mirror of
https://github.com/ansible-collections/google.cloud.git
synced 2025-04-05 02:10:27 -07:00
2469 lines
91 KiB
Python
2469 lines
91 KiB
Python
#!/usr/bin/python
|
|
# -*- coding: utf-8 -*-
|
|
#
|
|
# Copyright (C) 2017 Google
|
|
# GNU General Public License v3.0+ (see COPYING or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
# ----------------------------------------------------------------------------
|
|
#
|
|
# *** AUTO GENERATED CODE *** Type: MMv1 ***
|
|
#
|
|
# ----------------------------------------------------------------------------
|
|
#
|
|
# This file is automatically generated by Magic Modules and manual
|
|
# changes will be clobbered when the file is regenerated.
|
|
#
|
|
# Please read more about how to change this file at
|
|
# https://www.github.com/GoogleCloudPlatform/magic-modules
|
|
#
|
|
# ----------------------------------------------------------------------------
|
|
|
|
from __future__ import absolute_import, division, print_function
|
|
|
|
__metaclass__ = type
|
|
|
|
################################################################################
|
|
# Documentation
|
|
################################################################################
|
|
|
|
ANSIBLE_METADATA = {'metadata_version': '1.1', 'status': ["preview"], 'supported_by': 'community'}
|
|
|
|
DOCUMENTATION = '''
|
|
---
|
|
module: gcp_container_cluster
|
|
description:
|
|
- A Google Container Engine cluster.
|
|
short_description: Creates a GCP Cluster
|
|
author: Google Inc. (@googlecloudplatform)
|
|
requirements:
|
|
- python >= 2.6
|
|
- requests >= 2.18.4
|
|
- google-auth >= 1.3.0
|
|
options:
|
|
state:
|
|
description:
|
|
- Whether the given object should exist in GCP
|
|
choices:
|
|
- present
|
|
- absent
|
|
default: present
|
|
type: str
|
|
name:
|
|
description:
|
|
- The name of this cluster. The name must be unique within this project and location,
|
|
and can be up to 40 characters. Must be Lowercase letters, numbers, and hyphens
|
|
only. Must start with a letter. Must end with a number or a letter.
|
|
required: false
|
|
type: str
|
|
description:
|
|
description:
|
|
- An optional description of this cluster.
|
|
required: false
|
|
type: str
|
|
initial_node_count:
|
|
description:
|
|
- The number of nodes to create in this cluster. You must ensure that your Compute
|
|
Engine resource quota is sufficient for this number of instances. You must also
|
|
have available firewall and routes quota. For requests, this field should only
|
|
be used in lieu of a "nodePool" object, since this configuration (along with
|
|
the "nodeConfig") will be used to create a "NodePool" object with an auto-generated
|
|
name. Do not use this and a nodePool at the same time.
|
|
- This field has been deprecated. Please use nodePool.initial_node_count instead.
|
|
required: false
|
|
type: int
|
|
node_config:
|
|
description:
|
|
- Parameters used in creating the cluster's nodes.
|
|
- For requests, this field should only be used in lieu of a "nodePool" object,
|
|
since this configuration (along with the "initialNodeCount") will be used to
|
|
create a "NodePool" object with an auto-generated name. Do not use this and
|
|
a nodePool at the same time. For responses, this field will be populated with
|
|
the node configuration of the first node pool. If unspecified, the defaults
|
|
are used.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
machine_type:
|
|
description:
|
|
- The name of a Google Compute Engine machine type (e.g.
|
|
- n1-standard-1). If unspecified, the default machine type is n1-standard-1.
|
|
required: false
|
|
type: str
|
|
disk_size_gb:
|
|
description:
|
|
- Size of the disk attached to each node, specified in GB. The smallest allowed
|
|
disk size is 10GB. If unspecified, the default disk size is 100GB.
|
|
required: false
|
|
type: int
|
|
oauth_scopes:
|
|
description:
|
|
- The set of Google API scopes to be made available on all of the node VMs
|
|
under the "default" service account.
|
|
- 'The following scopes are recommended, but not required, and by default
|
|
are not included: U(https://www.googleapis.com/auth/compute) is required
|
|
for mounting persistent storage on your nodes.'
|
|
- U(https://www.googleapis.com/auth/devstorage.read_only) is required for
|
|
communicating with gcr.io (the Google Container Registry).
|
|
- If unspecified, no scopes are added, unless Cloud Logging or Cloud Monitoring
|
|
are enabled, in which case their required scopes will be added.
|
|
elements: str
|
|
required: false
|
|
type: list
|
|
service_account:
|
|
description:
|
|
- The Google Cloud Platform Service Account to be used by the node VMs. If
|
|
no Service Account is specified, the "default" service account is used.
|
|
required: false
|
|
type: str
|
|
metadata:
|
|
description:
|
|
- The metadata key/value pairs assigned to instances in the cluster.
|
|
- 'Keys must conform to the regexp [a-zA-Z0-9-_]+ and be less than 128 bytes
|
|
in length. These are reflected as part of a URL in the metadata server.
|
|
Additionally, to avoid ambiguity, keys must not conflict with any other
|
|
metadata keys for the project or be one of the four reserved keys: "instance-template",
|
|
"kube-env", "startup-script", and "user-data" Values are free-form strings,
|
|
and only have meaning as interpreted by the image running in the instance.
|
|
The only restriction placed on them is that each value''s size must be less
|
|
than or equal to 32 KB.'
|
|
- The total size of all keys and values must be less than 512 KB.
|
|
- 'An object containing a list of "key": value pairs.'
|
|
- 'Example: { "name": "wrench", "mass": "1.3kg", "count": "3" }.'
|
|
required: false
|
|
type: dict
|
|
image_type:
|
|
description:
|
|
- The image type to use for this node. Note that for a given image type, the
|
|
latest version of it will be used.
|
|
required: false
|
|
type: str
|
|
labels:
|
|
description:
|
|
- 'The map of Kubernetes labels (key/value pairs) to be applied to each node.
|
|
These will added in addition to any default label(s) that Kubernetes may
|
|
apply to the node. In case of conflict in label keys, the applied set may
|
|
differ depending on the Kubernetes version -- it''s best to assume the behavior
|
|
is undefined and conflicts should be avoided. For more information, including
|
|
usage and the valid values, see: U(http://kubernetes.io/v1.1/docs/user-guide/labels.html)
|
|
An object containing a list of "key": value pairs.'
|
|
- 'Example: { "name": "wrench", "mass": "1.3kg", "count": "3" }.'
|
|
required: false
|
|
type: dict
|
|
local_ssd_count:
|
|
description:
|
|
- The number of local SSD disks to be attached to the node.
|
|
- 'The limit for this value is dependant upon the maximum number of disks
|
|
available on a machine per zone. See: U(https://cloud.google.com/compute/docs/disks/local-ssd#local_ssd_limits)
|
|
for more information.'
|
|
required: false
|
|
type: int
|
|
tags:
|
|
description:
|
|
- The list of instance tags applied to all nodes. Tags are used to identify
|
|
valid sources or targets for network firewalls and are specified by the
|
|
client during cluster or node pool creation. Each tag within the list must
|
|
comply with RFC1035.
|
|
elements: str
|
|
required: false
|
|
type: list
|
|
preemptible:
|
|
description:
|
|
- 'Whether the nodes are created as preemptible VM instances. See: U(https://cloud.google.com/compute/docs/instances/preemptible)
|
|
for more information about preemptible VM instances.'
|
|
required: false
|
|
type: bool
|
|
accelerators:
|
|
description:
|
|
- A list of hardware accelerators to be attached to each node. See U(https://cloud.google.com/compute/docs/gpus)
|
|
for more information about support for GPUs.
|
|
elements: dict
|
|
required: false
|
|
type: list
|
|
suboptions:
|
|
accelerator_count:
|
|
description:
|
|
- The number of accelerator cards exposed to an instance.
|
|
required: false
|
|
type: str
|
|
accelerator_type:
|
|
description:
|
|
- The accelerator type resource name.
|
|
required: false
|
|
type: str
|
|
disk_type:
|
|
description:
|
|
- Type of the disk attached to each node (e.g. 'pd-standard' or 'pd-ssd')
|
|
If unspecified, the default disk type is 'pd-standard' .
|
|
required: false
|
|
type: str
|
|
min_cpu_platform:
|
|
description:
|
|
- Minimum CPU platform to be used by this instance. The instance may be scheduled
|
|
on the specified or newer CPU platform.
|
|
required: false
|
|
type: str
|
|
taints:
|
|
description:
|
|
- List of kubernetes taints to be applied to each node.
|
|
- 'For more information, including usage and the valid values, see: U(https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/)
|
|
.'
|
|
elements: dict
|
|
required: false
|
|
type: list
|
|
suboptions:
|
|
key:
|
|
description:
|
|
- Key for taint.
|
|
required: false
|
|
type: str
|
|
value:
|
|
description:
|
|
- Value for taint.
|
|
required: false
|
|
type: str
|
|
effect:
|
|
description:
|
|
- Effect for taint.
|
|
- 'Some valid choices include: "EFFECT_UNSPECIFIED", "NO_SCHEDULE", "PREFER_NO_SCHEDULE",
|
|
"NO_EXECUTE"'
|
|
required: false
|
|
type: str
|
|
shielded_instance_config:
|
|
description:
|
|
- Shielded Instance options.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
enable_secure_boot:
|
|
description:
|
|
- Defines whether the instance has Secure Boot enabled.
|
|
- Secure Boot helps ensure that the system only runs authentic software
|
|
by verifying the digital signature of all boot components, and halting
|
|
the boot process if signature verification fails.
|
|
required: false
|
|
type: bool
|
|
enable_integrity_monitoring:
|
|
description:
|
|
- Defines whether the instance has integrity monitoring enabled.
|
|
- Enables monitoring and attestation of the boot integrity of the instance.
|
|
- The attestation is performed against the integrity policy baseline.
|
|
This baseline is initially derived from the implicitly trusted boot
|
|
image when the instance is created.
|
|
required: false
|
|
type: bool
|
|
master_auth:
|
|
description:
|
|
- The authentication information for accessing the master endpoint.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
username:
|
|
description:
|
|
- The username to use for HTTP basic authentication to the master endpoint.
|
|
(unsupported with GKE >= 1.19).
|
|
required: false
|
|
type: str
|
|
password:
|
|
description:
|
|
- The password to use for HTTP basic authentication to the master endpoint.
|
|
Because the master endpoint is open to the Internet, you should create a
|
|
strong password with a minimum of 16 characters.
|
|
(unsupported with GKE >= 1.19).
|
|
required: false
|
|
type: str
|
|
client_certificate_config:
|
|
description:
|
|
- Configuration for client certificate authentication on the cluster. For
|
|
clusters before v1.12, if no configuration is specified, a client certificate
|
|
is issued.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
issue_client_certificate:
|
|
description:
|
|
- Issue a client certificate.
