1
0
Fork 0
mirror of https://github.com/fog/fog.git synced 2022-11-09 13:51:43 -05:00
fog--fog/lib/fog/hp/compute_v2.rb
Paul Thornthwaite 2e0b7e545a Standardise empty lines throughout codebase
Done with `rubocop --auto-correct --only EmptyLineBetweenDefs,EmptyLines,EmptyLinesAroundBody`
2014-05-26 14:20:02 +01:00

306 lines
10 KiB
Ruby

require 'fog/hp/core'
module Fog
module Compute
class HPV2 < Fog::Service
requires :hp_secret_key, :hp_tenant_id, :hp_avl_zone
recognizes :hp_auth_uri, :credentials, :hp_service_type
recognizes :hp_use_upass_auth_style, :hp_auth_version, :user_agent
recognizes :persistent, :connection_options
recognizes :hp_access_key, :hp_account_id # :hp_account_id is deprecated use hp_access_key instead
secrets :hp_secret_key
model_path 'fog/hp/models/compute_v2'
model :address
collection :addresses
model :availability_zone
collection :availability_zones
model :flavor
collection :flavors
model :image
collection :images
model :key_pair
collection :key_pairs
model :meta
collection :metadata
model :server
collection :servers
model :volume_attachment
collection :volume_attachments
request_path 'fog/hp/requests/compute_v2'
request :add_security_group
request :allocate_address
request :associate_address
request :attach_volume
#request :confirm_resized_server
request :create_image
request :create_key_pair
request :create_server
request :create_persistent_server
request :delete_image
request :delete_key_pair
request :delete_meta
request :delete_server
request :detach_volume
request :disassociate_address
request :get_address
request :get_console_output
request :get_flavor_details
request :get_image_details
request :get_key_pair
request :get_meta
request :get_windows_password
request :get_server_details
request :get_server_volume_details
request :get_vnc_console
request :list_addresses
request :list_availability_zones
request :list_flavors
request :list_flavors_detail
request :list_images
request :list_images_detail
request :list_key_pairs
request :list_limits
request :list_metadata
request :list_server_addresses
request :list_server_addresses_by_network
request :list_server_volumes
request :list_servers
request :list_servers_detail
request :reboot_server
request :rebuild_server
request :release_address
request :remove_security_group
#request :resize_server
#request :revert_resized_server
request :server_action
request :set_metadata
request :update_meta
request :update_metadata
request :update_server
module Utils
# extract windows password from log
def extract_password_from_log(log_text)
encrypted_text = ""
section = []
return if log_text.nil?
log_text.each_line do |line|
case line
when /^-----BEGIN (\w+)/
section.push $1
next
when /^-----END (\w+)/
section.pop
next
end
case section
when ["BASE64"]
encrypted_text << line
end
end
# return the encrypted portion only
encrypted_text
end
def encrypt_using_public_key(text, public_key_data)
return if (text.nil? || public_key_data.nil?)
public_key = OpenSSL::PKey::RSA.new(public_key_data)
encrypted_text = public_key.public_encrypt(text).strip
Base64.encode64(encrypted_text)
end
def decrypt_using_private_key(encrypted_text, private_key_data)
return if (encrypted_text.nil? || private_key_data.nil?)
