kakine 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +10 -0
- data/.travis.yml +5 -0
- data/Gemfile +4 -0
- data/README.md +83 -0
- data/Rakefile +9 -0
- data/bin/console +14 -0
- data/bin/setup +7 -0
- data/exe/kakine +7 -0
- data/kakine.gemspec +30 -0
- data/lib/kakine.rb +7 -0
- data/lib/kakine/adapter.rb +2 -0
- data/lib/kakine/adapter/mock.rb +34 -0
- data/lib/kakine/adapter/real.rb +34 -0
- data/lib/kakine/cli.rb +70 -0
- data/lib/kakine/resource.rb +77 -0
- data/lib/kakine/version.rb +3 -0
- metadata +161 -0
checksums.yaml
ADDED
@@ -0,0 +1,7 @@
|
|
1
|
+
---
|
2
|
+
SHA1:
|
3
|
+
metadata.gz: 4768538b225d648ebf64a3eb52c7a2841cb14334
|
4
|
+
data.tar.gz: 5361d5d1eb968a8d238910ff5995fb4ee3b53592
|
5
|
+
SHA512:
|
6
|
+
metadata.gz: 5b8b3bc37780557a3c8fe2edd9209aa3f7f36e5de23bd0135f68aff7b541401609e4f77f70c04a3d0a6c803c4403c9d323be2e6d04bd2ed83ca5a620f4573cec
|
7
|
+
data.tar.gz: 5f8b2b5c7389bd4faea0752ff304dada6e433255d5dee7d926c7ec15df4d8281edab36b65597245e36f1157324caa7743c487354aa5ef5d13b4485de3b39bb88
|
data/.gitignore
ADDED
data/.travis.yml
ADDED
data/Gemfile
ADDED
data/README.md
ADDED
@@ -0,0 +1,83 @@
|
|
1
|
+
# Kakine
|
2
|
+
|
3
|
+
[](https://travis-ci.org/hsbt/kaname)
|
4
|
+
|
5
|
+
Kakine(垣根) is configuration management tool of Security Group on OpenStack.
|
6
|
+
|
7
|
+
## Installation
|
8
|
+
|
9
|
+
Add this line to your application's Gemfile:
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
gem 'kakine'
|
13
|
+
```
|
14
|
+
|
15
|
+
And then execute:
|
16
|
+
|
17
|
+
$ bundle
|
18
|
+
|
19
|
+
Or install it yourself as:
|
20
|
+
|
21
|
+
$ gem install kakine
|
22
|
+
|
23
|
+
## Usage
|
24
|
+
|
25
|
+
You can define Security Group configuration for OpenStack via YAML format. Like following syntax.
|
26
|
+
|
27
|
+
```yaml
|
28
|
+
app:
|
29
|
+
- direction: ingress
|
30
|
+
protocol: tcp
|
31
|
+
port: 443
|
32
|
+
remote_ip: 0.0.0.0/0
|
33
|
+
- direction: ingress
|
34
|
+
protocol: tcp
|
35
|
+
port: 80
|
36
|
+
remote_ip: 0.0.0.0/0
|
37
|
+
rails:
|
38
|
+
- direction: ingress
|
39
|
+
protocol: tcp
|
40
|
+
port: 3000
|
41
|
+
remote_ip: 0.0.0.0/0
|
42
|
+
```
|
43
|
+
|
44
|
+
You need to put fog configuration to home directory.
|
45
|
+
|
46
|
+
```sh
|
47
|
+
% cat ~/.fog
|
48
|
+
default:
|
49
|
+
openstack_auth_url: "http://your-openstack-endpoint/v2.0/tokens"
|
50
|
+
openstack_username: "admin"
|
51
|
+
openstack_tenant: "admin"
|
52
|
+
openstack_api_key: "admin-no-password"
|
53
|
+
```
|
54
|
+
|
55
|
+
run following command.
|
56
|
+
|
57
|
+
```sh
|
58
|
+
$ kakine show tenant_name # show Security Group of tenant_name
|
59
|
+
$ kaname apply tenant_name --dryrun # You can see all of invoke commands(dryrun)
|
60
|
+
$ kaname apply tenant_name # apply configuration into OpenStack
|
61
|
+
```
|
62
|
+
|
63
|
+
You can create or change Security Group on targeting tenant.
