mirror of
				https://github.com/fog/fog-aws.git
				synced 2022-11-09 13:50:52 -05:00 
			
		
		
		
	Merge branch 'master' into user-configurable-iam-credentials-refresh-threshold
This commit is contained in:
		
						commit
						6ca4f0bb70
					
				
					 22 changed files with 398 additions and 60 deletions
				
			
		
							
								
								
									
										7
									
								
								.github/workflows/ruby.yml
									
										
									
									
										vendored
									
									
								
							
							
						
						
									
										7
									
								
								.github/workflows/ruby.yml
									
										
									
									
										vendored
									
									
								
							| 
						 | 
				
			
			@ -16,21 +16,20 @@ on:
 | 
			
		|||
jobs:
 | 
			
		||||
  test:
 | 
			
		||||
 | 
			
		||||
    continue-on-error: ${{ matrix.ruby-version == 'truffleruby-head' }}
 | 
			
		||||
    env:
 | 
			
		||||
      BUNDLER_GEMFILE: gemfiles/Gemfile-edge
 | 
			
		||||
    runs-on: ubuntu-latest
 | 
			
		||||
    strategy:
 | 
			
		||||
      matrix:
 | 
			
		||||
        ruby-version: ['2.5', '2.6', '2.7', '3.0', 'head']
 | 
			
		||||
        ruby-version: ['2.5', '2.6', '2.7', '3.0', '3.1', 'head', 'truffleruby-head']
 | 
			
		||||
 | 
			
		||||
    steps:
 | 
			
		||||
    - uses: actions/checkout@v2.3.4
 | 
			
		||||
    - uses: actions/checkout@v3
 | 
			
		||||
    - name: Set up Ruby
 | 
			
		||||
      uses: ruby/setup-ruby@v1
 | 
			
		||||
      with:
 | 
			
		||||
        ruby-version: ${{ matrix.ruby-version }}
 | 
			
		||||
        bundler-cache: true # runs 'bundle install' and caches installed gems automatically
 | 
			
		||||
    - name: Install dependencies
 | 
			
		||||
      run: bundle install
 | 
			
		||||
    - name: Run tests
 | 
			
		||||
      run: bundle exec rake
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										2
									
								
								.github/workflows/stale.yml
									
										
									
									
										vendored
									
									
								
							
							
						
						
									
										2
									
								
								.github/workflows/stale.yml
									
										
									
									
										vendored
									
									
								
							| 
						 | 
				
			
			@ -10,7 +10,7 @@ jobs:
 | 
			
		|||
    runs-on: ubuntu-latest
 | 
			
		||||
 | 
			
		||||
    steps:
 | 
			
		||||
    - uses: actions/stale@v3.0.19
 | 
			
		||||
    - uses: actions/stale@v4
 | 
			
		||||
      with:
 | 
			
		||||
        repo-token: ${{ secrets.GITHUB_TOKEN }}
 | 
			
		||||
        days-before-stale: 60
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
							
								
								
									
										153
									
								
								CHANGELOG.md
									
										
									
									
									
								
							
							
						
						
									
										153
									
								
								CHANGELOG.md
									
										
									
									
									
								
							| 
						 | 
				
			
			@ -1,5 +1,153 @@
 | 
			
		|||
# Changelog
 | 
			
		||||
 | 
			
		||||
## [v3.13.0](https://github.com/fog/fog-aws/tree/v3.12.0) (2022-02-12)
 | 
			
		||||
 | 
			
		||||
[Full Changelog](https://github.com/fog/fog-aws/compare/v3.12.0...v3.13.0)
 | 
			
		||||
 | 
			
		||||
**Closed issues:**
 | 
			
		||||
 | 
			
		||||
- Please include all files required for running tests in the gem [\#625](https://github.com/fog/fog-aws/issues/625)
 | 
			
		||||
- Using Hitachi compatible S3 and still see the AWS S3 host  [\#624](https://github.com/fog/fog-aws/issues/624)
 | 
			
		||||
- Spawn compute node with Elastic Inference [\#617](https://github.com/fog/fog-aws/issues/617)
 | 
			
		||||
 | 
			
		||||
**Merged pull requests:**
 | 
			
		||||
 | 
			
		||||
- Drop ipaddress dependency in favor of built in ipaddr [\#630](https://github.com/fog/fog-aws/pull/630) ([ekohl](https://github.com/ekohl))
 | 
			
		||||
- Exclude test files from gem [\#629](https://github.com/fog/fog-aws/pull/629) ([ursm](https://github.com/ursm))
 | 
			
		||||
- Add Truffleruby head to CI [\#628](https://github.com/fog/fog-aws/pull/628) ([gogainda](https://github.com/gogainda))
 | 
			
		||||
- Bump actions/checkout from 2.3.5 to 2.4.0 [\#627](https://github.com/fog/fog-aws/pull/627) ([dependabot[bot]](https://github.com/apps/dependabot))
 | 
			
		||||
- Update Fog::AWS::Storage::File\#body [\#626](https://github.com/fog/fog-aws/pull/626) ([10io](https://github.com/10io))
 | 
			
		||||
- Bump actions/checkout from 2.3.4 to 2.3.5 [\#623](https://github.com/fog/fog-aws/pull/623) ([dependabot[bot]](https://github.com/apps/dependabot))
 | 
			
		||||
- Add json files to the gem file [\#622](https://github.com/fog/fog-aws/pull/622) ([acant](https://github.com/acant))
 | 
			
		||||
 | 
			
		||||
## [v3.12.0](https://github.com/fog/fog-aws/tree/v3.12.0) (2021-08-23)
 | 
			
		||||
 | 
			
		||||
[Full Changelog](https://github.com/fog/fog-aws/compare/v3.11.0...v3.12.0)
 | 
			
		||||
 | 
			
		||||
**Merged pull requests:**
 | 
			
		||||
 | 
			
		||||
-  Add support for regional STS endpoints [\#620](https://github.com/fog/fog-aws/pull/620) ([stanhu](https://github.com/stanhu))
 | 
			
		||||
- Add IPv6 support for Ingress Security Groups [\#619](https://github.com/fog/fog-aws/pull/619) ([p8](https://github.com/p8))
 | 
			
		||||
- Separate CHANGELOG entry for 3.11.0 [\#618](https://github.com/fog/fog-aws/pull/618) ([sunny](https://github.com/sunny))
 | 
			
		||||
 | 
			
		||||
## [v3.11.0](https://github.com/fog/fog-aws/tree/v3.11.0) (2021-08-05)
 | 
			
		||||
 | 
			
		||||
[Full Changelog](https://github.com/fog/fog-aws/compare/v3.10.0...v3.11.0)
 | 
			
		||||
 | 
			
		||||
**Closed issues:**
 | 
			
		||||
 | 
			
		||||
- Support for Regional STS Endpoints [\#604](https://github.com/fog/fog-aws/issues/604)
 | 
			
		||||
- Pass tags when creating EBS ? [\#603](https://github.com/fog/fog-aws/issues/603)
 | 
			
		||||
- S3 multiple delete api should handle delete for multiple versions for a single object [\#598](https://github.com/fog/fog-aws/issues/598)
 | 
			
		||||
- Fog does not return error from s3 [\#586](https://github.com/fog/fog-aws/issues/586)
 | 
			
		||||
- Add support for r6g and c6g instance types [\#580](https://github.com/fog/fog-aws/issues/580)
 | 
			
		||||
- Using internal S3 provider ... and something funky is going on! [\#575](https://github.com/fog/fog-aws/issues/575)
 | 
			
		||||
- How to upload File to S3 with with accelerate? [\#554](https://github.com/fog/fog-aws/issues/554)
 | 
			
		||||
- How to use assume\_role\_with\_web\_identity auth for S3 storage? [\#543](https://github.com/fog/fog-aws/issues/543)
 | 
			
		||||
- Fog::AWS::Glacier::TreeHash::add\_part works only sometimes [\#520](https://github.com/fog/fog-aws/issues/520)
 | 
			
		||||
- fog-aws: Fog::AWS::Glacier::Job doesn't support RetrievalByteRange [\#519](https://github.com/fog/fog-aws/issues/519)
 | 
			
		||||
- Path style is being deprecated [\#516](https://github.com/fog/fog-aws/issues/516)
 | 
			
		||||
-  Fog::DNS::AWS can't read zones [\#513](https://github.com/fog/fog-aws/issues/513)
 | 
			
		||||
- Lambda Parser can't handle VPC config, containing array of hash values [\#509](https://github.com/fog/fog-aws/issues/509)
 | 
			
		||||
- Excon::Error::Forbidden: Expected\(200\) \<=\> Actual\(403 Forbidden\)  [\#508](https://github.com/fog/fog-aws/issues/508)
 | 
			
		||||
- file.save does not work with STDIN [\#500](https://github.com/fog/fog-aws/issues/500)
 | 
			
		||||
- ELBv2 Support ? [\#489](https://github.com/fog/fog-aws/issues/489)
 | 
			
		||||
- S3 Select Support? [\#484](https://github.com/fog/fog-aws/issues/484)
 | 
			
		||||
- nil:NilClass error [\#483](https://github.com/fog/fog-aws/issues/483)
 | 
			
		||||
- Mocks for VM creation require access and secret key when using instance profiles [\#482](https://github.com/fog/fog-aws/issues/482)
 | 
			
		||||
- Always use bucket virtual hostname? [\#464](https://github.com/fog/fog-aws/issues/464)
 | 
			
		||||
- Spot instance creation : Support for BlockDurationMinutes [\#461](https://github.com/fog/fog-aws/issues/461)
 | 
			
		||||
- How can I remove the `Content-Encoding` metadata properties if I upload from fog [\#447](https://github.com/fog/fog-aws/issues/447)
 | 
			
		||||
- AWS::ECS with `use_iam_profile` errors out [\#441](https://github.com/fog/fog-aws/issues/441)
 | 
			
		||||
- Option to turn off Warnings [\#426](https://github.com/fog/fog-aws/issues/426)
 | 
			