|
|
required: false
|
|
type: bool
|
|
logging_service:
|
|
description:
|
|
- 'The logging service the cluster should use to write logs. Currently available
|
|
options: logging.googleapis.com - the Google Cloud Logging service.'
|
|
- none - no logs will be exported from the cluster.
|
|
- if left as an empty string,logging.googleapis.com will be used.
|
|
- 'Some valid choices include: "logging.googleapis.com", "none"'
|
|
required: false
|
|
type: str
|
|
monitoring_service:
|
|
description:
|
|
- The monitoring service the cluster should use to write metrics.
|
|
- 'Currently available options: monitoring.googleapis.com - the Google Cloud Monitoring
|
|
service.'
|
|
- none - no metrics will be exported from the cluster.
|
|
- if left as an empty string, monitoring.googleapis.com will be used.
|
|
- 'Some valid choices include: "monitoring.googleapis.com", "none"'
|
|
required: false
|
|
type: str
|
|
network:
|
|
description:
|
|
- The name of the Google Compute Engine network to which the cluster is connected.
|
|
If left unspecified, the default network will be used.
|
|
required: false
|
|
type: str
|
|
database_encryption:
|
|
description:
|
|
- Configuration of etcd encryption.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
state:
|
|
description:
|
|
- Denotes the state of etcd encryption.
|
|
- 'Some valid choices include: "ENCRYPTED", "DECRYPTED"'
|
|
required: false
|
|
type: str
|
|
key_name:
|
|
description:
|
|
- Name of CloudKMS key to use for the encryption of secrets in etcd. Ex.
|
|
- "`projects/my-project/locations/global/keyRings/my-ring/cryptoKeys/my-key`
|
|
."
|
|
required: false
|
|
type: str
|
|
private_cluster_config:
|
|
description:
|
|
- Configuration for a private cluster.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
enable_private_nodes:
|
|
description:
|
|
- Whether nodes have internal IP addresses only. If enabled, all nodes are
|
|
given only RFC 1918 private addresses and communicate with the master via
|
|
private networking.
|
|
required: false
|
|
type: bool
|
|
enable_private_endpoint:
|
|
description:
|
|
- Whether the master's internal IP address is used as the cluster endpoint.
|
|
required: false
|
|
type: bool
|
|
master_ipv4_cidr_block:
|
|
description:
|
|
- The IP range in CIDR notation to use for the hosted master network. This
|
|
range will be used for assigning internal IP addresses to the master or
|
|
set of masters, as well as the ILB VIP. This range must not overlap with
|
|
any other ranges in use within the cluster's network.
|
|
required: false
|
|
type: str
|
|
cluster_ipv4_cidr:
|
|
description:
|
|
- The IP address range of the container pods in this cluster, in CIDR notation
|
|
(e.g. 10.96.0.0/14). Leave blank to have one automatically chosen or specify
|
|
a /14 block in 10.0.0.0/8.
|
|
required: false
|
|
type: str
|
|
enable_tpu:
|
|
description:
|
|
- "(Optional) Whether to enable Cloud TPU resources in this cluster."
|
|
- See the official documentation - U(https://cloud.google.com/tpu/docs/kubernetes-engine-setup)
|
|
.
|
|
required: false
|
|
type: bool
|
|
addons_config:
|
|
description:
|
|
- Configurations for the various addons available to run in the cluster.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
http_load_balancing:
|
|
description:
|
|
- Configuration for the HTTP (L7) load balancing controller addon, which makes
|
|
it easy to set up HTTP load balancers for services in a cluster.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
disabled:
|
|
description:
|
|
- Whether the HTTP Load Balancing controller is enabled in the cluster.
|
|
When enabled, it runs a small pod in the cluster that manages the load
|
|
balancers.
|
|
required: false
|
|
type: bool
|
|
horizontal_pod_autoscaling:
|
|
description:
|
|
- Configuration for the horizontal pod autoscaling feature, which increases
|
|
or decreases the number of replica pods a replication controller has based
|
|
on the resource usage of the existing pods.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
disabled:
|
|
description:
|
|
- Whether the Horizontal Pod Autoscaling feature is enabled in the cluster.
|
|
When enabled, it ensures that a Heapster pod is running in the cluster,
|
|
which is also used by the Cloud Monitoring service.
|
|
required: false
|
|
type: bool
|
|
network_policy_config:
|
|
description:
|
|
- Configuration for NetworkPolicy. This only tracks whether the addon is enabled
|
|
or not on the Master, it does not track whether network policy is enabled
|
|
for the nodes.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
disabled:
|
|
description:
|
|
- Whether NetworkPolicy is enabled for this cluster.
|
|
required: false
|
|
type: bool
|
|
subnetwork:
|
|
description:
|
|
- The name of the Google Compute Engine subnetwork to which the cluster is connected.
|
|
required: false
|
|
type: str
|
|
locations:
|
|
description:
|
|
- The list of Google Compute Engine zones in which the cluster's nodes should
|
|
be located.
|
|
elements: str
|
|
required: false
|
|
type: list
|
|
aliases:
|
|
- nodeLocations
|
|
resource_labels:
|
|
description:
|
|
- The resource labels for the cluster to use to annotate any related Google Compute
|
|
Engine resources.
|
|
required: false
|
|
type: dict
|
|
legacy_abac:
|
|
description:
|
|
- Configuration for the legacy ABAC authorization mode.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
enabled:
|
|
description:
|
|
- Whether the ABAC authorizer is enabled for this cluster. When enabled, identities
|
|
in the system, including service accounts, nodes, and controllers, will
|
|
have statically granted permissions beyond those provided by the RBAC configuration
|
|
or IAM.
|
|
required: false
|
|
type: bool
|
|
network_policy:
|
|
description:
|
|
- Configuration options for the NetworkPolicy feature.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
provider:
|
|
description:
|
|
- The selected network policy provider.
|
|
- 'Some valid choices include: "PROVIDER_UNSPECIFIED", "CALICO"'
|
|
required: false
|
|
type: str
|
|
enabled:
|
|
description:
|
|
- Whether network policy is enabled on the cluster.
|
|
required: false
|
|
type: bool
|
|
default_max_pods_constraint:
|
|
description:
|
|
- The default constraint on the maximum number of pods that can be run simultaneously
|
|
on a node in the node pool of this cluster.
|
|
- Only honored if cluster created with IP Alias support.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
max_pods_per_node:
|
|
description:
|
|
- Constraint enforced on the max num of pods per node.
|
|
required: false
|
|
type: str
|
|
ip_allocation_policy:
|
|
description:
|
|
- Configuration for controlling how IPs are allocated in the cluster.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
use_ip_aliases:
|
|
description:
|
|
- Whether alias IPs will be used for pod IPs in the cluster.
|
|
required: false
|
|
type: bool
|
|
create_subnetwork:
|
|
description:
|
|
- Whether a new subnetwork will be created automatically for the cluster.
|
|
required: false
|
|
type: bool
|
|
subnetwork_name:
|
|
description:
|
|
- A custom subnetwork name to be used if createSubnetwork is true.
|
|
- If this field is empty, then an automatic name will be chosen for the new
|
|
subnetwork.
|
|
required: false
|
|
type: str
|
|
cluster_secondary_range_name:
|
|
description:
|
|
- The name of the secondary range to be used for the cluster CIDR block. The
|
|
secondary range will be used for pod IP addresses.
|
|
- This must be an existing secondary range associated with the cluster subnetwork
|
|
.
|
|
required: false
|
|
type: str
|
|
services_secondary_range_name:
|
|
description:
|
|
- The name of the secondary range to be used as for the services CIDR block.
|
|
The secondary range will be used for service ClusterIPs. This must be an
|
|
existing secondary range associated with the cluster subnetwork.
|
|
required: false
|
|
type: str
|
|
cluster_ipv4_cidr_block:
|
|
description:
|
|
- The IP address range for the cluster pod IPs. If this field is set, then
|
|
cluster.cluster_ipv4_cidr must be left blank.
|
|
- This field is only applicable when useIpAliases is true.
|
|
- Set to blank to have a range chosen with the default size.
|
|
- Set to /netmask (e.g. /14) to have a range chosen with a specific netmask.
|
|
required: false
|
|
type: str
|
|
node_ipv4_cidr_block:
|
|
description:
|
|
- The IP address range of the instance IPs in this cluster.
|
|
- This is applicable only if createSubnetwork is true.
|
|
- Set to blank to have a range chosen with the default size.
|
|
- Set to /netmask (e.g. /14) to have a range chosen with a specific netmask.
|
|
required: false
|
|
type: str
|
|
services_ipv4_cidr_block:
|
|
description:
|
|
- The IP address range of the services IPs in this cluster. If blank, a range
|
|
will be automatically chosen with the default size.
|
|
- This field is only applicable when useIpAliases is true.
|
|
- Set to blank to have a range chosen with the default size.
|
|
- Set to /netmask (e.g. /14) to have a range chosen with a specific netmask.
|
|
required: false
|
|
type: str
|
|
tpu_ipv4_cidr_block:
|
|
description:
|
|
- The IP address range of the Cloud TPUs in this cluster. If unspecified,
|
|
a range will be automatically chosen with the default size.
|
|
- This field is only applicable when useIpAliases is true.
|
|
- If unspecified, the range will use the default size.
|
|
- Set to /netmask (e.g. /14) to have a range chosen with a specific netmask.
|
|
required: false
|
|
type: str
|
|
stack_type:
|
|
description:
|
|
- 'The IP stack type of the cluster, possible values: (STACK_TYPE_UNSPECIFIED, IPV4, IPV4_IPV6)'
|
|
required: false
|
|
type: str
|
|
initial_cluster_version:
|
|
description:
|
|
- The software version of the master endpoint and kubelets used in the cluster
|
|
when it was first created. The version can be upgraded over time.
|
|
required: false
|
|
type: str
|
|
master_authorized_networks_config:
|
|
description:
|
|
- Configuration for controlling how IPs are allocated in the cluster.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
enabled:
|
|
description:
|
|
- Whether or not master authorized networks is enabled.
|
|
required: false
|
|
type: bool
|
|
cidr_blocks:
|
|
description:
|
|
- Define up to 50 external networks that could access Kubernetes master through
|
|
HTTPS.
|
|
elements: dict
|
|
required: false
|
|
type: list
|
|
suboptions:
|
|
display_name:
|
|
description:
|
|
- Optional field used to identify cidr blocks.
|
|
required: false
|
|
type: str
|
|
cidr_block:
|
|
description:
|
|
- Block specified in CIDR notation.
|
|
required: false
|
|
type: str
|
|
binary_authorization:
|
|
description:
|
|
- Configuration for the BinaryAuthorization feature.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
enabled:
|
|
description:
|
|
- If enabled, all container images will be validated by Binary Authorization.
|
|
required: false
|
|
type: bool
|
|
release_channel:
|
|
description:
|
|
- ReleaseChannel indicates which release channel a cluster is subscribed to.
|
|
- Release channels are arranged in order of risk and frequency of updates.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
channel:
|
|
description:
|
|
- Which release channel the cluster is subscribed to.
|
|
- 'Some valid choices include: "UNSPECIFIED", "RAPID", "REGULAR", "STABLE"'
|
|
required: false
|
|
type: str
|
|
shielded_nodes:
|
|
description:
|
|
- Shielded Nodes configuration.
