diff --git a/pkg/deploy/assets/env-development.json b/pkg/deploy/assets/env-development.json index 1da1cb9fb5b..f7f11814013 100644 --- a/pkg/deploy/assets/env-development.json +++ b/pkg/deploy/assets/env-development.json @@ -296,7 +296,7 @@ "autoUpgradeMinorVersion": true, "settings": {}, "protectedSettings": { - "script": "[base64(concat(base64ToString('c2V0IC1leAoK'),'PROXYIMAGE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('proxyImage')),''')\n','PROXYIMAGEAUTH=$(base64 -d \u003c\u003c\u003c''',base64(parameters('proxyImageAuth')),''')\n','PROXYCERT=''',parameters('proxyCert'),'''\n','PROXYCLIENTCERT=''',parameters('proxyClientCert'),'''\n','PROXYKEY=''',parameters('proxyKey'),'''\n','\n',base64ToString('#!/bin/bash

set -o errexit \
    -o nounset

if [ "${DEBUG:-false}" == true ]; then
    set -x
fi

main() {
    parse_run_options "$@"

    configure_and_install_dnf_pkgs_repos

    configure_firewalld_rules
    pull_container_images
    configure_system_services
    reboot_vm
}

usage() {
    local -n options="$1"
    log "$(basename "$0") [$options]
        -p Configure rpm repositories, import required rpm keys, update & install packages with dnf
        -f Configure firewalld default zone rules
        -u Configure systemd unit files for ARO RP
        -i Pull container images

        Note: steps will be executed in the order that flags are provided
    "
}

# parse_run_options takes all arguements passed to main and parses them
# allowing individual step(s) to be ran, rather than all steps
#
# This is useful for local testing, or possibly modifying the bootstrap execution via environment variables in the deployment pipeline
parse_run_options() {
    # shellcheck disable=SC2206
    local -a options=(${1:-})
    if [ "${#options[@]}" -eq 0 ]; then
        log "Running all steps"
        return 0
    fi

    local OPTIND
	local -r allowed_options="pfui"
    while getopts ${allowed_options} options; do
        case "${options}" in
            p)
                log "Running step configure_and_install_dnf_pkgs_repos"
                configure_and_install_dnf_pkgs_repos
                ;;
            f)
                log "Running configure_firewalld_rules"
                configure_firewalld_rules
                ;;
            u)
                log "Running pull_container_images & configure_system_services"
                configure_system_services
                ;;
            i)
                log "Running pull_container_images"
                pull_container_images 
                ;;
            *)
                usage allowed_options
                abort "Unkown option provided"
                ;;
        esac
    done
    
    exit 0
}

# configure_and_install_dnf_pkgs_repos
configure_and_install_dnf_pkgs_repos() {
    log "starting"

    # transaction attempt retry time in seconds
    local -ri retry_wait_time=60
    configure_rhui_repo retry_wait_time

    local -ar exclude_pkgs=(
        "-x WALinuxAgent"
        "-x WALinuxAgent-udev"
    )

    dnf_update_pkgs exclude_pkgs retry_wait_time

    local -ra repo_rpm_pkgs=(
        https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm
    )

    local -ra install_pkgs=(
        podman
        podman-docker
    )

    dnf_install_pkgs repo_rpm_pkgs retry_wait_time
    dnf_install_pkgs install_pkgs retry_wait_time

	local -r cron_weekly_dnf_update_filename='/etc/cron.weekly/dnfupdate'
	local -r cron_weekly_dnf_update_file="#!/bin/bash
dnf update -y"

	write_file cron_weekly_dnf_update_filename cron_weekly_dnf_update_file true
	chmod +x "$cron_weekly_dnf_update_filename"
}

# configure_rhui_repo
configure_rhui_repo() {
    log "starting"

    local -ra cmd=(
        dnf
        update
        -y
        --disablerepo='*'
        --enablerepo='rhui-microsoft-azure*'
    )

    log "running RHUI package updates"
    retry cmd "$1"
}

# retry Adding retry logic to yum commands in order to avoid stalling out on resource locks
retry() {
    local -n cmd_retry="$1"
    local -n wait_time="$2"

    for attempt in {1..5}; do
        log "attempt #${attempt} - ${FUNCNAME[2]}"
        ${cmd_retry[@]} &

        wait $! && break
        if [[ ${attempt} -lt 5 ]]; then
            sleep "$wait_time"
        else
            abort "attempt #${attempt} - Failed to update packages"
        fi
    done
}

# dnf_update_pkgs
dnf_update_pkgs() {
    local -n excludes="$1"
    log "starting"

    local -ra cmd=(
        dnf
        -y
        ${excludes[@]}
        update
        --allowerasing
    )

    log "Updating all packages"
    retry cmd "$2"
}

# dnf_install_pkgs
dnf_install_pkgs() {
    local -n pkgs="$1"
    log "starting"

    local -ra cmd=(
        dnf
        -y
        install
        ${pkgs[@]}
    )

    log "Attempting to install packages: ${pkgs[*]}"
    retry cmd "$2"
}

# configure_logrotate clobbers /etc/logrotate.conf
configure_logrotate() {
    log "starting"

    local -r logrotate_conf_filename='/etc/logrotate.conf'
    local -r logrotate_conf_file='# see "man logrotate" for details
# rotate log files weekly
weekly

# keep 2 weeks worth of backlogs
rotate 2

# create new (empty) log files after rotating old ones
create

# use date as a suffix of the rotated file
dateext

# uncomment this if you want your log files compressed
compress

# RPM packages drop log rotation information into this directory
include /etc/logrotate.d

# no packages own wtmp and btmp -- we will rotate them here
/var/log/wtmp {
    monthly
    create 0664 root utmp
        minsize 1M
    rotate 1
}

/var/log/btmp {
    missingok
    monthly
    create 0600 root utmp
    rotate 1
}'

    write_file logrotate_conf_filename logrotate_conf_file true
}

# configure_firewalld_rules
configure_firewalld_rules() {
    log "starting"

    # https://access.redhat.com/security/cve/cve-2020-13401
    local -r prefix="/etc/sysctl.d"
    local -r disable_accept_ra_conf_filename="$prefix/02-disable-accept-ra.conf"
    local -r disable_accept_ra_conf_file="net.ipv6.conf.all.accept_ra=0"

    write_file disable_accept_ra_conf_filename disable_accept_ra_conf_file true

    local -r disable_core_filename="$prefix/01-disable-core.conf"
    local -r disable_core_file="kernel.core_pattern = |/bin/true
    "
    write_file disable_core_filename disable_core_file true

    sysctl --system

    local -ra enable_ports=(
        "443/tcp"
    )

    log "Enabling ports ${enable_ports[*]} on default firewalld zone"
    # shellcheck disable=SC2068
    for port in ${enable_ports[@]}; do
        log "Enabling port $port now"
        firewall-cmd "--add-port=$port"
    done

    firewall-cmd --runtime-to-permanent
}

# pull_container_images
pull_container_images() {
    log "starting"

    # The managed identity that the VM runs as only has a single roleassignment.
    # This role assignment is ACRPull which is not necessarily present in the
    # subscription we're deploying into.  If the identity does not have any
    # role assignments scoped on the subscription we're deploying into, it will
    # not show on az login -i, which is why the below line is commented.
    # az account set -s "$SUBSCRIPTIONID"
    az login -i --allow-no-subscriptions

    # Suppress emulation output for podman instead of docker for az acr compatability
    mkdir -p /etc/containers/
    mkdir -p /root/.docker
    touch /etc/containers/nodocker

	# This name is used in the case that az acr login searches for this in it's environment
    local -r REGISTRY_AUTH_FILE="/root/.docker/config.json"
	local -r registry_config_file="{
	"auths": {
		\"${PROXYIMAGE%%/*}\": {
			\"auth\": \"$PROXYIMAGEAUTH\"
		}
	}"

	write_file REGISTRY_AUTH_FILE registry_config_file true

    log "logging into prod acr"

    az acr login --name "$(sed -e 's|.*/||' <<<"$ACRRESOURCEID")"

    docker pull "$PROXYIMAGE"

    az logout
}

# configure_system_services creates, configures, and enables the following systemd services and timers
# services
#	proxy
configure_system_services() {
	configure_service_proxy
}

# enable_aro_services enables all services required for aro rp
enable_aro_services() {
    log "starting"

    local -ra aro_services=(
		proxy
    )
    log "enabling aro services ${aro_services[*]}"
    # shellcheck disable=SC2068
    for service in ${aro_services[@]}; do
        log "Enabling $service now"
        systemctl enable "$service.service"
    done
}

# configure_certs
configure_certs() {
    log "starting"

	base64 -d <<<"$PROXYCERT" >/etc/proxy/proxy.crt
	base64 -d <<<"$PROXYKEY" >/etc/proxy/proxy.key
	base64 -d <<<"$PROXYCLIENTCERT" >/etc/proxy/proxy-client.crt
	chown -R 1000:1000 /etc/proxy
	chmod 0600 /etc/proxy/proxy.key
}

configure_service_proxy() {
	local -r sysconfig_proxy_filename='/etc/sysconfig/proxy'
	local -r sysconfig_proxy_file="PROXY_IMAGE='$PROXYIMAGE'"

	write_file sysconfig_proxy_filename sysconfig_proxy_file true

	local -r proxy_service_filename='/etc/systemd/system/proxy.service'
	local -r proxy_service_file="[Unit]
After=network-online.target
Wants=network-online.target

[Service]
EnvironmentFile=/etc/sysconfig/proxy
ExecStartPre=-/usr/bin/docker rm -f %n
ExecStart=/usr/bin/docker run --rm --name %n -p 443:8443 -v /etc/proxy:/secrets $PROXY_IMAGE
ExecStop=/usr/bin/docker stop %n
Restart=always
RestartSec=1
StartLimitInterval=0

[Install]
WantedBy=multi-user.target"

	local -r cron_weekly_pull_image_filename='/etc/cron.weekly/pull-image'
	local -r cron_weekly_pull_image_file="#!/bin/bash
docker pull $PROXYIMAGE
systemctl restart proxy.service"
	
	write_file cron_weekly_pull_image_filename cron_weekly_pull_image_file true
	chmod +x "$cron_weekly_pull_image_filename"

	local -r cron_daily_restart_proxy_filename='/etc/cron.daily/restart-proxy'
	local -r cron_daily_restart_proxy_file="#!/bin/bash
systemctl restart proxy.service"
	
	write_file cron_daily_restart_proxy_filename cron_daily_restart_proxy_file
	chmod +x "$cron_daily_restart_proxy_filename"
}

# write_file
# Args
# 1) filename - string
# 2) file_contents - string
# 3) clobber - boolean; optional - defaults to false
write_file() {
    local -n filename="$1"
    local -n file_contents="$2"
    local -r clobber="${3:-false}"

    if $clobber; then
        log "Overwriting file $filename"
        echo "$file_contents" > "$filename"
    else
        log "Appending to $filename"
        echo "$file_contents" >> "$filename"
    fi
}

# reboot_vm restores all selinux file contexts, waits 30 seconds then reboots
reboot_vm() {
    log "starting"

    configure_selinux "true"
    (sleep 30 && log "rebooting vm now"; reboot) &
}

# log is a wrapper for echo that includes the function name
log() {
    local -r msg="${1:-"log message is empty"}"
    local -r stack_level="${2:-1}"
    echo "${FUNCNAME[${stack_level}]}: ${msg}"
}

# abort is a wrapper for log that exits with an error code
abort() {
    local -ri origin_stacklevel=2
    log "${1}" "$origin_stacklevel"
    log "Exiting"
    exit 1
}

export AZURE_CLOUD_NAME="${AZURECLOUDNAME:?"Failed to carry over variables"}"

main "$@"
')))]" + "script": "[base64(concat(base64ToString('c2V0IC1leAoK'),'PROXYIMAGE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('proxyImage')),''')\n','PROXYIMAGEAUTH=$(base64 -d \u003c\u003c\u003c''',base64(parameters('proxyImageAuth')),''')\n','PROXYCERT=''',parameters('proxyCert'),'''\n','PROXYCLIENTCERT=''',parameters('proxyClientCert'),'''\n','PROXYKEY=''',parameters('proxyKey'),'''\n','\n',base64ToString('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')))]" }, "provisionAfterExtensions": [ "Microsoft.Azure.Monitor.AzureMonitorLinuxAgent", diff --git a/pkg/deploy/assets/gateway-production.json b/pkg/deploy/assets/gateway-production.json index ecbbe148c12..cb2264e7d80 100644 --- a/pkg/deploy/assets/gateway-production.json +++ b/pkg/deploy/assets/gateway-production.json @@ -309,7 +309,7 @@ "autoUpgradeMinorVersion": true, "settings": {}, "protectedSettings": { - "script": "[base64(concat(base64ToString('c2V0IC1leAoK'),'ACRRESOURCEID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('acrResourceId')),''')\n','AZURECLOUDNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('azureCloudName')),''')\n','AZURESECPACKQUALYSURL=$(base64 -d \u003c\u003c\u003c''',base64(parameters('azureSecPackQualysUrl')),''')\n','AZURESECPACKVSATENANTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('azureSecPackVSATenantId')),''')\n','DATABASEACCOUNTNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('databaseAccountName')),''')\n','DBTOKENCLIENTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('dbtokenClientId')),''')\n','DBTOKENURL=$(base64 -d \u003c\u003c\u003c''',base64(parameters('dbtokenUrl')),''')\n','MDMFRONTENDURL=$(base64 -d \u003c\u003c\u003c''',base64(parameters('mdmFrontendUrl')),''')\n','MDSDENVIRONMENT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('mdsdEnvironment')),''')\n','FLUENTBITIMAGE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('fluentbitImage')),''')\n','GATEWAYMDSDCONFIGVERSION=$(base64 -d \u003c\u003c\u003c''',base64(parameters('gatewayMdsdConfigVersion')),''')\n','GATEWAYDOMAINS=$(base64 -d \u003c\u003c\u003c''',base64(parameters('gatewayDomains')),''')\n','GATEWAYFEATURES=$(base64 -d \u003c\u003c\u003c''',base64(parameters('gatewayFeatures')),''')\n','KEYVAULTDNSSUFFIX=$(base64 -d \u003c\u003c\u003c''',base64(parameters('keyvaultDNSSuffix')),''')\n','KEYVAULTPREFIX=$(base64 -d \u003c\u003c\u003c''',base64(parameters('keyvaultPrefix')),''')\n','RPIMAGE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpImage')),''')\n','RPMDMACCOUNT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpMdmAccount')),''')\n','RPMDSDACCOUNT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpMdsdAccount')),''')\n','RPMDSDNAMESPACE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpMdsdNamespace')),''')\n','MDMIMAGE=''/genevamdm:2.2024.328.1744-c5fb79-20240328t1935''\n','LOCATION=$(base64 -d \u003c\u003c\u003c''',base64(resourceGroup().location),''')\n','SUBSCRIPTIONID=$(base64 -d \u003c\u003c\u003c''',base64(subscription().subscriptionId),''')\n','RESOURCEGROUPNAME=$(base64 -d \u003c\u003c\u003c''',base64(resourceGroup().name),''')\n','\n',base64ToString('#!/bin/bash

set -o errexit \
    -o nounset

if [ "${DEBUG:-false}" == true ]; then
    set -x
fi

main() {
    local -r gateway_logdir='/var/log/aro-gateway'
    parse_run_options "$@" gateway_logdir


    configure_sshd
    configure_and_install_dnf_pkgs_repos
    configure_disk_partitions
    configure_logrotate gateway_logdir
    configure_selinux

    mkdir -p /var/log/journal
    mkdir -p /var/lib/waagent/Microsoft.Azure.KeyVault.Store

    configure_firewalld_rules
    pull_container_images
    configure_system_services gateway_logdir
    reboot_vm
}

usage() {
    local -n options="$1"
    log "$(basename "$0") [$options]
        -d Configure Disk Partitions
        -p Configure rpm repositories, import required rpm keys, update & install packages with dnf
        -l Configure logrotate.conf
        -s Make selinux modifications required for ARO RP
        -r Configure sshd - Allow password authenticaiton
        -f Configure firewalld default zone rules
        -u Configure systemd unit files for ARO RP
        -i Pull container images

        Note: steps will be executed in the order that flags are provided
    "
}

# parse_run_options takes all arguements passed to main and parses them
# allowing individual step(s) to be ran, rather than all steps
#
# This is useful for local testing, or possibly modifying the bootstrap execution via environment variables in the deployment pipeline
parse_run_options() {
    # shellcheck disable=SC2206
    local -a options=(${1:-})
    if [ "${#options[@]}" -eq 0 ]; then
        log "Running all steps"
        return 0
    fi

    local OPTIND
    local -r allowed_options="dplsrfui"
    while getopts ${allowed_options} options; do
        case "${options}" in
            d)
                log "Running step configure_disk_partitions"
                configure_disk_partitions
                ;;
            p)
                log "Running step configure_and_install_dnf_pkgs_repos"
                configure_and_install_dnf_pkgs_repos
                ;;
            l)
                log "Running configure_logrotate"
                configure_logrotate "$2"
                ;;
            s)
                log "Running configure_selinux"
                configure_selinux
                ;;
            r)
                log "Running configure_sshd"
                configure_sshd
                ;;
            f)
                log "Running configure_firewalld_rules"
                configure_firewalld_rules
                ;;
            u)
                log "Running pull_container_images & configure_system_services"
                configure_system_services "$2"
                ;;
            i)
                log "Running pull_container_images"
                pull_container_images 
                ;;
            *)
                usage allowed_options
                abort "Unkown option provided"
                ;;
        esac
    done
    
    exit 0
}

# We need to configure PasswordAuthentication to yes in order for the VMSS Access JIT to work
configure_sshd() {
    log "starting"
    log "setting ssh password authentication"
    sed -i 's/PasswordAuthentication no/PasswordAuthentication yes/g' /etc/ssh/sshd_config

    systemctl reload sshd.service
    systemctl is-active --quiet sshd || abort "sshd failed to reload"
}

# configure_and_install_dnf_pkgs_repos
configure_and_install_dnf_pkgs_repos() {
    log "starting"

    # transaction attempt retry time in seconds
    local -ri retry_wait_time=60
    configure_rhui_repo retry_wait_time
    create_azure_rpm_repos retry_wait_time

    local -ar exclude_pkgs=(
        "-x WALinuxAgent"
        "-x WALinuxAgent-udev"
    )

    dnf_update_pkgs exclude_pkgs retry_wait_time

    local -ra rpm_keys=(
        https://dl.fedoraproject.org/pub/epel/RPM-GPG-KEY-EPEL-8
        https://packages.microsoft.com/keys/microsoft.asc
    )

    rpm_import_keys rpm_keys retry_wait_time

    local -ra repo_rpm_pkgs=(
        https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm
    )

    local -ra install_pkgs=(
        clamav
        azsec-clamav
        azsec-monitor
        azure-cli
        azure-mdsd
        azure-security
        podman
        podman-docker
        openssl-perl
        # hack - we are installing python3 on hosts due to an issue with Azure Linux Extensions https://github.com/Azure/azure-linux-extensions/pull/1505
        python3
    )

    dnf_install_pkgs repo_rpm_pkgs retry_wait_time
    dnf_install_pkgs install_pkgs retry_wait_time
}

# configure_rhui_repo
configure_rhui_repo() {
    log "starting"

    local -ra cmd=(
        dnf
        update
        -y
        --disablerepo='*'
        --enablerepo='rhui-microsoft-azure*'
    )

    log "running RHUI package updates"
    retry cmd "$1"
}

# retry Adding retry logic to yum commands in order to avoid stalling out on resource locks
retry() {
    local -n cmd_retry="$1"
    local -n wait_time="$2"

    for attempt in {1..5}; do
        log "attempt #${attempt} - ${FUNCNAME[2]}"
        ${cmd_retry[@]} &

        wait $! && break
        if [[ ${attempt} -lt 5 ]]; then
            sleep "$wait_time"
        else
            abort "attempt #${attempt} - Failed to update packages"
        fi
    done
}

# dnf_update_pkgs
dnf_update_pkgs() {
    local -n excludes="$1"
    log "starting"

    local -ra cmd=(
        dnf
        -y
        ${excludes[@]}
        update
        --allowerasing
    )

    log "Updating all packages"
    retry cmd "$2"
}

# dnf_install_pkgs
dnf_install_pkgs() {
    local -n pkgs="$1"
    log "starting"

    local -ra cmd=(
        dnf
        -y
        install
        ${pkgs[@]}
    )

    log "Attempting to install packages: ${pkgs[*]}"
    retry cmd "$2"
}

# rpm_import_keys
rpm_import_keys() {
    local -n keys="$1"
    log "starting"


    # shellcheck disable=SC2068
    for key in ${keys[@]}; do
        if [ ${#keys[@]} -eq 0 ]; then
            break
        fi
            local -a cmd=(
                rpm
                --import
                -v
                "$key"
            )

            log "attempt #$attempt - importing rpm repository key $key"
            retry cmd "$2" && unset key
    done
}

# configure_disk_partitions
configure_disk_partitions() {
    log "starting"
    log "extending partition table"

    # Linux block devices are inconsistently named
    # it's difficult to tie the lvm pv to the physical disk using /dev/disk files, which is why lvs is used here
    physical_disk="$(lvs -o devices -a | head -n2 | tail -n1 | cut -d ' ' -f 3 | cut -d \( -f 1 | tr -d '[:digit:]')"
    growpart "$physical_disk" 2

    log "extending filesystems"
    log "extending root lvm"
    lvextend -l +20%FREE /dev/rootvg/rootlv
    log "growing root filesystem"
    xfs_growfs /

    log "extending var lvm"
    lvextend -l +100%FREE /dev/rootvg/varlv
    log "growing var filesystem"
    xfs_growfs /var
}

# configure_logrotate clobbers /etc/logrotate.conf
configure_logrotate() {
    local -n log_dir="$1"
    log "starting"

    local -r logrotate_conf_filename='/etc/logrotate.conf'
    local -r logrotate_conf_file="# see 'man logrotate' for details
# rotate log files weekly
weekly

# keep 2 weeks worth of backlogs
rotate 2

# create new (empty) log files after rotating old ones
create

# use date as a suffix of the rotated file
dateext

# uncomment this if you want your log files compressed
compress

# RPM packages drop log rotation information into this directory
include /etc/logrotate.d

# no packages own wtmp and btmp -- we will rotate them here
/var/log/wtmp {
    monthly
    create 0664 root utmp
        minsize 1M
    rotate 1
}

/var/log/btmp {
    missingok
    monthly
    create 0600 root utmp
    rotate 1
}

# Maximum log directory size is 100G with this configuration
# Setting limit to 100G to allow space for other logging services
# copytruncate is a critical option used to prevent logs from being shipped twice
${log_dir} {
    size 20G
    rotate 5
    create 0600 root root
    copytruncate
    noolddir
    compress
}"

    write_file logrotate_conf_filename logrotate_conf_file true
}

# create_azure_rpm_repos creates /etc/yum.repos.d/azure.repo repository file
create_azure_rpm_repos() {
    log "starting"

    local -r azure_repo_filename='/etc/yum.repos.d/azure.repo'
    local -r azure_repo_file='[azure-cli]
name=azure-cli
baseurl=https://packages.microsoft.com/yumrepos/azure-cli
enabled=yes
gpgcheck=yes

[azurecore]
name=azurecore
baseurl=https://packages.microsoft.com/yumrepos/azurecore
enabled=yes
gpgcheck=no'

    write_file azure_repo_filename azure_repo_file true
}

# configure_selinux
configure_selinux() {
    log "starting"

    local -r relabel="${1:-false}"

    already_defined_ignore_error="File context for /var/log/journal(/.*)? already defined"
    semanage fcontext -a -t var_log_t "/var/log/journal(/.*)?" || log "$already_defined_ignore_error"
    chcon -R system_u:object_r:var_log_t:s0 /var/opt/microsoft/linuxmonagent

    if "$relabel"; then
        restorecon -RF /var/log/* || log "$already_defined_ignore_error"
    fi
}

# configure_firewalld_rules
configure_firewalld_rules() {
    log "starting"

    # https://access.redhat.com/security/cve/cve-2020-13401
    local -r prefix="/etc/sysctl.d"
    local -r disable_accept_ra_conf_filename="$prefix/02-disable-accept-ra.conf"
    local -r disable_accept_ra_conf_file="net.ipv6.conf.all.accept_ra=0"

    write_file disable_accept_ra_conf_filename disable_accept_ra_conf_file true

    local -r disable_core_filename="$prefix/01-disable-core.conf"
    local -r disable_core_file="kernel.core_pattern = |/bin/true
    "
    write_file disable_core_filename disable_core_file true

    sysctl --system

    local -ra enable_ports=(
        "80/tcp"
        "8081/tcp"
        "443/tcp"
    )

    log "Enabling ports ${enable_ports[*]} on default firewalld zone"
    # shellcheck disable=SC2068
    for port in ${enable_ports[@]}; do
        log "Enabling port $port now"
        firewall-cmd "--add-port=$port"
    done

    firewall-cmd --runtime-to-permanent
}

# pull_container_images
pull_container_images() {
    log "starting"

    # The managed identity that the VM runs as only has a single roleassignment.
    # This role assignment is ACRPull which is not necessarily present in the
    # subscription we're deploying into.  If the identity does not have any
    # role assignments scoped on the subscription we're deploying into, it will
    # not show on az login -i, which is why the below line is commented.
    # az account set -s "$SUBSCRIPTIONID"
    az login -i --allow-no-subscriptions

    # Suppress emulation output for podman instead of docker for az acr compatability
    mkdir -p /etc/containers/
    mkdir -p /root/.docker
    touch /etc/containers/nodocker

	# This name is used in the case that az acr login searches for this in it's environment
    local -r REGISTRY_AUTH_FILE="/root/.docker/config.json"
    
    log "logging into prod acr"
    az acr login --name "$(sed -e 's|.*/||' <<<"$ACRRESOURCEID")"

    MDMIMAGE="${RPIMAGE%%/*}/${MDMIMAGE##*/}"
    docker pull "$MDMIMAGE"
    docker pull "$RPIMAGE"
    docker pull "$FLUENTBITIMAGE"

    az logout
}

# configure_system_services creates, configures, and enables the following systemd services and timers
# services
#   fluentbit
#   mdm
#   mdsd
#   arp-rp
#   aro-dbtoken
#   aro-monitor
#   aro-portal
configure_system_services() {
    configure_service_fluentbit
    configure_service_mdm
    configure_timers_mdm_mdsd
    configure_service_aro_gateway "$1"
    configure_service_mdsd
}

# enable_aro_services enables all services required for aro rp
enable_aro_services() {
    log "starting"

    local -ra aro_services=(
      aro-gateway
      auoms
      azsecd
      azsecmond
      mdsd
      mdm
      chronyd
      fluentbit
    )
    log "enabling gateway services ${aro_services[*]}"
    # shellcheck disable=SC2068
    for service in ${aro_services[@]}; do
        log "Enabling $service now"
        systemctl enable "$service.service"
    done
}

# configure_service_fluentbit
configure_service_fluentbit() {
    log "starting"
    log "configuring fluentbit service"

    mkdir -p /etc/fluentbit/
    mkdir -p /var/lib/fluent

    local -r fluentbit_conf_filename='/etc/fluentbit/fluentbit.conf'
    local -r fluentbit_conf_file="[INPUT]
Name systemd
Tag journald
Systemd_Filter _COMM=aro
DB /var/lib/fluent/journaldb

