File: //snap/google-cloud-cli/394/lib/surface/compute/networks/subnets/create.py
# -*- coding: utf-8 -*- #
# Copyright 2014 Google LLC. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""Command for creating subnetworks."""
from __future__ import absolute_import
from __future__ import division
from __future__ import unicode_literals
from googlecloudsdk.api_lib.compute import base_classes
from googlecloudsdk.api_lib.compute import subnets_utils
from googlecloudsdk.api_lib.compute import utils as compute_api
from googlecloudsdk.api_lib.util import apis
from googlecloudsdk.calliope import arg_parsers
from googlecloudsdk.calliope import base
from googlecloudsdk.command_lib.compute import flags as compute_flags
from googlecloudsdk.command_lib.compute import resource_manager_tags_utils
from googlecloudsdk.command_lib.compute.networks import flags as network_flags
from googlecloudsdk.command_lib.compute.networks.subnets import flags
from googlecloudsdk.command_lib.util.apis import arg_utils
import six
def _DetailedHelp():
return {
'brief':
'Define a subnet for a network in custom subnet mode.',
'DESCRIPTION':
"""\
*{command}* define a subnetwork for a network in custom subnet mode.
Subnets must be uniquely named per region.
""",
'EXAMPLES':
"""\
To create the subnetwork ``subnet-1'' with address range ``10.10.0.0/24'' in the network ``network-0'', run:
$ {command} subnet-1 --network=network-0 --range=10.10.0.0/24 --region=us-central1
"""
}
def _AddArgs(
parser,
include_alpha_logging,
include_aggregate_purpose,
include_l2,
include_internal_ipv6_prefix,
include_custom_hardware_link,
api_version,
include_peer_migration_purpose,
include_resolve_subnet_mask,
):
"""Add subnetwork create arguments to parser."""
parser.display_info.AddFormat(flags.DEFAULT_LIST_FORMAT_WITH_IPV6_FIELD)
flags.SubnetworkArgument().AddArgument(parser, operation_type='create')
network_flags.NetworkArgumentForOtherResource(
'The network to which the subnetwork belongs.').AddArgument(parser)
messages = apis.GetMessagesModule('compute',
compute_api.COMPUTE_GA_API_VERSION)
parser.add_argument(
'--description', help='An optional description of this subnetwork.')
parser.add_argument(
'--range',
help='The IP space allocated to this subnetwork in CIDR format.')
parser.add_argument(
'--enable-private-ip-google-access',
action='store_true',
default=False,
help=('Enable/disable access to Google Cloud APIs from this subnet for '
'instances without a public ip address.'))
parser.add_argument(
'--secondary-range',
type=arg_parsers.ArgDict(min_length=1),
action='append',
metavar='PROPERTY=VALUE',
help="""\
Adds a secondary IP range to the subnetwork for use in IP aliasing.
For example, `--secondary-range range1=192.168.64.0/24` adds
a secondary range 192.168.64.0/24 with name range1.
* `RANGE_NAME` - Name of the secondary range.
* `RANGE` - `IP range in CIDR format.`
""")
parser.add_argument(
'--enable-flow-logs',
action='store_true',
default=None,
help=('Enable/disable VPC Flow Logs for this subnet. More information '
'for VPC Flow Logs can be found at '
'https://cloud.google.com/vpc/docs/using-flow-logs.'))
flags.AddLoggingAggregationInterval(parser, messages)
parser.add_argument(
'--logging-flow-sampling',
type=arg_parsers.BoundedFloat(lower_bound=0.0, upper_bound=1.0),
help="""\
Can only be specified if VPC Flow Logs for this subnetwork is
enabled. The value of the field must be in [0, 1]. Set the sampling rate
of VPC flow logs within the subnetwork where 1.0 means all collected
logs are reported and 0.0 means no logs are reported. Default is 0.5
which means half of all collected logs are reported.
""")
parser.add_argument(
'--logging-filter-expr',
help="""\
Can only be specified if VPC Flow Logs for this subnetwork is enabled.
Export filter used to define which logs should be generated.
""")
flags.AddLoggingMetadata(parser, messages)
parser.add_argument(
'--logging-metadata-fields',
type=arg_parsers.ArgList(),
metavar='METADATA_FIELD',
default=None,
help="""\
Can only be specified if VPC Flow Logs for this subnetwork is enabled
and "metadata" is set to CUSTOM_METADATA. The comma-separated list of
metadata fields that should be added to reported logs.
