pkg/infrastructure/authorizationCheckers/ARMTemplateWhatIf/armTemplateWhatIfAuthorizationChecker.go (203 lines of code) (raw):
// MIT License
//
// Copyright (c) Microsoft Corporation.
//
// Permission is hereby granted, free of charge, to any person obtaining a copy
// of this software and associated documentation files (the "Software"), to deal
// in the Software without restriction, including without limitation the rights
// to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
// copies of the Software, and to permit persons to whom the Software is
// furnished to do so, subject to the following conditions:
//
// The above copyright notice and this permission notice shall be included in all
// copies or substantial portions of the Software.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
// IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
// FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
// AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
// LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
// OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
// SOFTWARE
package ARMTemplateWhatIf
import (
"bytes"
"encoding/json"
"errors"
"fmt"
"io"
"time"
// "log"
"net/http"
URL "net/url"
"strings"
"github.com/Azure/mpf/pkg/domain"
"github.com/Azure/mpf/pkg/infrastructure/ARMTemplateShared"
"github.com/Azure/mpf/pkg/infrastructure/azureAPI"
"github.com/Azure/mpf/pkg/infrastructure/mpfSharedUtils"
log "github.com/sirupsen/logrus"
)
type armWhatIfConfig struct {
// mpfConfig domain.MPFConfig
armConfig ARMTemplateShared.ArmTemplateAdditionalConfig
azAPIClient *azureAPI.AzureAPIClients
}
func NewARMTemplateWhatIfAuthorizationChecker(subscriptionID string, armConfig ARMTemplateShared.ArmTemplateAdditionalConfig) *armWhatIfConfig {
azAPIClient := azureAPI.NewAzureAPIClients(subscriptionID)
return &armWhatIfConfig{
azAPIClient: azAPIClient,
armConfig: armConfig,
}
}
func (a *armWhatIfConfig) GetDeploymentAuthorizationErrors(mpfConfig domain.MPFConfig) (string, error) {
return a.GetARMWhatIfAuthorizationErrors(a.armConfig.DeploymentName, mpfConfig)
}
func (a *armWhatIfConfig) CleanDeployment(mpfConfig domain.MPFConfig) error {
log.Infoln("No additional cleanup needed in WhatIf mode")
log.Infoln("*************************")
return nil
}
// Get parameters in standard format that is without the schema, contentVersion and parameters fields
func (a *armWhatIfConfig) CreateEmptyDeployment(client *http.Client, deploymentName string, bearerToken string, mpfConfig domain.MPFConfig) error {
var deploymentUri string
if a.armConfig.SubscriptionScoped {
deploymentUri = fmt.Sprintf("https://management.azure.com/subscriptions/%s/providers/Microsoft.Resources/deployments/%s?api-version=2021-04-01", mpfConfig.SubscriptionID, deploymentName)
} else {
deploymentUri = fmt.Sprintf("https://management.azure.com/subscriptions/%s/resourcegroups/%s/providers/Microsoft.Resources/deployments/%s?api-version=2020-10-01", mpfConfig.SubscriptionID, mpfConfig.ResourceGroup.ResourceGroupName, deploymentName)
}
log.Info("Creating empty deployment...")