[FILTER]
	Name modify
	Match journald
	Remove_wildcard _
	Remove TIMESTAMP

[OUTPUT]
	Name forward
	Match *
	Port 29230"

    write_file fluentbit_conf_filename fluentbit_conf_file true

    local -r sysconfig_fluentbit_filename='/etc/sysconfig/fluentbit'
    local -r sysconfig_fluentbit_file="FLUENTBITIMAGE=$FLUENTBITIMAGE"

    write_file sysconfig_fluentbit_filename sysconfig_fluentbit_file true

    local -r fluentbit_service_filename='/etc/systemd/system/fluentbit.service'

    local -r fluentbit_service_file="[Unit]
After=network-online.target
Wants=network-online.target
StartLimitIntervalSec=0

[Service]
RestartSec=1s
EnvironmentFile=/etc/sysconfig/fluentbit
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStart=/usr/bin/docker run \
  --security-opt label=disable \
  --entrypoint /opt/td-agent-bit/bin/td-agent-bit \
  --net=host \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -v /etc/fluentbit/fluentbit.conf:/etc/fluentbit/fluentbit.conf \
  -v /var/lib/fluent:/var/lib/fluent:z \
  -v /var/log/journal:/var/log/journal:ro \
  -v /etc/machine-id:/etc/machine-id:ro \
  $FLUENTBITIMAGE \
  -c /etc/fluentbit/fluentbit.conf

ExecStop=/usr/bin/docker stop %N
Restart=always
RestartSec=5
StartLimitInterval=0

[Install]
WantedBy=multi-user.target"

    write_file fluentbit_conf_filename fluentbit_conf_file true
}

# configure_certs
configure_certs() {
    log "starting"

    mkdir /etc/aro-rp
    base64 -d <<<"$ADMINAPICABUNDLE" >/etc/aro-rp/admin-ca-bundle.pem
    if [[ -n "$ARMAPICABUNDLE" ]]; then
    base64 -d <<<"$ARMAPICABUNDLE" >/etc/aro-rp/arm-ca-bundle.pem
    fi
    chown -R 1000:1000 /etc/aro-rp

    # setting MONITORING_GCS_AUTH_ID_TYPE=AuthKeyVault seems to have caused mdsd not
    # to honour SSL_CERT_FILE any more, heaven only knows why.
    mkdir -p /usr/lib/ssl/certs
    csplit -f /usr/lib/ssl/certs/cert- -b %03d.pem /etc/pki/tls/certs/ca-bundle.crt /^$/1 "{*}" >/dev/null
    c_rehash /usr/lib/ssl/certs

# we leave clientId blank as long as only 1 managed identity assigned to vmss
# if we have more than 1, we will need to populate with clientId used for off-node scanning
    local -r nodescan_agent_filename="/etc/default/vsa-nodescan-agent.config"
    local -r nodescan_agent_file="{
    \"Nice\": 19,
    \"Timeout\": 10800,
    \"ClientId\": \"\",
    \"TenantId\": $AZURESECPACKVSATENANTID,
    \"QualysStoreBaseUrl\": $AZURESECPACKQUALYSURL,
    \"ProcessTimeout\": 300,
    \"CommandDelay\": 0
  }"

    write_file nodescan_agent_filename nodescan_agent_file true
}

# configure_service_mdm
configure_service_mdm() {
    log "starting"
    log "configuring mdm service"

    local -r sysconfig_mdm_filename="/etc/sysconfig/mdm"
    local -r sysconfig_mdm_file="MDMFRONTENDURL='$MDMFRONTENDURL'
MDMIMAGE='$MDMIMAGE'
MDMSOURCEENVIRONMENT='$LOCATION'
MDMSOURCEROLE=gateway
MDMSOURCEROLEINSTANCE=\"$(hostname)\""

    write_file sysconfig_mdm_filename sysconfig_mdm_file true

    mkdir -p /var/etw
    local -r mdm_service_filename="/etc/systemd/system/mdm.service"
    local -r mdm_service_file="[Unit]
After=network-online.target
Wants=network-online.target

[Service]
EnvironmentFile=/etc/sysconfig/mdm
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStart=/usr/bin/docker run \
  --entrypoint /usr/sbin/MetricsExtension \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -m 2g \
  -v /etc/mdm.pem:/etc/mdm.pem \
  -v /var/etw:/var/etw:z \
  $MDMIMAGE \
  -CertFile /etc/mdm.pem \
  -FrontEndUrl $MDMFRONTENDURL \
  -Logger Console \
  -LogLevel Warning \
  -PrivateKeyFile /etc/mdm.pem \
  -SourceEnvironment $MDMSOURCEENVIRONMENT \
  -SourceRole $MDMSOURCEROLE \
  -SourceRoleInstance $MDMSOURCEROLEINSTANCE
ExecStop=/usr/bin/docker stop %N
Restart=always
RestartSec=1
StartLimitInterval=0

[Install]
WantedBy=multi-user.target"

    write_file mdm_service_filename mdm_service_file true
}

# configure_timers_mdm_mdsd
configure_timers_mdm_mdsd() {
    log "starting"

    for var in "mdsd" "mdm"; do
        local download_creds_service_filename="/etc/systemd/system/download-$var-credentials.service"
        local download_creds_service_file="[Unit]
Description=Periodic $var credentials refresh

[Service]
Type=oneshot
ExecStart=/usr/local/bin/download-credentials.sh $var"

        write_file download_creds_service_filename download_creds_service_file true

        local download_creds_timer_filename="/etc/systemd/system/download-$var-credentials.timer"
        local download_creds_timer_file="[Unit]
Description=Periodic $var credentials refresh
After=network-online.target
Wants=network-online.target

[Timer]
OnBootSec=0min
OnCalendar=0/12:00:00
AccuracySec=5s

[Install]
WantedBy=timers.target"

        write_file download_creds_timer_filename download_creds_timer_file true
    done

    local -r download_creds_script_filename="/usr/local/bin/download-credentials.sh"
    local -r download_creds_script_file="#!/bin/bash
set -eu

COMPONENT=\$1
echo \"Download \$COMPONENT credentials\"

TEMP_DIR=\"\$(mktemp -d)\"
export AZURE_CONFIG_DIR=\"\$(mktemp -d)\"

echo \"Logging into Azure...\"
RETRIES=3
while [[ \$RETRIES -gt 0 ]]; do
    if az login -i --allow-no-subscriptions
    then
        echo \"az login successful\"
        break
    else
        echo \"az login failed. Retrying...\"
        let RETRIES-=1
        sleep 5
    fi
done

trap \"cleanup\" EXIT

cleanup() {
  az logout
  [[ \$TEMP_DIR =~ /tmp/.+ ]] && rm -rf \$TEMP_DIR
  [[ \$AZURE_CONFIG_DIR =~ /tmp/.+ ]] && rm -rf \$AZURE_CONFIG_DIR
}

if [[ \$COMPONENT = \"mdm\" ]]; then
  CURRENT_CERT_FILE=\"/etc/mdm.pem\"
elif [[ \$COMPONENT\ = \"mdsd\" ]]; then
  CURRENT_CERT_FILE=\"/var/lib/waagent/Microsoft.Azure.KeyVault.Store/mdsd.pem\"
else
  echo Invalid usage && exit 1
fi

SECRET_NAME=\"gwy-\${COMPONENT}\"
NEW_CERT_FILE=\"\$TEMP_DIR/\$COMPONENT.pem\"
for attempt in {1..5}; do
  az keyvault \
    secret \
    download \
    --file \"\$NEW_CERT_FILE\" \
    --id \"https://$KEYVAULTPREFIX-gwy.$KEYVAULTDNSSUFFIX/secrets/\$SECRET_NAME\" \
    && break
  if [[ \$attempt -lt 5 ]]; then sleep 10; else exit 1; fi
done

if [ -f \$NEW_CERT_FILE ]; then
  if [[ \$COMPONENT = \"mdsd\" ]]; then
    chown syslog:syslog \$NEW_CERT_FILE
  else
    sed -i -ne '1,/END CERTIFICATE/ p' \$NEW_CERT_FILE
  fi

  new_cert_sn=\"\$(openssl x509 -in \"\$NEW_CERT_FILE\" -noout -serial | awk -F= '{print \$2}')\"
  current_cert_sn=\"\$(openssl x509 -in \"\$CURRENT_CERT_FILE\" -noout -serial | awk -F= '{print \$2}')\"
  if [[ ! -z \$new_cert_sn ]] && [[ \$new_cert_sn != \"\$current_cert_sn\" ]]; then
    echo updating certificate for \$COMPONENT
    chmod 0600 \$NEW_CERT_FILE
    mv \$NEW_CERT_FILE \$CURRENT_CERT_FILE
  fi
else
  echo Failed to refresh certificate for \$COMPONENT && exit 1
fi"

    write_file download_creds_script_filename download_creds_script_file true

    chmod u+x /usr/local/bin/download-credentials.sh

    systemctl enable download-mdsd-credentials.timer
    systemctl enable download-mdm-credentials.timer

    /usr/local/bin/download-credentials.sh mdsd
    /usr/local/bin/download-credentials.sh mdm

    local -r MDSDCERTIFICATESAN="$(openssl x509 -in /var/lib/waagent/Microsoft.Azure.KeyVault.Store/mdsd.pem -noout -subject | sed -e 's/.*CN = //')"
    local -r watch_mdm_creds_service_filename="/etc/systemd/system/watch-mdm-credentials.service"
    local -r watch_mdm_creds_service_file="[Unit]
Description=Watch for changes in mdm.pem and restarts the mdm service

[Service]
Type=oneshot
ExecStart=/usr/bin/systemctl restart mdm.service

[Install]
WantedBy=multi-user.target"

    write_file watch_mdm_creds_service_filename watch_mdm_creds_service_file true

    local -r watch_mdm_creds_path_filename='/etc/systemd/system/watch-mdm-credentials.path'
    local -r watch_mdm_creds_path_file='[Path]
PathModified=/etc/mdm.pem

[Install]
WantedBy=multi-user.target'

    write_file watch_mdm_creds_path_filename watch_mdm_creds_path_file true

    local -r watch_mdm_creds='watch-mdm-credentials.path'
    systemctl enable "$watch_mdm_creds" || abort "failed to enable $watch_mdm_creds"
    systemctl start "$watch_mdm_creds" || abort "failed to start $watch_mdm_creds"
}

# configure_service_aro_rp
configure_service_aro_gateway() {
    local -n log_dir="$1"
    log "starting"

    local -r aro_gateway_conf_filename='/etc/sysconfig/aro-gateway'
    local -r aro_gateway_conf_file="ACR_RESOURCE_ID='$ACRRESOURCEID'
ADMIN_API_CLIENT_CERT_COMMON_NAME='$ADMINAPICLIENTCERTCOMMONNAME'
ARM_API_CLIENT_CERT_COMMON_NAME='$ARMAPICLIENTCERTCOMMONNAME'
AZURE_ARM_CLIENT_ID='$ARMCLIENTID'
AZURE_FP_CLIENT_ID='$FPCLIENTID'
AZURE_FP_SERVICE_PRINCIPAL_ID='$FPSERVICEPRINCIPALID'
BILLING_E2E_STORAGE_ACCOUNT_ID='$BILLINGE2ESTORAGEACCOUNTID'
CLUSTER_MDM_ACCOUNT='$CLUSTERMDMACCOUNT'
CLUSTER_MDM_NAMESPACE=RP
CLUSTER_MDSD_ACCOUNT='$CLUSTERMDSDACCOUNT'
CLUSTER_MDSD_CONFIG_VERSION='$CLUSTERMDSDCONFIGVERSION'
CLUSTER_MDSD_NAMESPACE='$CLUSTERMDSDNAMESPACE'
DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME'
DOMAIN_NAME='$LOCATION.$CLUSTERPARENTDOMAINNAME'
AZURE_DBTOKEN_CLIENT_ID='$DBTOKENCLIENTID'
DBTOKEN_URL='$DBTOKENURL'
MDM_ACCOUNT='$RPMDMACCOUNT'
MDM_NAMESPACE=Gateway
GATEWAY_DOMAINS='$GATEWAYDOMAINS'
GATEWAY_FEATURES='$GATEWAYFEATURES'
GATEWAY_RESOURCEGROUP='$GATEWAYRESOURCEGROUPNAME'
KEYVAULT_PREFIX='$KEYVAULTPREFIX'
MDM_ACCOUNT='$RPMDMACCOUNT'
MDM_NAMESPACE=RP
MDSD_ENVIRONMENT='$MDSDENVIRONMENT'
RP_FEATURES='$RPFEATURES'
RPIMAGE='$RPIMAGE'
ARO_INSTALL_VIA_HIVE='$CLUSTERSINSTALLVIAHIVE'
ARO_HIVE_DEFAULT_INSTALLER_PULLSPEC='$CLUSTERDEFAULTINSTALLERPULLSPEC'
ARO_ADOPT_BY_HIVE='$CLUSTERSADOPTBYHIVE'
USE_CHECKACCESS='$USECHECKACCESS'"

    write_file aro_gateway_conf_filename aro_gateway_conf_file true

    local -r aro_gateway_service_filename='/etc/systemd/system/aro-gateway.service'

    local -r aro_gateway_service_file="[Unit]
After=network-online.target
Wants=network-online.target

[Service]
EnvironmentFile=/etc/sysconfig/aro-gateway
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStartPre=/usr/bin/mkdir -p ${log_dir}
ExecStart=/usr/bin/docker run \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -e ACR_RESOURCE_ID \
  -e DATABASE_ACCOUNT_NAME \
  -e AZURE_DBTOKEN_CLIENT_ID \
  -e DBTOKEN_URL \
  -e GATEWAY_DOMAINS \
  -e GATEWAY_FEATURES \
  -e MDM_ACCOUNT \
  -e MDM_NAMESPACE \
  -m 2g \
  -p 80:8080 \
  -p 8081:8081 \
  -p 443:8443 \
  -v /run/systemd/journal:/run/systemd/journal \
  -v /var/etw:/var/etw:z \
  -v ${log_dir}:/ctr.log:z \
  \$RPIMAGE \
  gateway
ExecStop=/usr/bin/docker stop -t 3600 %N
TimeoutStopSec=3600
Restart=always
RestartSec=1
StartLimitInterval=0

[Install]
WantedBy=multi-user.target
    "

    write_file aro_gateway_service_filename aro_gateway_service_file true
}

# configure_service_aro_dbtoken
configure_service_aro_dbtoken() {
    log "starting"

    local -r aro_dbtoken_service_conf_filename='/etc/sysconfig/aro-dbtoken'
    local -r aro_dbtoken_service_conf_file="ACR_RESOURCE_ID='$ACRRESOURCEID'
DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME'
AZURE_DBTOKEN_CLIENT_ID='$DBTOKENCLIENTID'
DBTOKEN_URL='$DBTOKENURL'
MDM_ACCOUNT='$RPMDMACCOUNT'
MDM_NAMESPACE=Gateway
GATEWAY_DOMAINS='$GATEWAYDOMAINS'
GATEWAY_FEATURES='$GATEWAYFEATURES'
RPIMAGE='$RPIMAGE'"

    write_file aro_dbtoken_service_conf_filename aro_dbtoken_service_conf_file true

    local -r aro_dbtoken_service_filename='/etc/systemd/system/aro-dbtoken.service'
    local -r aro_dbtoken_service_file="[Unit]
After=network-online.target
Wants=network-online.target

[Service]
EnvironmentFile=/etc/sysconfig/aro-gateway
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStartPre=/usr/bin/mkdir -p ${gateway_logdir}
ExecStart=/usr/bin/docker run \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -e ACR_RESOURCE_ID \
  -e DATABASE_ACCOUNT_NAME \
  -e AZURE_DBTOKEN_CLIENT_ID \
  -e DBTOKEN_URL \
  -e GATEWAY_DOMAINS \
  -e GATEWAY_FEATURES \
  -e MDM_ACCOUNT \
  -e MDM_NAMESPACE \
  -m 2g \
  -p 80:8080 \
  -p 8081:8081 \
  -p 443:8443 \
  -v /run/systemd/journal:/run/systemd/journal \
  -v /var/etw:/var/etw:z \
  -v ${gateway_logdir}:/ctr.log:z \
  \$RPIMAGE \
  gateway
ExecStop=/usr/bin/docker stop -t 3600 %N
TimeoutStopSec=3600
Restart=always
RestartSec=1
StartLimitInterval=0

[Install]
WantedBy=multi-user.target"

    write_file aro_dbtoken_service_filename aro_dbtoken_service_file true
}

# configure_service_mdsd
configure_service_mdsd() {
    log "starting"

    local -r mdsd_service_dir="/etc/systemd/system/mdsd.service.d"
    mkdir "$mdsd_service_dir"

    local -r mdsd_override_conf_filename="$mdsd_service_dir/override.conf"
    local -r mdsd_override_conf_file="[Unit]
After=network-online.target"

    write_file mdsd_override_conf_filename mdsd_override_conf_file true

    local -r default_mdsd_filename="/etc/default/mdsd"
    local -r default_mdsd_file="MDSD_ROLE_PREFIX=/var/run/mdsd/default
MDSD_OPTIONS=\"-A -d -r \$MDSD_ROLE_PREFIX\"

export MONITORING_GCS_ENVIRONMENT='$MDSDENVIRONMENT'
export MONITORING_GCS_ACCOUNT='$RPMDSDACCOUNT'
export MONITORING_GCS_REGION='$LOCATION'
export MONITORING_GCS_AUTH_ID_TYPE=AuthKeyVault
export MONITORING_GCS_AUTH_ID='$MDSDCERTIFICATESAN'
export MONITORING_GCS_NAMESPACE='$RPMDSDNAMESPACE'
export MONITORING_CONFIG_VERSION='$GATEWAYMDSDCONFIGVERSION'
export MONITORING_USE_GENEVA_CONFIG_SERVICE=true

export MONITORING_TENANT='$LOCATION'
export MONITORING_ROLE=gateway
export MONITORING_ROLE_INSTANCE=\"$(hostname)\"

export MDSD_MSGPACK_SORT_COLUMNS=1\""

    write_file default_mdsd_filename default_mdsd_file true

}

# run_azsecd_config_scan
run_azsecd_config_scan() {
    log "starting"

    local -ar configs=(
        "baseline"
        "clamav"
        "software"
    )

    log "Scanning configuration files ${configs[*]}"
    # shellcheck disable=SC2068
    for scan in ${configs[@]}; do
        log "Scanning config file $scan now"
        /usr/local/bin/azsecd config -s "$scan" -d P1D
    done
}

# write_file
# Args
# 1) filename - string
# 2) file_contents - string
# 3) clobber - boolean; optional - defaults to false
write_file() {
    local -n filename="$1"
    local -n file_contents="$2"
    local -r clobber="${3:-false}"

    if $clobber; then
        log "Overwriting file $filename"
        echo "$file_contents" > "$filename"
    else
        log "Appending to $filename"
        echo "$file_contents" >> "$filename"
    fi
}

# reboot_vm restores all selinux file contexts, waits 30 seconds then reboots
reboot_vm() {
    log "starting"

    configure_selinux "true"
    (sleep 30 && log "rebooting vm now"; reboot) &
}

# log is a wrapper for echo that includes the function name
log() {
    local -r msg="${1:-"log message is empty"}"
    local -r stack_level="${2:-1}"
    echo "${FUNCNAME[${stack_level}]}: ${msg}"
}

# abort is a wrapper for log that exits with an error code
abort() {
    local -ri origin_stacklevel=2
    log "${1}" "$origin_stacklevel"
    log "Exiting"
    exit 1
}

export AZURE_CLOUD_NAME="${AZURECLOUDNAME:?"Failed to carry over variables"}"

main "$@"
')))]" + "script": "[base64(concat(base64ToString('c2V0IC1leAoK'),'ACRRESOURCEID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('acrResourceId')),''')\n','AZURECLOUDNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('azureCloudName')),''')\n','AZURESECPACKQUALYSURL=$(base64 -d \u003c\u003c\u003c''',base64(parameters('azureSecPackQualysUrl')),''')\n','AZURESECPACKVSATENANTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('azureSecPackVSATenantId')),''')\n','DATABASEACCOUNTNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('databaseAccountName')),''')\n','DBTOKENCLIENTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('dbtokenClientId')),''')\n','DBTOKENURL=$(base64 -d \u003c\u003c\u003c''',base64(parameters('dbtokenUrl')),''')\n','MDMFRONTENDURL=$(base64 -d \u003c\u003c\u003c''',base64(parameters('mdmFrontendUrl')),''')\n','MDSDENVIRONMENT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('mdsdEnvironment')),''')\n','FLUENTBITIMAGE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('fluentbitImage')),''')\n','GATEWAYMDSDCONFIGVERSION=$(base64 -d \u003c\u003c\u003c''',base64(parameters('gatewayMdsdConfigVersion')),''')\n','GATEWAYDOMAINS=$(base64 -d \u003c\u003c\u003c''',base64(parameters('gatewayDomains')),''')\n','GATEWAYFEATURES=$(base64 -d \u003c\u003c\u003c''',base64(parameters('gatewayFeatures')),''')\n','KEYVAULTDNSSUFFIX=$(base64 -d \u003c\u003c\u003c''',base64(parameters('keyvaultDNSSuffix')),''')\n','KEYVAULTPREFIX=$(base64 -d \u003c\u003c\u003c''',base64(parameters('keyvaultPrefix')),''')\n','RPIMAGE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpImage')),''')\n','RPMDMACCOUNT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpMdmAccount')),''')\n','RPMDSDACCOUNT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpMdsdAccount')),''')\n','RPMDSDNAMESPACE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpMdsdNamespace')),''')\n','MDMIMAGE=''/genevamdm:2.2024.328.1744-c5fb79-20240328t1935''\n','LOCATION=$(base64 -d \u003c\u003c\u003c''',base64(resourceGroup().location),''')\n','SUBSCRIPTIONID=$(base64 -d \u003c\u003c\u003c''',base64(subscription().subscriptionId),''')\n','RESOURCEGROUPNAME=$(base64 -d \u003c\u003c\u003c''',base64(resourceGroup().name),''')\n','\n',base64ToString('#!/bin/bash

set -o errexit \
    -o nounset

if [ "${DEBUG:-false}" == true ]; then
    set -x
fi

main() {
    # transaction attempt retry time in seconds
    local -ri retry_wait_time=60

    # shellcheck source=commonVMSS.sh
    source commonVMSS.sh

    create_required_dirs
    configure_sshd
    configure_rpm_repos retry_wait_time

    local -ar exclude_pkgs=(
        "-x WALinuxAgent"
        "-x WALinuxAgent-udev"
    )

    dnf_update_pkgs pkgs_to_exclude retry_wait_time

    local -ra rpm_keys=(
        https://dl.fedoraproject.org/pub/epel/RPM-GPG-KEY-EPEL-8
        https://packages.microsoft.com/keys/microsoft.asc
    )

    rpm_import_keys rpm_keys retry_wait_time

    local -ra repo_rpm_pkgs=(
        https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm
    )

    dnf_install_pkgs repo_rpm_pkgs retry_wait_time
    configure_dnf_cron_job

    local -ra install_pkgs=(
        clamav
        azsec-clamav
        azsec-monitor
        azure-cli
        azure-mdsd
        azure-security
        podman
        podman-docker
        openssl-perl
        # hack - we are installing python3 on hosts due to an issue with Azure Linux Extensions https://github.com/Azure/azure-linux-extensions/pull/1505
        python3
    )

    dnf_install_pkgs install_pkgs retry_wait_time

    configure_disk_partitions

    local -r gateway_logdir='/var/log/aro-gateway'
    local -r gateway_log_file="# Maximum log directory size is 100G with this configuration
# Setting limit to 100G to allow space for other logging services
# copytruncate is a critical option used to prevent logs from being shipped twice
${log_dir} {
    size 20G
    rotate 5
    create 0600 root root
    copytruncate
    noolddir
    compress
}"

    # Key dictates the filename written in /etc/logrotate.d
    local -rA logrotate_dropins=(
        ["gateway"]="$gateway_log_file"
    )

    configure_logrotate logrotate_dropins
    configure_selinux

    local -ra enable_ports=(
        "80/tcp"
        "8081/tcp"
        "443/tcp"
    )
    configure_firewalld_rules enable_ports

    local -r mdmimage="${RPIMAGE%%/*}/${MDMIMAGE##*/}"
    local -r rpimage="$RPIMAGE"
    local -r fluentbit_image="$FLUENTBITIMAGE"
    local -ra images=(
        "$mdmimage"
        "$rpimage"
        "$fluentbit_image"
    )

    pull_container_images images registry_config_file

    local -r fluentbit_conf_file="[INPUT]
Name systemd
Tag journald
Systemd_Filter _COMM=aro
DB /var/lib/fluent/journaldb

[FILTER]
	Name modify
	Match journald
	Remove_wildcard _
	Remove TIMESTAMP

[OUTPUT]
	Name forward
	Match *
	Port 29230"

    configure_service_fluentbit fluentbit_conf_file fluentbit_image
    local -r mdm_role="gateway"
    configure_service_mdm mdm_role mdmimage

    local -r gwy_dbtoken_service_conf_file="ACR_RESOURCE_ID='$ACRRESOURCEID'
DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME'
DOMAIN_NAME='$LOCATION.$CLUSTERPARENTDOMAINNAME'
AZURE_DBTOKEN_CLIENT_ID='$DBTOKENCLIENTID'
DBTOKEN_URL='$DBTOKENURL'
MDM_ACCOUNT='$RPMDMACCOUNT'
MDM_NAMESPACE=Gateway
GATEWAY_DOMAINS='$GATEWAYDOMAINS'
GATEWAY_FEATURES='$GATEWAYFEATURES'
RPIMAGE='$RPIMAGE'"
    configure_service_gateway gateway_logdir

    local -r mdsd_config_version="$GATEWAYMDSDCONFIGVERSION"
    configure_service_mdsd mdm_role mdsd_config_version
    local -r mdsd_role="gwy"
    configure_timers_mdm_mdsd mdsd_role

    configure_certs mdm_role

    local -ra gateway_services=(
        "aro-gateway"
        "auoms"
        "azsecd"
        "azsecmond"
        "mdsd"
        "mdm"
        "chronyd"
        "fluentbit"
        "download-mdsd-credentials.timer"
        "download-mdm-credentials.timer"
    )

    enable_services gateway_services

    reboot_vm
}

# configure_service_aro_rp
configure_service_gateway() {
    local -n log_dir="$1"
    log "starting"

    local -r aro_gateway_conf_filename='/etc/sysconfig/aro-gateway'
    local -r aro_gateway_conf_file="ACR_RESOURCE_ID='$ACRRESOURCEID'
ADMIN_API_CLIENT_CERT_COMMON_NAME='$ADMINAPICLIENTCERTCOMMONNAME'
ARM_API_CLIENT_CERT_COMMON_NAME='$ARMAPICLIENTCERTCOMMONNAME'
AZURE_ARM_CLIENT_ID='$ARMCLIENTID'
AZURE_FP_CLIENT_ID='$FPCLIENTID'
AZURE_FP_SERVICE_PRINCIPAL_ID='$FPSERVICEPRINCIPALID'
BILLING_E2E_STORAGE_ACCOUNT_ID='$BILLINGE2ESTORAGEACCOUNTID'
CLUSTER_MDM_ACCOUNT='$CLUSTERMDMACCOUNT'
CLUSTER_MDM_NAMESPACE=RP
CLUSTER_MDSD_ACCOUNT='$CLUSTERMDSDACCOUNT'
CLUSTER_MDSD_CONFIG_VERSION='$CLUSTERMDSDCONFIGVERSION'
CLUSTER_MDSD_NAMESPACE='$CLUSTERMDSDNAMESPACE'
DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME'
DOMAIN_NAME='$LOCATION.$CLUSTERPARENTDOMAINNAME'
AZURE_DBTOKEN_CLIENT_ID='$DBTOKENCLIENTID'
DBTOKEN_URL='$DBTOKENURL'
MDM_ACCOUNT='$RPMDMACCOUNT'
MDM_NAMESPACE=Gateway
GATEWAY_DOMAINS='$GATEWAYDOMAINS'
GATEWAY_FEATURES='$GATEWAYFEATURES'
GATEWAY_RESOURCEGROUP='$GATEWAYRESOURCEGROUPNAME'
KEYVAULT_PREFIX='$KEYVAULTPREFIX'
MDM_ACCOUNT='$RPMDMACCOUNT'
MDM_NAMESPACE=RP
MDSD_ENVIRONMENT='$MDSDENVIRONMENT'
RP_FEATURES='$RPFEATURES'
RPIMAGE='$RPIMAGE'
ARO_INSTALL_VIA_HIVE='$CLUSTERSINSTALLVIAHIVE'
ARO_HIVE_DEFAULT_INSTALLER_PULLSPEC='$CLUSTERDEFAULTINSTALLERPULLSPEC'
ARO_ADOPT_BY_HIVE='$CLUSTERSADOPTBYHIVE'
USE_CHECKACCESS='$USECHECKACCESS'"

    write_file aro_gateway_conf_filename aro_gateway_conf_file true

    local -r aro_gateway_service_filename='/etc/systemd/system/aro-gateway.service'

    local -r aro_gateway_service_file="[Unit]
After=network-online.target
Wants=network-online.target