|
64
|
+
|
65
|
+
If you need to initialize your Security Gruop, you can get it via following command:
|
66
|
+
|
67
|
+
```sh
|
68
|
+
$ kaname show tenant_name > tenant_name.yaml
|
69
|
+
```
|
70
|
+
|
71
|
+
## Development
|
72
|
+
|
73
|
+
After checking out the repo, run `bin/setup` to install dependencies. Then, run `bin/console` for an interactive prompt that will allow you to experiment.
|
74
|
+
|
75
|
+
To install this gem onto your local machine, run `bundle exec rake install`. To release a new version, update the version number in `version.rb`, and then run `bundle exec rake release` to create a git tag for the version, push git commits and tags, and push the `.gem` file to [rubygems.org](https://rubygems.org).
|
76
|
+
|
77
|
+
## Contributing
|
78
|
+
|
79
|
+
1. Fork it ( https://github.com/hsbt/kakine/fork )
|
80
|
+
2. Create your feature branch (`git checkout -b my-new-feature`)
|
81
|
+
3. Commit your changes (`git commit -am 'Add some feature'`)
|
82
|
+
4. Push to the branch (`git push origin my-new-feature`)
|
83
|
+
5. Create a new Pull Request
|
data/Rakefile
ADDED
data/bin/console
ADDED
@@ -0,0 +1,14 @@
|
|
1
|
+
#!/usr/bin/env ruby
|
2
|
+
|
3
|
+
require "bundler/setup"
|
4
|
+
require "kakine"
|
5
|
+
|
6
|
+
# You can add fixtures and/or initialization code here to make experimenting
|
7
|
+
# with your gem easier. You can also use a different console, if you like.
|
8
|
+
|
9
|
+
# (If you use this, don't forget to add pry to your Gemfile!)
|
10
|
+
# require "pry"
|
11
|
+
# Pry.start
|
12
|
+
|
13
|
+
require "irb"
|
14
|
+
IRB.start
|
data/bin/setup
ADDED
data/exe/kakine
ADDED
data/kakine.gemspec
ADDED
@@ -0,0 +1,30 @@
|
|
1
|
+
# coding: utf-8
|
2
|
+
lib = File.expand_path('../lib', __FILE__)
|
3
|
+
$LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
|
4
|
+
require 'kakine/version'
|
5
|
+
|
6
|
+
Gem::Specification.new do |spec|
|
7
|
+
spec.name = "kakine"
|
8
|
+
spec.version = Kakine::VERSION
|
9
|
+
spec.authors = ["SHIBATA Hiroshi"]
|
10
|
+
spec.email = ["hsbt@ruby-lang.org"]
|
11
|
+
|
12
|
+
spec.summary = %q{Security Group configuration tool for OpenStack.}
|
13
|
+
spec.description = %q{Security Group configuration tool for OpenStack. You can apply simple YAML definition into Security Group on OpenStack.}
|
14
|
+
spec.homepage = "https://github.com/hsbt/kakine"
|
15
|
+
spec.license = "MIT"
|
16
|
+
|
17
|
+
spec.files = `git ls-files -z`.split("\x0").reject { |f| f.match(%r{^(test|spec|features)/}) }
|
18
|
+
spec.bindir = "exe"
|
19
|
+
spec.executables = spec.files.grep(%r{^exe/}) { |f| File.basename(f) }
|
20
|
+
spec.require_paths = ["lib"]
|
21
|
+
|
22
|
+
spec.add_dependency 'fog'
|
23
|
+
spec.add_dependency 'thor'
|
24
|
+
spec.add_dependency 'hashdiff'
|
25
|
+
|
26
|
+
spec.add_development_dependency "bundler"
|
27
|
+
spec.add_development_dependency "rake"
|
28
|
+
spec.add_development_dependency "minitest"
|
29
|
+
spec.add_development_dependency "mocha"
|
30
|
+
end
|
data/lib/kakine.rb
ADDED
@@ -0,0 +1,34 @@
|
|
1
|
+
module Kakine
|
2
|
+
class Adapter
|
3
|
+
class Mock
|
4
|
+
def create_rule(security_group_id, direction, attributes)
|
5
|
+
