Fixing Many Issues

pull/6/head
Adam Sunderland 2015-05-14 18:53:47 -05:00
parent 6355aa2e51
commit 9849db7fdf
2 changed files with 177 additions and 93 deletions

View File

@ -31,6 +31,7 @@ import (
"code.google.com/p/gcfg" "code.google.com/p/gcfg"
"github.com/awslabs/aws-sdk-go/aws" "github.com/awslabs/aws-sdk-go/aws"
"github.com/awslabs/aws-sdk-go/aws/credentials"
"github.com/awslabs/aws-sdk-go/service/ec2" "github.com/awslabs/aws-sdk-go/service/ec2"
"github.com/GoogleCloudPlatform/kubernetes/pkg/api" "github.com/GoogleCloudPlatform/kubernetes/pkg/api"
@ -46,16 +47,16 @@ type EC2 interface {
Instances(instanceIds []string, filter *ec2InstanceFilter) (instances []*ec2.Instance, err error) Instances(instanceIds []string, filter *ec2InstanceFilter) (instances []*ec2.Instance, err error)
// Attach a volume to an instance // Attach a volume to an instance
AttachVolume(volumeID string, instanceId string, mountDevice string) (resp *ec2.AttachVolumeResp, err error) AttachVolume(volumeID, instanceId, mountDevice string) (resp *ec2.VolumeAttachment, err error)
// Detach a volume from whatever instance it is attached to // Detach a volume from whatever instance it is attached to
// TODO: We should specify the InstanceID and the Device, for safety // TODO: We should specify the InstanceID and the Device, for safety
DetachVolume(volumeID string) (resp *ec2.SimpleResp, err error) DetachVolume(volumeID, instanceId, mountDevice string) (resp *ec2.VolumeAttachment, err error)
// Lists volumes // Lists volumes
Volumes(volumeIDs []string, filter *ec2.Filter) (resp *ec2.VolumesResp, err error) Volumes(volumeIDs []string, filter *ec2.Filter) (resp *ec2.DescribeVolumesOutput, err error)
// Create an EBS volume // Create an EBS volume
CreateVolume(request *ec2.CreateVolume) (resp *ec2.CreateVolumeResp, err error) CreateVolume(request *ec2.CreateVolumeInput) (resp *ec2.Volume, err error)
// Delete an EBS volume // Delete an EBS volume
DeleteVolume(volumeID string) (resp *ec2.SimpleResp, err error) DeleteVolume(volumeID string) (resp *ec2.DeleteVolumeOutput, err error)
} }
// Abstraction over the AWS metadata service // Abstraction over the AWS metadata service
@ -123,6 +124,14 @@ type awsSdkEC2 struct {
ec2 *ec2.EC2 ec2 *ec2.EC2
} }
func stringPointerArray(orig []string) []*string {
n := make([]*string, len(orig))
for i, s := range orig {
n[i] = &s
}
return n
}
// Implementation of EC2.Instances // Implementation of EC2.Instances
func (self *awsSdkEC2) Instances(instanceIds []string, filter *ec2InstanceFilter) (resp []*ec2.Instance, err error) { func (self *awsSdkEC2) Instances(instanceIds []string, filter *ec2InstanceFilter) (resp []*ec2.Instance, err error) {
var filters []*ec2.Filter var filters []*ec2.Filter
@ -142,7 +151,7 @@ func (self *awsSdkEC2) Instances(instanceIds []string, filter *ec2InstanceFilter
for { for {
res, err := self.ec2.DescribeInstances(&ec2.DescribeInstancesInput{ res, err := self.ec2.DescribeInstances(&ec2.DescribeInstancesInput{
InstanceIDs: instanceIds, InstanceIDs: stringPointerArray(instanceIds),
Filters: filters, Filters: filters,
NextToken: &nextToken, NextToken: &nextToken,
}) })
@ -175,7 +184,7 @@ var metadataClient = http.Client{
// Implements AWSMetadata.GetMetaData // Implements AWSMetadata.GetMetaData
func (self *awsSdkMetadata) GetMetaData(key string) ([]byte, error) { func (self *awsSdkMetadata) GetMetaData(key string) ([]byte, error) {
// TODO Get an implementation of this merged into aws-sdk-go // TODO Get an implementation of this merged into aws-sdk-go
url := "http://169.254.169.254/latest/meta-data" + path url := "http://169.254.169.254/latest/meta-data/" + key
