
Every meta data service should return bytes only for these capabilities: * get_content * get_user_data While `_get_meta_data` and any other method derrived from it (including public keys, certificates etc.) should return homogeneous data types and only strings, not bytes. The decoding procedure is handled at its roots, not in the plugins and is done by only using `encoding.get_as_string` function. Fixed bugs: * invalid certificate splitting under maas service which usually generated an extra invalid certificate (empty string + footer) * text operations on bytes in maas and cloudstack (split, comparing) * multiple types for certificates (now only strings) * not receiving bytes from opennebula service when using `get_user_data` (which leads to crash under later processing through io.BytesIO) * erroneous certificate parsing/stripping/replacing under x509 importing (footer remains, not all possible EOLs replaced as it should) Also added new and refined actual misleading unittests. Change-Id: I704c43f5f784458a881293d761a21e62aed85732
147 lines
4.8 KiB
Python
147 lines
4.8 KiB
Python
# Copyright 2014 Cloudbase Solutions Srl
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
|
|
import json
|
|
import posixpath
|
|
|
|
from oslo.config import cfg
|
|
|
|
from cloudbaseinit.metadata.services import base
|
|
from cloudbaseinit.openstack.common import log as logging
|
|
from cloudbaseinit.utils import debiface
|
|
from cloudbaseinit.utils import encoding
|
|
from cloudbaseinit.utils import x509constants
|
|
|
|
|
|
opts = [
|
|
cfg.StrOpt('metadata_base_url', default='http://169.254.169.254/',
|
|
help='The base URL where the service looks for metadata'),
|
|
]
|
|
|
|
CONF = cfg.CONF
|
|
CONF.register_opts(opts)
|
|
|
|
LOG = logging.getLogger(__name__)
|
|
|
|
|
|
class BaseOpenStackService(base.BaseMetadataService):
|
|
|
|
def get_content(self, name):
|
|
path = posixpath.normpath(
|
|
posixpath.join('openstack', 'content', name))
|
|
return self._get_cache_data(path)
|
|
|
|
def get_user_data(self):
|
|
path = posixpath.normpath(
|
|
posixpath.join('openstack', 'latest', 'user_data'))
|
|
return self._get_cache_data(path)
|
|
|
|
def _get_meta_data(self, version='latest'):
|
|
path = posixpath.normpath(
|
|
posixpath.join('openstack', version, 'meta_data.json'))
|
|
data = self._get_cache_data(path, decode=True)
|
|
if data:
|
|
return json.loads(data)
|
|
|
|
def get_instance_id(self):
|
|
return self._get_meta_data().get('uuid')
|
|
|
|
def get_host_name(self):
|
|
return self._get_meta_data().get('hostname')
|
|
|
|
def get_public_keys(self):
|
|
"""Get a list of all unique public keys found among the metadata."""
|
|
public_keys = []
|
|
meta_data = self._get_meta_data()
|
|
public_keys_dict = meta_data.get("public_keys")
|
|
if public_keys_dict:
|
|
public_keys = list(public_keys_dict.values())
|
|
keys = meta_data.get("keys")
|
|
if keys:
|
|
for key_dict in keys:
|
|
if key_dict["type"] == "ssh":
|
|
public_keys.append(key_dict["data"])
|
|
return list(set((key.strip() for key in public_keys)))
|
|
|
|
def get_network_details(self):
|
|
network_config = self._get_meta_data().get('network_config')
|
|
if not network_config:
|
|
return None
|
|
key = "content_path"
|
|
if key not in network_config:
|
|
return None
|
|
|
|
content_name = network_config[key].rsplit("/", 1)[-1]
|
|
content = self.get_content(content_name)
|
|
content = encoding.get_as_string(content)
|
|
|
|
return debiface.parse(content)
|
|
|
|
def get_admin_password(self):
|
|
meta_data = self._get_meta_data()
|
|
meta = meta_data.get('meta')
|
|
|
|
if meta and 'admin_pass' in meta:
|
|
password = meta['admin_pass']
|
|
elif 'admin_pass' in meta_data:
|
|
password = meta_data['admin_pass']
|
|
else:
|
|
password = None
|
|
|
|
return password
|
|
|
|
def get_client_auth_certs(self):
|
|
"""Gather all unique certificates found among the metadata.
|
|
|
|
If there are no certificates under "meta" or "keys" field,
|
|
then try looking into user-data for this kind of information.
|
|
"""
|
|
certs = []
|
|
meta_data = self._get_meta_data()
|
|
|
|
meta = meta_data.get("meta")
|
|
if meta:
|
|
cert_data_list = []
|
|
idx = 0
|
|
while True:
|
|
# Chunking is necessary as metadata items can be
|
|
# max. 255 chars long.
|
|
cert_chunk = meta.get("admin_cert%d" % idx)
|
|
if not cert_chunk:
|
|
break
|
|
cert_data_list.append(cert_chunk)
|
|
idx += 1
|
|
if cert_data_list:
|
|
# It's a list of strings for sure.
|
|
certs.append("".join(cert_data_list))
|
|
|
|
keys = meta_data.get("keys")
|
|
if keys:
|
|
for key_dict in keys:
|
|
if key_dict["type"] == "x509":
|
|
certs.append(key_dict["data"])
|
|
|
|
if not certs:
|
|
# Look if the user_data contains a PEM certificate
|
|
try:
|
|
user_data = self.get_user_data().strip()
|
|
if user_data.startswith(
|
|
x509constants.PEM_HEADER.encode()):
|
|
certs.append(encoding.get_as_string(user_data))
|
|
except base.NotExistingMetadataException:
|
|
LOG.debug("user_data metadata not present")
|
|
|
|
return list(set((cert.strip() for cert in certs)))
|