		||||
- Accessing AWS S3 using EC2 Instance Profile [\#423](https://github.com/fog/fog-aws/issues/423)
 | 
			
		||||
- Support step and target tracking auto scaling policies [\#422](https://github.com/fog/fog-aws/issues/422)
 | 
			
		||||
- could not create ec2 volume with custom encryption key, volume only create with default 'aws/ebs' encryption key [\#420](https://github.com/fog/fog-aws/issues/420)
 | 
			
		||||
- Download File with content\_disposition [\#418](https://github.com/fog/fog-aws/issues/418)
 | 
			
		||||
- Fog::Compute::AWS::Error iamInstanceProfile.name is invalid [\#410](https://github.com/fog/fog-aws/issues/410)
 | 
			
		||||
- Mocks for EC2 instance creation do not behave as expected [\#404](https://github.com/fog/fog-aws/issues/404)
 | 
			
		||||
- Cannot copy an encrypted snapshot from one account to another account [\#398](https://github.com/fog/fog-aws/issues/398)
 | 
			
		||||
-  Fog::Compute::AWS::Image\#deregister ignores non-root snapshots. [\#380](https://github.com/fog/fog-aws/issues/380)
 | 
			
		||||
- AWS S3 overwrites files with same name [\#378](https://github.com/fog/fog-aws/issues/378)
 | 
			
		||||
- Support S3 object tagging [\#377](https://github.com/fog/fog-aws/issues/377)
 | 
			
		||||
- Reqeust to support Aws::DynamoDBStreams [\#373](https://github.com/fog/fog-aws/issues/373)
 | 
			
		||||
- Not all Rds versions and Instance Types are rendered [\#371](https://github.com/fog/fog-aws/issues/371)
 | 
			
		||||
- Tag instances upon creation of new instance [\#359](https://github.com/fog/fog-aws/issues/359)
 | 
			
		||||
- Creating instances in AWS fails with Socket Error [\#352](https://github.com/fog/fog-aws/issues/352)
 | 
			
		||||
- `NameError: uninitialized constant Fog::ServicesMixin` when requiring `fog/storage` [\#345](https://github.com/fog/fog-aws/issues/345)
 | 
			
		||||
- Add full support for target groups [\#328](https://github.com/fog/fog-aws/issues/328)
 | 
			
		||||
- Fog transfer acceleration endpoints [\#303](https://github.com/fog/fog-aws/issues/303)
 | 
			
		||||
- "Fog::DNS\[:aws\] | change\_resource\_record\_sets \(aws, dns\)" test suite flaky [\#301](https://github.com/fog/fog-aws/issues/301)
 | 
			
		||||
- Cross account access using IAM role [\#294](https://github.com/fog/fog-aws/issues/294)
 | 
			
		||||
- Write timeout trying to upload a large file to S3 [\#291](https://github.com/fog/fog-aws/issues/291)
 | 
			
		||||
- Support Autoscaling lifecycle hooks [\#289](https://github.com/fog/fog-aws/issues/289)
 | 
			
		||||
- directories ignore region option [\#287](https://github.com/fog/fog-aws/issues/287)
 | 
			
		||||
- Feature: Access logs for ELB [\#271](https://github.com/fog/fog-aws/issues/271)
 | 
			
		||||
- S3: retry on 500 internal server error [\#264](https://github.com/fog/fog-aws/issues/264)
 | 
			
		||||
- Alias for server side encryption not working [\#260](https://github.com/fog/fog-aws/issues/260)
 | 
			
		||||
- InvalidParameterCombination =\> You cannot move a DB instance with Single-Az enabled to a VPC \(Fog::AWS::RDS::Error\) [\#255](https://github.com/fog/fog-aws/issues/255)
 | 
			
		||||
- Using STS [\#253](https://github.com/fog/fog-aws/issues/253)
 | 
			
		||||
- Auto Scaling Group does not enable metrics [\#251](https://github.com/fog/fog-aws/issues/251)
 | 
			
		||||
- aws has no storage service [\#248](https://github.com/fog/fog-aws/issues/248)
 | 
			
		||||
- Timeouts on Compute\#describe\_volumes due to extreme numbers of volumes [\#244](https://github.com/fog/fog-aws/issues/244)
 | 
			
		||||
- Support CreateReusableDelegationSet [\#243](https://github.com/fog/fog-aws/issues/243)
 | 
			
		||||
- Tags server creation in Mock vs Real [\#239](https://github.com/fog/fog-aws/issues/239)
 | 
			
		||||
- Excon::Errors::SocketError Broken pipe \(Errno::EPIPE\) when use Activeadmin upload image by nested form [\#237](https://github.com/fog/fog-aws/issues/237)
 | 
			
		||||
- Fog Mock doesn't update [\#236](https://github.com/fog/fog-aws/issues/236)
 | 
			
		||||
- ECS service\_update does not support "deploymentConfig" [\#234](https://github.com/fog/fog-aws/issues/234)
 | 
			
		||||
- Fog::Storage::AWS::Files\#each always iterates over entire collection [\#232](https://github.com/fog/fog-aws/issues/232)
 | 
			
		||||
- repeated bucket name in the URL on AWS and issue with :path\_style [\#228](https://github.com/fog/fog-aws/issues/228)
 | 
			
		||||
- Already initialized constant warnings [\#212](https://github.com/fog/fog-aws/issues/212)
 | 
			
		||||
- SQS API version is outdated [\#198](https://github.com/fog/fog-aws/issues/198)
 | 
			
		||||
- Problem when using irb [\#195](https://github.com/fog/fog-aws/issues/195)
 | 
			
		||||
- compute.servers \(via DescribeInstances\) does not include tags reliably [\#192](https://github.com/fog/fog-aws/issues/192)
 | 
			
		||||
- EBS create volume io1 or gp2 [\#186](https://github.com/fog/fog-aws/issues/186)
 | 
			
		||||
- Aws cloudformation stack-policy-body [\#179](https://github.com/fog/fog-aws/issues/179)
 | 
			
		||||
- EXCON\_DEBUG and DEBUG env variables do not help debug -S key issues [\#177](https://github.com/fog/fog-aws/issues/177)
 | 
			
		||||
- AWS4 SignatureDoesNotMatch if header contains two spaces [\#160](https://github.com/fog/fog-aws/issues/160)
 | 
			
		||||
- Add support for elasticache redis replication groups [\#136](https://github.com/fog/fog-aws/issues/136)
 | 
			
		||||
- Getting SignatureDoesNotMatch error with eu-central-1 [\#127](https://github.com/fog/fog-aws/issues/127)
 | 
			
		||||
- Cannot saving auto scaling group [\#125](https://github.com/fog/fog-aws/issues/125)
 | 
			
		||||
- fog-aws not working with dynamoDB Local [\#118](https://github.com/fog/fog-aws/issues/118)
 | 
			
		||||
- Fog::Compute::AWS::Error InvalidParameterValue =\> secondary-addresses [\#115](https://github.com/fog/fog-aws/issues/115)
 | 
			
		||||
- Is there an equivalent to describe-instance-status? [\#66](https://github.com/fog/fog-aws/issues/66)
 | 
			
		||||
- No usage instructions in Readme [\#64](https://github.com/fog/fog-aws/issues/64)
 | 
			
		||||
- AWS - distributionConfig.enabled' failed to satisfy constraint: Member must not be null [\#48](https://github.com/fog/fog-aws/issues/48)
 | 
			
		||||
- Clarify versioning on README [\#42](https://github.com/fog/fog-aws/issues/42)
 | 
			
		||||
- AWS SQS AddPermission API missing [\#26](https://github.com/fog/fog-aws/issues/26)
 | 
			
		||||
- AWS China region [\#25](https://github.com/fog/fog-aws/issues/25)
 | 
			
		||||
- AWS CloudFormation ListStacks options [\#24](https://github.com/fog/fog-aws/issues/24)
 | 
			
		||||
- Setting region of AWS::Compute after initialization [\#23](https://github.com/fog/fog-aws/issues/23)
 | 
			
		||||
- Support AWS Support API [\#22](https://github.com/fog/fog-aws/issues/22)
 | 
			
		||||
- InvalidClientTokenId =\> The security token included in the request is invalid [\#21](https://github.com/fog/fog-aws/issues/21)
 | 
			
		||||
- Change architecture attribute in AWS::Compute::Server model [\#20](https://github.com/fog/fog-aws/issues/20)
 | 
			
		||||
- Add support for Amazon Kinesis [\#19](https://github.com/fog/fog-aws/issues/19)
 | 
			
		||||
- Bring AWS CloudFront API Models/Requests up to date [\#17](https://github.com/fog/fog-aws/issues/17)
 | 
			
		||||
- AWS security group tests have become unstable [\#16](https://github.com/fog/fog-aws/issues/16)
 | 
			
		||||
- AWS auto scaling: availability zones are not a required parameter [\#15](https://github.com/fog/fog-aws/issues/15)
 | 
			
		||||
- Is anyone going to add support for AWS ElasticTranscoder [\#14](https://github.com/fog/fog-aws/issues/14)
 | 
			
		||||
- add missing attributes to aws describe\_reserved\_instances parser [\#13](https://github.com/fog/fog-aws/issues/13)
 | 
			
		||||
- AWS AutoScaling group min\_size & max\_size getting set to 0 [\#12](https://github.com/fog/fog-aws/issues/12)
 | 
			
		||||
- auto\_scaling\_group.instances does not return only instances for that group [\#11](https://github.com/fog/fog-aws/issues/11)
 | 
			
		||||
- Why are the credential keys not generalized?  [\#10](https://github.com/fog/fog-aws/issues/10)
 | 
			
		||||
- Invalid XML Character in S3 Response [\#8](https://github.com/fog/fog-aws/issues/8)
 | 
			
		||||
- reading s3 upload progress [\#7](https://github.com/fog/fog-aws/issues/7)
 | 
			
