HEX
Server: Apache/2.4.65 (Ubuntu)
System: Linux ielts-store-v2 6.8.0-1036-gcp #38~22.04.1-Ubuntu SMP Thu Aug 14 01:19:18 UTC 2025 x86_64
User: root (0)
PHP: 7.2.34-54+ubuntu20.04.1+deb.sury.org+1
Disabled: pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,
Upload Files
File: //snap/google-cloud-cli/current/lib/googlecloudsdk/command_lib/compute/routers/nats/rules/flags.py
# -*- coding: utf-8 -*- #
# Copyright 2020 Google LLC. All Rights Reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
#    http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
"""Flags and helpers for the compute routers nats rules commands."""

from __future__ import absolute_import
from __future__ import division
from __future__ import unicode_literals

import textwrap

from googlecloudsdk.command_lib.compute import flags as compute_flags

_ACTIVE_IPS_HELP = textwrap.dedent("""\
    External IP Addresses to use for connections matching this rule. This flag
    is supported only for Public NAT and is required when creating a Public NAT
    gateway.

    These must be valid reserved external IP addresses in the same region.""")


def _ActiveIpsArgument(required=False):
  return compute_flags.ResourceArgument(
      name='--source-nat-active-ips',
      detailed_help=(_ACTIVE_IPS_HELP),
      resource_name='address',
      regional_collection='compute.addresses',
      region_hidden=True,
      plural=True,
      required=required,
  )


# This is only used in the case where Private NAT isn't supported.
ACTIVE_IPS_ARG_REQUIRED = _ActiveIpsArgument(required=True)

ACTIVE_IPS_ARG_OPTIONAL = _ActiveIpsArgument(required=False)


_ACTIVE_RANGES_HELP_TEXT = textwrap.dedent("""\
    Subnetworks from which addresses are used for connections matching this
    rule. This flag is supported only for Private NAT and is required when
    creating a Private NAT gateway.

    These must be subnetwork resources in the same region, with purpose set to
    PRIVATE_NAT.""")

ACTIVE_RANGES_ARG = compute_flags.ResourceArgument(
    name='--source-nat-active-ranges',
    detailed_help=_ACTIVE_RANGES_HELP_TEXT,
    resource_name='subnetworks',
    regional_collection='compute.subnetworks',
    region_hidden=True,
    plural=True,
    required=False)

_DRAIN_RANGES_HELP_TEXT = textwrap.dedent("""\
    Subnetwork ranges to drain connections on.

    These must be subnetworks previously used as active ranges on this rule.
    No new connections will be established using these ranges.""")

DRAIN_RANGES_ARG = compute_flags.ResourceArgument(
    name='--source-nat-drain-ranges',
    detailed_help=_DRAIN_RANGES_HELP_TEXT,
    resource_name='subnetworks',
    regional_collection='compute.subnetworks',
    region_hidden=True,
    plural=True,
    required=False)


_DRAIN_IPS_HELP_TEXT = textwrap.dedent("""\
    External IP Addresses to drain connections on.

    These must be external IPs previously used as active IPs on this rule.
    No new connections will be established using these IPs.""")
DRAIN_IPS_ARG = compute_flags.ResourceArgument(
    name='--source-nat-drain-ips',
    detailed_help=_DRAIN_IPS_HELP_TEXT,
    resource_name='address',
    regional_collection='compute.addresses',
    region_hidden=True,
    plural=True,
    required=False)

DEFAULT_LIST_FORMAT = """\
    table(
      ruleNumber,
      match
    )"""


def AddNatNameArg(parser):
  """Adds an argument to identify the NAT to which the Rule belongs."""
  parser.add_argument(
      '--nat', help='Name of the NAT that contains the Rule', required=True)


def AddRuleNumberArg(parser, operation_type='operate on', plural=False):
  """Adds a positional argument for the Rule number."""
  help_text = 'Number that uniquely identifies the Rule{} to {}'.format(
      's' if plural else '', operation_type)
  params = {'help': help_text}
  if plural:
    params['nargs'] = '+'

  parser.add_argument('rule_number', type=int, **params)


def AddMatchArg(parser, required=False):
  """Adds common arguments for creating and updating NAT Rules."""
  help_text = textwrap.dedent("""
      CEL Expression used to identify traffic to which this rule applies.

      * Supported attributes (Public NAT): destination.ip
      * Supported attributes (Private NAT): nexthop.hub
      * Supported methods (Public Nat): inIpRange
      * Supported operators (Public NAT): ||, ==
      * Supported operators (Private NAT): ==

      Examples of allowed Match expressions (Public NAT):
      * 'inIpRange(destination.ip, "203.0.113.0/24")''
      * 'destination.ip == "203.0.113.7"'
      * 'destination.ip == "203.0.113.7" || inIpRange(destination.ip, "203.0.113.16/25")'

      Example of allowed Match expression (Private NAT):
      * nexthop.hub == "//networkconnectivity.googleapis.com/projects/p1/locations/global/hubs/h1"
  """)
  parser.add_argument('--match', help=(help_text), required=required)


def AddIpAndRangeArgsForCreate(parser):
  """Adds arguments to specify source NAT IP Addresses when creating a rule."""
  ACTIVE_IPS_ARG_OPTIONAL.AddArgument(parser, cust_metavar='IP_ADDRESS')
  ACTIVE_RANGES_ARG.AddArgument(parser, cust_metavar='SUBNETWORK')


def AddIpAndRangeArgsForUpdate(parser):
  """Adds argument to specify source NAT IP Addresses when updating a rule."""
  ACTIVE_RANGES_ARG.AddArgument(parser, cust_metavar='SUBNETWORK')
  ACTIVE_IPS_ARG_OPTIONAL.AddArgument(parser, cust_metavar='IP_ADDRESS')

  drain_ip_mutex = parser.add_mutually_exclusive_group(required=False)
  drain_ip_mutex.add_argument(
      '--clear-source-nat-drain-ips',
      help='Clear drained IPs from the rule',
      action='store_true',
      default=None,
  )
  DRAIN_IPS_ARG.AddArgument(
      parser, mutex_group=drain_ip_mutex, cust_metavar='IP_ADDRESS')

  drain_range_mutex = parser.add_mutually_exclusive_group(required=False)
  drain_range_mutex.add_argument(
      '--clear-source-nat-drain-ranges',
      help='Clear drained ranges from the rule',
      action='store_true',
      default=None,
  )
  DRAIN_RANGES_ARG.AddArgument(
      parser, mutex_group=drain_range_mutex, cust_metavar='SUBNETWORK'
  )