661 lines
23 KiB
Python
661 lines
23 KiB
Python
# -*- coding: utf-8 -*- #
|
|
# Copyright 2014 Google LLC. All Rights Reserved.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
"""Command for creating subnetworks."""
|
|
|
|
from __future__ import absolute_import
|
|
from __future__ import division
|
|
from __future__ import unicode_literals
|
|
|
|
from googlecloudsdk.api_lib.compute import base_classes
|
|
from googlecloudsdk.api_lib.compute import subnets_utils
|
|
from googlecloudsdk.api_lib.compute import utils as compute_api
|
|
from googlecloudsdk.api_lib.util import apis
|
|
from googlecloudsdk.calliope import arg_parsers
|
|
from googlecloudsdk.calliope import base
|
|
from googlecloudsdk.command_lib.compute import flags as compute_flags
|
|
from googlecloudsdk.command_lib.compute import resource_manager_tags_utils
|
|
from googlecloudsdk.command_lib.compute.networks import flags as network_flags
|
|
from googlecloudsdk.command_lib.compute.networks.subnets import flags
|
|
from googlecloudsdk.command_lib.util.apis import arg_utils
|
|
import six
|
|
|
|
|
|
def _DetailedHelp():
|
|
return {
|
|
'brief':
|
|
'Define a subnet for a network in custom subnet mode.',
|
|
'DESCRIPTION':
|
|
"""\
|
|
*{command}* define a subnetwork for a network in custom subnet mode.
|
|
Subnets must be uniquely named per region.
|
|
""",
|
|
'EXAMPLES':
|
|
"""\
|
|
To create the subnetwork ``subnet-1'' with address range ``10.10.0.0/24'' in the network ``network-0'', run:
|
|
|
|
$ {command} subnet-1 --network=network-0 --range=10.10.0.0/24 --region=us-central1
|
|
"""
|
|
}
|
|
|
|
|
|
def _AddArgs(
|
|
parser,
|
|
include_alpha_logging,
|
|
include_aggregate_purpose,
|
|
include_l2,
|
|
include_custom_hardware_link,
|
|
api_version,
|
|
include_peer_migration_purpose,
|
|
include_resolve_subnet_mask,
|
|
):
|
|
"""Add subnetwork create arguments to parser."""
|
|
parser.display_info.AddFormat(flags.DEFAULT_LIST_FORMAT_WITH_IPV6_FIELD)
|
|
|
|
flags.SubnetworkArgument().AddArgument(parser, operation_type='create')
|
|
network_flags.NetworkArgumentForOtherResource(
|
|
'The network to which the subnetwork belongs.').AddArgument(parser)
|
|
|
|
messages = apis.GetMessagesModule('compute',
|
|
compute_api.COMPUTE_GA_API_VERSION)
|
|
|
|
parser.add_argument(
|
|
'--description', help='An optional description of this subnetwork.')
|
|
|
|
parser.add_argument(
|
|
'--range',
|
|
help='The IP space allocated to this subnetwork in CIDR format.')
|
|
|
|
parser.add_argument(
|
|
'--enable-private-ip-google-access',
|
|
action='store_true',
|
|
default=False,
|
|
help=('Enable/disable access to Google Cloud APIs from this subnet for '
|
|
'instances without a public ip address.'))
|
|
|
|
parser.add_argument(
|
|
'--secondary-range',
|
|
type=arg_parsers.ArgDict(min_length=1),
|
|
action='append',
|
|
metavar='PROPERTY=VALUE',
|
|
help="""\
|
|
Adds a secondary IP range to the subnetwork for use in IP aliasing.
|
|
|
|
For example, `--secondary-range range1=192.168.64.0/24` adds
|
|
a secondary range 192.168.64.0/24 with name range1.
|
|
|
|
* `RANGE_NAME` - Name of the secondary range.
|
|
* `RANGE` - `IP range in CIDR format.`
|
|
""")
|
|
|
|
parser.add_argument(
|
|
'--enable-flow-logs',
|
|
action='store_true',
|
|
default=None,
|
|
help=('Enable/disable VPC Flow Logs for this subnet. More information '
|
|
'for VPC Flow Logs can be found at '
|
|
'https://cloud.google.com/vpc/docs/using-flow-logs.'))
