2023-11-30 15:55:51 +00:00
|
|
|
from datetime import datetime
|
|
|
|
from unittest import SkipTest
|
|
|
|
from uuid import uuid4
|
|
|
|
|
2021-09-25 11:13:07 +00:00
|
|
|
import boto3
|
2023-07-17 09:31:05 +00:00
|
|
|
import pytest
|
2021-09-25 11:13:07 +00:00
|
|
|
from botocore.exceptions import ClientError
|
2023-11-30 15:55:51 +00:00
|
|
|
|
2022-01-18 15:18:57 +00:00
|
|
|
from moto import mock_ec2, settings
|
2013-02-22 04:13:01 +00:00
|
|
|
|
2023-10-12 18:13:41 +00:00
|
|
|
from .helpers import check_private_key
|
2019-05-25 10:17:52 +00:00
|
|
|
|
2023-10-12 18:13:41 +00:00
|
|
|
ED25519_PUBLIC_KEY_OPENSSH = b"""\
|
|
|
|
ssh-ed25519 \
|
|
|
|
AAAAC3NzaC1lZDI1NTE5AAAAIEwsSB9HbTeKCdkSlMZeTq9jZggaPJUwAsUi/7wakB+B \
|
|
|
|
moto@getmoto"""
|
|
|
|
|
|
|
|
ED25519_PUBLIC_KEY_FINGERPRINT = "6c:d9:cf:90:d7:f7:bc:46:83:9e:f5:56:aa:e1:13:38"
|
|
|
|
|
2019-05-25 10:17:52 +00:00
|
|
|
RSA_PUBLIC_KEY_OPENSSH = b"""\
|
|
|
|
ssh-rsa \
|
|
|
|
AAAAB3NzaC1yc2EAAAADAQABAAABAQDusXfgTE4eBP50NglSzCSEGnIL6+cr6m3H\
|
2020-09-10 08:20:26 +00:00
|
|
|
6cZANOQ+P1o/W4BdtcAL3sor4iGi7SOeJgo\\8kweyMQrhrt6HaKGgromRiz37LQx\
|
2019-05-25 10:17:52 +00:00
|
|
|
4YIAcBi4Zd023mO/V7Rc2Chh18mWgLSmA6ng+j37ip6452zxtv0jHAz9pJolbKBp\
|
|
|
|
JzbZlPN45ZCTk9ck0fSVHRl6VRSSPQcpqi65XpRf+35zNOCGCc1mAOOTmw59Q2a6\
|
|
|
|
A3t8mL7r91aM5q6QOQm219lctFM8O7HRJnDgmhGpnjRwE1LyKktWTbgFZ4SNWU2X\
|
|
|
|
qusUO07jKuSxzPumXBeU+JEtx0J1tqZwJlpGt2R+0qN7nKnPl2+hx \
|
|
|
|
moto@github.com"""
|
|
|
|
|
|
|
|
RSA_PUBLIC_KEY_RFC4716 = b"""\
|
|
|
|
---- BEGIN SSH2 PUBLIC KEY ----
|
|
|
|
AAAAB3NzaC1yc2EAAAADAQABAAABAQDusXfgTE4eBP50NglSzCSEGnIL6+cr6m3H6cZANO
|
|
|
|
Q+P1o/W4BdtcAL3sor4iGi7SOeJgo8kweyMQrhrt6HaKGgromRiz37LQx4YIAcBi4Zd023
|
|
|
|
mO/V7Rc2Chh18mWgLSmA6ng+j37ip6452zxtv0jHAz9pJolbKBpJzbZlPN45ZCTk9ck0fS
|
|
|
|
VHRl6VRSSPQcpqi65XpRf+35zNOCGCc1mAOOTmw59Q2a6A3t8mL7r91aM5q6QOQm219lct
|
|
|
|
FM8O7HRJnDgmhGpnjRwE1LyKktWTbgFZ4SNWU2XqusUO07jKuSxzPumXBeU+JEtx0J1tqZ
|
|
|
|
wJlpGt2R+0qN7nKnPl2+hx
|
|
|
|
---- END SSH2 PUBLIC KEY ----
|
|
|
|
"""
|
|
|
|
|
|
|
|
RSA_PUBLIC_KEY_FINGERPRINT = "6a:49:07:1c:7e:bd:d2:bd:96:25:fe:b5:74:83:ae:fd"
|
|
|
|
|
|
|
|
DSA_PUBLIC_KEY_OPENSSH = b"""ssh-dss \
|
|
|
|
AAAAB3NzaC1kc3MAAACBAJ0aXctVwbN6VB81gpo8R7DUk8zXRjZvrkg8Y8vEGt63gklpNJNsLXtEUXkl5D4c0nD2FZO1rJNqFoe\
|
|
|
|
OQOCoGSfclHvt9w4yPl/lUEtb3Qtj1j80MInETHr19vaSunRk5R+M+8YH+LLcdYdz7MijuGey02mbi0H9K5nUIcuLMArVAAAAFQ\
|
|
|
|
D0RDvsObRWBlnaW8645obZBM86jwAAAIBNZwf3B4krIzAwVfkMHLDSdAvs7lOWE7o8SJLzr9t4a9HhYp9SLbMzJ815KWfidEYV2\
|
|
|
|
+s4ZaPCfcZ1GENFRbE8rixz5eMAjEUXEPMJkblDZTHzMsH96z2cOCQZ0vfOmgznsf18Uf725pqo9OqAioEsTJjX8jtI2qNPEBU0\
