|
16 | 16 | using Microsoft.Azure.Commands.Compute.Models;
|
17 | 17 | using Microsoft.Azure.Management.Compute;
|
18 | 18 | using Microsoft.Azure.Management.Compute.Models;
|
| 19 | +using Microsoft.Rest.Azure; |
| 20 | +using Newtonsoft.Json; |
19 | 21 | using System;
|
| 22 | +using System.Collections; |
| 23 | +using System.Collections.Generic; |
20 | 24 | using System.Globalization;
|
21 | 25 | using System.Management.Automation;
|
22 | 26 |
|
@@ -45,6 +49,140 @@ public class GetAzureDiskEncryptionStatusCommand : VirtualMachineExtensionBaseCm
|
45 | 49 | [ValidateNotNullOrEmpty]
|
46 | 50 | public string VMName { get; set; }
|
47 | 51 |
|
| 52 | + [Alias("ExtensionName")] |
| 53 | + [Parameter( |
| 54 | + Mandatory = false, |
| 55 | + Position = 2, |
| 56 | + ValueFromPipelineByPropertyName = true, |
| 57 | + HelpMessage = "The extension name. If this parameter is not specified, default values used are AzureDiskEncryption for Windows VMs and AzureDiskEncryptionForLinux for Linux VMs")] |
| 58 | + [ValidateNotNullOrEmpty] |
| 59 | + public string Name { get; set; } |
| 60 | + |
| 61 | + private VirtualMachineExtension GetVmExtensionParameters(VirtualMachine vmParameters, OSType currentOSType) |
| 62 | + { |
| 63 | + Hashtable publicSettings = new Hashtable(); |
| 64 | + Hashtable protectedSettings = new Hashtable(); |
| 65 | + |
| 66 | + publicSettings.Add(AzureDiskEncryptionExtensionConstants.encryptionOperationKey, AzureDiskEncryptionExtensionConstants.queryEncryptionStatusOperation); |
| 67 | + publicSettings.Add(AzureDiskEncryptionExtensionConstants.sequenceVersionKey, Guid.NewGuid().ToString()); |
| 68 | + |
| 69 | + if (vmParameters == null) |
| 70 | + { |
| 71 | + ThrowTerminatingError(new ErrorRecord(new ApplicationException(string.Format(CultureInfo.CurrentUICulture, "Get-AzureDiskEncryptionExtension can enable encryption only on a VM that was already created ")), |
| 72 | + "InvalidResult", |
| 73 | + ErrorCategory.InvalidResult, |
| 74 | + null)); |
| 75 | + } |
| 76 | + |
| 77 | + VirtualMachineExtension vmExtensionParameters = null; |
| 78 | + |
| 79 | + if (OSType.Windows.Equals(currentOSType)) |
| 80 | + { |
| 81 | + this.Name = this.Name ?? AzureDiskEncryptionExtensionContext.ExtensionDefaultName; |
| 82 | + vmExtensionParameters = new VirtualMachineExtension |
| 83 | + { |
| 84 | + Location = vmParameters.Location, |
| 85 | + Publisher = AzureDiskEncryptionExtensionContext.ExtensionDefaultPublisher, |
| 86 | + VirtualMachineExtensionType = AzureDiskEncryptionExtensionContext.ExtensionDefaultName, |
| 87 | + TypeHandlerVersion = AzureDiskEncryptionExtensionContext.ExtensionDefaultVersion, |
| 88 | + Settings = publicSettings, |
| 89 | + ProtectedSettings = protectedSettings |
| 90 | + }; |
| 91 | + } |
| 92 | + else if (OSType.Linux.Equals(currentOSType)) |
| 93 | + { |
| 94 | + this.Name = this.Name ?? AzureDiskEncryptionExtensionContext.LinuxExtensionDefaultName; |
| 95 | + vmExtensionParameters = new VirtualMachineExtension |
| 96 | + { |
| 97 | + Location = vmParameters.Location, |
| 98 | + Publisher = AzureDiskEncryptionExtensionContext.LinuxExtensionDefaultPublisher, |
| 99 | + VirtualMachineExtensionType = AzureDiskEncryptionExtensionContext.LinuxExtensionDefaultName, |
| 100 | + TypeHandlerVersion = AzureDiskEncryptionExtensionContext.LinuxExtensionDefaultVersion, |
| 101 | + Settings = publicSettings, |
| 102 | + ProtectedSettings = protectedSettings |
| 103 | + }; |
| 104 | + } |
| 105 | + |
| 106 | + return vmExtensionParameters; |
| 107 | + } |
| 108 | + |
| 109 | + private string GetExtensionStatusMessage(OSType currentOSType, bool returnSubstatusMessage=false) |
| 110 | + { |