res, err := metadataClient.Get(url) res, err := metadataClient.Get(url)
if err != nil { if err != nil {
@ -196,26 +205,41 @@ func (self *awsSdkMetadata) GetMetaData(key string) ([]byte, error) {
return []byte(body), nil return []byte(body), nil
} }
type AuthFunc func() (creds aws.CredentialsProvider, err error) type AuthFunc func() (creds *credentials.Credentials)
func (s *awsSdkEC2) AttachVolume(volumeID string, instanceId string, device string) (resp *ec2.AttachVolumeResp, err error) { func (s *awsSdkEC2) AttachVolume(volumeID, instanceId, device string) (resp *ec2.VolumeAttachment, err error) {
return s.ec2.AttachVolume(volumeID, instanceId, device)
request := ec2.AttachVolumeInput{
Device: &device,
InstanceID: &instanceId,
VolumeID: &volumeID,
}
return s.ec2.AttachVolume(&request)
} }
func (s *awsSdkEC2) DetachVolume(volumeID string) (resp *ec2.SimpleResp, err error) { func (s *awsSdkEC2) DetachVolume(volumeID, instanceId, device string) (resp *ec2.VolumeAttachment, err error) {
return s.ec2.DetachVolume(volumeID) request := ec2.DetachVolumeInput{
Device: &device,
InstanceID: &instanceId,
VolumeID: &volumeID,
}
return s.ec2.DetachVolume(&request)
} }
func (s *awsSdkEC2) Volumes(volumeIDs []string, filter *ec2.Filter) (resp *ec2.VolumesResp, err error) { func (s *awsSdkEC2) Volumes(volumeIDs []string, filter *ec2.Filter) (resp *ec2.DescribeVolumesOutput, err error) {
return s.ec2.Volumes(volumeIDs, filter) request := ec2.DescribeVolumesInput{
VolumeIDs: stringPointerArray(volumeIDs),
}
return s.ec2.DescribeVolumes(&request)
} }
func (s *awsSdkEC2) CreateVolume(request *ec2.CreateVolume) (resp *ec2.CreateVolumeResp, err error) { func (s *awsSdkEC2) CreateVolume(request *ec2.CreateVolumeInput) (resp *ec2.Volume, err error) {
return s.ec2.CreateVolume(request) return s.ec2.CreateVolume(request)
} }
func (s *awsSdkEC2) DeleteVolume(volumeID string) (resp *ec2.SimpleResp, err error) { func (s *awsSdkEC2) DeleteVolume(volumeID string) (resp *ec2.DeleteVolumeOutput, err error) {
return s.ec2.DeleteVolume(volumeID) request := ec2.DeleteVolumeInput{VolumeID: &volumeID}
return s.ec2.DeleteVolume(&request)
} }
func init() { func init() {
@ -225,8 +249,8 @@ func init() {
}) })
} }
func getAuth() (creds aws.CredentialsProvider) { func getAuth() (creds *credentials.Credentials) {
return aws.DetectCreds("", "", "") return credentials.NewStaticCredentials("", "", "")
} }
// readAWSCloudConfig reads an instance of AWSCloudConfig from config reader. // readAWSCloudConfig reads an instance of AWSCloudConfig from config reader.
@ -339,11 +363,11 @@ func (aws *AWSCloud) NodeAddresses(name string) ([]api.NodeAddress, error) {
addresses := []api.NodeAddress{} addresses := []api.NodeAddress{}
if *instance.PrivateIpAddress != "" { if *instance.PrivateIPAddress != "" {
ipAddress := *instance.PrivateIpAddress ipAddress := *instance.PrivateIPAddress
ip := net.ParseIP(ipAddress) ip := net.ParseIP(ipAddress)
if ip == nil { if ip == nil {
return nil, fmt.Errorf("EC2 instance had invalid private address: %s (%s)", *instance.InstanceId, ipAddress) return nil, fmt.Errorf("EC2 instance had invalid private address: %s (%s)", *instance.InstanceID, ipAddress)
} }
addresses = append(addresses, api.NodeAddress{Type: api.NodeInternalIP, Address: ip.String()}) addresses = append(addresses, api.NodeAddress{Type: api.NodeInternalIP, Address: ip.String()})
@ -352,11 +376,11 @@ func (aws *AWSCloud) NodeAddresses(name string) ([]api.NodeAddress, error) {
} }
// TODO: Other IP addresses (multiple ips)? // TODO: Other IP addresses (multiple ips)?