[Service]
EnvironmentFile=/etc/sysconfig/aro-gateway
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStartPre=/usr/bin/mkdir -p ${log_dir}
ExecStart=/usr/bin/docker run \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -e ACR_RESOURCE_ID \
  -e DATABASE_ACCOUNT_NAME \
  -e AZURE_DBTOKEN_CLIENT_ID \
  -e DBTOKEN_URL \
  -e GATEWAY_DOMAINS \
  -e GATEWAY_FEATURES \
  -e MDM_ACCOUNT \
  -e MDM_NAMESPACE \
  -m 2g \
  -p 80:8080 \
  -p 8081:8081 \
  -p 443:8443 \
  -v /run/systemd/journal:/run/systemd/journal \
  -v /var/etw:/var/etw:z \
  -v ${log_dir}:/ctr.log:z \
  $RPIMAGE \
  gateway
ExecStop=/usr/bin/docker stop -t 3600 %N
TimeoutStopSec=3600
Restart=always
RestartSec=1
StartLimitInterval=0

[Install]
WantedBy=multi-user.target
    "

    write_file aro_gateway_service_filename aro_gateway_service_file true
}

export AZURE_CLOUD_NAME="${AZURECLOUDNAME:?"Failed to carry over variables"}"

main "$@"
')))]" } } } diff --git a/pkg/deploy/assets/rp-production.json b/pkg/deploy/assets/rp-production.json index 99f72f4d6ff..740e15c2359 100644 --- a/pkg/deploy/assets/rp-production.json +++ b/pkg/deploy/assets/rp-production.json @@ -516,7 +516,7 @@ "autoUpgradeMinorVersion": true, "settings": {}, "protectedSettings": { - "script": "[base64(concat(base64ToString('c2V0IC1leAoK'),'ACRRESOURCEID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('acrResourceId')),''')\n','ADMINAPICLIENTCERTCOMMONNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('adminApiClientCertCommonName')),''')\n','ARMAPICLIENTCERTCOMMONNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('armApiClientCertCommonName')),''')\n','ARMCLIENTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('armClientId')),''')\n','AZURECLOUDNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('azureCloudName')),''')\n','AZURESECPACKQUALYSURL=$(base64 -d \u003c\u003c\u003c''',base64(parameters('azureSecPackQualysUrl')),''')\n','AZURESECPACKVSATENANTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('azureSecPackVSATenantId')),''')\n','BILLINGE2ESTORAGEACCOUNTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('billingE2EStorageAccountId')),''')\n','CLUSTERMDMACCOUNT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clusterMdmAccount')),''')\n','CLUSTERMDSDACCOUNT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clusterMdsdAccount')),''')\n','CLUSTERMDSDCONFIGVERSION=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clusterMdsdConfigVersion')),''')\n','CLUSTERMDSDNAMESPACE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clusterMdsdNamespace')),''')\n','CLUSTERPARENTDOMAINNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clusterParentDomainName')),''')\n','DATABASEACCOUNTNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('databaseAccountName')),''')\n','DBTOKENCLIENTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('dbtokenClientId')),''')\n','FLUENTBITIMAGE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('fluentbitImage')),''')\n','FPCLIENTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('fpClientId')),''')\n','FPSERVICEPRINCIPALID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('fpServicePrincipalId')),''')\n','GATEWAYDOMAINS=$(base64 -d \u003c\u003c\u003c''',base64(parameters('gatewayDomains')),''')\n','GATEWAYRESOURCEGROUPNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('gatewayResourceGroupName')),''')\n','GATEWAYSERVICEPRINCIPALID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('gatewayServicePrincipalId')),''')\n','KEYVAULTDNSSUFFIX=$(base64 -d \u003c\u003c\u003c''',base64(parameters('keyvaultDNSSuffix')),''')\n','KEYVAULTPREFIX=$(base64 -d \u003c\u003c\u003c''',base64(parameters('keyvaultPrefix')),''')\n','MDMFRONTENDURL=$(base64 -d \u003c\u003c\u003c''',base64(parameters('mdmFrontendUrl')),''')\n','MDSDENVIRONMENT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('mdsdEnvironment')),''')\n','PORTALACCESSGROUPIDS=$(base64 -d \u003c\u003c\u003c''',base64(parameters('portalAccessGroupIds')),''')\n','PORTALCLIENTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('portalClientId')),''')\n','PORTALELEVATEDGROUPIDS=$(base64 -d \u003c\u003c\u003c''',base64(parameters('portalElevatedGroupIds')),''')\n','RPFEATURES=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpFeatures')),''')\n','RPIMAGE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpImage')),''')\n','RPMDMACCOUNT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpMdmAccount')),''')\n','RPMDSDACCOUNT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpMdsdAccount')),''')\n','RPMDSDCONFIGVERSION=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpMdsdConfigVersion')),''')\n','RPMDSDNAMESPACE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpMdsdNamespace')),''')\n','RPPARENTDOMAINNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpParentDomainName')),''')\n','CLUSTERSINSTALLVIAHIVE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clustersInstallViaHive')),''')\n','CLUSTERSADOPTBYHIVE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clustersAdoptByHive')),''')\n','CLUSTERDEFAULTINSTALLERPULLSPEC=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clusterDefaultInstallerPullspec')),''')\n','USECHECKACCESS=$(base64 -d \u003c\u003c\u003c''',base64(parameters('useCheckAccess')),''')\n','ADMINAPICABUNDLE=''',parameters('adminApiCaBundle'),'''\n','ARMAPICABUNDLE=''',parameters('armApiCaBundle'),'''\n','MDMIMAGE=''/genevamdm:2.2024.328.1744-c5fb79-20240328t1935''\n','LOCATION=$(base64 -d \u003c\u003c\u003c''',base64(resourceGroup().location),''')\n','SUBSCRIPTIONID=$(base64 -d \u003c\u003c\u003c''',base64(subscription().subscriptionId),''')\n','RESOURCEGROUPNAME=$(base64 -d \u003c\u003c\u003c''',base64(resourceGroup().name),''')\n','\n',base64ToString('#!/bin/bash

set -o errexit \
    -o nounset

if [ "${DEBUG:-false}" == true ]; then
    set -x
fi

main() {
    parse_run_options "$@"


    configure_sshd
    configure_and_install_dnf_pkgs_repos
    configure_disk_partitions
    configure_logrotate
    configure_selinux

    mkdir -p /var/log/journal
    mkdir -p /var/lib/waagent/Microsoft.Azure.KeyVault.Store

    configure_firewalld_rules
    pull_container_images
    configure_system_services
    reboot_vm
}

usage() {
    local -n options="$1"
    log "$(basename "$0") [$options]
        -d Configure Disk Partitions
        -p Configure rpm repositories, import required rpm keys, update & install packages with dnf
        -l Configure logrotate.conf
        -s Make selinux modifications required for ARO RP
        -r Configure sshd - Allow password authenticaiton
        -f Configure firewalld default zone rules
        -u Configure systemd unit files for ARO RP
        -i Pull container images

        Note: steps will be executed in the order that flags are provided
    "
}

# parse_run_options takes all arguements passed to main and parses them
# allowing individual step(s) to be ran, rather than all steps
#
# This is useful for local testing, or possibly modifying the bootstrap execution via environment variables in the deployment pipeline
parse_run_options() {
    # shellcheck disable=SC2206
    local -a options=(${1:-})
    if [ "${#options[@]}" -eq 0 ]; then
        log "Running all steps"
        return 0
    fi

    local OPTIND
    local -r allowed_options="dplsrfui"
    while getopts ${allowed_options} options; do
        case "${options}" in
            d)
                log "Running step configure_disk_partitions"
                configure_disk_partitions
                ;;
            p)
                log "Running step configure_and_install_dnf_pkgs_repos"
                configure_and_install_dnf_pkgs_repos
                ;;
            l)
                log "Running configure_logrotate"
                configure_logrotate
                ;;
            s)
                log "Running configure_selinux"
                configure_selinux
                ;;
            r)
                log "Running configure_sshd"
                configure_sshd
                ;;
            f)
                log "Running configure_firewalld_rules"
                configure_firewalld_rules
                ;;
            u)
                log "Running pull_container_images & configure_system_services"
                configure_system_services
                ;;
            i)
                log "Running pull_container_images"
                pull_container_images 
                ;;
            *)
                usage allowed_options
                abort "Unkown option provided"
                ;;
        esac
    done
    
    exit 0
}

# We need to configure PasswordAuthentication to yes in order for the VMSS Access JIT to work
configure_sshd() {
    log "starting"
    log "setting ssh password authentication"
    sed -i 's/PasswordAuthentication no/PasswordAuthentication yes/g' /etc/ssh/sshd_config

    systemctl reload sshd.service
    systemctl is-active --quiet sshd || abort "sshd failed to reload"
}

# configure_and_install_dnf_pkgs_repos
configure_and_install_dnf_pkgs_repos() {
    log "starting"

    # transaction attempt retry time in seconds
    local -ri retry_wait_time=60
    configure_rhui_repo retry_wait_time
    create_azure_rpm_repos retry_wait_time

    local -ar exclude_pkgs=(
        "-x WALinuxAgent"
        "-x WALinuxAgent-udev"
    )

    dnf_update_pkgs exclude_pkgs retry_wait_time

    local -ra rpm_keys=(
        https://dl.fedoraproject.org/pub/epel/RPM-GPG-KEY-EPEL-8
        https://packages.microsoft.com/keys/microsoft.asc
    )

    rpm_import_keys rpm_keys retry_wait_time

    local -ra repo_rpm_pkgs=(
        https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm
    )

    local -ra install_pkgs=(
        clamav
        azsec-clamav
        azsec-monitor
        azure-cli
        azure-mdsd
        azure-security
        podman
        podman-docker
        openssl-perl
        # hack - we are installing python3 on hosts due to an issue with Azure Linux Extensions https://github.com/Azure/azure-linux-extensions/pull/1505
        python3
    )

    dnf_install_pkgs repo_rpm_pkgs retry_wait_time
    dnf_install_pkgs install_pkgs retry_wait_time
}

# configure_rhui_repo
configure_rhui_repo() {
    log "starting"

    local -ra cmd=(
        dnf
        update
        -y
        --disablerepo='*'
        --enablerepo='rhui-microsoft-azure*'
    )

    log "running RHUI package updates"
    retry cmd "$1"
}

# retry Adding retry logic to yum commands in order to avoid stalling out on resource locks
retry() {
    local -n cmd_retry="$1"
    local -n wait_time="$2"

    for attempt in {1..5}; do
        log "attempt #${attempt} - ${FUNCNAME[2]}"
        ${cmd_retry[@]} &

        wait $! && break
        if [[ ${attempt} -lt 5 ]]; then
            sleep "$wait_time"
        else
            abort "attempt #${attempt} - Failed to update packages"
        fi
    done
}

# dnf_update_pkgs
dnf_update_pkgs() {
    local -n excludes="$1"
    log "starting"

    local -ra cmd=(
        dnf
        -y
        ${excludes[@]}
        update
        --allowerasing
    )

    log "Updating all packages"
    retry cmd "$2"
}

# dnf_install_pkgs
dnf_install_pkgs() {
    local -n pkgs="$1"
    log "starting"

    local -ra cmd=(
        dnf
        -y
        install
        ${pkgs[@]}
    )

    log "Attempting to install packages: ${pkgs[*]}"
    retry cmd "$2"
}

# rpm_import_keys
rpm_import_keys() {
    local -n keys="$1"
    log "starting"


    # shellcheck disable=SC2068
    for key in ${keys[@]}; do
        if [ ${#keys[@]} -eq 0 ]; then
            break
        fi
            local -a cmd=(
                rpm
                --import
                -v
                "$key"
            )

            log "attempt #$attempt - importing rpm repository key $key"
            retry cmd "$2" && unset key
    done
}

# configure_disk_partitions
configure_disk_partitions() {
    log "starting"
    log "extending partition table"

    # Linux block devices are inconsistently named
    # it's difficult to tie the lvm pv to the physical disk using /dev/disk files, which is why lvs is used here
    physical_disk="$(lvs -o devices -a | head -n2 | tail -n1 | cut -d ' ' -f 3 | cut -d \( -f 1 | tr -d '[:digit:]')"
    growpart "$physical_disk" 2

    log "extending filesystems"
    log "extending root lvm"
    lvextend -l +20%FREE /dev/rootvg/rootlv
    log "growing root filesystem"
    xfs_growfs /

    log "extending var lvm"
    lvextend -l +100%FREE /dev/rootvg/varlv
    log "growing var filesystem"
    xfs_growfs /var
}

# configure_logrotate clobbers /etc/logrotate.conf
configure_logrotate() {
    log "starting"

    local -r logrotate_conf_filename='/etc/logrotate.conf'
    local -r logrotate_conf_file='# see "man logrotate" for details
# rotate log files weekly
weekly

# keep 2 weeks worth of backlogs
rotate 2

# create new (empty) log files after rotating old ones
create

# use date as a suffix of the rotated file
dateext

# uncomment this if you want your log files compressed
compress

# RPM packages drop log rotation information into this directory
include /etc/logrotate.d

# no packages own wtmp and btmp -- we will rotate them here
/var/log/wtmp {
    monthly
    create 0664 root utmp
        minsize 1M
    rotate 1
}

/var/log/btmp {
    missingok
    monthly
    create 0600 root utmp
    rotate 1
}'

    write_file logrotate_conf_filename logrotate_conf_file true
}

# create_azure_rpm_repos creates /etc/yum.repos.d/azure.repo repository file
create_azure_rpm_repos() {
    log "starting"

    local -r azure_repo_filename='/etc/yum.repos.d/azure.repo'
    local -r azure_repo_file='[azure-cli]
name=azure-cli
baseurl=https://packages.microsoft.com/yumrepos/azure-cli
enabled=yes
gpgcheck=yes

[azurecore]
name=azurecore
baseurl=https://packages.microsoft.com/yumrepos/azurecore
enabled=yes
gpgcheck=no'

    write_file azure_repo_filename azure_repo_file true
}

# configure_selinux
configure_selinux() {
    log "starting"

    local -r relabel="${1:-false}"

    already_defined_ignore_error="File context for /var/log/journal(/.*)? already defined"
    semanage fcontext -a -t var_log_t "/var/log/journal(/.*)?" || log "$already_defined_ignore_error"
    chcon -R system_u:object_r:var_log_t:s0 /var/opt/microsoft/linuxmonagent

    if "$relabel"; then
        restorecon -RF /var/log/* || log "$already_defined_ignore_error"
    fi
}

# configure_firewalld_rules
configure_firewalld_rules() {
    log "starting"

    # https://access.redhat.com/security/cve/cve-2020-13401
    local -r prefix="/etc/sysctl.d"
    local -r disable_accept_ra_conf_filename="$prefix/02-disable-accept-ra.conf"
    local -r disable_accept_ra_conf_file="net.ipv6.conf.all.accept_ra=0"

    write_file disable_accept_ra_conf_filename disable_accept_ra_conf_file true

    local -r disable_core_filename="$prefix/01-disable-core.conf"
    local -r disable_core_file="kernel.core_pattern = |/bin/true
    "
    write_file disable_core_filename disable_core_file true

    sysctl --system

    local -ra enable_ports=(
        "443/tcp"
        "444/tcp"
        "445/tcp"
        "2222/tcp"
    )

    log "Enabling ports ${enable_ports[*]} on default firewalld zone"
    # shellcheck disable=SC2068
    for port in ${enable_ports[@]}; do
        log "Enabling port $port now"
        firewall-cmd "--add-port=$port"
    done

    firewall-cmd --runtime-to-permanent
}

# pull_container_images
pull_container_images() {
    log "starting"

    # The managed identity that the VM runs as only has a single roleassignment.
    # This role assignment is ACRPull which is not necessarily present in the
    # subscription we're deploying into.  If the identity does not have any
    # role assignments scoped on the subscription we're deploying into, it will
    # not show on az login -i, which is why the below line is commented.
    # az account set -s "$SUBSCRIPTIONID"
    az login -i --allow-no-subscriptions

    # Suppress emulation output for podman instead of docker for az acr compatability
    mkdir -p /etc/containers/
    mkdir -p /root/.docker
    touch /etc/containers/nodocker

	# This name is used in the case that az acr login searches for this in it's environment
    local -r REGISTRY_AUTH_FILE="/root/.docker/config.json"
    
    log "logging into prod acr"
    az acr login --name "$(sed -e 's|.*/||' <<<"$ACRRESOURCEID")"

    MDMIMAGE="${RPIMAGE%%/*}/${MDMIMAGE##*/}"
    docker pull "$MDMIMAGE"
    docker pull "$RPIMAGE"
    docker pull "$FLUENTBITIMAGE"

    az logout
}

# configure_system_services creates, configures, and enables the following systemd services and timers
# services
#   fluentbit
#   mdm
#   mdsd
#   arp-rp
#   aro-dbtoken
#   aro-monitor
#   aro-portal
configure_system_services() {
    configure_service_fluentbit
    configure_service_mdm
    configure_timers_mdm_mdsd
    configure_service_aro_rp
    configure_service_aro_dbtoken
    configure_service_aro_monitor
    configure_service_aro_portal
    configure_service_mdsd
}

# enable_aro_services enables all services required for aro rp
enable_aro_services() {
    log "starting"

    local -ra aro_services=(
        "aro-dbtoken"
        "aro-monitor"
        "aro-portal"
        "aro-rp"
        "auoms"
        "azsecd"
        "azsecmond"
        "mdsd"
        "mdm"
        "chronyd"
        "fluentbit"
    )
    log "enabling aro services ${aro_services[*]}"
    # shellcheck disable=SC2068
    for service in ${aro_services[@]}; do
        log "Enabling $service now"
        systemctl enable "$service.service"
    done
}

# configure_service_fluentbit
configure_service_fluentbit() {
    log "starting"
    log "configuring fluentbit service"

    mkdir -p /etc/fluentbit/
    mkdir -p /var/lib/fluent

    local -r fluentbit_conf_filename='/etc/fluentbit/fluentbit.conf'
    local -r fluentbit_conf_file="[INPUT]
Name systemd
Tag journald
Systemd_Filter _COMM=aro
DB /var/lib/fluent/journaldb

[FILTER]
	Name modify
	Match journald
	Remove_wildcard _
	Remove TIMESTAMP

[FILTER]
	Name rewrite_tag
	Match journald
	Rule $LOGKIND asyncqos asyncqos true

[FILTER]
	Name modify
	Match asyncqos
	Remove CLIENT_PRINCIPAL_NAME
	Remove FILE
	Remove COMPONENT

[FILTER]
	Name rewrite_tag
	Match journald
	Rule $LOGKIND ifxaudit ifxaudit false

[OUTPUT]
	Name forward
	Match *
	Port 29230"

    write_file fluentbit_conf_filename fluentbit_conf_file true

    local -r sysconfig_fluentbit_filename='/etc/sysconfig/fluentbit'
    local -r sysconfig_fluentbit_file="FLUENTBITIMAGE=$FLUENTBITIMAGE"

    write_file sysconfig_fluentbit_filename sysconfig_fluentbit_file true

    local -r fluentbit_service_filename='/etc/systemd/system/fluentbit.service'

    local -r fluentbit_service_file="[Unit]
After=network-online.target
Wants=network-online.target
StartLimitIntervalSec=0

[Service]
RestartSec=1s
EnvironmentFile=/etc/sysconfig/fluentbit
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStart=/usr/bin/docker run \
  --security-opt label=disable \
  --entrypoint /opt/td-agent-bit/bin/td-agent-bit \
  --net=host \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -v /etc/fluentbit/fluentbit.conf:/etc/fluentbit/fluentbit.conf \
  -v /var/lib/fluent:/var/lib/fluent:z \
  -v /var/log/journal:/var/log/journal:ro \
  -v /etc/machine-id:/etc/machine-id:ro \
  $FLUENTBITIMAGE \
  -c /etc/fluentbit/fluentbit.conf

ExecStop=/usr/bin/docker stop %N
Restart=always
RestartSec=5
StartLimitInterval=0

[Install]
WantedBy=multi-user.target"

    write_file fluentbit_conf_filename fluentbit_conf_file true
}

# configure_certs
configure_certs() {
    log "starting"

    mkdir /etc/aro-rp
    base64 -d <<<"$ADMINAPICABUNDLE" >/etc/aro-rp/admin-ca-bundle.pem
    if [[ -n "$ARMAPICABUNDLE" ]]; then
    base64 -d <<<"$ARMAPICABUNDLE" >/etc/aro-rp/arm-ca-bundle.pem
    fi
    chown -R 1000:1000 /etc/aro-rp

    # setting MONITORING_GCS_AUTH_ID_TYPE=AuthKeyVault seems to have caused mdsd not
    # to honour SSL_CERT_FILE any more, heaven only knows why.
    mkdir -p /usr/lib/ssl/certs
    csplit -f /usr/lib/ssl/certs/cert- -b %03d.pem /etc/pki/tls/certs/ca-bundle.crt /^$/1 "{*}" >/dev/null
    c_rehash /usr/lib/ssl/certs

# we leave clientId blank as long as only 1 managed identity assigned to vmss
# if we have more than 1, we will need to populate with clientId used for off-node scanning
    local -r nodescan_agent_filename="/etc/default/vsa-nodescan-agent.config"
    local -r nodescan_agent_file="{
    \"Nice\": 19,
    \"Timeout\": 10800,
    \"ClientId\": \"\",
    \"TenantId\": $AZURESECPACKVSATENANTID,
    \"QualysStoreBaseUrl\": $AZURESECPACKQUALYSURL,
    \"ProcessTimeout\": 300,
    \"CommandDelay\": 0
  }"

    write_file nodescan_agent_filename nodescan_agent_file true
}

# configure_service_mdm
configure_service_mdm() {
    log "starting"
    log "configuring mdm service"

    local -r sysconfig_mdm_filename="/etc/sysconfig/mdm"
    local -r sysconfig_mdm_file="MDMFRONTENDURL='$MDMFRONTENDURL'
MDMIMAGE='$MDMIMAGE'
MDMSOURCEENVIRONMENT='$LOCATION'
MDMSOURCEROLE=rp
MDMSOURCEROLEINSTANCE=\"$(hostname)\""

    write_file sysconfig_mdm_filename sysconfig_mdm_file true

    mkdir -p /var/etw
    local -r mdm_service_filename="/etc/systemd/system/mdm.service"
    local -r mdm_service_file="[Unit]
After=network-online.target
Wants=network-online.target

[Service]
EnvironmentFile=/etc/sysconfig/mdm
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStart=/usr/bin/docker run \
  --entrypoint /usr/sbin/MetricsExtension \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -m 2g \
  -v /etc/mdm.pem:/etc/mdm.pem \
  -v /var/etw:/var/etw:z \
  $MDMIMAGE \
  -CertFile /etc/mdm.pem \
  -FrontEndUrl $MDMFRONTENDURL \
  -Logger Console \
  -LogLevel Warning \
  -PrivateKeyFile /etc/mdm.pem \
  -SourceEnvironment $MDMSOURCEENVIRONMENT \
  -SourceRole $MDMSOURCEROLE \
  -SourceRoleInstance $MDMSOURCEROLEINSTANCE
ExecStop=/usr/bin/docker stop %N
Restart=always
RestartSec=1
StartLimitInterval=0

[Install]
WantedBy=multi-user.target"

    write_file mdm_service_filename mdm_service_file true
}

# configure_timers_mdm_mdsd
configure_timers_mdm_mdsd() {
    log "starting"

    for var in "mdsd" "mdm"; do
        local download_creds_service_filename="/etc/systemd/system/download-$var-credentials.service"
        local download_creds_service_file="[Unit]
Description=Periodic $var credentials refresh

[Service]
Type=oneshot
ExecStart=/usr/local/bin/download-credentials.sh $var"

        write_file download_creds_service_filename download_creds_service_file true

        local download_creds_timer_filename="/etc/systemd/system/download-$var-credentials.timer"
        local download_creds_timer_file="[Unit]
Description=Periodic $var credentials refresh
After=network-online.target
Wants=network-online.target

[Timer]
OnBootSec=0min
OnCalendar=0/12:00:00
AccuracySec=5s

[Install]
WantedBy=timers.target"

        write_file download_creds_timer_filename download_creds_timer_file true
    done

    local -r download_creds_script_filename="/usr/local/bin/download-credentials.sh"
    local -r download_creds_script_file="#!/bin/bash
set -eu

COMPONENT=\$1
echo \"Download \$COMPONENT credentials\"

TEMP_DIR=\"\$(mktemp -d)\"
export AZURE_CONFIG_DIR=\"\$(mktemp -d)\"

echo \"Logging into Azure...\"
RETRIES=3
while [[ \$RETRIES -gt 0 ]]; do
    if az login -i --allow-no-subscriptions
    then
        echo \"az login successful\"
        break
    else
        echo \"az login failed. Retrying...\"
        let RETRIES-=1
        sleep 5
    fi
done

trap \"cleanup\" EXIT

cleanup() {
  az logout
  [[ \$TEMP_DIR =~ /tmp/.+ ]] && rm -rf \$TEMP_DIR
  [[ \$AZURE_CONFIG_DIR =~ /tmp/.+ ]] && rm -rf \$AZURE_CONFIG_DIR
}

if [[ \$COMPONENT = \"mdm\" ]]; then
  CURRENT_CERT_FILE=\"/etc/mdm.pem\"
elif [[ \$COMPONENT\ = \"mdsd\" ]]; then
  CURRENT_CERT_FILE=\"/var/lib/waagent/Microsoft.Azure.KeyVault.Store/mdsd.pem\"
else
  echo Invalid usage && exit 1
fi

