// deleteInstanceNetworkSecurityRules deletes network security rules in the // internal network security group that correspond to the specified machine. // // This is expected to delete *all* security rules related to the instance, // i.e. both the ones opened by OpenPorts above, and the ones opened for API // access. func deleteInstanceNetworkSecurityRules( resourceGroup string, id instance.Id, nsgClient network.SecurityGroupsClient, securityRuleClient network.SecurityRulesClient, ) error { nsg, err := nsgClient.Get(resourceGroup, internalSecurityGroupName) if err != nil { return errors.Annotate(err, "querying network security group") } if nsg.Properties.SecurityRules == nil { return nil } prefix := instanceNetworkSecurityRulePrefix(id) for _, rule := range *nsg.Properties.SecurityRules { ruleName := to.String(rule.Name) if !strings.HasPrefix(ruleName, prefix) { continue } result, err := securityRuleClient.Delete( resourceGroup, internalSecurityGroupName, ruleName, ) if err != nil { if result.Response == nil || result.StatusCode != http.StatusNotFound { return errors.Annotatef(err, "deleting security rule %q", ruleName) } } } return nil }
// ClosePorts is specified in the Instance interface. func (inst *azureInstance) ClosePorts(machineId string, ports []jujunetwork.PortRange) error { securityRuleClient := network.SecurityRulesClient{inst.env.network} securityGroupName := internalSecurityGroupName // Delete rules one at a time; this is necessary to avoid trampling // on changes made by the provisioner. vmName := resourceName(names.NewMachineTag(machineId)) prefix := instanceNetworkSecurityRulePrefix(instance.Id(vmName)) for _, ports := range ports { ruleName := securityRuleName(prefix, ports) logger.Debugf("deleting security rule %q", ruleName) var result autorest.Response if err := inst.env.callAPI(func() (autorest.Response, error) { var err error result, err = securityRuleClient.Delete( inst.env.resourceGroup, securityGroupName, ruleName, nil, // abort channel ) return result, err }); err != nil { if result.Response == nil || result.StatusCode != http.StatusNotFound { return errors.Annotatef(err, "deleting security rule %q", ruleName) } } } return nil }
// deleteInstanceNetworkSecurityRules deletes network security rules in the // internal network security group that correspond to the specified machine. // // This is expected to delete *all* security rules related to the instance, // i.e. both the ones opened by OpenPorts above, and the ones opened for API // access. func deleteInstanceNetworkSecurityRules( resourceGroup string, id instance.Id, nsgClient network.SecurityGroupsClient, securityRuleClient network.SecurityRulesClient, callAPI callAPIFunc, ) error { var nsg network.SecurityGroup if err := callAPI(func() (autorest.Response, error) { var err error nsg, err = nsgClient.Get(resourceGroup, internalSecurityGroupName, "") return nsg.Response, err }); err != nil { return errors.Annotate(err, "querying network security group") } if nsg.Properties.SecurityRules == nil { return nil } prefix := instanceNetworkSecurityRulePrefix(id) for _, rule := range *nsg.Properties.SecurityRules { ruleName := to.String(rule.Name) if !strings.HasPrefix(ruleName, prefix) { continue } var result autorest.Response err := callAPI(func() (autorest.Response, error) { var err error result, err = securityRuleClient.Delete( resourceGroup, internalSecurityGroupName, ruleName, nil, // abort channel ) return result, err }) if err != nil { if result.Response == nil || result.StatusCode != http.StatusNotFound { return errors.Annotatef(err, "deleting security rule %q", ruleName) } } } return nil }
func newNetworkProfile( client network.ManagementClient, vmName string, apiPort *int, internalSubnet *network.Subnet, resourceGroup string, location string, tags map[string]string, ) (*compute.NetworkProfile, error) { logger.Debugf("creating network profile for %q", vmName) // Create a public IP for the NIC. Public IP addresses are dynamic. logger.Debugf("- allocating public IP address") pipClient := network.PublicIPAddressesClient{client} publicIPAddressParams := network.PublicIPAddress{ Location: to.StringPtr(location), Tags: toTagsPtr(tags), Properties: &network.PublicIPAddressPropertiesFormat{ PublicIPAllocationMethod: network.Dynamic, }, } publicIPAddressName := vmName + "-public-ip" publicIPAddress, err := pipClient.CreateOrUpdate(resourceGroup, publicIPAddressName, publicIPAddressParams) if err != nil { return nil, errors.Annotatef(err, "creating public IP address for %q", vmName) } // Determine the next available private IP address. nicClient := network.InterfacesClient{client} privateIPAddress, err := nextSubnetIPAddress(nicClient, resourceGroup, internalSubnet) if err != nil { return nil, errors.Annotatef(err, "querying private IP addresses") } // Create a primary NIC for the machine. This needs to be static, so // that we can create security rules that don't become invalid. logger.Debugf("- creating primary NIC") ipConfigurations := []network.InterfaceIPConfiguration{{ Name: to.StringPtr("primary"), Properties: &network.InterfaceIPConfigurationPropertiesFormat{ PrivateIPAddress: to.StringPtr(privateIPAddress), PrivateIPAllocationMethod: network.Static, Subnet: &network.SubResource{internalSubnet.ID}, PublicIPAddress: &network.SubResource{publicIPAddress.ID}, }, }} primaryNicName := vmName + "-primary" primaryNicParams := network.Interface{ Location: to.StringPtr(location), Tags: toTagsPtr(tags), Properties: &network.InterfacePropertiesFormat{ IPConfigurations: &ipConfigurations, }, } primaryNic, err := nicClient.CreateOrUpdate(resourceGroup, primaryNicName, primaryNicParams) if err != nil { return nil, errors.Annotatef(err, "creating network interface for %q", vmName) } // Create a network security rule for the machine if we need to open // the API server port. if apiPort != nil { logger.Debugf("- querying network security group") securityGroupClient := network.SecurityGroupsClient{client} securityGroupName := internalSecurityGroupName securityGroup, err := securityGroupClient.Get(resourceGroup, securityGroupName) if err != nil { return nil, errors.Annotate(err, "querying network security group") } // NOTE(axw) this looks like TOCTTOU race territory, but it's // safe because we only allocate/deallocate rules in this // range during machine (de)provisioning, which is managed by // a single goroutine. Non-internal ports are managed by the // firewaller exclusively. nextPriority, err := nextSecurityRulePriority( securityGroup, securityRuleInternalSSHInbound+1, securityRuleInternalMax, ) if err != nil { return nil, errors.Trace(err) } apiSecurityRuleName := fmt.Sprintf("%s-api", vmName) apiSecurityRule := network.SecurityRule{ Name: to.StringPtr(apiSecurityRuleName), Properties: &network.SecurityRulePropertiesFormat{ Description: to.StringPtr("Allow API access to server machines"), Protocol: network.SecurityRuleProtocolTCP, SourceAddressPrefix: to.StringPtr("*"), SourcePortRange: to.StringPtr("*"), DestinationAddressPrefix: to.StringPtr(privateIPAddress), DestinationPortRange: to.StringPtr(fmt.Sprint(*apiPort)), Access: network.Allow, Priority: to.IntPtr(nextPriority), Direction: network.Inbound, }, } logger.Debugf("- creating API network security rule") securityRuleClient := network.SecurityRulesClient{client} _, err = securityRuleClient.CreateOrUpdate( resourceGroup, securityGroupName, apiSecurityRuleName, apiSecurityRule, ) if err != nil { return nil, errors.Annotate(err, "creating API network security rule") } } // For now we only attach a single, flat network to each machine. networkInterfaces := []compute.NetworkInterfaceReference{{ ID: primaryNic.ID, Properties: &compute.NetworkInterfaceReferenceProperties{ Primary: to.BoolPtr(true), }, }} return &compute.NetworkProfile{&networkInterfaces}, nil }
// OpenPorts is specified in the Instance interface. func (inst *azureInstance) OpenPorts(machineId string, ports []jujunetwork.PortRange) error { inst.env.mu.Lock() nsgClient := network.SecurityGroupsClient{inst.env.network} securityRuleClient := network.SecurityRulesClient{inst.env.network} inst.env.mu.Unlock() internalNetworkAddress, err := inst.internalNetworkAddress() if err != nil { return errors.Trace(err) } securityGroupName := internalSecurityGroupName nsg, err := nsgClient.Get(inst.env.resourceGroup, securityGroupName) if err != nil { return errors.Annotate(err, "querying network security group") } var securityRules []network.SecurityRule if nsg.Properties.SecurityRules != nil { securityRules = *nsg.Properties.SecurityRules } else { nsg.Properties.SecurityRules = &securityRules } // Create rules one at a time; this is necessary to avoid trampling // on changes made by the provisioner. We still record rules in the // NSG in memory, so we can easily tell which priorities are available. vmName := resourceName(names.NewMachineTag(machineId)) prefix := instanceNetworkSecurityRulePrefix(instance.Id(vmName)) for _, ports := range ports { ruleName := securityRuleName(prefix, ports) // Check if the rule already exists; OpenPorts must be idempotent. var found bool for _, rule := range securityRules { if to.String(rule.Name) == ruleName { found = true break } } if found { logger.Debugf("security rule %q already exists", ruleName) continue } logger.Debugf("creating security rule %q", ruleName) priority, err := nextSecurityRulePriority(nsg, securityRuleInternalMax+1, securityRuleMax) if err != nil { return errors.Annotatef(err, "getting security rule priority for %s", ports) } var protocol network.SecurityRuleProtocol switch ports.Protocol { case "tcp": protocol = network.SecurityRuleProtocolTCP case "udp": protocol = network.SecurityRuleProtocolUDP default: return errors.Errorf("invalid protocol %q", ports.Protocol) } var portRange string if ports.FromPort != ports.ToPort { portRange = fmt.Sprintf("%d-%d", ports.FromPort, ports.ToPort) } else { portRange = fmt.Sprint(ports.FromPort) } rule := network.SecurityRule{ Properties: &network.SecurityRulePropertiesFormat{ Description: to.StringPtr(ports.String()), Protocol: protocol, SourcePortRange: to.StringPtr("*"), DestinationPortRange: to.StringPtr(portRange), SourceAddressPrefix: to.StringPtr("*"), DestinationAddressPrefix: to.StringPtr(internalNetworkAddress.Value), Access: network.Allow, Priority: to.IntPtr(priority), Direction: network.Inbound, }, } if _, err := securityRuleClient.CreateOrUpdate( inst.env.resourceGroup, securityGroupName, ruleName, rule, ); err != nil { return errors.Annotatef(err, "creating security rule for %s", ports) } securityRules = append(securityRules, rule) } return nil }