123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160 |
- // Copyright 2015 CoreOS, Inc.
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- package ec2
- import (
- "fmt"
- "log"
- "net"
- "strings"
- "github.com/rancher/os/netconf"
- "github.com/rancher/os/config/cloudinit/datasource"
- "github.com/rancher/os/config/cloudinit/datasource/metadata"
- "github.com/rancher/os/config/cloudinit/pkg"
- )
- const (
- DefaultAddress = "http://169.254.169.254/"
- apiVersion = "latest/"
- userdataPath = apiVersion + "user-data"
- metadataPath = apiVersion + "meta-data/"
- defaultXVRootDisk = "/dev/xvda"
- defaultNVMeRootDisk = "/dev/nvme0n1"
- )
- type MetadataService struct {
- metadata.Service
- }
- func NewDatasource(root string) *MetadataService {
- if root == "" {
- root = DefaultAddress
- }
- return &MetadataService{metadata.NewDatasource(root, apiVersion, userdataPath, metadataPath, nil)}
- }
- func (ms MetadataService) AvailabilityChanges() bool {
- // TODO: if it can't find the network, maybe we can start it?
- return false
- }
- func (ms MetadataService) FetchMetadata() (datasource.Metadata, error) {
- // see http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html
- metadata := datasource.Metadata{}
- metadata.NetworkConfig = netconf.NetworkConfig{}
- if keynames, err := ms.FetchAttributes("public-keys"); err == nil {
- keyIDs := make(map[string]string)
- for _, keyname := range keynames {
- tokens := strings.SplitN(keyname, "=", 2)
- if len(tokens) != 2 {
- return metadata, fmt.Errorf("malformed public key: %q", keyname)
- }
- keyIDs[tokens[1]] = tokens[0]
- }
- metadata.SSHPublicKeys = map[string]string{}
- for name, id := range keyIDs {
- sshkey, err := ms.FetchAttribute(fmt.Sprintf("public-keys/%s/openssh-key", id))
- if err != nil {
- return metadata, err
- }
- metadata.SSHPublicKeys[name] = sshkey
- log.Printf("Found SSH key for %q\n", name)
- }
- } else if _, ok := err.(pkg.ErrNotFound); !ok {
- return metadata, err
- }
- if hostname, err := ms.FetchAttribute("hostname"); err == nil {
- metadata.Hostname = strings.Split(hostname, " ")[0]
- } else if _, ok := err.(pkg.ErrNotFound); !ok {
- return metadata, err
- }
- // TODO: these are only on the first interface - it looks like you can have as many as you need...
- if localAddr, err := ms.FetchAttribute("local-ipv4"); err == nil {
- metadata.PrivateIPv4 = net.ParseIP(localAddr)
- } else if _, ok := err.(pkg.ErrNotFound); !ok {
- return metadata, err
- }
- if publicAddr, err := ms.FetchAttribute("public-ipv4"); err == nil {
- metadata.PublicIPv4 = net.ParseIP(publicAddr)
- } else if _, ok := err.(pkg.ErrNotFound); !ok {
- return metadata, err
- }
- metadata.NetworkConfig.Interfaces = make(map[string]netconf.InterfaceConfig)
- if macs, err := ms.FetchAttributes("network/interfaces/macs"); err != nil {
- for _, mac := range macs {
- if deviceNumber, err := ms.FetchAttribute(fmt.Sprintf("network/interfaces/macs/%s/device-number", mac)); err != nil {
- network := netconf.InterfaceConfig{
- DHCP: true,
- }
- /* Looks like we must use DHCP for aws
- // private ipv4
- if subnetCidrBlock, err := ms.FetchAttribute(fmt.Sprintf("network/interfaces/macs/%s/subnet-ipv4-cidr-block", mac)); err != nil {
- cidr := strings.Split(subnetCidrBlock, "/")
- if localAddr, err := ms.FetchAttributes(fmt.Sprintf("network/interfaces/macs/%s/local-ipv4s", mac)); err != nil {
- for _, addr := range localAddr {
- network.Addresses = append(network.Addresses, addr+"/"+cidr[1])
- }
- }
- }
- // ipv6
- if localAddr, err := ms.FetchAttributes(fmt.Sprintf("network/interfaces/macs/%s/ipv6s", mac)); err != nil {
- if subnetCidrBlock, err := ms.FetchAttributes(fmt.Sprintf("network/interfaces/macs/%s/subnet-ipv6-cidr-block", mac)); err != nil {
- for i, addr := range localAddr {
- cidr := strings.Split(subnetCidrBlock[i], "/")
- network.Addresses = append(network.Addresses, addr+"/"+cidr[1])
- }
- }
- }
- */
- // disabled - it looks to me like you don't actually put the public IP on the eth device
- /* if publicAddr, err := ms.FetchAttributes(fmt.Sprintf("network/interfaces/macs/%s/public-ipv4s", mac)); err != nil {
- if vpcCidrBlock, err := ms.FetchAttribute(fmt.Sprintf("network/interfaces/macs/%s/vpc-ipv4-cidr-block", mac)); err != nil {
- cidr := strings.Split(vpcCidrBlock, "/")
- network.Addresses = append(network.Addresses, publicAddr+"/"+cidr[1])
- }
- }
- */
- metadata.NetworkConfig.Interfaces["eth"+deviceNumber] = network
- }
- }
- }
- // With C5 and M5 instances, EBS volumes are exposed as NVMe block devices.
- // http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/nvme-ebs-volumes.html
- metadata.RootDisk = defaultXVRootDisk
- if instanceType, err := ms.FetchAttribute("instance-type"); err == nil {
- if strings.HasPrefix(instanceType, "m5") || strings.HasPrefix(instanceType, "c5") {
- metadata.RootDisk = defaultNVMeRootDisk
- }
- } else if _, ok := err.(pkg.ErrNotFound); !ok {
- return metadata, err
- }
- return metadata, nil
- }
- func (ms MetadataService) Type() string {
- return "ec2-metadata-service"
- }
|