if *instance.PublicIpAddress != "" { if *instance.PublicIPAddress != "" {
ipAddress := *instance.PublicIpAddress ipAddress := *instance.PublicIPAddress
ip := net.ParseIP(ipAddress) ip := net.ParseIP(ipAddress)
if ip == nil { if ip == nil {
return nil, fmt.Errorf("EC2 instance had invalid public address: %s (%s)", *instance.InstanceId, ipAddress) return nil, fmt.Errorf("EC2 instance had invalid public address: %s (%s)", *instance.InstanceID, ipAddress)
} }
addresses = append(addresses, api.NodeAddress{Type: api.NodeExternalIP, Address: ip.String()}) addresses = append(addresses, api.NodeAddress{Type: api.NodeExternalIP, Address: ip.String()})
} }
@ -370,7 +394,7 @@ func (aws *AWSCloud) ExternalID(name string) (string, error) {
if err != nil { if err != nil {
return "", err return "", err
} }
return inst.InstanceId, nil return *inst.InstanceID, nil
} }
// Return the instances matching the relevant private dns name. // Return the instances matching the relevant private dns name.
@ -411,7 +435,8 @@ func (aws *AWSCloud) getInstancesByDnsName(name string) (*ec2.Instance, error) {
// Check if the instance is alive (running or pending) // Check if the instance is alive (running or pending)
// We typically ignore instances that are not alive // We typically ignore instances that are not alive
func isAlive(instance *ec2.Instance) bool { func isAlive(instance *ec2.Instance) bool {
switch *instance.State.Name { state := *instance.State
switch *state.Name {
case "shutting-down", "terminated", "stopping", "stopped": case "shutting-down", "terminated", "stopping", "stopped":
return false return false
case "pending", "running": case "pending", "running":
@ -693,23 +718,17 @@ func (self *awsInstance) getInstanceType() *awsInstanceType {
// Gets the full information about this instance from the EC2 API // Gets the full information about this instance from the EC2 API
func (self *awsInstance) getInfo() (*ec2.Instance, error) { func (self *awsInstance) getInfo() (*ec2.Instance, error) {
resp, err := self.ec2.Instances([]string{self.awsID}, nil) instances, err := self.ec2.Instances([]string{self.awsID}, nil)
if err != nil { if err != nil {
return nil, fmt.Errorf("error querying ec2 for instance info: %v", err) return nil, fmt.Errorf("error querying ec2 for instance info: %v", err)
} }
if len(resp.Reservations) == 0 { if len(instances) == 0 {
return nil, fmt.Errorf("no reservations found for instance: %s", self.awsID)
}
if len(resp.Reservations) > 1 {
return nil, fmt.Errorf("multiple reservations found for instance: %s", self.awsID)
}
if len(resp.Reservations[0].Instances) == 0 {
return nil, fmt.Errorf("no instances found for instance: %s", self.awsID) return nil, fmt.Errorf("no instances found for instance: %s", self.awsID)
} }
if len(resp.Reservations[0].Instances) > 1 { if len(instances) > 1 {
return nil, fmt.Errorf("multiple instances found for instance: %s", self.awsID) return nil, fmt.Errorf("multiple instances found for instance: %s", self.awsID)
} }
return &resp.Reservations[0].Instances[0], nil return instances[0], nil
} }
// Assigns an unused mount device for the specified volume. // Assigns an unused mount device for the specified volume.
