2020-03-26 21:07:15 +00:00
|
|
|
// +build !providerless
|
|
|
|
|
|
|
|
/*
|
|
|
|
Copyright 2020 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package securitygroupclient
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"net/http"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/Azure/azure-sdk-for-go/services/network/mgmt/2019-06-01/network"
|
|
|
|
"github.com/Azure/go-autorest/autorest"
|
|
|
|
"github.com/Azure/go-autorest/autorest/azure"
|
|
|
|
"github.com/Azure/go-autorest/autorest/to"
|
|
|
|
|
|
|
|
"k8s.io/client-go/util/flowcontrol"
|
2020-08-10 17:43:49 +00:00
|
|
|
"k8s.io/klog/v2"
|
2020-03-26 21:07:15 +00:00
|
|
|
azclients "k8s.io/legacy-cloud-providers/azure/clients"
|
|
|
|
"k8s.io/legacy-cloud-providers/azure/clients/armclient"
|
|
|
|
"k8s.io/legacy-cloud-providers/azure/metrics"
|
|
|
|
"k8s.io/legacy-cloud-providers/azure/retry"
|
|
|
|
)
|
|
|
|
|
|
|
|
var _ Interface = &Client{}
|
|
|
|
|
|
|
|
// Client implements SecurityGroup client Interface.
|
|
|
|
type Client struct {
|
|
|
|
armClient armclient.Interface
|
|
|
|
subscriptionID string
|
|
|
|
|
|
|
|
// Rate limiting configures.
|
|
|
|
rateLimiterReader flowcontrol.RateLimiter
|
|
|
|
rateLimiterWriter flowcontrol.RateLimiter
|
|
|
|
|
|
|
|
// ARM throttling configures.
|
|
|
|
RetryAfterReader time.Time
|
|
|
|
RetryAfterWriter time.Time
|
|
|
|
}
|
|
|
|
|
|
|
|
// New creates a new SecurityGroup client with ratelimiting.
|
|
|
|
func New(config *azclients.ClientConfig) *Client {
|
|
|
|
baseURI := config.ResourceManagerEndpoint
|
|
|
|
authorizer := config.Authorizer
|
2020-08-10 17:43:49 +00:00
|
|
|
armClient := armclient.New(authorizer, baseURI, config.UserAgent, APIVersion, config.Location, config.Backoff)
|
2020-03-26 21:07:15 +00:00
|
|
|
rateLimiterReader, rateLimiterWriter := azclients.NewRateLimiter(config.RateLimitConfig)
|
|
|
|
|
|
|
|
klog.V(2).Infof("Azure SecurityGroupsClient (read ops) using rate limit config: QPS=%g, bucket=%d",
|
|
|
|
config.RateLimitConfig.CloudProviderRateLimitQPS,
|
|
|
|
config.RateLimitConfig.CloudProviderRateLimitBucket)
|
|
|
|
klog.V(2).Infof("Azure SecurityGroupsClient (write ops) using rate limit config: QPS=%g, bucket=%d",
|
|
|
|
config.RateLimitConfig.CloudProviderRateLimitQPSWrite,
|
|
|
|
config.RateLimitConfig.CloudProviderRateLimitBucketWrite)
|
|
|
|
|
|
|
|
client := &Client{
|
|
|
|
armClient: armClient,
|
|
|
|
rateLimiterReader: rateLimiterReader,
|
|
|
|
rateLimiterWriter: rateLimiterWriter,
|
|
|
|
subscriptionID: config.SubscriptionID,
|
|
|
|
}
|
|
|
|
|
|
|
|
return client
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get gets a SecurityGroup.
|
|
|
|
func (c *Client) Get(ctx context.Context, resourceGroupName string, networkSecurityGroupName string, expand string) (network.SecurityGroup, *retry.Error) {
|
|
|
|
mc := metrics.NewMetricContext("security_groups", "get", resourceGroupName, c.subscriptionID, "")
|
|
|
|
|
|
|
|
// Report errors if the client is rate limited.
|
|
|
|
if !c.rateLimiterReader.TryAccept() {
|
|
|
|
mc.RateLimitedCount()
|
|
|
|
return network.SecurityGroup{}, retry.GetRateLimitError(false, "NSGGet")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Report errors if the client is throttled.