|
|
|
|
uhMSZQAAAIBBMGhDu5CWPUlS2QG7vzmzw81XasmHE/s2YPDRbolkriwlunpgwZhCscoQP8HFHY+DLUVvUb+GZwBmFt4l1uHl03b\
|
|
|
|
ffsm7UIHtCBYERr9Nx0u20ldfhkgB1lhaJb5o0ZJ3pmJ38KChfyHe5EUcqRdEFo89Mp72VI2Z6UHyL175RA== \
|
|
|
|
moto@github.com"""
|
|
|
|
|
2013-02-22 04:13:01 +00:00
|
|
|
|
2021-09-25 11:13:07 +00:00
|
|
|
@mock_ec2
|
|
|
|
def test_key_pairs_empty_boto3():
|
2021-10-05 17:11:07 +00:00
|
|
|
if settings.TEST_SERVER_MODE:
|
|
|
|
raise SkipTest("ServerMode is not guaranteed to be empty")
|
2021-09-25 11:13:07 +00:00
|
|
|
client = boto3.client("ec2", "us-west-1")
|
2023-07-17 09:31:05 +00:00
|
|
|
assert client.describe_key_pairs()["KeyPairs"] == []
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_key_pairs_invalid_id_boto3():
|
|
|
|
client = boto3.client("ec2", "us-west-1")
|
|
|
|
|
|
|
|
with pytest.raises(ClientError) as ex:
|
2021-10-05 17:11:07 +00:00
|
|
|
client.describe_key_pairs(KeyNames=[str(uuid4())])
|
2023-07-17 09:31:05 +00:00
|
|
|
assert ex.value.response["ResponseMetadata"]["HTTPStatusCode"] == 400
|
|
|
|
assert "RequestId" in ex.value.response["ResponseMetadata"]
|
|
|
|
assert ex.value.response["Error"]["Code"] == "InvalidKeyPair.NotFound"
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_key_pairs_create_dryrun_boto3():
|
|
|
|
ec2 = boto3.resource("ec2", "us-west-1")
|
|
|
|
|
|
|
|
with pytest.raises(ClientError) as ex:
|
|
|
|
ec2.create_key_pair(KeyName="foo", DryRun=True)
|
2023-07-17 09:31:05 +00:00
|
|
|
assert ex.value.response["Error"]["Code"] == "DryRunOperation"
|
|
|
|
assert ex.value.response["ResponseMetadata"]["HTTPStatusCode"] == 412
|
|
|
|
assert (
|
|
|
|
ex.value.response["Error"]["Message"]
|
|
|
|
== "An error occurred (DryRunOperation) when calling the CreateKeyPair operation: Request would have succeeded, but DryRun flag is set"
|
2021-09-25 11:13:07 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2023-10-12 18:13:41 +00:00
|
|
|
@pytest.mark.parametrize("key_type", ["rsa", "ed25519"])
|
|
|
|
def test_key_pairs_create_boto3(key_type):
|
2021-09-25 11:13:07 +00:00
|
|
|
ec2 = boto3.resource("ec2", "us-west-1")
|
|
|
|
client = boto3.client("ec2", "us-west-1")
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
key_name = str(uuid4())[0:6]
|
2023-10-12 18:13:41 +00:00
|
|
|
kp = ec2.create_key_pair(KeyName=key_name, KeyType=key_type)
|
|
|
|
check_private_key(kp.key_material, key_type)
|
2021-09-25 11:13:07 +00:00
|
|
|
# Verify the client can create a key_pair as well - should behave the same
|
2021-10-05 17:11:07 +00:00