		||||
- delete\_on\_termination=true attribute on new volume is not set on create [\#6](https://github.com/fog/fog-aws/issues/6)
 | 
			
		||||
- user\_data is still base64 encoded in Real launch\_configurations [\#5](https://github.com/fog/fog-aws/issues/5)
 | 
			
		||||
 | 
			
		||||
**Merged pull requests:**
 | 
			
		||||
 | 
			
		||||
- Add storage option to configure multipart put/copy [\#616](https://github.com/fog/fog-aws/pull/616) ([slonopotamus](https://github.com/slonopotamus))
 | 
			
		||||
- Bump actions/stale from 3.0.19 to 4 [\#615](https://github.com/fog/fog-aws/pull/615) ([dependabot[bot]](https://github.com/apps/dependabot))
 | 
			
		||||
- Update file.rb [\#613](https://github.com/fog/fog-aws/pull/613) ([iqre8](https://github.com/iqre8))
 | 
			
		||||
- fix storage for ruby 3.0 [\#611](https://github.com/fog/fog-aws/pull/611) ([vincentjoseph](https://github.com/vincentjoseph))
 | 
			
		||||
- Implement AWS TagSpecifications \(closes \#603\) [\#610](https://github.com/fog/fog-aws/pull/610) ([eLvErDe](https://github.com/eLvErDe))
 | 
			
		||||
- Bump actions/stale from 3.0.18 to 3.0.19 [\#609](https://github.com/fog/fog-aws/pull/609) ([dependabot[bot]](https://github.com/apps/dependabot))
 | 
			
		||||
- Bump actions/stale from 3 to 3.0.18 [\#608](https://github.com/fog/fog-aws/pull/608) ([dependabot[bot]](https://github.com/apps/dependabot))
 | 
			
		||||
- Bump actions/checkout from 2 to 2.3.4 [\#607](https://github.com/fog/fog-aws/pull/607) ([dependabot[bot]](https://github.com/apps/dependabot))
 | 
			
		||||
- drop git in gemspec [\#602](https://github.com/fog/fog-aws/pull/602) ([abrahamparayil](https://github.com/abrahamparayil))
 | 
			
		||||
- Update rubyzip requirement from ~\> 1.3.0 to ~\> 2.3.0 [\#601](https://github.com/fog/fog-aws/pull/601) ([dependabot[bot]](https://github.com/apps/dependabot))
 | 
			
		||||
 | 
			
		||||
## [v3.10.0](https://github.com/fog/fog-aws/tree/v3.10.0) (2021-03-22)
 | 
			
		||||
 | 
			
		||||
[Full Changelog](https://github.com/fog/fog-aws/compare/v3.9.0...v3.10.0)
 | 
			
		||||
| 
						 | 
				
			
			@ -12,14 +160,13 @@
 | 
			
		|||
- Enable hibernation on creation of ec2 instance [\#566](https://github.com/fog/fog-aws/issues/566)
 | 
			
		||||
- Tests broken with fog-core 2.1.0 [\#504](https://github.com/fog/fog-aws/issues/504)
 | 
			
		||||
- changelog? [\#471](https://github.com/fog/fog-aws/issues/471)
 | 
			
		||||
- Changelog: Listing breaking changes [\#419](https://github.com/fog/fog-aws/issues/419)
 | 
			
		||||
- How to use iam\_instance\_profile? [\#342](https://github.com/fog/fog-aws/issues/342)
 | 
			
		||||
- how to support additional aws regions, e.g. cn-north-1 [\#164](https://github.com/fog/fog-aws/issues/164)
 | 
			
		||||
- Still empty content-encoding when it is not set [\#130](https://github.com/fog/fog-aws/issues/130)
 | 
			
		||||
 | 
			
		||||
**Merged pull requests:**
 | 
			
		||||
 | 
			
		||||
- Handle multiple versions of objects in multiple delete request [\#600](https://github.com/fog/fog-aws/pull/600) ([shanu-idrive](https://github.com/shanu-idrive))
 | 
			
		||||
- Handle multiple versions of objects in multiple delete request [\#600](https://github.com/fog/fog-aws/pull/600) ([shanu-kr](https://github.com/shanu-kr))
 | 
			
		||||
- Add Truffleruby head to CI [\#596](https://github.com/fog/fog-aws/pull/596) ([gogainda](https://github.com/gogainda))
 | 
			
		||||
- Fixes domain name duplication in url [\#593](https://github.com/fog/fog-aws/pull/593) ([midhunkrishna](https://github.com/midhunkrishna))
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -883,7 +1030,7 @@
 | 
			
		|||
- Fix mock VPC ELB creation in regions other than us-east-1 [\#94](https://github.com/fog/fog-aws/pull/94) ([mrpoundsign](https://github.com/mrpoundsign))
 | 
			
		||||
- Fix repository URL in README.md [\#91](https://github.com/fog/fog-aws/pull/91) ([tricknotes](https://github.com/tricknotes))
 | 
			
		||||
- adding support for d2 instance type [\#90](https://github.com/fog/fog-aws/pull/90) ([yumminhuang](https://github.com/yumminhuang))
 | 
			
		||||
- Support weight round robin mock [\#89](https://github.com/fog/fog-aws/pull/89) ([freddy1666](https://github.com/freddy1666))
 | 
			
		||||
- Support weight round robin mock [\#89](https://github.com/fog/fog-aws/pull/89) ([freddy61025](https://github.com/freddy61025))
 | 
			
		||||
- Update README.md [\#87](https://github.com/fog/fog-aws/pull/87) ([nomadium](https://github.com/nomadium))
 | 
			
		||||
- Add mock for EC2 request\_spot\_instances API request [\#86](https://github.com/fog/fog-aws/pull/86) ([nomadium](https://github.com/nomadium))
 | 
			
		||||
- Move more requires to autoload [\#85](https://github.com/fog/fog-aws/pull/85) ([plribeiro3000](https://github.com/plribeiro3000))
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,7 +1,7 @@
 | 
			
		|||
# Fog::Aws
 | 
			
		||||
 | 
			
		||||

 | 
			
		||||
[](https://github.com/fog/fog-aws/workflows/ruby.yml)
 | 
			
		||||
[](https://github.com/fog/fog-aws/actions/workflows/ruby.yml)
 | 
			
		||||
[](https://codeclimate.com/github/fog/fog-aws)
 | 
			
		||||
[](https://codeclimate.com/github/fog/fog-aws)
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -98,6 +98,7 @@ file = directory.files.create(key: 'user/1/Gemfile', body: File.open('Gemfile'),
 | 
			