|
|
|
|
flags.AddLoggingAggregationInterval(parser, messages)
|
|
parser.add_argument(
|
|
'--logging-flow-sampling',
|
|
type=arg_parsers.BoundedFloat(lower_bound=0.0, upper_bound=1.0),
|
|
help="""\
|
|
Can only be specified if VPC Flow Logs for this subnetwork is
|
|
enabled. The value of the field must be in [0, 1]. Set the sampling rate
|
|
of VPC flow logs within the subnetwork where 1.0 means all collected
|
|
logs are reported and 0.0 means no logs are reported. Default is 0.5
|
|
which means half of all collected logs are reported.
|
|
""")
|
|
|
|
parser.add_argument(
|
|
'--logging-filter-expr',
|
|
help="""\
|
|
Can only be specified if VPC Flow Logs for this subnetwork is enabled.
|
|
Export filter used to define which logs should be generated.
|
|
""")
|
|
flags.AddLoggingMetadata(parser, messages)
|
|
parser.add_argument(
|
|
'--logging-metadata-fields',
|
|
type=arg_parsers.ArgList(),
|
|
metavar='METADATA_FIELD',
|
|
default=None,
|
|
help="""\
|
|
Can only be specified if VPC Flow Logs for this subnetwork is enabled
|
|
and "metadata" is set to CUSTOM_METADATA. The comma-separated list of
|
|
metadata fields that should be added to reported logs.
|
|
""")
|
|
|
|
if include_alpha_logging:
|
|
messages = apis.GetMessagesModule('compute',
|
|
compute_api.COMPUTE_ALPHA_API_VERSION)
|
|
flags.AddLoggingAggregationIntervalDeprecated(parser, messages)
|
|
parser.add_argument(
|
|
'--flow-sampling',
|
|
type=arg_parsers.BoundedFloat(lower_bound=0.0, upper_bound=1.0),
|
|
help="""\
|
|
Can only be specified if VPC flow logging for this subnetwork is
|
|
enabled. The value of the field must be in [0, 1]. Set the sampling rate
|
|
of VPC flow logs within the subnetwork where 1.0 means all collected
|
|
logs are reported and 0.0 means no logs are reported. Default is 0.5
|
|
which means half of all collected logs are reported.
|
|
""")
|
|
flags.AddLoggingMetadataDeprecated(parser, messages)
|
|
|
|
purpose_choices = {
|
|
'PRIVATE': 'Regular user created or automatically created subnet.',
|
|
'INTERNAL_HTTPS_LOAD_BALANCER': (
|
|
'Reserved for Internal HTTP(S) Load Balancing.'
|
|
),
|
|
'REGIONAL_MANAGED_PROXY': (
|
|
'Reserved for Regional Envoy-based Load Balancing.'
|
|
),
|
|
'GLOBAL_MANAGED_PROXY': (
|
|
'Reserved for Global Envoy-based Load Balancing.'
|
|
),
|
|
'PRIVATE_SERVICE_CONNECT': (
|
|
'Reserved for Private Service Connect Internal Load Balancing.'
|
|
),
|
|
'PRIVATE_NAT': 'Reserved for use as source range for Private NAT.',
|
|
'PEER_MIGRATION': 'Reserved for subnet migration between peered VPCs.',
|
|
}
|
|
|
|
if include_aggregate_purpose:
|
|
purpose_choices['AGGREGATE'] = (
|
|
'Reserved for Aggregate Ranges used for aggregating '
|
|
'private subnetworks.'
|
|
)
|
|
|
|
if include_custom_hardware_link:
|
|
purpose_choices['CUSTOM_HARDWARE_LINK'] = (
|
|
'Reserved for Custom Hardware Link.'
|
|
)
|
|
|
|
if include_peer_migration_purpose:
|
|
purpose_choices['PEER_MIGRATION'] = (
|
|
'Reserved for subnet migration between peered VPCs.'