| 111 | + AzureOperationResponse<VirtualMachineExtension> extensionResult = this.VirtualMachineExtensionClient.GetWithInstanceView(this.ResourceGroupName, this.VMName, this.Name); |
| 112 | + if (extensionResult == null) |
| 113 | + { |
| 114 | + ThrowTerminatingError(new ErrorRecord(new ApplicationFailedException(string.Format(CultureInfo.CurrentUICulture, "Failed to retrieve extension status")), |
| 115 | + "InvalidResult", |
| 116 | + ErrorCategory.InvalidResult, |
| 117 | + null)); |
| 118 | + } |
| 119 | + |
| 120 | + PSVirtualMachineExtension returnedExtension = extensionResult.ToPSVirtualMachineExtension( |
| 121 | + this.ResourceGroupName, this.VMName); |
| 122 | + |
| 123 | + if ((returnedExtension == null) || |
| 124 | + (string.IsNullOrWhiteSpace(returnedExtension.Publisher)) || |
| 125 | + (string.IsNullOrWhiteSpace(returnedExtension.ExtensionType))) |
| 126 | + { |
| 127 | + ThrowTerminatingError(new ErrorRecord(new ApplicationFailedException(string.Format(CultureInfo.CurrentUICulture, "Missing extension publisher and type info")), |
| 128 | + "InvalidResult", |
| 129 | + ErrorCategory.InvalidResult, |
| 130 | + null)); |
| 131 | + } |
| 132 | + bool publisherMatch = false; |
| 133 | + if (OSType.Linux.Equals(currentOSType)) |
| 134 | + { |
| 135 | + if (returnedExtension.Publisher.Equals(AzureDiskEncryptionExtensionContext.LinuxExtensionDefaultPublisher, StringComparison.InvariantCultureIgnoreCase) && |
| 136 | + returnedExtension.ExtensionType.Equals(AzureDiskEncryptionExtensionContext.LinuxExtensionDefaultName, StringComparison.InvariantCultureIgnoreCase)) |
| 137 | + { |
| 138 | + publisherMatch = true; |
| 139 | + } |
| 140 | + } |
| 141 | + else if (OSType.Windows.Equals(currentOSType)) |
| 142 | + { |
| 143 | + if (returnedExtension.Publisher.Equals(AzureDiskEncryptionExtensionContext.ExtensionDefaultPublisher, StringComparison.InvariantCultureIgnoreCase) && |
| 144 | + returnedExtension.ExtensionType.Equals(AzureDiskEncryptionExtensionContext.ExtensionDefaultName, StringComparison.InvariantCultureIgnoreCase)) |
| 145 | + { |
| 146 | + publisherMatch = true; |
| 147 | + } |
| 148 | + } |
| 149 | + if (publisherMatch) |
| 150 | + { |
| 151 | + AzureDiskEncryptionExtensionContext context = new AzureDiskEncryptionExtensionContext(returnedExtension); |
| 152 | + if ((context == null) || |
| 153 | + (context.Statuses == null) || |
| 154 | + (context.Statuses.Count < 1) || |
| 155 | + (string.IsNullOrWhiteSpace(context.Statuses[0].Message))) |
| 156 | + { |
| 157 | + throw new KeyNotFoundException(string.Format(CultureInfo.CurrentUICulture, "Invalid extension status")); |
| 158 | + } |
| 159 | + |
| 160 | + if (returnSubstatusMessage) |
| 161 | + { |
| 162 | + if((context == null) || |
| 163 | + (context.SubStatuses == null) || |
| 164 | + (context.SubStatuses.Count < 1)) |
| 165 | + { |
| 166 | + throw new KeyNotFoundException(string.Format(CultureInfo.CurrentUICulture, "Invalid extension substatus")); |
| 167 | + } |
| 168 | + else |
| 169 | + { |
| 170 | + return context.SubStatuses[0].Message; |
| 171 | + } |
| 172 | + } |
| 173 | + |
| 174 | + return context.Statuses[0].Message; |
| 175 | + } |
| 176 | + else |
| 177 | + { |
| 178 | + ThrowTerminatingError(new ErrorRecord(new ApplicationFailedException(string.Format(CultureInfo.CurrentUICulture, "Extension publisher and type mismatched")), |
| 179 | + "InvalidResult", |
| 180 | + ErrorCategory.InvalidResult, |
| 181 | + null)); |
| 182 | + } |
| 183 | + return null; |
| 184 | + } |
| 185 | + |
48 | 186 | private OSType GetOSType(VirtualMachine vmParameters)
|
49 | 187 | {
|
50 | 188 | if (vmParameters == null || vmParameters.StorageProfile == null || vmParameters.StorageProfile.OsDisk == null)
|
@@ -209,17 +347,72 @@ public override void ExecuteCmdlet()