SECRET_NAME=\"rp-\${COMPONENT}\"
NEW_CERT_FILE=\"\$TEMP_DIR/\$COMPONENT.pem\"
for attempt in {1..5}; do
  az keyvault \
    secret \
    download \
    --file \"\$NEW_CERT_FILE\" \
    --id \"https://$KEYVAULTPREFIX-svc.$KEYVAULTDNSSUFFIX/secrets/\$SECRET_NAME\" \
    && break
  if [[ \$attempt -lt 5 ]]; then sleep 10; else exit 1; fi
done

if [ -f \$NEW_CERT_FILE ]; then
  if [[ \$COMPONENT = \"mdsd\" ]]; then
    chown syslog:syslog \$NEW_CERT_FILE
  else
    sed -i -ne '1,/END CERTIFICATE/ p' \$NEW_CERT_FILE
  fi

  new_cert_sn=\"\$(openssl x509 -in \"\$NEW_CERT_FILE\" -noout -serial | awk -F= '{print \$2}')\"
  current_cert_sn=\"\$(openssl x509 -in \"\$CURRENT_CERT_FILE\" -noout -serial | awk -F= '{print \$2}')\"
  if [[ ! -z \$new_cert_sn ]] && [[ \$new_cert_sn != \"\$current_cert_sn\" ]]; then
    echo updating certificate for \$COMPONENT
    chmod 0600 \$NEW_CERT_FILE
    mv \$NEW_CERT_FILE \$CURRENT_CERT_FILE
  fi
else
  echo Failed to refresh certificate for \$COMPONENT && exit 1
fi"

    write_file download_creds_script_filename download_creds_script_file true

    chmod u+x /usr/local/bin/download-credentials.sh

    systemctl enable download-mdsd-credentials.timer
    systemctl enable download-mdm-credentials.timer

    /usr/local/bin/download-credentials.sh mdsd
    /usr/local/bin/download-credentials.sh mdm

    local -r MDSDCERTIFICATESAN="$(openssl x509 -in /var/lib/waagent/Microsoft.Azure.KeyVault.Store/mdsd.pem -noout -subject | sed -e 's/.*CN = //')"
    local -r watch_mdm_creds_service_filename="/etc/systemd/system/watch-mdm-credentials.service"
    local -r watch_mdm_creds_service_file="[Unit]
Description=Watch for changes in mdm.pem and restarts the mdm service

[Service]
Type=oneshot
ExecStart=/usr/bin/systemctl restart mdm.service

[Install]
WantedBy=multi-user.target"

    write_file watch_mdm_creds_service_filename watch_mdm_creds_service_file true

    local -r watch_mdm_creds_path_filename='/etc/systemd/system/watch-mdm-credentials.path'
    local -r watch_mdm_creds_path_file='[Path]
PathModified=/etc/mdm.pem

[Install]
WantedBy=multi-user.target'

    write_file watch_mdm_creds_path_filename watch_mdm_creds_path_file true

    local -r watch_mdm_creds='watch-mdm-credentials.path'
    systemctl enable "$watch_mdm_creds" || abort "failed to enable $watch_mdm_creds"
    systemctl start "$watch_mdm_creds" || abort "failed to start $watch_mdm_creds"
}

# configure_service_aro_rp
configure_service_aro_rp() {
    log "starting"

    local -r aro_rp_conf_filename='/etc/sysconfig/aro-rp'
    local -r aro_rp_conf_file="ACR_RESOURCE_ID='$ACRRESOURCEID'
ADMIN_API_CLIENT_CERT_COMMON_NAME='$ADMINAPICLIENTCERTCOMMONNAME'
ARM_API_CLIENT_CERT_COMMON_NAME='$ARMAPICLIENTCERTCOMMONNAME'
AZURE_ARM_CLIENT_ID='$ARMCLIENTID'
AZURE_FP_CLIENT_ID='$FPCLIENTID'
AZURE_FP_SERVICE_PRINCIPAL_ID='$FPSERVICEPRINCIPALID'
BILLING_E2E_STORAGE_ACCOUNT_ID='$BILLINGE2ESTORAGEACCOUNTID'
CLUSTER_MDM_ACCOUNT='$CLUSTERMDMACCOUNT'
CLUSTER_MDM_NAMESPACE=RP
CLUSTER_MDSD_ACCOUNT='$CLUSTERMDSDACCOUNT'
CLUSTER_MDSD_CONFIG_VERSION='$CLUSTERMDSDCONFIGVERSION'
CLUSTER_MDSD_NAMESPACE='$CLUSTERMDSDNAMESPACE'
DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME'
DOMAIN_NAME='$LOCATION.$CLUSTERPARENTDOMAINNAME'
GATEWAY_DOMAINS='$GATEWAYDOMAINS'
GATEWAY_RESOURCEGROUP='$GATEWAYRESOURCEGROUPNAME'
KEYVAULT_PREFIX='$KEYVAULTPREFIX'
MDM_ACCOUNT='$RPMDMACCOUNT'
MDM_NAMESPACE=RP
MDSD_ENVIRONMENT='$MDSDENVIRONMENT'
RP_FEATURES='$RPFEATURES'
RPIMAGE='$RPIMAGE'
ARO_INSTALL_VIA_HIVE='$CLUSTERSINSTALLVIAHIVE'
ARO_HIVE_DEFAULT_INSTALLER_PULLSPEC='$CLUSTERDEFAULTINSTALLERPULLSPEC'
ARO_ADOPT_BY_HIVE='$CLUSTERSADOPTBYHIVE'
USE_CHECKACCESS='$USECHECKACCESS'"

    write_file aro_rp_conf_filename aro_rp_conf_file true

    local -r aro_rp_service_filename='/etc/systemd/system/aro-rp.service'
    local -r aro_rp_service_file="[Unit]
After=network-online.target
Wants=network-online.target

[Service]
EnvironmentFile=/etc/sysconfig/aro-rp
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStart=/usr/bin/docker run \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -e ACR_RESOURCE_ID \
  -e ADMIN_API_CLIENT_CERT_COMMON_NAME \
  -e ARM_API_CLIENT_CERT_COMMON_NAME \
  -e AZURE_ARM_CLIENT_ID \
  -e AZURE_FP_CLIENT_ID \
  -e BILLING_E2E_STORAGE_ACCOUNT_ID \
  -e CLUSTER_MDM_ACCOUNT \
  -e CLUSTER_MDM_NAMESPACE \
  -e CLUSTER_MDSD_ACCOUNT \
  -e CLUSTER_MDSD_CONFIG_VERSION \
  -e CLUSTER_MDSD_NAMESPACE \
  -e DATABASE_ACCOUNT_NAME \
  -e DOMAIN_NAME \
  -e GATEWAY_DOMAINS \
  -e GATEWAY_RESOURCEGROUP \
  -e KEYVAULT_PREFIX \
  -e MDM_ACCOUNT \
  -e MDM_NAMESPACE \
  -e MDSD_ENVIRONMENT \
  -e RP_FEATURES \
  -e ARO_INSTALL_VIA_HIVE \
  -e ARO_HIVE_DEFAULT_INSTALLER_PULLSPEC \
  -e ARO_ADOPT_BY_HIVE \
  -e USE_CHECKACCESS \
  -m 2g \
  -p 443:8443 \
  -v /etc/aro-rp:/etc/aro-rp \
  -v /run/systemd/journal:/run/systemd/journal \
  -v /var/etw:/var/etw:z \
  $RPIMAGE \
  rp
ExecStop=/usr/bin/docker stop -t 3600 %N
TimeoutStopSec=3600
Restart=always
RestartSec=1
StartLimitInterval=0

[Install]
WantedBy=multi-user.target"

    write_file aro_rp_service_filename aro_rp_conf_file true
}

# configure_service_aro_dbtoken
configure_service_aro_dbtoken() {
    log "starting"

    local -r aro_dbtoken_service_conf_filename='/etc/sysconfig/aro-dbtoken'
    local -r aro_dbtoken_service_conf_file="DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME'
AZURE_DBTOKEN_CLIENT_ID='$DBTOKENCLIENTID'
AZURE_GATEWAY_SERVICE_PRINCIPAL_ID='$GATEWAYSERVICEPRINCIPALID'
KEYVAULT_PREFIX='$KEYVAULTPREFIX'
MDM_ACCOUNT='$RPMDMACCOUNT'
MDM_NAMESPACE=DBToken
RPIMAGE='$RPIMAGE'"

    write_file aro_dbtoken_service_conf_filename aro_dbtoken_service_conf_file true

    local -r aro_dbtoken_service_filename='/etc/systemd/system/aro-dbtoken.service'
    local -r aro_dbtoken_service_file="[Unit]
After=network-online.target
Wants=network-online.target

[Service]
EnvironmentFile=/etc/sysconfig/aro-dbtoken
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStart=/usr/bin/docker run \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -e AZURE_GATEWAY_SERVICE_PRINCIPAL_ID \
  -e DATABASE_ACCOUNT_NAME \
  -e AZURE_DBTOKEN_CLIENT_ID \
  -e KEYVAULT_PREFIX \
  -e MDM_ACCOUNT \
  -e MDM_NAMESPACE \
  -m 2g \
  -p 445:8445 \
  -v /run/systemd/journal:/run/systemd/journal \
  -v /var/etw:/var/etw:z \
  $RPIMAGE \
  dbtoken
ExecStop=/usr/bin/docker stop -t 3600 %N
TimeoutStopSec=3600
Restart=always
RestartSec=1
StartLimitInterval=0

[Install]
WantedBy=multi-user.target"

    write_file aro_dbtoken_service_filename aro_dbtoken_service_file true
}

# configure_service_aro_monitor
configure_service_aro_monitor() {
    log "starting"
    log "configuring aro-monitor service"

    # DOMAIN_NAME, CLUSTER_MDSD_ACCOUNT, CLUSTER_MDSD_CONFIG_VERSION, GATEWAY_DOMAINS, GATEWAY_RESOURCEGROUP, MDSD_ENVIRONMENT CLUSTER_MDSD_NAMESPACE
    # are not used, but can't easily be refactored out. Should be revisited in the future.
    local -r aro_monitor_service_conf_filename='/etc/sysconfig/aro-monitor'
    local -r aro_monitor_service_conf_file="AZURE_FP_CLIENT_ID='$FPCLIENTID'
DOMAIN_NAME='$LOCATION.$CLUSTERPARENTDOMAINNAME'
CLUSTER_MDSD_ACCOUNT='$CLUSTERMDSDACCOUNT'
CLUSTER_MDSD_CONFIG_VERSION='$CLUSTERMDSDCONFIGVERSION'
GATEWAY_DOMAINS='$GATEWAYDOMAINS'
GATEWAY_RESOURCEGROUP='$GATEWAYRESOURCEGROUPNAME'
MDSD_ENVIRONMENT='$MDSDENVIRONMENT'
CLUSTER_MDSD_NAMESPACE='$CLUSTERMDSDNAMESPACE'
CLUSTER_MDM_ACCOUNT='$CLUSTERMDMACCOUNT'
CLUSTER_MDM_NAMESPACE=BBM
DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME'
KEYVAULT_PREFIX='$KEYVAULTPREFIX'
MDM_ACCOUNT='$RPMDMACCOUNT'
MDM_NAMESPACE=BBM
RPIMAGE='$RPIMAGE'"

    write_file aro_monitor_service_conf_filename aro_monitor_service_conf_file true

    local -r aro_monitor_service_filename='/etc/systemd/system/aro-monitor.service'
    local -r aro_monitor_service_file="[Unit]
After=network-online.target
Wants=network-online.target

[Service]
EnvironmentFile=/etc/sysconfig/aro-monitor
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStart=/usr/bin/docker run \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -e AZURE_FP_CLIENT_ID \
  -e DOMAIN_NAME \
  -e CLUSTER_MDSD_ACCOUNT \
  -e CLUSTER_MDSD_CONFIG_VERSION \
  -e GATEWAY_DOMAINS \
  -e GATEWAY_RESOURCEGROUP \
  -e MDSD_ENVIRONMENT \
  -e CLUSTER_MDSD_NAMESPACE \
  -e CLUSTER_MDM_ACCOUNT \
  -e CLUSTER_MDM_NAMESPACE \
  -e DATABASE_ACCOUNT_NAME \
  -e KEYVAULT_PREFIX \
  -e MDM_ACCOUNT \
  -e MDM_NAMESPACE \
  -m 2.5g \
  -v /run/systemd/journal:/run/systemd/journal \
  -v /var/etw:/var/etw:z \
  $RPIMAGE \
  monitor
Restart=always
RestartSec=1
StartLimitInterval=0

[Install]
WantedBy=multi-user.target"

    write_file aro_monitor_service_filename aro_monitor_service_file true
}

# configure_service_aro_portal
configure_service_aro_portal() {
    log "starting"

    local -r aro_portal_service_conf_filename='/etc/sysconfig/aro-portal'
    local -r aro_portal_service_conf_file="AZURE_PORTAL_ACCESS_GROUP_IDS='$PORTALACCESSGROUPIDS'
AZURE_PORTAL_CLIENT_ID='$PORTALCLIENTID'
AZURE_PORTAL_ELEVATED_GROUP_IDS='$PORTALELEVATEDGROUPIDS'
DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME'
KEYVAULT_PREFIX='$KEYVAULTPREFIX'
MDM_ACCOUNT='$RPMDMACCOUNT'
MDM_NAMESPACE=Portal
PORTAL_HOSTNAME='$LOCATION.admin.$RPPARENTDOMAINNAME'
RPIMAGE='$RPIMAGE'"

    write_file aro_portal_service_conf_filename aro_portal_service_conf_file true

    local -r aro_portal_service_filename='/etc/systemd/system/aro-portal.service'
    local -r aro_portal_service_file="[Unit]
After=network-online.target
Wants=network-online.target
StartLimitInterval=0

[Service]
EnvironmentFile=/etc/sysconfig/aro-portal
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStart=/usr/bin/docker run \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -e AZURE_PORTAL_ACCESS_GROUP_IDS \
  -e AZURE_PORTAL_CLIENT_ID \
  -e AZURE_PORTAL_ELEVATED_GROUP_IDS \
  -e DATABASE_ACCOUNT_NAME \
  -e KEYVAULT_PREFIX \
  -e MDM_ACCOUNT \
  -e MDM_NAMESPACE \
  -e PORTAL_HOSTNAME \
  -m 2g \
  -p 444:8444 \
  -p 2222:2222 \
  -v /run/systemd/journal:/run/systemd/journal \
  -v /var/etw:/var/etw:z \
  $RPIMAGE \
  portal
Restart=always
RestartSec=1

[Install]
WantedBy=multi-user.target"

    write_file aro_portal_service_conf_filename aro_portal_service_conf_file true
}

# configure_service_mdsd
configure_service_mdsd() {
    log "starting"

    local -r mdsd_service_dir="/etc/systemd/system/mdsd.service.d"
    mkdir "$mdsd_service_dir"

    local -r mdsd_override_conf_filename="$mdsd_service_dir/override.conf"
    local -r mdsd_override_conf_file="[Unit]
After=network-online.target"

    write_file mdsd_override_conf_filename mdsd_override_conf_file true

    local -r default_mdsd_filename="/etc/default/mdsd"
    local -r default_mdsd_file="MDSD_ROLE_PREFIX=/var/run/mdsd/default
MDSD_OPTIONS=\"-A -d -r \$MDSD_ROLE_PREFIX\"

export MONITORING_GCS_ENVIRONMENT='$MDSDENVIRONMENT'
export MONITORING_GCS_ACCOUNT='$RPMDSDACCOUNT'
export MONITORING_GCS_REGION='$LOCATION'
export MONITORING_GCS_AUTH_ID_TYPE=AuthKeyVault
export MONITORING_GCS_AUTH_ID='$MDSDCERTIFICATESAN'
export MONITORING_GCS_NAMESPACE='$RPMDSDNAMESPACE'
export MONITORING_CONFIG_VERSION='$RPMDSDCONFIGVERSION'
export MONITORING_USE_GENEVA_CONFIG_SERVICE=true

export MONITORING_TENANT='$LOCATION'
export MONITORING_ROLE=rp
export MONITORING_ROLE_INSTANCE=\"$(hostname)\"

export MDSD_MSGPACK_SORT_COLUMNS=1\""

    write_file default_mdsd_filename default_mdsd_file true

}

# run_azsecd_config_scan
run_azsecd_config_scan() {
    log "starting"

    local -ar configs=(
        "baseline"
        "clamav"
        "software"
    )

    log "Scanning configuration files ${configs[*]}"
    # shellcheck disable=SC2068
    for scan in ${configs[@]}; do
        log "Scanning config file $scan now"
        /usr/local/bin/azsecd config -s "$scan" -d P1D
    done
}

# write_file
# Args
# 1) filename - string
# 2) file_contents - string
# 3) clobber - boolean; optional - defaults to false
write_file() {
    local -n filename="$1"
    local -n file_contents="$2"
    local -r clobber="${3:-false}"

    if $clobber; then
        log "Overwriting file $filename"
        echo "$file_contents" > "$filename"
    else
        log "Appending to $filename"
        echo "$file_contents" >> "$filename"
    fi
}

# reboot_vm restores all selinux file contexts, waits 30 seconds then reboots
reboot_vm() {
    log "starting"

    configure_selinux "true"
    (sleep 30 && log "rebooting vm now"; reboot) &
}

# log is a wrapper for echo that includes the function name
log() {
    local -r msg="${1:-"log message is empty"}"
    local -r stack_level="${2:-1}"
    echo "${FUNCNAME[${stack_level}]}: ${msg}"
}

# abort is a wrapper for log that exits with an error code
abort() {
    local -ri origin_stacklevel=2
    log "${1}" "$origin_stacklevel"
    log "Exiting"
    exit 1
}

export AZURE_CLOUD_NAME="${AZURECLOUDNAME:?"Failed to carry over variables"}"

main "$@"
')))]" + "script": "[base64(concat(base64ToString('c2V0IC1leAoK'),'ACRRESOURCEID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('acrResourceId')),''')\n','ADMINAPICLIENTCERTCOMMONNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('adminApiClientCertCommonName')),''')\n','ARMAPICLIENTCERTCOMMONNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('armApiClientCertCommonName')),''')\n','ARMCLIENTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('armClientId')),''')\n','AZURECLOUDNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('azureCloudName')),''')\n','AZURESECPACKQUALYSURL=$(base64 -d \u003c\u003c\u003c''',base64(parameters('azureSecPackQualysUrl')),''')\n','AZURESECPACKVSATENANTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('azureSecPackVSATenantId')),''')\n','BILLINGE2ESTORAGEACCOUNTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('billingE2EStorageAccountId')),''')\n','CLUSTERMDMACCOUNT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clusterMdmAccount')),''')\n','CLUSTERMDSDACCOUNT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clusterMdsdAccount')),''')\n','CLUSTERMDSDCONFIGVERSION=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clusterMdsdConfigVersion')),''')\n','CLUSTERMDSDNAMESPACE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clusterMdsdNamespace')),''')\n','CLUSTERPARENTDOMAINNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clusterParentDomainName')),''')\n','DATABASEACCOUNTNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('databaseAccountName')),''')\n','DBTOKENCLIENTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('dbtokenClientId')),''')\n','FLUENTBITIMAGE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('fluentbitImage')),''')\n','FPCLIENTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('fpClientId')),''')\n','FPSERVICEPRINCIPALID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('fpServicePrincipalId')),''')\n','GATEWAYDOMAINS=$(base64 -d \u003c\u003c\u003c''',base64(parameters('gatewayDomains')),''')\n','GATEWAYRESOURCEGROUPNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('gatewayResourceGroupName')),''')\n','GATEWAYSERVICEPRINCIPALID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('gatewayServicePrincipalId')),''')\n','KEYVAULTDNSSUFFIX=$(base64 -d \u003c\u003c\u003c''',base64(parameters('keyvaultDNSSuffix')),''')\n','KEYVAULTPREFIX=$(base64 -d \u003c\u003c\u003c''',base64(parameters('keyvaultPrefix')),''')\n','MDMFRONTENDURL=$(base64 -d \u003c\u003c\u003c''',base64(parameters('mdmFrontendUrl')),''')\n','MDSDENVIRONMENT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('mdsdEnvironment')),''')\n','PORTALACCESSGROUPIDS=$(base64 -d \u003c\u003c\u003c''',base64(parameters('portalAccessGroupIds')),''')\n','PORTALCLIENTID=$(base64 -d \u003c\u003c\u003c''',base64(parameters('portalClientId')),''')\n','PORTALELEVATEDGROUPIDS=$(base64 -d \u003c\u003c\u003c''',base64(parameters('portalElevatedGroupIds')),''')\n','RPFEATURES=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpFeatures')),''')\n','RPIMAGE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpImage')),''')\n','RPMDMACCOUNT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpMdmAccount')),''')\n','RPMDSDACCOUNT=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpMdsdAccount')),''')\n','RPMDSDCONFIGVERSION=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpMdsdConfigVersion')),''')\n','RPMDSDNAMESPACE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpMdsdNamespace')),''')\n','RPPARENTDOMAINNAME=$(base64 -d \u003c\u003c\u003c''',base64(parameters('rpParentDomainName')),''')\n','CLUSTERSINSTALLVIAHIVE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clustersInstallViaHive')),''')\n','CLUSTERSADOPTBYHIVE=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clustersAdoptByHive')),''')\n','CLUSTERDEFAULTINSTALLERPULLSPEC=$(base64 -d \u003c\u003c\u003c''',base64(parameters('clusterDefaultInstallerPullspec')),''')\n','USECHECKACCESS=$(base64 -d \u003c\u003c\u003c''',base64(parameters('useCheckAccess')),''')\n','ADMINAPICABUNDLE=''',parameters('adminApiCaBundle'),'''\n','ARMAPICABUNDLE=''',parameters('armApiCaBundle'),'''\n','MDMIMAGE=''/genevamdm:2.2024.328.1744-c5fb79-20240328t1935''\n','LOCATION=$(base64 -d \u003c\u003c\u003c''',base64(resourceGroup().location),''')\n','SUBSCRIPTIONID=$(base64 -d \u003c\u003c\u003c''',base64(subscription().subscriptionId),''')\n','RESOURCEGROUPNAME=$(base64 -d \u003c\u003c\u003c''',base64(resourceGroup().name),''')\n','\n',base64ToString('#!/bin/bash

set -o errexit \
    -o nounset

if [ "${DEBUG:-false}" == true ]; then
    set -x
fi

main() {
    # transaction attempt retry time in seconds
    local -ri retry_wait_time=60

    # shellcheck source=commonVMSS.sh
    source commonVMSS.sh

    create_required_dirs
    configure_sshd
    configure_rpm_repos retry_wait_time

    local -ar exclude_pkgs=(
        "-x WALinuxAgent"
        "-x WALinuxAgent-udev"
    )

    dnf_update_pkgs exclude_pkgs retry_wait_time

    local -ra rpm_keys=(
        https://dl.fedoraproject.org/pub/epel/RPM-GPG-KEY-EPEL-8
        https://packages.microsoft.com/keys/microsoft.asc
    )

    rpm_import_keys rpm_keys retry_wait_time

    local -ra repo_rpm_pkgs=(
        https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm
    )

    dnf_install_pkgs repo_rpm_pkgs retry_wait_time

    local -ra install_pkgs=(
        clamav
        azsec-clamav
        azsec-monitor
        azure-cli
        azure-mdsd
        azure-security
        podman
        podman-docker
        openssl-perl
        # hack - we are installing python3 on hosts due to an issue with Azure Linux Extensions https://github.com/Azure/azure-linux-extensions/pull/1505
        python3
    )

    dnf_install_pkgs install_pkgs retry_wait_time
    configure_dnf_cron_job
    configure_disk_partitions

    # Key dictates the filename written in /etc/logrotate.d
    # Present for future dropin files, also is required for configure_logrotate
    local -rA logrotate_dropins=()
    configure_logrotate logrotate_dropins
    configure_selinux

    local -ra enable_ports=(
        "443/tcp"
        "444/tcp"
        "445/tcp"
        "2222/tcp"
    )

    configure_firewalld_rules enable_ports

    local -r mdmimage="${RPIMAGE%%/*}/${MDMIMAGE##*/}"
    local -r rpimage="$RPIMAGE"
    local -r fluentbit_image="$FLUENTBITIMAGE"
    local -ra images=(
        "$mdmimage"
        "$rpimage"
        "$fluentbit_image"
    )
	local -r registry_config_file=""
    pull_container_images images registry_config_file

    local -r fluentbit_conf_file="[INPUT]
Name systemd
Tag journald
Systemd_Filter _COMM=aro
DB /var/lib/fluent/journaldb

[FILTER]
	Name modify
	Match journald
	Remove_wildcard _
	Remove TIMESTAMP

[FILTER]
	Name rewrite_tag
	Match journald
	Rule $LOGKIND asyncqos asyncqos true

[FILTER]
	Name modify
	Match asyncqos
	Remove CLIENT_PRINCIPAL_NAME
	Remove FILE
	Remove COMPONENT

[FILTER]
	Name rewrite_tag
	Match journald
	Rule $LOGKIND ifxaudit ifxaudit false

[OUTPUT]
	Name forward
	Match *
	Port 29230"

    configure_service_fluentbit fluentbit_conf_file fluentbit_image
    local -r monitor_role="rp"
    configure_service_mdm monitor_role mdmimage
    configure_timers_mdm_mdsd monitor_role
    configure_service_aro_rp

    configure_service_dbtoken rpimage
    configure_service_aro_monitor rpimage
    configure_service_aro_portal rpimage
    local -r mdsd_rp_version="$RPMDSDCONFIGVERSION"
    configure_service_mdsd monitor_role mdsd_rp_version

    configure_certs monitor_role

    local -ra aro_services=(
        "aro-dbtoken"
        "aro-monitor"
        "aro-portal"
        "aro-rp"
        "auoms"
        "azsecd"
        "azsecmond"
        "mdsd"
        "mdm"
        "chronyd"
        "fluentbit"
        "download-mdsd-credentials.timer"
        "download-mdm-credentials.timer"
    )

    enable_services aro_services

    reboot_vm
}

# configure_service_aro_rp
configure_service_aro_rp() {
    log "starting"

    local -r aro_rp_conf_filename='/etc/sysconfig/aro-rp'
    local -r aro_rp_conf_file="ACR_RESOURCE_ID='$ACRRESOURCEID'
ADMIN_API_CLIENT_CERT_COMMON_NAME='$ADMINAPICLIENTCERTCOMMONNAME'
ARM_API_CLIENT_CERT_COMMON_NAME='$ARMAPICLIENTCERTCOMMONNAME'
AZURE_ARM_CLIENT_ID='$ARMCLIENTID'
AZURE_FP_CLIENT_ID='$FPCLIENTID'
AZURE_FP_SERVICE_PRINCIPAL_ID='$FPSERVICEPRINCIPALID'
BILLING_E2E_STORAGE_ACCOUNT_ID='$BILLINGE2ESTORAGEACCOUNTID'
CLUSTER_MDM_ACCOUNT='$CLUSTERMDMACCOUNT'
CLUSTER_MDM_NAMESPACE=RP
CLUSTER_MDSD_ACCOUNT='$CLUSTERMDSDACCOUNT'
CLUSTER_MDSD_CONFIG_VERSION='$CLUSTERMDSDCONFIGVERSION'
CLUSTER_MDSD_NAMESPACE='$CLUSTERMDSDNAMESPACE'
DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME'
DOMAIN_NAME='$LOCATION.$CLUSTERPARENTDOMAINNAME'
GATEWAY_DOMAINS='$GATEWAYDOMAINS'
GATEWAY_RESOURCEGROUP='$GATEWAYRESOURCEGROUPNAME'
KEYVAULT_PREFIX='$KEYVAULTPREFIX'
MDM_ACCOUNT='$RPMDMACCOUNT'
MDM_NAMESPACE=RP
MDSD_ENVIRONMENT='$MDSDENVIRONMENT'
RP_FEATURES='$RPFEATURES'
RPIMAGE='$RPIMAGE'
ARO_INSTALL_VIA_HIVE='$CLUSTERSINSTALLVIAHIVE'
ARO_HIVE_DEFAULT_INSTALLER_PULLSPEC='$CLUSTERDEFAULTINSTALLERPULLSPEC'
ARO_ADOPT_BY_HIVE='$CLUSTERSADOPTBYHIVE'
USE_CHECKACCESS='$USECHECKACCESS'"

    write_file aro_rp_conf_filename aro_rp_conf_file true

    local -r aro_rp_service_filename='/etc/systemd/system/aro-rp.service'
    local -r aro_rp_service_file="[Unit]
After=network-online.target
Wants=network-online.target