|
|
)
|
|
|
|
# Subnetwork purpose is introduced with L7ILB feature. Aggregate purpose
|
|
# will have to be enabled for a given release track only after L7ILB feature
|
|
# is enabled for that release track. Hence if include_aggregate_purpose
|
|
# true, this code assumes that L7ILB purpose is enabled.
|
|
parser.add_argument(
|
|
'--purpose',
|
|
choices=purpose_choices,
|
|
type=arg_utils.ChoiceToEnumName,
|
|
help='The purpose of this subnetwork.')
|
|
|
|
parser.add_argument(
|
|
'--role',
|
|
choices={
|
|
'ACTIVE': 'The ACTIVE subnet that is currently used.',
|
|
'BACKUP': 'The BACKUP subnet that could be promoted to ACTIVE.',
|
|
},
|
|
type=lambda x: x.replace('-', '_').upper(),
|
|
help=(
|
|
'The role of subnetwork. This field is required when the purpose is'
|
|
' set to GLOBAL_MANAGED_PROXY, REGIONAL_MANAGED_PROXY or'
|
|
' INTERNAL_HTTPS_LOAD_BALANCER.'
|
|
),
|
|
)
|
|
|
|
# Add private ipv6 google access enum based on api version.
|
|
messages = apis.GetMessagesModule('compute', api_version)
|
|
GetPrivateIpv6GoogleAccessTypeFlagMapper(messages).choice_arg.AddToParser(
|
|
parser)
|
|
|
|
stack_type_choices = {
|
|
'IPV4_ONLY': (
|
|
'New VMs in this subnet will only be assigned IPv4 addresses'
|
|
),
|
|
'IPV4_IPV6': (
|
|
'New VMs in this subnet can have both IPv4 and IPv6 addresses'
|
|
),
|
|
'IPV6_ONLY': (
|
|
'New VMs in this subnet will only be assigned IPv6 addresses'
|
|
)
|
|
}
|
|
|
|
parser.add_argument(
|
|
'--stack-type',
|
|
choices=stack_type_choices,
|
|
type=arg_utils.ChoiceToEnumName,
|
|
help=(
|
|
'The stack type for this subnet. Determines if IPv6 is enabled '
|
|
'on the subnet. If not specified IPV4_ONLY will be used.'
|
|
),
|
|
)
|
|
|
|
ipv6_access_type_choices = {
|
|
'EXTERNAL': 'VMs in this subnet can have external IPv6.',
|
|
'INTERNAL': 'VMs in this subnet can have internal IPv6.'
|
|
}
|
|
parser.add_argument(
|
|
'--ipv6-access-type',
|
|
choices=ipv6_access_type_choices,
|
|
type=arg_utils.ChoiceToEnumName,
|
|
help=(
|
|
'IPv6 access type can be specified only when the subnet is '
|
|
'created, or when the subnet is first updated to have a stack '
|
|
'type of IPV4_IPV6. Once set, the access type is immutable.'
|
|
),
|
|
)
|
|
|
|
parser.display_info.AddCacheUpdater(network_flags.NetworksCompleter)
|
|
|
|
if include_l2:
|
|
l2_args = parser.add_group(help='L2 networking specifications.')
|
|
l2_args.add_argument(
|
|
'--enable-l2',
|
|
action='store_true',
|
|
required=True,
|
|
help="""\
|
|
If set to true, enables l2 networking capability on subnetwork.
|
|
""")
|
|
l2_args.add_argument(
|
|
'--vlan',
|
|
type=int,
|
|
metavar='VLAN',
|
|
help="""\
|
|
Specifies ID of the vlan to tag the subnetwork.
|
|
""")
|
|
|
|
parser.add_argument(
|
|
'--reserved-internal-range',
|
|
help=("""
|
|
If set, the primary IP range of the subnetwork will be
|
|
associated with the given internal range resource.
|
|
If --range is set, the subnetwork will only use the given IP range,
|
|
which must be contained by the IP range defined by the internal range resource.
|
|
For example,
|
|
--range=10.0.0.0/24
|
|
--reserved-internal-range //networkconnectivity.googleapis.com/projects/PROJECT/locations/global/internalRanges/RANGE
|
|
If --range is not set, the subnetwork will use the entire IP range
|
|
defined by the internal range resource.