|
|
|
key_name2 = str(uuid4())
|
2023-10-12 18:13:41 +00:00
|
|
|
kp2 = client.create_key_pair(KeyName=key_name2, KeyType=key_type)
|
|
|
|
check_private_key(kp2["KeyMaterial"], key_type)
|
2021-09-25 11:13:07 +00:00
|
|
|
|
2023-07-17 09:31:05 +00:00
|
|
|
assert kp.key_material != kp2["KeyMaterial"]
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
kps = client.describe_key_pairs()["KeyPairs"]
|
2021-10-05 17:11:07 +00:00
|
|
|
all_names = set([k["KeyName"] for k in kps])
|
2023-07-17 09:31:05 +00:00
|
|
|
assert key_name in all_names
|
|
|
|
assert key_name2 in all_names
|
2021-09-25 11:13:07 +00:00
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
kps = client.describe_key_pairs(KeyNames=[key_name])["KeyPairs"]
|
2023-07-17 09:31:05 +00:00
|
|
|
assert len(kps) == 1
|
|
|
|
assert "KeyPairId" in kps[0]
|
|
|
|
assert kps[0]["KeyName"] == key_name
|
|
|
|
assert "KeyFingerprint" in kps[0]
|
|
|
|
assert isinstance(kps[0]["CreateTime"], datetime)
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_key_pairs_create_exist_boto3():
|
|
|
|
client = boto3.client("ec2", "us-west-1")
|
2021-10-05 17:11:07 +00:00
|
|
|
key_name = str(uuid4())[0:6]
|
|
|
|
client.create_key_pair(KeyName=key_name)
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
with pytest.raises(ClientError) as ex:
|
2021-10-05 17:11:07 +00:00
|
|
|
client.create_key_pair(KeyName=key_name)
|
2023-07-17 09:31:05 +00:00
|
|
|
assert ex.value.response["ResponseMetadata"]["HTTPStatusCode"] == 400
|
|
|
|
assert "RequestId" in ex.value.response["ResponseMetadata"]
|
|
|
|
assert ex.value.response["Error"]["Code"] == "InvalidKeyPair.Duplicate"
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_key_pairs_delete_no_exist_boto3():
|
|
|
|
client = boto3.client("ec2", "us-west-1")
|
2021-10-05 17:11:07 +00:00
|
|
|
client.delete_key_pair(KeyName=str(uuid4())[0:6])
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_key_pairs_delete_exist_boto3():
|
|
|
|
client = boto3.client("ec2", "us-west-1")
|
2021-10-05 17:11:07 +00:00
|
|
|
key_name = str(uuid4())[0:6]
|
|
|
|
client.create_key_pair(KeyName=key_name)
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
with pytest.raises(ClientError) as ex:
|
2021-10-05 17:11:07 +00:00
|
|
|
client.delete_key_pair(KeyName=key_name, DryRun=True)
|
2023-07-17 09:31:05 +00:00
|
|
|
assert ex.value.response["Error"]["Code"] == "DryRunOperation"
|
|
|
|
assert ex.value.response["ResponseMetadata"]["HTTPStatusCode"] == 412
|
|
|
|
assert (
|
|
|
|
ex.value.response["Error"]["Message"]
|
|
|
|