|
|
|
|
if c.RetryAfterReader.After(time.Now()) {
|
|
|
|
mc.ThrottledCount()
|
|
|
|
rerr := retry.GetThrottlingError("NSGGet", "client throttled", c.RetryAfterReader)
|
|
|
|
return network.SecurityGroup{}, rerr
|
|
|
|
}
|
|
|
|
|
|
|
|
result, rerr := c.getSecurityGroup(ctx, resourceGroupName, networkSecurityGroupName, expand)
|
|
|
|
mc.Observe(rerr.Error())
|
|
|
|
if rerr != nil {
|
|
|
|
if rerr.IsThrottled() {
|
|
|
|
// Update RetryAfterReader so that no more requests would be sent until RetryAfter expires.
|
|
|
|
c.RetryAfterReader = rerr.RetryAfter
|
|
|
|
}
|
|
|
|
|
|
|
|
return result, rerr
|
|
|
|
}
|
|
|
|
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// getSecurityGroup gets a SecurityGroup.
|
|
|
|
func (c *Client) getSecurityGroup(ctx context.Context, resourceGroupName string, networkSecurityGroupName string, expand string) (network.SecurityGroup, *retry.Error) {
|
|
|
|
resourceID := armclient.GetResourceID(
|
|
|
|
c.subscriptionID,
|
|
|
|
resourceGroupName,
|
|
|
|
"Microsoft.Network/networkSecurityGroups",
|
|
|
|
networkSecurityGroupName,
|
|
|
|
)
|
|
|
|
result := network.SecurityGroup{}
|
|
|
|
|
|
|
|
response, rerr := c.armClient.GetResource(ctx, resourceID, expand)
|
|
|
|
defer c.armClient.CloseResponse(ctx, response)
|
|
|
|
if rerr != nil {
|
|
|
|
klog.V(5).Infof("Received error in %s: resourceID: %s, error: %s", "securitygroup.get.request", resourceID, rerr.Error())
|
|
|
|
return result, rerr
|
|
|
|
}
|
|
|
|
|
|
|
|
err := autorest.Respond(
|
|
|
|
response,
|
|
|
|
azure.WithErrorUnlessStatusCode(http.StatusOK),
|
|
|
|
autorest.ByUnmarshallingJSON(&result))
|
|
|
|
if err != nil {
|
|
|
|
klog.V(5).Infof("Received error in %s: resourceID: %s, error: %s", "securitygroup.get.respond", resourceID, err)
|
|
|
|
return result, retry.GetError(response, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
result.Response = autorest.Response{Response: response}
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// List gets a list of SecurityGroups in the resource group.
|
|
|
|
func (c *Client) List(ctx context.Context, resourceGroupName string) ([]network.SecurityGroup, *retry.Error) {
|
|
|
|
mc := metrics.NewMetricContext("security_groups", "list", resourceGroupName, c.subscriptionID, "")
|
|
|
|
|
|
|
|
// Report errors if the client is rate limited.
|
|
|
|
if !c.rateLimiterReader.TryAccept() {
|
|
|
|
mc.RateLimitedCount()
|
|
|
|
return nil, retry.GetRateLimitError(false, "NSGList")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Report errors if the client is throttled.
|
|
|
|
if c.RetryAfterReader.After(time.Now()) {
|
|
|
|
mc.ThrottledCount()
|
|
|
|
rerr := retry.GetThrottlingError("NSGList", "client throttled", c.RetryAfterReader)
|
|
|
|
return nil, rerr
|
|
|
|
}
|
|
|
|
|
|
|
|
result, rerr := c.listSecurityGroup(ctx, resourceGroupName)
|
|
|
|
mc.Observe(rerr.Error())
|
|
|
|
if rerr != nil {
|
|
|
|
if rerr.IsThrottled() {
|
|
|
|
// Update RetryAfterReader so that no more requests would be sent until RetryAfter expires.
|
|
|
|
c.RetryAfterReader = rerr.RetryAfter
|
|
|
|
}
|
|
|
|
|
|
|
|
return result, rerr
|
|
|
|
}
|
|
|
|
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// listSecurityGroup gets a list of SecurityGroups in the resource group.