""")
if include_alpha_logging:
messages = apis.GetMessagesModule('compute',
compute_api.COMPUTE_ALPHA_API_VERSION)
flags.AddLoggingAggregationIntervalDeprecated(parser, messages)
parser.add_argument(
'--flow-sampling',
type=arg_parsers.BoundedFloat(lower_bound=0.0, upper_bound=1.0),
help="""\
Can only be specified if VPC flow logging for this subnetwork is
enabled. The value of the field must be in [0, 1]. Set the sampling rate
of VPC flow logs within the subnetwork where 1.0 means all collected
logs are reported and 0.0 means no logs are reported. Default is 0.5
which means half of all collected logs are reported.
""")
flags.AddLoggingMetadataDeprecated(parser, messages)
purpose_choices = {
'PRIVATE': 'Regular user created or automatically created subnet.',
'INTERNAL_HTTPS_LOAD_BALANCER': (
'Reserved for Internal HTTP(S) Load Balancing.'
),
'REGIONAL_MANAGED_PROXY': (
'Reserved for Regional Envoy-based Load Balancing.'
),
'GLOBAL_MANAGED_PROXY': (
'Reserved for Global Envoy-based Load Balancing.'
),
'PRIVATE_SERVICE_CONNECT': (
'Reserved for Private Service Connect Internal Load Balancing.'
),
'PRIVATE_NAT': 'Reserved for use as source range for Private NAT.',
'PEER_MIGRATION': 'Reserved for subnet migration between peered VPCs.',
}
if include_aggregate_purpose:
purpose_choices['AGGREGATE'] = (
'Reserved for Aggregate Ranges used for aggregating '
'private subnetworks.'
)
if include_custom_hardware_link:
purpose_choices['CUSTOM_HARDWARE_LINK'] = (
'Reserved for Custom Hardware Link.'
)
if include_peer_migration_purpose:
purpose_choices['PEER_MIGRATION'] = (
'Reserved for subnet migration between peered VPCs.'
)
# Subnetwork purpose is introduced with L7ILB feature. Aggregate purpose
# will have to be enabled for a given release track only after L7ILB feature
# is enabled for that release track. Hence if include_aggregate_purpose
# true, this code assumes that L7ILB purpose is enabled.
parser.add_argument(
'--purpose',
choices=purpose_choices,
type=arg_utils.ChoiceToEnumName,
help='The purpose of this subnetwork.')
parser.add_argument(
'--role',
choices={
'ACTIVE': 'The ACTIVE subnet that is currently used.',
'BACKUP': 'The BACKUP subnet that could be promoted to ACTIVE.',
},
type=lambda x: x.replace('-', '_').upper(),
help=(
'The role of subnetwork. This field is required when the purpose is'
' set to GLOBAL_MANAGED_PROXY, REGIONAL_MANAGED_PROXY or'
' INTERNAL_HTTPS_LOAD_BALANCER.'
),
)
# Add private ipv6 google access enum based on api version.
messages = apis.GetMessagesModule('compute', api_version)
GetPrivateIpv6GoogleAccessTypeFlagMapper(messages).choice_arg.AddToParser(
parser)
stack_type_choices = {
'IPV4_ONLY': (
'New VMs in this subnet will only be assigned IPv4 addresses'
),
'IPV4_IPV6': (
'New VMs in this subnet can have both IPv4 and IPv6 addresses'
),
'IPV6_ONLY': (
'New VMs in this subnet will only be assigned IPv6 addresses'
)
}
parser.add_argument(
'--stack-type',
choices=stack_type_choices,
type=arg_utils.ChoiceToEnumName,
help=(
'The stack type for this subnet. Determines if IPv6 is enabled '
'on the subnet. If not specified IPV4_ONLY will be used.'
),
)
ipv6_access_type_choices = {
'EXTERNAL': 'VMs in this subnet can have external IPv6.',
'INTERNAL': 'VMs in this subnet can have internal IPv6.'
}
parser.add_argument(
'--ipv6-access-type',
choices=ipv6_access_type_choices,
type=arg_utils.ChoiceToEnumName,
help=(
'IPv6 access type can be specified only when the subnet is '
'created, or when the subnet is first updated to have a stack '
'type of IPV4_IPV6. Once set, the access type is immutable.'
),
)
parser.display_info.AddCacheUpdater(network_flags.NetworksCompleter)
if include_l2:
l2_args = parser.add_group(help='L2 networking specifications.')
l2_args.add_argument(
'--enable-l2',
action='store_true',
required=True,
help="""\
If set to true, enables l2 networking capability on subnetwork.
""")
l2_args.add_argument(
'--vlan',
type=int,
metavar='VLAN',
help="""\
Specifies ID of the vlan to tag the subnetwork.
