# Copyright:: Copyright (c) 2019 eGlobalTech, Inc., all rights reserved
#
# Licensed under the BSD-3 license (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License in the root of the project or at
#
# http://egt-labs.com/mu/LICENSE.html
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
module MU
class Cloud
class Azure
# Creation of Virtual Private Clouds and associated artifacts (routes, subnets, etc).
class VPC < MU::Cloud::VPC
attr_reader :cloud_desc_cache
attr_reader :resource_group
# Initialize this cloud resource object. Calling +super+ will invoke the initializer defined under {MU::Cloud}, which should set the attribtues listed in {MU::Cloud::PUBLIC_ATTRS} as well as applicable dependency shortcuts, like @vpc, for us.
# @param args [Hash]: Hash of named arguments passed via Ruby's double-splat
def initialize(**args)
super
@subnets = []
@subnetcachesemaphore = Mutex.new
if !mu_name.nil?
@mu_name = mu_name
if @cloud_id
cloud_desc
@cloud_id = Id.new(cloud_desc.id)
@resource_group ||= @cloud_id.resource_group
loadSubnets(use_cache: true)
end
elsif @config['scrub_mu_isms']
@mu_name = @config['name']
else
@mu_name = @deploy.getResourceName(@config['name'])
end
end
# Called automatically by {MU::Deploy#createResources}
def create
create_update
end
# Called automatically by {MU::Deploy#createResources}
def groom
if @config['peers']
@config['peers'].each { |peer|
if peer['vpc']['name']
peer_obj = @deploy.findLitterMate(name: peer['vpc']['name'], type: "vpcs", habitat: peer['vpc']['project'])
next if peer_obj.mu_name < @mu_name # both of us would try to create this peering, otherwise, so don't step on each other
else
tag_key, tag_value = peer['vpc']['tag'].split(/=/, 2) if !peer['vpc']['tag'].nil?
if peer['vpc']['deploy_id'].nil? and peer['vpc']['id'].nil? and tag_key.nil?
peer['vpc']['deploy_id'] = @deploy.deploy_id
end
peer_obj = MU::MommaCat.findStray(
"Azure",
"vpcs",
deploy_id: peer['vpc']['deploy_id'],
cloud_id: peer['vpc']['id'],
name: peer['vpc']['name'],
tag_key: tag_key,
tag_value: tag_value,
dummy_ok: true
).first
end
raise MuError, "No result looking for #{@mu_name}'s peer VPCs (#{peer['vpc']})" if peer_obj.nil?
ext_peerings = MU::Cloud::Azure.network(credentials: @credentials).virtual_network_peerings.list(@resource_group, @cloud_id)
peer_name = @mu_name+"-"+@config['name'].upcase+"-"+peer_obj.config['name'].upcase
peer_params = MU::Cloud::Azure.network(:VirtualNetworkPeering).new
peer_params.remote_virtual_network = peer_obj.cloud_desc
peer['allow_forwarded_traffic'] ||= false
peer_params.allow_forwarded_traffic = peer['allow_forwarded_traffic']
peer['allow_gateway_traffic'] ||= false
peer_params.allow_gateway_transit = peer['allow_gateway_traffic']
need_update = true
exists = false
ext_peerings.each { |ext_peering|
if ext_peering.remote_virtual_network.id == peer_obj.cloud_desc.id
exists = true
need_update = (ext_peering.allow_forwarded_traffic != peer_params.allow_forwarded_traffic or ext_peering.allow_gateway_transit != peer_params.allow_gateway_transit)
end
}
if need_update
if !exists
MU.log "Creating peering connection from #{@mu_name} to #{peer_obj.mu_name}", details: peer_params
else
MU.log "Updating peering connection from #{@mu_name} to #{peer_obj.mu_name}", MU::NOTICE, details: peer_params
end
MU::Cloud::Azure.network(credentials: @credentials).virtual_network_peerings.create_or_update(@resource_group, @cloud_id, peer_name, peer_params)
end
}
end
create_update
end
# Describe this VPC
# @return [Hash]
def notify
base = MU.structToHash(cloud_desc)
base["cloud_id"] = @cloud_id.name
base.merge!(@config.to_h)
base
end
# Describe this VPC from the cloud platform's perspective
# @return [Hash]
def cloud_desc(use_cache: true)
if @cloud_desc_cache and use_cache
return @cloud_desc_cache
end
@cloud_desc_cache = MU::Cloud::Azure::VPC.find(cloud_id: @cloud_id, resource_group: @resource_group).values.first
@cloud_id ||= Id.new(@cloud_desc_cache.id)