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
enabled:
|
|
description:
|
|
- Whether Shielded Nodes features are enabled on all nodes in this cluster.
|
|
required: false
|
|
type: bool
|
|
network_config:
|
|
description:
|
|
- Network configurations .
|
|
required: false
|
|
type: dict
|
|
suboptions:
|
|
datapath_provider:
|
|
description:
|
|
- The datapath provider selects the implementation of the Kubernetes networking model for service resolution and network policy enforcement.
|
|
required: false
|
|
type: str
|
|
enable_intra_node_visibility:
|
|
description:
|
|
- Whether Intra-node visibility is enabled for this cluster. This makes same
|
|
node pod to pod traffic visible for VPC network.
|
|
required: false
|
|
type: bool
|
|
default_snat_status:
|
|
description:
|
|
- Whether the cluster disables default in-node sNAT rules. In-node sNAT rules
|
|
will be disabled when defaultSnatStatus is disabled.
|
|
required: false
|
|
type: bool
|
|
enable_kubernetes_alpha:
|
|
description:
|
|
- Kubernetes alpha features are enabled on this cluster. This includes alpha API
|
|
groups (e.g. v1alpha1) and features that may not be production ready in the
|
|
kubernetes version of the master and nodes.
|
|
required: false
|
|
type: bool
|
|
location:
|
|
description:
|
|
- The location where the cluster is deployed.
|
|
required: true
|
|
type: str
|
|
aliases:
|
|
- zone
|
|
kubectl_path:
|
|
description:
|
|
- The path that the kubectl config file will be written to.
|
|
- The file will not be created if this path is unset.
|
|
- Any existing file at this path will be completely overwritten.
|
|
- This requires the PyYaml library.
|
|
required: false
|
|
type: str
|
|
kubectl_context:
|
|
description:
|
|
- The name of the context for the kubectl config file. Will default to the cluster
|
|
name.
|
|
required: false
|
|
type: str
|
|
project:
|
|
description:
|
|
- The Google Cloud Platform project to use.
|
|
type: str
|
|
auth_kind:
|
|
description:
|
|
- The type of credential used.
|
|
type: str
|
|
required: true
|
|
choices:
|
|
- application
|
|
- machineaccount
|
|
- serviceaccount
|
|
- accesstoken
|
|
service_account_contents:
|
|
description:
|
|
- The contents of a Service Account JSON file, either in a dictionary or as a
|
|
JSON string that represents it.
|
|
type: jsonarg
|
|
service_account_file:
|
|
description:
|
|
- The path of a Service Account JSON file if serviceaccount is selected as type.
|
|
type: path
|
|
service_account_email:
|
|
description:
|
|
- An optional service account email address if machineaccount is selected and
|
|
the user does not wish to use the default email.
|
|
type: str
|
|
access_token:
|
|
description:
|
|
- An OAuth2 access token if credential type is accesstoken.
|
|
type: str
|
|
scopes:
|
|
description:
|
|
- Array of scopes to be used
|
|
type: list
|
|
elements: str
|
|
env_type:
|
|
description:
|
|
- Specifies which Ansible environment you're running this module within.
|
|
- This should not be set unless you know what you're doing.
|
|
- This only alters the User Agent string for any API requests.
|
|
type: str
|
|
'''
|
|
|
|
EXAMPLES = '''
|
|
- name: create a cluster
|
|
google.cloud.gcp_container_cluster:
|
|
name: my-cluster
|
|
initial_node_count: 2
|
|
node_config:
|
|
machine_type: n1-standard-4
|
|
disk_size_gb: 500
|
|
location: us-central1-a
|
|
project: test_project
|
|
auth_kind: serviceaccount
|
|
service_account_file: "/tmp/auth.pem"
|
|
state: present
|
|
'''
|
|
|
|
RETURN = '''
|
|
name:
|
|
description:
|
|
- The name of this cluster. The name must be unique within this project and location,
|
|
and can be up to 40 characters. Must be Lowercase letters, numbers, and hyphens
|
|
only. Must start with a letter. Must end with a number or a letter.
|
|
returned: success
|
|
type: str
|
|
description:
|
|
description:
|
|
- An optional description of this cluster.
|
|
returned: success
|
|
type: str
|
|
initialNodeCount:
|
|
description:
|
|
- The number of nodes to create in this cluster. You must ensure that your Compute
|
|
Engine resource quota is sufficient for this number of instances. You must also
|
|
have available firewall and routes quota. For requests, this field should only
|
|
be used in lieu of a "nodePool" object, since this configuration (along with the
|
|
"nodeConfig") will be used to create a "NodePool" object with an auto-generated
|
|
name. Do not use this and a nodePool at the same time.
|
|
- This field has been deprecated. Please use nodePool.initial_node_count instead.
|
|
returned: success
|
|
type: int
|
|
nodeConfig:
|
|
description:
|
|
- Parameters used in creating the cluster's nodes.
|
|
- For requests, this field should only be used in lieu of a "nodePool" object, since
|
|
this configuration (along with the "initialNodeCount") will be used to create
|
|
a "NodePool" object with an auto-generated name. Do not use this and a nodePool
|
|
at the same time. For responses, this field will be populated with the node configuration
|
|
of the first node pool. If unspecified, the defaults are used.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
machineType:
|
|
description:
|
|
- The name of a Google Compute Engine machine type (e.g.
|
|
- n1-standard-1). If unspecified, the default machine type is n1-standard-1.
|
|
returned: success
|
|
type: str
|
|
diskSizeGb:
|
|
description:
|
|
- Size of the disk attached to each node, specified in GB. The smallest allowed
|
|
disk size is 10GB. If unspecified, the default disk size is 100GB.
|
|
returned: success
|
|
type: int
|
|
oauthScopes:
|
|
description:
|
|
- The set of Google API scopes to be made available on all of the node VMs under
|
|
the "default" service account.
|
|
- 'The following scopes are recommended, but not required, and by default are
|
|
not included: U(https://www.googleapis.com/auth/compute) is required for mounting
|
|
persistent storage on your nodes.'
|
|
- U(https://www.googleapis.com/auth/devstorage.read_only) is required for communicating
|
|
with gcr.io (the Google Container Registry).
|
|
- If unspecified, no scopes are added, unless Cloud Logging or Cloud Monitoring
|
|
are enabled, in which case their required scopes will be added.
|
|
returned: success
|
|
type: list
|
|
serviceAccount:
|
|
description:
|
|
- The Google Cloud Platform Service Account to be used by the node VMs. If no
|
|
Service Account is specified, the "default" service account is used.
|
|
returned: success
|
|
type: str
|
|
metadata:
|
|
description:
|
|
- The metadata key/value pairs assigned to instances in the cluster.
|
|
- 'Keys must conform to the regexp [a-zA-Z0-9-_]+ and be less than 128 bytes
|
|
in length. These are reflected as part of a URL in the metadata server. Additionally,
|
|
to avoid ambiguity, keys must not conflict with any other metadata keys for
|
|
the project or be one of the four reserved keys: "instance-template", "kube-env",
|
|
"startup-script", and "user-data" Values are free-form strings, and only have
|
|
meaning as interpreted by the image running in the instance. The only restriction
|
|
placed on them is that each value''s size must be less than or equal to 32
|
|
KB.'
|
|
- The total size of all keys and values must be less than 512 KB.
|
|
- 'An object containing a list of "key": value pairs.'
|
|
- 'Example: { "name": "wrench", "mass": "1.3kg", "count": "3" }.'
|
|
returned: success
|
|
type: dict
|
|
imageType:
|
|
description:
|
|
- The image type to use for this node. Note that for a given image type, the
|
|
latest version of it will be used.
|
|
returned: success
|
|
type: str
|
|
labels:
|
|
description:
|
|
- 'The map of Kubernetes labels (key/value pairs) to be applied to each node.
|
|
These will added in addition to any default label(s) that Kubernetes may apply
|
|
to the node. In case of conflict in label keys, the applied set may differ
|
|
depending on the Kubernetes version -- it''s best to assume the behavior is
|
|
undefined and conflicts should be avoided. For more information, including
|
|
usage and the valid values, see: U(http://kubernetes.io/v1.1/docs/user-guide/labels.html)
|
|
An object containing a list of "key": value pairs.'
|
|
- 'Example: { "name": "wrench", "mass": "1.3kg", "count": "3" }.'
|
|
returned: success
|
|
type: dict
|
|
localSsdCount:
|
|
description:
|
|
- The number of local SSD disks to be attached to the node.
|
|
- 'The limit for this value is dependant upon the maximum number of disks available
|
|
on a machine per zone. See: U(https://cloud.google.com/compute/docs/disks/local-ssd#local_ssd_limits)
|
|
for more information.'
|
|
returned: success
|
|
type: int
|
|
tags:
|
|
description:
|
|
- The list of instance tags applied to all nodes. Tags are used to identify
|
|
valid sources or targets for network firewalls and are specified by the client
|
|
during cluster or node pool creation. Each tag within the list must comply
|
|
with RFC1035.
|
|
returned: success
|
|
type: list
|
|
preemptible:
|
|
description:
|
|
- 'Whether the nodes are created as preemptible VM instances. See: U(https://cloud.google.com/compute/docs/instances/preemptible)
|
|
for more information about preemptible VM instances.'
|
|
returned: success
|
|
type: bool
|
|
accelerators:
|
|
description:
|
|
- A list of hardware accelerators to be attached to each node. See U(https://cloud.google.com/compute/docs/gpus)
|
|
for more information about support for GPUs.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
acceleratorCount:
|
|
description:
|
|
- The number of accelerator cards exposed to an instance.
|
|
returned: success
|
|
type: str
|
|
acceleratorType:
|
|
description:
|
|
- The accelerator type resource name.
|
|
returned: success
|
|
type: str
|
|
diskType:
|
|
description:
|
|
- Type of the disk attached to each node (e.g. 'pd-standard' or 'pd-ssd') If
|
|
unspecified, the default disk type is 'pd-standard' .
|
|
returned: success
|
|
type: str
|
|
minCpuPlatform:
|
|
description:
|
|
- Minimum CPU platform to be used by this instance. The instance may be scheduled
|
|
on the specified or newer CPU platform.
|
|
returned: success
|
|
type: str
|
|
taints:
|
|
description:
|
|
- List of kubernetes taints to be applied to each node.
|
|
- 'For more information, including usage and the valid values, see: U(https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/)
|
|
.'