|
|
|
|
func (c *Client) listSecurityGroup(ctx context.Context, resourceGroupName string) ([]network.SecurityGroup, *retry.Error) {
|
|
|
|
resourceID := fmt.Sprintf("/subscriptions/%s/resourceGroups/%s/providers/Microsoft.Network/networkSecurityGroups",
|
|
|
|
autorest.Encode("path", c.subscriptionID),
|
|
|
|
autorest.Encode("path", resourceGroupName))
|
|
|
|
result := make([]network.SecurityGroup, 0)
|
|
|
|
page := &SecurityGroupListResultPage{}
|
|
|
|
page.fn = c.listNextResults
|
|
|
|
|
|
|
|
resp, rerr := c.armClient.GetResource(ctx, resourceID, "")
|
|
|
|
defer c.armClient.CloseResponse(ctx, resp)
|
|
|
|
if rerr != nil {
|
|
|
|
klog.V(5).Infof("Received error in %s: resourceID: %s, error: %s", "securitygroup.list.request", resourceID, rerr.Error())
|
|
|
|
return result, rerr
|
|
|
|
}
|
|
|
|
|
|
|
|
var err error
|
|
|
|
page.sglr, err = c.listResponder(resp)
|
|
|
|
if err != nil {
|
|
|
|
klog.V(5).Infof("Received error in %s: resourceID: %s, error: %s", "securitygroup.list.respond", resourceID, err)
|
|
|
|
return result, retry.GetError(resp, err)
|
|
|
|
}
|
|
|
|
|
2020-12-01 01:06:26 +00:00
|
|
|
for {
|
|
|
|
result = append(result, page.Values()...)
|
|
|
|
|
|
|
|
// Abort the loop when there's no nextLink in the response.
|
|
|
|
if to.String(page.Response().NextLink) == "" {
|
|
|
|
break
|
|
|
|
}
|
|
|
|
|
2020-03-26 21:07:15 +00:00
|
|
|
if err = page.NextWithContext(ctx); err != nil {
|
|
|
|
klog.V(5).Infof("Received error in %s: resourceID: %s, error: %s", "securitygroup.list.next", resourceID, err)
|
|
|
|
return result, retry.GetError(page.Response().Response.Response, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return result, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// CreateOrUpdate creates or updates a SecurityGroup.
|
|
|
|
func (c *Client) CreateOrUpdate(ctx context.Context, resourceGroupName string, networkSecurityGroupName string, parameters network.SecurityGroup, etag string) *retry.Error {
|
|
|
|
mc := metrics.NewMetricContext("security_groups", "create_or_update", resourceGroupName, c.subscriptionID, "")
|
|
|
|
|
|
|
|
// Report errors if the client is rate limited.
|
|
|
|
if !c.rateLimiterWriter.TryAccept() {
|
|
|
|
mc.RateLimitedCount()
|
|
|
|
return retry.GetRateLimitError(true, "NSGCreateOrUpdate")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Report errors if the client is throttled.
|
|
|
|
if c.RetryAfterWriter.After(time.Now()) {
|
|
|
|
mc.ThrottledCount()
|
|
|
|
rerr := retry.GetThrottlingError("NSGCreateOrUpdate", "client throttled", c.RetryAfterWriter)
|
|
|
|
return rerr
|
|
|
|
}
|
|
|
|
|
|
|
|
rerr := c.createOrUpdateNSG(ctx, resourceGroupName, networkSecurityGroupName, parameters, etag)
|
|
|
|
mc.Observe(rerr.Error())
|
|
|
|
if rerr != nil {
|
|
|
|
if rerr.IsThrottled() {
|
|
|
|
// Update RetryAfterReader so that no more requests would be sent until RetryAfter expires.
|
|
|
|
c.RetryAfterWriter = rerr.RetryAfter
|
|
|
|
}
|
|
|
|
|
|
|
|
return rerr
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// createOrUpdateNSG creates or updates a SecurityGroup.