|
|
For example, `--reserved-internal-range //networkconnectivity.googleapis.com/projects/PROJECT/locations/global/internalRanges/RANGE`
|
|
"""),
|
|
)
|
|
parser.add_argument(
|
|
'--secondary-range-with-reserved-internal-range',
|
|
type=arg_parsers.ArgDict(min_length=1),
|
|
action='append',
|
|
metavar='RANGE_NAME=INTERNAL_RANGE_URL',
|
|
help="""\
|
|
Adds secondary IP ranges that are associated with internal range
|
|
resources.
|
|
For example, `--secondary-range-with-reserved-internal-range
|
|
range1=//networkconnectivity.googleapis.com/projects/PROJECT/locations/global/internalRanges/RANGE`
|
|
adds a secondary range with the reserved internal range resource.
|
|
* `RANGE_NAME` - Name of the secondary range.
|
|
* `INTERNAL_RANGE_URL` - `URL of an internal range resource.`
|
|
""",
|
|
)
|
|
|
|
parser.add_argument(
|
|
'--external-ipv6-prefix',
|
|
help=("""
|
|
The /64 external IPv6 CIDR range to assign to this subnet. The range must
|
|
be associated with an IPv6 BYOIP sub-prefix that is defined by the
|
|
--ip-collection flag. If you specify --ip-collection but not
|
|
--external-ipv6-prefix, a random /64 range is allocated from
|
|
the sub-prefix.
|
|
|
|
For example, `--external-ipv6-prefix=2600:1901:0:0:0:0:0:0/64`
|
|
"""),
|
|
)
|
|
|
|
parser.add_argument(
|
|
'--internal-ipv6-prefix',
|
|
help=("""
|
|
The /64 internal IPv6 CIDR range to assign to this subnet. The range must
|
|
be associated with an IPv6 BYOIP sub-prefix that is defined by the
|
|
--ip-collection flag. If you specify --ip-collection but not
|
|
--internal-ipv6-prefix, a random /64 range is allocated from the
|
|
sub-prefix.
|
|
|
|
For example, `--internal-ipv6-prefix 2600:1901:0:0:0:0:0:0/64`
|
|
"""),
|
|
)
|
|
|
|
parser.add_argument(
|
|
'--resource-manager-tags',
|
|
type=arg_parsers.ArgDict(),
|
|
metavar='KEY=VALUE',
|
|
help="""\
|
|
A comma-separated list of Resource Manager tags to apply to the subnetwork.
|
|
""",
|
|
)
|
|
|
|
if include_resolve_subnet_mask:
|
|
resolve_subnet_mask_choices = {
|
|
'ARP_ALL_RANGES': """
|
|
VMs connected to this subnet receive ARP responses for IPv4
|
|
addresses from any ranges of the subnet that are assigned to the VM's
|
|
NIC. The DHCP responses contain the netmask of the subnet, instead of
|
|
/32.
|
|
""",
|
|
'ARP_PRIMARY_RANGE': """
|
|
VMs connected to this subnet receive ARP responses only for IP
|
|
addresses in the primary IPv4 range of the subnet. DHCP responses
|
|
contain the netmask of the subnet, instead of /32.
|
|
""",
|
|
}
|
|
|
|
parser.add_argument(
|
|
'--resolve-subnet-mask',
|
|
choices=resolve_subnet_mask_choices,
|
|
type=arg_utils.ChoiceToEnumName,
|
|
help='Resolve subnet mask can only be set when subnet is created.',
|
|
)
|
|
|
|
flags.IpCollectionArgument().AddArgument(parser)
|
|
|
|
|
|
def GetPrivateIpv6GoogleAccessTypeFlagMapper(messages):
|
|
return arg_utils.ChoiceEnumMapper(
|
|
'--private-ipv6-google-access-type',
|
|
messages.Subnetwork.PrivateIpv6GoogleAccessValueValuesEnum,
|
|
custom_mappings={
|
|
'DISABLE_GOOGLE_ACCESS':
|
|
'disable',
|
|
'ENABLE_BIDIRECTIONAL_ACCESS_TO_GOOGLE':
|
|
'enable-bidirectional-access',
|
|
'ENABLE_OUTBOUND_VM_ACCESS_TO_GOOGLE':
|
|
'enable-outbound-vm-access'
|
|
},
|
|
help_str='The private IPv6 google access type for the VMs in this subnet.'