attributes.delete("direction")
|
6
|
+
if attributes["port"]
|
7
|
+
attributes["port_range_max"] = attributes["port_range_min"] = attributes.delete("port")
|
8
|
+
end
|
9
|
+
if attributes["remote_ip"]
|
10
|
+
attributes["remote_ip_prefix"] = attributes.delete("remote_ip")
|
11
|
+
end
|
12
|
+
|
13
|
+
data = {}
|
14
|
+
attributes.each{|k,v| data[k.to_sym] = v}
|
15
|
+
puts "Create Rule: #{security_group_id} - #{direction}: #{attributes}"
|
16
|
+
end
|
17
|
+
|
18
|
+
def delete_rule(security_group_rule_id)
|
19
|
+
puts "Delete Rule: #{security_group_rule_id}"
|
20
|
+
end
|
21
|
+
|
22
|
+
def create_security_group(attributes)
|
23
|
+
data = {}
|
24
|
+
attributes.each{|k,v| data[k.to_sym] = v}
|
25
|
+
puts "Create Security Group: #{data}"
|
26
|
+
"[Mock] #{attributes[:name]} ID"
|
27
|
+
end
|
28
|
+
|
29
|
+
def delete_security_group(security_group_id)
|
30
|
+
puts "Delete Security Group: #{security_group_id}"
|
31
|
+
end
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
@@ -0,0 +1,34 @@
|
|
1
|
+
module Kakine
|
2
|
+
class Adapter
|
3
|
+
class Real
|
4
|
+
def create_rule(security_group_id, direction, attributes)
|
5
|
+
attributes.delete("direction")
|
6
|
+
if attributes["port"]
|
7
|
+
attributes["port_range_max"] = attributes["port_range_min"] = attributes.delete("port")
|
8
|
+
end
|
9
|
+
if attributes["remote_ip"]
|
10
|
+
attributes["remote_ip_prefix"] = attributes.delete("remote_ip")
|
11
|
+
end
|
12
|
+
|
13
|
+
data = {}
|
14
|
+
attributes.each{|k,v| data[k.to_sym] = v}
|
15
|
+
Fog::Network[:openstack].create_security_group_rule(security_group_id, direction, data)
|
16
|
+
end
|
17
|
+
|
18
|
+
def delete_rule(security_group_rule_id)
|
19
|
+
Fog::Network[:openstack].delete_security_group_rule(security_group_rule_id)
|
20
|
+
end
|
21
|
+
|
22
|
+
def create_security_group(attributes)
|
23
|
+
data = {}
|
24
|
+
attributes.each{|k,v| data[k.to_sym] = v}
|
25
|
+
response = Fog::Network[:openstack].create_security_group(data)
|
26
|
+
response.data[:body]["security_group"]["id"]
|
27
|
+
end
|
28
|
+
|
29
|
+
def delete_security_group(security_group_id)
|
30
|
+
Fog::Network[:openstack].delete_security_group(security_group_id)
|
31
|
+
end
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
data/lib/kakine/cli.rb
ADDED
@@ -0,0 +1,70 @@
|
|
1
|
+
require 'thor'
|
2
|
+
require 'fog'
|
3
|
+
require 'yaml'
|
4
|
+
require 'hashdiff'
|
5
|
+
|
6
|
+
module Kakine
|
7
|
+
class CLI < Thor
|
8
|
+
option :tenant, type: :string, aliases: '-t'
|
9
|
+
desc 'show', 'show Security Groups specified tenant'
|
10
|
+
def show
|
11
|
+
puts Kakine::Resource.security_groups_hash(options[:tenant]).to_yaml
|
12
|
+
end
|
13
|
+
|
14
|
+
option :tenant, type: :string, aliases: "-t"
|
15
|
+
option :dryrun, type: :boolean, aliases: "-d"
|
16
|
+
option :filename, type: :string, aliases: "-f"
|
17
|
+
desc 'apply', "apply local configuration into OpenStack"
|
18
|
+
def apply
|
19
|
+
adapter = if options[:dryrun]
|
20
|
+
Kakine::Adapter::Mock.new
|
21
|
+
else
|
22
|
+
Kakine::Adapter::Real.new
|
23
|
+
end
|
24
|
+
|
25
|
+
filename = options[:filename] ? options[:filename] : "#{options[:tenant]}.yaml"