[Service]
EnvironmentFile=/etc/sysconfig/aro-rp
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStart=/usr/bin/docker run \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -e ACR_RESOURCE_ID \
  -e ADMIN_API_CLIENT_CERT_COMMON_NAME \
  -e ARM_API_CLIENT_CERT_COMMON_NAME \
  -e AZURE_ARM_CLIENT_ID \
  -e AZURE_FP_CLIENT_ID \
  -e BILLING_E2E_STORAGE_ACCOUNT_ID \
  -e CLUSTER_MDM_ACCOUNT \
  -e CLUSTER_MDM_NAMESPACE \
  -e CLUSTER_MDSD_ACCOUNT \
  -e CLUSTER_MDSD_CONFIG_VERSION \
  -e CLUSTER_MDSD_NAMESPACE \
  -e DATABASE_ACCOUNT_NAME \
  -e DOMAIN_NAME \
  -e GATEWAY_DOMAINS \
  -e GATEWAY_RESOURCEGROUP \
  -e KEYVAULT_PREFIX \
  -e MDM_ACCOUNT \
  -e MDM_NAMESPACE \
  -e MDSD_ENVIRONMENT \
  -e RP_FEATURES \
  -e ARO_INSTALL_VIA_HIVE \
  -e ARO_HIVE_DEFAULT_INSTALLER_PULLSPEC \
  -e ARO_ADOPT_BY_HIVE \
  -e USE_CHECKACCESS \
  -m 2g \
  -p 443:8443 \
  -v /etc/aro-rp:/etc/aro-rp \
  -v /run/systemd/journal:/run/systemd/journal \
  -v /var/etw:/var/etw:z \
  $RPIMAGE \
  rp
ExecStop=/usr/bin/docker stop -t 3600 %N
TimeoutStopSec=3600
Restart=always
RestartSec=1
StartLimitInterval=0

[Install]
WantedBy=multi-user.target"

    write_file aro_rp_service_filename aro_rp_service_file true
}

# configure_service_aro_monitor
configure_service_aro_monitor() {
    local -n image="$1"
    log "starting"
    log "configuring aro-monitor service"

    # DOMAIN_NAME, CLUSTER_MDSD_ACCOUNT, CLUSTER_MDSD_CONFIG_VERSION, GATEWAY_DOMAINS, GATEWAY_RESOURCEGROUP, MDSD_ENVIRONMENT CLUSTER_MDSD_NAMESPACE
    # are not used, but can't easily be refactored out. Should be revisited in the future.
    local -r aro_monitor_service_conf_filename='/etc/sysconfig/aro-monitor'
    local -r aro_monitor_service_conf_file="AZURE_FP_CLIENT_ID='$FPCLIENTID'
DOMAIN_NAME='$LOCATION.$CLUSTERPARENTDOMAINNAME'
CLUSTER_MDSD_ACCOUNT='$CLUSTERMDSDACCOUNT'
CLUSTER_MDSD_CONFIG_VERSION='$CLUSTERMDSDCONFIGVERSION'
GATEWAY_DOMAINS='$GATEWAYDOMAINS'
GATEWAY_RESOURCEGROUP='$GATEWAYRESOURCEGROUPNAME'
MDSD_ENVIRONMENT='$MDSDENVIRONMENT'
CLUSTER_MDSD_NAMESPACE='$CLUSTERMDSDNAMESPACE'
CLUSTER_MDM_ACCOUNT='$CLUSTERMDMACCOUNT'
CLUSTER_MDM_NAMESPACE=BBM
DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME'
KEYVAULT_PREFIX='$KEYVAULTPREFIX'
MDM_ACCOUNT='$RPMDMACCOUNT'
MDM_NAMESPACE=BBM
RPIMAGE='$image'"

    write_file aro_monitor_service_conf_filename aro_monitor_service_conf_file true

    local -r aro_monitor_service_filename='/etc/systemd/system/aro-monitor.service'
    local -r aro_monitor_service_file="[Unit]
After=network-online.target
Wants=network-online.target

[Service]
EnvironmentFile=/etc/sysconfig/aro-monitor
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStart=/usr/bin/docker run \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -e AZURE_FP_CLIENT_ID \
  -e DOMAIN_NAME \
  -e CLUSTER_MDSD_ACCOUNT \
  -e CLUSTER_MDSD_CONFIG_VERSION \
  -e GATEWAY_DOMAINS \
  -e GATEWAY_RESOURCEGROUP \
  -e MDSD_ENVIRONMENT \
  -e CLUSTER_MDSD_NAMESPACE \
  -e CLUSTER_MDM_ACCOUNT \
  -e CLUSTER_MDM_NAMESPACE \
  -e DATABASE_ACCOUNT_NAME \
  -e KEYVAULT_PREFIX \
  -e MDM_ACCOUNT \
  -e MDM_NAMESPACE \
  -m 2.5g \
  -v /run/systemd/journal:/run/systemd/journal \
  -v /var/etw:/var/etw:z \
  $image \
  monitor
Restart=always
RestartSec=1
StartLimitInterval=0

[Install]
WantedBy=multi-user.target"

    write_file aro_monitor_service_filename aro_monitor_service_file true
}

# configure_service_aro_portal
configure_service_aro_portal() {
    local -n image="$1"
    log "starting"

    local -r aro_portal_service_conf_filename='/etc/sysconfig/aro-portal'
    local -r aro_portal_service_conf_file="AZURE_PORTAL_ACCESS_GROUP_IDS='$PORTALACCESSGROUPIDS'
AZURE_PORTAL_CLIENT_ID='$PORTALCLIENTID'
AZURE_PORTAL_ELEVATED_GROUP_IDS='$PORTALELEVATEDGROUPIDS'
DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME'
KEYVAULT_PREFIX='$KEYVAULTPREFIX'
MDM_ACCOUNT='$RPMDMACCOUNT'
MDM_NAMESPACE=Portal
PORTAL_HOSTNAME='$LOCATION.admin.$RPPARENTDOMAINNAME'
RPIMAGE='$image'"

    write_file aro_portal_service_conf_filename aro_portal_service_conf_file true

    local -r aro_portal_service_filename='/etc/systemd/system/aro-portal.service'
    local -r aro_portal_service_file="[Unit]
After=network-online.target
Wants=network-online.target
StartLimitInterval=0

[Service]
EnvironmentFile=/etc/sysconfig/aro-portal
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStart=/usr/bin/docker run \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -e AZURE_PORTAL_ACCESS_GROUP_IDS \
  -e AZURE_PORTAL_CLIENT_ID \
  -e AZURE_PORTAL_ELEVATED_GROUP_IDS \
  -e DATABASE_ACCOUNT_NAME \
  -e KEYVAULT_PREFIX \
  -e MDM_ACCOUNT \
  -e MDM_NAMESPACE \
  -e PORTAL_HOSTNAME \
  -m 2g \
  -p 444:8444 \
  -p 2222:2222 \
  -v /run/systemd/journal:/run/systemd/journal \
  -v /var/etw:/var/etw:z \
  $image \
  portal
Restart=always
RestartSec=1

[Install]
WantedBy=multi-user.target"

    write_file aro_portal_service_filename aro_portal_service_file true
}

# configure_service_aro_dbtoken
configure_service_dbtoken() {
    local -n image="$1"
    log "starting"

    local -r conf_file="DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME'
AZURE_DBTOKEN_CLIENT_ID='$DBTOKENCLIENTID'
AZURE_GATEWAY_SERVICE_PRINCIPAL_ID='$GATEWAYSERVICEPRINCIPALID'
KEYVAULT_PREFIX='$KEYVAULTPREFIX'
MDM_ACCOUNT='$RPMDMACCOUNT'
MDM_NAMESPACE=DBToken
RPIMAGE='$image'"

    local -r conf_filename='/etc/sysconfig/aro-dbtoken'

    write_file conf_filename conf_file true

    local -r service_file="[Unit]
After=network-online.target
Wants=network-online.target

[Service]
EnvironmentFile=/etc/sysconfig/aro-dbtoken
ExecStartPre=-/usr/bin/docker rm -f %N
ExecStart=/usr/bin/docker run \
  --hostname %H \
  --name %N \
  --rm \
  --cap-drop net_raw \
  -e AZURE_GATEWAY_SERVICE_PRINCIPAL_ID \
  -e DATABASE_ACCOUNT_NAME \
  -e AZURE_DBTOKEN_CLIENT_ID \
  -e KEYVAULT_PREFIX \
  -e MDM_ACCOUNT \
  -e MDM_NAMESPACE \
  -m 2g \
  -p 445:8445 \
  -v /run/systemd/journal:/run/systemd/journal \
  -v /var/etw:/var/etw:z \
  $image \
  dbtoken
ExecStop=/usr/bin/docker stop -t 3600 %N
TimeoutStopSec=3600
Restart=always
RestartSec=1
StartLimitInterval=0

[Install]
WantedBy=multi-user.target"

    local -r service_filename='/etc/systemd/system/aro-dbtoken.service'
    write_file service_filename service_file true
}


export AZURE_CLOUD_NAME="${AZURECLOUDNAME:?"Failed to carry over variables"}"

