mirror of
https://github.com/fog/fog.git
synced 2022-11-09 13:51:43 -05:00
229 lines
8.4 KiB
Ruby
229 lines
8.4 KiB
Ruby
require 'fog/aws'
|
|
|
|
module Fog
|
|
module AWS
|
|
class ELB < Fog::Service
|
|
extend Fog::AWS::CredentialFetcher::ServiceMethods
|
|
|
|
class DuplicatePolicyName < Fog::Errors::Error; end
|
|
class IdentifierTaken < Fog::Errors::Error; end
|
|
class InvalidInstance < Fog::Errors::Error; end
|
|
class InvalidConfigurationRequest < Fog::Errors::Error; end
|
|
class PolicyNotFound < Fog::Errors::Error; end
|
|
class PolicyTypeNotFound < Fog::Errors::Error; end
|
|
class Throttled < Fog::Errors::Error; end
|
|
class TooManyPolicies < Fog::Errors::Error; end
|
|
class ValidationError < Fog::Errors::Error; end
|
|
|
|
requires :aws_access_key_id, :aws_secret_access_key
|
|
recognizes :region, :host, :path, :port, :scheme, :persistent, :use_iam_profile, :aws_session_token, :aws_credentials_expire_at, :instrumentor, :instrumentor_name
|
|
|
|
request_path 'fog/aws/requests/elb'
|
|
request :configure_health_check
|
|
request :create_app_cookie_stickiness_policy
|
|
request :create_lb_cookie_stickiness_policy
|
|
request :create_load_balancer
|
|
request :create_load_balancer_listeners
|
|
request :create_load_balancer_policy
|
|
request :delete_load_balancer
|
|
request :delete_load_balancer_listeners
|
|
request :delete_load_balancer_policy
|
|
request :deregister_instances_from_load_balancer
|
|
request :describe_instance_health
|
|
request :describe_load_balancers
|
|
request :describe_load_balancer_policies
|
|
request :describe_load_balancer_policy_types
|
|
request :disable_availability_zones_for_load_balancer
|
|
request :enable_availability_zones_for_load_balancer
|
|
request :register_instances_with_load_balancer
|
|
request :set_load_balancer_listener_ssl_certificate
|
|
request :set_load_balancer_policies_of_listener
|
|
request :attach_load_balancer_to_subnets
|
|
request :detach_load_balancer_from_subnets
|
|
request :apply_security_groups_to_load_balancer
|
|
|
|
model_path 'fog/aws/models/elb'
|
|
model :load_balancer
|
|
collection :load_balancers
|
|
model :policy
|
|
collection :policies
|
|
model :listener
|
|
collection :listeners
|
|
|
|
class Mock
|
|
|
|
require 'fog/aws/elb/policy_types'
|
|
|
|
def self.data
|
|
@data ||= Hash.new do |hash, region|
|
|
owner_id = Fog::AWS::Mock.owner_id
|
|
hash[region] = Hash.new do |region_hash, key|
|
|
region_hash[key] = {
|
|
:owner_id => owner_id,
|
|
:load_balancers => {},
|
|
:policy_types => Fog::AWS::ELB::Mock::POLICY_TYPES
|
|
}
|
|
end
|
|
end
|
|
end
|
|
|
|
def self.dns_name(name, region)
|
|
"#{name}-#{Fog::Mock.random_hex(8)}.#{region}.elb.amazonaws.com"
|
|
end
|
|
|
|
def self.reset
|
|
@data = nil
|
|
end
|
|
|
|
def initialize(options={})
|
|
@use_iam_profile = options[:use_iam_profile]
|
|
setup_credentials(options)
|
|
|
|
@region = options[:region] || 'us-east-1'
|
|
|
|
unless ['ap-northeast-1', 'ap-southeast-1', 'ap-southeast-2', 'eu-west-1', 'us-east-1', 'us-west-1', 'us-west-2'].include?(@region)
|
|
raise ArgumentError, "Unknown region: #{@region.inspect}"
|
|
end
|
|
end
|
|
|
|
def setup_credentials(options)
|
|
@aws_access_key_id = options[:aws_access_key_id]
|
|
end
|
|
|
|
def data
|
|
self.class.data[@region][@aws_access_key_id]
|
|
end
|
|
|
|
def reset_data
|
|
self.class.data[@region].delete(@aws_access_key_id)