|
|
)
|
|
|
|
|
|
def _CreateSubnetwork(
|
|
messages,
|
|
subnet_ref,
|
|
network_ref,
|
|
args,
|
|
include_alpha_logging,
|
|
include_aggregate_purpose,
|
|
include_l2,
|
|
include_custom_hardware_link,
|
|
ip_collection_ref,
|
|
include_peer_migration_purpose,
|
|
include_resolve_subnet_mask,
|
|
):
|
|
"""Create the subnet resource."""
|
|
subnetwork = messages.Subnetwork(
|
|
name=subnet_ref.Name(),
|
|
description=args.description,
|
|
network=network_ref.SelfLink(),
|
|
privateIpGoogleAccess=args.enable_private_ip_google_access)
|
|
|
|
if args.range:
|
|
subnetwork.ipCidrRange = args.range
|
|
|
|
if (args.enable_flow_logs is not None or
|
|
args.logging_aggregation_interval is not None or
|
|
args.logging_flow_sampling is not None or
|
|
args.logging_metadata is not None or
|
|
args.logging_filter_expr is not None or
|
|
args.logging_metadata_fields is not None):
|
|
log_config = messages.SubnetworkLogConfig(enable=args.enable_flow_logs)
|
|
if args.logging_aggregation_interval:
|
|
log_config.aggregationInterval = flags.GetLoggingAggregationIntervalArg(
|
|
messages).GetEnumForChoice(args.logging_aggregation_interval)
|
|
if args.logging_flow_sampling is not None:
|
|
log_config.flowSampling = args.logging_flow_sampling
|
|
if args.logging_metadata:
|
|
log_config.metadata = flags.GetLoggingMetadataArg(
|
|
messages).GetEnumForChoice(args.logging_metadata)
|
|
if args.logging_filter_expr is not None:
|
|
log_config.filterExpr = args.logging_filter_expr
|
|
if args.logging_metadata_fields is not None:
|
|
log_config.metadataFields = args.logging_metadata_fields
|
|
subnetwork.logConfig = log_config
|
|
|
|
if include_alpha_logging:
|
|
if (args.enable_flow_logs is not None or
|
|
args.aggregation_interval is not None or
|
|
args.flow_sampling is not None or args.metadata is not None):
|
|
log_config = (
|
|
subnetwork.logConfig if subnetwork.logConfig is not None else
|
|
messages.SubnetworkLogConfig(enable=args.enable_flow_logs))
|
|
if args.aggregation_interval:
|
|
log_config.aggregationInterval = (
|
|
flags.GetLoggingAggregationIntervalArgDeprecated(
|
|
messages).GetEnumForChoice(args.aggregation_interval))
|
|
if args.flow_sampling is not None:
|
|
log_config.flowSampling = args.flow_sampling
|
|
if args.metadata:
|
|
log_config.metadata = flags.GetLoggingMetadataArgDeprecated(
|
|
messages).GetEnumForChoice(args.metadata)
|
|
if args.logging_filter_expr is not None:
|
|
log_config.filterExpr = args.logging_filter_expr
|
|
if args.logging_metadata_fields is not None:
|
|
log_config.metadataFields = args.logging_metadata_fields
|
|
subnetwork.logConfig = log_config
|
|
|
|
if args.purpose:
|
|
subnetwork.purpose = messages.Subnetwork.PurposeValueValuesEnum(
|
|
args.purpose)
|
|
if (
|
|
subnetwork.purpose
|
|
== messages.Subnetwork.PurposeValueValuesEnum.INTERNAL_HTTPS_LOAD_BALANCER
|
|
or subnetwork.purpose
|
|
== messages.Subnetwork.PurposeValueValuesEnum.REGIONAL_MANAGED_PROXY
|
|
or subnetwork.purpose
|
|
== messages.Subnetwork.PurposeValueValuesEnum.GLOBAL_MANAGED_PROXY
|
|
