require 'fog/aws' module Fog module AWS class ELB < Fog::Service extend Fog::AWS::CredentialFetcher::ServiceMethods class DuplicatePolicyName < Fog::Errors::Error; end class IdentifierTaken < Fog::Errors::Error; end class InvalidInstance < Fog::Errors::Error; end class InvalidConfigurationRequest < Fog::Errors::Error; end class PolicyNotFound < Fog::Errors::Error; end class PolicyTypeNotFound < Fog::Errors::Error; end class Throttled < Fog::Errors::Error; end class TooManyPolicies < Fog::Errors::Error; end class ValidationError < Fog::Errors::Error; end requires :aws_access_key_id, :aws_secret_access_key recognizes :region, :host, :path, :port, :scheme, :persistent, :use_iam_profile, :aws_session_token, :aws_credentials_expire_at, :instrumentor, :instrumentor_name request_path 'fog/aws/requests/elb' request :configure_health_check request :create_app_cookie_stickiness_policy request :create_lb_cookie_stickiness_policy request :create_load_balancer request :create_load_balancer_listeners request :create_load_balancer_policy request :delete_load_balancer request :delete_load_balancer_listeners request :delete_load_balancer_policy request :deregister_instances_from_load_balancer request :describe_instance_health request :describe_load_balancers request :describe_load_balancer_policies request :describe_load_balancer_policy_types request :disable_availability_zones_for_load_balancer request :enable_availability_zones_for_load_balancer request :register_instances_with_load_balancer request :set_load_balancer_listener_ssl_certificate request :set_load_balancer_policies_of_listener request :attach_load_balancer_to_subnets request :detach_load_balancer_from_subnets request :apply_security_groups_to_load_balancer request :set_load_balancer_policies_for_backend_server model_path 'fog/aws/models/elb' model :load_balancer collection :load_balancers model :policy collection :policies model :listener collection :listeners model :backend_server_description collection :backend_server_descriptions class Mock require 'fog/aws/elb/policy_types' def self.data @data ||= Hash.new do |hash, region| owner_id = Fog::AWS::Mock.owner_id hash[region] = Hash.new do |region_hash, key| region_hash[key] = { :owner_id => owner_id, :load_balancers => {}, :policy_types => Fog::AWS::ELB::Mock::POLICY_TYPES } end end end def self.dns_name(name, region) "#{name}-#{Fog::Mock.random_hex(8)}.#{region}.elb.amazonaws.com" end def self.reset @data = nil end def initialize(options={}) @use_iam_profile = options[:use_iam_profile] setup_credentials(options) @region = options[:region] || 'us-east-1' unless ['ap-northeast-1', 'ap-southeast-1', 'ap-southeast-2', 'eu-west-1', 'us-east-1', 'us-west-1', 'us-west-2'].include?(@region) raise ArgumentError, "Unknown region: #{@region.inspect}" end end def setup_credentials(options) @aws_access_key_id = options[:aws_access_key_id] end def data self.class.data[@region][@aws_access_key_id] end def reset_data self.class.data[@region].delete(@aws_access_key_id) end end class Real include Fog::AWS::CredentialFetcher::ConnectionMethods # Initialize connection to ELB # # ==== Notes # options parameter must include values for :aws_access_key_id and # :aws_secret_access_key in order to create a connection # # ==== Examples # elb = ELB.new( # :aws_access_key_id => your_aws_access_key_id, # :aws_secret_access_key => your_aws_secret_access_key # ) # # ==== Parameters # * options<~Hash> - config arguments for connection. Defaults to {}. # * region<~String> - optional region to use. For instance, 'eu-west-1', 'us-east-1', etc. # # ==== Returns # * ELB object with connection to AWS. def initialize(options={}) require 'fog/core/parser' @use_iam_profile = options[:use_iam_profile] setup_credentials(options) @connection_options = options[:connection_options] || {} @instrumentor = options[:instrumentor] @instrumentor_name = options[:instrumentor_name] || 'fog.aws.elb' options[:region] ||= 'us-east-1' @host = options[:host] || "elasticloadbalancing.#{options[:region]}.amazonaws.com" @path = options[:path] || '/' @persistent = options[:persistent] || false @port = options[:port] || 443 @scheme = options[:scheme] || 'https' @connection = Fog::Connection.new("#{@scheme}://#{@host}:#{@port}#{@path}", @persistent, @connection_options) end def reload @connection.reset end private def setup_credentials(options={}) @aws_access_key_id = options[:aws_access_key_id] @aws_secret_access_key = options[:aws_secret_access_key] @aws_session_token = options[:aws_session_token] @aws_credentials_expire_at = options[:aws_credentials_expire_at] @hmac = Fog::HMAC.new('sha256', @aws_secret_access_key) end def request(params) refresh_credentials_if_expired idempotent = params.delete(:idempotent) parser = params.delete(:parser) body = Fog::AWS.signed_params( params, { :aws_access_key_id => @aws_access_key_id, :aws_session_token => @aws_session_token, :hmac => @hmac, :host => @host, :path => @path, :port => @port, :version => '2012-06-01' } ) if @instrumentor @instrumentor.instrument("#{@instrumentor_name}.request", params) do _request(body, idempotent, parser) end else _request(body, idempotent, parser) end end def _request(body, idempotent, parser) @connection.request({ :body => body, :expects => 200, :headers => { 'Content-Type' => 'application/x-www-form-urlencoded' }, :idempotent => idempotent, :method => 'POST', :parser => parser }) rescue Excon::Errors::HTTPStatusError => error match = Fog::AWS::Errors.match_error(error) raise if match.empty? raise case match[:code] when 'CertificateNotFound' Fog::AWS::IAM::NotFound.slurp(error, match[:message]) when 'DuplicateLoadBalancerName' Fog::AWS::ELB::IdentifierTaken.slurp(error, match[:message]) when 'DuplicatePolicyName' Fog::AWS::ELB::DuplicatePolicyName.slurp(error, match[:message]) when 'InvalidInstance' Fog::AWS::ELB::InvalidInstance.slurp(error, match[:message]) when 'InvalidConfigurationRequest' # when do they fucking use this shit? Fog::AWS::ELB::InvalidConfigurationRequest.slurp(error, match[:message]) when 'LoadBalancerNotFound' Fog::AWS::ELB::NotFound.slurp(error, match[:message]) when 'PolicyNotFound' Fog::AWS::ELB::PolicyNotFound.slurp(error, match[:message]) when 'PolicyTypeNotFound' Fog::AWS::ELB::PolicyTypeNotFound.slurp(error, match[:message]) when 'Throttling' Fog::AWS::ELB::Throttled.slurp(error, match[:message]) when 'TooManyPolicies' Fog::AWS::ELB::TooManyPolicies.slurp(error, match[:message]) when 'ValidationError' Fog::AWS::ELB::ValidationError.slurp(error, match[:message]) else Fog::AWS::ELB::Error.slurp(error, "#{match[:code]} => #{match[:message]}") end end end end end end