|
|
|
|
func (c *Client) createOrUpdateNSG(ctx context.Context, resourceGroupName string, networkSecurityGroupName string, parameters network.SecurityGroup, etag string) *retry.Error {
|
|
|
|
resourceID := armclient.GetResourceID(
|
|
|
|
c.subscriptionID,
|
|
|
|
resourceGroupName,
|
|
|
|
"Microsoft.Network/networkSecurityGroups",
|
|
|
|
networkSecurityGroupName,
|
|
|
|
)
|
|
|
|
decorators := []autorest.PrepareDecorator{
|
|
|
|
autorest.WithPathParameters("{resourceID}", map[string]interface{}{"resourceID": resourceID}),
|
|
|
|
autorest.WithJSON(parameters),
|
|
|
|
}
|
|
|
|
if etag != "" {
|
|
|
|
decorators = append(decorators, autorest.WithHeader("If-Match", autorest.String(etag)))
|
|
|
|
}
|
|
|
|
|
|
|
|
response, rerr := c.armClient.PutResourceWithDecorators(ctx, resourceID, parameters, decorators)
|
|
|
|
defer c.armClient.CloseResponse(ctx, response)
|
|
|
|
if rerr != nil {
|
|
|
|
klog.V(5).Infof("Received error in %s: resourceID: %s, error: %s", "securityGroup.put.request", resourceID, rerr.Error())
|
|
|
|
return rerr
|
|
|
|
}
|
|
|
|
|
|
|
|
if response != nil && response.StatusCode != http.StatusNoContent {
|
|
|
|
_, rerr = c.createOrUpdateResponder(response)
|
|
|
|
if rerr != nil {
|
|
|
|
klog.V(5).Infof("Received error in %s: resourceID: %s, error: %s", "securityGroup.put.respond", resourceID, rerr.Error())
|
|
|
|
return rerr
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Client) createOrUpdateResponder(resp *http.Response) (*network.SecurityGroup, *retry.Error) {
|
|
|
|
result := &network.SecurityGroup{}
|
|
|
|
err := autorest.Respond(
|
|
|
|
resp,
|
|
|
|
azure.WithErrorUnlessStatusCode(http.StatusOK, http.StatusCreated),
|
|
|
|
autorest.ByUnmarshallingJSON(&result))
|
|
|
|
result.Response = autorest.Response{Response: resp}
|
|
|
|
return result, retry.GetError(resp, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete deletes a SecurityGroup by name.
|
|
|
|
func (c *Client) Delete(ctx context.Context, resourceGroupName string, networkSecurityGroupName string) *retry.Error {
|
|
|
|
mc := metrics.NewMetricContext("security_groups", "delete", resourceGroupName, c.subscriptionID, "")
|
|
|
|
|
|
|
|
// Report errors if the client is rate limited.
|
|
|
|
if !c.rateLimiterWriter.TryAccept() {
|
|
|
|
mc.RateLimitedCount()
|
|
|
|
return retry.GetRateLimitError(true, "NSGDelete")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Report errors if the client is throttled.
|
|
|
|
if c.RetryAfterWriter.After(time.Now()) {
|
|
|
|
mc.ThrottledCount()
|
|
|
|
rerr := retry.GetThrottlingError("NSGDelete", "client throttled", c.RetryAfterWriter)
|
|
|
|
return rerr
|
|
|
|
}
|
|
|
|
|
|
|
|
rerr := c.deleteNSG(ctx, resourceGroupName, networkSecurityGroupName)
|
|
|
|
mc.Observe(rerr.Error())
|
|
|
|
if rerr != nil {
|
|
|
|
if rerr.IsThrottled() {
|
|
|
|
// Update RetryAfterReader so that no more requests would be sent until RetryAfter expires.
|
|
|
|
c.RetryAfterWriter = rerr.RetryAfter
|
|
|
|
}
|
|
|
|
|
|
|
|
return rerr
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-08-10 17:43:49 +00:00
|
|
|
// deleteNSG deletes a SecurityGroup by name.
|
2020-03-26 21:07:15 +00:00
|
|
|
func (c *Client) deleteNSG(ctx context.Context, resourceGroupName string, networkSecurityGroupName string) *retry.Error {
|
|
|
|
resourceID := armclient.GetResourceID(
|
|
|
|
c.subscriptionID,
|
|
|
|
resourceGroupName,
|
|
|
|
"Microsoft.Network/networkSecurityGroups",
|
|
|
|
networkSecurityGroupName,
|
|
|
|
)
|
|
|
|
|
|
|
|
return c.armClient.DeleteResource(ctx, resourceID, "")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Client) listResponder(resp *http.Response) (result network.SecurityGroupListResult, err error) {
|
|
|
|
err = autorest.Respond(
|
|
|
|
resp,
|
|
|
|
autorest.ByIgnoring(),
|
|
|
|
azure.WithErrorUnlessStatusCode(http.StatusOK),
|
|
|
|
autorest.ByUnmarshallingJSON(&result))
|
|
|
|
result.Response = autorest.Response{Response: resp}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// securityGroupListResultPreparer prepares a request to retrieve the next set of results.