@cloud_desc_cache
end
# Locate and return cloud provider descriptors of this resource type
# which match the provided parameters, or all visible resources if no
# filters are specified. At minimum, implementations of +find+ must
# honor +credentials+ and +cloud_id+ arguments. We may optionally
# support other search methods, such as +tag_key+ and +tag_value+, or
# cloud-specific arguments like +project+. See also {MU::MommaCat.findStray}.
# @param args [Hash]: Hash of named arguments passed via Ruby's double-splat
# @return [Hash]: The cloud provider's complete descriptions of matching resources
def self.find(**args)
found = {}
# Azure resources are namedspaced by resource group. If we weren't
# told one, we may have to search all the ones we can see.
resource_groups = if args[:resource_group]
[args[:resource_group]]
elsif args[:cloud_id] and args[:cloud_id].is_a?(MU::Cloud::Azure::Id)
[args[:cloud_id].resource_group]
else
MU::Cloud::Azure.resources(credentials: args[:credentials]).resource_groups.list.map { |rg| rg.name }
end
if args[:cloud_id]
id_str = args[:cloud_id].is_a?(MU::Cloud::Azure::Id) ? args[:cloud_id].name : args[:cloud_id]
resource_groups.each { |rg|
resp = MU::Cloud::Azure.network(credentials: args[:credentials]).virtual_networks.get(rg, id_str)
found[Id.new(resp.id)] = resp if resp
}
else
if args[:resource_group]
MU::Cloud::Azure.network(credentials: args[:credentials]).virtual_networks.list(args[:resource_group]).each { |net|
found[Id.new(net.id)] = net
}
else
MU::Cloud::Azure.network(credentials: args[:credentials]).virtual_networks.list_all.each { |net|
found[Id.new(net.id)] = net
}
end
end
found
end
# Return an array of MU::Cloud::Azure::VPC::Subnet objects describe the
# member subnets of this VPC.
#
# @return [Array]
def subnets
if @subnets.nil? or @subnets.size == 0
return loadSubnets
end
return @subnets
end
# Describe subnets associated with this VPC. We'll compose identifying
# information similar to what MU::Cloud.describe builds for first-class
# resources.
# @param use_cache [Boolean]: If available, use saved deployment metadata to describe subnets, instead of querying the cloud API
# @return [Array]: A list of cloud provider identifiers of subnets associated with this VPC.
def loadSubnets(use_cache: false)
@subnets = []
MU::Cloud::Azure.network(credentials: @credentials).subnets.list(@resource_group, cloud_desc(use_cache: use_cache).name).each { |subnet|
subnet_cfg = {
"cloud_id" => subnet.name,
"mu_name" => subnet.name,
"credentials" => @config['credentials'],
"region" => @config['region'],
"ip_block" => subnet.address_prefix
}
if @config['subnets']
@config['subnets'].each { |s|
if s['ip_block'] == subnet_cfg['ip_block']
subnet_cfg['name'] = s['name']
break
end
}
end
subnet_cfg['name'] ||= subnet.name
@subnets << MU::Cloud::Azure::VPC::Subnet.new(self, subnet_cfg)
}
@subnets
end
# Given some search criteria try locating a NAT Gaateway in this VPC.
# @param nat_cloud_id [String]: The cloud provider's identifier for this NAT.
# @param nat_filter_key [String]: A cloud provider filter to help identify the resource, used in conjunction with nat_filter_value.