log.Debug(deploymentUri)
emptyTempl, err := mpfSharedUtils.ReadJson("../samples/templates/empty.json")
if err != nil {
return err
}
emptyTemplStdFmtMap := map[string]interface{}{
"properties": map[string]interface{}{
"mode": "Incremental",
"template": emptyTempl,
"parameters": map[string]interface{}{},
},
}
// convert bodyJSON to string
emptyTemplJSONBytes, err := json.Marshal(emptyTemplStdFmtMap)
if err != nil {
return err
}
emptyDeploymentJSONString := string(emptyTemplJSONBytes)
deploymentReq, err := http.NewRequest("PUT", deploymentUri, bytes.NewBufferString(emptyDeploymentJSONString))
if err != nil {
return err
}
deploymentReq.Header.Set("Content-Type", "application/json")
deploymentReq.Header.Set("Accept", "application/json")
deploymentReq.Header.Set("User-Agent", "Go HTTP Client")
// add bearer token to header
deploymentReq.Header.Add("Authorization", "Bearer "+bearerToken)
log.Debugf("%v", deploymentReq)
// make deploymentReq
deploymentResp, err := client.Do(deploymentReq)
if err != nil {
return err
}
log.Debugf("%v", deploymentResp)
defer deploymentResp.Body.Close()
return nil
}
func (a *armWhatIfConfig) GetARMWhatIfAuthorizationErrors(deploymentName string, mpfConfig domain.MPFConfig) (string, error) {
bearerToken, err := a.azAPIClient.GetSPBearerToken(mpfConfig.TenantID, mpfConfig.SP.SPClientID, mpfConfig.SP.SPClientSecret)
if err != nil {
// wrap error and return
return "", fmt.Errorf("error getting bearer token: %w", err)
}
// read template and parameters
template, err := mpfSharedUtils.ReadJson(a.armConfig.TemplateFilePath)
if err != nil {
// log.Errorf("Error reading template file: %v", err)
return "", fmt.Errorf("%w: %w", ARMTemplateShared.ErrInvalidTemplate, fmt.Errorf("error reading template file: %w", err))
}
parameters, err := mpfSharedUtils.ReadJson(a.armConfig.ParametersFilePath)
if err != nil {
return "", fmt.Errorf("%w: %w", ARMTemplateShared.ErrInvalidTemplate, fmt.Errorf("error reading parameters file: %w", err))
}
// convert parameters to standard format
parameters = ARMTemplateShared.GetParametersInStandardFormat(parameters)
// if Subscription scoped, we need to specify deployment location
fullTemplate := map[string]interface{}{
"properties": map[string]interface{}{
"mode": "Incremental",
"template": template,
"parameters": parameters,
},
}
if a.armConfig.SubscriptionScoped {
fullTemplate["location"] = a.armConfig.Location
}
// convert bodyJSON to string
fullTemplateJSONBytes, err := json.Marshal(fullTemplate)
if err != nil {
return "", fmt.Errorf("%w, %w", ARMTemplateShared.ErrInvalidTemplate, fmt.Errorf("error marshalling fullTemplateJSON: %w", err))
}
fullTemplateJSONString := string(fullTemplateJSONBytes)
log.Debugln()
log.Debugln(fullTemplateJSONString)
log.Debugln()
// create JSON body with template and parameters
client := &http.Client{}
var url string
if a.armConfig.SubscriptionScoped {
url = fmt.Sprintf("https://management.azure.com/subscriptions/%s/providers/Microsoft.Resources/deployments/%s/whatIf?api-version=2022-09-01", mpfConfig.SubscriptionID, deploymentName)
} else {
url = fmt.Sprintf("https://management.azure.com/subscriptions/%s/resourcegroups/%s/providers/Microsoft.Resources/deployments/%s/whatIf?api-version=2021-04-01", mpfConfig.SubscriptionID, mpfConfig.ResourceGroup.ResourceGroupName, deploymentName)
}
reqMethod := "POST"
req, err := http.NewRequest(reqMethod, url, bytes.NewBufferString(fullTemplateJSONString))
if err != nil {
return "", err
}
req.Header.Set("Content-Type", "application/json")
req.Header.Set("Accept", "application/json")
req.Header.Set("User-Agent", "Go HTTP Client")
// add bearer token to header
req.Header.Add("Authorization", "Bearer "+bearerToken)
resp, err := client.Do(req)
if err != nil {
return "", err
}
defer resp.Body.Close()
bodyBytes, err := io.ReadAll(resp.Body)
if err != nil {
return "", err
}
log.Debugf("Response Body: %s", string(bodyBytes))
// if response status code is 400, indicates invalid template
if resp.StatusCode == 400 {
// log.Errorf("InvalidTemplate error occured: %s. Please check the Template and Parameters", resp.Status)
// return "", errors.New("InvalidTemplate")
// return "", fmt.Error("InvalidTemplate: Please check the Template and Parameters: %w", resp.Status)
log.Warnf("Response Body: %s", string(bodyBytes))
return "", fmt.Errorf("%w, %w", ARMTemplateShared.ErrInvalidTemplate, errors.New("please check the template and parameter files"))
}
whatIfRespLoc := resp.Header.Get("Location")
log.Debugf("What if response Location: %s \n", whatIfRespLoc)
_, err = URL.ParseRequestURI(whatIfRespLoc)
if err != nil {
// return "", err
log.Warnf("Response Body: %s", string(bodyBytes))
return "", fmt.Errorf("Error parsing what if response location: %w", err)
}
respBody, err := a.GetWhatIfResp(whatIfRespLoc, bearerToken)
if err != nil {
log.Infof("Could not fetch what if response: %v \n", err)
// return "", err
return "", fmt.Errorf("Could not fetch what if response: %w", err)
}
log.Debugln(respBody)
switch {
case strings.Contains(respBody, "InvalidTemplate") && !strings.Contains(respBody, "InvalidTemplateDeployment"):
// This indicates the ARM Template or Bicep File has issues.