@ -733,8 +752,8 @@ func (self *awsInstance) assignMountDevice(volumeID string) (mountDevice string,
return "", false, err return "", false, err
} }
deviceMappings := map[string]string{} deviceMappings := map[string]string{}
for _, blockDevice := range info.BlockDevices { for _, blockDevice := range info.BlockDeviceMappings {
deviceMappings[blockDevice.DeviceName] = blockDevice.VolumeId deviceMappings[*blockDevice.DeviceName] = *blockDevice.EBS.VolumeID
} }
self.deviceMappings = deviceMappings self.deviceMappings = deviceMappings
} }
@ -840,7 +859,7 @@ func (self *awsDisk) getInfo() (*ec2.Volume, error) {
if len(resp.Volumes) > 1 { if len(resp.Volumes) > 1 {
return nil, fmt.Errorf("multiple volumes found for volume: %s", self.awsID) return nil, fmt.Errorf("multiple volumes found for volume: %s", self.awsID)
} }
return &resp.Volumes[0], nil return resp.Volumes[0], nil
} }
func (self *awsDisk) waitForAttachmentStatus(status string) error { func (self *awsDisk) waitForAttachmentStatus(status string) error {
@ -861,7 +880,7 @@ func (self *awsDisk) waitForAttachmentStatus(status string) error {
if attachmentStatus != "" { if attachmentStatus != "" {
glog.Warning("Found multiple attachments: ", info) glog.Warning("Found multiple attachments: ", info)
} }
attachmentStatus = attachment.Status attachmentStatus = *attachment.State
} }
if attachmentStatus == "" { if attachmentStatus == "" {
attachmentStatus = "detached" attachmentStatus = "detached"
@ -931,7 +950,7 @@ func (aws *AWSCloud) AttachDisk(instanceName string, diskName string, readOnly b
return "", fmt.Errorf("Error finding instance: %v", err) return "", fmt.Errorf("Error finding instance: %v", err)
} }
awsInstance = newAWSInstance(aws.ec2, instance.InstanceId) awsInstance = newAWSInstance(aws.ec2, *instance.InstanceID)
} }
if readOnly { if readOnly {
@ -985,7 +1004,7 @@ func (aws *AWSCloud) DetachDisk(instanceName string, diskName string) error {
} }
// TODO: We should specify the InstanceID and the Device, for safety // TODO: We should specify the InstanceID and the Device, for safety
response, err := aws.ec2.DetachVolume(disk.awsID) response, err := aws.ec2.DetachVolume(disk.awsID, instanceName, diskName)
if err != nil { if err != nil {
return fmt.Errorf("error detaching EBS volume: %v", err) return fmt.Errorf("error detaching EBS volume: %v", err)
} }
@ -1002,18 +1021,19 @@ func (aws *AWSCloud) DetachDisk(instanceName string, diskName string) error {
// Implements Volumes.CreateVolume // Implements Volumes.CreateVolume
func (aws *AWSCloud) CreateVolume(volumeOptions *VolumeOptions) (string, error) { func (aws *AWSCloud) CreateVolume(volumeOptions *VolumeOptions) (string, error) {
request := &ec2.CreateVolume{} request := &ec2.CreateVolumeInput{}
request.AvailZone = aws.availabilityZone request.AvailabilityZone = &aws.availabilityZone
request.Size = (int64(volumeOptions.CapacityMB) + 1023) / 1024 volSize := (int64(volumeOptions.CapacityMB) + 1023) / 1024
request.Size = &volSize
response, err := aws.ec2.CreateVolume(request) response, err := aws.ec2.CreateVolume(request)
if err != nil { if err != nil {
return "", err return "", err
} }
az := response.AvailZone az := response.AvailabilityZone
awsID := response.VolumeId awsID := response.VolumeID
volumeName := "aws://" + az + "/" + awsID volumeName := "aws://" + *az + "/" + *awsID
return volumeName, nil return volumeName, nil
} }

View File

@ -23,6 +23,7 @@ import (
"testing" "testing"
"github.com/awslabs/aws-sdk-go/aws" "github.com/awslabs/aws-sdk-go/aws"
"github.com/awslabs/aws-sdk-go/aws/credentials"
"github.com/awslabs/aws-sdk-go/service/ec2" "github.com/awslabs/aws-sdk-go/service/ec2"
"github.com/GoogleCloudPlatform/kubernetes/pkg/api" "github.com/GoogleCloudPlatform/kubernetes/pkg/api"
@ -96,8 +97,8 @@ func TestReadAWSCloudConfig(t *testing.T) {
} }
func TestNewAWSCloud(t *testing.T) { func TestNewAWSCloud(t *testing.T) {