main "$@"
')))]" } } } diff --git a/pkg/deploy/generator/scripts/commonVMSS.sh b/pkg/deploy/generator/scripts/commonVMSS.sh new file mode 100644 index 00000000000..6f54ced7354 --- /dev/null +++ b/pkg/deploy/generator/scripts/commonVMSS.sh @@ -0,0 +1,726 @@ +#!/bin/bash +# This file is intended to be sourced by bootstrapping scripts for commonly used functions + +# retry Adding retry logic to yum commands in order to avoid stalling out on resource locks +retry() { + local -n cmd_retry="$1" + local -n wait_time="$2" + + for attempt in {1..5}; do + log "attempt #${attempt} - ${FUNCNAME[2]}" + ${cmd_retry[@]} & + + wait $! && break + if [[ ${attempt} -lt 5 ]]; then + sleep "$wait_time" + else + abort "attempt #${attempt} - Failed to update packages" + fi + done +} + +# dnf_install_pkgs +dnf_install_pkgs() { + local -n pkgs="$1" + log "starting" + + local -ra cmd=( + dnf + -y + install + ${pkgs[@]} + ) + + log "Attempting to install packages: ${pkgs[*]}" + retry cmd "$2" +} + +# We need to configure PasswordAuthentication to yes in order for the VMSS Access JIT to work +configure_sshd() { + log "starting" + local sshd_config="/etc/ssh/sshd_config" + + log "Editing $sshd_config to allow password authentication" + sed -i 's/PasswordAuthentication no/PasswordAuthentication yes/g' "$sshd_config" + + systemctl reload sshd.service || abort "sshd failed to reload" +} + +# dnf_update_pkgs +dnf_update_pkgs() { + local -n excludes="$1" + log "starting" + + local -ra cmd=( + dnf + -y + ${excludes[@]} + update + --allowerasing + ) + + log "Updating all packages excluding ${excludes[*]}" + retry cmd "$2" +} + +# rpm_import_keys +rpm_import_keys() { + local -n keys="$1" + log "starting" + + + # shellcheck disable=SC2068 + for key in ${keys[@]}; do + if [ ${#keys[@]} -eq 0 ]; then + break + fi + local -a cmd=( + rpm + --import + -v + "$key" + ) + + log "attempt #$attempt - importing rpm repository key $key" + retry cmd "$2" && unset key + done +} + +# configure_selinux +configure_selinux() { + log "starting" + + local -r relabel="${1:-false}" + + already_defined_ignore_error="File context for /var/log/journal(/.*)? already defined" + semanage fcontext -a -t var_log_t "/var/log/journal(/.*)?" || log "$already_defined_ignore_error" + chcon -R system_u:object_r:var_log_t:s0 /var/opt/microsoft/linuxmonagent + + if "$relabel"; then + restorecon -RF /var/log/* || log "$already_defined_ignore_error" + fi +} + +# configure_firewalld_rules +configure_firewalld_rules() { + local -n ports="$1" + log "starting" + + # https://access.redhat.com/security/cve/cve-2020-13401 + local -r prefix="/etc/sysctl.d" + local -r disable_accept_ra_conf_filename="$prefix/02-disable-accept-ra.conf" + local -r disable_accept_ra_conf_file="net.ipv6.conf.all.accept_ra=0" + + write_file disable_accept_ra_conf_filename disable_accept_ra_conf_file true + + local -r disable_core_filename="$prefix/01-disable-core.conf" + local -r disable_core_file="kernel.core_pattern = |/bin/true + " + write_file disable_core_filename disable_core_file true + + sysctl --system + + log "Enabling ports ${ports[*]} on default firewalld zone" + # shellcheck disable=SC2068 + for port in ${ports[@]}; do + log "Enabling port $port now" + firewall-cmd "--add-port=$port" + done + + firewall-cmd --runtime-to-permanent +} + +# configure_logrotate clobbers /etc/logrotate.conf +# args: +# 1) dropin_files - associative array. Key name dictates filenames written to /etc/logrotate.d. +# If an empty array is provided, no files will be written +configure_logrotate() { + local -n dropin_files="$1" + log "starting" + + local -r logrotate_conf_filename='/etc/logrotate.conf' + local -r logrotate_conf_file='# see "man logrotate" for details +# rotate log files weekly +weekly + +# keep 2 weeks worth of backlogs +rotate 2 + +# create new (empty) log files after rotating old ones +create + +# use date as a suffix of the rotated file +dateext + +# uncomment this if you want your log files compressed +compress + +# RPM packages drop log rotation information into this directory +include /etc/logrotate.d + +# no packages own wtmp and btmp -- we will rotate them here +/var/log/wtmp { + monthly + create 0664 root utmp + minsize 1M + rotate 1 +} + +/var/log/btmp { + missingok + monthly + create 0600 root utmp + rotate 1 +}' + + write_file logrotate_conf_filename logrotate_conf_file true + + local -r logrotate_d="/etc/logrotate.d" + log "Writing logrotate files to $logrotate_d" + for dropin_name in "${!dropin_files[@]}"; do + local -r dropin_filename="$logrotate_d/$dropin_name" + local -r dropin_file="${dropin_files["$dropin_name"]}" + write_file dropin_filename dropin_file true + done +} + +# pull_container_images +pull_container_images() { + local -n pull_images="$1" + local -n registry_conf="${2:-empty}" + local -r az_login="${3:-true}" + log "starting" + + # The managed identity that the VM runs as only has a single roleassignment. + # This role assignment is ACRPull which is not necessarily present in the + # subscription we're deploying into. If the identity does not have any + # role assignments scoped on the subscription we're deploying into, it will + # not show on az login -i, which is why the below line is commented. + # az account set -s "$SUBSCRIPTIONID" + if $az_login; then + az login -i --allow-no-subscriptions + fi + + # Suppress emulation output for podman instead of docker for az acr compatability + mkdir -p /etc/containers/ + mkdir -p /root/.docker + touch /etc/containers/nodocker + + # This name is used in the case that az acr login searches for this in it's environment + local -r REGISTRY_AUTH_FILE="/root/.docker/config.json" + + if [[ -n $registry_conf ]]; then + write_file REGISTRY_AUTH_FILE registry_conf true + fi + + log "logging into prod acr" + if $az_login; then + az acr login --name "$(sed -e 's|.*/||' <<<"$ACRRESOURCEID")" + fi + + # shellcheck disable=SC2068 + for i in ${pull_images[@]}; do + log "Pulling image $i now" + podman pull "$i" + done + + if $az_login; then + az logout + fi +} + +# enable_services enables all services required for aro rp +enable_services() { + local -n services="$1" + log "starting" + + systemctl daemon-reload + + log "enabling services ${services[*]}" + # shellcheck disable=SC2068 + for service in ${services[@]}; do + log "Enabling $service now" + systemctl enable "$service" + done +} + +# write_file +# Args +# 1) filename - string +# 2) file_contents - string +# 3) clobber - boolean; optional - defaults to false +write_file() { + local -n filename="$1" + local -n file_contents="$2" + local -r clobber="${3:-false}" + + if $clobber; then + log "Overwriting file $filename" + echo "$file_contents" > "$filename" + else + log "Appending to $filename" + echo "$file_contents" >> "$filename" + fi +} + +# reboot_vm restores all selinux file contexts, waits 30 seconds then reboots +reboot_vm() { + log "starting" + + configure_selinux "true" + (sleep 30 && log "rebooting vm now"; reboot) & +} + +# log is a wrapper for echo that includes the function name +log() { + local -r msg="${1:-"log message is empty"}" + local -r stack_level="${2:-1}" + echo "${FUNCNAME[${stack_level}]}: ${msg}" +} + +# abort is a wrapper for log that exits with an error code +abort() { + local -ri origin_stacklevel=2 + log "${1}" "$origin_stacklevel" + log "Exiting" + exit 1 +} + +# configure_rpm_repos +# New repositories should be added in their own functions, and called here +# args: +# 1) retry_wait_time - nameref +configure_rpm_repos() { + log "starting" + + configure_rhui_repo "$1" + create_azure_rpm_repos +} + +# create_azure_rpm_repos creates /etc/yum.repos.d/azure.repo repository file +create_azure_rpm_repos() { + log "starting" + + local -r azure_repo_filename='/etc/yum.repos.d/azure.repo' + local -r azure_repo_file='[azure-cli] +name=azure-cli +baseurl=https://packages.microsoft.com/yumrepos/azure-cli +enabled=yes +gpgcheck=yes + +[azurecore] +name=azurecore +baseurl=https://packages.microsoft.com/yumrepos/azurecore +enabled=yes +gpgcheck=no' + + write_file azure_repo_filename azure_repo_file true +} + +# configure_rhui_repo enables all rhui-microsoft-azure* repos +# args: +# 1) retry_wait_time - nameref +configure_rhui_repo() { + log "starting" + + local -ra cmd=( + dnf + update + -y + --disablerepo='*' + --enablerepo='rhui-microsoft-azure*' + ) + + log "running RHUI package updates" + retry cmd "$1" +} + +configure_dnf_cron_job() { + log "Starting" + local -r cron_weekly_dnf_update_filename='/etc/cron.weekly/dnfupdate' + local -r cron_weekly_dnf_update_file="#!/bin/bash +dnf update -y" + + write_file cron_weekly_dnf_update_filename cron_weekly_dnf_update_file true + chmod +x "$cron_weekly_dnf_update_filename" +} + +# configure_disk_partitions +configure_disk_partitions() { + log "starting" + log "extending partition table" + + # Linux block devices are inconsistently named + # it's difficult to tie the lvm pv to the physical disk using /dev/disk files, which is why lvs is used here + physical_disk="$(lvs -o devices -a | head -n2 | tail -n1 | cut -d ' ' -f 3 | cut -d \( -f 1 | tr -d '[:digit:]')" + growpart "$physical_disk" 2 + + log "extending filesystems" + log "extending root lvm" + lvextend -l +20%FREE /dev/rootvg/rootlv + log "growing root filesystem" + xfs_growfs / + + log "extending var lvm" + lvextend -l +100%FREE /dev/rootvg/varlv + log "growing var filesystem" + xfs_growfs /var +} + +# configure_certs +configure_certs() { + local -n role="$1" + log "starting" + log "Configuring certificates for $role" + + if [ "$role" == "devproxy" ]; then + local -r proxy_certs_basedir="/etc/proxy" + mkdir -p "$proxy_certs_basedir" + base64 -d <<<"$PROXYCERT" > "$proxy_certs_basedir/proxy.crt" + base64 -d <<<"$PROXYKEY" > "$proxy_certs_basedir/proxy.key" + base64 -d <<<"$PROXYCLIENTCERT" > "$proxy_certs_basedir/proxy-client.crt" + chown -R 1000:1000 /etc/proxy + chmod 0600 "$proxy_certs_basedir/proxy.key" + return 0 + fi + + if [ "$role" == "rp" ]; then + local -r rp_certs_basedir="/etc/aro-rp" + mkdir -p + base64 -d <<<"$ADMINAPICABUNDLE" > "$rp_certs_basedir/admin-ca-bundle.pem" + if [[ -n "$ARMAPICABUNDLE" ]]; then + base64 -d <<<"$ARMAPICABUNDLE" > "$rp_certs_basedir/arm-ca-bundle.pem" + fi + chown -R 1000:1000 "$rp_certs_basedir" + fi + + # setting MONITORING_GCS_AUTH_ID_TYPE=AuthKeyVault seems to have caused mdsd not + # to honour SSL_CERT_FILE any more, heaven only knows why. + local -r ssl_certs_basedir="/usr/lib/ssl/certs" + mkdir -p + csplit -f "$ssl_certs_basedir/cert-" -b %03d.pem /etc/pki/tls/certs/ca-bundle.crt /^$/1 "{*}" >/dev/null + c_rehash "$ssl_certs_basedir" + + # we leave clientId blank as long as only 1 managed identity assigned to vmss + # if we have more than 1, we will need to populate with clientId used for off-node scanning + local -r nodescan_agent_filename="/etc/default/vsa-nodescan-agent.config" + local -r nodescan_agent_file="{ + \"Nice\": 19, + \"Timeout\": 10800, + \"ClientId\": \"\", + \"TenantId\": $AZURESECPACKVSATENANTID, + \"QualysStoreBaseUrl\": $AZURESECPACKQUALYSURL, + \"ProcessTimeout\": 300, + \"CommandDelay\": 0 + }" + + write_file nodescan_agent_filename nodescan_agent_file true +} + +# configure_service_mdm +configure_service_mdm() { + local -n role="$1" + local -n image="$2" + log "starting" + log "configuring mdm service" + + local -r sysconfig_mdm_filename="/etc/sysconfig/mdm" + local -r sysconfig_mdm_file="MDMFRONTENDURL='$MDMFRONTENDURL' +MDMIMAGE='$image' +MDMSOURCEENVIRONMENT='$LOCATION' +MDMSOURCEROLE='$role' +MDMSOURCEROLEINSTANCE=\"$(hostname)\"" + + write_file sysconfig_mdm_filename sysconfig_mdm_file true + + mkdir -p /var/etw + local -r mdm_service_filename="/etc/systemd/system/mdm.service" + local -r mdm_service_file="[Unit] +After=network-online.target +Wants=network-online.target + +[Service] +EnvironmentFile=/etc/sysconfig/mdm +ExecStartPre=-/usr/bin/docker rm -f %N +ExecStart=/usr/bin/docker run \ + --entrypoint /usr/sbin/MetricsExtension \ + --hostname %H \ + --name %N \ + --rm \ + --cap-drop net_raw \ + -m 2g \ + -v /etc/mdm.pem:/etc/mdm.pem \ + -v /var/etw:/var/etw:z \ + $image \ + -CertFile /etc/mdm.pem \ + -FrontEndUrl $MDMFRONTENDURL \ + -Logger Console \ + -LogLevel Warning \ + -PrivateKeyFile /etc/mdm.pem \ + -SourceEnvironment $MDMSOURCEENVIRONMENT \ + -SourceRole $MDMSOURCEROLE \ + -SourceRoleInstance $MDMSOURCEROLEINSTANCE +ExecStop=/usr/bin/docker stop %N +Restart=always +RestartSec=1 +StartLimitInterval=0 + +[Install] +WantedBy=multi-user.target" + + write_file mdm_service_filename mdm_service_file true +} + +# configure_timers_mdm_mdsd +configure_timers_mdm_mdsd() { + local -n component="$1" + log "starting" + + for var in "mdsd" "mdm"; do + local download_creds_service_filename="/etc/systemd/system/download-$var-credentials.service" + local download_creds_service_file="[Unit] +Description=Periodic $var credentials refresh + +[Service] +Type=oneshot +ExecStart=/usr/local/bin/download-credentials.sh $var" + + write_file download_creds_service_filename download_creds_service_file true + + local download_creds_timer_filename="/etc/systemd/system/download-$var-credentials.timer" + local download_creds_timer_file="[Unit] +Description=Periodic $var credentials refresh +After=network-online.target +Wants=network-online.target + +[Timer] +OnBootSec=0min +OnCalendar=0/12:00:00 +AccuracySec=5s + +[Install] +WantedBy=timers.target" + + write_file download_creds_timer_filename download_creds_timer_file true + done + + local -r download_creds_script_filename="/usr/local/bin/download-credentials.sh" + local -r download_creds_script_file="#!/bin/bash +set -eu + +COMPONENT=\$1 +echo \"Download \$COMPONENT credentials\" + +TEMP_DIR=\"\$(mktemp -d)\" +export AZURE_CONFIG_DIR=\"\$(mktemp -d)\" + +echo \"Logging into Azure...\" +RETRIES=3 +while [[ \$RETRIES -gt 0 ]]; do + if az login -i --allow-no-subscriptions + then + echo \"az login successful\" + break + else + echo \"az login failed. Retrying...\" + let RETRIES-=1 + sleep 5 + fi +done + +trap \"cleanup\" EXIT + +cleanup() { + az logout + [[ \$TEMP_DIR =~ /tmp/.+ ]] && rm -rf \$TEMP_DIR + [[ \$AZURE_CONFIG_DIR =~ /tmp/.+ ]] && rm -rf \$AZURE_CONFIG_DIR +} + +if [[ \$COMPONENT = \"mdm\" ]]; then + CURRENT_CERT_FILE=\"/etc/mdm.pem\" +elif [[ \$COMPONENT = \"mdsd\" ]]; then + CURRENT_CERT_FILE=\"/var/lib/waagent/Microsoft.Azure.KeyVault.Store/mdsd.pem\" +else + echo Invalid usage && exit 1 +fi + +SECRET_NAME=\"$component-\${COMPONENT}\" +NEW_CERT_FILE=\"\$TEMP_DIR/\$COMPONENT.pem\" +for attempt in {1..5}; do + az keyvault \ + secret \ + download \ + --file \"\$NEW_CERT_FILE\" \ + --id \"https://$KEYVAULTPREFIX-$component.$KEYVAULTDNSSUFFIX/secrets/\$SECRET_NAME\" \ + && break + if [[ \$attempt -lt 5 ]]; then sleep 10; else exit 1; fi +done + +if [ -f \$NEW_CERT_FILE ]; then + if [[ \$COMPONENT = \"mdsd\" ]]; then + chown syslog:syslog \$NEW_CERT_FILE + else + sed -i -ne '1,/END CERTIFICATE/ p' \$NEW_CERT_FILE + fi + + new_cert_sn=\"\$(openssl x509 -in \"\$NEW_CERT_FILE\" -noout -serial | awk -F= '{print \$2}')\" + current_cert_sn=\"\$(openssl x509 -in \"\$CURRENT_CERT_FILE\" -noout -serial | awk -F= '{print \$2}')\" + if [[ ! -z \$new_cert_sn ]] && [[ \$new_cert_sn != \"\$current_cert_sn\" ]]; then + echo updating certificate for \$COMPONENT + chmod 0600 \$NEW_CERT_FILE + mv \$NEW_CERT_FILE \$CURRENT_CERT_FILE + fi +else + echo Failed to refresh certificate for \$COMPONENT && exit 1 +fi" + + write_file download_creds_script_filename download_creds_script_file true + + chmod u+x /usr/local/bin/download-credentials.sh + + $download_creds_script_filename mdsd + $download_creds_script_filename mdm + + local -r MDSDCERTIFICATESAN="$(openssl x509 -in /var/lib/waagent/Microsoft.Azure.KeyVault.Store/mdsd.pem -noout -subject | sed -e 's/.*CN = //')" + local -r watch_mdm_creds_service_filename="/etc/systemd/system/watch-mdm-credentials.service" + local -r watch_mdm_creds_service_file="[Unit] +Description=Watch for changes in mdm.pem and restarts the mdm service + +[Service] +Type=oneshot +ExecStart=/usr/bin/systemctl restart mdm.service + +[Install] +WantedBy=multi-user.target" + + write_file watch_mdm_creds_service_filename watch_mdm_creds_service_file true + + local -r watch_mdm_creds_path_filename='/etc/systemd/system/watch-mdm-credentials.path' + local -r watch_mdm_creds_path_file='[Path] +PathModified=/etc/mdm.pem + +[Install] +WantedBy=multi-user.target' + + write_file watch_mdm_creds_path_filename watch_mdm_creds_path_file true + + local -r watch_mdm_creds='watch-mdm-credentials.path' + systemctl enable "$watch_mdm_creds" || abort "failed to enable $watch_mdm_creds" + systemctl start "$watch_mdm_creds" || abort "failed to start $watch_mdm_creds" +} + +# configure_service_fluentbit +configure_service_fluentbit() { + local -n conf_file="$1" + local -n image="$2" + log "starting" + log "configuring fluentbit service" + + mkdir -p /etc/fluentbit/ + mkdir -p /var/lib/fluent + + local -r conf_filename='/etc/fluentbit/fluentbit.conf' + write_file conf_filename conf_file true + + local -r sysconfig_filename='/etc/sysconfig/fluentbit' + local -r sysconfig_file="FLUENTBITIMAGE=$fluentbit_image" + + write_file sysconfig_filename sysconfig_file true + + local -r service_filename='/etc/systemd/system/fluentbit.service' + local -r service_file="[Unit] +After=network-online.target +Wants=network-online.target +StartLimitIntervalSec=0 + +[Service] +RestartSec=1s +EnvironmentFile=/etc/sysconfig/fluentbit +ExecStartPre=-/usr/bin/docker rm -f %N +ExecStart=/usr/bin/docker run \ + --security-opt label=disable \ + --entrypoint /opt/td-agent-bit/bin/td-agent-bit \ + --net=host \ + --hostname %H \ + --name %N \ + --rm \ + --cap-drop net_raw \ + -v /etc/fluentbit/fluentbit.conf:/etc/fluentbit/fluentbit.conf \ + -v /var/lib/fluent:/var/lib/fluent:z \ + -v /var/log/journal:/var/log/journal:ro \ + -v /etc/machine-id:/etc/machine-id:ro \ + $image \ + -c /etc/fluentbit/fluentbit.conf + +ExecStop=/usr/bin/docker stop %N +Restart=always +RestartSec=5 +StartLimitInterval=0 + +[Install] +WantedBy=multi-user.target" + + write_file service_filename service_file true +} + +# configure_service_mdsd +configure_service_mdsd() { + local -n monitoring_role="$1" + local -n monitor_config_version="$2" + log "starting" + + local -r mdsd_service_dir="/etc/systemd/system/mdsd.service.d" + mkdir -p "$mdsd_service_dir" + + local -r mdsd_override_conf_filename="$mdsd_service_dir/override.conf" + local -r mdsd_override_conf_file="[Unit] +After=network-online.target" + + write_file mdsd_override_conf_filename mdsd_override_conf_file true + + local -r default_mdsd_filename="/etc/default/mdsd" + local -r default_mdsd_file="MDSD_ROLE_PREFIX=/var/run/mdsd/default +MDSD_OPTIONS=\"-A -d -r \$MDSD_ROLE_PREFIX\" + +export MONITORING_GCS_ENVIRONMENT='$MDSDENVIRONMENT' +export MONITORING_GCS_ACCOUNT='$RPMDSDACCOUNT' +export MONITORING_GCS_REGION='$LOCATION' +export MONITORING_GCS_AUTH_ID_TYPE=AuthKeyVault +export MONITORING_GCS_AUTH_ID='$MDSDCERTIFICATESAN' +export MONITORING_GCS_NAMESPACE='$RPMDSDNAMESPACE' +export MONITORING_CONFIG_VERSION='$monitor_config_version' +export MONITORING_USE_GENEVA_CONFIG_SERVICE=true + +export MONITORING_TENANT='$LOCATION' +export MONITORING_ROLE='$monitoring_role' +export MONITORING_ROLE_INSTANCE=\"$(hostname)\" + +export MDSD_MSGPACK_SORT_COLUMNS=1\"" + + write_file default_mdsd_filename default_mdsd_file true +} + +# run_azsecd_config_scan +run_azsecd_config_scan() { + log "starting" + + local -ar configs=( + "baseline" + "clamav" + "software" + ) + + log "Scanning configuration files ${configs[*]}" + # shellcheck disable=SC2068 + for scan in ${configs[@]}; do + log "Scanning config file $scan now" + /usr/local/bin/azsecd config -s "$scan" -d P1D + done +} + +create_required_dirs() { + mkdir -p /var/log/journal + mkdir -p /var/lib/waagent/Microsoft.Azure.KeyVault.Store + # Does not exist on devProxyVMSS + mkdir -p /var/opt/microsoft/linuxmonagent +} diff --git a/pkg/deploy/generator/scripts/devProxyVMSS.sh b/pkg/deploy/generator/scripts/devProxyVMSS.sh index 2b405881bce..23aab382c85 100644 --- a/pkg/deploy/generator/scripts/devProxyVMSS.sh +++ b/pkg/deploy/generator/scripts/devProxyVMSS.sh @@ -8,319 +8,69 @@ if [ "${DEBUG:-false}" == true ]; then fi main() { - parse_run_options "$@" - - configure_and_install_dnf_pkgs_repos - - configure_firewalld_rules - pull_container_images - configure_system_services - reboot_vm -} - -usage() { - local -n options="$1" - log "$(basename "$0") [$options] - -p Configure rpm repositories, import required rpm keys, update & install packages with dnf - -f Configure firewalld default zone rules - -u Configure systemd unit files for ARO RP - -i Pull container images - - Note: steps will be executed in the order that flags are provided - " -} - -# parse_run_options takes all arguements passed to main and parses them -# allowing individual step(s) to be ran, rather than all steps -# -# This is useful for local testing, or possibly modifying the bootstrap execution via environment variables in the deployment pipeline -parse_run_options() { - # shellcheck disable=SC2206 - local -a options=(${1:-}) - if [ "${#options[@]}" -eq 0 ]; then - log "Running all steps" - return 0 - fi - - local OPTIND - local -r allowed_options="pfui" - while getopts ${allowed_options} options; do - case "${options}" in - p) - log "Running step configure_and_install_dnf_pkgs_repos" - configure_and_install_dnf_pkgs_repos - ;; - f) - log "Running configure_firewalld_rules" - configure_firewalld_rules - ;; - u) - log "Running pull_container_images & configure_system_services" - configure_system_services - ;; - i) - log "Running pull_container_images" - pull_container_images - ;; - *) - usage allowed_options - abort "Unkown option provided" - ;; - esac - done - - exit 0 -} - -# configure_and_install_dnf_pkgs_repos -configure_and_install_dnf_pkgs_repos() { - log "starting" - # transaction attempt retry time in seconds local -ri retry_wait_time=60 - configure_rhui_repo retry_wait_time + + # shellcheck source=commonVMSS.sh + source commonVMSS.sh + + create_required_dirs local -ar exclude_pkgs=( "-x WALinuxAgent" "-x WALinuxAgent-udev" ) - dnf_update_pkgs exclude_pkgs retry_wait_time - - local -ra repo_rpm_pkgs=( - https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm - ) + dnf_update_pkgs pkgs_to_exclude retry_wait_time local -ra install_pkgs=( podman podman-docker ) - dnf_install_pkgs repo_rpm_pkgs retry_wait_time dnf_install_pkgs install_pkgs retry_wait_time - - local -r cron_weekly_dnf_update_filename='/etc/cron.weekly/dnfupdate' - local -r cron_weekly_dnf_update_file="#!/bin/bash -dnf update -y" - - write_file cron_weekly_dnf_update_filename cron_weekly_dnf_update_file true - chmod +x "$cron_weekly_dnf_update_filename" -} - -# configure_rhui_repo -configure_rhui_repo() { - log "starting" - - local -ra cmd=( - dnf - update - -y - --disablerepo='*' - --enablerepo='rhui-microsoft-azure*' - ) - - log "running RHUI package updates" - retry cmd "$1" -} - -# retry Adding retry logic to yum commands in order to avoid stalling out on resource locks -retry() { - local -n cmd_retry="$1" - local -n wait_time="$2" - - for attempt in {1..5}; do - log "attempt #${attempt} - ${FUNCNAME[2]}" - ${cmd_retry[@]} & - - wait $! && break - if [[ ${attempt} -lt 5 ]]; then - sleep "$wait_time" - else - abort "attempt #${attempt} - Failed to update packages" - fi - done -} - -# dnf_update_pkgs -dnf_update_pkgs() { - local -n excludes="$1" - log "starting" - - local -ra cmd=( - dnf - -y - ${excludes[@]} - update - --allowerasing - ) - - log "Updating all packages" - retry cmd "$2" -} - -# dnf_install_pkgs -dnf_install_pkgs() { - local -n pkgs="$1" - log "starting" - - local -ra cmd=( - dnf - -y - install - ${pkgs[@]} - ) - - log "Attempting to install packages: ${pkgs[*]}" - retry cmd "$2" -} - -# configure_logrotate clobbers /etc/logrotate.conf -configure_logrotate() { - log "starting" - - local -r logrotate_conf_filename='/etc/logrotate.conf' - local -r logrotate_conf_file='# see "man logrotate" for details -# rotate log files weekly -weekly - -# keep 2 weeks worth of backlogs -rotate 2 - -# create new (empty) log files after rotating old ones -create - -# use date as a suffix of the rotated file -dateext - -# uncomment this if you want your log files compressed -compress - -# RPM packages drop log rotation information into this directory -include /etc/logrotate.d - -# no packages own wtmp and btmp -- we will rotate them here -/var/log/wtmp { - monthly - create 0664 root utmp - minsize 1M - rotate 1 -} - -/var/log/btmp { - missingok - monthly - create 0600 root utmp - rotate 1 -}' - - write_file logrotate_conf_filename logrotate_conf_file true -} - -# configure_firewalld_rules -configure_firewalld_rules() { - log "starting" - - # https://access.redhat.com/security/cve/cve-2020-13401 - local -r prefix="/etc/sysctl.d" - local -r disable_accept_ra_conf_filename="$prefix/02-disable-accept-ra.conf" - local -r disable_accept_ra_conf_file="net.ipv6.conf.all.accept_ra=0" - - write_file disable_accept_ra_conf_filename disable_accept_ra_conf_file true - - local -r disable_core_filename="$prefix/01-disable-core.conf" - local -r disable_core_file="kernel.core_pattern = |/bin/true - " - write_file disable_core_filename disable_core_file true - - sysctl --system + configure_dnf_cron_job local -ra enable_ports=( "443/tcp" ) - log "Enabling ports ${enable_ports[*]} on default firewalld zone" - # shellcheck disable=SC2068 - for port in ${enable_ports[@]}; do - log "Enabling port $port now" - firewall-cmd "--add-port=$port" - done - - firewall-cmd --runtime-to-permanent -} - -# pull_container_images -pull_container_images() { - log "starting" - - # The managed identity that the VM runs as only has a single roleassignment. - # This role assignment is ACRPull which is not necessarily present in the - # subscription we're deploying into. If the identity does not have any - # role assignments scoped on the subscription we're deploying into, it will - # not show on az login -i, which is why the below line is commented. - # az account set -s "$SUBSCRIPTIONID" - az login -i --allow-no-subscriptions + configure_firewalld_rules enable_ports - # Suppress emulation output for podman instead of docker for az acr compatability - mkdir -p /etc/containers/ - mkdir -p /root/.docker - touch /etc/containers/nodocker - - # This name is used in the case that az acr login searches for this in it's environment - local -r REGISTRY_AUTH_FILE="/root/.docker/config.json" + local -ra proxy_images=("$PROXYIMAGE") local -r registry_config_file="{ - "auths": { - \"${PROXYIMAGE%%/*}\": { - \"auth\": \"$PROXYIMAGEAUTH\" - } - }" - - write_file REGISTRY_AUTH_FILE registry_config_file true + \"auths\": { + \"${proxy_images[0]%%/*}\": { + \"auth\": \"$PROXYIMAGEAUTH\" + } + } +}" - log "logging into prod acr" + pull_container_images proxy_image registry_config_file false + configure_devproxy_services proxy_images - az acr login --name "$(sed -e 's|.