require 'fog/core/model' module Fog module AWS class Compute class Server < Fog::Model extend Fog::Deprecation deprecate :ip_address, :public_ip_address identity :id, :aliases => 'instanceId' attr_accessor :architecture attribute :ami_launch_index, :aliases => 'amiLaunchIndex' attribute :availability_zone, :aliases => ['availabilityZone', 'placement'], :squash => 'availabilityZone' attribute :block_device_mapping, :aliases => 'blockDeviceMapping' attribute :client_token, :aliases => 'clientToken' attribute :dns_name, :aliases => 'dnsName' attribute :groups attribute :flavor_id, :aliases => 'instanceType' attribute :image_id, :aliases => 'imageId' attr_accessor :instance_initiated_shutdown_behavior attribute :kernel_id, :aliases => 'kernelId' attribute :key_name, :aliases => 'keyName' attribute :created_at, :aliases => 'launchTime' attribute :monitoring, :squash => 'state' attribute :product_codes, :aliases => 'productCodes' attribute :private_dns_name, :aliases => 'privateDnsName' attribute :private_ip_address, :aliases => 'privateIpAddress' attribute :public_ip_address, :aliases => 'ipAddress' attribute :ramdisk_id, :aliases => 'ramdiskId' attribute :reason attribute :root_device_name, :aliases => 'rootDeviceName' attribute :root_device_type, :aliases => 'rootDeviceType' attribute :state, :aliases => 'instanceState', :squash => 'name' attribute :state_reason, :aliases => 'stateReason' attribute :subnet_id, :aliases => 'subnetId' attribute :tags, :aliases => 'tagSet' attribute :user_data attr_accessor :password attr_writer :private_key, :private_key_path, :public_key, :public_key_path, :username def initialize(attributes={}) self.groups ||= ["default"] unless attributes[:subnet_id] self.flavor_id ||= 'm1.small' super end def addresses requires :id connection.addresses(:server => self) end def console_output requires :id connection.get_console_output(id) end def destroy requires :id connection.terminate_instances(id) true end remove_method :flavor_id def flavor_id @flavor && @flavor.id || attributes[:flavor_id] end def flavor=(new_flavor) @flavor = new_flavor end def flavor @flavor ||= connection.flavors.all.detect {|flavor| flavor.id == flavor_id} end def key_pair requires :key_name connection.key_pairs.all(key_name).first end def key_pair=(new_keypair) self.key_name = new_keypair && new_keypair.name end def private_key_path @private_key_path ||= Fog.credentials[:private_key_path] @private_key_path &&= File.expand_path(@private_key_path) end def private_key @private_key ||= private_key_path && File.read(private_key_path) end def public_key_path @public_key_path ||= Fog.credentials[:public_key_path] @public_key_path &&= File.expand_path(@public_key_path) end def public_key @public_key ||= public_key_path && File.read(public_key_path) end def ready? state == 'running' end def reboot requires :id connection.reboot_instances(id) true end def save raise Fog::Errors::Error.new('Resaving an existing object may create a duplicate') if identity requires :image_id options = { 'BlockDeviceMapping' => block_device_mapping, 'ClientToken' => client_token, 'InstanceInitiatedShutdownBehavior' => instance_initiated_shutdown_behavior, 'InstanceType' => flavor_id, 'KernelId' => kernel_id, 'KeyName' => key_name, 'Monitoring.Enabled' => monitoring, 'Placement.AvailabilityZone' => availability_zone, 'RamdiskId' => ramdisk_id, 'SecurityGroup' => groups, 'SubnetId' => subnet_id, 'UserData' => user_data } options.delete_if {|key, value| value.nil?} # If subnet is defined we are working on a virtual private cloud. # subnet & security group cannot co-exist. I wish VPC just ignored # the security group parameter instead, it would be much easier! if subnet_id options.delete('SecurityGroup') else options.delete('SubnetId') end data = connection.run_instances(image_id, 1, 1, options) merge_attributes(data.body['instancesSet'].first) true end def setup(credentials = {}) requires :identity, :ip_address, :username require 'json' commands = [ %{mkdir .ssh}, %{passwd -l #{username}}, %{echo "#{attributes.to_json}" >> ~/attributes.json} ] if public_key commands << %{echo "#{public_key}" >> ~/.ssh/authorized_keys} end # allow some retries over the first 120 seconds because aws is weird Timeout::timeout(120) do begin Timeout::timeout(4) do Fog::SSH.new(ip_address, username, credentials).run(commands) end rescue Net::SSH::AuthenticationFailed, Timeout::Error retry end end rescue Errno::ECONNREFUSED => e sleep(1) retry end def ssh(commands) requires :identity, :public_ip_address, :username options = {} options[:key_data] = [private_key] if private_key Fog::SSH.new(public_ip_address, username, options).run(commands) end def scp(local_path, remote_path) requires :public_ip_address, :username options = {} options[:key_data] = [private_key] if private_key Fog::SCP.new(public_ip_address, username, options).upload(local_path, remote_path) end def start requires :id connection.start_instances(id) true end def stop requires :id connection.stop_instances(id) true end def username @username ||= 'root' end def volumes requires :id connection.volumes(:server => self) end #I tried to call it monitoring= and be smart with attributes[] #but in #save a merge_attribute is called after run_instance #thus making an un-necessary request. Use this until finding a clever solution def monitor=(new_monitor) if identity case new_monitor when true response = connection.monitor_instances(identity) when false response = connection.unmonitor_instances(identity) else raise ArgumentError.new("only Boolean allowed here") end end self.monitoring = new_monitor end end end end end