|
26
|
+
diffs = HashDiff.diff(Kakine::Resource.security_groups_hash(options[:tenant]), Kakine::Resource.yaml(filename))
|
27
|
+
|
28
|
+
diffs.each do |diff|
|
29
|
+
sg_name, rule_modification = *diff[1].scan(/^([\w-]+)(\[\d\])?/)[0]
|
30
|
+
|
31
|
+
if rule_modification # foo[2]
|
32
|
+
security_group = Kakine::Resource.security_group(options[:tenant], sg_name)
|
33
|
+
if diff[2]["remote_group"]
|
34
|
+
remote_security_group = Kakine::Resource.security_group(options[:tenant], diff[2].delete("remote_group"))
|
35
|
+
diff[2]["remote_group_id"] = remote_security_group.id
|
36
|
+
end
|
37
|
+
case diff[0]
|
38
|
+
when "+"
|
39
|
+
diff[2].merge!({"ethertype" => "IPv4", "tenant_id" => Kakine::Resource.tenant(options[:tenant]).id})
|
40
|
+
adapter.create_rule(security_group.id, diff[2]["direction"], diff[2])
|
41
|
+
when "-"
|
42
|
+
security_group_rule = Kakine::Resource.security_group_rule(security_group, diff[2])
|
43
|
+
adapter.delete_rule(security_group_rule.id)
|
44
|
+
else
|
45
|
+
raise
|
46
|
+
end
|
47
|
+
else # foo
|
48
|
+
case diff[0]
|
49
|
+
when "+"
|
50
|
+
attributes = {name: sg_name, description: "", tenant_id: Kakine::Resource.tenant(options[:tenant]).id}
|
51
|
+
security_group_id = adapter.create_security_group(attributes)
|
52
|
+
diff[2].each do |rule|
|
53
|
+
rule.merge!({"ethertype" => "IPv4", "tenant_id" => Kakine::Resource.tenant(options[:tenant]).id})
|
54
|
+
if rule["remote_group"]
|
55
|
+
remote_security_group = Kakine::Resource.security_group(options[:tenant], rule.delete("remote_group"))
|
56
|
+
rule["remote_group_id"] = remote_security_group.id
|
57
|
+
end
|
58
|
+
adapter.create_rule(security_group_id, rule["direction"], rule)
|
59
|
+
end if diff[2]
|
60
|
+
when "-"
|
61
|
+
security_group = Kakine::Resource.security_group(options[:tenant], sg_name)
|
62
|
+
adapter.delete_security_group(security_group.id)
|
63
|
+
else
|
64
|
+
raise
|
65
|
+
end
|
66
|
+
end
|
67
|
+
end
|
68
|
+
end
|
69
|
+
end
|
70
|
+
end
|
@@ -0,0 +1,77 @@
|
|
1
|
+
module Kakine
|
2
|
+
class Resource
|
3
|
+
class << self
|
4
|
+
def yaml(filename)
|
5
|
+
YAML.load_file(filename).to_hash
|
6
|
+
end
|
7
|
+
|
8
|
+
def tenant(tenant_name)
|
9
|
+
tenants = Fog::Identity[:openstack].tenants
|
10
|
+
tenants.detect{|t| t.name == tenant_name}
|
11
|
+
end
|
12
|
+
|
13
|
+
def security_group(tenant_name, security_group_name)
|
14
|
+
security_groups_on_tenant(tenant_name).detect{|sg| sg.name == security_group_name}
|
15
|
+
end
|
16
|
+
|
17
|
+
def security_group_rule(security_group, attributes)
|
18
|
+
security_group.security_group_rules.detect do |sg|
|
19
|
+
if attributes["port"]
|
20
|
+
attributes["port_range_max"] = attributes["port_range_min"] = attributes["port"]
|
21
|
+
end
|
22
|
+
|
23
|
+
sg.direction == attributes["direction"] &&
|
24
|
+
sg.protocol == attributes["protocol"] &&
|
25
|
+
sg.port_range_max == attributes["port_range_max"] &&
|
26
|
+
sg.port_range_min == attributes["port_range_min"] &&
|
27
|
+
sg.remote_ip_prefix == attributes["remote_ip"] &&
|
28
|
+
sg.remote_group_id == attributes["remote_group_id"]
|
29
|
+
end
|
30
|
+
end
|
31
|
+
|
32
|
+
