xxh亲测openstack的api操作

2020-12-19 00:34

阅读:412

标签:image   mamicode   老师   live   标识   wireshark   def   war   ofo   

案例一:抓包构造出新建云主机(实例)的url
1.wireshark打开抓vmware vmnet8的网卡,过滤条件tcp.port == 8774 && http.request.method == POST 开始启动!

2.web上新建名称为wireshark的实例
技术图片
3.过滤条件tcp.port == 8774 && http.request.method == POST有数据了,打开此http流,图片如下:
技术图片

POST /v2.1/c0e784c602af4b40933a78bc3dcda542/servers HTTP/1.1
Host: controller:8774
Connection: keep-alive
Accept-Encoding: gzip, deflate
Accept: application/json
User-Agent: python-novaclient
X-Auth-Project-Id: c0e784c602af4b40933a78bc3dcda542
Content-Type: application/json
X-Auth-Token: gAAAAABfol5E8fphn3g-q4zoqt089FHoSefQL1OFeTIg6JqFPvB53mHZMX6-qPK0pNYYa0ce86z_3g_yNNEWh2HlkEVaZq16CIC6MmVcQeyTy69fpRlOYfZp90-FiEDiHFQlPMPoZlDb0yrhraaxKPW4jck9cbzAltnTCYkd8IEfu2R8JYFG0kBuZmQp-1-8Ksd_ZwQQS8O0
Content-Length: 349

{"server": {"name": "wireshark", "imageRef": "4dea33ea-a34f-4e07-845a-4c212deee901", "availability_zone": "nova", "key_name": "mykey", "flavorRef": "0", "OS-DCF:diskConfig": "AUTO", "max_count": 1, "min_count": 1, "networks": [{"uuid": "a730ba59-ca28-48e6-a7f6-11703e879b30"}], "security_groups": [{"name": "04a70b53-eea2-4b45-a11a-d66624b2c612"}]}}

通过上面信息,构建一个api的url,用此url构建出第二台虚拟机wireshark2,我构造出来的api url如下:
curl -X POST -H "Content-Type: application/json" -H "X-Auth-Token: gAAAAABfol5E8fphn3g-q4zoqt089FHoSefQL1OFeTIg6JqFPvB53mHZMX6-qPK0pNYYa0ce86z_3g_yNNEWh2HlkEVaZq16CIC6MmVcQeyTy69fpRlOYfZp90-FiEDiHFQlPMPoZlDb0yrhraaxKPW4jck9cbzAltnTCYkd8IEfu2R8JYFG0kBuZmQp-1-8Ksd_ZwQQS8O0" -d ‘
{
"server": {
"name": "wireshark2",
"imageRef": "4dea33ea-a34f-4e07-845a-4c212deee901",
"availability_zone": "nova",
"key_name": "mykey",
"flavorRef": "0",
"OS-DCF:diskConfig": "AUTO",
"max_count": 1,
"min_count": 1,
"networks": [{
"uuid": "a730ba59-ca28-48e6-a7f6-11703e879b30"
}],
"security_groups": [{
"name": "04a70b53-eea2-4b45-a11a-d66624b2c612"
}]
}
}‘ http://controller:8774/v2.1/c0e784c602af4b40933a78bc3dcda542/servers
之后也成功建立出来虚拟机了!(注意格式化的json串在cli执行前用文本工具吧tab替换为空格哈!)
技术图片

案例二:抓包构造出删除云主机(实例)的url

(2)删除主机抓包得到api
抓包过滤条件是tcp.port == 8774 && http.request.method == DELETE
得到抓包信息如下:

DELETE /v2.1/c0e784c602af4b40933a78bc3dcda542/servers/e22e0fd1-44e2-487d-a37c-5d36c721ec1b HTTP/1.1
Host: controller:8774
Connection: keep-alive
Accept-Encoding: gzip, deflate
Accept: application/json
User-Agent: python-novaclient
X-Auth-Project-Id: c0e784c602af4b40933a78bc3dcda542
X-Auth-Token: gAAAAABfol5E8fphn3g-q4zoqt089FHoSefQL1OFeTIg6JqFPvB53mHZMX6-qPK0pNYYa0ce86z_3g_yNNEWh2HlkEVaZq16CIC6MmVcQeyTy69fpRlOYfZp90-FiEDiHFQlPMPoZlDb0yrhraaxKPW4jck9cbzAltnTCYkd8IEfu2R8JYFG0kBuZmQp-1-8Ksd_ZwQQS8O0
Content-Length: 0

下面是我通过上面的包构建出来的!
准备删除wireshark4 他的标识是 c7a8e5bc-34d8-4373-a7b8-3b6f6de01aec
curl -X DELETE -H "Content-Type: application/json" -H "X-Auth-Token: gAAAAABfol5E8fphn3g-q4zoqt089FHoSefQL1OFeTIg6JqFPvB53mHZMX6-qPK0pNYYa0ce86z_3g_yNNEWh2HlkEVaZq16CIC6MmVcQeyTy69fpRlOYfZp90-FiEDiHFQlPMPoZlDb0yrhraaxKPW4jck9cbzAltnTCYkd8IEfu2R8JYFG0kBuZmQp-1-8Ksd_ZwQQS8O0" http://controller:8774/v2.1/c0e784c602af4b40933a78bc3dcda542/servers/c7a8e5bc-34d8-4373-a7b8-3b6f6de01aec

备注:后面http是http://controller:8774/v2.1/c0e784c602af4b40933a78bc3dcda542/servers/[id]
其中c0e784c602af4b40933a78bc3dcda542是admin项目的id
技术图片
技术图片

案例三:抓包构造出删除卷、删除镜像等等操作的url都可以类似方法弄出来
此外那个token也可以像老师那样先抓出来利用$token变量存储起来直接引用就不需要那么长一段书写了

明天再补充

(3) 删除一个卷抓包得到api
tcp.port == 8776 && http.request.method == DELETE

(4)新建卷
tcp.port == 8776 && http.request.method == POST

xxh亲测openstack的api操作

标签:image   mamicode   老师   live   标识   wireshark   def   war   ofo   

原文地址:https://blog.51cto.com/8189171/2546795


评论


亲,登录后才可以留言!