|
|
end
|
|
end
|
|
|
|
class Real
|
|
include Fog::AWS::CredentialFetcher::ConnectionMethods
|
|
# Initialize connection to ELB
|
|
#
|
|
# ==== Notes
|
|
# options parameter must include values for :aws_access_key_id and
|
|
# :aws_secret_access_key in order to create a connection
|
|
#
|
|
# ==== Examples
|
|
# elb = ELB.new(
|
|
# :aws_access_key_id => your_aws_access_key_id,
|
|
# :aws_secret_access_key => your_aws_secret_access_key
|
|
# )
|
|
#
|
|
# ==== Parameters
|
|
# * options<~Hash> - config arguments for connection. Defaults to {}.
|
|
# * region<~String> - optional region to use. For instance, 'eu-west-1', 'us-east-1', etc.
|
|
#
|
|
# ==== Returns
|
|
# * ELB object with connection to AWS.
|
|
def initialize(options={})
|
|
require 'fog/core/parser'
|
|
|
|
@use_iam_profile = options[:use_iam_profile]
|
|
setup_credentials(options)
|
|
@connection_options = options[:connection_options] || {}
|
|
@instrumentor = options[:instrumentor]
|
|
@instrumentor_name = options[:instrumentor_name] || 'fog.aws.elb'
|
|
|
|
options[:region] ||= 'us-east-1'
|
|
@host = options[:host] || "elasticloadbalancing.#{options[:region]}.amazonaws.com"
|
|
@path = options[:path] || '/'
|
|
@persistent = options[:persistent] || false
|
|
@port = options[:port] || 443
|
|
@scheme = options[:scheme] || 'https'
|
|
@connection = Fog::Connection.new("#{@scheme}://#{@host}:#{@port}#{@path}", @persistent, @connection_options)
|
|
end
|
|
|
|
def reload
|
|
@connection.reset
|
|
end
|
|
|
|
private
|
|
|
|
def setup_credentials(options={})
|
|
@aws_access_key_id = options[:aws_access_key_id]
|
|
@aws_secret_access_key = options[:aws_secret_access_key]
|
|
@aws_session_token = options[:aws_session_token]
|
|
@aws_credentials_expire_at = options[:aws_credentials_expire_at]
|
|
|
|
@hmac = Fog::HMAC.new('sha256', @aws_secret_access_key)
|
|
end
|
|
|
|
def request(params)
|
|
refresh_credentials_if_expired
|
|
|
|
idempotent = params.delete(:idempotent)
|
|
parser = params.delete(:parser)
|
|
|
|
body = Fog::AWS.signed_params(
|
|
params,
|
|
{
|
|
:aws_access_key_id => @aws_access_key_id,
|
|
:aws_session_token => @aws_session_token,
|
|
:hmac => @hmac,
|
|
:host => @host,
|
|
:path => @path,
|
|
:port => @port,
|
|
:version => '2012-06-01'
|
|
}
|
|
)
|
|
|
|
if @instrumentor
|
|
@instrumentor.instrument("#{@instrumentor_name}.request", params) do
|
|
_request(body, idempotent, parser)
|
|
end
|
|
else
|
|
_request(body, idempotent, parser)
|
|
end
|
|
end
|
|
|
|
def _request(body, idempotent, parser)
|
|
@connection.request({
|
|
:body => body,
|
|
:expects => 200,
|
|
:headers => { 'Content-Type' => 'application/x-www-form-urlencoded' },
|
|
:idempotent => idempotent,
|
|
:host => @host,
|
|
:method => 'POST',
|
|
:parser => parser
|
|
})
|
|
rescue Excon::Errors::HTTPStatusError => error
|
|
if match = error.message.match(/(?:.*<Code>(.*)<\/Code>)(?:.*<Message>(.*)<\/Message>)/m)
|
|
case match[1]
|
|
when 'CertificateNotFound'
|
|
raise Fog::AWS::IAM::NotFound.slurp(error, match[2])
|
|
when 'DuplicateLoadBalancerName'
|
|
raise Fog::AWS::ELB::IdentifierTaken.slurp(error, match[2])
|
|
when 'DuplicatePolicyName'
|
|
raise Fog::AWS::ELB::DuplicatePolicyName.slurp(error, match[2])
|
|
when 'InvalidInstance'
|
|
raise Fog::AWS::ELB::InvalidInstance.slurp(error, match[2])
|
|
when 'InvalidConfigurationRequest'
|
|
# when do they fucking use this shit?
|
|
raise Fog::AWS::ELB::InvalidConfigurationRequest.slurp(error, match[2])
|
|
when 'LoadBalancerNotFound'
|
|
raise Fog::AWS::ELB::NotFound.slurp(error, match[2])
|
|
when 'PolicyNotFound'
|
|
raise Fog::AWS::ELB::PolicyNotFound.slurp(error, match[2])
|
|
when 'PolicyTypeNotFound'
|
|
raise Fog::AWS::ELB::PolicyTypeNotFound.slurp(error, match[2])
|
|
when 'Throttling'
|
|
raise Fog::AWS::ELB::Throttled.slurp(error, match[2])
|
|
when 'TooManyPolicies'
|
|
raise Fog::AWS::ELB::TooManyPolicies.slurp(error, match[2])
|
|
when 'ValidationError'
|
|
raise Fog::AWS::ELB::ValidationError.slurp(error, match[2])
|
|
else
|
|
raise
|
|
end
|
|
else
|
|
raise
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|
|
end
|