36
|
-
name:
|
57
|
+
name: full_name,
|
37
58
|
update: {
|
38
59
|
desired_master_authorized_networks_config: {
|
39
60
|
cidr_blocks: cidr_blocks,
|
@@ -67,7 +88,7 @@ module KubesGoogle
|
|
67
88
|
end
|
68
89
|
|
69
90
|
def old_cidrs
|
70
|
-
resp = cluster_manager.get_cluster(name:
|
91
|
+
resp = cluster_manager.get_cluster(name: full_name)
|
71
92
|
config = resp.master_authorized_networks_config.to_h
|
72
93
|
config[:cidr_blocks]
|
73
94
|
end
|
@@ -1,41 +1,22 @@
|
|
1
1
|
class KubesGoogle::Secrets
|
2
2
|
class Fetcher
|
3
|
-
|
4
|
-
include KubesGoogle::Services
|
3
|
+
extend Memoist
|
5
4
|
|
6
5
|
def initialize(options={})
|
7
6
|
@options = options
|
8
|
-
@base64 = options[:base64].nil? ? true : options[:base64]
|
9
|
-
@project_id = ENV['GOOGLE_PROJECT'] || raise("GOOGLE_PROJECT env variable is not set. It's required.")
|
10
7
|
end
|
11
8
|
|
12
9
|
def fetch(short_name)
|
13
|
-
|
14
|
-
value = Base64.strict_encode64(value).strip if @base64
|
15
|
-
value
|
10
|
+
fetcher.fetch(short_name)
|
16
11
|
end
|
17
12
|
|
18
|
-
def
|
19
|
-
|
20
|
-
|
21
|
-
|
22
|
-
|
23
|
-
|
24
|
-
logger.info e.message
|
25
|
-
"NOT FOUND #{name}" # simple string so Kubernetes YAML is valid
|
26
|
-
end
|
27
|
-
|
28
|
-
# TODO: Get the project from the list project api instead. Unsure where the docs are for this.
|
29
|
-
# If someone knows, let me know.
|
30
|
-
# Right now grabbing the first secret to then be able to get the google project number
|
31
|
-
@@project_number = nil
|
32
|
-
def project_number
|
33
|
-
return @@project_number if @@project_number
|
34
|
-
|
35
|
-
parent = "projects/#{@project_id}"
|
36
|
-
resp = secret_manager_service.list_secrets(parent: parent) # note: page_size doesnt seem to get respected
|
37
|
-
name = resp.first.name # IE: projects/686010496118/secrets/demo-dev-db_host
|
38
|
-
@@project_number = name.split('/')[1]
|
13
|
+
def fetcher
|
14
|
+
if KubesGoogle.config.secrets.fetcher == "sdk"
|
15
|
+
Sdk.new(@options)
|
16
|
+
else
|
17
|
+
Gcloud.new(@options)
|
18
|
+
end
|
39
19
|
end
|
20
|
+
memoize :fetcher
|
40
21
|
end
|
41
22
|
end
|
@@ -0,0 +1,15 @@
|
|
1
|
+
class KubesGoogle::Secrets::Fetcher
|
2
|
+
class Base
|
3
|
+
include KubesGoogle::Logging
|
4
|
+
|
5
|
+
def initialize(options={})
|
6
|
+
@options = options
|
7
|
+
@base64 = options[:base64]
|
8
|
+
@project_id = options[:google_project] || ENV['GOOGLE_PROJECT'] || raise("GOOGLE_PROJECT env variable is not set. It's required.")
|
9
|
+
end
|
10
|
+
|
11
|
+
def base64?
|
12
|
+
@base64.nil? ? KubesGoogle.config.secrets.base64 : @base64
|
13
|
+
end
|
14
|
+
end
|
15
|
+
end
|
@@ -0,0 +1,21 @@
|
|
1
|
+
class KubesGoogle::Secrets::Fetcher
|
2
|
+
class Gcloud < Base
|
3
|
+
include KubesGoogle::Util::Sh
|
4
|
+
|
5
|
+
def fetch(short_name, version="latest")
|
6
|
+
value = gcloud("secrets versions access #{version} --secret #{short_name}")
|
7
|
+
if value.include?("ERROR") && value.include?("NOT_FOUND")
|
8
|
+
logger.info "WARN: secret #{short_name} not found".color(:yellow)
|
9
|
+
logger.info e.message
|
10
|
+
"NOT FOUND #{short_name}" # simple string so Kubernetes YAML is valid
|
11
|
+
else
|
12
|
+
value = Base64.strict_encode64(value).strip if base64?
|
13
|
+
value
|
14
|
+
end
|
15
|
+
end
|
16
|
+
|
17
|
+
def gcloud(args)
|
18
|
+
capture("gcloud --project #{@project_id} #{args}")
|
19
|
+
end
|
20
|
+
end
|
21
|
+
end
|
@@ -0,0 +1,47 @@
|
|
1
|
+
class KubesGoogle::Secrets::Fetcher
|
2
|
+
class Sdk < Base
|
3
|
+
include KubesGoogle::Services
|
4
|
+
|
5
|
+
def fetch(short_name, version="latest")
|
6
|
+
value = fetch_value(short_name, version)
|
7
|
+
value = Base64.strict_encode64(value).strip if base64?
