1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
|
# This file is part of cloud-init. See LICENSE file for license information.
import copy
import httpretty
import mock
from cloudinit import helpers
from cloudinit.sources import DataSourceEc2 as ec2
from cloudinit.tests import helpers as test_helpers
# collected from api version 2016-09-02/ with
# python3 -c 'import json
# from cloudinit.ec2_utils import get_instance_metadata as gm
# print(json.dumps(gm("2016-09-02"), indent=1, sort_keys=True))'
DEFAULT_METADATA = {
"ami-id": "ami-8b92b4ee",
"ami-launch-index": "0",
"ami-manifest-path": "(unknown)",
"block-device-mapping": {"ami": "/dev/sda1", "root": "/dev/sda1"},
"hostname": "ip-172-31-31-158.us-east-2.compute.internal",
"instance-action": "none",
"instance-id": "i-0a33f80f09c96477f",
"instance-type": "t2.small",
"local-hostname": "ip-172-3-3-15.us-east-2.compute.internal",
"local-ipv4": "172.3.3.15",
"mac": "06:17:04:d7:26:09",
"metrics": {"vhostmd": "<?xml version=\"1.0\" encoding=\"UTF-8\"?>"},
"network": {
"interfaces": {
"macs": {
"06:17:04:d7:26:09": {
"device-number": "0",
"interface-id": "eni-e44ef49e",
"ipv4-associations": {"13.59.77.202": "172.3.3.15"},
"ipv6s": "2600:1f16:aeb:b20b:9d87:a4af:5cc9:73dc",
"local-hostname": ("ip-172-3-3-15.us-east-2."
"compute.internal"),
"local-ipv4s": "172.3.3.15",
"mac": "06:17:04:d7:26:09",
"owner-id": "950047163771",
"public-hostname": ("ec2-13-59-77-202.us-east-2."
"compute.amazonaws.com"),
"public-ipv4s": "13.59.77.202",
"security-group-ids": "sg-5a61d333",
"security-groups": "wide-open",
"subnet-id": "subnet-20b8565b",
"subnet-ipv4-cidr-block": "172.31.16.0/20",
"subnet-ipv6-cidr-blocks": "2600:1f16:aeb:b20b::/64",
"vpc-id": "vpc-87e72bee",
"vpc-ipv4-cidr-block": "172.31.0.0/16",
"vpc-ipv4-cidr-blocks": "172.31.0.0/16",
"vpc-ipv6-cidr-blocks": "2600:1f16:aeb:b200::/56"
}
}
}
},
"placement": {"availability-zone": "us-east-2b"},
"profile": "default-hvm",
"public-hostname": "ec2-13-59-77-202.us-east-2.compute.amazonaws.com",
"public-ipv4": "13.59.77.202",
"public-keys": {"brickies": ["ssh-rsa AAAAB3Nz....w== brickies"]},
"reservation-id": "r-01efbc9996bac1bd6",
"security-groups": "my-wide-open",
"services": {"domain": "amazonaws.com", "partition": "aws"}
}
def _register_ssh_keys(rfunc, base_url, keys_data):
"""handle ssh key inconsistencies.
public-keys in the ec2 metadata is inconsistently formated compared
to other entries.
Given keys_data of {name1: pubkey1, name2: pubkey2}
This registers the following urls:
base_url 0={name1}\n1={name2} # (for each name)
base_url/ 0={name1}\n1={name2} # (for each name)
base_url/0 openssh-key
base_url/0/ openssh-key
base_url/0/openssh-key {pubkey1}
base_url/0/openssh-key/ {pubkey1}
...
"""
base_url = base_url.rstrip("/")
odd_index = '\n'.join(
["{0}={1}".format(n, name)
for n, name in enumerate(sorted(keys_data))])
rfunc(base_url, odd_index)
rfunc(base_url + "/", odd_index)
for n, name in enumerate(sorted(keys_data)):
val = keys_data[name]
if isinstance(val, list):
val = '\n'.join(val)
burl = base_url + "/%s" % n
rfunc(burl, "openssh-key")
rfunc(burl + "/", "openssh-key")
rfunc(burl + "/%s/openssh-key" % name, val)
rfunc(burl + "/%s/openssh-key/" % name, val)
def register_mock_metaserver(base_url, data):
"""Register with httpretty a ec2 metadata like service serving 'data'.