""")
parser.add_argument(
'--reserved-internal-range',
help=("""
If set, the primary IP range of the subnetwork will be
associated with the given internal range resource.
If --range is set, the subnetwork will only use the given IP range,
which must be contained by the IP range defined by the internal range resource.
For example,
--range=10.0.0.0/24
--reserved-internal-range //networkconnectivity.googleapis.com/projects/PROJECT/locations/global/internalRanges/RANGE
If --range is not set, the subnetwork will use the entire IP range
defined by the internal range resource.
For example, `--reserved-internal-range //networkconnectivity.googleapis.com/projects/PROJECT/locations/global/internalRanges/RANGE`
"""),
)
parser.add_argument(
'--secondary-range-with-reserved-internal-range',
type=arg_parsers.ArgDict(min_length=1),
action='append',
metavar='RANGE_NAME=INTERNAL_RANGE_URL',
help="""\
Adds secondary IP ranges that are associated with internal range
resources.
For example, `--secondary-range-with-reserved-internal-range
range1=//networkconnectivity.googleapis.com/projects/PROJECT/locations/global/internalRanges/RANGE`
adds a secondary range with the reserved internal range resource.
* `RANGE_NAME` - Name of the secondary range.
* `INTERNAL_RANGE_URL` - `URL of an internal range resource.`
""",
)
parser.add_argument(
'--external-ipv6-prefix',
help=("""
The /64 external IPv6 CIDR range to assign to this subnet. The range must
be associated with an IPv6 BYOIP sub-prefix that is defined by the
--ip-collection flag. If you specify --ip-collection but not
--external-ipv6-prefix, a random /64 range is allocated from
the sub-prefix.
For example, `--external-ipv6-prefix=2600:1901:0:0:0:0:0:0/64`
"""),
)
if include_internal_ipv6_prefix:
parser.add_argument(
'--internal-ipv6-prefix',
help=("""
Set internal IPv6 prefix to be allocated for this subnetwork.
When ULA is enabled, the prefix will be ignored.
For example, `--internal-ipv6-prefix 2600:1901:0:0:0:0:0:0/64`
"""),
)
parser.add_argument(
'--resource-manager-tags',
type=arg_parsers.ArgDict(),
metavar='KEY=VALUE',
help="""\
A comma-separated list of Resource Manager tags to apply to the subnetwork.
""",
)
if include_resolve_subnet_mask:
resolve_subnet_mask_choices = {
'ARP_ALL_RANGES': """
VMs connected to this subnet receive ARP responses for IPv4
addresses from any ranges of the subnet that are assigned to the VM's
NIC. The DHCP responses contain the netmask of the subnet, instead of
/32.
""",
'ARP_PRIMARY_RANGE': """
VMs connected to this subnet receive ARP responses only for IP
addresses in the primary IPv4 range of the subnet. DHCP responses
contain the netmask of the subnet, instead of /32.
""",
}
parser.add_argument(
'--resolve-subnet-mask',
choices=resolve_subnet_mask_choices,
type=arg_utils.ChoiceToEnumName,
help='Resolve subnet mask can only be set when subnet is created.',
)
flags.IpCollectionArgument().AddArgument(parser)
def GetPrivateIpv6GoogleAccessTypeFlagMapper(messages):
return arg_utils.ChoiceEnumMapper(
'--private-ipv6-google-access-type',
messages.Subnetwork.PrivateIpv6GoogleAccessValueValuesEnum,
custom_mappings={
'DISABLE_GOOGLE_ACCESS':
'disable',
'ENABLE_BIDIRECTIONAL_ACCESS_TO_GOOGLE':
'enable-bidirectional-access',
'ENABLE_OUTBOUND_VM_ACCESS_TO_GOOGLE':
'enable-outbound-vm-access'
},
help_str='The private IPv6 google access type for the VMs in this subnet.'