		|||
directory = s3.directories.get('gaudi-portal-dev', prefix: 'user/1/')
 | 
			
		||||
directory.files
 | 
			
		||||
```
 | 
			
		||||
**Warning!** `s3.directories.get` retrieves and caches meta data for the first 10,000 objects in the bucket, which can be very expensive. When possible use `s3.directories.new`.
 | 
			
		||||
 | 
			
		||||
#### Generating a URL for a file:
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -14,10 +14,10 @@ Gem::Specification.new do |spec|
 | 
			
		|||
  spec.homepage      = "https://github.com/fog/fog-aws"
 | 
			
		||||
  spec.license       = "MIT"
 | 
			
		||||
 | 
			
		||||
  spec.files         = Dir['lib/**/*.rb', 'tests/**/*', 'CHANGELOG.md', 'CONTRIBUTING.md',
 | 
			
		||||
                           'CONTRIBUTORS.md', 'LICENSE.md', 'README.md', 'fog-aws.gemspec',]
 | 
			
		||||
  spec.files         = Dir['lib/**/*.{rb,json}',
 | 
			
		||||
                           'CHANGELOG.md', 'CONTRIBUTING.md', 'CONTRIBUTORS.md',
 | 
			
		||||
                           'LICENSE.md', 'README.md', 'fog-aws.gemspec',]
 | 
			
		||||
  spec.executables   = spec.files.grep(%r{^exe/}) { |f| File.basename(f) }
 | 
			
		||||
  spec.test_files    = spec.files.grep(%r{^(test|spec|features)/})
 | 
			
		||||
  spec.require_paths = ["lib"]
 | 
			
		||||
 | 
			
		||||
  spec.required_ruby_version = '>= 2.0.0'
 | 
			
		||||
| 
						 | 
				
			
			@ -31,5 +31,4 @@ Gem::Specification.new do |spec|
 | 
			
		|||
  spec.add_dependency 'fog-core',  '~> 2.1'
 | 
			
		||||
  spec.add_dependency 'fog-json',  '~> 1.1'
 | 
			
		||||
  spec.add_dependency 'fog-xml',   '~> 0.1'
 | 
			
		||||
  spec.add_dependency 'ipaddress', '~> 0.8'
 | 
			
		||||
end
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -233,21 +233,24 @@ module Fog
 | 
			
		|||
                        'fromPort'    => -1,
 | 
			
		||||
                        'toPort'      => -1,
 | 
			
		||||
                        'ipProtocol'  => 'icmp',
 | 
			
		||||
                        'ipRanges'    => []
 | 
			
		||||
                        'ipRanges'    => [],
 | 
			
		||||
                        'ipv6Ranges'  => []
 | 
			
		||||
                      },
 | 
			
		||||
                      {
 | 
			
		||||
                        'groups'      => [{'groupName' => 'default', 'userId' => owner_id, 'groupId' => security_group_id}],
 | 
			
		||||
                        'fromPort'    => 0,
 | 
			
		||||
                        'toPort'      => 65535,
 | 
			
		||||
                        'ipProtocol'  => 'tcp',
 | 
			
		||||
                        'ipRanges'    => []
 | 
			
		||||
                        'ipRanges'    => [],
 | 
			
		||||
                        'ipv6Ranges'  => []
 | 
			
		||||
                      },
 | 
			
		||||
                      {
 | 
			
		||||
                        'groups'      => [{'groupName' => 'default', 'userId' => owner_id, 'groupId' => security_group_id}],
 | 
			
		||||
                        'fromPort'    => 0,
 | 
			
		||||
                        'toPort'      => 65535,
 | 
			
		||||
                        'ipProtocol'  => 'udp',
 | 
			
		||||
                        'ipRanges'    => []
 | 
			
		||||
                        'ipRanges'    => [],
 | 
			
		||||
                        'ipv6Ranges'  => []
 | 
			
		||||
                      }
 | 
			
		||||
                    ],
 | 
			
		||||
                    'ownerId'             => owner_id
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -13,8 +13,6 @@ module Fog
 | 
			
		|||
 | 
			
		||||
      CONTAINER_CREDENTIALS_HOST = "http://169.254.170.2"
 | 
			
		||||
 | 
			
		||||
      STS_GLOBAL_ENDPOINT = "https://sts.amazonaws.com"
 | 
			
		||||
 | 
			
		||||
      module ServiceMethods
 | 
			
		||||
        def fetch_credentials(options)
 | 
			
		||||
          if options[:use_iam_profile] && Fog.mocking?
 | 
			
		||||
| 
						 | 
				
			
			@ -23,7 +21,7 @@ module Fog
 | 
			
		|||
          if options[:use_iam_profile]
 | 
			
		||||
            begin
 | 
			
		||||
              role_data = nil
 | 
			
		||||
              region = options[:region]
 | 
			
		||||
              region = options[:region] || ENV["AWS_DEFAULT_REGION"]
 | 
			
		||||
 | 
			
		||||
              if ENV["AWS_CONTAINER_CREDENTIALS_RELATIVE_URI"]
 | 
			
		||||
                connection = options[:connection] || Excon.new(CONTAINER_CREDENTIALS_HOST)
 | 
			
		||||
| 
						 | 
				
			
			@ -44,7 +42,15 @@ module Fog
 | 
			
		|||
                  :WebIdentityToken => File.read(options[:aws_web_identity_token_file] || ENV.fetch("AWS_WEB_IDENTITY_TOKEN_FILE")),
 | 
			
		||||
                  :Version => "2011-06-15",
 | 
			
		||||
                }
 | 
			
		||||
                connection = options[:connection] || Excon.new(STS_GLOBAL_ENDPOINT, :query => params)
 | 
			
		||||
 | 
			
		||||
                sts_endpoint =
 | 
			
		||||
                  if ENV["AWS_STS_REGIONAL_ENDPOINTS"] == "regional" && region
 | 
			
		||||
                    "https://sts.#{region}.amazonaws.com"
 | 
			
		||||
                  else
 | 
			
		||||
                    "https://sts.amazonaws.com"
 | 
			
		||||
                  end
 | 
			
		||||
 | 
			
		||||
                connection = options[:connection] || Excon.new(sts_endpoint, :query => params)
 | 
			
		||||
                document = Nokogiri::XML(connection.get(:idempotent => true, :expects => 200).body)
 | 
			
		||||
 | 
			
		||||
                session = {
 | 
			
		||||
| 
						 | 
				
			
			@ -65,18 +71,19 @@ module Fog
 | 
			
		|||
                role_name = connection.get(:path => INSTANCE_METADATA_PATH, :idempotent => true, :expects => 200, :headers => token_header).body
 | 
			
		||||
                role_data = connection.get(:path => INSTANCE_METADATA_PATH+role_name, :idempotent => true, :expects => 200, :headers => token_header).body
 | 
			
		||||
                session = Fog::JSON.decode(role_data)
 | 
			
		||||
                
 | 
			
		||||
 | 
			
		||||
                region ||= connection.get(:path => INSTANCE_METADATA_AZ, :idempotent => true, :expects => 200, :headers => token_header).body[0..-2]
 | 
			
		||||
              end
 | 
			
		||||
              
 | 
			
		||||
 | 
			
		||||
              credentials = {}
 | 
			
		||||
              credentials[:aws_access_key_id] = session['AccessKeyId']
 | 
			
		||||
              credentials[:aws_secret_access_key] = session['SecretAccessKey']
 | 
			
		||||
              credentials[:aws_session_token] = session['Token']
 | 
			
		||||
              credentials[:aws_credentials_expire_at] = Time.xmlschema session['Expiration']
 | 
			
		||||
              
 | 
			
		||||
 | 
			
		||||
              # set region by default to the one the instance is in.
 | 
			
		||||
              credentials[:region] = region
 | 
			
		||||
              credentials[:sts_endpoint] = sts_endpoint if sts_endpoint
 | 
			
		||||
              #these indicate the metadata service is unavailable or has no profile setup
 | 
			
		||||
              credentials
 | 
			
		||||
            rescue Excon::Error => e
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -62,7 +62,8 @@ module Fog
 | 
			
		|||
        # options::
 | 
			
		||||
        #   A hash that can contain any of the following keys:
 | 
			
		||||
        #    :cidr_ip (defaults to "0.0.0.0/0")
 | 
			
		||||
        #    :group - ("account:group_name" or "account:group_id"), cannot be used with :cidr_ip
 | 
			
		||||
        #    :cidr_ipv6 cannot be used with :cidr_ip
 | 
			
		||||
        #    :group - ("account:group_name" or "account:group_id"), cannot be used with :cidr_ip or :cidr_ipv6
 | 
			
		||||
        #    :ip_protocol (defaults to "tcp")
 | 
			
		||||
        #
 | 
			
		||||
        # == Returns:
 | 
			
		||||
| 
						 | 
				
			
			@ -178,7 +179,8 @@ module Fog
 | 
			
		|||
        # options::
 | 
			
		||||
        #   A hash that can contain any of the following keys:
 | 
			
		||||
        #    :cidr_ip (defaults to "0.0.0.0/0")
 | 
			
		||||
        #    :group - ("account:group_name" or "account:group_id"), cannot be used with :cidr_ip
 | 
			
		||||
        #    :cidr_ipv6 cannot be used with :cidr_ip
 | 
			
		||||
        #    :group - ("account:group_name" or "account:group_id"), cannot be used with :cidr_ip or :cidr_ipv6
 | 
			
		||||
        #    :ip_protocol (defaults to "tcp")
 | 
			
		||||
        #
 | 
			
		||||
        # == Returns:
 | 
			
		||||
| 
						 | 
				
			
			@ -327,9 +329,15 @@ module Fog
 | 
			
		|||
          }
 | 
			
		||||
 | 
			
		||||
          if options[:group].nil?
 | 
			
		||||
            ip_permission['IpRanges'] = [
 | 
			
		||||
              { 'CidrIp' => options[:cidr_ip] || '0.0.0.0/0' }
 | 
			
		||||
            ]
 | 
			
		||||
            if options[:cidr_ipv6].nil?
 | 
			
		||||
              ip_permission['IpRanges'] = [
 | 
			
		||||
                { 'CidrIp' => options[:cidr_ip] || '0.0.0.0/0' }
 | 
			
		||||
              ]
 | 
			
		||||
            else
 | 
			
		||||