# @param nat_filter_value [String]: A cloud provider filter to help identify the resource, used in conjunction with nat_filter_key.
# @param region [String]: The cloud provider region of the target instance.
def findNat(nat_cloud_id: nil, nat_filter_key: nil, nat_filter_value: nil, region: MU.curRegion)
nil
end
# Given some search criteria for a {MU::Cloud::Server}, see if we can
# locate a NAT host in this VPC.
# @param nat_name [String]: The name of the resource as defined in its 'name' Basket of Kittens field, typically used in conjunction with deploy_id.
# @param nat_cloud_id [String]: The cloud provider's identifier for this NAT.
# @param nat_tag_key [String]: A cloud provider tag to help identify the resource, used in conjunction with tag_value.
# @param nat_tag_value [String]: A cloud provider tag to help identify the resource, used in conjunction with tag_key.
# @param nat_ip [String]: An IP address associated with the NAT instance.
def findBastion(nat_name: nil, nat_cloud_id: nil, nat_tag_key: nil, nat_tag_value: nil, nat_ip: nil)
[:nat_name, :nat_cloud_id, :nat_tag_key, :nat_tag_value, :nat_ip].each { |var|
if binding.local_variable_get(var) != nil
binding.local_variable_set(var, var.to_s)
end
# If we're searching by name, assume it's part of this here deploy.
if nat_cloud_id.nil? and !@deploy.nil?
deploy_id = @deploy.deploy_id
end
found = MU::MommaCat.findStray(
"Azure",
"server",
name: nat_name,
cloud_id: nat_cloud_id,
deploy_id: deploy_id,
tag_key: nat_tag_key,
tag_value: nat_tag_value,
allow_multi: true,
dummy_ok: true,
calling_deploy: @deploy
)
return nil if found.nil? || found.empty?
if found.size == 1
return found.first
end
}
nil
end
# Check for a subnet in this VPC matching one or more of the specified
# criteria, and return it if found.
def getSubnet(cloud_id: nil, name: nil, tag_key: nil, tag_value: nil, ip_block: nil)
loadSubnets
if !cloud_id.nil? and cloud_id.match(/^https:\/\//)
cloud_id.gsub!(/.*?\//, "")
end
MU.log "getSubnet(cloud_id: #{cloud_id}, name: #{name}, tag_key: #{tag_key}, tag_value: #{tag_value}, ip_block: #{ip_block})", MU::DEBUG, details: caller[0]
@subnets.each { |subnet|
if !cloud_id.nil? and !subnet.cloud_id.nil? and subnet.cloud_id.to_s == cloud_id.to_s
return subnet
elsif !name.nil? and !subnet.name.nil? and subnet.name.to_s == name.to_s
return subnet
end
}
return nil
end
@route_cache = {}
@rtb_cache = {}
@rtb_cache_semaphore = Mutex.new
# Check whether we (the Mu Master) have a direct route to a particular
# instance. Useful for skipping hops through bastion hosts to get
# directly at child nodes in peered VPCs, the public internet, and the
# like.
# @param target_instance [OpenStruct]: The cloud descriptor of the instance to check.
# @param region [String]: The cloud provider region of the target subnet.
# @return [Boolean]
def self.haveRouteToInstance?(target_instance, region: MU.curRegion, credentials: nil)
# target_instance.network_profile.network_interfaces.each { |iface|
# iface_id = Id.new(iface.is_a?(Hash) ? iface['id'] : iface.id)
# iface_desc = MU::Cloud::Azure.network(credentials: credentials).network_interfaces.get(iface_id.resource_group, iface_id.to_s)
# iface_desc.ip_configurations.each { |ipcfg|
# if ipcfg.respond_to?(:public_ipaddress) and ipcfg.public_ipaddress
# return true # XXX invalid if Mu can't talk to the internet
# end
# }
# }
return false if MU.myCloud != "Azure"
# XXX if we're in Azure, see if this is in our VPC or if we're peered to its VPC
false
end
# Does this resource type exist as a global (cloud-wide) artifact, or
# is it localized to a region/zone?
# @return [Boolean]
def self.isGlobal?