fakeAuthFunc := func() (creds aws.CredentialProvider, err error) { fakeAuthFunc := func() (creds *credentials.Credentials) {
return aws.DetectCreds("", "", "") return credentials.NewStaticCredentials("", "", "")
} }
tests := []struct { tests := []struct {
@ -173,13 +174,13 @@ func contains(haystack []string, needle string) bool {
return false return false
} }
func (self *FakeEC2) Instances(instanceIds []string, filter *ec2InstanceFilter) (resp *ec2.InstancesResp, err error) { func (self *FakeEC2) Instances(instanceIds []string, filter *ec2InstanceFilter) (instances []*ec2.Instance, err error) {
matches := []*ec2.Instance{} matches := []*ec2.Instance{}
for _, instance := range self.instances { for _, instance := range self.instances {
if filter != nil && !filter.Matches(instance) { if filter != nil && !filter.Matches(instance) {
continue continue
} }
if instanceIds != nil && !contains(instanceIds, instance.InstanceId) { if instanceIds != nil && !contains(instanceIds, *instance.InstanceID) {
continue continue
} }
matches = append(matches, instance) matches = append(matches, instance)
@ -203,23 +204,23 @@ func (self *FakeMetadata) GetMetaData(key string) ([]byte, error) {
} }
} }
func (ec2 *FakeEC2) AttachVolume(volumeID string, instanceId string, mountDevice string) (resp *ec2.AttachVolumeResp, err error) { func (ec2 *FakeEC2) AttachVolume(volumeID, instanceId, mountDevice string) (resp *ec2.VolumeAttachment, err error) {
panic("Not implemented") panic("Not implemented")
} }
func (ec2 *FakeEC2) DetachVolume(volumeID string) (resp *ec2.SimpleResp, err error) { func (ec2 *FakeEC2) DetachVolume(volumeID, instanceId, mountDevice string) (resp *ec2.VolumeAttachment, err error) {
panic("Not implemented") panic("Not implemented")
} }
func (ec2 *FakeEC2) Volumes(volumeIDs []string, filter *ec2.Filter) (resp *ec2.VolumesResp, err error) { func (ec2 *FakeEC2) Volumes(volumeIDs []string, filter *ec2.Filter) (resp *ec2.DescribeVolumesOutput, err error) {
panic("Not implemented") panic("Not implemented")
} }
func (ec2 *FakeEC2) CreateVolume(request *ec2.CreateVolume) (resp *ec2.CreateVolumeResp, err error) { func (ec2 *FakeEC2) CreateVolume(request *ec2.CreateVolumeInput) (resp *ec2.Volume, err error) {
panic("Not implemented") panic("Not implemented")
} }
func (ec2 *FakeEC2) DeleteVolume(volumeID string) (resp *ec2.SimpleResp, err error) { func (ec2 *FakeEC2) DeleteVolume(volumeID string) (resp *ec2.DeleteVolumeOutput, err error) {
panic("Not implemented") panic("Not implemented")
} }
@ -243,32 +244,61 @@ func mockAvailabilityZone(region string, availabilityZone string) *AWSCloud {
} }
func TestList(t *testing.T) { func TestList(t *testing.T) {
instances := make([]*ec2.Instance, 4) // TODO this setup is not very clean and could probably be improved
instances[0].Tags = []ec2.Tag{{ var instance0 ec2.Instance
var instance1 ec2.Instance
var instance2 ec2.Instance
var instance3 ec2.Instance
//0
tag0 := ec2.Tag{
Key: aws.String("Name"), Key: aws.String("Name"),
Value: aws.String("foo"), Value: aws.String("foo"),
}} }
instances[0].PrivateDNSName = aws.String("instance1") instance0.Tags = []*ec2.Tag{&tag0}
instances[0].State.Name = aws.String("running") instance0.PrivateDNSName = aws.String("instance1")
instances[1].Tags = []ec2.Tag{{ state0 := ec2.InstanceState{
Name: aws.String("running"),
}
instance0.State = &state0
//1
tag1 := ec2.Tag{
Key: aws.String("Name"), Key: aws.String("Name"),
Value: aws.String("bar"), Value: aws.String("bar"),
}} }
instances[1].PrivateDNSName = aws.String("instance2") instance1.Tags = []*ec2.Tag{&tag1}
instances[1].State.Name = aws.String("running") instance1.PrivateDNSName = aws.String("instance2")
instances[2].Tags = []ec2.Tag{{ state1 := ec2.InstanceState{
Name: aws.String("running"),
}
instance1.State = &state1
//2
tag2 := ec2.Tag{
Key: aws.String("Name"), Key: aws.String("Name"),
Value: aws.String("baz"), Value: aws.String("baz"),
}} }