== "An error occurred (DryRunOperation) when calling the DeleteKeyPair operation: Request would have succeeded, but DryRun flag is set"
|
2021-09-25 11:13:07 +00:00
|
|
|
)
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
client.delete_key_pair(KeyName=key_name)
|
2023-07-17 09:31:05 +00:00
|
|
|
assert key_name not in [
|
|
|
|
kp.get("Name") for kp in client.describe_key_pairs()["KeyPairs"]
|
|
|
|
]
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
2023-10-12 18:13:41 +00:00
|
|
|
@pytest.mark.parametrize(
|
|
|
|
"public_key,fingerprint",
|
|
|
|
[
|
|
|
|
(RSA_PUBLIC_KEY_OPENSSH, RSA_PUBLIC_KEY_FINGERPRINT),
|
|
|
|
(RSA_PUBLIC_KEY_RFC4716, RSA_PUBLIC_KEY_FINGERPRINT),
|
|
|
|
(ED25519_PUBLIC_KEY_OPENSSH, ED25519_PUBLIC_KEY_FINGERPRINT),
|
|
|
|
],
|
|
|
|
ids=["rsa-openssh", "rsa-rfc4716", "ed25519"],
|
|
|
|
)
|
|
|
|
def test_key_pairs_import_boto3(public_key, fingerprint):
|
2021-09-25 11:13:07 +00:00
|
|
|
client = boto3.client("ec2", "us-west-1")
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
key_name = str(uuid4())[0:6]
|
2021-09-25 11:13:07 +00:00
|
|
|
with pytest.raises(ClientError) as ex:
|
|
|
|
client.import_key_pair(
|
2023-10-12 18:13:41 +00:00
|
|
|
KeyName=key_name, PublicKeyMaterial=public_key, DryRun=True
|
2021-09-25 11:13:07 +00:00
|
|
|
)
|
2023-07-17 09:31:05 +00:00
|
|
|
assert ex.value.response["Error"]["Code"] == "DryRunOperation"
|
|
|
|
assert ex.value.response["ResponseMetadata"]["HTTPStatusCode"] == 412
|
|
|
|
assert (
|
|
|
|
ex.value.response["Error"]["Message"]
|
|
|
|
== "An error occurred (DryRunOperation) when calling the ImportKeyPair operation: Request would have succeeded, but DryRun flag is set"
|
2021-09-25 11:13:07 +00:00
|
|
|
)
|
|
|
|
|
2023-10-12 18:13:41 +00:00
|
|
|
kp1 = client.import_key_pair(KeyName=key_name, PublicKeyMaterial=public_key)
|
2021-10-05 17:11:07 +00:00
|
|
|
|
2023-07-17 09:31:05 +00:00
|
|
|
assert "KeyPairId" in kp1
|
|
|
|
assert kp1["KeyName"] == key_name
|
2023-10-12 18:13:41 +00:00
|
|
|
assert kp1["KeyFingerprint"] == fingerprint
|
2021-09-25 11:13:07 +00:00
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
all_kps = client.describe_key_pairs()["KeyPairs"]
|
|
|
|
all_names = [kp["KeyName"] for kp in all_kps]
|
2023-07-17 09:31:05 +00:00
|
|
|
assert kp1["KeyName"] in all_names
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_key_pairs_import_exist_boto3():
|
|
|
|
client = boto3.client("ec2", "us-west-1")
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
key_name = str(uuid4())[0:6]
|
|
|
|
kp = client.import_key_pair(
|
|
|
|