def security_groups_on_tenant(tenant_name)
|
33
|
+
security_groups = Fog::Network[:openstack].security_groups
|
34
|
+
security_groups.select{|sg| sg.tenant_id == tenant(tenant_name).id}
|
35
|
+
end
|
36
|
+
|
37
|
+
def security_groups_hash(tenant_name)
|
38
|
+
sg_hash = {}
|
39
|
+
|
40
|
+
security_groups_on_tenant(tenant_name).each do |sg|
|
41
|
+
sg_hash[sg.name] = format_security_group(sg)
|
42
|
+
end
|
43
|
+
|
44
|
+
sg_hash
|
45
|
+
end
|
46
|
+
|
47
|
+
def format_security_group(security_group)
|
48
|
+
rules = []
|
49
|
+
|
50
|
+
security_group.security_group_rules.each do |rule|
|
51
|
+
rule_hash = {}
|
52
|
+
|
53
|
+
rule_hash["direction"] = rule.direction
|
54
|
+
rule_hash["protocol"] = rule.protocol
|
55
|
+
|
56
|
+
if rule.port_range_max == rule.port_range_min
|
57
|
+
rule_hash["port"] = rule.port_range_max
|
58
|
+
else
|
59
|
+
rule_hash["port_range_max"] = rule.port_range_max
|
60
|
+
rule_hash["port_range_min"] = rule.port_range_min
|
61
|
+
end
|
62
|
+
|
63
|
+
if rule.remote_group_id
|
64
|
+
response = Fog::Network[:openstack].get_security_group(rule.remote_group_id)
|
65
|
+
rule_hash["remote_group"] = response.data[:body]["security_group"]["name"]
|
66
|
+
else
|
67
|
+
rule_hash["remote_ip"] = rule.remote_ip_prefix
|
68
|
+
end
|
69
|
+
|
70
|
+
rules << rule_hash
|
71
|
+
end
|
72
|
+
|
73
|
+
rules
|
74
|
+
end
|
75
|
+
end
|
76
|
+
end
|
77
|
+
end
|
metadata
ADDED
@@ -0,0 +1,161 @@
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
2
|
+
name: kakine
|
3
|
+
version: !ruby/object:Gem::Version
|
4
|
+
version: 0.1.0
|
5
|
+
platform: ruby
|
6
|
+
authors:
|
7
|
+
- SHIBATA Hiroshi
|
8
|
+
autorequire:
|
9
|
+
bindir: exe
|
10
|
+
cert_chain: []
|
11
|
+
date: 2015-04-27 00:00:00.000000000 Z
|
12
|
+
dependencies:
|
13
|
+
- !ruby/object:Gem::Dependency
|
14
|
+
name: fog
|
15
|
+
requirement: !ruby/object:Gem::Requirement
|
16
|
+
requirements:
|
17
|
+
- - ">="
|
18
|
+
- !ruby/object:Gem::Version
|
19
|
+
version: '0'
|
20
|
+
type: :runtime
|
21
|
+
prerelease: false
|
22
|
+
version_requirements: !ruby/object:Gem::Requirement
|
23
|
+
requirements:
|
24
|
+
- - ">="
|
25
|
+
- !ruby/object:Gem::Version
|
26
|
+
version: '0'
|
27
|
+
- !ruby/object:Gem::Dependency
|
28
|
+
name: thor
|
29
|
+
requirement: !ruby/object:Gem::Requirement
|
30
|
+
requirements:
|
31
|
+
- - ">="
|
32
|
+
- !ruby/object:Gem::Version
|
33
|
+
version: '0'
|
34
|
+
type: :runtime
|
35
|
+
prerelease: false
|
36
|
+
version_requirements: !ruby/object:Gem::Requirement
|
37
|
+
requirements:
|
38
|
+
- - ">="
|
39
|
+
- !ruby/object:Gem::Version
|
40
|
+
version: '0'
|
41
|
+
- !ruby/object:Gem::Dependency
|
42
|
+
name: hashdiff
|
43
|
+
requirement: !ruby/object:Gem::Requirement
|
44
|
+
requirements:
|
45
|
+
- - ">="
|
46
|
+
- !ruby/object:Gem::Version
|
47
|
+
version: '0'
|
48
|
+
type: :runtime
|
49
|
+
prerelease: false
|
50
|
+
version_requirements: !ruby/object:Gem::Requirement
|
51
|
+
requirements:
|
52
|
+
- - ">="
|
53
|
+
- !ruby/object:Gem::Version
|
54
|
+
version: '0'
|
55
|
+
- !ruby/object:Gem::Dependency
|
56
|
+
name: bundler
|
57
|
+
requirement: !ruby/object:Gem::Requirement
|