|
209 | 347 | EncryptionStatus osVolumeEncrypted = IsOsVolumeEncrypted(vmParameters);
|
210 | 348 | DiskEncryptionSettings osVolumeEncryptionSettings = GetOsVolumeEncryptionSettings(vmParameters);
|
211 | 349 | EncryptionStatus dataVolumesEncrypted = AreDataVolumesEncrypted(vmParameters);
|
| 350 | + AzureDiskEncryptionStatusContext encryptionStatus = null; |
| 351 | + string progressMessage = null; |
212 | 352 |
|
213 | 353 | OSType osType = GetOSType(vmParameters);
|
214 | 354 | switch (osType)
|
215 | 355 | {
|
216 | 356 | case OSType.Windows:
|
217 |
| - case OSType.Linux: |
218 |
| - AzureDiskEncryptionStatusContext encryptionStatus = new AzureDiskEncryptionStatusContext |
| 357 | + try |
| 358 | + { |
| 359 | + progressMessage = GetExtensionStatusMessage(osType); |
| 360 | + } |
| 361 | + catch(KeyNotFoundException) |
| 362 | + { |
| 363 | + progressMessage = string.Format(CultureInfo.CurrentUICulture, "Extension status not available on the VM"); |
| 364 | + } |
| 365 | + |
| 366 | + encryptionStatus = new AzureDiskEncryptionStatusContext |
219 | 367 | {
|
220 | 368 | OsVolumeEncrypted = osVolumeEncrypted,
|
221 | 369 | DataVolumesEncrypted = dataVolumesEncrypted,
|
222 |
| - OsVolumeEncryptionSettings = osVolumeEncryptionSettings |
| 370 | + OsVolumeEncryptionSettings = osVolumeEncryptionSettings, |
| 371 | + ProgressMessage = progressMessage |
| 372 | + }; |
| 373 | + WriteObject(encryptionStatus); |
| 374 | + break; |
| 375 | + case OSType.Linux: |
| 376 | + VirtualMachine virtualMachineResponse = this.ComputeClient.ComputeManagementClient.VirtualMachines.GetWithInstanceView( |
| 377 | + this.ResourceGroupName, VMName).Body; |
| 378 | + VirtualMachineExtension parameters = GetVmExtensionParameters(virtualMachineResponse, osType); |
| 379 | + |
| 380 | + this.VirtualMachineExtensionClient.CreateOrUpdateWithHttpMessagesAsync( |
| 381 | + this.ResourceGroupName, |
| 382 | + this.VMName, |
| 383 | + this.Name, |
| 384 | + parameters).GetAwaiter().GetResult(); |
| 385 | + |
| 386 | + Dictionary<string, string> encryptionStatusParsed = null; |
| 387 | + try |
| 388 | + { |
| 389 | + string encryptionStatusJson = GetExtensionStatusMessage(osType, returnSubstatusMessage: true); |
| 390 | + encryptionStatusParsed = JsonConvert.DeserializeObject<Dictionary<string, string>>(encryptionStatusJson); |
| 391 | + } |
| 392 | + catch(KeyNotFoundException) |
| 393 | + { |
| 394 | + encryptionStatusParsed = new Dictionary<string, string>() |
| 395 | + { |
| 396 | + { AzureDiskEncryptionExtensionConstants.encryptionResultOsKey, EncryptionStatus.Unknown.ToString() }, |
| 397 | + { AzureDiskEncryptionExtensionConstants.encryptionResultDataKey, EncryptionStatus.Unknown.ToString() } |
| 398 | + }; |
| 399 | + } |
| 400 | + |
| 401 | + try |
| 402 | + { |
| 403 | + progressMessage = GetExtensionStatusMessage(osType); |
| 404 | + } |
| 405 | + catch(KeyNotFoundException) |
| 406 | + { |
| 407 | + progressMessage = string.Format(CultureInfo.CurrentUICulture, "Extension status not available on the VM"); |
| 408 | + } |
| 409 | + |
| 410 | + encryptionStatus = new AzureDiskEncryptionStatusContext |
| 411 | + { |
| 412 | + OsVolumeEncrypted = (EncryptionStatus)Enum.Parse(typeof(EncryptionStatus), encryptionStatusParsed[AzureDiskEncryptionExtensionConstants.encryptionResultOsKey]), |
| 413 | + DataVolumesEncrypted = (EncryptionStatus)Enum.Parse(typeof(EncryptionStatus), encryptionStatusParsed[AzureDiskEncryptionExtensionConstants.encryptionResultDataKey]), |
| 414 | + OsVolumeEncryptionSettings = osVolumeEncryptionSettings, |
| 415 | + ProgressMessage = progressMessage |
223 | 416 | };
|
224 | 417 | WriteObject(encryptionStatus);
|
225 | 418 | break;
|
|
0 commit comments