KeyName=key_name, PublicKeyMaterial=RSA_PUBLIC_KEY_OPENSSH
|
|
|
|
)
|
2023-07-17 09:31:05 +00:00
|
|
|
assert kp["KeyName"] == key_name
|
2021-10-05 17:11:07 +00:00
|
|
|
|
2023-07-17 09:31:05 +00:00
|
|
|
assert len(client.describe_key_pairs(KeyNames=[key_name])["KeyPairs"]) == 1
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
with pytest.raises(ClientError) as ex:
|
2021-10-05 17:11:07 +00:00
|
|
|
client.create_key_pair(KeyName=key_name)
|
2023-07-17 09:31:05 +00:00
|
|
|
assert ex.value.response["ResponseMetadata"]["HTTPStatusCode"] == 400
|
|
|
|
assert "RequestId" in ex.value.response["ResponseMetadata"]
|
|
|
|
assert ex.value.response["Error"]["Code"] == "InvalidKeyPair.Duplicate"
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_key_pairs_invalid_boto3():
|
|
|
|
client = boto3.client("ec2", "us-west-1")
|
|
|
|
|
|
|
|
with pytest.raises(ClientError) as ex:
|
|
|
|
client.import_key_pair(KeyName="foo", PublicKeyMaterial=b"")
|
2023-07-17 09:31:05 +00:00
|
|
|
assert ex.value.response["ResponseMetadata"]["HTTPStatusCode"] == 400
|
2021-09-25 11:13:07 +00:00
|
|
|
err = ex.value.response["Error"]
|
2023-07-17 09:31:05 +00:00
|
|
|
assert err["Code"] == "InvalidKeyPair.Format"
|
|
|
|
assert err["Message"] == "Key is not in valid OpenSSH public key format"
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
with pytest.raises(ClientError) as ex:
|
|
|
|
client.import_key_pair(KeyName="foo", PublicKeyMaterial=b"garbage")
|
2023-07-17 09:31:05 +00:00
|
|
|
assert ex.value.response["ResponseMetadata"]["HTTPStatusCode"] == 400
|
2021-09-25 11:13:07 +00:00
|
|
|
err = ex.value.response["Error"]
|
2023-07-17 09:31:05 +00:00
|
|
|
assert err["Code"] == "InvalidKeyPair.Format"
|
|
|
|
assert err["Message"] == "Key is not in valid OpenSSH public key format"
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
with pytest.raises(ClientError) as ex:
|
|
|
|
client.import_key_pair(KeyName="foo", PublicKeyMaterial=DSA_PUBLIC_KEY_OPENSSH)
|
2023-07-17 09:31:05 +00:00
|
|
|
assert ex.value.response["ResponseMetadata"]["HTTPStatusCode"] == 400
|
2021-09-25 11:13:07 +00:00
|
|
|
err = ex.value.response["Error"]
|
2023-07-17 09:31:05 +00:00
|
|
|
assert err["Code"] == "InvalidKeyPair.Format"
|
|
|
|
assert err["Message"] == "Key is not in valid OpenSSH public key format"
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_key_pair_filters_boto3():
|
|
|
|
ec2 = boto3.resource("ec2", "us-west-1")
|
|
|
|
client = boto3.client("ec2", "us-west-1")
|
|
|
|
|
2021-10-05 17:11:07 +00:00
|
|
|
key_name_1 = str(uuid4())[0:6]
|
|