false
end
# Denote whether this resource implementation is experiment, ready for
# testing, or ready for production use.
def self.quality
MU::Cloud::BETA
end
# Stub method. Azure resources are cleaned up by removing the parent
# resource group.
# @return [void]
def self.cleanup(**args)
end
# Reverse-map our cloud description into a runnable config hash.
# We assume that any values we have in +@config+ are placeholders, and
# calculate our own accordingly based on what's live in the cloud.
# XXX add flag to return the diff between @config and live cloud
def toKitten(**_args)
return nil if cloud_desc.name == "default" # parent project builds these
bok = {
"cloud" => "Azure",
"project" => @config['project'],
"credentials" => @config['credentials']
}
bok
end
# Cloud-specific configuration properties.
# @param _config [MU::Config]: The calling MU::Config object
# @return [Array]: List of required fields, and json-schema Hash of cloud-specific configuration parameters for this resource
def self.schema(_config = nil)
toplevel_required = []
schema = {
"peers" => {
"items" => {
"properties" => {
"allow_forwarded_traffic" => {
"type" => "boolean",
"default" => false,
"description" => "Allow traffic originating from outside peered networks"
},
"allow_gateway_traffic" => {
"type" => "boolean",
"default" => false,
"description" => "Permit peered networks to use each others' VPN gateways"
}
}
}
}
}
[toplevel_required, schema]
end
# Cloud-specific pre-processing of {MU::Config::BasketofKittens::vpcs}, bare and unvalidated.
# @param vpc [Hash]: The resource to process and validate
# @param configurator [MU::Config]: The overall deployment configurator of which this resource is a member
# @return [Boolean]: True if validation succeeded, False otherwise
def self.validateConfig(vpc, configurator)
ok = true
vpc['region'] ||= MU::Cloud::Azure.myRegion(vpc['credentials'])
if vpc['subnets']
vpc['subnets'].each { |subnet|
subnet_routes[subnet['route_table']] = Array.new if subnet_routes[subnet['route_table']].nil?
subnet_routes[subnet['route_table']] << subnet['name']
}
end
if (!vpc['subnets'] or vpc['subnets'].empty?) and vpc['create_standard_subnets']
subnets = configurator.divideNetwork(vpc['ip_block'], vpc['route_tables'].size, 28)
vpc['subnets'] ||= []
vpc['route_tables'].each { |rtb|
is_public = false
rtb['routes'].each { |route|
if route['gateway'] == "#INTERNET"
is_public = true
break
end
}
vpc['subnets'] << {
"name" => "Subnet#{rtb['name'].capitalize}",
"is_public" => is_public,
"ip_block" => subnets.shift,
"route_table" => rtb['name']
}
}
end
vpc['route_tables'].each { |rtb|
rtb['routes'] ||= []
rtb['routes'] << { "destination_network" => vpc['ip_block'] }
rtb['routes'].uniq!