or subnetwork.purpose
|
|
== messages.Subnetwork.PurposeValueValuesEnum.PRIVATE_SERVICE_CONNECT
|
|
or (
|
|
include_peer_migration_purpose
|
|
and subnetwork.purpose
|
|
== messages.Subnetwork.PurposeValueValuesEnum.PEER_MIGRATION
|
|
)
|
|
or (
|
|
include_aggregate_purpose
|
|
and subnetwork.purpose
|
|
== messages.Subnetwork.PurposeValueValuesEnum.AGGREGATE
|
|
)
|
|
or (
|
|
include_custom_hardware_link
|
|
and subnetwork.purpose
|
|
== messages.Subnetwork.PurposeValueValuesEnum.CUSTOM_HARDWARE_LINK
|
|
)
|
|
):
|
|
# Clear unsupported fields in the subnet resource
|
|
subnetwork.privateIpGoogleAccess = None
|
|
subnetwork.enableFlowLogs = None
|
|
subnetwork.logConfig = None
|
|
if getattr(args, 'role', None):
|
|
subnetwork.role = messages.Subnetwork.RoleValueValuesEnum(args.role)
|
|
|
|
if args.private_ipv6_google_access_type is not None:
|
|
subnetwork.privateIpv6GoogleAccess = (
|
|
flags.GetPrivateIpv6GoogleAccessTypeFlagMapper(
|
|
messages).GetEnumForChoice(args.private_ipv6_google_access_type))
|
|
|
|
if args.stack_type:
|
|
subnetwork.stackType = messages.Subnetwork.StackTypeValueValuesEnum(
|
|
args.stack_type)
|
|
|
|
if args.ipv6_access_type:
|
|
subnetwork.ipv6AccessType = (
|
|
messages.Subnetwork.Ipv6AccessTypeValueValuesEnum(
|
|
args.ipv6_access_type))
|
|
|
|
if include_l2 and args.enable_l2:
|
|
subnetwork.enableL2 = True
|
|
if args.vlan is not None:
|
|
subnetwork.vlans.append(args.vlan)
|
|
|
|
if args.reserved_internal_range:
|
|
subnetwork.reservedInternalRange = args.reserved_internal_range
|
|
|
|
if args.external_ipv6_prefix:
|
|
subnetwork.externalIpv6Prefix = args.external_ipv6_prefix
|
|
|
|
if args.internal_ipv6_prefix:
|
|
subnetwork.internalIpv6Prefix = args.internal_ipv6_prefix
|
|
|
|
if ip_collection_ref:
|
|
subnetwork.ipCollection = ip_collection_ref.SelfLink()
|
|
|
|
if args.resource_manager_tags is not None:
|
|
subnetwork.params = _CreateSubnetworkParams(
|
|
messages, args.resource_manager_tags
|
|
)
|
|
|
|
if include_resolve_subnet_mask:
|
|
if args.resolve_subnet_mask:
|
|
subnetwork.resolveSubnetMask = (
|
|
messages.Subnetwork.ResolveSubnetMaskValueValuesEnum(
|
|
args.resolve_subnet_mask
|
|
)
|
|
)
|
|
return subnetwork
|
|
|
|
|
|
def _CreateSubnetworkParams(messages, resource_manager_tags):
|
|
resource_manager_tags_map = (
|
|
resource_manager_tags_utils.GetResourceManagerTags(resource_manager_tags)
|
|
)
|
|
params = messages.SubnetworkParams
|
|
additional_properties = [
|
|
params.ResourceManagerTagsValue.AdditionalProperty(key=key, value=value)
|
|
for key, value in sorted(six.iteritems(resource_manager_tags_map))
|
|
]
|
|
return params(
|
|
resourceManagerTags=params.ResourceManagerTagsValue(
|
|
additionalProperties=additional_properties
|
|
)
|
|
)
|
|
|
|
|
|
def _Run(
|
|
args,
|
|
holder,
|
|
include_alpha_logging,
|
|
include_aggregate_purpose,
|
|
include_l2,
|
|
include_custom_hardware_link,
|
|
include_peer_migration_purpose,
|
|
include_resolve_subnet_mask,
|
|
):
|
|
"""Issues a list of requests necessary for adding a subnetwork."""