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
key:
|
|
description:
|
|
- Key for taint.
|
|
returned: success
|
|
type: str
|
|
value:
|
|
description:
|
|
- Value for taint.
|
|
returned: success
|
|
type: str
|
|
effect:
|
|
description:
|
|
- Effect for taint.
|
|
returned: success
|
|
type: str
|
|
shieldedInstanceConfig:
|
|
description:
|
|
- Shielded Instance options.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
enableSecureBoot:
|
|
description:
|
|
- Defines whether the instance has Secure Boot enabled.
|
|
- Secure Boot helps ensure that the system only runs authentic software
|
|
by verifying the digital signature of all boot components, and halting
|
|
the boot process if signature verification fails.
|
|
returned: success
|
|
type: bool
|
|
enableIntegrityMonitoring:
|
|
description:
|
|
- Defines whether the instance has integrity monitoring enabled.
|
|
- Enables monitoring and attestation of the boot integrity of the instance.
|
|
- The attestation is performed against the integrity policy baseline. This
|
|
baseline is initially derived from the implicitly trusted boot image when
|
|
the instance is created.
|
|
returned: success
|
|
type: bool
|
|
masterAuth:
|
|
description:
|
|
- The authentication information for accessing the master endpoint.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
username:
|
|
description:
|
|
- The username to use for HTTP basic authentication to the master endpoint.
|
|
(unsupported with GKE >= 1.19).
|
|
returned: success
|
|
type: str
|
|
password:
|
|
description:
|
|
- The password to use for HTTP basic authentication to the master endpoint.
|
|
Because the master endpoint is open to the Internet, you should create a strong
|
|
password with a minimum of 16 characters.
|
|
(unsupported with GKE >= 1.19).
|
|
returned: success
|
|
type: str
|
|
clientCertificateConfig:
|
|
description:
|
|
- Configuration for client certificate authentication on the cluster. For clusters
|
|
before v1.12, if no configuration is specified, a client certificate is issued.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
issueClientCertificate:
|
|
description:
|
|
- Issue a client certificate.
|
|
returned: success
|
|
type: bool
|
|
clusterCaCertificate:
|
|
description:
|
|
- Base64-encoded public certificate that is the root of trust for the cluster.
|
|
returned: success
|
|
type: str
|
|
clientCertificate:
|
|
description:
|
|
- Base64-encoded public certificate used by clients to authenticate to the cluster
|
|
endpoint.
|
|
returned: success
|
|
type: str
|
|
clientKey:
|
|
description:
|
|
- Base64-encoded private key used by clients to authenticate to the cluster
|
|
endpoint.
|
|
returned: success
|
|
type: str
|
|
loggingService:
|
|
description:
|
|
- 'The logging service the cluster should use to write logs. Currently available
|
|
options: logging.googleapis.com - the Google Cloud Logging service.'
|
|
- none - no logs will be exported from the cluster.
|
|
- if left as an empty string,logging.googleapis.com will be used.
|
|
returned: success
|
|
type: str
|
|
monitoringService:
|
|
description:
|
|
- The monitoring service the cluster should use to write metrics.
|
|
- 'Currently available options: monitoring.googleapis.com - the Google Cloud Monitoring
|
|
service.'
|
|
- none - no metrics will be exported from the cluster.
|
|
- if left as an empty string, monitoring.googleapis.com will be used.
|
|
returned: success
|
|
type: str
|
|
network:
|
|
description:
|
|
- The name of the Google Compute Engine network to which the cluster is connected.
|
|
If left unspecified, the default network will be used.
|
|
returned: success
|
|
type: str
|
|
databaseEncryption:
|
|
description:
|
|
- Configuration of etcd encryption.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
state:
|
|
description:
|
|
- Denotes the state of etcd encryption.
|
|
returned: success
|
|
type: str
|
|
keyName:
|
|
description:
|
|
- Name of CloudKMS key to use for the encryption of secrets in etcd. Ex.
|
|
- "`projects/my-project/locations/global/keyRings/my-ring/cryptoKeys/my-key`
|
|
."
|
|
returned: success
|
|
type: str
|
|
privateClusterConfig:
|
|
description:
|
|
- Configuration for a private cluster.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
enablePrivateNodes:
|
|
description:
|
|
- Whether nodes have internal IP addresses only. If enabled, all nodes are given
|
|
only RFC 1918 private addresses and communicate with the master via private
|
|
networking.
|
|
returned: success
|
|
type: bool
|
|
enablePrivateEndpoint:
|
|
description:
|
|
- Whether the master's internal IP address is used as the cluster endpoint.
|
|
returned: success
|
|
type: bool
|
|
masterIpv4CidrBlock:
|
|
description:
|
|
- The IP range in CIDR notation to use for the hosted master network. This range
|
|
will be used for assigning internal IP addresses to the master or set of masters,
|
|
as well as the ILB VIP. This range must not overlap with any other ranges
|
|
in use within the cluster's network.
|
|
returned: success
|
|
type: str
|
|
privateEndpoint:
|
|
description:
|
|
- The internal IP address of this cluster's master endpoint.
|
|
returned: success
|
|
type: str
|
|
publicEndpoint:
|
|
description:
|
|
- The external IP address of this cluster's master endpoint.
|
|
returned: success
|
|
type: str
|
|
clusterIpv4Cidr:
|
|
description:
|
|
- The IP address range of the container pods in this cluster, in CIDR notation (e.g.
|
|
10.96.0.0/14). Leave blank to have one automatically chosen or specify a /14 block
|
|
in 10.0.0.0/8.
|
|
returned: success
|
|
type: str
|
|
enableTpu:
|
|
description:
|
|
- "(Optional) Whether to enable Cloud TPU resources in this cluster."
|
|
- See the official documentation - U(https://cloud.google.com/tpu/docs/kubernetes-engine-setup)
|
|
.
|
|
returned: success
|
|
type: bool
|
|
tpuIpv4CidrBlock:
|
|
description:
|
|
- The IP address range of the Cloud TPUs in this cluster, in [CIDR](http://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing)
|
|
notation (e.g. `1.2.3.4/29`).
|
|
returned: success
|
|
type: str
|
|
addonsConfig:
|
|
description:
|
|
- Configurations for the various addons available to run in the cluster.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
httpLoadBalancing:
|
|
description:
|
|
- Configuration for the HTTP (L7) load balancing controller addon, which makes
|
|
it easy to set up HTTP load balancers for services in a cluster.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
disabled:
|
|
description:
|
|
- Whether the HTTP Load Balancing controller is enabled in the cluster.
|
|
When enabled, it runs a small pod in the cluster that manages the load
|
|
balancers.
|
|
returned: success
|
|
type: bool
|
|
horizontalPodAutoscaling:
|
|
description:
|
|
- Configuration for the horizontal pod autoscaling feature, which increases
|
|
or decreases the number of replica pods a replication controller has based
|
|
on the resource usage of the existing pods.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
disabled:
|
|
description:
|
|
- Whether the Horizontal Pod Autoscaling feature is enabled in the cluster.
|
|
When enabled, it ensures that a Heapster pod is running in the cluster,
|
|
which is also used by the Cloud Monitoring service.
|
|
returned: success
|
|
type: bool
|
|
networkPolicyConfig:
|
|
description:
|
|
- Configuration for NetworkPolicy. This only tracks whether the addon is enabled
|
|
or not on the Master, it does not track whether network policy is enabled
|
|
for the nodes.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
disabled:
|
|
description:
|
|
- Whether NetworkPolicy is enabled for this cluster.
|
|
returned: success
|
|
type: bool
|
|
subnetwork:
|
|
description:
|
|
- The name of the Google Compute Engine subnetwork to which the cluster is connected.
|
|
returned: success
|
|
type: str
|
|
locations:
|
|
description:
|
|
- The list of Google Compute Engine zones in which the cluster's nodes should be
|
|
located.
|
|
returned: success
|
|
type: list
|
|
resourceLabels:
|
|
description:
|
|
- The resource labels for the cluster to use to annotate any related Google Compute
|
|
Engine resources.
|
|
returned: success
|
|
type: dict
|
|
labelFingerprint:
|
|
description:
|
|
- The fingerprint of the set of labels for this cluster.
|
|
returned: success
|
|
type: str
|
|
legacyAbac:
|
|
description:
|
|
- Configuration for the legacy ABAC authorization mode.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
enabled:
|
|
description:
|
|
- Whether the ABAC authorizer is enabled for this cluster. When enabled, identities
|
|
in the system, including service accounts, nodes, and controllers, will have
|
|
statically granted permissions beyond those provided by the RBAC configuration
|
|
or IAM.
|
|
returned: success
|
|
type: bool
|
|
networkPolicy:
|
|
description:
|
|
- Configuration options for the NetworkPolicy feature.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
provider:
|
|
description:
|
|
- The selected network policy provider.
|
|
returned: success
|
|
type: str
|
|
enabled:
|
|
description:
|
|
- Whether network policy is enabled on the cluster.
|
|
returned: success
|
|
type: bool
|
|
defaultMaxPodsConstraint:
|
|
description:
|
|
- The default constraint on the maximum number of pods that can be run simultaneously
|
|
on a node in the node pool of this cluster.
|
|
- Only honored if cluster created with IP Alias support.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
maxPodsPerNode:
|
|
description:
|
|
- Constraint enforced on the max num of pods per node.
|
|
returned: success
|
|
type: str
|
|
ipAllocationPolicy:
|
|
description:
|
|
- Configuration for controlling how IPs are allocated in the cluster.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
useIpAliases:
|
|
description:
|
|
- Whether alias IPs will be used for pod IPs in the cluster.
|
|
returned: success
|
|
type: bool
|
|
createSubnetwork:
|
|
description:
|
|
- Whether a new subnetwork will be created automatically for the cluster.
|
|
returned: success
|
|
type: bool
|
|
subnetworkName:
|
|
description:
|
|
- A custom subnetwork name to be used if createSubnetwork is true.
|
|
- If this field is empty, then an automatic name will be chosen for the new
|
|
subnetwork.
|
|
returned: success
|
|
type: str
|
|
clusterSecondaryRangeName:
|
|
description:
|
|
- The name of the secondary range to be used for the cluster CIDR block. The
|
|
secondary range will be used for pod IP addresses.
|
|
- This must be an existing secondary range associated with the cluster subnetwork
|
|
.
|
|
returned: success
|
|
type: str
|
|
servicesSecondaryRangeName:
|
|
description:
|
|
- The name of the secondary range to be used as for the services CIDR block.
|
|
The secondary range will be used for service ClusterIPs. This must be an existing
|
|
secondary range associated with the cluster subnetwork.
|
|
returned: success
|
|
type: str
|
|
clusterIpv4CidrBlock:
|
|
description:
|
|
- The IP address range for the cluster pod IPs. If this field is set, then cluster.cluster_ipv4_cidr
|
|
must be left blank.