If given a dictionary, it will populate urls under base_url for
that dictionary. For example, input of
{"instance-id": "i-abc", "mac": "00:16:3e:00:00:00"}
populates
base_url with 'instance-id\nmac'
base_url/ with 'instance-id\nmac'
base_url/instance-id with i-abc
base_url/mac with 00:16:3e:00:00:00
In the index, references to lists or dictionaries have a trailing /.
"""
def register_helper(register, base_url, body):
if not isinstance(base_url, str):
register(base_url, body)
return
base_url = base_url.rstrip("/")
if isinstance(body, str):
register(base_url, body)
elif isinstance(body, list):
register(base_url, '\n'.join(body) + '\n')
register(base_url + '/', '\n'.join(body) + '\n')
elif isinstance(body, dict):
vals = []
for k, v in body.items():
if k == 'public-keys':
_register_ssh_keys(
register, base_url + '/public-keys/', v)
continue
suffix = k.rstrip("/")
if not isinstance(v, (str, list)):
suffix += "/"
vals.append(suffix)
url = base_url + '/' + suffix
register_helper(register, url, v)
register(base_url, '\n'.join(vals) + '\n')
register(base_url + '/', '\n'.join(vals) + '\n')
elif body is None:
register(base_url, 'not found', status=404)
def myreg(*argc, **kwargs):
# print("register_url(%s, %s)" % (argc, kwargs))
return httpretty.register_uri(httpretty.GET, *argc, **kwargs)
register_helper(myreg, base_url, data)
class TestEc2(test_helpers.HttprettyTestCase):
with_logs = True
valid_platform_data = {
'uuid': 'ec212f79-87d1-2f1d-588f-d86dc0fd5412',
'uuid_source': 'dmi',
'serial': 'ec212f79-87d1-2f1d-588f-d86dc0fd5412',
}
def setUp(self):
super(TestEc2, self).setUp()
self.datasource = ec2.DataSourceEc2
self.metadata_addr = self.datasource.metadata_urls[0]
def data_url(self, version):
"""Return a metadata url based on the version provided."""
return '/'.join([self.metadata_addr, version, 'meta-data', ''])
def _patch_add_cleanup(self, mpath, *args, **kwargs):
p = mock.patch(mpath, *args, **kwargs)
p.start()
self.addCleanup(p.stop)
def _setup_ds(self, sys_cfg, platform_data, md, md_version=None):
self.uris = []
distro = {}
paths = helpers.Paths({})
if sys_cfg is None:
sys_cfg = {}
ds = self.datasource(sys_cfg=sys_cfg, distro=distro, paths=paths)
if not md_version:
md_version = ds.min_metadata_version
if platform_data is not None:
self._patch_add_cleanup(
"cloudinit.sources.DataSourceEc2._collect_platform_data",
return_value=platform_data)
if md:
httpretty.HTTPretty.allow_net_connect = False
all_versions = (
[ds.min_metadata_version] + ds.extended_metadata_versions)
for version in all_versions:
metadata_url = self.data_url(version)
if version == md_version:
# Register all metadata for desired version
register_mock_metaserver(metadata_url, md)
else:
instance_id_url = metadata_url + 'instance-id'
if version == ds.min_metadata_version:
# Add min_metadata_version service availability check
register_mock_metaserver(
instance_id_url, DEFAULT_METADATA['instance-id'])
else:
# Register 404s for all unrequested extended versions
register_mock_metaserver(instance_id_url, None)
return ds
@httpretty.activate
def test_network_config_property_returns_version_1_network_data(self):
"""network_config property returns network version 1 for metadata."""
ds = self._setup_ds(
platform_data=self.valid_platform_data,
sys_cfg={'datasource': {'Ec2': {'strict_id': True}}},
md=DEFAULT_METADATA)
ds.get_data()
mac1 = '06:17:04:d7:26:09' # Defined in DEFAULT_METADATA
expected = {'version': 1, 'config': [
{'mac_address': '06:17:04:d7:26:09', 'name': 'eth9',
'subnets': [{'type': 'dhcp4'}, {'type': 'dhcp6'}],
'type': 'physical'}]}
patch_path = (
'cloudinit.sources.DataSourceEc2.net.get_interfaces_by_mac')
with mock.patch(patch_path) as m_get_interfaces_by_mac:
m_get_interfaces_by_mac.return_value = {mac1: 'eth9'}
self.assertEqual(expected, ds.network_config)
def test_network_config_property_is_cached_in_datasource(self):
"""network_config property is cached in DataSourceEc2."""