}
default_acl = {
"name" => vpc['name']+"-defaultfw",
"cloud" => "Azure",
"region" => vpc['region'],
"credentials" => vpc['credentials'],
"rules" => [
{
"ingress" => true, "proto" => "all", "hosts" => [vpc['ip_block']]
},
{
"egress" => true, "proto" => "all", "hosts" => [vpc['ip_block']]
}
]
}
vpc["dependencies"] ||= []
vpc["dependencies"] << {
"type" => "firewall_rule",
"name" => vpc['name']+"-defaultfw"
}
if !configurator.insertKitten(default_acl, "firewall_rules", true)
ok = false
end
ok
end
# @param route [Hash]: A route description, per the Basket of Kittens schema
# @param server [MU::Cloud::Azure::Server]: Instance to which this route will apply
def createRouteForInstance(route, server)
createRoute(route, network: @url, tags: [MU::Cloud::Azure.nameStr(server.mu_name)])
end
private
def create_update
@config = MU::Config.manxify(@config)
@config['region'] ||= MU::Cloud::Azure.myRegion(@config['credentials'])
tags = {}
if !@config['scrub_mu_isms']
tags = MU::MommaCat.listStandardTags
end
if @config['tags']
@config['tags'].each { |tag|
tags[tag['key']] = tag['value']
}
end
vpc_obj = MU::Cloud::Azure.network(:VirtualNetwork).new
addr_space_obj = MU::Cloud::Azure.network(:AddressSpace).new
addr_space_obj.address_prefixes = [
@config['ip_block']
]
vpc_obj.address_space = addr_space_obj
vpc_obj.location = @config['region']
vpc_obj.tags = tags
my_fw = deploy.findLitterMate(type: "firewall_rule", name: @config['name']+"-defaultfw")
@resource_group = @deploy.deploy_id+"-"+@config['region'].upcase
need_apply = false
ext_vpc = nil
begin
ext_vpc = MU::Cloud::Azure.network(credentials: @config['credentials']).virtual_networks.get(
@resource_group,
@mu_name
)
rescue ::MU::Cloud::Azure::APIError => e
if e.message.match(/: ResourceNotFound:/)
need_apply = true
else
raise e
end
end
# XXX raw update seems to destroy child resources; if we just need to update
# tags, do that with .update_tags
if !ext_vpc
MU.log "Creating VPC #{@mu_name} (#{@config['ip_block']}) in #{@config['region']}", details: vpc_obj
need_apply = true
elsif ext_vpc.location != vpc_obj.location or
# ext_vpc.tags != vpc_obj.tags or
# XXX updating tags is a different API call
ext_vpc.address_space.address_prefixes != vpc_obj.address_space.address_prefixes
MU.log "Updating VPC #{@mu_name} (#{@config['ip_block']}) in #{@config['region']}", MU::NOTICE, details: vpc_obj
MU.structToHash(ext_vpc).diff(MU.structToHash(vpc_obj))
need_apply = true
end
if need_apply
begin
resp = MU::Cloud::Azure.network(credentials: @config['credentials']).virtual_networks.create_or_update(
@resource_group,
@mu_name,
vpc_obj
)
@cloud_id = Id.new(resp.id)
rescue ::MU::Cloud::Azure::APIError => e
if e.message.match(/InUseSubnetCannotBeDeleted: /)
MU.log "Cannot delete an in-use Azure subnet", MU::WARN
else
raise e
end
end
end
# this is slow, so maybe thread it
rtb_map = {}
routethreads = []
@config['route_tables'].each { |rtb_cfg|
routethreads << Thread.new(rtb_cfg) { |rtb|
rtb_name = @mu_name+"-"+rtb['name'].upcase
rtb_obj = MU::Cloud::Azure.network(:RouteTable).new
rtb_obj.location = @config['region']
rtb_obj.tags = tags
rtb_ref_obj = MU::Cloud::Azure.network(:RouteTable).new
rtb_ref_obj.name = rtb_name
rtb_map[rtb['name']] = rtb_ref_obj
need_apply = false
ext_rtb = nil
begin
ext_rtb = MU::Cloud::Azure.network(credentials: @config['credentials']).route_tables.get(
@resource_group,
rtb_name
)
rtb_map[rtb['name']] = ext_rtb
rescue MU::Cloud::Azure::APIError => e
if e.message.match(/: ResourceNotFound:/)
need_apply = true