)
def _CreateSubnetwork(
messages,
subnet_ref,
network_ref,
args,
include_alpha_logging,
include_aggregate_purpose,
include_l2,
include_internal_ipv6_prefix,
include_custom_hardware_link,
ip_collection_ref,
include_peer_migration_purpose,
include_resolve_subnet_mask,
):
"""Create the subnet resource."""
subnetwork = messages.Subnetwork(
name=subnet_ref.Name(),
description=args.description,
network=network_ref.SelfLink(),
privateIpGoogleAccess=args.enable_private_ip_google_access)
if args.range:
subnetwork.ipCidrRange = args.range
if (args.enable_flow_logs is not None or
args.logging_aggregation_interval is not None or
args.logging_flow_sampling is not None or
args.logging_metadata is not None or
args.logging_filter_expr is not None or
args.logging_metadata_fields is not None):
log_config = messages.SubnetworkLogConfig(enable=args.enable_flow_logs)
if args.logging_aggregation_interval:
log_config.aggregationInterval = flags.GetLoggingAggregationIntervalArg(
messages).GetEnumForChoice(args.logging_aggregation_interval)
if args.logging_flow_sampling is not None:
log_config.flowSampling = args.logging_flow_sampling
if args.logging_metadata:
log_config.metadata = flags.GetLoggingMetadataArg(
messages).GetEnumForChoice(args.logging_metadata)
if args.logging_filter_expr is not None:
log_config.filterExpr = args.logging_filter_expr
if args.logging_metadata_fields is not None:
log_config.metadataFields = args.logging_metadata_fields
subnetwork.logConfig = log_config
if include_alpha_logging:
if (args.enable_flow_logs is not None or
args.aggregation_interval is not None or
args.flow_sampling is not None or args.metadata is not None):
log_config = (
subnetwork.logConfig if subnetwork.logConfig is not None else
messages.SubnetworkLogConfig(enable=args.enable_flow_logs))
if args.aggregation_interval:
log_config.aggregationInterval = (
flags.GetLoggingAggregationIntervalArgDeprecated(
messages).GetEnumForChoice(args.aggregation_interval))
if args.flow_sampling is not None:
log_config.flowSampling = args.flow_sampling
if args.metadata:
log_config.metadata = flags.GetLoggingMetadataArgDeprecated(
messages).GetEnumForChoice(args.metadata)
if args.logging_filter_expr is not None:
log_config.filterExpr = args.logging_filter_expr
if args.logging_metadata_fields is not None:
log_config.metadataFields = args.logging_metadata_fields
subnetwork.logConfig = log_config
if args.purpose:
subnetwork.purpose = messages.Subnetwork.PurposeValueValuesEnum(
args.purpose)
if (
subnetwork.purpose
== messages.Subnetwork.PurposeValueValuesEnum.INTERNAL_HTTPS_LOAD_BALANCER
or subnetwork.purpose
== messages.Subnetwork.PurposeValueValuesEnum.REGIONAL_MANAGED_PROXY
or subnetwork.purpose
== messages.Subnetwork.PurposeValueValuesEnum.GLOBAL_MANAGED_PROXY
or subnetwork.purpose
== messages.Subnetwork.PurposeValueValuesEnum.PRIVATE_SERVICE_CONNECT
or (
include_peer_migration_purpose
and subnetwork.purpose
== messages.Subnetwork.PurposeValueValuesEnum.PEER_MIGRATION
)
or (
include_aggregate_purpose
and subnetwork.purpose
== messages.Subnetwork.PurposeValueValuesEnum.AGGREGATE
)
or (
include_custom_hardware_link
and subnetwork.purpose
== messages.Subnetwork.PurposeValueValuesEnum.CUSTOM_HARDWARE_LINK
)
):
# Clear unsupported fields in the subnet resource
subnetwork.privateIpGoogleAccess = None
subnetwork.enableFlowLogs = None
subnetwork.logConfig = None
if getattr(args, 'role', None):
subnetwork.role = messages.Subnetwork.RoleValueValuesEnum(args.role)
if args.private_ipv6_google_access_type is not None:
subnetwork.privateIpv6GoogleAccess = (
flags.GetPrivateIpv6GoogleAccessTypeFlagMapper(
messages).GetEnumForChoice(args.private_ipv6_google_access_type))
if args.stack_type:
subnetwork.stackType = messages.Subnetwork.StackTypeValueValuesEnum(
args.stack_type)
if args.ipv6_access_type:
subnetwork.ipv6AccessType = (
messages.Subnetwork.Ipv6AccessTypeValueValuesEnum(
args.ipv6_access_type))
if include_l2 and args.enable_l2:
subnetwork.enableL2 = True
if args.vlan is not None:
subnetwork.vlans.append(args.vlan)
if args.reserved_internal_range:
subnetwork.reservedInternalRange = args.reserved_internal_range
if args.external_ipv6_prefix:
subnetwork.externalIpv6Prefix = args.external_ipv6_prefix
if include_internal_ipv6_prefix:
if args.internal_ipv6_prefix:
subnetwork.internalIpv6Prefix = args.internal_ipv6_prefix
if ip_collection_ref:
subnetwork.ipCollection = ip_collection_ref.SelfLink()
if args.resource_manager_tags is not None:
subnetwork.params = _CreateSubnetworkParams(
messages, args.resource_manager_tags
)
if include_resolve_subnet_mask:
if args.resolve_subnet_mask:
subnetwork.resolveSubnetMask = (
messages.Subnetwork.ResolveSubnetMaskValueValuesEnum(
args.resolve_subnet_mask
)
)
return subnetwork
def _CreateSubnetworkParams(messages, resource_manager_tags):
resource_manager_tags_map = (
resource_manager_tags_utils.GetResourceManagerTags(resource_manager_tags)
)
params = messages.SubnetworkParams
additional_properties = [
params.ResourceManagerTagsValue.AdditionalProperty(key=key, value=value)
for key, value in sorted(six.iteritems(resource_manager_tags_map))
]
return params(
resourceManagerTags=params.ResourceManagerTagsValue(
additionalProperties=additional_properties
)
)
def _Run(
args,
holder,
include_alpha_logging,
include_aggregate_purpose,
include_l2,
include_internal_ipv6_prefix,
include_custom_hardware_link,
include_peer_migration_purpose,
include_resolve_subnet_mask,
):
"""Issues a list of requests necessary for adding a subnetwork."""
