Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
227 changes: 167 additions & 60 deletions src/services/sqlServers/data.ts
Original file line number Diff line number Diff line change
@@ -1,19 +1,22 @@
import {
SqlManagementClient,
Server,
ElasticPool,
EncryptionProtector,
FailoverGroup,
FirewallRule,
ServerSecurityAlertPolicy,
Server,
ServerAzureADAdministrator,
EncryptionProtector,
ServerBlobAuditingPolicy,
ServerSecurityAlertPolicy,
ServerVulnerabilityAssessment,
SqlManagementClient,
VirtualNetworkRule,
} from '@azure/arm-sql'
import { PagedAsyncIterableIterator } from '@azure/core-paging'
import CloudGraph from '@cloudgraph/sdk'
import azureLoggerText from '../../properties/logger'
import { AzureServiceInput, TagMap } from '../../types'
import { getResourceGroupFromEntity } from '../../utils/idParserUtils'
import { lowerCaseLocation } from '../../utils/format'
import { getResourceGroupFromEntity } from '../../utils/idParserUtils'
import { tryCatchWrapper } from '../../utils/index'

const { logger } = CloudGraph
Expand All @@ -24,14 +27,101 @@ export interface RawAzureServer extends Omit<Server, 'tags' | 'location'> {
region: string
resourceGroupId: string
Tags: TagMap
elasticPools: ElasticPool[]
failoverGroups: FailoverGroup[]
firewallRules: FirewallRule[]
virtualNetworkRules: VirtualNetworkRule[]
serverSecurityAlertPolicies: ServerSecurityAlertPolicy[]
adAdministrators: ServerAzureADAdministrator[]
encryptionProtectors: EncryptionProtector[]
serverBlobAuditingPolicies: ServerBlobAuditingPolicy[]
vulnerabilityAssessments: ServerVulnerabilityAssessment[]
}

const listElasticPools = async (
client: SqlManagementClient,
resourceGroup: string,
serverName: string
): Promise<ElasticPool[]> => {
const elasticPools: ElasticPool[] = []
const elasticPoolsIterable = client.elasticPools.listByServer(
resourceGroup,
serverName
)
await tryCatchWrapper(
async () => {
for await (const elasticPool of elasticPoolsIterable) {
if (elasticPool) {
elasticPools.push(elasticPool)
}
}
},
{
service: serviceName,
client,
scope: 'elasticPools',
operation: 'listByServer',
}
)
return elasticPools
}

const listFileoverGroups = async (
client: SqlManagementClient,
resourceGroup: string,
serverName: string
): Promise<FailoverGroup[]> => {
const failoverGroups: FailoverGroup[] = []
const failoverGroupsIterable = client.failoverGroups.listByServer(
resourceGroup,
serverName
)
await tryCatchWrapper(
async () => {
for await (const failoverGroup of failoverGroupsIterable) {
if (failoverGroup) {
failoverGroups.push(failoverGroup)
}
}
},
{
service: serviceName,
client,
scope: 'failoverGroups',
operation: 'listByServer',
}
)
return failoverGroups
}

const listVirtualNetworkRules = async (
client: SqlManagementClient,
resourceGroup: string,
serverName: string
): Promise<VirtualNetworkRule[]> => {
const virtualNetworkRules: VirtualNetworkRule[] = []
const virtualNetworkRulesIterable = client.virtualNetworkRules.listByServer(
resourceGroup,
serverName
)
await tryCatchWrapper(
async () => {
for await (const virtualNetworkRule of virtualNetworkRulesIterable) {
if (virtualNetworkRule) {
virtualNetworkRules.push(virtualNetworkRule)
}
}
},
{
service: serviceName,
client,
scope: 'virtualNetworkRules',
operation: 'listByServer',
}
)
return virtualNetworkRules
}

const listFirewallRules = async (
client: SqlManagementClient,
resourceGroup: string,
Expand Down Expand Up @@ -143,15 +233,16 @@ const listEncryptionProtectors = async (
}

const listServerVulnerabilityAssessments = async (
client: SqlManagementClient,
resourceGroup: string,
serverName: string,
client: SqlManagementClient,
resourceGroup: string,
serverName: string
): Promise<ServerVulnerabilityAssessment[]> => {
const databaseVulnerabilityAssessments: ServerVulnerabilityAssessment[] = []
const vulnerabilityAssessmentIterable = client.serverVulnerabilityAssessments.listByServer(
resourceGroup,
serverName,
)
const vulnerabilityAssessmentIterable =
client.serverVulnerabilityAssessments.listByServer(
resourceGroup,
serverName
)
await tryCatchWrapper(
async () => {
for await (const vulnerabilityAssessment of vulnerabilityAssessmentIterable) {
Expand All @@ -171,15 +262,13 @@ const listServerVulnerabilityAssessments = async (
}