              ip_permission['Ipv6Ranges'] = [
 | 
			
		||||
                { 'CidrIpv6' => options[:cidr_ipv6] }
 | 
			
		||||
              ]
 | 
			
		||||
            end
 | 
			
		||||
          else
 | 
			
		||||
            ip_permission['Groups'] = [
 | 
			
		||||
              group_info(options[:group])
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -50,6 +50,7 @@ module Fog
 | 
			
		|||
        attribute :subnet_id,                :aliases => 'subnetId'
 | 
			
		||||
        attribute :tenancy
 | 
			
		||||
        attribute :tags,                     :aliases => 'tagSet'
 | 
			
		||||
        attribute :tag_specifications,       :aliases => 'tagSpecifications'
 | 
			
		||||
        attribute :user_data
 | 
			
		||||
        attribute :virtualization_type,      :aliases => 'virtualizationType'
 | 
			
		||||
        attribute :vpc_id,                   :aliases => 'vpcId'
 | 
			
		||||
| 
						 | 
				
			
			@ -166,6 +167,7 @@ module Fog
 | 
			
		|||
            'SecurityGroupId'             => security_group_ids,
 | 
			
		||||
            'SubnetId'                    => subnet_id,
 | 
			
		||||
            'UserData'                    => user_data,
 | 
			
		||||
            'TagSpecifications'           => tag_specifications,
 | 
			
		||||
          }
 | 
			
		||||
          options.delete_if {|key, value| value.nil?}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -11,6 +11,7 @@ module Fog
 | 
			
		|||
          load(data)
 | 
			
		||||
        end
 | 
			
		||||
 | 
			
		||||
        # Warning! This retrieves and caches meta data for the first 10,000 objects in the bucket, which can be very expensive. When possible use directories.new
 | 
			
		||||
        def get(key, options = {})
 | 
			
		||||
          remap_attributes(options, {
 | 
			
		||||
            :delimiter  => 'delimiter',
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -4,8 +4,11 @@ module Fog
 | 
			
		|||
  module AWS
 | 
			
		||||
    class Storage
 | 
			
		||||
      class File < Fog::Model
 | 
			
		||||
        MIN_MULTIPART_CHUNK_SIZE = 5242880
 | 
			
		||||
        MAX_SINGLE_PUT_SIZE = 5368709120
 | 
			
		||||
        # @deprecated use {Fog::AWS::Storage::MIN_MULTIPART_CHUNK_SIZE} instead
 | 
			
		||||
        MIN_MULTIPART_CHUNK_SIZE = Fog::AWS::Storage::MIN_MULTIPART_CHUNK_SIZE
 | 
			
		||||
        # @deprecated use {Fog::AWS::Storage::MAX_SINGLE_PUT_SIZE} instead
 | 
			
		||||
        MAX_SINGLE_PUT_SIZE = Fog::AWS::Storage::MAX_SINGLE_PUT_SIZE
 | 
			
		||||
        # @deprecated not used for anything
 | 
			
		||||
        MULTIPART_COPY_THRESHOLD = 15728640
 | 
			
		||||
 | 
			
		||||
        # @see AWS Object docs http://docs.aws.amazon.com/AmazonS3/latest/API/RESTObjectOps.html
 | 
			
		||||
| 
						 | 
				
			
			@ -30,6 +33,7 @@ module Fog
 | 
			
		|||
        attribute :version,             :aliases => 'x-amz-version-id'
 | 
			
		||||
        attribute :kms_key_id,          :aliases => 'x-amz-server-side-encryption-aws-kms-key-id'
 | 
			
		||||
        attribute :tags,                :aliases => 'x-amz-tagging'
 | 
			
		||||
        attribute :website_redirect_location, :aliases => 'x-amz-website-redirect-location'
 | 
			
		||||
 | 
			
		||||
        UploadPartData = Struct.new(:part_number, :upload_options, :etag)
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -64,7 +68,7 @@ module Fog
 | 
			
		|||
        #     Use small chunk sizes to minimize memory. E.g. 5242880 = 5mb
 | 
			
		||||
        attr_reader :multipart_chunk_size
 | 
			
		||||
        def multipart_chunk_size=(mp_chunk_size)
 | 
			
		||||
          raise ArgumentError.new("minimum multipart_chunk_size is #{MIN_MULTIPART_CHUNK_SIZE}") if mp_chunk_size < MIN_MULTIPART_CHUNK_SIZE
 | 
			
		||||
          service.validate_chunk_size(mp_chunk_size, 'multipart_chunk_size')
 | 
			
		||||
          @multipart_chunk_size = mp_chunk_size
 | 
			
		||||
        end
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -104,15 +108,16 @@ module Fog
 | 
			
		|||
        # @return [File]
 | 
			
		||||
        #
 | 
			
		||||
        def body
 | 
			
		||||
          return attributes[:body] if attributes[:body]
 | 
			
		||||
          return '' unless last_modified
 | 
			
		||||
          return attributes[:body] if attributes.key?(:body)
 | 
			
		||||
 | 
			
		||||
          file = collection.get(identity)
 | 
			
		||||
          if file
 | 
			
		||||
            attributes[:body] = file.body
 | 
			
		||||
          else
 | 
			
		||||
            attributes[:body] = ''
 | 
			
		||||
          end
 | 
			
		||||
 | 
			
		||||
          attributes[:body] =
 | 
			
		||||
            if file
 | 
			
		||||
              file.body
 | 
			
		||||
            else
 | 
			
		||||
              ''
 | 
			
		||||
            end
 | 
			
		||||
        end
 | 
			
		||||
 | 
			
		||||
        # Set body attribute.
 | 
			
		||||
| 
						 | 
				
			
			@ -144,10 +149,9 @@ module Fog
 | 
			
		|||
        def copy(target_directory_key, target_file_key, options = {})
 | 
			
		||||
          requires :directory, :key
 | 
			
		||||
 | 
			
		||||
          # With a single PUT operation you can upload objects up to 5 GB in size. Automatically set MP for larger objects.
 | 
			
		||||
          self.multipart_chunk_size = MIN_MULTIPART_CHUNK_SIZE * 2 if !multipart_chunk_size && self.content_length.to_i > MAX_SINGLE_PUT_SIZE
 | 
			
		||||
          self.multipart_chunk_size = service.max_copy_chunk_size if multipart_chunk_size.nil?
 | 
			
		||||
 | 
			
		||||
          if multipart_chunk_size && self.content_length.to_i >= multipart_chunk_size
 | 
			
		||||
          if multipart_chunk_size > 0 && self.content_length.to_i >= multipart_chunk_size
 | 
			
		||||
            upload_part_options = options.select { |key, _| ALLOWED_UPLOAD_PART_OPTIONS.include?(key.to_sym) }
 | 
			
		||||
            upload_part_options = upload_part_options.merge({ 'x-amz-copy-source' => "#{directory.key}/#{key}" })
 | 
			
		||||
            multipart_copy(options, upload_part_options, target_directory_key, target_file_key)
 | 
			
		||||
| 
						 | 
				
			
			@ -249,6 +253,7 @@ module Fog
 | 
			
		|||
        # @option options [String] storage_class sets x-amz-storage-class HTTP header. Defaults to 'STANDARD'. Or, 'REDUCED_REDUNDANCY'
 | 
			
		||||
        # @option options [String] encryption sets HTTP encryption header. Set to 'AES256' to encrypt files at rest on S3
 | 
			
		||||
        # @option options [String] tags sets x-amz-tagging HTTP header. For example, 'Org-Id=1' or 'Org-Id=1&Service=MyService'
 | 
			
		||||
        # @option options [String] website_redirect_location sets x-amz-website-redirect-location HTTP header. For example, 'website_redirect_location=http://www.rubydoc.info/github/fog/fog-aws'
 | 
			
		||||
        # @return [Boolean] true if no errors
 | 
			
		||||
        #
 | 
			
		||||
        def save(options = {})
 | 
			
		||||
| 
						 | 
				
			
			@ -266,12 +271,11 @@ module Fog
 | 
			
		|||
          options.merge!(metadata)
 | 
			
		||||
          options['x-amz-storage-class'] = storage_class if storage_class
 | 
			
		||||
          options['x-amz-tagging'] = tags if tags
 | 
			
		||||
          options['x-amz-website-redirect-location'] = website_redirect_location if website_redirect_location
 | 
			
		||||
          options.merge!(encryption_headers)
 | 
			
		||||
 | 
			
		||||
          # With a single PUT operation you can upload objects up to 5 GB in size. Automatically set MP for larger objects.
 | 
			
		||||
          self.multipart_chunk_size = MIN_MULTIPART_CHUNK_SIZE if !multipart_chunk_size && Fog::Storage.get_body_size(body) > MAX_SINGLE_PUT_SIZE
 | 
			
		||||
 | 
			
		||||
          if multipart_chunk_size && Fog::Storage.get_body_size(body) >= multipart_chunk_size && body.respond_to?(:read)
 | 
			
		||||
          self.multipart_chunk_size = service.max_put_chunk_size if multipart_chunk_size.nil?
 | 
			
		||||
          if multipart_chunk_size > 0 && Fog::Storage.get_body_size(body) >= multipart_chunk_size && body.respond_to?(:read)
 | 
			
		||||
            data = multipart_save(options)
 | 
			
		||||
            merge_attributes(data.body)
 | 
			
		||||
          else
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -5,9 +5,10 @@ module Fog
 | 
			
		|||
        class DescribeSecurityGroups < Fog::Parsers::Base
 | 
			
		||||
          def reset
 | 
			
		||||
            @group = {}
 | 
			
		||||
            @ip_permission = { 'groups' => [], 'ipRanges' => []}
 | 
			
		||||
            @ip_permission_egress = { 'groups' => [], 'ipRanges' => []}
 | 
			
		||||
            @ip_permission = { 'groups' => [], 'ipRanges' => [], 'ipv6Ranges' => []}
 | 
			
		||||
            @ip_permission_egress = { 'groups' => [], 'ipRanges' => [], 'ipv6Ranges' => []}
 | 
			
		||||
            @ip_range = {}
 | 
			
		||||
            @ipv6_range = {}
 | 
			
		||||
            @security_group = { 'ipPermissions' => [], 'ipPermissionsEgress' => [], 'tagSet' => {} }
 | 
			
		||||
            @response = { 'securityGroupInfo' => [] }