|
|
- This field is only applicable when useIpAliases is true.
|
|
- Set to blank to have a range chosen with the default size.
|
|
- Set to /netmask (e.g. /14) to have a range chosen with a specific netmask.
|
|
returned: success
|
|
type: str
|
|
nodeIpv4CidrBlock:
|
|
description:
|
|
- The IP address range of the instance IPs in this cluster.
|
|
- This is applicable only if createSubnetwork is true.
|
|
- Set to blank to have a range chosen with the default size.
|
|
- Set to /netmask (e.g. /14) to have a range chosen with a specific netmask.
|
|
returned: success
|
|
type: str
|
|
servicesIpv4CidrBlock:
|
|
description:
|
|
- The IP address range of the services IPs in this cluster. If blank, a range
|
|
will be automatically chosen with the default size.
|
|
- This field is only applicable when useIpAliases is true.
|
|
- Set to blank to have a range chosen with the default size.
|
|
- Set to /netmask (e.g. /14) to have a range chosen with a specific netmask.
|
|
returned: success
|
|
type: str
|
|
tpuIpv4CidrBlock:
|
|
description:
|
|
- The IP address range of the Cloud TPUs in this cluster. If unspecified, a
|
|
range will be automatically chosen with the default size.
|
|
- This field is only applicable when useIpAliases is true.
|
|
- If unspecified, the range will use the default size.
|
|
- Set to /netmask (e.g. /14) to have a range chosen with a specific netmask.
|
|
returned: success
|
|
type: str
|
|
stackType:
|
|
description:
|
|
- 'The IP stack type of the cluster, possible values: (STACK_TYPE_UNSPECIFIED, IPV4, IPV4_IPV6)'
|
|
type: str
|
|
returned: success
|
|
endpoint:
|
|
description:
|
|
- The IP address of this cluster's master endpoint.
|
|
- The endpoint can be accessed from the internet at https://username:password@endpoint/
|
|
See the masterAuth property of this resource for username and password information.
|
|
returned: success
|
|
type: str
|
|
initialClusterVersion:
|
|
description:
|
|
- The software version of the master endpoint and kubelets used in the cluster when
|
|
it was first created. The version can be upgraded over time.
|
|
returned: success
|
|
type: str
|
|
currentMasterVersion:
|
|
description:
|
|
- The current software version of the master endpoint.
|
|
returned: success
|
|
type: str
|
|
currentNodeVersion:
|
|
description:
|
|
- The current version of the node software components. If they are currently at
|
|
multiple versions because they're in the process of being upgraded, this reflects
|
|
the minimum version of all nodes.
|
|
returned: success
|
|
type: str
|
|
createTime:
|
|
description:
|
|
- The time the cluster was created, in RFC3339 text format.
|
|
returned: success
|
|
type: str
|
|
status:
|
|
description:
|
|
- The current status of this cluster.
|
|
returned: success
|
|
type: str
|
|
statusMessage:
|
|
description:
|
|
- Additional information about the current status of this cluster, if available.
|
|
returned: success
|
|
type: str
|
|
nodeIpv4CidrSize:
|
|
description:
|
|
- The size of the address space on each node for hosting containers.
|
|
- This is provisioned from within the container_ipv4_cidr range.
|
|
returned: success
|
|
type: int
|
|
servicesIpv4Cidr:
|
|
description:
|
|
- The IP address range of the Kubernetes services in this cluster, in CIDR notation
|
|
(e.g. 1.2.3.4/29). Service addresses are typically put in the last /16 from the
|
|
container CIDR.
|
|
returned: success
|
|
type: str
|
|
currentNodeCount:
|
|
description:
|
|
- The number of nodes currently in the cluster.
|
|
returned: success
|
|
type: int
|
|
expireTime:
|
|
description:
|
|
- The time the cluster will be automatically deleted in RFC3339 text format.
|
|
returned: success
|
|
type: str
|
|
conditions:
|
|
description:
|
|
- Which conditions caused the current cluster state.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
code:
|
|
description:
|
|
- Machine-friendly representation of the condition.
|
|
returned: success
|
|
type: str
|
|
message:
|
|
description:
|
|
- Human-friendly representation of the condition.
|
|
returned: success
|
|
type: str
|
|
masterAuthorizedNetworksConfig:
|
|
description:
|
|
- Configuration for controlling how IPs are allocated in the cluster.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
enabled:
|
|
description:
|
|
- Whether or not master authorized networks is enabled.
|
|
returned: success
|
|
type: bool
|
|
cidrBlocks:
|
|
description:
|
|
- Define up to 50 external networks that could access Kubernetes master through
|
|
HTTPS.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
displayName:
|
|
description:
|
|
- Optional field used to identify cidr blocks.
|
|
returned: success
|
|
type: str
|
|
cidrBlock:
|
|
description:
|
|
- Block specified in CIDR notation.
|
|
returned: success
|
|
type: str
|
|
nodePools:
|
|
description:
|
|
- Node pools belonging to this cluster.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
name:
|
|
description:
|
|
- Name of the node pool.
|
|
returned: success
|
|
type: str
|
|
binaryAuthorization:
|
|
description:
|
|
- Configuration for the BinaryAuthorization feature.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
enabled:
|
|
description:
|
|
- If enabled, all container images will be validated by Binary Authorization.
|
|
returned: success
|
|
type: bool
|
|
releaseChannel:
|
|
description:
|
|
- ReleaseChannel indicates which release channel a cluster is subscribed to.
|
|
- Release channels are arranged in order of risk and frequency of updates.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
channel:
|
|
description:
|
|
- Which release channel the cluster is subscribed to.
|
|
returned: success
|
|
type: str
|
|
shieldedNodes:
|
|
description:
|
|
- Shielded Nodes configuration.
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
enabled:
|
|
description:
|
|
- Whether Shielded Nodes features are enabled on all nodes in this cluster.
|
|
returned: success
|
|
type: bool
|
|
networkConfig:
|
|
description:
|
|
- Network configurations .
|
|
returned: success
|
|
type: complex
|
|
contains:
|
|
enableIntraNodeVisibility:
|
|
description:
|
|
- Whether Intra-node visibility is enabled for this cluster. This makes same
|
|
node pod to pod traffic visible for VPC network.
|
|
returned: success
|
|
type: bool
|
|
network:
|
|
description:
|
|
- The relative name of the Google Compute Engine network to which the cluster
|
|
is connected.
|
|
- 'Example: projects/my-project/global/networks/my-network .'
|
|
returned: success
|
|
type: str
|
|
subnetwork:
|
|
description:
|
|
- The relative name of the Google Compute Engine subnetwork to which the cluster
|
|
is connected.
|
|
- 'Example: projects/my-project/regions/us-central1/subnetworks/my-subnet .'
|
|
returned: success
|
|
type: str
|
|
defaultSnatStatus:
|
|
description:
|
|
- Whether the cluster disables default in-node sNAT rules. In-node sNAT rules
|
|
will be disabled when defaultSnatStatus is disabled.
|
|
returned: success
|
|
type: bool
|
|
enableKubernetesAlpha:
|
|
description:
|
|
- Kubernetes alpha features are enabled on this cluster. This includes alpha API
|
|
groups (e.g. v1alpha1) and features that may not be production ready in the kubernetes
|
|
version of the master and nodes.
|
|
returned: success
|
|
type: bool
|
|
location:
|
|
description:
|
|
- The location where the cluster is deployed.
|
|
returned: success
|
|
type: str
|
|
kubectlPath:
|
|
description:
|
|
- The path that the kubectl config file will be written to.
|
|
- The file will not be created if this path is unset.
|
|
- Any existing file at this path will be completely overwritten.
|
|
- This requires the PyYaml library.
|
|
returned: success
|
|
type: str
|
|
kubectlContext:
|
|
description:
|
|
- The name of the context for the kubectl config file. Will default to the cluster
|
|
name.