ds = self._setup_ds(
platform_data=self.valid_platform_data,
sys_cfg={'datasource': {'Ec2': {'strict_id': True}}},
md=DEFAULT_METADATA)
ds._network_config = {'cached': 'data'}
self.assertEqual({'cached': 'data'}, ds.network_config)
@httpretty.activate
@mock.patch('cloudinit.net.dhcp.maybe_perform_dhcp_discovery')
def test_valid_platform_with_strict_true(self, m_dhcp):
"""Valid platform data should return true with strict_id true."""
ds = self._setup_ds(
platform_data=self.valid_platform_data,
sys_cfg={'datasource': {'Ec2': {'strict_id': True}}},
md=DEFAULT_METADATA)
ret = ds.get_data()
self.assertTrue(ret)
self.assertEqual(0, m_dhcp.call_count)
@httpretty.activate
def test_valid_platform_with_strict_false(self):
"""Valid platform data should return true with strict_id false."""
ds = self._setup_ds(
platform_data=self.valid_platform_data,
sys_cfg={'datasource': {'Ec2': {'strict_id': False}}},
md=DEFAULT_METADATA)
ret = ds.get_data()
self.assertTrue(ret)
@httpretty.activate
def test_unknown_platform_with_strict_true(self):
"""Unknown platform data with strict_id true should return False."""
uuid = 'ab439480-72bf-11d3-91fc-b8aded755F9a'
ds = self._setup_ds(
platform_data={'uuid': uuid, 'uuid_source': 'dmi', 'serial': ''},
sys_cfg={'datasource': {'Ec2': {'strict_id': True}}},
md=DEFAULT_METADATA)
ret = ds.get_data()
self.assertFalse(ret)
@httpretty.activate
def test_unknown_platform_with_strict_false(self):
"""Unknown platform data with strict_id false should return True."""
uuid = 'ab439480-72bf-11d3-91fc-b8aded755F9a'
ds = self._setup_ds(
platform_data={'uuid': uuid, 'uuid_source': 'dmi', 'serial': ''},
sys_cfg={'datasource': {'Ec2': {'strict_id': False}}},
md=DEFAULT_METADATA)
ret = ds.get_data()
self.assertTrue(ret)
def test_ec2_local_returns_false_on_non_aws(self):
"""DataSourceEc2Local returns False when platform is not AWS."""
self.datasource = ec2.DataSourceEc2Local
ds = self._setup_ds(
platform_data=self.valid_platform_data,
sys_cfg={'datasource': {'Ec2': {'strict_id': False}}},
md=DEFAULT_METADATA)
platform_attrs = [
attr for attr in ec2.Platforms.__dict__.keys()
if not attr.startswith('__')]
for attr_name in platform_attrs:
platform_name = getattr(ec2.Platforms, attr_name)
if platform_name != 'AWS':
ds._cloud_platform = platform_name
ret = ds.get_data()
self.assertFalse(ret)
message = (
"Local Ec2 mode only supported on ('AWS',),"
' not {0}'.format(platform_name))
self.assertIn(message, self.logs.getvalue())
@httpretty.activate
@mock.patch('cloudinit.sources.DataSourceEc2.util.is_FreeBSD')
def test_ec2_local_returns_false_on_bsd(self, m_is_freebsd):
"""DataSourceEc2Local returns False on BSD.
FreeBSD dhclient doesn't support dhclient -sf to run in a sandbox.
"""
m_is_freebsd.return_value = True
self.datasource = ec2.DataSourceEc2Local
ds = self._setup_ds(
platform_data=self.valid_platform_data,
sys_cfg={'datasource': {'Ec2': {'strict_id': False}}},
md=DEFAULT_METADATA)
ret = ds.get_data()
self.assertFalse(ret)
self.assertIn(
"FreeBSD doesn't support running dhclient with -sf",
self.logs.getvalue())
@httpretty.activate
@mock.patch('cloudinit.net.EphemeralIPv4Network')
@mock.patch('cloudinit.net.dhcp.maybe_perform_dhcp_discovery')
@mock.patch('cloudinit.sources.DataSourceEc2.util.is_FreeBSD')
def test_ec2_local_performs_dhcp_on_non_bsd(self, m_is_bsd, m_dhcp, m_net):
"""Ec2Local returns True for valid platform data on non-BSD with dhcp.
DataSourceEc2Local will setup initial IPv4 network via dhcp discovery.
Then the metadata services is crawled for more network config info.