const listServerBlobAuditingPolicies = async (
client: SqlManagementClient,
resourceGroup: string,
serverName: string,
client: SqlManagementClient,
resourceGroup: string,
serverName: string
): Promise<ServerBlobAuditingPolicy[]> => {
const serverBlobAuditingPolicies: ServerBlobAuditingPolicy[] = []
const serverBlobAuditingPolicyIterable = client.serverBlobAuditingPolicies.listByServer(
resourceGroup,
serverName,
)
const serverBlobAuditingPolicyIterable =
client.serverBlobAuditingPolicies.listByServer(resourceGroup, serverName)
await tryCatchWrapper(
async () => {
for await (const policy of serverBlobAuditingPolicyIterable) {
Expand Down Expand Up @@ -226,48 +315,66 @@ export default async ({
logger.debug(lt.foundSqlServers(sqlServers.length))

const result: { [property: string]: RawAzureServer[] } = {}
await Promise.all(sqlServers.map(async ({ name, tags, location, ...rest }) => {
const region = lowerCaseLocation(location)
if (regions.includes(region)) {
if (!result[region]) {
result[region] = []
}
const resourceGroupId = getResourceGroupFromEntity(rest)
result[region].push({
name,
...rest,
resourceGroupId,
region,
Tags: tags || {},
firewallRules: await listFirewallRules(client, resourceGroupId, name),
serverSecurityAlertPolicies: await listServerSecurityAlertPolicies(
client,
resourceGroupId,
name
),
adAdministrators: await listADAdministrators(
client,
resourceGroupId,
name
),
encryptionProtectors: await listEncryptionProtectors(
client,
await Promise.all(
sqlServers.map(async ({ name, tags, location, ...rest }) => {
const region = lowerCaseLocation(location)
if (regions.includes(region)) {
if (!result[region]) {
result[region] = []
}
const resourceGroupId = getResourceGroupFromEntity(rest)
result[region].push({
name,
...rest,
resourceGroupId,
name
),
serverBlobAuditingPolicies: await listServerBlobAuditingPolicies(
client,
resourceGroupId,
name
),
vulnerabilityAssessments: await listServerVulnerabilityAssessments(
client,
resourceGroupId,
name
),
})
}
}))
region,
Tags: tags || {},
elasticPools: await listElasticPools(client, resourceGroupId, name),
failoverGroups: await listFileoverGroups(
client,
resourceGroupId,
name
),
firewallRules: await listFirewallRules(
client,
resourceGroupId,
name
),
virtualNetworkRules: await listVirtualNetworkRules(
client,
resourceGroupId,
name
),
serverSecurityAlertPolicies: await listServerSecurityAlertPolicies(
client,
resourceGroupId,
name
),
adAdministrators: await listADAdministrators(
client,
resourceGroupId,
name
),
encryptionProtectors: await listEncryptionProtectors(
client,
resourceGroupId,
name
),
serverBlobAuditingPolicies: await listServerBlobAuditingPolicies(
client,
resourceGroupId,
name
),
vulnerabilityAssessments: await listServerVulnerabilityAssessments(
client,
resourceGroupId,
name
),
})
}
})
)

return result
} catch (e) {
logger.error(e)
Expand Down
42 changes: 42 additions & 0 deletions src/services/sqlServers/format.ts
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,13 @@ import {
AzureSqlServer,
AzureSqlServerAdAdministrator,
AzureSqlServerBlobAuditingPolicy,
AzureSqlServerElasticPool,
AzureSqlServerEncryptionProtector,
AzureSqlServerFailoverGroup,
AzureSqlServerFirewallRule,
AzureSqlServerPrivateEndpointConnection,
AzureSqlServerSecurityAlertPolicy,
AzureSqlServerVirtualNetworkRule,
AzureSqlServerVulnerabilityAssessment,
} from '../../types/generated'
import { formatTagsFromMap } from '../../utils/format'
Expand Down Expand Up @@ -45,7 +48,10 @@ export default ({
workspaceFeature,
restrictOutboundNetworkAccess,
resourceGroupId,
elasticPools = [],
failoverGroups = [],
firewallRules = [],
virtualNetworkRules = [],
serverSecurityAlertPolicies = [],
adAdministrators = [],
encryptionProtectors = [],
Expand Down Expand Up @@ -118,6 +124,30 @@ export default ({
workspaceFeature,
restrictOutboundNetworkAccess,
resourceGroupId,
elasticPools:
elasticPools?.map(
({
id: elasticPoolId,
name: elasticPoolName,
type: elasticPoolType,
}): AzureSqlServerElasticPool => ({
id: elasticPoolId,
name: elasticPoolName,
type: elasticPoolType,
})
) ?? [],
failoverGroups:
failoverGroups?.map(
({
id: failoverGroupId,
name: failoverGroupName,
type: failoverGroupType,
}): AzureSqlServerFailoverGroup => ({
id: failoverGroupId,
name: failoverGroupName,
type: failoverGroupType,
})
) ?? [],
firewallRules:
firewallRules?.map(
({
Expand All @@ -134,6 +164,18 @@ export default ({
endIpAddress,
})
) ?? [],
virtualNetworkRules:
virtualNetworkRules?.map(
({
id: virtualNetworkRuleId,
name: virtualNetworkRuleName,
type: virtualNetworkRuleType,
}): AzureSqlServerVirtualNetworkRule => ({
id: virtualNetworkRuleId,
name: virtualNetworkRuleName,
type: virtualNetworkRuleType,
})
) ?? [],
serverSecurityAlertPolicies:
serverSecurityAlertPolicies?.map(
({
Expand Down
Loading