|
|
returned: success
|
|
type: str
|
|
'''
|
|
|
|
################################################################################
|
|
# Imports
|
|
################################################################################
|
|
|
|
from ansible_collections.google.cloud.plugins.module_utils.gcp_utils import (
|
|
navigate_hash,
|
|
GcpSession,
|
|
GcpModule,
|
|
GcpRequest,
|
|
remove_nones_from_dict,
|
|
)
|
|
import json
|
|
import time
|
|
|
|
################################################################################
|
|
# Main
|
|
################################################################################
|
|
|
|
|
|
def main():
|
|
"""Main function"""
|
|
|
|
module = GcpModule(
|
|
argument_spec=dict(
|
|
state=dict(default='present', choices=['present', 'absent'], type='str'),
|
|
name=dict(type='str'),
|
|
description=dict(type='str'),
|
|
initial_node_count=dict(type='int'),
|
|
node_config=dict(
|
|
type='dict',
|
|
options=dict(
|
|
machine_type=dict(type='str'),
|
|
disk_size_gb=dict(type='int'),
|
|
oauth_scopes=dict(type='list', elements='str'),
|
|
service_account=dict(type='str'),
|
|
metadata=dict(type='dict'),
|
|
image_type=dict(type='str'),
|
|
labels=dict(type='dict'),
|
|
local_ssd_count=dict(type='int'),
|
|
tags=dict(type='list', elements='str'),
|
|
preemptible=dict(type='bool'),
|
|
accelerators=dict(type='list', elements='dict', options=dict(accelerator_count=dict(type='str'), accelerator_type=dict(type='str'))),
|
|
disk_type=dict(type='str'),
|
|
min_cpu_platform=dict(type='str'),
|
|
taints=dict(type='list',
|
|
elements='dict',
|
|
options=dict(key=dict(type='str', no_log=False), value=dict(type='str'), effect=dict(type='str'))),
|
|
shielded_instance_config=dict(
|
|
type='dict', options=dict(enable_secure_boot=dict(type='bool'), enable_integrity_monitoring=dict(type='bool'))
|
|
),
|
|
),
|
|
),
|
|
master_auth=dict(
|
|
type='dict',
|
|
options=dict(
|
|
username=dict(type='str'),
|
|
password=dict(type='str', no_log=True),
|
|
client_certificate_config=dict(type='dict', options=dict(issue_client_certificate=dict(type='bool'))),
|
|
),
|
|
),
|
|
logging_service=dict(type='str'),
|
|
monitoring_service=dict(type='str'),
|
|
network=dict(type='str'),
|
|
database_encryption=dict(type='dict', options=dict(state=dict(type='str'), key_name=dict(type='str'))),
|
|
private_cluster_config=dict(
|
|
type='dict',
|
|
options=dict(enable_private_nodes=dict(type='bool'), enable_private_endpoint=dict(type='bool'), master_ipv4_cidr_block=dict(type='str')),
|
|
),
|
|
cluster_ipv4_cidr=dict(type='str'),
|
|
enable_tpu=dict(type='bool'),
|
|
addons_config=dict(
|
|
type='dict',
|
|
options=dict(
|
|
http_load_balancing=dict(type='dict', options=dict(disabled=dict(type='bool'))),
|
|
horizontal_pod_autoscaling=dict(type='dict', options=dict(disabled=dict(type='bool'))),
|
|
network_policy_config=dict(type='dict', options=dict(disabled=dict(type='bool'))),
|
|
),
|
|
),
|
|
subnetwork=dict(type='str'),
|
|
locations=dict(type='list', elements='str', aliases=['nodeLocations']),
|
|
resource_labels=dict(type='dict'),
|
|
legacy_abac=dict(type='dict', options=dict(enabled=dict(type='bool'))),
|
|
network_policy=dict(type='dict', options=dict(provider=dict(type='str'), enabled=dict(type='bool'))),
|
|
default_max_pods_constraint=dict(type='dict', options=dict(max_pods_per_node=dict(type='str'))),
|
|
ip_allocation_policy=dict(
|
|
type='dict',
|
|
options=dict(
|
|
use_ip_aliases=dict(type='bool'),
|
|
create_subnetwork=dict(type='bool'),
|
|
subnetwork_name=dict(type='str'),
|
|
cluster_secondary_range_name=dict(type='str'),
|
|
services_secondary_range_name=dict(type='str'),
|
|
cluster_ipv4_cidr_block=dict(type='str'),
|
|
node_ipv4_cidr_block=dict(type='str'),
|
|
services_ipv4_cidr_block=dict(type='str'),
|
|
tpu_ipv4_cidr_block=dict(type='str'),
|
|
stack_type=dict(type='str'),
|
|
),
|
|
),
|
|
initial_cluster_version=dict(type='str'),
|
|
master_authorized_networks_config=dict(
|
|
type='dict',
|
|
options=dict(
|
|
enabled=dict(type='bool'),
|
|
cidr_blocks=dict(type='list', elements='dict', options=dict(display_name=dict(type='str'), cidr_block=dict(type='str'))),
|
|
),
|
|
),
|
|
binary_authorization=dict(type='dict', options=dict(enabled=dict(type='bool'))),
|
|
release_channel=dict(type='dict', options=dict(channel=dict(type='str'))),
|
|
shielded_nodes=dict(type='dict', options=dict(enabled=dict(type='bool'))),
|
|
network_config=dict(
|
|
type='dict',
|
|
options=dict(
|
|
enable_intra_node_visibility=dict(type='bool'),
|
|
default_snat_status=dict(type='bool'),
|
|
datapath_provider=dict(type='str'),
|
|
),
|
|
),
|
|
enable_kubernetes_alpha=dict(type='bool'),
|
|
location=dict(required=True, type='str', aliases=['zone']),
|
|
kubectl_path=dict(type='str'),
|
|
kubectl_context=dict(type='str'),
|
|
)
|
|
)
|
|
|
|
if not module.params['scopes']:
|
|
module.params['scopes'] = ['https://www.googleapis.com/auth/cloud-platform']
|
|
|
|
state = module.params['state']
|
|
|
|
fetch = fetch_resource(module, self_link(module))
|
|
changed = False
|
|
|
|
if fetch:
|
|
if state == 'present':
|
|
if is_different(module, fetch):
|
|
update(module, self_link(module))
|
|
fetch = fetch_resource(module, self_link(module))
|
|
changed = True
|
|
else:
|
|
delete(module, self_link(module))
|
|
fetch = {}
|
|
changed = True
|
|
else:
|
|
if state == 'present':
|
|
fetch = create(module, collection(module))
|
|
delete_default_node_pool(module)
|
|
changed = True
|
|
else:
|
|
fetch = {}
|
|
|
|
if module.params.get('kubectl_path'):
|
|
Kubectl(module).write_file()
|
|
fetch.update({'changed': changed})
|
|
|
|
module.exit_json(**fetch)
|
|
|
|
|
|
def create(module, link):
|
|
auth = GcpSession(module, 'container')
|
|
return wait_for_operation(module, auth.post(link, resource_to_request(module)))
|
|
|
|
|
|
def update(module, link):
|
|
auth = GcpSession(module, 'container')
|
|
return wait_for_operation(module, auth.put(link, resource_to_request(module)))
|
|
|
|
|
|
def delete(module, link):
|
|
auth = GcpSession(module, 'container')
|
|
return wait_for_operation(module, auth.delete(link))
|
|
|
|
|
|
def resource_to_request(module):
|
|
request = {
|
|
u'name': module.params.get('name'),
|
|
u'description': module.params.get('description'),
|
|
u'initialNodeCount': module.params.get('initial_node_count'),
|
|
u'nodeConfig': ClusterNodeconfig(module.params.get('node_config', {}), module).to_request(),
|
|
u'masterAuth': ClusterMasterauth(module.params.get('master_auth', {}), module).to_request(),
|
|
u'loggingService': module.params.get('logging_service'),
|
|
u'monitoringService': module.params.get('monitoring_service'),
|
|
u'network': module.params.get('network'),
|
|
u'databaseEncryption': ClusterDatabaseencryption(module.params.get('database_encryption', {}), module).to_request(),
|
|
u'privateClusterConfig': ClusterPrivateclusterconfig(module.params.get('private_cluster_config', {}), module).to_request(),
|
|
u'clusterIpv4Cidr': module.params.get('cluster_ipv4_cidr'),
|
|
u'enableTpu': module.params.get('enable_tpu'),
|
|
u'addonsConfig': ClusterAddonsconfig(module.params.get('addons_config', {}), module).to_request(),
|
|
u'subnetwork': module.params.get('subnetwork'),
|
|
u'locations': module.params.get('locations'),
|
|
u'resourceLabels': module.params.get('resource_labels'),
|
|
u'legacyAbac': ClusterLegacyabac(module.params.get('legacy_abac', {}), module).to_request(),
|
|
u'networkPolicy': ClusterNetworkpolicy(module.params.get('network_policy', {}), module).to_request(),
|
|
u'defaultMaxPodsConstraint': ClusterDefaultmaxpodsconstraint(module.params.get('default_max_pods_constraint', {}), module).to_request(),
|
|
u'ipAllocationPolicy': ClusterIpallocationpolicy(module.params.get('ip_allocation_policy', {}), module).to_request(),
|
|
u'initialClusterVersion': module.params.get('initial_cluster_version'),
|
|
u'masterAuthorizedNetworksConfig': ClusterMasterauthorizednetworksconfig(
|
|
module.params.get('master_authorized_networks_config', {}), module
|
|
).to_request(),
|
|
u'binaryAuthorization': ClusterBinaryauthorization(module.params.get('binary_authorization', {}), module).to_request(),
|
|
u'releaseChannel': ClusterReleasechannel(module.params.get('release_channel', {}), module).to_request(),
|
|
u'shieldedNodes': ClusterShieldednodes(module.params.get('shielded_nodes', {}), module).to_request(),
|
|
u'networkConfig': ClusterNetworkconfig(module.params.get('network_config', {}), module).to_request(),
|
|
u'enableKubernetesAlpha': module.params.get('enable_kubernetes_alpha'),
|
|
}
|
|
request = encode_request(request, module)
|
|
return_vals = {}
|
|
for k, v in request.items():
|
|
if v or v is False:
|
|
return_vals[k] = v
|
|
|
|
return return_vals
|
|
|
|
|
|
def fetch_resource(module, link, allow_not_found=True):
|
|
auth = GcpSession(module, 'container')
|
|
return return_if_object(module, auth.get(link), allow_not_found)
|
|
|
|
|
|
def self_link(module):
|
|
return "https://container.googleapis.com/v1/projects/{project}/locations/{location}/clusters/{name}".format(**module.params)
|
|
|
|
|
|
def collection(module):
|
|
return "https://container.googleapis.com/v1/projects/{project}/locations/{location}/clusters".format(**module.params)
|
|
|
|
|
|
def return_if_object(module, response, allow_not_found=False):
|
|
# If not found, return nothing.
|
|
if allow_not_found and response.status_code == 404:
|
|
return None
|
|
|
|
# If no content, return nothing.
|
|
if response.status_code == 204:
|
|
return None
|
|
|
|
try:
|
|
module.raise_for_status(response)
|
|
result = response.json()
|
|
except getattr(json.decoder, 'JSONDecodeError', ValueError):
|
|
module.fail_json(msg="Invalid JSON response with error: %s" % response.text)
|
|
|
|
if navigate_hash(result, ['error', 'errors']):
|
|
module.fail_json(msg=navigate_hash(result, ['error', 'errors']))
|
|
|
|
return result
|
|
|
|
|
|
def is_different(module, response):
|
|
request = resource_to_request(module)
|
|
response = response_to_hash(module, response)
|
|
|
|
# Remove all output-only from response.
|
|
response_vals = {}
|
|
for k, v in response.items():
|
|
if k in request:
|
|
response_vals[k] = v
|
|
|
|
request_vals = {}
|
|
for k, v in request.items():
|
|
if k in response:
|
|
request_vals[k] = v
|
|
|
|
return GcpRequest(request_vals) != GcpRequest(response_vals)