else
raise e
end
end
if !ext_rtb
MU.log "Creating route table #{rtb_name} in VPC #{@mu_name}", details: rtb_obj
need_apply = true
elsif ext_rtb.location != rtb_obj.location or
ext_rtb.tags != rtb_obj.tags
need_apply = true
MU.log "Updating route table #{rtb_name} in VPC #{@mu_name}", MU::NOTICE, details: rtb_obj
end
if need_apply
rtb_map[rtb['name']] = MU::Cloud::Azure.network(credentials: @config['credentials']).route_tables.create_or_update(
@resource_group,
rtb_name,
rtb_obj
)
end
rtb['routes'].each { |route|
route_obj = MU::Cloud::Azure.network(:Route).new
route_obj.address_prefix = route['destination_network']
routename = rtb_name+"-"+route['destination_network'].gsub(/[^a-z0-9]/i, "_")
route_obj.next_hop_type = if route['gateway'] == "#NAT" and @config['bastion']
routename = rtb_name+"-NAT"
if @config['bastion'].is_a?(Hash) and !@config['bastion']['id'] and !@config['bastion']['deploy_id']
@config['bastion']['deploy_id'] = @deploy.deploy_id
end
bastion_ref = MU::Config::Ref.get(@config['bastion'])
if bastion_ref.kitten and bastion_ref.kitten.cloud_desc
iface_id = Id.new(bastion_ref.kitten.cloud_desc.network_profile.network_interfaces.first.id)
iface_desc = MU::Cloud::Azure.network(credentials: @credentials).network_interfaces.get(@resource_group, iface_id.name)
if iface_desc and iface_desc.ip_configurations and iface_desc.ip_configurations.size > 0
route_obj.next_hop_ip_address = iface_desc.ip_configurations.first.private_ipaddress
"VirtualAppliance"
else
"VnetLocal"
end
else
"VnetLocal"
end
# create_nat_gateway = true
elsif route['gateway'] == "#INTERNET"
routename = rtb_name+"-INTERNET"
"Internet"
else
routename = rtb_name+"-LOCAL"
"VnetLocal"
end
#next_hop_type 'VirtualNetworkGateway' is for VPNs I think
need_apply = false
ext_route = nil
begin
ext_route = MU::Cloud::Azure.network(credentials: @config['credentials']).routes.get(
@resource_group,
rtb_name,
routename
)
rescue MU::Cloud::Azure::APIError => e
if e.message.match(/\bNotFound\b/)
need_apply = true
else
raise e
end
end
if !ext_route
MU.log "Creating route #{routename} for #{route['destination_network']} in route table #{rtb_name}", details: rtb_obj
need_apply = true
elsif ext_route.next_hop_type != route_obj.next_hop_type or
ext_route.address_prefix != route_obj.address_prefix
MU.log "Updating route #{routename} for #{route['destination_network']} in route table #{rtb_name}", MU::NOTICE, details: [route_obj, ext_route]
need_apply = true
end
if need_apply
MU::Cloud::Azure.network(credentials: @config['credentials']).routes.create_or_update(
@resource_group,
rtb_name,
routename,
route_obj
)
end
}
}
}
routethreads.each { |t|
t.join
}
# TODO this is only available in westus as of 2019-09-29
# if create_nat_gateway
# nat_obj = MU::Cloud::Azure.network(:NatGateway).new
# nat_obj.location = @config['region']
# nat_obj.tags = tags
# MU.log "Creating NAT Gateway #{@mu_name}-NAT", details: nat_obj
# MU::Cloud::Azure.network(credentials: @config['credentials']).nat_gateways.create_or_update(
# @resource_group,
# @mu_name+"-NAT",
# nat_obj
# )
# end
if @config['subnets']
subnetthreads = []
@config['subnets'].each { |subnet_cfg|
subnetthreads << Thread.new(subnet_cfg) { |subnet|
subnet_obj = MU::Cloud::Azure.network(:Subnet).new
subnet_name = @mu_name+"-"+subnet['name'].upcase
subnet_obj.address_prefix = subnet['ip_block']
subnet_obj.route_table = rtb_map[subnet['route_table']]
if my_fw and my_fw.cloud_desc
subnet_obj.network_security_group = my_fw.cloud_desc
end
need_apply = false
ext_subnet = nil