When the platform data is valid, return True.
"""
m_is_bsd.return_value = False
m_dhcp.return_value = [{
'interface': 'eth9', 'fixed-address': '192.168.2.9',
'routers': '192.168.2.1', 'subnet-mask': '255.255.255.0',
'broadcast-address': '192.168.2.255'}]
self.datasource = ec2.DataSourceEc2Local
ds = self._setup_ds(
platform_data=self.valid_platform_data,
sys_cfg={'datasource': {'Ec2': {'strict_id': False}}},
md=DEFAULT_METADATA)
ret = ds.get_data()
self.assertTrue(ret)
m_dhcp.assert_called_once_with()
m_net.assert_called_once_with(
broadcast='192.168.2.255', interface='eth9', ip='192.168.2.9',
prefix_or_mask='255.255.255.0', router='192.168.2.1')
self.assertIn('Crawl of metadata service took', self.logs.getvalue())
class TestConvertEc2MetadataNetworkConfig(test_helpers.CiTestCase):
def setUp(self):
super(TestConvertEc2MetadataNetworkConfig, self).setUp()
self.mac1 = '06:17:04:d7:26:09'
self.network_metadata = {
'interfaces': {'macs': {
self.mac1: {'public-ipv4s': '172.31.2.16'}}}}
def test_convert_ec2_metadata_network_config_skips_absent_macs(self):
"""Any mac absent from metadata is skipped by network config."""
macs_to_nics = {self.mac1: 'eth9', 'DE:AD:BE:EF:FF:FF': 'vitualnic2'}
# DE:AD:BE:EF:FF:FF represented by OS but not in metadata
expected = {'version': 1, 'config': [
{'mac_address': self.mac1, 'type': 'physical',
'name': 'eth9', 'subnets': [{'type': 'dhcp4'}]}]}
self.assertEqual(
expected,
ec2.convert_ec2_metadata_network_config(
self.network_metadata, macs_to_nics))
def test_convert_ec2_metadata_network_config_handles_only_dhcp6(self):
"""Config dhcp6 when ipv6s is in metadata for a mac."""
macs_to_nics = {self.mac1: 'eth9'}
network_metadata_ipv6 = copy.deepcopy(self.network_metadata)
nic1_metadata = (
network_metadata_ipv6['interfaces']['macs'][self.mac1])
nic1_metadata['ipv6s'] = '2620:0:1009:fd00:e442:c88d:c04d:dc85/64'
nic1_metadata.pop('public-ipv4s')
expected = {'version': 1, 'config': [
{'mac_address': self.mac1, 'type': 'physical',
'name': 'eth9', 'subnets': [{'type': 'dhcp6'}]}]}
self.assertEqual(
expected,
ec2.convert_ec2_metadata_network_config(
network_metadata_ipv6, macs_to_nics))
def test_convert_ec2_metadata_network_config_handles_dhcp4_and_dhcp6(self):
"""Config both dhcp4 and dhcp6 when both vpc-ipv6 and ipv4 exists."""
macs_to_nics = {self.mac1: 'eth9'}
network_metadata_both = copy.deepcopy(self.network_metadata)
nic1_metadata = (
network_metadata_both['interfaces']['macs'][self.mac1])
nic1_metadata['ipv6s'] = '2620:0:1009:fd00:e442:c88d:c04d:dc85/64'
expected = {'version': 1, 'config': [
{'mac_address': self.mac1, 'type': 'physical',
'name': 'eth9',
'subnets': [{'type': 'dhcp4'}, {'type': 'dhcp6'}]}]}
self.assertEqual(
expected,
ec2.convert_ec2_metadata_network_config(
network_metadata_both, macs_to_nics))
def test_convert_ec2_metadata_gets_macs_from_get_interfaces_by_mac(self):
"""Convert Ec2 Metadata calls get_interfaces_by_mac by default."""
expected = {'version': 1, 'config': [
{'mac_address': self.mac1, 'type': 'physical',
'name': 'eth9',
'subnets': [{'type': 'dhcp4'}]}]}
patch_path = (
'cloudinit.sources.DataSourceEc2.net.get_interfaces_by_mac')
with mock.patch(patch_path) as m_get_interfaces_by_mac:
m_get_interfaces_by_mac.return_value = {self.mac1: 'eth9'}
self.assertEqual(
expected,
ec2.convert_ec2_metadata_network_config(self.network_metadata))
# vi: ts=4 expandtab
|