|
|
key_name_2 = str(uuid4())[0:6]
|
|
|
|
key_name_3 = str(uuid4())[0:6]
|
|
|
|
_ = ec2.create_key_pair(KeyName=key_name_1)
|
|
|
|
kp2 = ec2.create_key_pair(KeyName=key_name_2)
|
|
|
|
kp3 = ec2.create_key_pair(KeyName=key_name_3)
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
kp_by_name = client.describe_key_pairs(
|
2021-10-05 17:11:07 +00:00
|
|
|
Filters=[{"Name": "key-name", "Values": [key_name_2]}]
|
2021-09-25 11:13:07 +00:00
|
|
|
)["KeyPairs"]
|
2023-07-17 09:31:05 +00:00
|
|
|
assert set([kp["KeyName"] for kp in kp_by_name]) == set([kp2.name])
|
2021-09-25 11:13:07 +00:00
|
|
|
|
|
|
|
kp_by_name = client.describe_key_pairs(
|
|
|
|
Filters=[{"Name": "fingerprint", "Values": [kp3.key_fingerprint]}]
|
|
|
|
)["KeyPairs"]
|
2023-07-17 09:31:05 +00:00
|
|
|
assert set([kp["KeyName"] for kp in kp_by_name]) == set([kp3.name])
|
2023-10-15 21:40:34 +00:00
|
|
|
|
|
|
|
|
|
|
|
@mock_ec2
|
|
|
|
def test_key_pair_with_tags():
|
|
|
|
client = boto3.client("ec2", "us-east-1")
|
|
|
|
|
|
|
|
key_name_1 = str(uuid4())[0:6]
|
|
|
|
key_name_2 = str(uuid4())[0:6]
|
|
|
|
key_name_3 = str(uuid4())[0:6]
|
|
|
|
key_name_4 = str(uuid4())[0:6]
|
|
|
|
resp = client.create_key_pair(
|
|
|
|
KeyName=key_name_1,
|
|
|
|
TagSpecifications=[
|
|
|
|
{"ResourceType": "key-pair", "Tags": [{"Key": "key", "Value": "val1"}]}
|
|
|
|
],
|
|
|
|
)
|
|
|
|
assert resp["Tags"] == [{"Key": "key", "Value": "val1"}]
|
|
|
|
kp1 = resp["KeyPairId"]
|
|
|
|
|
|
|
|
kp2 = client.create_key_pair(
|
|
|
|
KeyName=key_name_2,
|
|
|
|
TagSpecifications=[
|
|
|
|
{"ResourceType": "key-pair", "Tags": [{"Key": "key", "Value": "val2"}]}
|
|
|
|
],
|
|
|
|
)["KeyPairId"]
|
|
|
|
|
|
|
|
assert "Tags" not in client.create_key_pair(KeyName=key_name_3)
|
|
|
|
|
|
|
|
key_pairs = client.describe_key_pairs(
|
|
|
|
Filters=[{"Name": "tag-key", "Values": ["key"]}]
|
|
|
|
)["KeyPairs"]
|
|
|
|
assert [kp["KeyPairId"] for kp in key_pairs] == [kp1, kp2]
|
|
|
|
|
|
|
|
key_pairs = client.describe_key_pairs(
|
|
|
|
Filters=[{"Name": "tag:key", "Values": ["val1"]}]
|
|
|
|
)["KeyPairs"]
|
|
|
|
assert len(key_pairs) == 1
|
|
|
|
assert key_pairs[0]["KeyPairId"] == kp1
|
|
|
|
assert key_pairs[0]["Tags"] == [{"Key": "key", "Value": "val1"}]
|
|
|
|
|
|
|
|
resp = client.import_key_pair(
|
|
|
|
KeyName=key_name_4,
|
|
|
|
PublicKeyMaterial=RSA_PUBLIC_KEY_OPENSSH,
|
|
|
|
TagSpecifications=[
|
|
|
|
{"ResourceType": "key-pair", "Tags": [{"Key": "key", "Value": "val4"}]}
|
|
|
|
],
|
|
|
|
)
|
|
|
|
assert resp["Tags"] == [{"Key": "key", "Value": "val4"}]
|