-
Notifications
You must be signed in to change notification settings - Fork 155
/
hetzner.go
161 lines (132 loc) · 5.2 KB
/
hetzner.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
/*
Copyright 2020 The Kubermatic Kubernetes Platform contributors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package provider
import (
"context"
"fmt"
"net/http"
"regexp"
"github.com/hetznercloud/hcloud-go/hcloud"
apiv1 "k8c.io/kubermatic/v2/pkg/api/v1"
kubermaticv1 "k8c.io/kubermatic/v2/pkg/apis/kubermatic/v1"
handlercommon "k8c.io/kubermatic/v2/pkg/handler/common"
"k8c.io/kubermatic/v2/pkg/handler/middleware"
"k8c.io/kubermatic/v2/pkg/handler/v1/common"
"k8c.io/kubermatic/v2/pkg/provider"
"k8c.io/kubermatic/v2/pkg/provider/cloud/hetzner"
kubernetesprovider "k8c.io/kubermatic/v2/pkg/provider/kubernetes"
utilerrors "k8c.io/kubermatic/v2/pkg/util/errors"
)
var reStandardSize = regexp.MustCompile("(^cx|^cpx)")
var reDedicatedSize = regexp.MustCompile("(^ccx)")
func HetznerSizeWithClusterCredentialsEndpoint(ctx context.Context, userInfoGetter provider.UserInfoGetter, projectProvider provider.ProjectProvider, privilegedProjectProvider provider.PrivilegedProjectProvider, settingsProvider provider.SettingsProvider, projectID, clusterID string) (interface{}, error) {
clusterProvider := ctx.Value(middleware.ClusterProviderContextKey).(provider.ClusterProvider)
cluster, err := handlercommon.GetCluster(ctx, projectProvider, privilegedProjectProvider, userInfoGetter, projectID, clusterID, &provider.ClusterGetOptions{CheckInitStatus: true})
if err != nil {
return nil, err
}
if cluster.Spec.Cloud.Hetzner == nil {
return nil, utilerrors.NewNotFound("cloud spec for ", clusterID)
}
assertedClusterProvider, ok := clusterProvider.(*kubernetesprovider.ClusterProvider)
if !ok {
return nil, utilerrors.New(http.StatusInternalServerError, "failed to assert clusterProvider")
}
secretKeySelector := provider.SecretKeySelectorValueFuncFactory(ctx, assertedClusterProvider.GetSeedClusterAdminRuntimeClient())
hetznerToken, err := hetzner.GetCredentialsForCluster(cluster.Spec.Cloud, secretKeySelector)
if err != nil {
return nil, err
}
settings, err := settingsProvider.GetGlobalSettings(ctx)
if err != nil {
return nil, common.KubernetesErrorToHTTPError(err)
}
return HetznerSize(ctx, settings.Spec.MachineDeploymentVMResourceQuota, hetznerToken)
}
func HetznerSize(ctx context.Context, quota kubermaticv1.MachineDeploymentVMResourceQuota, token string) (apiv1.HetznerSizeList, error) {
client := hcloud.NewClient(hcloud.WithToken(token))
listOptions := hcloud.ServerTypeListOpts{
ListOpts: hcloud.ListOpts{
Page: 1,
PerPage: 1000,
},
}
sizes, _, err := client.ServerType.List(ctx, listOptions)
if err != nil {
return apiv1.HetznerSizeList{}, fmt.Errorf("failed to list sizes: %w", err)
}
sizeList := apiv1.HetznerSizeList{}
for _, size := range sizes {
s := apiv1.HetznerSize{
ID: size.ID,
Name: size.Name,
Description: size.Description,
Cores: size.Cores,
Memory: size.Memory,
Disk: size.Disk,
}
switch {
case reStandardSize.MatchString(size.Name):
sizeList.Standard = append(sizeList.Standard, s)
case reDedicatedSize.MatchString(size.Name):
sizeList.Dedicated = append(sizeList.Dedicated, s)
}
}
return filterHetznerByQuota(sizeList, quota), nil
}
func filterHetznerByQuota(instances apiv1.HetznerSizeList, quota kubermaticv1.MachineDeploymentVMResourceQuota) apiv1.HetznerSizeList {
filteredRecords := apiv1.HetznerSizeList{
Standard: []apiv1.HetznerSize{},
Dedicated: []apiv1.HetznerSize{},
}
// Range over the records and apply all the filters to each record.
// If the record passes all the filters, add it to the final slice.
for _, r := range instances.Standard {
keep := true
if !handlercommon.FilterCPU(r.Cores, quota.MinCPU, quota.MaxCPU) {
keep = false
}
if !handlercommon.FilterMemory(int(r.Memory), quota.MinRAM, quota.MaxRAM) {
keep = false
}
if keep {
filteredRecords.Standard = append(filteredRecords.Standard, r)
}
}
for _, r := range instances.Dedicated {
keep := true
if !handlercommon.FilterCPU(r.Cores, quota.MinCPU, quota.MaxCPU) {
keep = false
}
if !handlercommon.FilterMemory(int(r.Memory), quota.MinRAM, quota.MaxRAM) {
keep = false
}
if keep {
filteredRecords.Dedicated = append(filteredRecords.Dedicated, r)
}
}
return filteredRecords
}
func GetHetznerServerType(ctx context.Context, token string, serverTypeName string) (*hcloud.ServerType, error) {
if token == "" {
return nil, fmt.Errorf("hetzner token cannot be empty")
} else if serverTypeName == "" {
return nil, fmt.Errorf("invalid hetzner serverTypeName:%v", serverTypeName)
}
hClient := hcloud.NewClient(hcloud.WithToken(token))
serverType, _, err := hClient.ServerType.Get(ctx, serverTypeName)
if err != nil {
return nil, fmt.Errorf("failed to get hetzner server type, error: %w", err)
}
return serverType, nil
}