 | 
			
		||||
            @tag = {}
 | 
			
		||||
| 
						 | 
				
			
			@ -24,6 +25,8 @@ module Fog
 | 
			
		|||
              @in_ip_permissions_egress = true
 | 
			
		||||
            when 'ipRanges'
 | 
			
		||||
              @in_ip_ranges = true
 | 
			
		||||
            when 'ipv6Ranges'
 | 
			
		||||
              @in_ipv6_ranges = true
 | 
			
		||||
            when 'tagSet'
 | 
			
		||||
              @in_tag_set = true
 | 
			
		||||
            end
 | 
			
		||||
| 
						 | 
				
			
			@ -44,6 +47,8 @@ module Fog
 | 
			
		|||
              case name
 | 
			
		||||
              when 'cidrIp'
 | 
			
		||||
                @ip_range[name] = value
 | 
			
		||||
              when 'cidrIpv6'
 | 
			
		||||
                @ipv6_range[name] = value
 | 
			
		||||
              when 'fromPort', 'toPort'
 | 
			
		||||
                if @in_ip_permissions_egress
 | 
			
		||||
                  @ip_permission_egress[name] = value.to_i
 | 
			
		||||
| 
						 | 
				
			
			@ -72,6 +77,8 @@ module Fog
 | 
			
		|||
                end
 | 
			
		||||
              when 'ipRanges'
 | 
			
		||||
                @in_ip_ranges = false
 | 
			
		||||
              when 'ipv6Ranges'
 | 
			
		||||
                @in_ipv6_ranges = false
 | 
			
		||||
              when 'item'
 | 
			
		||||
                if @in_groups
 | 
			
		||||
                  if @in_ip_permissions_egress
 | 
			
		||||
| 
						 | 
				
			
			@ -87,12 +94,19 @@ module Fog
 | 
			
		|||
                    @ip_permission['ipRanges'] << @ip_range
 | 
			
		||||
                  end
 | 
			
		||||
                  @ip_range = {}
 | 
			
		||||
                elsif @in_ipv6_ranges
 | 
			
		||||
                  if @in_ip_permissions_egress
 | 
			
		||||
                    @ip_permission_egress['ipv6Ranges'] << @ipv6_range
 | 
			
		||||
                  else
 | 
			
		||||
                    @ip_permission['ipv6Ranges'] << @ipv6_range
 | 
			
		||||
                  end
 | 
			
		||||
                  @ipv6_range = {}
 | 
			
		||||
                elsif @in_ip_permissions
 | 
			
		||||
                  @security_group['ipPermissions'] << @ip_permission
 | 
			
		||||
                  @ip_permission = { 'groups' => [], 'ipRanges' => []}
 | 
			
		||||
                  @ip_permission = { 'groups' => [], 'ipRanges' => [], 'ipv6Ranges' => []}
 | 
			
		||||
                elsif @in_ip_permissions_egress
 | 
			
		||||
                  @security_group['ipPermissionsEgress'] << @ip_permission_egress
 | 
			
		||||
                  @ip_permission_egress = { 'groups' => [], 'ipRanges' => []}
 | 
			
		||||
                  @ip_permission_egress = { 'groups' => [], 'ipRanges' => [], 'ipv6Ranges' => []}
 | 
			
		||||
                else
 | 
			
		||||
                  @response['securityGroupInfo'] << @security_group
 | 
			
		||||
                  @security_group = { 'ipPermissions' => [], 'ipPermissionsEgress' => [], 'tagSet' => {} }
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -30,6 +30,9 @@ module Fog
 | 
			
		|||
        #       * 'IpRanges'<~Array>:
 | 
			
		||||
        #         * ip_range<~Hash>:
 | 
			
		||||
        #           * 'CidrIp'<~String> - CIDR range
 | 
			
		||||
        #       * 'Ipv6Ranges'<~Array>:
 | 
			
		||||
        #         * ip_range<~Hash>:
 | 
			
		||||
        #           * 'CidrIpv6'<~String> - CIDR range
 | 
			
		||||
        #       * 'ToPort'<~Integer> - End of port range (or -1 for ICMP wildcard)
 | 
			
		||||
        #
 | 
			
		||||
        # === Returns
 | 
			
		||||
| 
						 | 
				
			
			@ -72,6 +75,10 @@ module Fog
 | 
			
		|||
              range_index += 1
 | 
			
		||||
              params[format('IpPermissions.%d.IpRanges.%d.CidrIp', key_index, range_index)] = ip_range['CidrIp']
 | 
			
		||||
            end
 | 
			
		||||
            (permission['Ipv6Ranges'] || []).each_with_index do |ip_range, range_index|
 | 
			
		||||
              range_index += 1
 | 
			
		||||
              params[format('IpPermissions.%d.Ipv6Ranges.%d.CidrIpv6', key_index, range_index)] = ip_range['CidrIpv6']
 | 
			
		||||
            end
 | 
			
		||||
          end
 | 
			
		||||
          params.reject {|k, v| v.nil? }
 | 
			
		||||
        end
 | 
			
		||||
| 
						 | 
				
			
			@ -186,6 +193,14 @@ module Fog
 | 
			
		|||
              'groups'     => [],
 | 
			
		||||
              'ipRanges'   => [{'cidrIp' => options['CidrIp']}]
 | 
			
		||||
            }
 | 
			
		||||
          elsif options['CidrIpv6']
 | 
			
		||||
            normalized_permissions << {
 | 
			
		||||
              'ipProtocol' => options['IpProtocol'],
 | 
			
		||||
              'fromPort'   => Integer(options['FromPort']),
 | 
			
		||||
              'toPort'     => Integer(options['ToPort']),
 | 
			
		||||
              'groups'     => [],
 | 
			
		||||
              'ipv6Ranges' => [{'cidrIpv6' => options['CidrIpv6']}]
 | 
			
		||||
            }
 | 
			
		||||
          elsif options['IpPermissions']
 | 
			
		||||
            options['IpPermissions'].each do |permission|
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -2,6 +2,7 @@ module Fog
 | 
			
		|||
  module AWS
 | 
			
		||||
    class Compute
 | 
			
		||||
      class Real
 | 
			
		||||
        require 'ipaddr'
 | 
			
		||||
        require 'fog/aws/parsers/compute/create_network_interface'
 | 
			
		||||
 | 
			
		||||
        # Creates a network interface
 | 
			
		||||
| 
						 | 
				
			
			@ -68,7 +69,7 @@ module Fog
 | 
			
		|||
              raise Fog::AWS::Compute::Error.new("Unknown subnet '#{subnetId}' specified")
 | 
			
		||||
            else
 | 
			
		||||
              id = Fog::AWS::Mock.network_interface_id
 | 
			
		||||
              cidr_block = IPAddress.parse(subnet['cidrBlock'])
 | 
			
		||||
              cidr_block = IPAddr.new(subnet['cidrBlock'])
 | 
			
		||||
 | 
			
		||||
              groups = {}
 | 
			
		||||
              if options['GroupSet']
 | 
			
		||||
| 
						 | 
				
			
			@ -82,12 +83,14 @@ module Fog
 | 
			
		|||
              end
 | 
			
		||||
 | 
			
		||||
              if options['PrivateIpAddress'].nil?
 | 
			
		||||
                range = cidr_block.to_range
 | 
			
		||||
                # Here we try to act like a DHCP server and pick the first
 | 
			
		||||
                # available IP (not including the first in the cidr block,
 | 
			
		||||
                # which is typically reserved for the gateway).
 | 
			
		||||
                cidr_block.each_host do |p_ip|
 | 
			
		||||
                  unless self.data[:network_interfaces].map{ |ni, ni_conf| ni_conf['privateIpAddress'] }.include?p_ip.to_s ||
 | 
			
		||||
                    cidr_block.first == p_ip
 | 
			
		||||
                range = range.drop(2)[0..-2] if cidr_block.ipv4?
 | 
			
		||||
 | 
			
		||||
                range.each do |p_ip|
 | 
			
		||||
                  unless self.data[:network_interfaces].map{ |ni, ni_conf| ni_conf['privateIpAddress'] }.include?p_ip.to_s
 | 
			
		||||
                    options['PrivateIpAddress'] = p_ip.to_s
 | 
			
		||||
                    break
 | 
			
		||||
                  end
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -2,7 +2,7 @@ module Fog
 | 
			
		|||
  module AWS
 | 
			
		||||
    class Compute
 | 
			
		||||
      class Real
 | 
			
		||||
        require 'ipaddress'
 | 
			
		||||
        require 'ipaddr'
 | 
			
		||||
        require 'fog/aws/parsers/compute/create_subnet'
 | 
			
		||||
 | 
			
		||||
        # Creates a Subnet with the CIDR block you specify.
 | 
			
		||||
| 
						 | 
				
			
			@ -50,11 +50,11 @@ module Fog
 | 
			
		|||
              if vpc.nil?
 | 
			
		||||
                raise Fog::AWS::Compute::NotFound.new("The vpc ID '#{vpcId}' does not exist")
 | 
			
		||||
              end
 | 
			
		||||
              if ! ::IPAddress.parse(vpc['cidrBlock']).include?(::IPAddress.parse(cidrBlock))
 | 
			
		||||
              if ! ::IPAddr.new(vpc['cidrBlock']).include?(::IPAddr.new(cidrBlock))
 | 
			
		||||
                raise Fog::AWS::Compute::Error.new("Range => The CIDR '#{cidrBlock}' is invalid.")
 | 
			
		||||
              end
 | 
			
		||||
              self.data[:subnets].select{ |s| s['vpcId'] == vpcId }.each do |subnet|
 | 
			
		||||
                if ::IPAddress.parse(subnet['cidrBlock']).include?(::IPAddress.parse(cidrBlock))
 | 
			
		||||
                if ::IPAddr.new(subnet['cidrBlock']).include?(::IPAddr.new(cidrBlock))
 | 
			
		||||
                  raise Fog::AWS::Compute::Error.new("Conflict => The CIDR '#{cidrBlock}' conflicts with another subnet")
 | 
			
		||||
                end
 | 
			
		||||
              end
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -27,6 +27,8 @@ module Fog
 | 
			
		|||
        #         * 'ipProtocol'<~String> - Ip protocol, must be in ['tcp', 'udp', 'icmp']
 | 
			
		||||
        #         * 'ipRanges'<~Array>:
 | 
			
		||||
        #           * 'cidrIp'<~String> - CIDR range
 | 
			
		||||
        #         * 'ipv6Ranges'<~Array>:
 | 
			
