sailesh1993 / rpms / cloud-init

Forked from rpms/cloud-init a year ago
Clone
46a734
From c0df7233fa99d4191b5d4142e209e7465d8db5f6 Mon Sep 17 00:00:00 2001
46a734
From: Anh Vo <anhvo@microsoft.com>
46a734
Date: Tue, 27 Apr 2021 13:40:59 -0400
46a734
Subject: [PATCH 7/7] Azure: adding support for consuming userdata from IMDS
46a734
 (#884)
46a734
46a734
RH-Author: Eduardo Otubo <otubo@redhat.com>
46a734
RH-MergeRequest: 45: Add support for userdata on Azure from IMDS
46a734
RH-Commit: [7/7] 32f840412da1a0f49b9ab5ba1d6f1bcb1bfacc16
46a734
RH-Bugzilla: 2023940
46a734
RH-Acked-by: Emanuele Giuseppe Esposito <eesposit@redhat.com>
46a734
RH-Acked-by: Mohamed Gamal Morsy <mmorsy@redhat.com>
46a734
---
46a734
 cloudinit/sources/DataSourceAzure.py          | 23 ++++++++-
46a734
 tests/unittests/test_datasource/test_azure.py | 50 +++++++++++++++++++
46a734
 2 files changed, 72 insertions(+), 1 deletion(-)
46a734
46a734
diff --git a/cloudinit/sources/DataSourceAzure.py b/cloudinit/sources/DataSourceAzure.py
46a734
index d0be6d84..a66f023d 100755
46a734
--- a/cloudinit/sources/DataSourceAzure.py
46a734
+++ b/cloudinit/sources/DataSourceAzure.py
46a734
@@ -83,7 +83,7 @@ AGENT_SEED_DIR = '/var/lib/waagent'
46a734
 IMDS_TIMEOUT_IN_SECONDS = 2
46a734
 IMDS_URL = "http://169.254.169.254/metadata"
46a734
 IMDS_VER_MIN = "2019-06-01"
46a734
-IMDS_VER_WANT = "2020-10-01"
46a734
+IMDS_VER_WANT = "2021-01-01"
46a734
 
46a734
 
46a734
 # This holds SSH key data including if the source was
46a734
@@ -539,6 +539,20 @@ class DataSourceAzure(sources.DataSource):
46a734
                     imds_disable_password
46a734
                 )
46a734
                 crawled_data['metadata']['disable_password'] = imds_disable_password  # noqa: E501
46a734
+
46a734
+            # only use userdata from imds if OVF did not provide custom data
46a734
+            # userdata provided by IMDS is always base64 encoded
46a734
+            if not userdata_raw:
46a734
+                imds_userdata = _userdata_from_imds(imds_md)
46a734
+                if imds_userdata:
46a734
+                    LOG.debug("Retrieved userdata from IMDS")
46a734
+                    try:
46a734
+                        crawled_data['userdata_raw'] = base64.b64decode(
46a734
+                            ''.join(imds_userdata.split()))
46a734
+                    except Exception:
46a734
+                        report_diagnostic_event(
46a734
+                            "Bad userdata in IMDS",
46a734
+                            logger_func=LOG.warning)
46a734
             found = cdev
46a734
 
46a734
             report_diagnostic_event(
46a734
@@ -1512,6 +1526,13 @@ def _username_from_imds(imds_data):
46a734
         return None
46a734
 
46a734
 
46a734
+def _userdata_from_imds(imds_data):
46a734
+    try:
46a734
+        return imds_data['compute']['userData']
46a734
+    except KeyError:
46a734
+        return None
46a734
+
46a734
+
46a734
 def _hostname_from_imds(imds_data):
46a734
     try:
46a734
         return imds_data['compute']['osProfile']['computerName']
46a734
diff --git a/tests/unittests/test_datasource/test_azure.py b/tests/unittests/test_datasource/test_azure.py
46a734
index c4a8e08d..f8433690 100644
46a734
--- a/tests/unittests/test_datasource/test_azure.py
46a734
+++ b/tests/unittests/test_datasource/test_azure.py
46a734
@@ -1899,6 +1899,56 @@ scbus-1 on xpt0 bus 0
46a734
         dsrc.get_data()
46a734
         self.assertTrue(dsrc.metadata["disable_password"])
46a734
 
46a734
+    @mock.patch(MOCKPATH + 'get_metadata_from_imds')
46a734
+    def test_userdata_from_imds(self, m_get_metadata_from_imds):
46a734
+        sys_cfg = {'datasource': {'Azure': {'apply_network_config': True}}}
46a734
+        odata = {'HostName': "myhost", 'UserName': "myuser"}
46a734
+        data = {
46a734
+            'ovfcontent': construct_valid_ovf_env(data=odata),
46a734
+            'sys_cfg': sys_cfg
46a734
+        }
46a734
+        userdata = "userdataImds"
46a734
+        imds_data = copy.deepcopy(NETWORK_METADATA)
46a734
+        imds_data["compute"]["osProfile"] = dict(
46a734
+            adminUsername="username1",
46a734
+            computerName="hostname1",
46a734
+            disablePasswordAuthentication="true",
46a734
+        )
46a734
+        imds_data["compute"]["userData"] = b64e(userdata)
46a734
+        m_get_metadata_from_imds.return_value = imds_data
46a734
+        dsrc = self._get_ds(data)
46a734
+        ret = dsrc.get_data()
46a734
+        self.assertTrue(ret)
46a734
+        self.assertEqual(dsrc.userdata_raw, userdata.encode('utf-8'))
46a734
+
46a734
+    @mock.patch(MOCKPATH + 'get_metadata_from_imds')
46a734
+    def test_userdata_from_imds_with_customdata_from_OVF(
46a734
+            self, m_get_metadata_from_imds):
46a734
+        userdataOVF = "userdataOVF"
46a734
+        odata = {
46a734
+            'HostName': "myhost", 'UserName': "myuser",
46a734
+            'UserData': {'text': b64e(userdataOVF), 'encoding': 'base64'}
46a734
+        }
46a734
+        sys_cfg = {'datasource': {'Azure': {'apply_network_config': True}}}
46a734
+        data = {
46a734
+            'ovfcontent': construct_valid_ovf_env(data=odata),
46a734
+            'sys_cfg': sys_cfg
46a734
+        }
46a734
+
46a734
+        userdataImds = "userdataImds"
46a734
+        imds_data = copy.deepcopy(NETWORK_METADATA)
46a734
+        imds_data["compute"]["osProfile"] = dict(
46a734
+            adminUsername="username1",
46a734
+            computerName="hostname1",
46a734
+            disablePasswordAuthentication="true",
46a734
+        )
46a734
+        imds_data["compute"]["userData"] = b64e(userdataImds)
46a734
+        m_get_metadata_from_imds.return_value = imds_data
46a734
+        dsrc = self._get_ds(data)
46a734
+        ret = dsrc.get_data()
46a734
+        self.assertTrue(ret)
46a734
+        self.assertEqual(dsrc.userdata_raw, userdataOVF.encode('utf-8'))
46a734
+
46a734
 
46a734
 class TestAzureBounce(CiTestCase):
46a734
 
46a734
-- 
46a734
2.27.0
46a734