instances[2].PrivateDNSName = aws.String("instance3") instance2.Tags = []*ec2.Tag{&tag2}
instances[2].State.Name = aws.String("running") instance2.PrivateDNSName = aws.String("instance3")
instances[3].Tags = []ec2.Tag{{ state2 := ec2.InstanceState{
Name: aws.String("running"),
}
instance2.State = &state2
//3
tag3 := ec2.Tag{
Key: aws.String("Name"), Key: aws.String("Name"),
Value: aws.String("quux"), Value: aws.String("quux"),
}} }
instances[3].PrivateDNSName = aws.String("instance4") instance3.Tags = []*ec2.Tag{&tag3}
instances[3].State.Name = aws.String("running") instance3.PrivateDNSName = aws.String("instance4")
state3 := ec2.InstanceState{
Name: aws.String("running"),
}
instance3.State = &state3
instances := []*ec2.Instance{&instance0, &instance1, &instance2, &instance3}
aws := mockInstancesResp(instances) aws := mockInstancesResp(instances)
table := []struct { table := []struct {
@ -303,14 +333,29 @@ func testHasNodeAddress(t *testing.T, addrs []api.NodeAddress, addressType api.N
func TestNodeAddresses(t *testing.T) { func TestNodeAddresses(t *testing.T) {
// Note these instances have the same name // Note these instances have the same name
// (we test that this produces an error) // (we test that this produces an error)
instances := make([]*ec2.Instance, 2) var instance0 ec2.Instance
instances[0].PrivateDNSName = aws.String("instance1") var instance1 ec2.Instance
instances[0].PrivateIpAddress = aws.String("192.168.0.1")
instances[0].PublicIpAddress = aws.String("1.2.3.4") //0
instances[0].State.Name = aws.String("running") instance0.PrivateDNSName = aws.String("instance1")
instances[1].PrivateDNSName = aws.String("instance1") instance0.PrivateIPAddress = aws.String("192.168.0.1")
instances[1].PrivateIpAddress = aws.String("192.168.0.2") instance0.PublicIPAddress = aws.String("1.2.3.4")
instances[1].State.Name = aws.String("running") instance0.InstanceType = aws.String("c3.large")
state0 := ec2.InstanceState{
Name: aws.String("running"),
}
instance0.State = &state0
//1
instance1.PrivateDNSName = aws.String("instance2")
instance1.PrivateIPAddress = aws.String("192.168.0.2")
instance1.InstanceType = aws.String("c3.large")
state1 := ec2.InstanceState{
Name: aws.String("running"),
}
instance1.State = &state1
instances := []*ec2.Instance{&instance0, &instance1}
aws1 := mockInstancesResp([]*ec2.Instance{}) aws1 := mockInstancesResp([]*ec2.Instance{})
_, err1 := aws1.NodeAddresses("instance") _, err1 := aws1.NodeAddresses("instance")
@ -356,16 +401,35 @@ func TestGetRegion(t *testing.T) {
} }
func TestGetResources(t *testing.T) { func TestGetResources(t *testing.T) {
instances := make([]*ec2.Instance, 3) var instance0 ec2.Instance
instances[0].PrivateDNSName = aws.String("m3.medium") var instance1 ec2.Instance
instances[0].InstanceType = aws.String("m3.medium") var instance2 ec2.Instance
instances[0].State.Name = aws.String("running")
instances[1].PrivateDNSName = aws.String("r3.8xlarge") //0
instances[1].InstanceType = aws.String("r3.8xlarge") instance0.PrivateDNSName = aws.String("m3.medium")
instances[1].State.Name = aws.String("running") instance0.InstanceType = aws.String("m3.medium")
instances[2].PrivateDNSName = aws.String("unknown.type") state0 := ec2.InstanceState{
instances[2].InstanceType = aws.String("unknown.type") Name: aws.String("running"),
instances[2].State.Name = aws.String("running") }
instance0.State = &state0
//1
instance1.PrivateDNSName = aws.String("r3.8xlarge")
instance1.InstanceType = aws.String("r3.8xlarge")
state1 := ec2.InstanceState{
Name: aws.String("running"),
}
instance1.State = &state1
//2
instance2.PrivateDNSName = aws.String("unknown.type")
instance2.InstanceType = aws.String("unknown.type")
state2 := ec2.InstanceState{
Name: aws.String("running"),
}
instance2.State = &state2
instances := []*ec2.Instance{&instance0, &instance1, &instance2}
aws1 := mockInstancesResp(instances) aws1 := mockInstancesResp(instances)