*/||' <<<"$ACRRESOURCEID")" + local -r vmss_role="devproxy" + configure_certs vmss_role - docker pull "$PROXYIMAGE" + local -ra proxy_services=( + proxy + ) - az logout + enable_services proxy_services + reboot_vm } # configure_system_services creates, configures, and enables the following systemd services and timers # services # proxy -configure_system_services() { - configure_service_proxy -} - -# enable_aro_services enables all services required for aro rp -enable_aro_services() { - log "starting" - - local -ra aro_services=( - proxy - ) - log "enabling aro services ${aro_services[*]}" - # shellcheck disable=SC2068 - for service in ${aro_services[@]}; do - log "Enabling $service now" - systemctl enable "$service.service" - done -} - -# configure_certs -configure_certs() { - log "starting" - - base64 -d <<<"$PROXYCERT" >/etc/proxy/proxy.crt - base64 -d <<<"$PROXYKEY" >/etc/proxy/proxy.key - base64 -d <<<"$PROXYCLIENTCERT" >/etc/proxy/proxy-client.crt - chown -R 1000:1000 /etc/proxy - chmod 0600 /etc/proxy/proxy.key +configure_devproxy_services() { + configure_service_proxy "$1" } configure_service_proxy() { + local -n proxy_image="$1" local -r sysconfig_proxy_filename='/etc/sysconfig/proxy' - local -r sysconfig_proxy_file="PROXY_IMAGE='$PROXYIMAGE'" + local -r sysconfig_proxy_file="PROXY_IMAGE='$proxy_image'" write_file sysconfig_proxy_filename sysconfig_proxy_file true @@ -332,7 +82,7 @@ Wants=network-online.target [Service] EnvironmentFile=/etc/sysconfig/proxy ExecStartPre=-/usr/bin/docker rm -f %n -ExecStart=/usr/bin/docker run --rm --name %n -p 443:8443 -v /etc/proxy:/secrets $PROXY_IMAGE +ExecStart=/usr/bin/docker run --rm --name %n -p 443:8443 -v /etc/proxy:/secrets $proxy_image ExecStop=/usr/bin/docker stop %n Restart=always RestartSec=1 @@ -341,9 +91,11 @@ StartLimitInterval=0 [Install] WantedBy=multi-user.target" + write_file proxy_service_filename proxy_service_file true + local -r cron_weekly_pull_image_filename='/etc/cron.weekly/pull-image' local -r cron_weekly_pull_image_file="#!/bin/bash -docker pull $PROXYIMAGE +docker pull $proxy_image systemctl restart proxy.service" write_file cron_weekly_pull_image_filename cron_weekly_pull_image_file true @@ -353,52 +105,10 @@ systemctl restart proxy.service" local -r cron_daily_restart_proxy_file="#!/bin/bash systemctl restart proxy.service" - write_file cron_daily_restart_proxy_filename cron_daily_restart_proxy_file + write_file cron_daily_restart_proxy_filename cron_daily_restart_proxy_file true chmod +x "$cron_daily_restart_proxy_filename" } -# write_file -# Args -# 1) filename - string -# 2) file_contents - string -# 3) clobber - boolean; optional - defaults to false -write_file() { - local -n filename="$1" - local -n file_contents="$2" - local -r clobber="${3:-false}" - - if $clobber; then - log "Overwriting file $filename" - echo "$file_contents" > "$filename" - else - log "Appending to $filename" - echo "$file_contents" >> "$filename" - fi -} - -# reboot_vm restores all selinux file contexts, waits 30 seconds then reboots -reboot_vm() { - log "starting" - - configure_selinux "true" - (sleep 30 && log "rebooting vm now"; reboot) & -} - -# log is a wrapper for echo that includes the function name -log() { - local -r msg="${1:-"log message is empty"}" - local -r stack_level="${2:-1}" - echo "${FUNCNAME[${stack_level}]}: ${msg}" -} - -# abort is a wrapper for log that exits with an error code -abort() { - local -ri origin_stacklevel=2 - log "${1}" "$origin_stacklevel" - log "Exiting" - exit 1 -} - export AZURE_CLOUD_NAME="${AZURECLOUDNAME:?"Failed to carry over variables"}" main "$@" diff --git a/pkg/deploy/generator/scripts/gatewayVMSS.sh b/pkg/deploy/generator/scripts/gatewayVMSS.sh index 64b4232309f..e24cd081142 100644 --- a/pkg/deploy/generator/scripts/gatewayVMSS.sh +++ b/pkg/deploy/generator/scripts/gatewayVMSS.sh @@ -8,124 +8,22 @@ if [ "${DEBUG:-false}" == true ]; then fi main() { - local -r gateway_logdir='/var/log/aro-gateway' - parse_run_options "$@" gateway_logdir + # transaction attempt retry time in seconds + local -ri retry_wait_time=60 + # shellcheck source=commonVMSS.sh + source commonVMSS.sh + create_required_dirs configure_sshd - configure_and_install_dnf_pkgs_repos - configure_disk_partitions - configure_logrotate gateway_logdir - configure_selinux - - mkdir -p /var/log/journal - mkdir -p /var/lib/waagent/Microsoft.Azure.KeyVault.Store - - configure_firewalld_rules - pull_container_images - configure_system_services gateway_logdir - reboot_vm -} - -usage() { - local -n options="$1" - log "$(basename "$0") [$options] - -d Configure Disk Partitions - -p Configure rpm repositories, import required rpm keys, update & install packages with dnf - -l Configure logrotate.conf - -s Make selinux modifications required for ARO RP - -r Configure sshd - Allow password authenticaiton - -f Configure firewalld default zone rules - -u Configure systemd unit files for ARO RP - -i Pull container images - - Note: steps will be executed in the order that flags are provided - " -} - -# parse_run_options takes all arguements passed to main and parses them -# allowing individual step(s) to be ran, rather than all steps -# -# This is useful for local testing, or possibly modifying the bootstrap execution via environment variables in the deployment pipeline -parse_run_options() { - # shellcheck disable=SC2206 - local -a options=(${1:-}) - if [ "${#options[@]}" -eq 0 ]; then - log "Running all steps" - return 0 - fi - - local OPTIND - local -r allowed_options="dplsrfui" - while getopts ${allowed_options} options; do - case "${options}" in - d) - log "Running step configure_disk_partitions" - configure_disk_partitions - ;; - p) - log "Running step configure_and_install_dnf_pkgs_repos" - configure_and_install_dnf_pkgs_repos - ;; - l) - log "Running configure_logrotate" - configure_logrotate "$2" - ;; - s) - log "Running configure_selinux" - configure_selinux - ;; - r) - log "Running configure_sshd" - configure_sshd - ;; - f) - log "Running configure_firewalld_rules" - configure_firewalld_rules - ;; - u) - log "Running pull_container_images & configure_system_services" - configure_system_services "$2" - ;; - i) - log "Running pull_container_images" - pull_container_images - ;; - *) - usage allowed_options - abort "Unkown option provided" - ;; - esac - done - - exit 0 -} - -# We need to configure PasswordAuthentication to yes in order for the VMSS Access JIT to work -configure_sshd() { - log "starting" - log "setting ssh password authentication" - sed -i 's/PasswordAuthentication no/PasswordAuthentication yes/g' /etc/ssh/sshd_config - - systemctl reload sshd.service - systemctl is-active --quiet sshd || abort "sshd failed to reload" -} - -# configure_and_install_dnf_pkgs_repos -configure_and_install_dnf_pkgs_repos() { - log "starting" - - # transaction attempt retry time in seconds - local -ri retry_wait_time=60 - configure_rhui_repo retry_wait_time - create_azure_rpm_repos retry_wait_time + configure_rpm_repos retry_wait_time local -ar exclude_pkgs=( "-x WALinuxAgent" "-x WALinuxAgent-udev" ) - dnf_update_pkgs exclude_pkgs retry_wait_time + dnf_update_pkgs pkgs_to_exclude retry_wait_time local -ra rpm_keys=( https://dl.fedoraproject.org/pub/epel/RPM-GPG-KEY-EPEL-8 @@ -138,6 +36,9 @@ configure_and_install_dnf_pkgs_repos() { https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm ) + dnf_install_pkgs repo_rpm_pkgs retry_wait_time + configure_dnf_cron_job + local -ra install_pkgs=( clamav azsec-clamav @@ -152,163 +53,12 @@ configure_and_install_dnf_pkgs_repos() { python3 ) - dnf_install_pkgs repo_rpm_pkgs retry_wait_time dnf_install_pkgs install_pkgs retry_wait_time -} - -# configure_rhui_repo -configure_rhui_repo() { - log "starting" - - local -ra cmd=( - dnf - update - -y - --disablerepo='*' - --enablerepo='rhui-microsoft-azure*' - ) - - log "running RHUI package updates" - retry cmd "$1" -} - -# retry Adding retry logic to yum commands in order to avoid stalling out on resource locks -retry() { - local -n cmd_retry="$1" - local -n wait_time="$2" - - for attempt in {1..5}; do - log "attempt #${attempt} - ${FUNCNAME[2]}" - ${cmd_retry[@]} & - - wait $! && break - if [[ ${attempt} -lt 5 ]]; then - sleep "$wait_time" - else - abort "attempt #${attempt} - Failed to update packages" - fi - done -} - -# dnf_update_pkgs -dnf_update_pkgs() { - local -n excludes="$1" - log "starting" - - local -ra cmd=( - dnf - -y - ${excludes[@]} - update - --allowerasing - ) - - log "Updating all packages" - retry cmd "$2" -} - -# dnf_install_pkgs -dnf_install_pkgs() { - local -n pkgs="$1" - log "starting" - - local -ra cmd=( - dnf - -y - install - ${pkgs[@]} - ) - - log "Attempting to install packages: ${pkgs[*]}" - retry cmd "$2" -} - -# rpm_import_keys -rpm_import_keys() { - local -n keys="$1" - log "starting" - - - # shellcheck disable=SC2068 - for key in ${keys[@]}; do - if [ ${#keys[@]} -eq 0 ]; then - break - fi - local -a cmd=( - rpm - --import - -v - "$key" - ) - - log "attempt #$attempt - importing rpm repository key $key" - retry cmd "$2" && unset key - done -} - -# configure_disk_partitions -configure_disk_partitions() { - log "starting" - log "extending partition table" - - # Linux block devices are inconsistently named - # it's difficult to tie the lvm pv to the physical disk using /dev/disk files, which is why lvs is used here - physical_disk="$(lvs -o devices -a | head -n2 | tail -n1 | cut -d ' ' -f 3 | cut -d \( -f 1 | tr -d '[:digit:]')" - growpart "$physical_disk" 2 - - log "extending filesystems" - log "extending root lvm" - lvextend -l +20%FREE /dev/rootvg/rootlv - log "growing root filesystem" - xfs_growfs / - - log "extending var lvm" - lvextend -l +100%FREE /dev/rootvg/varlv - log "growing var filesystem" - xfs_growfs /var -} - -# configure_logrotate clobbers /etc/logrotate.conf -configure_logrotate() { - local -n log_dir="$1" - log "starting" - - local -r logrotate_conf_filename='/etc/logrotate.conf' - local -r logrotate_conf_file="# see 'man logrotate' for details -# rotate log files weekly -weekly - -# keep 2 weeks worth of backlogs -rotate 2 - -# create new (empty) log files after rotating old ones -create - -# use date as a suffix of the rotated file -dateext - -# uncomment this if you want your log files compressed -compress - -# RPM packages drop log rotation information into this directory -include /etc/logrotate.d - -# no packages own wtmp and btmp -- we will rotate them here -/var/log/wtmp { - monthly - create 0664 root utmp - minsize 1M - rotate 1 -} -/var/log/btmp { - missingok - monthly - create 0600 root utmp - rotate 1 -} + configure_disk_partitions -# Maximum log directory size is 100G with this configuration + local -r gateway_logdir='/var/log/aro-gateway' + local -r gateway_log_file="# Maximum log directory size is 100G with this configuration # Setting limit to 100G to allow space for other logging services # copytruncate is a critical option used to prevent logs from being shipped twice ${log_dir} { @@ -320,157 +70,32 @@ ${log_dir} { compress }" - write_file logrotate_conf_filename logrotate_conf_file true -} - -# create_azure_rpm_repos creates /etc/yum.repos.d/azure.repo repository file -create_azure_rpm_repos() { - log "starting" - - local -r azure_repo_filename='/etc/yum.repos.d/azure.repo' - local -r azure_repo_file='[azure-cli] -name=azure-cli -baseurl=https://packages.microsoft.com/yumrepos/azure-cli -enabled=yes -gpgcheck=yes - -[azurecore] -name=azurecore -baseurl=https://packages.microsoft.com/yumrepos/azurecore -enabled=yes -gpgcheck=no' - - write_file azure_repo_filename azure_repo_file true -} - -# configure_selinux -configure_selinux() { - log "starting" - - local -r relabel="${1:-false}" - - already_defined_ignore_error="File context for /var/log/journal(/.*)? already defined" - semanage fcontext -a -t var_log_t "/var/log/journal(/.*)?" || log "$already_defined_ignore_error" - chcon -R system_u:object_r:var_log_t:s0 /var/opt/microsoft/linuxmonagent - - if "$relabel"; then - restorecon -RF /var/log/* || log "$already_defined_ignore_error" - fi -} - -# configure_firewalld_rules -configure_firewalld_rules() { - log "starting" - - # https://access.redhat.com/security/cve/cve-2020-13401 - local -r prefix="/etc/sysctl.d" - local -r disable_accept_ra_conf_filename="$prefix/02-disable-accept-ra.conf" - local -r disable_accept_ra_conf_file="net.ipv6.conf.all.accept_ra=0" - - write_file disable_accept_ra_conf_filename disable_accept_ra_conf_file true - - local -r disable_core_filename="$prefix/01-disable-core.conf" - local -r disable_core_file="kernel.core_pattern = |/bin/true - " - write_file disable_core_filename disable_core_file true + # Key dictates the filename written in /etc/logrotate.d + local -rA logrotate_dropins=( + ["gateway"]="$gateway_log_file" + ) - sysctl --system + configure_logrotate logrotate_dropins + configure_selinux local -ra enable_ports=( "80/tcp" "8081/tcp" "443/tcp" ) - - log "Enabling ports ${enable_ports[*]} on default firewalld zone" - # shellcheck disable=SC2068 - for port in ${enable_ports[@]}; do - log "Enabling port $port now" - firewall-cmd "--add-port=$port" - done - - firewall-cmd --runtime-to-permanent -} - -# pull_container_images -pull_container_images() { - log "starting" - - # The managed identity that the VM runs as only has a single roleassignment. - # This role assignment is ACRPull which is not necessarily present in the - # subscription we're deploying into. If the identity does not have any - # role assignments scoped on the subscription we're deploying into, it will - # not show on az login -i, which is why the below line is commented. - # az account set -s "$SUBSCRIPTIONID" - az login -i --allow-no-subscriptions - - # Suppress emulation output for podman instead of docker for az acr compatability - mkdir -p /etc/containers/ - mkdir -p /root/.docker - touch /etc/containers/nodocker - - # This name is used in the case that az acr login searches for this in it's environment - local -r REGISTRY_AUTH_FILE="/root/.docker/config.json" - - log "logging into prod acr" - az acr login --name "$(sed -e 's|.*/||' <<<"$ACRRESOURCEID")" - - MDMIMAGE="${RPIMAGE%%/*}/${MDMIMAGE##*/}" - docker pull "$MDMIMAGE" - docker pull "$RPIMAGE" - docker pull "$FLUENTBITIMAGE" - - az logout -} - -# configure_system_services creates, configures, and enables the following systemd services and timers -# services -# fluentbit -# mdm -# mdsd -# arp-rp -# aro-dbtoken -# aro-monitor -# aro-portal -configure_system_services() { - configure_service_fluentbit - configure_service_mdm - configure_timers_mdm_mdsd - configure_service_aro_gateway "$1" - configure_service_mdsd -} - -# enable_aro_services enables all services required for aro rp -enable_aro_services() { - log "starting" - - local -ra aro_services=( - aro-gateway - auoms - azsecd - azsecmond - mdsd - mdm - chronyd - fluentbit + configure_firewalld_rules enable_ports + + local -r mdmimage="${RPIMAGE%%/*}/${MDMIMAGE##*/}" + local -r rpimage="$RPIMAGE" + local -r fluentbit_image="$FLUENTBITIMAGE" + local -ra images=( + "$mdmimage" + "$rpimage" + "$fluentbit_image" ) - log "enabling gateway services ${aro_services[*]}" - # shellcheck disable=SC2068 - for service in ${aro_services[@]}; do - log "Enabling $service now" - systemctl enable "$service.service" - done -} -# configure_service_fluentbit -configure_service_fluentbit() { - log "starting" - log "configuring fluentbit service" + pull_container_images images registry_config_file - mkdir -p /etc/fluentbit/ - mkdir -p /var/lib/fluent - - local -r fluentbit_conf_filename='/etc/fluentbit/fluentbit.conf' local -r fluentbit_conf_file="[INPUT] Name systemd Tag journald @@ -488,277 +113,49 @@ DB /var/lib/fluent/journaldb Match * Port 29230" - write_file fluentbit_conf_filename fluentbit_conf_file true - - local -r sysconfig_fluentbit_filename='/etc/sysconfig/fluentbit' - local -r sysconfig_fluentbit_file="FLUENTBITIMAGE=$FLUENTBITIMAGE" - - write_file sysconfig_fluentbit_filename sysconfig_fluentbit_file true - - local -r fluentbit_service_filename='/etc/systemd/system/fluentbit.service' - - local -r fluentbit_service_file="[Unit] -After=network-online.target -Wants=network-online.target -StartLimitIntervalSec=0 - -[Service] -RestartSec=1s -EnvironmentFile=/etc/sysconfig/fluentbit -ExecStartPre=-/usr/bin/docker rm -f %N -ExecStart=/usr/bin/docker run \ - --security-opt label=disable \ - --entrypoint /opt/td-agent-bit/bin/td-agent-bit \ - --net=host \ - --hostname %H \ - --name %N \ - --rm \ - --cap-drop net_raw \ - -v /etc/fluentbit/fluentbit.conf:/etc/fluentbit/fluentbit.conf \ - -v /var/lib/fluent:/var/lib/fluent:z \ - -v /var/log/journal:/var/log/journal:ro \ - -v /etc/machine-id:/etc/machine-id:ro \ - $FLUENTBITIMAGE \ - -c /etc/fluentbit/fluentbit.conf - -ExecStop=/usr/bin/docker stop %N -Restart=always -RestartSec=5 -StartLimitInterval=0 - -[Install] -WantedBy=multi-user.target" - - write_file fluentbit_conf_filename fluentbit_conf_file true -} - -# configure_certs -configure_certs() { - log "starting" - - mkdir /etc/aro-rp - base64 -d <<<"$ADMINAPICABUNDLE" >/etc/aro-rp/admin-ca-bundle.pem - if [[ -n "$ARMAPICABUNDLE" ]]; then - base64 -d <<<"$ARMAPICABUNDLE" >/etc/aro-rp/arm-ca-bundle.pem - fi - chown -R 1000:1000 /etc/aro-rp - - # setting MONITORING_GCS_AUTH_ID_TYPE=AuthKeyVault seems to have caused mdsd not - # to honour SSL_CERT_FILE any more, heaven only knows why. - mkdir -p /usr/lib/ssl/certs - csplit -f /usr/lib/ssl/certs/cert- -b %03d.pem /etc/pki/tls/certs/ca-bundle.crt /^$/1 "{*}" >/dev/null - c_rehash /usr/lib/ssl/certs - -# we leave clientId blank as long as only 1 managed identity assigned to vmss -# if we have more than 1, we will need to populate with clientId used for off-node scanning - local -r nodescan_agent_filename="/etc/default/vsa-nodescan-agent.config" - local -r nodescan_agent_file="{ - \"Nice\": 19, - \"Timeout\": 10800, - \"ClientId\": \"\", - \"TenantId\": $AZURESECPACKVSATENANTID, - \"QualysStoreBaseUrl\": $AZURESECPACKQUALYSURL, - \"ProcessTimeout\": 300, - \"CommandDelay\": 0 - }" - - write_file nodescan_agent_filename nodescan_agent_file true -} - -# configure_service_mdm -configure_service_mdm() { - log "starting" - log "configuring mdm service" - - local -r sysconfig_mdm_filename="/etc/sysconfig/mdm" - local -r sysconfig_mdm_file="MDMFRONTENDURL='$MDMFRONTENDURL' -MDMIMAGE='$MDMIMAGE' -MDMSOURCEENVIRONMENT='$LOCATION' -MDMSOURCEROLE=gateway -MDMSOURCEROLEINSTANCE=\"$(hostname)\"" + configure_service_fluentbit fluentbit_conf_file fluentbit_image + local -r mdm_role="gateway" + configure_service_mdm mdm_role mdmimage - write_file sysconfig_mdm_filename sysconfig_mdm_file true - - mkdir -p /var/etw - local -r mdm_service_filename="/etc/systemd/system/mdm.service" - local -r mdm_service_file="[Unit] -After=network-online.target -Wants=network-online.target - -[Service] -EnvironmentFile=/etc/sysconfig/mdm -ExecStartPre=-/usr/bin/docker rm -f %N -ExecStart=/usr/bin/docker run \ - --entrypoint /usr/sbin/MetricsExtension \ - --hostname %H \ - --name %N \ - --rm \ - --cap-drop net_raw \ - -m 2g \ - -v /etc/mdm.pem:/etc/mdm.pem \ - -v /var/etw:/var/etw:z \ - $MDMIMAGE \ - -CertFile /etc/mdm.pem \ - -FrontEndUrl $MDMFRONTENDURL \ - -Logger Console \ - -LogLevel Warning \ - -PrivateKeyFile /etc/mdm.pem \ - -SourceEnvironment $MDMSOURCEENVIRONMENT \ - -SourceRole $MDMSOURCEROLE \ - -SourceRoleInstance $MDMSOURCEROLEINSTANCE -ExecStop=/usr/bin/docker stop %N -Restart=always -RestartSec=1 -StartLimitInterval=0 - -[Install] -WantedBy=multi-user.target" - - write_file mdm_service_filename mdm_service_file true -} - -# configure_timers_mdm_mdsd -configure_timers_mdm_mdsd() { - log "starting" - - for var in "mdsd" "mdm"; do - local download_creds_service_filename="/etc/systemd/system/download-$var-credentials.service" - local download_creds_service_file="[Unit] -Description=Periodic $var credentials refresh - -[Service] -Type=oneshot -ExecStart=/usr/local/bin/download-credentials.sh $var" - - write_file download_creds_service_filename download_creds_service_file true - - local download_creds_timer_filename="/etc/systemd/system/download-$var-credentials.timer" - local download_creds_timer_file="[Unit] -Description=Periodic $var credentials refresh -After=network-online.target -Wants=network-online.target - -[Timer] -OnBootSec=0min -OnCalendar=0/12:00:00 -AccuracySec=5s - -[Install] -WantedBy=timers.target" - - write_file download_creds_timer_filename download_creds_timer_file true - done - - local -r download_creds_script_filename="/usr/local/bin/download-credentials.sh" - local -r download_creds_script_file="#!/bin/bash -set -eu - -COMPONENT=\$1 -echo \"Download \$COMPONENT credentials\" - -TEMP_DIR=\"\$(mktemp -d)\" -export AZURE_CONFIG_DIR=\"\$(mktemp -d)\" - -echo \"Logging into Azure...\" -RETRIES=3 -while [[ \$RETRIES -gt 0 ]]; do - if az login -i --allow-no-subscriptions - then - echo \"az login successful\" - break - else - echo \"az login failed. Retrying...\" - let RETRIES-=1 - sleep 5 - fi -done - -trap \"cleanup\" EXIT - -cleanup() { - az logout - [[ \$TEMP_DIR =~ /tmp/.+ ]] && rm -rf \$TEMP_DIR - [[ \$AZURE_CONFIG_DIR =~ /tmp/.+ ]] && rm -rf \$AZURE_CONFIG_DIR -} - -if [[ \$COMPONENT = \"mdm\" ]]; then - CURRENT_CERT_FILE=\"/etc/mdm.pem\" -elif [[ \$COMPONENT\ = \"mdsd\" ]]; then - CURRENT_CERT_FILE=\"/var/lib/waagent/Microsoft.Azure.KeyVault.Store/mdsd.pem\" -else - echo Invalid usage && exit 1 -fi - -SECRET_NAME=\"gwy-\${COMPONENT}\" -NEW_CERT_FILE=\"\$TEMP_DIR/\$COMPONENT.pem\" -for attempt in {1..5}; do - az keyvault \ - secret \ - download \ - --file \"\$NEW_CERT_FILE\" \ - --id \"https://$KEYVAULTPREFIX-gwy.$KEYVAULTDNSSUFFIX/secrets/\$SECRET_NAME\" \ - && break - if [[ \$attempt -lt 5 ]]; then sleep 10; else exit 1; fi -done - -if [ -f \$NEW_CERT_FILE ]; then - if [[ \$COMPONENT = \"mdsd\" ]]; then - chown syslog:syslog \$NEW_CERT_FILE - else - sed -i -ne '1,/END CERTIFICATE/ p' \$NEW_CERT_FILE - fi - - new_cert_sn=\"\$(openssl x509 -in \"\$NEW_CERT_FILE\" -noout -serial | awk -F= '{print \$2}')\" - current_cert_sn=\"\$(openssl x509 -in \"\$CURRENT_CERT_FILE\" -noout -serial | awk -F= '{print \$2}')\" - if [[ ! -z \$new_cert_sn ]] && [[ \$new_cert_sn != \"\$current_cert_sn\" ]]; then - echo updating certificate for \$COMPONENT - chmod 0600 \$NEW_CERT_FILE - mv \$NEW_CERT_FILE \$CURRENT_CERT_FILE - fi -else - echo Failed to refresh certificate for \$COMPONENT && exit 1 -fi" - - write_file download_creds_script_filename download_creds_script_file true - - chmod u+x /usr/local/bin/download-credentials.sh - - systemctl enable download-mdsd-credentials.timer - systemctl enable download-mdm-credentials.timer - - /usr/local/bin/download-credentials.sh mdsd - /usr/local/bin/download-credentials.sh mdm - - local -r MDSDCERTIFICATESAN="$(openssl x509 -in /var/lib/waagent/Microsoft.Azure.KeyVault.Store/mdsd.pem -noout -subject | sed -e 's/.*CN = //')" - local -r watch_mdm_creds_service_filename="/etc/systemd/system/watch-mdm-credentials.service" - local -r watch_mdm_creds_service_file="[Unit] -Description=Watch for changes in mdm.pem and restarts the mdm service - -[Service] -Type=oneshot -ExecStart=/usr/bin/systemctl restart mdm.service - -[Install] -WantedBy=multi-user.target" - - write_file watch_mdm_creds_service_filename watch_mdm_creds_service_file true - - local -r watch_mdm_creds_path_filename='/etc/systemd/system/watch-mdm-credentials.path' - local -r watch_mdm_creds_path_file='[Path] -PathModified=/etc/mdm.pem - -[Install] -WantedBy=multi-user.target' + local -r gwy_dbtoken_service_conf_file="ACR_RESOURCE_ID='$ACRRESOURCEID' +DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME' +DOMAIN_NAME='$LOCATION.$CLUSTERPARENTDOMAINNAME' +AZURE_DBTOKEN_CLIENT_ID='$DBTOKENCLIENTID' +DBTOKEN_URL='$DBTOKENURL' +MDM_ACCOUNT='$RPMDMACCOUNT' +MDM_NAMESPACE=Gateway +GATEWAY_DOMAINS='$GATEWAYDOMAINS' +GATEWAY_FEATURES='$GATEWAYFEATURES' +RPIMAGE='$RPIMAGE'" + configure_service_gateway gateway_logdir + + local -r mdsd_config_version="$GATEWAYMDSDCONFIGVERSION" + configure_service_mdsd mdm_role mdsd_config_version + local -r mdsd_role="gwy" + configure_timers_mdm_mdsd mdsd_role + + configure_certs mdm_role + + local -ra gateway_services=( + "aro-gateway" + "auoms" + "azsecd" + "azsecmond" + "mdsd" + "mdm" + "chronyd" + "fluentbit" + "download-mdsd-credentials.timer" + "download-mdm-credentials.timer" + ) - write_file watch_mdm_creds_path_filename watch_mdm_creds_path_file true + enable_services gateway_services - local -r watch_mdm_creds='watch-mdm-credentials.path' - systemctl enable "$watch_mdm_creds" || abort "failed to enable $watch_mdm_creds" - systemctl start "$watch_mdm_creds" || abort "failed to start $watch_mdm_creds" + reboot_vm } # configure_service_aro_rp -configure_service_aro_gateway() { +configure_service_gateway() { local -n log_dir="$1" log "starting" @@ -827,7 +224,7 @@ ExecStart=/usr/bin/docker run \ -v /run/systemd/journal:/run/systemd/journal \ -v /var/etw:/var/etw:z \ -v ${log_dir}:/ctr.log:z \ - \$RPIMAGE \ + $RPIMAGE \ gateway ExecStop=/usr/bin/docker stop -t 3600 %N TimeoutStopSec=3600 @@ -842,162 +239,6 @@ WantedBy=multi-user.target write_file aro_gateway_service_filename aro_gateway_service_file true } -# configure_service_aro_dbtoken -configure_service_aro_dbtoken() { - log "starting" - - local -r aro_dbtoken_service_conf_filename='/etc/sysconfig/aro-dbtoken' - local -r aro_dbtoken_service_conf_file="ACR_RESOURCE_ID='$ACRRESOURCEID' -DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME' -AZURE_DBTOKEN_CLIENT_ID='$DBTOKENCLIENTID' -DBTOKEN_URL='$DBTOKENURL' -MDM_ACCOUNT='$RPMDMACCOUNT' -MDM_NAMESPACE=Gateway -GATEWAY_DOMAINS='$GATEWAYDOMAINS' -GATEWAY_FEATURES='$GATEWAYFEATURES' -RPIMAGE='$RPIMAGE'" - - write_file aro_dbtoken_service_conf_filename aro_dbtoken_service_conf_file true - - local -r aro_dbtoken_service_filename='/etc/systemd/system/aro-dbtoken.service' - local -r aro_dbtoken_service_file="[Unit] -After=network-online.target -Wants=network-online.target - -[Service] -EnvironmentFile=/etc/sysconfig/aro-gateway -ExecStartPre=-/usr/bin/docker rm -f %N -ExecStartPre=/usr/bin/mkdir -p ${gateway_logdir} -ExecStart=/usr/bin/docker run \ - --hostname %H \ - --name %N \ - --rm \ - --cap-drop net_raw \ - -e ACR_RESOURCE_ID \ - -e DATABASE_ACCOUNT_NAME \ - -e AZURE_DBTOKEN_CLIENT_ID \ - -e DBTOKEN_URL \ - -e GATEWAY_DOMAINS \ - -e GATEWAY_FEATURES \ - -e MDM_ACCOUNT \ - -e MDM_NAMESPACE \ - -m 2g \ - -p 80:8080 \ - -p 8081:8081 \ - -p 443:8443 \ - -v /run/systemd/journal:/run/systemd/journal \ - -v /var/etw:/var/etw:z \ - -v ${gateway_logdir}:/ctr.log:z \ - \$RPIMAGE \ - gateway -ExecStop=/usr/bin/docker stop -t 3600 %N -TimeoutStopSec=3600 -Restart=always -RestartSec=1 -StartLimitInterval=0 - -[Install] -WantedBy=multi-user.target" - - write_file aro_dbtoken_service_filename aro_dbtoken_service_file true -} - -# configure_service_mdsd -configure_service_mdsd() { - log "starting" - - local -r mdsd_service_dir="/etc/systemd/system/mdsd.service.d" - mkdir "$mdsd_service_dir" - - local -r mdsd_override_conf_filename="$mdsd_service_dir/override.conf" - local -r mdsd_override_conf_file="[Unit] -After=network-online.target" - - write_file mdsd_override_conf_filename mdsd_override_conf_file true - - local -r default_mdsd_filename="/etc/default/mdsd" - local -r default_mdsd_file="MDSD_ROLE_PREFIX=/var/run/mdsd/default -MDSD_OPTIONS=\"-A -d -r \$MDSD_ROLE_PREFIX\" - -export MONITORING_GCS_ENVIRONMENT='$MDSDENVIRONMENT' -export MONITORING_GCS_ACCOUNT='$RPMDSDACCOUNT' -export MONITORING_GCS_REGION='$LOCATION' -export MONITORING_GCS_AUTH_ID_TYPE=AuthKeyVault -export MONITORING_GCS_AUTH_ID='$MDSDCERTIFICATESAN' -export MONITORING_GCS_NAMESPACE='$RPMDSDNAMESPACE' -export MONITORING_CONFIG_VERSION='$GATEWAYMDSDCONFIGVERSION' -export MONITORING_USE_GENEVA_CONFIG_SERVICE=true - -export MONITORING_TENANT='$LOCATION' -export MONITORING_ROLE=gateway -export MONITORING_ROLE_INSTANCE=\"$(hostname)\" - -export MDSD_MSGPACK_SORT_COLUMNS=1\"" - - write_file default_mdsd_filename default_mdsd_file true - -} - -# run_azsecd_config_scan -run_azsecd_config_scan() { - log "starting" - - local -ar configs=( - "baseline" - "clamav" - "software" - ) - - log "Scanning configuration files ${configs[*]}" - # shellcheck disable=SC2068 - for scan in ${configs[@]}; do - log "Scanning config file $scan now" - /usr/local/bin/azsecd config -s "$scan" -d P1D - done -} - -# write_file -# Args -# 1) filename - string -# 2) file_contents - string -# 3) clobber - boolean; optional - defaults to false -write_file() { - local -n filename="$1" - local -n file_contents="$2" - local -r clobber="${3:-false}" - - if $clobber; then - log "Overwriting file $filename" - echo "$file_contents" > "$filename" - else - log "Appending to $filename" - echo "$file_contents" >> "$filename" - fi -} - -# reboot_vm restores all selinux file contexts, waits 30 seconds then reboots -reboot_vm() { - log "starting" - - configure_selinux "true" - (sleep 30 && log "rebooting vm now"; reboot) & -} - -# log is a wrapper for echo that includes the function name -log() { - local -r msg="${1:-"log message is empty"}" - local -r stack_level="${2:-1}" - echo "${FUNCNAME[${stack_level}]}: ${msg}" -} - -# abort is a wrapper for log that exits with an error code -abort() { - local -ri origin_stacklevel=2 - log "${1}" "$origin_stacklevel" - log "Exiting" - exit 1 -} - export AZURE_CLOUD_NAME="${AZURECLOUDNAME:?"Failed to carry over variables"}" main "$@" diff --git a/pkg/deploy/generator/scripts/rpVMSS.sh b/pkg/deploy/generator/scripts/rpVMSS.sh index 3c00da1185c..dfe02052521 100644 --- a/pkg/deploy/generator/scripts/rpVMSS.sh +++ b/pkg/deploy/generator/scripts/rpVMSS.sh @@ -8,116 +8,15 @@ if [ "${DEBUG:-false}" == true ]; then fi main() { - parse_run_options "$@" + # transaction attempt retry time in seconds + local -ri retry_wait_time=60 + # shellcheck source=commonVMSS.sh + source commonVMSS.sh + create_required_dirs configure_sshd - configure_and_install_dnf_pkgs_repos - configure_disk_partitions - configure_logrotate - configure_selinux - - mkdir -p /var/log/journal - mkdir -p /var/lib/waagent/Microsoft.Azure.KeyVault.Store - - configure_firewalld_rules - pull_container_images - configure_system_services - reboot_vm -} - -usage() { - local -n options="$1" - log "$(basename "$0") [$options] - -d Configure Disk Partitions - -p Configure rpm repositories, import required rpm keys, update & install packages with dnf - -l Configure logrotate.conf - -s Make selinux modifications required for ARO RP - -r Configure sshd - Allow password authenticaiton - -f Configure firewalld default zone rules - -u Configure systemd unit files for ARO RP - -i Pull container images - - Note: steps will be executed in the order that flags are provided - " -} - -# parse_run_options takes all arguements passed to main and parses them -# allowing individual step(s) to be ran, rather than all steps -# -# This is useful for local testing, or possibly modifying the bootstrap execution via environment variables in the deployment pipeline -parse_run_options() { - # shellcheck disable=SC2206 - local -a options=(${1:-}) - if [ "${#options[@]}" -eq 0 ]; then - log "Running all steps" - return 0 - fi - - local OPTIND - local -r allowed_options="dplsrfui" - while getopts ${allowed_options} options; do - case "${options}" in - d) - log "Running step configure_disk_partitions" - configure_disk_partitions - ;; - p) - log "Running step configure_and_install_dnf_pkgs_repos" - configure_and_install_dnf_pkgs_repos - ;; - l) - log "Running configure_logrotate" - configure_logrotate - ;; - s) - log "Running configure_selinux" - configure_selinux - ;; - r) - log "Running configure_sshd" - configure_sshd - ;; - f) - log "Running configure_firewalld_rules" - configure_firewalld_rules - ;; - u) - log "Running pull_container_images & configure_system_services" - configure_system_services - ;; - i) - log "Running pull_container_images" - pull_container_images - ;; - *) - usage allowed_options - abort "Unkown option provided" - ;; - esac - done - - exit 0 -} - -# We need to configure PasswordAuthentication to yes in order for the VMSS Access JIT to work -configure_sshd() { - log "starting" - log "setting ssh password authentication" - sed -i 's/PasswordAuthentication no/PasswordAuthentication yes/g' /etc/ssh/sshd_config - - systemctl reload sshd.service - systemctl is-active --quiet sshd || abort "sshd failed to reload" -} - -# configure_and_install_dnf_pkgs_repos -configure_and_install_dnf_pkgs_repos() { - log "starting" - - # transaction attempt retry time in seconds - local -ri retry_wait_time=60 - configure_rhui_repo retry_wait_time - create_azure_rpm_repos retry_wait_time + configure_rpm_repos retry_wait_time local -ar exclude_pkgs=( "-x WALinuxAgent" @@ -137,6 +36,8 @@ configure_and_install_dnf_pkgs_repos() { https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm ) + dnf_install_pkgs repo_rpm_pkgs retry_wait_time + local -ra install_pkgs=( clamav azsec-clamav @@ -151,216 +52,15 @@ configure_and_install_dnf_pkgs_repos() { python3 ) - dnf_install_pkgs repo_rpm_pkgs retry_wait_time dnf_install_pkgs install_pkgs retry_wait_time -} - -# configure_rhui_repo -configure_rhui_repo() { - log "starting" - - local -ra cmd=( - dnf - update - -y - --disablerepo='*' - --enablerepo='rhui-microsoft-azure*' - ) - - log "running RHUI package updates" - retry cmd "$1" -} - -# retry Adding retry logic to yum commands in order to avoid stalling out on resource locks -retry() { - local -n cmd_retry="$1" - local -n wait_time="$2" - - for attempt in {1..5}; do - log "attempt #${attempt} - ${FUNCNAME[2]}" - ${cmd_retry[@]} & - - wait $! && break - if [[ ${attempt} -lt 5 ]]; then - sleep "$wait_time" - else - abort "attempt #${attempt} - Failed to update packages" - fi - done -} - -# dnf_update_pkgs -dnf_update_pkgs() { - local -n excludes="$1" - log "starting" - - local -ra cmd=( - dnf - -y - ${excludes[@]} - update - --allowerasing - ) - - log "Updating all packages" - retry cmd "$2" -} - -# dnf_install_pkgs -dnf_install_pkgs() { - local -n pkgs="$1" - log "starting" - - local -ra cmd=( - dnf - -y - install - ${pkgs[@]} - ) - - log "Attempting to install packages: ${pkgs[*]}" - retry cmd "$2" -} - -# rpm_import_keys -rpm_import_keys() { - local -n keys="$1" - log "starting" - - - # shellcheck disable=SC2068 - for key in ${keys[@]}; do - if [ ${#keys[@]} -eq 0 ]; then - break - fi - local -a cmd=( - rpm - --import - -v - "$key" - ) - - log "attempt #$attempt - importing rpm repository key $key" - retry cmd "$2" && unset key - done -} - -# configure_disk_partitions -configure_disk_partitions() { - log "starting" - log "extending partition table" - - # Linux block devices are inconsistently named - # it's difficult to tie the lvm pv to the physical disk using /dev/disk files, which is why lvs is used here - physical_disk="$(lvs -o devices -a | head -n2 | tail -n1 | cut -d ' ' -f 3 | cut -d \( -f 1 | tr -d '[:digit:]')" - growpart "$physical_disk" 2 - - log "extending filesystems" - log "extending root lvm" - lvextend -l +20%FREE /dev/rootvg/rootlv - log "growing root filesystem" - xfs_growfs / - - log "extending var lvm" - lvextend -l +100%FREE /dev/rootvg/varlv - log "growing var filesystem" - xfs_growfs /var -} - -# configure_logrotate clobbers /etc/logrotate.conf -configure_logrotate() { - log "starting" - - local -r logrotate_conf_filename='/etc/logrotate.conf' - local -r logrotate_conf_file='# see "man logrotate" for details -# rotate log files weekly -weekly - -# keep 2 weeks worth of backlogs -rotate 2 - -# create new (empty) log files after rotating old ones -create - -# use date as a suffix of the rotated file -dateext - -# uncomment this if you want your log files compressed -compress - -# RPM packages drop log rotation information into this directory -include /etc/logrotate.d - -# no packages own wtmp and btmp -- we will rotate them here -/var/log/wtmp { - monthly - create 0664 root utmp - minsize 1M - rotate 1 -} - -/var/log/btmp { - missingok - monthly - create 0600 root utmp - rotate 1 -}' - - write_file logrotate_conf_filename logrotate_conf_file true -} - -# create_azure_rpm_repos creates /etc/yum.repos.d/azure.repo repository file -create_azure_rpm_repos() { - log "starting" - - local -r azure_repo_filename='/etc/yum.repos.d/azure.repo' - local -r azure_repo_file='[azure-cli] -name=azure-cli -baseurl=https://packages.microsoft.com/yumrepos/azure-cli -enabled=yes -gpgcheck=yes - -[azurecore] -name=azurecore -baseurl=https://packages.microsoft.com/yumrepos/azurecore -enabled=yes -gpgcheck=no' - - write_file azure_repo_filename azure_repo_file true -} - -# configure_selinux -configure_selinux() { - log "starting" - - local -r relabel="${1:-false}" - - already_defined_ignore_error="File context for /var/log/journal(/.*)? already defined" - semanage fcontext -a -t var_log_t "/var/log/journal(/.*)?" || log "$already_defined_ignore_error" - chcon -R system_u:object_r:var_log_t:s0 /var/opt/microsoft/linuxmonagent - - if "$relabel"; then - restorecon -RF /var/log/* || log "$already_defined_ignore_error" - fi -} - -# configure_firewalld_rules -configure_firewalld_rules() { - log "starting" - - # https://access.redhat.com/security/cve/cve-2020-13401 - local -r prefix="/etc/sysctl.d" - local -r disable_accept_ra_conf_filename="$prefix/02-disable-accept-ra.conf" - local -r disable_accept_ra_conf_file="net.ipv6.conf.all.accept_ra=0" - - write_file disable_accept_ra_conf_filename disable_accept_ra_conf_file true - - local -r disable_core_filename="$prefix/01-disable-core.conf" - local -r disable_core_file="kernel.core_pattern = |/bin/true - " - write_file disable_core_filename disable_core_file true + configure_dnf_cron_job + configure_disk_partitions - sysctl --system + # Key dictates the filename written in /etc/logrotate.d + # Present for future dropin files, also is required for configure_logrotate + local -rA logrotate_dropins=() + configure_logrotate logrotate_dropins + configure_selinux local -ra enable_ports=( "443/tcp" @@ -369,101 +69,19 @@ configure_firewalld_rules() { "2222/tcp" ) - log "Enabling ports ${enable_ports[*]} on default firewalld zone" - # shellcheck disable=SC2068 - for port in ${enable_ports[@]}; do - log "Enabling port $port now" - firewall-cmd "--add-port=$port" - done - - firewall-cmd --runtime-to-permanent -} - -# pull_container_images -pull_container_images() { - log "starting" - - # The managed identity that the VM runs as only has a single roleassignment. - # This role assignment is ACRPull which is not necessarily present in the - # subscription we're deploying into. If the identity does not have any - # role assignments scoped on the subscription we're deploying into, it will - # not show on az login -i, which is why the below line is commented. - # az account set -s "$SUBSCRIPTIONID" - az login -i --allow-no-subscriptions - - # Suppress emulation output for podman instead of docker for az acr compatability - mkdir -p /etc/containers/ - mkdir -p /root/.docker - touch /etc/containers/nodocker - - # This name is used in the case that az acr login searches for this in it's environment - local -r REGISTRY_AUTH_FILE="/root/.docker/config.json" - - log "logging into prod acr" - az acr login --name "$(sed -e 's|.*/||' <<<"$ACRRESOURCEID")" - - MDMIMAGE="${RPIMAGE%%/*}/${MDMIMAGE##*/}" - docker pull "$MDMIMAGE" - docker pull "$RPIMAGE" - docker pull "$FLUENTBITIMAGE" - - az logout -} + configure_firewalld_rules enable_ports -# configure_system_services creates, configures, and enables the following systemd services and timers -# services -# fluentbit -# mdm -# mdsd -# arp-rp -# aro-dbtoken -# aro-monitor -# aro-portal -configure_system_services() { - configure_service_fluentbit - configure_service_mdm - configure_timers_mdm_mdsd - configure_service_aro_rp - configure_service_aro_dbtoken - configure_service_aro_monitor - configure_service_aro_portal - configure_service_mdsd -} - -# enable_aro_services enables all services required for aro rp -enable_aro_services() { - log "starting" - - local -ra aro_services=( - "aro-dbtoken" - "aro-monitor" - "aro-portal" - "aro-rp" - "auoms" - "azsecd" - "azsecmond" - "mdsd" - "mdm" - "chronyd" - "fluentbit" + local -r mdmimage="${RPIMAGE%%/*}/${MDMIMAGE##*/}" + local -r rpimage="$RPIMAGE" + local -r fluentbit_image="$FLUENTBITIMAGE" + local -ra images=( + "$mdmimage" + "$rpimage" + "$fluentbit_image" ) - log "enabling aro services ${aro_services[*]}" - # shellcheck disable=SC2068 - for service in ${aro_services[@]}; do - log "Enabling $service now" - systemctl enable "$service.service" - done -} - -# configure_service_fluentbit -configure_service_fluentbit() { - log "starting" - log "configuring fluentbit service" + local -r registry_config_file="" + pull_container_images images registry_config_file - mkdir -p /etc/fluentbit/ - mkdir -p /var/lib/fluent - - local -r fluentbit_conf_filename='/etc/fluentbit/fluentbit.conf' local -r fluentbit_conf_file="[INPUT] Name systemd Tag journald @@ -498,273 +116,39 @@ DB /var/lib/fluent/journaldb Match * Port 29230" - write_file fluentbit_conf_filename fluentbit_conf_file true - - local -r sysconfig_fluentbit_filename='/etc/sysconfig/fluentbit' - local -r sysconfig_fluentbit_file="FLUENTBITIMAGE=$FLUENTBITIMAGE" - - write_file sysconfig_fluentbit_filename sysconfig_fluentbit_file true - - local -r fluentbit_service_filename='/etc/systemd/system/fluentbit.service' - - local -r fluentbit_service_file="[Unit] -After=network-online.target -Wants=network-online.target -StartLimitIntervalSec=0 - -[Service] -RestartSec=1s -EnvironmentFile=/etc/sysconfig/fluentbit -ExecStartPre=-/usr/bin/docker rm -f %N -ExecStart=/usr/bin/docker run \ - --security-opt label=disable \ - --entrypoint /opt/td-agent-bit/bin/td-agent-bit \ - --net=host \ - --hostname %H \ - --name %N \ - --rm \ - --cap-drop net_raw \ - -v /etc/fluentbit/fluentbit.conf:/etc/fluentbit/fluentbit.conf \ - -v /var/lib/fluent:/var/lib/fluent:z \ - -v /var/log/journal:/var/log/journal:ro \ - -v /etc/machine-id:/etc/machine-id:ro \ - $FLUENTBITIMAGE \ - -c /etc/fluentbit/fluentbit.conf - -ExecStop=/usr/bin/docker stop %N -Restart=always -RestartSec=5 -StartLimitInterval=0 - -[Install] -WantedBy=multi-user.target" - - write_file fluentbit_conf_filename fluentbit_conf_file true -} - -# configure_certs -configure_certs() { - log "starting" - - mkdir /etc/aro-rp - base64 -d <<<"$ADMINAPICABUNDLE" >/etc/aro-rp/admin-ca-bundle.pem - if [[ -n "$ARMAPICABUNDLE" ]]; then - base64 -d <<<"$ARMAPICABUNDLE" >/etc/aro-rp/arm-ca-bundle.pem - fi - chown -R 1000:1000 /etc/aro-rp - - # setting MONITORING_GCS_AUTH_ID_TYPE=AuthKeyVault seems to have caused mdsd not - # to honour SSL_CERT_FILE any more, heaven only knows why. - mkdir -p /usr/lib/ssl/certs - csplit -f /usr/lib/ssl/certs/cert- -b %03d.pem /etc/pki/tls/certs/ca-bundle.crt /^$/1 "{*}" >/dev/null - c_rehash /usr/lib/ssl/certs - -# we leave clientId blank as long as only 1 managed identity assigned to vmss -# if we have more than 1, we will need to populate with clientId used for off-node scanning - local -r nodescan_agent_filename="/etc/default/vsa-nodescan-agent.config" - local -r nodescan_agent_file="{ - \"Nice\": 19, - \"Timeout\": 10800, - \"ClientId\": \"\", - \"TenantId\": $AZURESECPACKVSATENANTID, - \"QualysStoreBaseUrl\": $AZURESECPACKQUALYSURL, - \"ProcessTimeout\": 300, - \"CommandDelay\": 0 - }" - - write_file nodescan_agent_filename nodescan_agent_file true -} - -# configure_service_mdm -configure_service_mdm() { - log "starting" - log "configuring mdm service" - - local -r sysconfig_mdm_filename="/etc/sysconfig/mdm" - local -r sysconfig_mdm_file="MDMFRONTENDURL='$MDMFRONTENDURL' -MDMIMAGE='$MDMIMAGE' -MDMSOURCEENVIRONMENT='$LOCATION' -MDMSOURCEROLE=rp -MDMSOURCEROLEINSTANCE=\"$(hostname)\"" - - write_file sysconfig_mdm_filename sysconfig_mdm_file true - - mkdir -p /var/etw - local -r mdm_service_filename="/etc/systemd/system/mdm.service" - local -r mdm_service_file="[Unit] -After=network-online.target -Wants=network-online.target - -[Service] -EnvironmentFile=/etc/sysconfig/mdm -ExecStartPre=-/usr/bin/docker rm -f %N -ExecStart=/usr/bin/docker run \ - --entrypoint /usr/sbin/MetricsExtension \ - --hostname %H \ - --name %N \ - --rm \ - --cap-drop net_raw \ - -m 2g \ - -v /etc/mdm.pem:/etc/mdm.pem \ - -v /var/etw:/var/etw:z \ - $MDMIMAGE \ - -CertFile /etc/mdm.pem \ - -FrontEndUrl $MDMFRONTENDURL \ - -Logger Console \ - -LogLevel Warning \ - -PrivateKeyFile /etc/mdm.pem \ - -SourceEnvironment $MDMSOURCEENVIRONMENT \ - -SourceRole $MDMSOURCEROLE \ - -SourceRoleInstance $MDMSOURCEROLEINSTANCE -ExecStop=/usr/bin/docker stop %N -Restart=always -RestartSec=1 -StartLimitInterval=0 - -[Install] -WantedBy=multi-user.target" - - write_file mdm_service_filename mdm_service_file true -} - -# configure_timers_mdm_mdsd -configure_timers_mdm_mdsd() { - log "starting" - - for var in "mdsd" "mdm"; do - local download_creds_service_filename="/etc/systemd/system/download-$var-credentials.service" - local download_creds_service_file="[Unit] -Description=Periodic $var credentials refresh - -[Service] -Type=oneshot -ExecStart=/usr/local/bin/download-credentials.sh $var" - - write_file download_creds_service_filename download_creds_service_file true - - local download_creds_timer_filename="/etc/systemd/system/download-$var-credentials.timer" - local download_creds_timer_file="[Unit] -Description=Periodic $var credentials refresh -After=network-online.target -Wants=network-online.target - -[Timer] -OnBootSec=0min -OnCalendar=0/12:00:00 -AccuracySec=5s - -[Install] -WantedBy=timers.target" - - write_file download_creds_timer_filename download_creds_timer_file true - done - - local -r download_creds_script_filename="/usr/local/bin/download-credentials.sh" - local -r download_creds_script_file="#!/bin/bash -set -eu - -COMPONENT=\$1 -echo \"Download \$COMPONENT credentials\" - -TEMP_DIR=\"\$(mktemp -d)\" -export AZURE_CONFIG_DIR=\"\$(mktemp -d)\" - -echo \"Logging into Azure...\" -RETRIES=3 -while [[ \$RETRIES -gt 0 ]]; do - if az login -i --allow-no-subscriptions - then - echo \"az login successful\" - break - else - echo \"az login failed. Retrying...\" - let RETRIES-=1 - sleep 5 - fi -done - -trap \"cleanup\" EXIT - -cleanup() { - az logout - [[ \$TEMP_DIR =~ /tmp/.+ ]] && rm -rf \$TEMP_DIR - [[ \$AZURE_CONFIG_DIR =~ /tmp/.+ ]] && rm -rf \$AZURE_CONFIG_DIR -} - -if [[ \$COMPONENT = \"mdm\" ]]; then - CURRENT_CERT_FILE=\"/etc/mdm.pem\" -elif [[ \$COMPONENT\ = \"mdsd\" ]]; then - CURRENT_CERT_FILE=\"/var/lib/waagent/Microsoft.Azure.KeyVault.Store/mdsd.pem\" -else - echo Invalid usage && exit 1 -fi - -SECRET_NAME=\"rp-\${COMPONENT}\" -NEW_CERT_FILE=\"\$TEMP_DIR/\$COMPONENT.pem\" -for attempt in {1..5}; do - az keyvault \ - secret \ - download \ - --file \"\$NEW_CERT_FILE\" \ - --id \"https://$KEYVAULTPREFIX-svc.$KEYVAULTDNSSUFFIX/secrets/\$SECRET_NAME\" \ - && break - if [[ \$attempt -lt 5 ]]; then sleep 10; else exit 1; fi -done - -if [ -f \$NEW_CERT_FILE ]; then - if [[ \$COMPONENT = \"mdsd\" ]]; then - chown syslog:syslog \$NEW_CERT_FILE - else - sed -i -ne '1,/END CERTIFICATE/ p' \$NEW_CERT_FILE - fi - - new_cert_sn=\"\$(openssl x509 -in \"\$NEW_CERT_FILE\" -noout -serial | awk -F= '{print \$2}')\" - current_cert_sn=\"\$(openssl x509 -in \"\$CURRENT_CERT_FILE\" -noout -serial | awk -F= '{print \$2}')\" - if [[ ! -z \$new_cert_sn ]] && [[ \$new_cert_sn != \"\$current_cert_sn\" ]]; then - echo updating certificate for \$COMPONENT - chmod 0600 \$NEW_CERT_FILE - mv \$NEW_CERT_FILE \$CURRENT_CERT_FILE - fi -else - echo Failed to refresh certificate for \$COMPONENT && exit 1 -fi" - - write_file download_creds_script_filename download_creds_script_file true - - chmod u+x /usr/local/bin/download-credentials.sh - - systemctl enable download-mdsd-credentials.timer - systemctl enable download-mdm-credentials.timer - - /usr/local/bin/download-credentials.sh mdsd - /usr/local/bin/download-credentials.sh mdm - - local -r MDSDCERTIFICATESAN="$(openssl x509 -in /var/lib/waagent/Microsoft.Azure.KeyVault.Store/mdsd.pem -noout -subject | sed -e 's/.*CN = //')" - local -r watch_mdm_creds_service_filename="/etc/systemd/system/watch-mdm-credentials.service" - local -r watch_mdm_creds_service_file="[Unit] -Description=Watch for changes in mdm.pem and restarts the mdm service - -[Service] -Type=oneshot -ExecStart=/usr/bin/systemctl restart mdm.service - -[Install] -WantedBy=multi-user.target" + configure_service_fluentbit fluentbit_conf_file fluentbit_image + local -r monitor_role="rp" + configure_service_mdm monitor_role mdmimage + configure_timers_mdm_mdsd monitor_role + configure_service_aro_rp - write_file watch_mdm_creds_service_filename watch_mdm_creds_service_file true + configure_service_dbtoken rpimage + configure_service_aro_monitor rpimage + configure_service_aro_portal rpimage + local -r mdsd_rp_version="$RPMDSDCONFIGVERSION" + configure_service_mdsd monitor_role mdsd_rp_version - local -r watch_mdm_creds_path_filename='/etc/systemd/system/watch-mdm-credentials.path' - local -r watch_mdm_creds_path_file='[Path] -PathModified=/etc/mdm.pem + configure_certs monitor_role -[Install] -WantedBy=multi-user.target' + local -ra aro_services=( + "aro-dbtoken" + "aro-monitor" + "aro-portal" + "aro-rp" + "auoms" + "azsecd" + "azsecmond" + "mdsd" + "mdm" + "chronyd" + "fluentbit" + "download-mdsd-credentials.timer" + "download-mdm-credentials.timer" + ) - write_file watch_mdm_creds_path_filename watch_mdm_creds_path_file true + enable_services aro_services - local -r watch_mdm_creds='watch-mdm-credentials.path' - systemctl enable "$watch_mdm_creds" || abort "failed to enable $watch_mdm_creds" - systemctl start "$watch_mdm_creds" || abort "failed to start $watch_mdm_creds" + reboot_vm } # configure_service_aro_rp @@ -854,63 +238,12 @@ StartLimitInterval=0 [Install] WantedBy=multi-user.target" - write_file aro_rp_service_filename aro_rp_conf_file true -} - -# configure_service_aro_dbtoken -configure_service_aro_dbtoken() { - log "starting" - - local -r aro_dbtoken_service_conf_filename='/etc/sysconfig/aro-dbtoken' - local -r aro_dbtoken_service_conf_file="DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME' -AZURE_DBTOKEN_CLIENT_ID='$DBTOKENCLIENTID' -AZURE_GATEWAY_SERVICE_PRINCIPAL_ID='$GATEWAYSERVICEPRINCIPALID' -KEYVAULT_PREFIX='$KEYVAULTPREFIX' -MDM_ACCOUNT='$RPMDMACCOUNT' -MDM_NAMESPACE=DBToken -RPIMAGE='$RPIMAGE'" - - write_file aro_dbtoken_service_conf_filename aro_dbtoken_service_conf_file true - - local -r aro_dbtoken_service_filename='/etc/systemd/system/aro-dbtoken.service' - local -r aro_dbtoken_service_file="[Unit] -After=network-online.target -Wants=network-online.target - -[Service] -EnvironmentFile=/etc/sysconfig/aro-dbtoken -ExecStartPre=-/usr/bin/docker rm -f %N -ExecStart=/usr/bin/docker run \ - --hostname %H \ - --name %N \ - --rm \ - --cap-drop net_raw \ - -e AZURE_GATEWAY_SERVICE_PRINCIPAL_ID \ - -e DATABASE_ACCOUNT_NAME \ - -e AZURE_DBTOKEN_CLIENT_ID \ - -e KEYVAULT_PREFIX \ - -e MDM_ACCOUNT \ - -e MDM_NAMESPACE \ - -m 2g \ - -p 445:8445 \ - -v /run/systemd/journal:/run/systemd/journal \ - -v /var/etw:/var/etw:z \ - $RPIMAGE \ - dbtoken -ExecStop=/usr/bin/docker stop -t 3600 %N -TimeoutStopSec=3600 -Restart=always -RestartSec=1 -StartLimitInterval=0 - -[Install] -WantedBy=multi-user.target" - - write_file aro_dbtoken_service_filename aro_dbtoken_service_file true + write_file aro_rp_service_filename aro_rp_service_file true } # configure_service_aro_monitor configure_service_aro_monitor() { + local -n image="$1" log "starting" log "configuring aro-monitor service" @@ -931,7 +264,7 @@ DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME' KEYVAULT_PREFIX='$KEYVAULTPREFIX' MDM_ACCOUNT='$RPMDMACCOUNT' MDM_NAMESPACE=BBM -RPIMAGE='$RPIMAGE'" +RPIMAGE='$image'" write_file aro_monitor_service_conf_filename aro_monitor_service_conf_file true @@ -965,7 +298,7 @@ ExecStart=/usr/bin/docker run \ -m 2.5g \ -v /run/systemd/journal:/run/systemd/journal \ -v /var/etw:/var/etw:z \ - $RPIMAGE \ + $image \ monitor Restart=always RestartSec=1 @@ -979,6 +312,7 @@ WantedBy=multi-user.target" # configure_service_aro_portal configure_service_aro_portal() { + local -n image="$1" log "starting" local -r aro_portal_service_conf_filename='/etc/sysconfig/aro-portal' @@ -990,7 +324,7 @@ KEYVAULT_PREFIX='$KEYVAULTPREFIX' MDM_ACCOUNT='$RPMDMACCOUNT' MDM_NAMESPACE=Portal PORTAL_HOSTNAME='$LOCATION.admin.$RPPARENTDOMAINNAME' -RPIMAGE='$RPIMAGE'" +RPIMAGE='$image'" write_file aro_portal_service_conf_filename aro_portal_service_conf_file true @@ -1021,7 +355,7 @@ ExecStart=/usr/bin/docker run \ -p 2222:2222 \ -v /run/systemd/journal:/run/systemd/journal \ -v /var/etw:/var/etw:z \ - $RPIMAGE \ + $image \ portal Restart=always RestartSec=1 @@ -1029,104 +363,63 @@ RestartSec=1 [Install] WantedBy=multi-user.target" - write_file aro_portal_service_conf_filename aro_portal_service_conf_file true -} - -# configure_service_mdsd -configure_service_mdsd() { - log "starting" - - local -r mdsd_service_dir="/etc/systemd/system/mdsd.service.d" - mkdir "$mdsd_service_dir" - - local -r mdsd_override_conf_filename="$mdsd_service_dir/override.conf" - local -r mdsd_override_conf_file="[Unit] -After=network-online.target" - - write_file mdsd_override_conf_filename mdsd_override_conf_file true - - local -r default_mdsd_filename="/etc/default/mdsd" - local -r default_mdsd_file="MDSD_ROLE_PREFIX=/var/run/mdsd/default -MDSD_OPTIONS=\"-A -d -r \$MDSD_ROLE_PREFIX\" - -export MONITORING_GCS_ENVIRONMENT='$MDSDENVIRONMENT' -export MONITORING_GCS_ACCOUNT='$RPMDSDACCOUNT' -export MONITORING_GCS_REGION='$LOCATION' -export MONITORING_GCS_AUTH_ID_TYPE=AuthKeyVault -export MONITORING_GCS_AUTH_ID='$MDSDCERTIFICATESAN' -export MONITORING_GCS_NAMESPACE='$RPMDSDNAMESPACE' -export MONITORING_CONFIG_VERSION='$RPMDSDCONFIGVERSION' -export MONITORING_USE_GENEVA_CONFIG_SERVICE=true - -export MONITORING_TENANT='$LOCATION' -export MONITORING_ROLE=rp -export MONITORING_ROLE_INSTANCE=\"$(hostname)\" - -export MDSD_MSGPACK_SORT_COLUMNS=1\"" - - write_file default_mdsd_filename default_mdsd_file true - + write_file aro_portal_service_filename aro_portal_service_file true } -# run_azsecd_config_scan -run_azsecd_config_scan() { +# configure_service_aro_dbtoken +configure_service_dbtoken() { + local -n image="$1" log "starting" - local -ar configs=( - "baseline" - "clamav" - "software" - ) + local -r conf_file="DATABASE_ACCOUNT_NAME='$DATABASEACCOUNTNAME' +AZURE_DBTOKEN_CLIENT_ID='$DBTOKENCLIENTID' +AZURE_GATEWAY_SERVICE_PRINCIPAL_ID='$GATEWAYSERVICEPRINCIPALID' +KEYVAULT_PREFIX='$KEYVAULTPREFIX' +MDM_ACCOUNT='$RPMDMACCOUNT' +MDM_NAMESPACE=DBToken +RPIMAGE='$image'" - log "Scanning configuration files ${configs[*]}" - # shellcheck disable=SC2068 - for scan in ${configs[@]}; do - log "Scanning config file $scan now" - /usr/local/bin/azsecd config -s "$scan" -d P1D - done -} + local -r conf_filename='/etc/sysconfig/aro-dbtoken' -# write_file -# Args -# 1) filename - string -# 2) file_contents - string -# 3) clobber - boolean; optional - defaults to false -write_file() { - local -n filename="$1" - local -n file_contents="$2" - local -r clobber="${3:-false}" + write_file conf_filename conf_file true - if $clobber; then - log "Overwriting file $filename" - echo "$file_contents" > "$filename" - else - log "Appending to $filename" - echo "$file_contents" >> "$filename" - fi -} + local -r service_file="[Unit] +After=network-online.target +Wants=network-online.target -# reboot_vm restores all selinux file contexts, waits 30 seconds then reboots -reboot_vm() { - log "starting" +[Service] +EnvironmentFile=/etc/sysconfig/aro-dbtoken +ExecStartPre=-/usr/bin/docker rm -f %N +ExecStart=/usr/bin/docker run \ + --hostname %H \ + --name %N \ + --rm \ + --cap-drop net_raw \ + -e AZURE_GATEWAY_SERVICE_PRINCIPAL_ID \ + -e DATABASE_ACCOUNT_NAME \ + -e AZURE_DBTOKEN_CLIENT_ID \ + -e KEYVAULT_PREFIX \ + -e MDM_ACCOUNT \ + -e MDM_NAMESPACE \ + -m 2g \ + -p 445:8445 \ + -v /run/systemd/journal:/run/systemd/journal \ + -v /var/etw:/var/etw:z \ + $image \ + dbtoken +ExecStop=/usr/bin/docker stop -t 3600 %N +TimeoutStopSec=3600 +Restart=always +RestartSec=1 +StartLimitInterval=0 - configure_selinux "true" - (sleep 30 && log "rebooting vm now"; reboot) & -} +[Install] +WantedBy=multi-user.target" -# log is a wrapper for echo that includes the function name -log() { - local -r msg="${1:-"log message is empty"}" - local -r stack_level="${2:-1}" - echo "${FUNCNAME[${stack_level}]}: ${msg}" + local -r service_filename='/etc/systemd/system/aro-dbtoken.service' + write_file service_filename service_file true } -# abort is a wrapper for log that exits with an error code -abort() { - local -ri origin_stacklevel=2 - log "${1}" "$origin_stacklevel" - log "Exiting" - exit 1 -} export AZURE_CLOUD_NAME="${AZURECLOUDNAME:?"Failed to carry over variables"}"