|
8
|
+
value
|
9
|
+
end
|
10
|
+
|
11
|
+
def fetch_value(short_name, version="latest")
|
12
|
+
name = "projects/#{project_number}/secrets/#{short_name}/versions/#{version}"
|
13
|
+
version = secret_manager_service.access_secret_version(name: name)
|
14
|
+
version.payload.data
|
15
|
+
rescue Google::Cloud::NotFoundError => e
|
16
|
+
logger.info "WARN: secret #{name} not found".color(:yellow)
|
17
|
+
logger.info e.message
|
18
|
+
"NOT FOUND #{name}" # simple string so Kubernetes YAML is valid
|
19
|
+
end
|
20
|
+
|
21
|
+
# TODO: Get the project from the list project api instead. Unsure where the docs are for this.
|
22
|
+
# If someone knows, let me know.
|
23
|
+
# Right now grabbing the first secret to then be able to get the google project number
|
24
|
+
@@project_number = nil
|
25
|
+
def project_number
|
26
|
+
return @@project_number if @@project_number
|
27
|
+
|
28
|
+
parent = "projects/#{@project_id}"
|
29
|
+
resp = secret_manager_service.list_secrets(parent: parent) # note: page_size doesnt seem to get respected
|
30
|
+
name = resp.first.name # IE: projects/686010496118/secrets/demo-dev-db_host
|
31
|
+
@@project_number = name.split('/')[1]
|
32
|
+
rescue Google::Cloud::UnavailableError => e
|
33
|
+
logger.error "ERROR: #{e.message}"
|
34
|
+
if e.message.include?("failed to connect")
|
35
|
+
logger.info <<~EOL
|
36
|
+
SSL Handshake failed. This error seems to happen with some VPN setups.
|
37
|
+
Please try the gcloud fetcher instead. To set up see:
|
38
|
+
|
39
|
+
https://kubes.guru/docs/helpers/google/secrets/#fetcher-strategy
|
40
|
+
EOL
|
41
|
+
exit 1
|
42
|
+
else
|
43
|
+
raise
|
44
|
+
end
|
45
|
+
end
|
46
|
+
end
|
47
|
+
end
|
@@ -4,6 +4,7 @@ require "json"
|
|
4
4
|
module KubesGoogle
|
5
5
|
class ServiceAccount
|
6
6
|
include Logging
|
7
|
+
include Util::Sh
|
7
8
|
|
8
9
|
def initialize(app:, namespace:nil, roles: [], gsa: nil, ksa: nil)
|
9
10
|
@app, @roles = app, roles
|
@@ -71,25 +72,5 @@ module KubesGoogle
|
|
71
72
|
--member=serviceAccount:#{@service_account} \
|
72
73
|
--role=#{role} > /dev/null".squish
|
73
74
|
end
|
74
|
-
|
75
|
-
private
|
76
|
-
def sh(command)
|
77
|
-
logger.debug "=> #{command}"
|
78
|
-
success = system(command)
|
79
|
-
unless success
|
80
|
-
logger.info "WARN: Running #{command}"
|
81
|
-
end
|
82
|
-
success
|
83
|
-
end
|
84
|
-
|
85
|
-
def capture(command)
|
86
|
-
out = `#{command}`
|
87
|
-
unless $?.exitstatus == 0
|
88
|
-
logger.info "ERROR: Running #{command}"
|
89
|
-
logger.info out
|
90
|
-
exit 1
|
91
|
-
end
|
92
|
-
out
|
93
|
-
end
|
94
75
|
end
|
95
76
|
end
|
@@ -0,0 +1,23 @@
|
|
1
|
+
module KubesGoogle::Util
|
2
|
+
module Sh
|
3
|
+
private
|
4
|
+
def sh(command)
|
5
|
+
logger.debug "=> #{command}"
|
6
|
+
success = system(command)
|
7
|
+
unless success
|
8
|
+
logger.info "WARN: Running #{command}"
|
9
|
+
end
|
10
|
+
success
|
11
|
+
end
|
12
|
+
|
13
|
+
def capture(command)
|
14
|
+
out = `#{command}`
|
15
|
+
unless $?.exitstatus == 0
|
16
|
+
logger.info "ERROR: Running #{command}"
|
17
|
+
logger.info out
|
18
|
+
exit 1
|
19
|
+
end
|
20
|
+
out
|
21
|
+
end
|
22
|
+
end
|
23
|
+
end
|
data/lib/kubes_google/version.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: kubes_google
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.3.
|
4
|
+
version: 0.3.5
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Tung Nguyen
|
8
8
|
autorequire:
|
9
9
|
bindir: exe
|
10
10
|
cert_chain: []
|
11
|
-
date: 2020-11-
|
11
|
+
date: 2020-11-12 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: activesupport
|
@@ -119,8 +119,12 @@ files:
|
|
119
119
|
- lib/kubes_google/logging.rb
|
120
120
|
- lib/kubes_google/secrets.rb
|
121
121
|
- lib/kubes_google/secrets/fetcher.rb
|
122
|
+
- lib/kubes_google/secrets/fetcher/base.rb
|
123
|
+
- lib/kubes_google/secrets/fetcher/gcloud.rb
|
124
|
+
- lib/kubes_google/secrets/fetcher/sdk.rb
|
122
125
|
- lib/kubes_google/service_account.rb
|
123
126
|
- lib/kubes_google/services.rb
|
127
|
+
- lib/kubes_google/util/sh.rb
|
124
128
|
- lib/kubes_google/version.rb
|
125
129
|
homepage: https://github.com/boltops-tools/kubes_google
|
126
130
|
licenses:
|