// Sample
// {"status":"Failed","error":{"code":"InvalidTemplate","message":"Deployment template validation failed: 'The template parameters 'aksClusterName, virtualNetworkName' in the parameters file are not valid; they are not present in the original template and can therefore not be provided at deployment time. The only supported parameters for this template are 'clusterName, location, subnetName, vnetName'. Please see https://aka.ms/arm-pass-parameter-values for usage details.'.","additionalInfo":[{"type":"TemplateViolation","info":{"lineNumber":0,"linePosition":0,"path":""}}]}}
return "", fmt.Errorf("%w: please check the template and parameters file: %s", ARMTemplateShared.ErrInvalidTemplate, respBody)
case strings.Contains(respBody, "Authorization") && !strings.Contains(respBody, "{\"status\":\"Succeeded\""):
// This indicates Authorization errors occured
return respBody, nil
case strings.Contains(respBody, "InvalidTemplateDeployment"):
// This indicates all Authorization errors are fixed
// Sample error [{\"code\":\"PodIdentityAddonFeatureFlagNotEnabled\",\"message\":\"Provisioning of resource(s) for container service aks-24xalwx7i2ueg in resource group testdeployrg-Y2jsRAG failed. Message: PodIdentity addon is not allowed since feature 'Microsoft.ContainerService/EnablePodIdentityPreview' is not enabled.
// Hence ok to proceed, and not return error in this condition
log.Warnf("Post Authorizaton error occured: %s", respBody)
}
return "", nil
}
func (a *armWhatIfConfig) GetWhatIfResp(whatIfRespLoc string, bearerToken string) (string, error) {
client := &http.Client{}
req, err := http.NewRequest("GET", whatIfRespLoc, nil)
if err != nil {
return "", err
}
req.Header.Set("Content-Type", "application/json")
req.Header.Set("Accept", "application/json")
req.Header.Set("User-Agent", "Go HTTP Client")
// add bearer token to header
req.Header.Add("Authorization", "Bearer "+bearerToken)
var respBody string
maxRetries := 50
retryCount := 0
for {
// make request
resp, err := client.Do(req)
if err != nil {
return "", err
}
defer resp.Body.Close()
// read response body
body, err := io.ReadAll(resp.Body)
if err != nil {
return "", err
}
respBody = string(body)
// If response body is not empty, break out of loop
if respBody != "" {
log.Infoln("Whatif Results Response Received..")
break
}
retryCount++
if retryCount == maxRetries {
log.Warnf("Whatif Results Response Body is empty after %d retries, returning empty response body", maxRetries)
return "", fmt.Errorf("Whatif Results Response Body is empty after %d retries", maxRetries)
}
log.Infoln("Whatif Results Response Body is empty, retrying in a bit...")
// Sleep for 500 milli seconds and try again
time.Sleep(500 * time.Millisecond)
}
log.Debugln("Whatif Results Response Body:")
log.Debugln(respBody)
return respBody, nil
}