|
|
|
|
|
|
# Remove unnecessary properties from the response.
|
|
# This is for doing comparisons with Ansible's current parameters.
|
|
def response_to_hash(module, response):
|
|
return {
|
|
u'name': response.get(u'name'),
|
|
u'description': response.get(u'description'),
|
|
u'initialNodeCount': module.params.get('initial_node_count'),
|
|
u'nodeConfig': ClusterNodeconfig(module.params.get('node_config', {}), module).to_request(),
|
|
u'masterAuth': ClusterMasterauth(response.get(u'masterAuth', {}), module).from_response(),
|
|
u'loggingService': response.get(u'loggingService'),
|
|
u'monitoringService': response.get(u'monitoringService'),
|
|
u'network': response.get(u'network'),
|
|
u'databaseEncryption': ClusterDatabaseencryption(response.get(u'databaseEncryption', {}), module).from_response(),
|
|
u'privateClusterConfig': ClusterPrivateclusterconfig(response.get(u'privateClusterConfig', {}), module).from_response(),
|
|
u'clusterIpv4Cidr': response.get(u'clusterIpv4Cidr'),
|
|
u'enableTpu': response.get(u'enableTpu'),
|
|
u'tpuIpv4CidrBlock': response.get(u'tpuIpv4CidrBlock'),
|
|
u'addonsConfig': ClusterAddonsconfig(response.get(u'addonsConfig', {}), module).from_response(),
|
|
u'subnetwork': response.get(u'subnetwork'),
|
|
u'locations': response.get(u'locations'),
|
|
u'resourceLabels': response.get(u'resourceLabels'),
|
|
u'labelFingerprint': response.get(u'labelFingerprint'),
|
|
u'legacyAbac': ClusterLegacyabac(response.get(u'legacyAbac', {}), module).from_response(),
|
|
u'networkPolicy': ClusterNetworkpolicy(response.get(u'networkPolicy', {}), module).from_response(),
|
|
u'defaultMaxPodsConstraint': ClusterDefaultmaxpodsconstraint(response.get(u'defaultMaxPodsConstraint', {}), module).from_response(),
|
|
u'ipAllocationPolicy': ClusterIpallocationpolicy(response.get(u'ipAllocationPolicy', {}), module).from_response(),
|
|
u'endpoint': response.get(u'endpoint'),
|
|
u'initialClusterVersion': response.get(u'initialClusterVersion'),
|
|
u'currentMasterVersion': response.get(u'currentMasterVersion'),
|
|
u'currentNodeVersion': response.get(u'currentNodeVersion'),
|
|
u'createTime': response.get(u'createTime'),
|
|
u'status': response.get(u'status'),
|
|
u'statusMessage': response.get(u'statusMessage'),
|
|
u'nodeIpv4CidrSize': response.get(u'nodeIpv4CidrSize'),
|
|
u'servicesIpv4Cidr': response.get(u'servicesIpv4Cidr'),
|
|
u'currentNodeCount': response.get(u'currentNodeCount'),
|
|
u'expireTime': response.get(u'expireTime'),
|
|
u'conditions': ClusterConditionsArray(response.get(u'conditions', []), module).from_response(),
|
|
u'masterAuthorizedNetworksConfig': ClusterMasterauthorizednetworksconfig(response.get(u'masterAuthorizedNetworksConfig', {}), module).from_response(),
|
|
u'nodePools': ClusterNodepoolsArray(response.get(u'nodePools', []), module).from_response(),
|
|
u'binaryAuthorization': ClusterBinaryauthorization(response.get(u'binaryAuthorization', {}), module).from_response(),
|
|
u'releaseChannel': ClusterReleasechannel(response.get(u'releaseChannel', {}), module).from_response(),
|
|
u'shieldedNodes': ClusterShieldednodes(response.get(u'shieldedNodes', {}), module).from_response(),
|
|
u'networkConfig': ClusterNetworkconfig(response.get(u'networkConfig', {}), module).from_response(),
|
|
u'enableKubernetesAlpha': response.get(u'enableKubernetesAlpha'),
|
|
}
|
|
|
|
|
|
def async_op_url(module, extra_data=None):
|
|
if extra_data is None:
|
|
extra_data = {}
|
|
url = "https://container.googleapis.com/v1/projects/{project}/locations/{location}/operations/{op_id}"
|
|
combined = extra_data.copy()
|
|
combined.update(module.params)
|
|
return url.format(**combined)
|
|
|
|
|
|
def wait_for_operation(module, response):
|
|
op_result = return_if_object(module, response)
|
|
if op_result is None:
|
|
return {}
|
|
status = navigate_hash(op_result, ['status'])
|
|
wait_done = wait_for_completion(status, op_result, module)
|
|
return fetch_resource(module, navigate_hash(wait_done, ['targetLink']))
|
|
|
|
|
|
def wait_for_completion(status, op_result, module):
|
|
op_id = navigate_hash(op_result, ['name'])
|
|
op_uri = async_op_url(module, {'op_id': op_id})
|
|
while status != 'DONE':
|
|
raise_if_errors(op_result, ['error', 'errors'], module)
|
|
time.sleep(1.0)
|
|
op_result = fetch_resource(module, op_uri, False)
|
|
status = navigate_hash(op_result, ['status'])
|
|
return op_result
|
|
|
|
|
|
def raise_if_errors(response, err_path, module):
|
|
errors = navigate_hash(response, err_path)
|
|
if errors is not None:
|
|
module.fail_json(msg=errors)
|
|
|
|
|
|
# Google Container Engine API has its own layout for the create method,
|
|
# defined like this:
|
|
#
|
|
# {
|
|
# 'cluster': {
|
|
# ... cluster data
|
|
# }
|
|
# }
|
|
#
|
|
# Format the request to match the expected input by the API
|
|
def encode_request(resource_request, module):
|
|
return {'cluster': resource_request}
|
|
|
|
|
|
# Deletes the default node pool on default creation.
|
|
def delete_default_node_pool(module):
|
|
auth = GcpSession(module, 'container')
|
|
link = "https://container.googleapis.com/v1/projects/%s/locations/%s/clusters/%s/nodePools/default-pool" % (
|
|
module.params['project'],
|
|
module.params['location'],
|
|
module.params['name'],
|
|
)
|
|
return wait_for_operation(module, auth.delete(link))
|
|
|
|
|
|
class Kubectl(object):
|
|
def __init__(self, module):
|
|
self.module = module
|
|
|
|
"""
|
|
Writes a kubectl config file
|
|
kubectl_path must be set or this will fail.
|
|
"""
|
|
|
|
def write_file(self):
|
|
try:
|
|
import yaml
|
|
except ImportError:
|
|
self.module.fail_json(msg="Please install the pyyaml module")
|
|
|
|
with open(self.module.params['kubectl_path'], 'w') as f:
|
|
f.write(yaml.dump(self._contents()))
|
|
|
|
"""
|
|
Returns the contents of a kubectl file
|
|
"""
|
|
|
|
def _contents(self):
|
|
token = self._auth_token()
|
|
endpoint = "https://%s" % self.fetch["endpoint"]
|
|
context = self.module.params.get('kubectl_context')
|
|
if not context:
|
|
context = self.module.params['name']
|
|
|
|
user = {
|
|
'name': context,
|
|
'user': {
|
|
'auth-provider': {
|
|
'config': {
|
|
'access-token': token,
|
|
'cmd-args': 'config config-helper --format=json',
|
|
'cmd-path': '/usr/lib64/google-cloud-sdk/bin/gcloud',
|
|
'expiry-key': '{.credential.token_expiry}',
|
|
'token-key': '{.credential.access_token}',
|
|
},
|
|
'name': 'gcp',
|
|
},
|
|
},
|
|
}
|
|
|
|
auth_keyword = self.fetch['masterAuth'].keys()
|
|
if 'username' in auth_keyword and 'password' in auth_keyword:
|
|
user['user']['auth-provider'].update({
|
|
'username': str(self.fetch['masterAuth']['username']),
|
|
'password': str(self.fetch['masterAuth']['password']),
|
|
})
|
|
|
|
return {
|
|
'apiVersion': 'v1',
|
|
'clusters': [{'name': context, 'cluster': {'certificate-authority-data': str(self.fetch['masterAuth']['clusterCaCertificate'])}}],
|
|
'contexts': [{'name': context, 'context': {'cluster': context, 'user': context}}],
|
|
'current-context': context,
|
|
'kind': 'Config',
|
|
'preferences': {},
|
|
'users': [user],
|
|
}
|
|
|
|
"""
|
|
Returns the auth token used in kubectl
|
|
This also sets the 'fetch' variable used in creating the kubectl
|
|
"""
|
|
|
|
def _auth_token(self):
|
|
auth = GcpSession(self.module, 'auth')
|
|
response = auth.get(self_link(self.module))
|
|
self.fetch = response.json()
|
|
return response.request.headers['authorization'].split(' ')[1]
|
|
|
|
|
|
class ClusterNodeconfig(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict(
|
|
{
|
|
u'machineType': self.request.get('machine_type'),
|
|
u'diskSizeGb': self.request.get('disk_size_gb'),
|
|
u'oauthScopes': self.request.get('oauth_scopes'),
|
|
u'serviceAccount': self.request.get('service_account'),
|
|
u'metadata': self.request.get('metadata'),
|
|
u'imageType': self.request.get('image_type'),
|
|
u'labels': self.request.get('labels'),
|
|
u'localSsdCount': self.request.get('local_ssd_count'),
|
|
u'tags': self.request.get('tags'),
|
|
u'preemptible': self.request.get('preemptible'),
|
|
u'accelerators': ClusterAcceleratorsArray(self.request.get('accelerators', []), self.module).to_request(),
|
|
u'diskType': self.request.get('disk_type'),
|
|
u'minCpuPlatform': self.request.get('min_cpu_platform'),
|
|
u'taints': ClusterTaintsArray(self.request.get('taints', []), self.module).to_request(),
|
|
u'shieldedInstanceConfig': ClusterShieldedinstanceconfig(self.request.get('shielded_instance_config', {}), self.module).to_request(),
|
|
}
|
|
)
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict(
|
|
{
|
|
u'machineType': self.request.get(u'machineType'),
|
|
u'diskSizeGb': self.request.get(u'diskSizeGb'),
|
|
u'oauthScopes': self.request.get(u'oauthScopes'),
|
|
u'serviceAccount': self.request.get(u'serviceAccount'),
|
|
u'metadata': self.request.get(u'metadata'),
|
|
u'imageType': self.request.get(u'imageType'),
|
|
u'labels': self.request.get(u'labels'),
|
|
u'localSsdCount': self.request.get(u'localSsdCount'),
|
|
u'tags': self.request.get(u'tags'),
|
|
u'preemptible': self.request.get(u'preemptible'),
|
|
u'accelerators': ClusterAcceleratorsArray(self.request.get(u'accelerators', []), self.module).from_response(),
|
|
u'diskType': self.request.get(u'diskType'),
|
|
u'minCpuPlatform': self.request.get(u'minCpuPlatform'),
|
|
u'taints': ClusterTaintsArray(self.request.get(u'taints', []), self.module).from_response(),
|
|
u'shieldedInstanceConfig': ClusterShieldedinstanceconfig(self.request.get(u'shieldedInstanceConfig', {}), self.module).from_response(),
|
|
}
|
|
)
|
|
|
|
|
|
class ClusterAcceleratorsArray(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = []
|
|
|
|
def to_request(self):
|
|
items = []
|
|
for item in self.request:
|
|
items.append(self._request_for_item(item))
|
|
return items
|
|
|
|
def from_response(self):
|
|
items = []
|
|
for item in self.request:
|
|
items.append(self._response_from_item(item))
|
|
return items
|
|
|
|
def _request_for_item(self, item):
|
|
return remove_nones_from_dict({u'acceleratorCount': item.get('accelerator_count'), u'acceleratorType': item.get('accelerator_type')})
|
|
|
|
def _response_from_item(self, item):
|
|
return remove_nones_from_dict({u'acceleratorCount': item.get(u'acceleratorCount'), u'acceleratorType': item.get(u'acceleratorType')})
|
|
|
|
|
|
class ClusterTaintsArray(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = []
|
|
|
|
def to_request(self):
|
|
items = []
|
|
for item in self.request:
|
|
items.append(self._request_for_item(item))
|
|
return items
|
|
|
|
def from_response(self):
|
|
items = []
|
|
for item in self.request:
|
|
items.append(self._response_from_item(item))
|
|
return items
|
|
|
|
def _request_for_item(self, item):
|
|