|
|
|
|
// It returns nil if no more results exist.
|
|
|
|
func (c *Client) securityGroupListResultPreparer(ctx context.Context, sglr network.SecurityGroupListResult) (*http.Request, error) {
|
|
|
|
if sglr.NextLink == nil || len(to.String(sglr.NextLink)) < 1 {
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
decorators := []autorest.PrepareDecorator{
|
|
|
|
autorest.WithBaseURL(to.String(sglr.NextLink)),
|
|
|
|
}
|
|
|
|
return c.armClient.PrepareGetRequest(ctx, decorators...)
|
|
|
|
}
|
|
|
|
|
|
|
|
// listNextResults retrieves the next set of results, if any.
|
|
|
|
func (c *Client) listNextResults(ctx context.Context, lastResults network.SecurityGroupListResult) (result network.SecurityGroupListResult, err error) {
|
|
|
|
req, err := c.securityGroupListResultPreparer(ctx, lastResults)
|
|
|
|
if err != nil {
|
|
|
|
return result, autorest.NewErrorWithError(err, "securitygroupclient", "listNextResults", nil, "Failure preparing next results request")
|
|
|
|
}
|
|
|
|
if req == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, rerr := c.armClient.Send(ctx, req)
|
|
|
|
defer c.armClient.CloseResponse(ctx, resp)
|
|
|
|
if rerr != nil {
|
|
|
|
result.Response = autorest.Response{Response: resp}
|
|
|
|
return result, autorest.NewErrorWithError(rerr.Error(), "securitygroupclient", "listNextResults", resp, "Failure sending next results request")
|
|
|
|
}
|
|
|
|
|
|
|
|
result, err = c.listResponder(resp)
|
|
|
|
if err != nil {
|
|
|
|
err = autorest.NewErrorWithError(err, "securitygroupclient", "listNextResults", resp, "Failure responding to next results request")
|
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// SecurityGroupListResultPage contains a page of SecurityGroup values.
|
|
|
|
type SecurityGroupListResultPage struct {
|
|
|
|
fn func(context.Context, network.SecurityGroupListResult) (network.SecurityGroupListResult, error)
|
|
|
|
sglr network.SecurityGroupListResult
|
|
|
|
}
|
|
|
|
|
|
|
|
// NextWithContext advances to the next page of values. If there was an error making
|
|
|
|
// the request the page does not advance and the error is returned.
|
|
|
|
func (page *SecurityGroupListResultPage) NextWithContext(ctx context.Context) (err error) {
|
|
|
|
next, err := page.fn(ctx, page.sglr)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
page.sglr = next
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Next advances to the next page of values. If there was an error making
|
|
|
|
// the request the page does not advance and the error is returned.
|
|
|
|
// Deprecated: Use NextWithContext() instead.
|
|
|
|
func (page *SecurityGroupListResultPage) Next() error {
|
|
|
|
return page.NextWithContext(context.Background())
|
|
|
|
}
|
|
|
|
|
|
|
|
// NotDone returns true if the page enumeration should be started or is not yet complete.
|
|
|
|
func (page SecurityGroupListResultPage) NotDone() bool {
|
|
|
|
return !page.sglr.IsEmpty()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Response returns the raw server response from the last page request.
|
|
|
|
func (page SecurityGroupListResultPage) Response() network.SecurityGroupListResult {
|
|
|
|
return page.sglr
|
|
|
|
}
|
|
|
|
|
|
|
|
// Values returns the slice of values for the current page or nil if there are no values.
|
|
|
|
func (page SecurityGroupListResultPage) Values() []network.SecurityGroup {
|
|
|
|
if page.sglr.IsEmpty() {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return *page.sglr.Value
|
|
|
|
}
|