begin
ext_subnet = MU::Cloud::Azure.network(credentials: @config['credentials']).subnets.get(
@resource_group,
@cloud_id.to_s,
subnet_name
)
rescue APIError => e
if e.message.match(/\bNotFound\b/)
need_apply = true
else
# raise e
end
end
if !ext_subnet
MU.log "Creating Subnet #{subnet_name} in VPC #{@mu_name}", details: subnet_obj
need_apply = true
elsif (!ext_subnet.route_table.nil? and !subnet_obj.route_table.nil? and ext_subnet.route_table.id != subnet_obj.route_table.id) or
ext_subnet.address_prefix != subnet_obj.address_prefix or
ext_subnet.network_security_group.nil? and !subnet_obj.network_security_group.nil? or
(!ext_subnet.network_security_group.nil? and !subnet_obj.network_security_group.nil? and ext_subnet.network_security_group.id != subnet_obj.network_security_group.id)
MU.log "Updating Subnet #{subnet_name} in VPC #{@mu_name}", MU::NOTICE, details: subnet_obj
MU.structToHash(ext_subnet).diff(MU.structToHash(subnet_obj))
need_apply = true
end
if need_apply
begin
MU::Cloud::Azure.network(credentials: @config['credentials']).subnets.create_or_update(
@resource_group,
@cloud_id.to_s,
subnet_name,
subnet_obj
)
rescue ::MU::Cloud::Azure::APIError => e
if e.message.match(/InUseSubnetCannotBeUpdated: /)
MU.log "Cannot alter an in-use Azure subnet", MU::WARN
else
raise e
end
end
end
}
}
subnetthreads.each { |t|
t.join
}
end
loadSubnets
end
# Subnets are almost a first-class resource. So let's kinda sorta treat
# them like one. This should only be invoked on objects that already
# exists in the cloud layer.
class Subnet < MU::Cloud::Azure::VPC
attr_reader :cloud_id
attr_reader :id
attr_reader :ip_block
attr_reader :mu_name
attr_reader :name
attr_reader :cloud_desc_cache
attr_reader :resource_group
attr_reader :az
# @param parent [MU::Cloud::Azure::VPC]: The parent VPC of this subnet.
# @param config [Hash]:
def initialize(parent, config, precache_description: true)
@parent = parent
@deploy = parent.deploy
@config = MU::Config.manxify(config)
@cloud_id = config['cloud_id']
@mu_name = config['mu_name']
@name = config['name']
@deploydata = config # This is a dummy for the sake of describe()
@ip_block = config['ip_block']
@cloud_desc_cache = nil
@az = parent.config['region']
cloud_desc if precache_description
end
# Return the cloud identifier for the default route of this subnet.
def defaultRoute
if cloud_desc and cloud_desc.route_table
rtb_id = MU::Cloud::Azure::Id.new(cloud_desc.route_table.id)
routes = MU::Cloud::Azure.network(credentials: @config['credentials']).routes.list(
rtb_id.resource_group,
rtb_id.name
)
routes.each { |route|
return route if route.address_prefix == "0.0.0.0/0"
}
end
nil
end
# Describe this VPC Subnet
# @return [Hash]
def notify
MU.structToHash(cloud_desc)
end
# Describe this VPC Subnet from the cloud platform's perspective
def cloud_desc(use_cache: true)
return @cloud_desc_cache if @cloud_desc_cache and use_cache
@cloud_desc_cache = MU::Cloud::Azure.network(credentials: @parent.credentials).subnets.get(@parent.resource_group, @parent.cloud_desc.name, @cloud_id.to_s)
@cloud_desc_cache
end
# Is this subnet privately-routable only, or public?
# @return [Boolean]
def private?
if cloud_desc and cloud_desc.route_table
rtb_id = MU::Cloud::Azure::Id.new(cloud_desc.route_table.id)
routes = MU::Cloud::Azure.network(credentials: @config['credentials']).routes.list(
rtb_id.resource_group,
rtb_id.name
)
routes.each { |route|
return false if route.next_hop_type == "Internet"
}
true
end
end
end
end #class
end #class
end
end #module