return remove_nones_from_dict({u'key': item.get('key'), u'value': item.get('value'), u'effect': item.get('effect')})
|
|
|
|
def _response_from_item(self, item):
|
|
return remove_nones_from_dict({u'key': item.get(u'key'), u'value': item.get(u'value'), u'effect': item.get(u'effect')})
|
|
|
|
|
|
class ClusterShieldedinstanceconfig(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict(
|
|
{u'enableSecureBoot': self.request.get('enable_secure_boot'), u'enableIntegrityMonitoring': self.request.get('enable_integrity_monitoring')}
|
|
)
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict(
|
|
{u'enableSecureBoot': self.request.get(u'enableSecureBoot'), u'enableIntegrityMonitoring': self.request.get(u'enableIntegrityMonitoring')}
|
|
)
|
|
|
|
|
|
class ClusterMasterauth(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict(
|
|
{
|
|
u'username': self.request.get('username'),
|
|
u'password': self.request.get('password'),
|
|
u'clientCertificateConfig': ClusterClientcertificateconfig(self.request.get('client_certificate_config', {}), self.module).to_request(),
|
|
}
|
|
)
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict(
|
|
{
|
|
u'username': self.request.get(u'username'),
|
|
u'password': self.request.get(u'password'),
|
|
u'clientCertificateConfig': ClusterClientcertificateconfig(self.request.get(u'clientCertificateConfig', {}), self.module).from_response(),
|
|
}
|
|
)
|
|
|
|
|
|
class ClusterClientcertificateconfig(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict({u'issueClientCertificate': self.request.get('issue_client_certificate')})
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict({u'issueClientCertificate': self.request.get(u'issueClientCertificate')})
|
|
|
|
|
|
class ClusterDatabaseencryption(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict({u'state': self.request.get('state'), u'keyName': self.request.get('key_name')})
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict({u'state': self.request.get(u'state'), u'keyName': self.request.get(u'keyName')})
|
|
|
|
|
|
class ClusterPrivateclusterconfig(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict(
|
|
{
|
|
u'enablePrivateNodes': self.request.get('enable_private_nodes'),
|
|
u'enablePrivateEndpoint': self.request.get('enable_private_endpoint'),
|
|
u'masterIpv4CidrBlock': self.request.get('master_ipv4_cidr_block'),
|
|
}
|
|
)
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict(
|
|
{
|
|
u'enablePrivateNodes': self.request.get(u'enablePrivateNodes'),
|
|
u'enablePrivateEndpoint': self.request.get(u'enablePrivateEndpoint'),
|
|
u'masterIpv4CidrBlock': self.request.get(u'masterIpv4CidrBlock'),
|
|
}
|
|
)
|
|
|
|
|
|
class ClusterAddonsconfig(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict(
|
|
{
|
|
u'httpLoadBalancing': ClusterHttploadbalancing(self.request.get('http_load_balancing', {}), self.module).to_request(),
|
|
u'horizontalPodAutoscaling': ClusterHorizontalpodautoscaling(self.request.get('horizontal_pod_autoscaling', {}), self.module).to_request(),
|
|
u'networkPolicyConfig': ClusterNetworkpolicyconfig(self.request.get('network_policy_config', {}), self.module).to_request(),
|
|
}
|
|
)
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict(
|
|
{
|
|
u'httpLoadBalancing': ClusterHttploadbalancing(self.request.get(u'httpLoadBalancing', {}), self.module).from_response(),
|
|
u'horizontalPodAutoscaling': ClusterHorizontalpodautoscaling(self.request.get(u'horizontalPodAutoscaling', {}), self.module).from_response(),
|
|
u'networkPolicyConfig': ClusterNetworkpolicyconfig(self.request.get(u'networkPolicyConfig', {}), self.module).from_response(),
|
|
}
|
|
)
|
|
|
|
|
|
class ClusterHttploadbalancing(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict({u'disabled': self.request.get('disabled')})
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict({u'disabled': self.request.get(u'disabled')})
|
|
|
|
|
|
class ClusterHorizontalpodautoscaling(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict({u'disabled': self.request.get('disabled')})
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict({u'disabled': self.request.get(u'disabled')})
|
|
|
|
|
|
class ClusterNetworkpolicyconfig(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict({u'disabled': self.request.get('disabled')})
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict({u'disabled': self.request.get(u'disabled')})
|
|
|
|
|
|
class ClusterLegacyabac(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict({u'enabled': self.request.get('enabled')})
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict({u'enabled': self.request.get(u'enabled')})
|
|
|
|
|
|
class ClusterNetworkpolicy(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict({u'provider': self.request.get('provider'), u'enabled': self.request.get('enabled')})
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict({u'provider': self.request.get(u'provider'), u'enabled': self.request.get(u'enabled')})
|
|
|
|
|
|
class ClusterDefaultmaxpodsconstraint(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict({u'maxPodsPerNode': self.request.get('max_pods_per_node')})
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict({u'maxPodsPerNode': self.request.get(u'maxPodsPerNode')})
|
|
|
|
|
|
class ClusterIpallocationpolicy(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict(
|
|
{
|
|
u'useIpAliases': self.request.get('use_ip_aliases'),
|
|
u'createSubnetwork': self.request.get('create_subnetwork'),
|
|
u'subnetworkName': self.request.get('subnetwork_name'),
|
|
u'clusterSecondaryRangeName': self.request.get('cluster_secondary_range_name'),
|
|
u'servicesSecondaryRangeName': self.request.get('services_secondary_range_name'),
|
|
u'clusterIpv4CidrBlock': self.request.get('cluster_ipv4_cidr_block'),
|
|
u'nodeIpv4CidrBlock': self.request.get('node_ipv4_cidr_block'),
|
|
u'servicesIpv4CidrBlock': self.request.get('services_ipv4_cidr_block'),
|
|
u'tpuIpv4CidrBlock': self.request.get('tpu_ipv4_cidr_block'),
|
|
u'stackType': self.request.get('stack_type'),
|
|
}
|
|
)
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict(
|
|
{
|
|
u'useIpAliases': self.request.get(u'useIpAliases'),
|
|
u'createSubnetwork': self.request.get(u'createSubnetwork'),
|
|
u'subnetworkName': self.request.get(u'subnetworkName'),
|
|
u'clusterSecondaryRangeName': self.request.get(u'clusterSecondaryRangeName'),
|
|
u'servicesSecondaryRangeName': self.request.get(u'servicesSecondaryRangeName'),
|
|
u'clusterIpv4CidrBlock': self.request.get(u'clusterIpv4CidrBlock'),
|
|
u'nodeIpv4CidrBlock': self.request.get(u'nodeIpv4CidrBlock'),
|
|
u'servicesIpv4CidrBlock': self.request.get(u'servicesIpv4CidrBlock'),
|
|
u'tpuIpv4CidrBlock': self.request.get(u'tpuIpv4CidrBlock'),
|
|
}
|
|
)
|
|
|
|
|
|
class ClusterConditionsArray(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = []
|
|
|
|
def to_request(self):
|
|
items = []
|
|
for item in self.request:
|
|
items.append(self._request_for_item(item))
|
|
return items
|
|
|
|
def from_response(self):
|
|
items = []
|
|
for item in self.request:
|
|
items.append(self._response_from_item(item))
|
|
return items
|
|
|
|
def _request_for_item(self, item):
|
|
return remove_nones_from_dict({u'code': item.get('code'), u'message': item.get('message')})
|
|
|
|
def _response_from_item(self, item):
|
|
return remove_nones_from_dict({u'code': item.get(u'code'), u'message': item.get(u'message')})
|
|
|
|
|
|
class ClusterMasterauthorizednetworksconfig(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict(
|
|
{u'enabled': self.request.get('enabled'), u'cidrBlocks': ClusterCidrblocksArray(self.request.get('cidr_blocks', []), self.module).to_request()}
|
|
)
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict(
|
|
{u'enabled': self.request.get(u'enabled'), u'cidrBlocks': ClusterCidrblocksArray(self.request.get(u'cidrBlocks', []), self.module).from_response()}
|
|
)
|
|
|
|
|
|
class ClusterCidrblocksArray(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = []
|
|
|
|
def to_request(self):
|
|
items = []
|
|
for item in self.request:
|
|
items.append(self._request_for_item(item))
|
|
return items
|
|
|
|
def from_response(self):
|
|
items = []
|
|
for item in self.request:
|
|
items.append(self._response_from_item(item))
|
|
return items
|
|
|
|
def _request_for_item(self, item):
|
|
return remove_nones_from_dict({u'displayName': item.get('display_name'), u'cidrBlock': item.get('cidr_block')})
|
|
|
|
def _response_from_item(self, item):
|
|
return remove_nones_from_dict({u'displayName': item.get(u'displayName'), u'cidrBlock': item.get(u'cidrBlock')})
|
|
|
|
|
|
class ClusterNodepoolsArray(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = []
|
|
|
|
def to_request(self):
|
|
items = []
|
|
for item in self.request:
|
|
items.append(self._request_for_item(item))
|
|
return items
|
|
|
|
def from_response(self):
|
|
items = []
|
|
for item in self.request:
|
|
items.append(self._response_from_item(item))
|
|
return items
|
|
|
|
def _request_for_item(self, item):
|
|
return remove_nones_from_dict({u'name': item.get('name')})
|
|
|
|
def _response_from_item(self, item):
|
|
return remove_nones_from_dict({u'name': item.get(u'name')})
|
|
|
|
|
|
class ClusterBinaryauthorization(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict({u'enabled': self.request.get('enabled')})
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict({u'enabled': self.request.get(u'enabled')})
|
|
|
|
|
|
class ClusterReleasechannel(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict({u'channel': self.request.get('channel')})
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict({u'channel': self.request.get(u'channel')})
|
|
|
|
|
|
class ClusterShieldednodes(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict({u'enabled': self.request.get('enabled')})
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict({u'enabled': self.request.get(u'enabled')})
|
|
|
|
|
|
class ClusterNetworkconfig(object):
|
|
def __init__(self, request, module):
|
|
self.module = module
|
|
if request:
|
|
self.request = request
|
|
else:
|
|
self.request = {}
|
|
|
|
def to_request(self):
|
|
return remove_nones_from_dict({
|
|
u'enableIntraNodeVisibility': self.request.get('enable_intra_node_visibility'),
|
|
u'defaultSnatStatus': self.request.get('default_snat_status'),
|
|
u'datapathProvider': self.request.get('datapath_provider'),
|
|
})
|
|
|
|
def from_response(self):
|
|
return remove_nones_from_dict({
|
|
u'enableIntraNodeVisibility': self.request.get(u'enableIntraNodeVisibility'),
|
|
u'defaultSnatStatus': self.request.get(u'defaultSnatStatus'),
|
|
u'datapathProvider': self.request.get('datapath_provider'),
|
|
})
|
|
|
|
|
|
if __name__ == '__main__':
|
|
main()
|