58
|
+
requirements:
|
59
|
+
- - ">="
|
60
|
+
- !ruby/object:Gem::Version
|
61
|
+
version: '0'
|
62
|
+
type: :development
|
63
|
+
prerelease: false
|
64
|
+
version_requirements: !ruby/object:Gem::Requirement
|
65
|
+
requirements:
|
66
|
+
- - ">="
|
67
|
+
- !ruby/object:Gem::Version
|
68
|
+
version: '0'
|
69
|
+
- !ruby/object:Gem::Dependency
|
70
|
+
name: rake
|
71
|
+
requirement: !ruby/object:Gem::Requirement
|
72
|
+
requirements:
|
73
|
+
- - ">="
|
74
|
+
- !ruby/object:Gem::Version
|
75
|
+
version: '0'
|
76
|
+
type: :development
|
77
|
+
prerelease: false
|
78
|
+
version_requirements: !ruby/object:Gem::Requirement
|
79
|
+
requirements:
|
80
|
+
- - ">="
|
81
|
+
- !ruby/object:Gem::Version
|
82
|
+
version: '0'
|
83
|
+
- !ruby/object:Gem::Dependency
|
84
|
+
name: minitest
|
85
|
+
requirement: !ruby/object:Gem::Requirement
|
86
|
+
requirements:
|
87
|
+
- - ">="
|
88
|
+
- !ruby/object:Gem::Version
|
89
|
+
version: '0'
|
90
|
+
type: :development
|
91
|
+
prerelease: false
|
92
|
+
version_requirements: !ruby/object:Gem::Requirement
|
93
|
+
requirements:
|
94
|
+
- - ">="
|
95
|
+
- !ruby/object:Gem::Version
|
96
|
+
version: '0'
|
97
|
+
- !ruby/object:Gem::Dependency
|
98
|
+
name: mocha
|
99
|
+
requirement: !ruby/object:Gem::Requirement
|
100
|
+
requirements:
|
101
|
+
- - ">="
|
102
|
+
- !ruby/object:Gem::Version
|
103
|
+
version: '0'
|
104
|
+
type: :development
|
105
|
+
prerelease: false
|
106
|
+
version_requirements: !ruby/object:Gem::Requirement
|
107
|
+
requirements:
|
108
|
+
- - ">="
|
109
|
+
- !ruby/object:Gem::Version
|
110
|
+
version: '0'
|
111
|
+
description: Security Group configuration tool for OpenStack. You can apply simple
|
112
|
+
YAML definition into Security Group on OpenStack.
|
113
|
+
email:
|
114
|
+
- hsbt@ruby-lang.org
|
115
|
+
executables:
|
116
|
+
- kakine
|
117
|
+
extensions: []
|
118
|
+
extra_rdoc_files: []
|
119
|
+
files:
|
120
|
+
- ".gitignore"
|
121
|
+
- ".travis.yml"
|
122
|
+
- Gemfile
|
123
|
+
- README.md
|
124
|
+
- Rakefile
|
125
|
+
- bin/console
|
126
|
+
- bin/setup
|
127
|
+
- exe/kakine
|
128
|
+
- kakine.gemspec
|
129
|
+
- lib/kakine.rb
|
130
|
+
- lib/kakine/adapter.rb
|
131
|
+
- lib/kakine/adapter/mock.rb
|
132
|
+
- lib/kakine/adapter/real.rb
|
133
|
+
- lib/kakine/cli.rb
|
134
|
+
- lib/kakine/resource.rb
|
135
|
+
- lib/kakine/version.rb
|
136
|
+
homepage: https://github.com/hsbt/kakine
|
137
|
+
licenses:
|
138
|
+
- MIT
|
139
|
+
metadata: {}
|
140
|
+
post_install_message:
|
141
|
+
rdoc_options: []
|
142
|
+
require_paths:
|
143
|
+
- lib
|
144
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
145
|
+
requirements:
|
146
|
+
- - ">="
|
147
|
+
- !ruby/object:Gem::Version
|
148
|
+
version: '0'
|
149
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
150
|
+
requirements:
|
151
|
+
- - ">="
|
152
|
+
- !ruby/object:Gem::Version
|
153
|
+
version: '0'
|
154
|
+
requirements: []
|
155
|
+
rubyforge_project:
|
156
|
+
rubygems_version: 2.4.6
|
157
|
+
signing_key:
|
158
|
+
specification_version: 4
|
159
|
+
summary: Security Group configuration tool for OpenStack.
|
160
|
+
test_files: []
|
161
|
+
has_rdoc:
|