client = holder.client
network_ref = network_flags.NetworkArgumentForOtherResource(
'The network to which the subnetwork belongs.').ResolveAsResource(
args, holder.resources)
subnet_ref = flags.SubnetworkArgument().ResolveAsResource(
args,
holder.resources,
scope_lister=compute_flags.GetDefaultScopeLister(client))
ip_collection_ref = None
if args.ip_collection:
ip_collection_ref = flags.IpCollectionArgument().ResolveAsResource(
args, holder.resources)
subnetwork = _CreateSubnetwork(
client.messages,
subnet_ref,
network_ref,
args,
include_alpha_logging,
include_aggregate_purpose,
include_l2,
include_internal_ipv6_prefix,
include_custom_hardware_link,
ip_collection_ref,
include_peer_migration_purpose,
include_resolve_subnet_mask,
)
request = client.messages.ComputeSubnetworksInsertRequest(
subnetwork=subnetwork,
region=subnet_ref.region,
project=subnet_ref.project)
secondary_ranges = subnets_utils.CreateSecondaryRanges(
client,
args.secondary_range,
args.secondary_range_with_reserved_internal_range,
)
request.subnetwork.secondaryIpRanges = secondary_ranges
return client.MakeRequests([(client.apitools_client.subnetworks, 'Insert',
request)])
@base.UniverseCompatible
@base.ReleaseTracks(base.ReleaseTrack.GA)
class Create(base.CreateCommand):
"""Create a GA subnet."""
_include_alpha_logging = False
_include_aggregate_purpose = False
_include_l2 = False
_include_internal_ipv6_prefix = False
_api_version = compute_api.COMPUTE_GA_API_VERSION
_include_custom_hardware_link = False
_include_peer_migration_purpose = True
_include_resolve_subnet_mask = False
detailed_help = _DetailedHelp()
@classmethod
def Args(cls, parser):
_AddArgs(
parser,
cls._include_alpha_logging,
cls._include_aggregate_purpose,
cls._include_l2,
cls._include_internal_ipv6_prefix,
cls._include_custom_hardware_link,
cls._api_version,
cls._include_peer_migration_purpose,
cls._include_resolve_subnet_mask,
)
def Run(self, args):
"""Issues a list of requests necessary for adding a subnetwork."""
holder = base_classes.ComputeApiHolder(self.ReleaseTrack())
return _Run(
args,
holder,
self._include_alpha_logging,
self._include_aggregate_purpose,
self._include_l2,
self._include_internal_ipv6_prefix,
self._include_custom_hardware_link,
self._include_peer_migration_purpose,
self._include_resolve_subnet_mask,
)
@base.ReleaseTracks(base.ReleaseTrack.BETA)
class CreateBeta(Create):
"""Create a subnet in the Beta release track."""
_api_version = compute_api.COMPUTE_BETA_API_VERSION
_include_resolve_subnet_mask = True
@base.ReleaseTracks(base.ReleaseTrack.ALPHA)
class CreateAlpha(CreateBeta):
"""Create a subnet in the Alpha release track."""
_include_alpha_logging = True
_include_aggregate_purpose = True
_include_l2 = True
_include_internal_ipv6_prefix = True
_api_version = compute_api.COMPUTE_ALPHA_API_VERSION
_include_custom_hardware_link = True
_include_peer_migration_purpose = True
_include_resolve_subnet_mask = True