		||||
        #           * 'cidrIpv6'<~String> - CIDR ipv6 range
 | 
			
		||||
        #         * 'toPort'<~Integer> - End of port range (or -1 for ICMP wildcard)
 | 
			
		||||
        #       * 'ownerId'<~String> - AWS Access Key Id of the owner of the security group
 | 
			
		||||
        #     * 'NextToken'<~String> - The token to retrieve the next page of results
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -44,6 +44,11 @@ module Fog
 | 
			
		|||
        #     * 'PrivateIpAddresses.Primary'<~Bool> - Indicates whether the private IP address is the primary private IP address.
 | 
			
		||||
        #     * 'SecondaryPrivateIpAddressCount'<~Bool> - The number of private IP addresses to assign to the network interface.
 | 
			
		||||
        #     * 'AssociatePublicIpAddress'<~String> - Indicates whether to assign a public IP address to an instance in a VPC. The public IP address is assigned to a specific network interface
 | 
			
		||||
        #   * 'TagSpecifications'<~Array>: array of hashes
 | 
			
		||||
        #     * 'ResourceType'<~String> - Type of resource to apply tags on, e.g: instance or volume
 | 
			
		||||
        #     * 'Tags'<~Array> - List of hashs reprensenting tag to be set
 | 
			
		||||
        #       * 'Key'<~String> - Tag name
 | 
			
		||||
        #       * 'Value'<~String> - Tag value
 | 
			
		||||
        #   * 'ClientToken'<~String> - unique case-sensitive token for ensuring idempotency
 | 
			
		||||
        #   * 'DisableApiTermination'<~Boolean> - specifies whether or not to allow termination of the instance from the api
 | 
			
		||||
        #   * 'SecurityGroup'<~Array> or <~String> - Name of security group(s) for instances (not supported for VPC)
 | 
			
		||||
| 
						 | 
				
			
			@ -144,6 +149,45 @@ module Fog
 | 
			
		|||
              end
 | 
			
		||||
            end
 | 
			
		||||
          end
 | 
			
		||||
          if tag_specifications = options.delete('TagSpecifications')
 | 
			
		||||
            # From https://docs.aws.amazon.com/sdk-for-ruby/v2/api/Aws/EC2/Client.html#run_instances-instance_method
 | 
			
		||||
            # And https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_RunInstances.html
 | 
			
		||||
            # Discussed at https://github.com/fog/fog-aws/issues/603
 | 
			
		||||
            #
 | 
			
		||||
            # Example
 | 
			
		||||
            #
 | 
			
		||||
            # TagSpecifications: [
 | 
			
		||||
            #     {
 | 
			
		||||
            #       ResourceType: "instance",
 | 
			
		||||
            #       Tags: [
 | 
			
		||||
            #         {
 | 
			
		||||
            #           Key: "Project",
 | 
			
		||||
            #           Value: "MyProject",
 | 
			
		||||
            #         },
 | 
			
		||||
            #       ],
 | 
			
		||||
            #     },
 | 
			
		||||
            #     {
 | 
			
		||||
            #       ResourceType: "volume",
 | 
			
		||||
            #       Tags: [
 | 
			
		||||
            #         {
 | 
			
		||||
            #           Key: "Project",
 | 
			
		||||
            #           Value: "MyProject",
 | 
			
		||||
            #         },
 | 
			
		||||
            #       ],
 | 
			
		||||
            #     },
 | 
			
		||||
            # ]
 | 
			
		||||
            tag_specifications.each_with_index do |val, idx|
 | 
			
		||||
              resource_type = val["ResourceType"]
 | 
			
		||||
              tags = val["Tags"]
 | 
			
		||||
              options["TagSpecification.#{idx}.ResourceType"] = resource_type
 | 
			
		||||
              tags.each_with_index do |tag, tag_idx|
 | 
			
		||||
                aws_tag_key = "TagSpecification.#{idx}.Tag.#{tag_idx}.Key"
 | 
			
		||||
                aws_tag_value = "TagSpecification.#{idx}.Tag.#{tag_idx}.Value"
 | 
			
		||||
                options[aws_tag_key] = tag["Key"]
 | 
			
		||||
                options[aws_tag_value] = tag["Value"]
 | 
			
		||||
              end
 | 
			
		||||
            end
 | 
			
		||||
          end
 | 
			
		||||
 | 
			
		||||
          idempotent = !(options['ClientToken'].nil? || options['ClientToken'].empty?)
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -50,7 +50,7 @@ module Fog
 | 
			
		|||
 | 
			
		||||
          idempotent = true
 | 
			
		||||
          if block_given?
 | 
			
		||||
            params[:response_block] = Proc.new
 | 
			
		||||
            params[:response_block] = Proc.new(&block)
 | 
			
		||||
            idempotent = false
 | 
			
		||||
          end
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -14,6 +14,9 @@ module Fog
 | 
			
		|||
        'https' => 443
 | 
			
		||||
      }
 | 
			
		||||
 | 
			
		||||
      MIN_MULTIPART_CHUNK_SIZE = 5242880
 | 
			
		||||
      MAX_SINGLE_PUT_SIZE = 5368709120
 | 
			
		||||
 | 
			
		||||
      VALID_QUERY_KEYS = %w[
 | 
			
		||||
        acl
 | 
			
		||||
        cors
 | 
			
		||||
| 
						 | 
				
			
			@ -43,7 +46,7 @@ module Fog
 | 
			
		|||
      ]
 | 
			
		||||
 | 
			
		||||
      requires :aws_access_key_id, :aws_secret_access_key
 | 
			
		||||
      recognizes :endpoint, :region, :host, :port, :scheme, :persistent, :use_iam_profile, :aws_session_token, :aws_credentials_expire_at, :path_style, :acceleration, :instrumentor, :instrumentor_name, :aws_signature_version, :enable_signature_v4_streaming, :virtual_host, :cname, :aws_credentials_refresh_threshold_seconds
 | 
			
		||||
      recognizes :endpoint, :region, :host, :port, :scheme, :persistent, :use_iam_profile, :aws_session_token, :aws_credentials_expire_at, :path_style, :acceleration, :instrumentor, :instrumentor_name, :aws_signature_version, :enable_signature_v4_streaming, :virtual_host, :cname, :max_put_chunk_size, :max_copy_chunk_size, :aws_credentials_refresh_threshold_seconds
 | 
			
		||||
 | 
			
		||||
      secrets    :aws_secret_access_key, :hmac
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -117,6 +120,17 @@ module Fog
 | 
			
		|||
      module Utils
 | 
			
		||||
        attr_accessor :region
 | 
			
		||||
 | 
			
		||||
        # Amazon S3 limits max chunk size that can be uploaded/copied in a single request to 5GB.
 | 
			
		||||
        # Other S3-compatible storages (like, Ceph) do not have such limit.
 | 
			
		||||
        # Ceph shows much better performance when file is copied as a whole, in a single request.
 | 
			
		||||
        # fog-aws user can use these settings to configure chunk sizes.
 | 
			
		||||
        # A non-positive value will tell fog-aws to use a single put/copy request regardless of file size.
 | 
			
		||||
        #
 | 
			
		||||
        # @return [Integer]
 | 
			
		||||
        # @see https://docs.aws.amazon.com/AmazonS3/latest/userguide/copy-object.html
 | 
			
		||||
        attr_reader :max_put_chunk_size
 | 
			
		||||
        attr_reader :max_copy_chunk_size
 | 
			
		||||
 | 
			
		||||
        def cdn
 | 
			
		||||
          @cdn ||= Fog::AWS::CDN.new(
 | 
			
		||||
            :aws_access_key_id => @aws_access_key_id,
 | 
			
		||||
| 
						 | 
				
			
			@ -171,6 +185,12 @@ module Fog
 | 
			
		|||
          params_to_url(params)
 | 
			
		||||
        end
 | 
			
		||||
 | 
			
		||||
        # @param value [int]
 | 
			
		||||
        # @param description [str]
 | 
			
		||||
        def validate_chunk_size(value, description)
 | 
			
		||||
          raise "#{description} (#{value}) is less than minimum #{MIN_MULTIPART_CHUNK_SIZE}" unless value <= 0 || value >= MIN_MULTIPART_CHUNK_SIZE
 | 
			
		||||
        end
 | 
			
		||||
 | 
			
		||||
        private
 | 
			
		||||
 | 
			
		||||
        def validate_signature_version!
 | 
			
		||||
| 
						 | 
				
			
			@ -179,6 +199,16 @@ module Fog
 | 
			
		|||
          end
 | 
			
		||||
        end
 | 
			
		||||
 | 
			
		||||
        def init_max_put_chunk_size!(options = {})
 | 
			
		||||
          @max_put_chunk_size = options.fetch(:max_put_chunk_size, MAX_SINGLE_PUT_SIZE)
 | 
			
		||||
          validate_chunk_size(@max_put_chunk_size, 'max_put_chunk_size')
 | 
			
		||||
        end
 | 
			
		||||
 | 
			
		||||
        def init_max_copy_chunk_size!(options = {})
 | 
			
		||||
          @max_copy_chunk_size = options.fetch(:max_copy_chunk_size, MAX_SINGLE_PUT_SIZE)
 | 
			
		||||
          validate_chunk_size(@max_copy_chunk_size, 'max_copy_chunk_size')
 | 
			
		||||
        end
 | 
			
		||||
 | 
			
		||||
        def v4_signed_params_for_url(params, expires)
 | 
			
		||||
          now = Fog::Time.now
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -452,6 +482,10 @@ module Fog
 | 
			
		|||
 | 
			
		||||
 | 
			
		||||
          @path_style = options[:path_style] || false
 | 
			
		||||
 | 
			
		||||
          init_max_put_chunk_size!(options)
 | 
			
		||||
          init_max_copy_chunk_size!(options)
 | 
			
		||||
 | 
			
		||||
          @signature_version = options.fetch(:aws_signature_version, 4)
 | 
			
		||||
          validate_signature_version!
 | 
			
		||||
          setup_credentials(options)
 | 
			
		||||
| 
						 | 
				
			
			@ -517,6 +551,9 @@ module Fog
 | 
			