|
|
client = holder.client
|
|
|
|
network_ref = network_flags.NetworkArgumentForOtherResource(
|
|
'The network to which the subnetwork belongs.').ResolveAsResource(
|
|
args, holder.resources)
|
|
subnet_ref = flags.SubnetworkArgument().ResolveAsResource(
|
|
args,
|
|
holder.resources,
|
|
scope_lister=compute_flags.GetDefaultScopeLister(client))
|
|
ip_collection_ref = None
|
|
if args.ip_collection:
|
|
ip_collection_ref = flags.IpCollectionArgument().ResolveAsResource(
|
|
args, holder.resources)
|
|
|
|
subnetwork = _CreateSubnetwork(
|
|
client.messages,
|
|
subnet_ref,
|
|
network_ref,
|
|
args,
|
|
include_alpha_logging,
|
|
include_aggregate_purpose,
|
|
include_l2,
|
|
include_custom_hardware_link,
|
|
ip_collection_ref,
|
|
include_peer_migration_purpose,
|
|
include_resolve_subnet_mask,
|
|
)
|
|
request = client.messages.ComputeSubnetworksInsertRequest(
|
|
subnetwork=subnetwork,
|
|
region=subnet_ref.region,
|
|
project=subnet_ref.project)
|
|
|
|
secondary_ranges = subnets_utils.CreateSecondaryRanges(
|
|
client,
|
|
args.secondary_range,
|
|
args.secondary_range_with_reserved_internal_range,
|
|
)
|
|
|
|
request.subnetwork.secondaryIpRanges = secondary_ranges
|
|
return client.MakeRequests([(client.apitools_client.subnetworks, 'Insert',
|
|
request)])
|
|
|
|
|
|
@base.UniverseCompatible
|
|
@base.ReleaseTracks(base.ReleaseTrack.GA)
|
|
class Create(base.CreateCommand):
|
|
"""Create a GA subnet."""
|
|
|
|
_include_alpha_logging = False
|
|
_include_aggregate_purpose = False
|
|
_include_l2 = False
|
|
_api_version = compute_api.COMPUTE_GA_API_VERSION
|
|
_include_custom_hardware_link = False
|
|
_include_peer_migration_purpose = True
|
|
_include_resolve_subnet_mask = False
|
|
|
|
detailed_help = _DetailedHelp()
|
|
|
|
@classmethod
|
|
def Args(cls, parser):
|
|
_AddArgs(
|
|
parser,
|
|
cls._include_alpha_logging,
|
|
cls._include_aggregate_purpose,
|
|
cls._include_l2,
|
|
cls._include_custom_hardware_link,
|
|
cls._api_version,
|
|
cls._include_peer_migration_purpose,
|
|
cls._include_resolve_subnet_mask,
|
|
)
|
|
|
|
def Run(self, args):
|
|
"""Issues a list of requests necessary for adding a subnetwork."""
|
|
holder = base_classes.ComputeApiHolder(self.ReleaseTrack())
|
|
return _Run(
|
|
args,
|
|
holder,
|
|
self._include_alpha_logging,
|
|
self._include_aggregate_purpose,
|
|
self._include_l2,
|
|
self._include_custom_hardware_link,
|
|
self._include_peer_migration_purpose,
|
|
self._include_resolve_subnet_mask,
|
|
)
|
|
|
|
|
|
@base.ReleaseTracks(base.ReleaseTrack.BETA)
|
|
class CreateBeta(Create):
|
|
"""Create a subnet in the Beta release track."""
|
|
|
|
_api_version = compute_api.COMPUTE_BETA_API_VERSION
|
|
_include_resolve_subnet_mask = True
|
|
|
|
|
|
@base.ReleaseTracks(base.ReleaseTrack.ALPHA)
|
|
class CreateAlpha(CreateBeta):
|
|
"""Create a subnet in the Alpha release track."""
|
|
|
|
_include_alpha_logging = True
|
|
_include_aggregate_purpose = True
|
|
_include_l2 = True
|
|
_api_version = compute_api.COMPUTE_ALPHA_API_VERSION
|
|
_include_custom_hardware_link = True
|
|
_include_peer_migration_purpose = True
|
|
_include_resolve_subnet_mask = True
|