private_key = OpenSSL::PKey::RSA.new(private_key_data)
from_base64 = Base64.decode64(encrypted_text)
private_key.private_decrypt(from_base64).strip
end
end
class Mock
include Utils
def self.data
@data ||= Hash.new do |hash, key|
hash[key] = {
:last_modified => {
:images => {},
:key_pairs => {},
:servers => {},
:addresses => {},
:volume_attachments => {},
},
:images => {},
:key_pairs => {},
:servers => {},
:addresses => {},
:volume_attachments => {},
:limits => {
"absolute" => {
"maxImageMeta" => 50,
"maxPersonality" => 5,
"maxPersonalitySize" => 10240,
"maxSecurityGroupRules" => 20,
"maxSecurityGroups" => 10,
"maxTotalKeypairs" => 100,
"maxServerMeta" => 50,
"maxTotalInstances" => 20,
"maxTotalRAMSize" => 102400,
"maxTotalCores" => -1,
"maxTotalFloatingIps" => 10,
"totalRAMUsed" => 12288,
"totalInstancesUsed" => 3,
"totalFloatingIpsUsed" => 0,
"totalSecurityGroupsUsed" => 0,
"totalCoresUsed" => 8,
},
"rate" => [
{
"limit" => [
{
"next-available" => "2012-10-05T03 =>47 =>15Z",
"remaining" => 199,
"unit" => "MINUTE",
"value" => 200,
"verb" => "GET"
},
{
"next-available" => "2012-10-05T03 =>47 =>15Z",
"remaining" => 9,
"unit" => "MINUTE",
"value" => 10,
"verb" => "PUT"
},
{
"next-available" => "2012-10-05T03 =>47 =>15Z",
"remaining" => 9,
"unit" => "MINUTE",
"value" => 10,
"verb" => "POST"
},
{
"next-available" => "2012-10-05T03 =>47 =>15Z",
"remaining" => 99,
"unit" => "MINUTE",
"value" => 100,
"verb" => "DELETE"
}
],
"regex" => ".*",
"uri" => "*"
}
]
}
}
end
end
def self.reset
@data = nil
end
def initialize(options={})
# deprecate hp_account_id
if options[:hp_account_id]
Fog::Logger.deprecation(":hp_account_id is deprecated, please use :hp_access_key instead.")
@hp_access_key = options.delete(:hp_account_id)
end
@hp_access_key = options[:hp_access_key]
unless @hp_access_key
raise ArgumentError.new("Missing required arguments: hp_access_key. :hp_account_id is deprecated, please use :hp_access_key instead.")
end
end
def data
self.class.data[@hp_access_key]
end
def reset_data
self.class.data.delete(@hp_access_key)
end
end
class Real
include Utils
attr_reader :credentials
def initialize(options={})
# deprecate hp_account_id
if options[:hp_account_id]
Fog::Logger.deprecation(":hp_account_id is deprecated, please use :hp_access_key instead.")
options[:hp_access_key] = options.delete(:hp_account_id)
end
@hp_access_key = options[:hp_access_key]
unless @hp_access_key
raise ArgumentError.new("Missing required arguments: hp_access_key. :hp_account_id is deprecated, please use :hp_access_key instead.")
end
@hp_secret_key = options[:hp_secret_key]
@connection_options = options[:connection_options] || {}
### Set an option to use the style of authentication desired; :v1 or :v2 (default)
auth_version = options[:hp_auth_version] || :v2
### Pass the service name for compute via the options hash
options[:hp_service_type] ||= "Compute"
@hp_tenant_id = options[:hp_tenant_id]
### Make the authentication call
if (auth_version == :v2)
# Call the control services authentication
credentials = Fog::HP.authenticate_v2(options, @connection_options)
# the CS service catalog returns the cdn endpoint
@hp_compute_uri = credentials[:endpoint_url]
@credentials = credentials
else
# Call the legacy v1.0/v1.1 authentication
credentials = Fog::HP.authenticate_v1(options, @connection_options)
# the user sends in the cdn endpoint
@hp_compute_uri = options[:hp_auth_uri]
end
@auth_token = credentials[:auth_token]
uri = URI.parse(@hp_compute_uri)
@host = uri.host
@path = uri.path
@persistent = options[:persistent] || false
@port = uri.port
@scheme = uri.scheme
@connection = Fog::XML::Connection.new("#{@scheme}://#{@host}:#{@port}", @persistent, @connection_options)
end
def reload
@connection.reset
end
def request(params, parse_json = true, &block)
begin
response = @connection.request(params.merge!({
:headers => {
'Content-Type' => 'application/json',
'Accept' => 'application/json',
'X-Auth-Token' => @auth_token
}.merge!(params[:headers] || {}),
:path => "#{@path}/#{params[:path]}"
}), &block)
rescue Excon::Errors::HTTPStatusError => error
raise case error
when Excon::Errors::NotFound
Fog::Compute::HPV2::NotFound.slurp(error)
else
error
end
end
if !response.body.empty? && parse_json && response.headers['Content-Type'] =~ %r{application/json}
response.body = Fog::JSON.decode(response.body)
end
response
end
end
end
end
end