		|||
          validate_signature_version!
 | 
			
		||||
          @path_style = options[:path_style]  || false
 | 
			
		||||
 | 
			
		||||
          init_max_put_chunk_size!(options)
 | 
			
		||||
          init_max_copy_chunk_size!(options)
 | 
			
		||||
 | 
			
		||||
          @region = options[:region] || DEFAULT_REGION
 | 
			
		||||
 | 
			
		||||
          if @endpoint = options[:endpoint]
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,5 +1,5 @@
 | 
			
		|||
module Fog
 | 
			
		||||
  module AWS
 | 
			
		||||
    VERSION = "3.10.0"
 | 
			
		||||
    VERSION = "3.13.0"
 | 
			
		||||
  end
 | 
			
		||||
end
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -83,6 +83,7 @@ Shindo.tests('AWS | credentials', ['aws']) do
 | 
			
		|||
        aws_secret_access_key: 'dummysecret',
 | 
			
		||||
        aws_session_token: 'dummytoken',
 | 
			
		||||
        region: 'us-west-1',
 | 
			
		||||
        sts_endpoint: "https://sts.amazonaws.com",
 | 
			
		||||
        aws_credentials_expire_at: expires_at
 | 
			
		||||
      ) { Fog::AWS::Compute.fetch_credentials(use_iam_profile: true) }
 | 
			
		||||
    end
 | 
			
		||||
| 
						 | 
				
			
			@ -95,10 +96,50 @@ Shindo.tests('AWS | credentials', ['aws']) do
 | 
			
		|||
        aws_secret_access_key: 'dummysecret',
 | 
			
		||||
        aws_session_token: 'dummytoken',
 | 
			
		||||
        region: 'us-west-1',
 | 
			
		||||
        sts_endpoint: "https://sts.amazonaws.com",
 | 
			
		||||
        aws_credentials_expire_at: expires_at
 | 
			
		||||
      ) { Fog::AWS::Compute.fetch_credentials(use_iam_profile: true, region: 'us-west-1') }
 | 
			
		||||
    end
 | 
			
		||||
 | 
			
		||||
    ENV["AWS_STS_REGIONAL_ENDPOINTS"] = "regional"
 | 
			
		||||
 | 
			
		||||
    tests('#fetch_credentials with no region specified') do
 | 
			
		||||
      returns(
 | 
			
		||||
        aws_access_key_id: 'dummykey',
 | 
			
		||||
        aws_secret_access_key: 'dummysecret',
 | 
			
		||||
        aws_session_token: 'dummytoken',
 | 
			
		||||
        region: 'us-west-1',
 | 
			
		||||
        sts_endpoint: "https://sts.amazonaws.com",
 | 
			
		||||
        aws_credentials_expire_at: expires_at
 | 
			
		||||
      ) { Fog::AWS::Compute.fetch_credentials(use_iam_profile: true) }
 | 
			
		||||
    end
 | 
			
		||||
 | 
			
		||||
    tests('#fetch_credentials with regional STS endpoint') do
 | 
			
		||||
      returns(
 | 
			
		||||
        aws_access_key_id: 'dummykey',
 | 
			
		||||
        aws_secret_access_key: 'dummysecret',
 | 
			
		||||
        aws_session_token: 'dummytoken',
 | 
			
		||||
        region: 'us-west-1',
 | 
			
		||||
        sts_endpoint: "https://sts.us-west-1.amazonaws.com",
 | 
			
		||||
        aws_credentials_expire_at: expires_at
 | 
			
		||||
      ) { Fog::AWS::Compute.fetch_credentials(use_iam_profile: true, region: 'us-west-1') }
 | 
			
		||||
    end
 | 
			
		||||
 | 
			
		||||
    ENV["AWS_DEFAULT_REGION"] = "us-west-1"
 | 
			
		||||
 | 
			
		||||
    tests('#fetch_credentials with regional STS endpoint with region in env') do
 | 
			
		||||
      returns(
 | 
			
		||||
        aws_access_key_id: 'dummykey',
 | 
			
		||||
        aws_secret_access_key: 'dummysecret',
 | 
			
		||||
        aws_session_token: 'dummytoken',
 | 
			
		||||
        region: 'us-west-1',
 | 
			
		||||
        sts_endpoint: "https://sts.us-west-1.amazonaws.com",
 | 
			
		||||
        aws_credentials_expire_at: expires_at
 | 
			
		||||
      ) { Fog::AWS::Compute.fetch_credentials(use_iam_profile: true) }
 | 
			
		||||
    end
 | 
			
		||||
 | 
			
		||||
    ENV["AWS_STS_REGIONAL_ENDPOINTS"] = nil
 | 
			
		||||
    ENV["AWS_DEFAULT_REGION"] = nil
 | 
			
		||||
    ENV['AWS_WEB_IDENTITY_TOKEN_FILE'] = nil
 | 
			
		||||
 | 
			
		||||
    storage = Fog::Storage.new(
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -19,6 +19,7 @@ Shindo.tests('Fog::Compute[:aws] | security group requests', ['aws']) do
 | 
			
		|||
        'groups'      => [{ 'groupName' => Fog::Nullable::String, 'userId' => String, 'groupId' => String }],
 | 
			
		||||
        'ipProtocol'  => String,
 | 
			
		||||
        'ipRanges'    => [Fog::Nullable::Hash],
 | 
			
		||||
        'ipv6Ranges'  => [Fog::Nullable::Hash],
 | 
			
		||||
        'toPort'      => Fog::Nullable::Integer,
 | 
			
		||||
      }],
 | 
			
		||||
      'ipPermissionsEgress' => [],
 | 
			
		||||
| 
						 | 
				
			
			@ -54,16 +55,19 @@ Shindo.tests('Fog::Compute[:aws] | security group requests', ['aws']) do
 | 
			
		|||
      {"groups"=>[{"groupName"=>"default", "userId"=>@owner_id, "groupId"=>@group_id_default}],
 | 
			
		||||
        "fromPort"=>1,
 | 
			
		||||
        "ipRanges"=>[],
 | 
			
		||||
        "ipv6Ranges"=>[],
 | 
			
		||||
        "ipProtocol"=>"tcp",
 | 
			
		||||
        "toPort"=>65535},
 | 
			
		||||
      {"groups"=>[{"groupName"=>"default", "userId"=>@owner_id, "groupId"=>@group_id_default}],
 | 
			
		||||
        "fromPort"=>1,
 | 
			
		||||
        "ipRanges"=>[],
 | 
			
		||||
        "ipv6Ranges"=>[],
 | 
			
		||||
        "ipProtocol"=>"udp",
 | 
			
		||||
        "toPort"=>65535},
 | 
			
		||||
      {"groups"=>[{"groupName"=>"default", "userId"=>@owner_id, "groupId"=>@group_id_default}],
 | 
			
		||||
        "fromPort"=>-1,
 | 
			
		||||
        "ipRanges"=>[],
 | 
			
		||||
        "ipv6Ranges"=>[],
 | 
			
		||||
        "ipProtocol"=>"icmp",
 | 
			
		||||
        "toPort"=>-1}
 | 
			
		||||
    ]
 | 
			
		||||
| 
						 | 
				
			
			@ -88,6 +92,7 @@ Shindo.tests('Fog::Compute[:aws] | security group requests', ['aws']) do
 | 
			
		|||
        [{"userId"=>@owner_id, "groupName"=>"default", "groupId"=>@group_id_default},
 | 
			
		||||
          {"userId"=>@owner_id, "groupName"=>"fog_security_group_two", "groupId"=>@group_id_two}],
 | 
			
		||||
        "ipRanges"=>[],
 | 
			
		||||
        "ipv6Ranges"=>[],
 | 
			
		||||
        "ipProtocol"=>"tcp",
 | 
			
		||||
        "fromPort"=>1,
 | 
			
		||||
        "toPort"=>65535},
 | 
			
		||||
| 
						 | 
				
			
			@ -95,6 +100,7 @@ Shindo.tests('Fog::Compute[:aws] | security group requests', ['aws']) do
 | 
			
		|||
        [{"userId"=>@owner_id, "groupName"=>"default", "groupId"=>@group_id_default},
 | 
			
		||||
          {"userId"=>@owner_id, "groupName"=>"fog_security_group_two", "groupId"=>@group_id_two}],
 | 
			
		||||
        "ipRanges"=>[],
 | 
			
		||||
        "ipv6Ranges"=>[],
 | 
			
		||||
        "ipProtocol"=>"udp",
 | 
			
		||||
        "fromPort"=>1,
 | 
			
		||||
        "toPort"=>65535},
 | 
			
		||||
| 
						 | 
				
			
			@ -102,6 +108,7 @@ Shindo.tests('Fog::Compute[:aws] | security group requests', ['aws']) do
 | 
			
		|||
        [{"userId"=>@owner_id, "groupName"=>"default", "groupId"=>@group_id_default},
 | 
			
		||||
          {"userId"=>@owner_id, "groupName"=>"fog_security_group_two", "groupId"=>@group_id_two}],
 | 
			
		||||
        "ipRanges"=>[],
 | 
			
		||||
        "ipv6Ranges"=>[],
 | 
			
		||||
        "ipProtocol"=>"icmp",
 | 
			
		||||
        "fromPort"=>-1,
 | 
			
		||||
        "toPort"=>-1}
 | 
			
		||||
| 
						 | 
				
			
			@ -133,6 +140,7 @@ Shindo.tests('Fog::Compute[:aws] | security group requests', ['aws']) do
 | 
			
		|||
    expected_permissions += [
 | 
			
		||||
      {"groups"=>[],
 | 
			
		||||
        "ipRanges"=>[{"cidrIp"=>"10.0.0.0/8"}],
 | 
			
		||||
        "ipv6Ranges"=>[],
 | 
			
		||||
        "ipProtocol"=>"tcp",
 | 
			
		||||
        "fromPort"=>22,
 | 
			
		||||
        "toPort"=>22}
 | 
			
		||||
| 
						 | 
				
			
			@ -164,7 +172,8 @@ Shindo.tests('Fog::Compute[:aws] | security group requests', ['aws']) do
 | 
			
		|||
      'IpPermissions' => [
 | 
			
		||||
        {
 | 
			
		||||
          'IpProtocol' => 'tcp', 'FromPort' => '80', 'ToPort' => '80',
 | 
			
		||||
          'IpRanges' => [{ 'CidrIp' => '192.168.0.0/24' }]
 | 
			
		||||
          'IpRanges' => [{ 'CidrIp' => '192.168.0.0/24' }],
 | 
			
		||||
          'Ipv6Ranges' => []
 | 
			
		||||
        }
 | 
			
		||||
      ]
 | 
			
		||||
    }
 | 
			
		||||
| 
						 | 
				
			
			@ -177,6 +186,7 @@ Shindo.tests('Fog::Compute[:aws] | security group requests', ['aws']) do
 | 
			
		|||
    expected_permissions += [
 | 
			
		||||
      {"groups"=>[],
 | 
			
		||||
        "ipRanges"=>[{"cidrIp"=>"192.168.0.0/24"}],
 | 
			
		||||
        "ipv6Ranges"=>[],
 | 
			
		||||
        "ipProtocol"=>"tcp",
 | 
			
		||||
        "fromPort"=>80,
 | 
			
		||||
        "toPort"=>80}
 | 
			
		||||
| 
						 | 
				
			
			@ -204,6 +214,7 @@ Shindo.tests('Fog::Compute[:aws] | security group requests', ['aws']) do
 | 
			
		|||
    expected_permissions += [
 | 
			
		||||
      {"groups"=>[{"userId"=>@owner_id, "groupName"=>"fog_security_group_two", "groupId"=>@group_id_two}],
 | 
			
		||||
        "ipRanges"=>[],
 | 
			
		||||
        "ipv6Ranges"=>[],
 | 
			
		||||
        "ipProtocol"=>"tcp",
 | 
			
		||||
        "fromPort"=>8000,
 | 
			
		||||
        "toPort"=>8000}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue