knife-cloudstack-fog 0.3.3 → 0.3.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/lib/chef/knife/cloudstack_base.rb +101 -101
- data/lib/chef/knife/cloudstack_diskoffering_list.rb +57 -57
- data/lib/chef/knife/cloudstack_keypair_create.rb +102 -102
- data/lib/chef/knife/cloudstack_keypair_delete.rb +49 -49
- data/lib/chef/knife/cloudstack_keypair_list.rb +53 -53
- data/lib/chef/knife/cloudstack_network_create.rb +147 -147
- data/lib/chef/knife/cloudstack_network_delete.rb +53 -53
- data/lib/chef/knife/cloudstack_network_list.rb +67 -67
- data/lib/chef/knife/cloudstack_networkoffering_list.rb +74 -74
- data/lib/chef/knife/cloudstack_publicip_create.rb +90 -90
- data/lib/chef/knife/cloudstack_publicip_list.rb +57 -57
- data/lib/chef/knife/cloudstack_securitygroup_list.rb +124 -124
- data/lib/chef/knife/cloudstack_server_create.rb +320 -320
- data/lib/chef/knife/cloudstack_server_delete.rb +53 -53
- data/lib/chef/knife/cloudstack_server_destroy.rb +53 -53
- data/lib/chef/knife/cloudstack_server_list.rb +135 -135
- data/lib/chef/knife/cloudstack_server_start.rb +69 -69
- data/lib/chef/knife/cloudstack_server_stop.rb +72 -72
- data/lib/chef/knife/cloudstack_serviceoffering_list.rb +61 -61
- data/lib/chef/knife/cloudstack_template_list.rb +127 -127
- data/lib/chef/knife/cloudstack_volumes_list.rb +78 -78
- data/lib/chef/knife/cloudstack_zone_list.rb +63 -63
- data/lib/knife-cloudstack-fog/version.rb +1 -1
- metadata +2 -2
@@ -1,57 +1,57 @@
|
|
1
|
-
# Author:: Takashi Kanai (<anikundesu@gmail.com>)
|
2
|
-
# Copyright:: Copyright (c) 2012 IDC Frontier Inc.
|
3
|
-
# License:: Apache License, Version 2.0
|
4
|
-
#
|
5
|
-
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
-
# you may not use this file except in compliance with the License.
|
7
|
-
# You may obtain a copy of the License at
|
8
|
-
#
|
9
|
-
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
-
#
|
11
|
-
# Unless required by applicable law or agreed to in writing, software
|
12
|
-
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
-
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
-
# See the License for the specific language governing permissions and
|
15
|
-
# limitations under the License.
|
16
|
-
#
|
17
|
-
|
18
|
-
|
19
|
-
require 'chef/knife/cloudstack_base'
|
20
|
-
|
21
|
-
class Chef
|
22
|
-
class Knife
|
23
|
-
class CloudstackPublicipList < Knife
|
24
|
-
|
25
|
-
include Knife::CloudstackBase
|
26
|
-
|
27
|
-
banner "knife cloudstack publicip list"
|
28
|
-
|
29
|
-
def run
|
30
|
-
$stdout.sync = true
|
31
|
-
|
32
|
-
validate!
|
33
|
-
|
34
|
-
publicip_list = [
|
35
|
-
ui.color('ID', :bold),
|
36
|
-
ui.color('ipaddress', :bold),
|
37
|
-
ui.color('isSourceNAT', :bold),
|
38
|
-
ui.color('isStaticNAT', :bold),
|
39
|
-
ui.color('VirtualMachineDisplayName', :bold)
|
40
|
-
]
|
41
|
-
response = connection.list_public_ip_addresses['listpublicipaddressesresponse']
|
42
|
-
if publicips = response['publicipaddress']
|
43
|
-
publicips.each do |publicip|
|
44
|
-
publicip_list << publicip['id'].to_s
|
45
|
-
publicip_list << publicip['ipaddress'].to_s
|
46
|
-
publicip_list << publicip['issourcenat'].to_s
|
47
|
-
publicip_list << publicip['isstaticnat'].to_s
|
48
|
-
publicip_list << publicip['virtualmachinedisplayname'].to_s
|
49
|
-
end
|
50
|
-
end
|
51
|
-
puts ui.list(publicip_list, :columns_across, 5)
|
52
|
-
|
53
|
-
end
|
54
|
-
|
55
|
-
end
|
56
|
-
end
|
57
|
-
end
|
1
|
+
# Author:: Takashi Kanai (<anikundesu@gmail.com>)
|
2
|
+
# Copyright:: Copyright (c) 2012 IDC Frontier Inc.
|
3
|
+
# License:: Apache License, Version 2.0
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
#
|
17
|
+
|
18
|
+
|
19
|
+
require 'chef/knife/cloudstack_base'
|
20
|
+
|
21
|
+
class Chef
|
22
|
+
class Knife
|
23
|
+
class CloudstackPublicipList < Knife
|
24
|
+
|
25
|
+
include Knife::CloudstackBase
|
26
|
+
|
27
|
+
banner "knife cloudstack publicip list"
|
28
|
+
|
29
|
+
def run
|
30
|
+
$stdout.sync = true
|
31
|
+
|
32
|
+
validate!
|
33
|
+
|
34
|
+
publicip_list = [
|
35
|
+
ui.color('ID', :bold),
|
36
|
+
ui.color('ipaddress', :bold),
|
37
|
+
ui.color('isSourceNAT', :bold),
|
38
|
+
ui.color('isStaticNAT', :bold),
|
39
|
+
ui.color('VirtualMachineDisplayName', :bold)
|
40
|
+
]
|
41
|
+
response = connection.list_public_ip_addresses['listpublicipaddressesresponse']
|
42
|
+
if publicips = response['publicipaddress']
|
43
|
+
publicips.each do |publicip|
|
44
|
+
publicip_list << publicip['id'].to_s
|
45
|
+
publicip_list << publicip['ipaddress'].to_s
|
46
|
+
publicip_list << publicip['issourcenat'].to_s
|
47
|
+
publicip_list << publicip['isstaticnat'].to_s
|
48
|
+
publicip_list << publicip['virtualmachinedisplayname'].to_s
|
49
|
+
end
|
50
|
+
end
|
51
|
+
puts ui.list(publicip_list, :columns_across, 5)
|
52
|
+
|
53
|
+
end
|
54
|
+
|
55
|
+
end
|
56
|
+
end
|
57
|
+
end
|
@@ -1,124 +1,124 @@
|
|
1
|
-
# Author:: Jeff Moody (<jmoody@datapipe.com>)
|
2
|
-
# Copyright:: Copyright (c) 2012 Datapipe
|
3
|
-
# License:: Apache License, Version 2.0
|
4
|
-
#
|
5
|
-
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
-
# you may not use this file except in compliance with the License.
|
7
|
-
# You may obtain a copy of the License at
|
8
|
-
#
|
9
|
-
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
-
#
|
11
|
-
# Unless required by applicable law or agreed to in writing, software
|
12
|
-
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
-
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
-
# See the License for the specific language governing permissions and
|
15
|
-
# limitations under the License.
|
16
|
-
#
|
17
|
-
|
18
|
-
|
19
|
-
require 'chef/knife/cloudstack_base'
|
20
|
-
|
21
|
-
class Chef
|
22
|
-
class Knife
|
23
|
-
class CloudstackSecuritygroupList < Knife
|
24
|
-
|
25
|
-
include Knife::CloudstackBase
|
26
|
-
|
27
|
-
banner "knife cloudstack securitygroup list (options)"
|
28
|
-
option :groupid,
|
29
|
-
:short => "-g GROUPID",
|
30
|
-
:long => "--groupid GROUPID",
|
31
|
-
:description => "List the rules contained within a Security Group, specified by ID",
|
32
|
-
:default => 'none'
|
33
|
-
option :groupname,
|
34
|
-
:short => "-G GROUPNAME",
|
35
|
-
:long => "--groupname GROUPNAME",
|
36
|
-
:description => "List the rules contained within a Security Group, specified by name.",
|
37
|
-
:default => 'none'
|
38
|
-
|
39
|
-
def sg_details_list(securitygroup_list, securitygroup_details, groups, options={})
|
40
|
-
temp = groups
|
41
|
-
if groupid = options[:groupid]
|
42
|
-
temp.reject!{|g| g['id'] != groupid.to_i}
|
43
|
-
end
|
44
|
-
if groupname = options[:groupname]
|
45
|
-
temp.reject!{|g| g['name'] != groupname}
|
46
|
-
end
|
47
|
-
|
48
|
-
temp.each do |securitygroup|
|
49
|
-
securitygroup_list << securitygroup['id'].to_s
|
50
|
-
securitygroup_list << securitygroup['name'].to_s
|
51
|
-
securitygroup_list << securitygroup['description'].to_s
|
52
|
-
if securitygroup['ingressrule'].nil?
|
53
|
-
securitygroup_details << ' '
|
54
|
-
else
|
55
|
-
securitygroup['ingressrule'].each do |ingressrule|
|
56
|
-
rule_details = []
|
57
|
-
securitygroup_details << ingressrule['protocol'].to_s
|
58
|
-
securitygroup_details << ingressrule['startport'].to_s
|
59
|
-
securitygroup_details << ingressrule['endport'].to_s
|
60
|
-
if ingressrule['cidr'].nil?
|
61
|
-
rule_details << ingressrule['securitygroupname'].to_s
|
62
|
-
rule_details << ingressrule['account'].to_s
|
63
|
-
else
|
64
|
-
rule_details << ingressrule['cidr'].to_s
|
65
|
-
end
|
66
|
-
securitygroup_details << rule_details.join(", ")
|
67
|
-
end
|
68
|
-
end
|
69
|
-
end
|
70
|
-
end
|
71
|
-
|
72
|
-
def run
|
73
|
-
$stdout.sync = true
|
74
|
-
|
75
|
-
validate!
|
76
|
-
groupid = locate_config_value(:groupid)
|
77
|
-
groupname = locate_config_value(:groupname)
|
78
|
-
|
79
|
-
if (groupid == 'none' and groupname == 'none')
|
80
|
-
securitygroup_list = [
|
81
|
-
ui.color('ID', :bold),
|
82
|
-
ui.color('Name', :bold),
|
83
|
-
ui.color('Description', :bold)
|
84
|
-
]
|
85
|
-
response = connection.list_security_groups['listsecuritygroupsresponse']
|
86
|
-
if securitygroups = response['securitygroup']
|
87
|
-
securitygroups.each do |securitygroup|
|
88
|
-
securitygroup_list << securitygroup['id'].to_s
|
89
|
-
securitygroup_list << securitygroup['name'].to_s
|
90
|
-
securitygroup_list << securitygroup['description'].to_s
|
91
|
-
end
|
92
|
-
end
|
93
|
-
puts ui.list(securitygroup_list, :columns_across, 3)
|
94
|
-
else
|
95
|
-
securitygroup_details = [
|
96
|
-
ui.color('Protocol', :bold),
|
97
|
-
ui.color('Start Port', :bold),
|
98
|
-
ui.color('End Port', :bold),
|
99
|
-
ui.color('Restricted To', :bold)
|
100
|
-
]
|
101
|
-
securitygroup_list = [
|
102
|
-
ui.color('ID', :bold),
|
103
|
-
ui.color('Name', :bold),
|
104
|
-
ui.color('Description', :bold)
|
105
|
-
]
|
106
|
-
|
107
|
-
if response = connection.list_security_groups['listsecuritygroupsresponse']
|
108
|
-
if securitygroups = response['securitygroup']
|
109
|
-
filters = {}
|
110
|
-
filters[:groupid] = groupid unless groupid == 'none'
|
111
|
-
filters[:groupname] = groupname unless groupname == 'none'
|
112
|
-
sg_details_list(securitygroup_list, securitygroup_details, securitygroups, filters)
|
113
|
-
|
114
|
-
puts ui.list(securitygroup_list, :columns_across, 3)
|
115
|
-
puts ui.list(securitygroup_details, :columns_across, 4)
|
116
|
-
end
|
117
|
-
end
|
118
|
-
|
119
|
-
end
|
120
|
-
end
|
121
|
-
|
122
|
-
end
|
123
|
-
end
|
124
|
-
end
|
1
|
+
# Author:: Jeff Moody (<jmoody@datapipe.com>)
|
2
|
+
# Copyright:: Copyright (c) 2012 Datapipe
|
3
|
+
# License:: Apache License, Version 2.0
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
#
|
17
|
+
|
18
|
+
|
19
|
+
require 'chef/knife/cloudstack_base'
|
20
|
+
|
21
|
+
class Chef
|
22
|
+
class Knife
|
23
|
+
class CloudstackSecuritygroupList < Knife
|
24
|
+
|
25
|
+
include Knife::CloudstackBase
|
26
|
+
|
27
|
+
banner "knife cloudstack securitygroup list (options)"
|
28
|
+
option :groupid,
|
29
|
+
:short => "-g GROUPID",
|
30
|
+
:long => "--groupid GROUPID",
|
31
|
+
:description => "List the rules contained within a Security Group, specified by ID",
|
32
|
+
:default => 'none'
|
33
|
+
option :groupname,
|
34
|
+
:short => "-G GROUPNAME",
|
35
|
+
:long => "--groupname GROUPNAME",
|
36
|
+
:description => "List the rules contained within a Security Group, specified by name.",
|
37
|
+
:default => 'none'
|
38
|
+
|
39
|
+
def sg_details_list(securitygroup_list, securitygroup_details, groups, options={})
|
40
|
+
temp = groups
|
41
|
+
if groupid = options[:groupid]
|
42
|
+
temp.reject!{|g| g['id'] != groupid.to_i}
|
43
|
+
end
|
44
|
+
if groupname = options[:groupname]
|
45
|
+
temp.reject!{|g| g['name'] != groupname}
|
46
|
+
end
|
47
|
+
|
48
|
+
temp.each do |securitygroup|
|
49
|
+
securitygroup_list << securitygroup['id'].to_s
|
50
|
+
securitygroup_list << securitygroup['name'].to_s
|
51
|
+
securitygroup_list << securitygroup['description'].to_s
|
52
|
+
if securitygroup['ingressrule'].nil?
|
53
|
+
securitygroup_details << ' '
|
54
|
+
else
|
55
|
+
securitygroup['ingressrule'].each do |ingressrule|
|
56
|
+
rule_details = []
|
57
|
+
securitygroup_details << ingressrule['protocol'].to_s
|
58
|
+
securitygroup_details << ingressrule['startport'].to_s
|
59
|
+
securitygroup_details << ingressrule['endport'].to_s
|
60
|
+
if ingressrule['cidr'].nil?
|
61
|
+
rule_details << ingressrule['securitygroupname'].to_s
|
62
|
+
rule_details << ingressrule['account'].to_s
|
63
|
+
else
|
64
|
+
rule_details << ingressrule['cidr'].to_s
|
65
|
+
end
|
66
|
+
securitygroup_details << rule_details.join(", ")
|
67
|
+
end
|
68
|
+
end
|
69
|
+
end
|
70
|
+
end
|
71
|
+
|
72
|
+
def run
|
73
|
+
$stdout.sync = true
|
74
|
+
|
75
|
+
validate!
|
76
|
+
groupid = locate_config_value(:groupid)
|
77
|
+
groupname = locate_config_value(:groupname)
|
78
|
+
|
79
|
+
if (groupid == 'none' and groupname == 'none')
|
80
|
+
securitygroup_list = [
|
81
|
+
ui.color('ID', :bold),
|
82
|
+
ui.color('Name', :bold),
|
83
|
+
ui.color('Description', :bold)
|
84
|
+
]
|
85
|
+
response = connection.list_security_groups['listsecuritygroupsresponse']
|
86
|
+
if securitygroups = response['securitygroup']
|
87
|
+
securitygroups.each do |securitygroup|
|
88
|
+
securitygroup_list << securitygroup['id'].to_s
|
89
|
+
securitygroup_list << securitygroup['name'].to_s
|
90
|
+
securitygroup_list << securitygroup['description'].to_s
|
91
|
+
end
|
92
|
+
end
|
93
|
+
puts ui.list(securitygroup_list, :columns_across, 3)
|
94
|
+
else
|
95
|
+
securitygroup_details = [
|
96
|
+
ui.color('Protocol', :bold),
|
97
|
+
ui.color('Start Port', :bold),
|
98
|
+
ui.color('End Port', :bold),
|
99
|
+
ui.color('Restricted To', :bold)
|
100
|
+
]
|
101
|
+
securitygroup_list = [
|
102
|
+
ui.color('ID', :bold),
|
103
|
+
ui.color('Name', :bold),
|
104
|
+
ui.color('Description', :bold)
|
105
|
+
]
|
106
|
+
|
107
|
+
if response = connection.list_security_groups['listsecuritygroupsresponse']
|
108
|
+
if securitygroups = response['securitygroup']
|
109
|
+
filters = {}
|
110
|
+
filters[:groupid] = groupid unless groupid == 'none'
|
111
|
+
filters[:groupname] = groupname unless groupname == 'none'
|
112
|
+
sg_details_list(securitygroup_list, securitygroup_details, securitygroups, filters)
|
113
|
+
|
114
|
+
puts ui.list(securitygroup_list, :columns_across, 3)
|
115
|
+
puts ui.list(securitygroup_details, :columns_across, 4)
|
116
|
+
end
|
117
|
+
end
|
118
|
+
|
119
|
+
end
|
120
|
+
end
|
121
|
+
|
122
|
+
end
|
123
|
+
end
|
124
|
+
end
|
@@ -1,320 +1,320 @@
|
|
1
|
-
# Author:: Jeff Moody (<jmoody@datapipe.com>), Takashi Kanai (<anikundesu@gmail.com>)
|
2
|
-
# Copyright:: Copyright (c) 2012 Datapipe, Copyright (c) 2012 IDC Frontier Inc.
|
3
|
-
# License:: Apache License, Version 2.0
|
4
|
-
#
|
5
|
-
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
-
# you may not use this file except in compliance with the License.
|
7
|
-
# You may obtain a copy of the License at
|
8
|
-
#
|
9
|
-
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
-
#
|
11
|
-
# Unless required by applicable law or agreed to in writing, software
|
12
|
-
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
-
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
-
# See the License for the specific language governing permissions and
|
15
|
-
# limitations under the License.
|
16
|
-
#
|
17
|
-
|
18
|
-
require 'chef/knife/bootstrap'
|
19
|
-
Chef::Knife::Bootstrap.load_deps
|
20
|
-
require 'socket'
|
21
|
-
require 'net/ssh/multi'
|
22
|
-
require 'chef/json_compat'
|
23
|
-
require 'chef/knife/cloudstack_base'
|
24
|
-
|
25
|
-
class Chef
|
26
|
-
class Knife
|
27
|
-
class CloudstackServerCreate < Knife
|
28
|
-
|
29
|
-
include Knife::CloudstackBase
|
30
|
-
|
31
|
-
banner "knife cloudstack server create -s SERVICEID -t TEMPLATEID -z ZONEID (options)"
|
32
|
-
|
33
|
-
option :cloudstack_serviceid,
|
34
|
-
:short => "-s SERVICEID",
|
35
|
-
:long => "--serviceid SERVICEID",
|
36
|
-
:description => "The CloudStack service offering ID."
|
37
|
-
|
38
|
-
option :cloudstack_templateid,
|
39
|
-
:short => "-t TEMPLATEID",
|
40
|
-
:long => "--templateid TEMPLATEID",
|
41
|
-
:description => "The CloudStack template ID for the server."
|
42
|
-
|
43
|
-
option :cloudstack_zoneid,
|
44
|
-
:short => "-z ZONEID",
|
45
|
-
:long => "--zoneid ZONE",
|
46
|
-
:description => "The CloudStack zone ID for the server."
|
47
|
-
|
48
|
-
option :cloudstack_networkids,
|
49
|
-
:short => "-w NETWORKIDS",
|
50
|
-
:long => "--networkids NETWORKIDS",
|
51
|
-
:description => "Comma separated list of CloudStack network IDs.",
|
52
|
-
:proc => lambda { |n| n.split(/[\s,]+/) },
|
53
|
-
:default => []
|
54
|
-
|
55
|
-
option :cloudstack_groupids,
|
56
|
-
:short => "-g SECURITYGROUPIDS",
|
57
|
-
:long => "--groupids SECURITYGROUPIDS",
|
58
|
-
:description => "Comma separated list of CloudStack Security Group IDs.",
|
59
|
-
:proc => lambda { |n| n.split(/[\s,]+/) },
|
60
|
-
:default => []
|
61
|
-
|
62
|
-
option :cloudstack_groupnames,
|
63
|
-
:short => "-G SECURITYGROUPNAMES",
|
64
|
-
:long => "--groupnames SECURITYGROUPNAMES",
|
65
|
-
:description => "Comma separated list of CloudStack Security Group names. Each group name must be encapuslated in quotes if it contains whitespace.",
|
66
|
-
:proc => lambda { |n| n.split(/[\s,]+/) },
|
67
|
-
:default => []
|
68
|
-
|
69
|
-
option :distro,
|
70
|
-
:short => "-d DISTRO",
|
71
|
-
:long => "--distro DISTRO",
|
72
|
-
:description => "Bootstrap a distro using a template; default is 'chef-full'",
|
73
|
-
:proc => Proc.new { |d| Chef::Config[:knife][:distro] = d },
|
74
|
-
:default => "chef-full"
|
75
|
-
|
76
|
-
option :template_file,
|
77
|
-
:long => "--template-file TEMPLATE",
|
78
|
-
:description => "Full path to location of template to use",
|
79
|
-
:proc => Proc.new { |t| Chef::Config[:knife][:template_file] = t },
|
80
|
-
:default => false
|
81
|
-
|
82
|
-
option :run_list,
|
83
|
-
:short => "-r RUN_LIST",
|
84
|
-
:long => "--run-list RUN_LIST",
|
85
|
-
:description => "Comma separated list of roles/recipes to apply",
|
86
|
-
:proc => lambda { |o| o.split(/[\s,]+/) },
|
87
|
-
:default => []
|
88
|
-
|
89
|
-
option :ssh_user,
|
90
|
-
:short => "-x USERNAME",
|
91
|
-
:long => "--ssh-user USERNAME",
|
92
|
-
:description => "The ssh username",
|
93
|
-
:default => 'root'
|
94
|
-
|
95
|
-
option :ssh_password,
|
96
|
-
:short => "-P PASSWORD",
|
97
|
-
:long => "--ssh-password PASSWORD",
|
98
|
-
:description => "The ssh password"
|
99
|
-
|
100
|
-
option :identity_file,
|
101
|
-
:short => "-i PRIVATE_KEY_FILE",
|
102
|
-
:long => "--identity-file PRIVATE_KEY_FILE",
|
103
|
-
:description => "The Private key file for authenticating SSH session. --keypair option is also needed."
|
104
|
-
|
105
|
-
option :server_name,
|
106
|
-
:short => "-N NAME",
|
107
|
-
:long => "--display-name NAME",
|
108
|
-
:description => "The instance display name"
|
109
|
-
|
110
|
-
option :host_name,
|
111
|
-
:short => "-H NAME",
|
112
|
-
:long => "--hostname NAME",
|
113
|
-
:description => "The instance host name"
|
114
|
-
|
115
|
-
option :keypair,
|
116
|
-
:short => "-k KEYPAIR",
|
117
|
-
:long => "--keypair KEYPAIR",
|
118
|
-
:description => "The CloudStack Key Pair to use for SSH key authentication."
|
119
|
-
|
120
|
-
option :diskoffering,
|
121
|
-
:short => "-D DISKOFFERINGID",
|
122
|
-
:long => "--diskoffering DISKOFFERINGID",
|
123
|
-
:description => "Specifies either the Disk Offering ID for the ROOT disk for an ISO template, or a DATA disk."
|
124
|
-
|
125
|
-
option :size,
|
126
|
-
:short => "-Z SIZE",
|
127
|
-
:long => "--size SIZE",
|
128
|
-
:description => "Specifies the arbitrary Disk Size for DATADISK volume in GB. Must be passed with custom size Disk Offering ID."
|
129
|
-
|
130
|
-
def bootstrap_for_node(host, user, password)
|
131
|
-
Chef::Log.debug("Bootstrap host: #{host}")
|
132
|
-
Chef::Log.debug("Bootstrap user: #{user}")
|
133
|
-
Chef::Log.debug("Bootstrap pass: #{password}")
|
134
|
-
bootstrap = Chef::Knife::Bootstrap.new
|
135
|
-
bootstrap.name_args = host
|
136
|
-
bootstrap.config[:run_list] = config[:run_list]
|
137
|
-
bootstrap.config[:ssh_user] = user
|
138
|
-
bootstrap.config[:ssh_password] = password
|
139
|
-
bootstrap.config[:identity_file] = locate_config_value(:identity_file)
|
140
|
-
bootstrap.config[:chef_node_name] = config[:server_name] if config[:server_name]
|
141
|
-
bootstrap.config[:prerelease] = config[:prerelease]
|
142
|
-
bootstrap.config[:bootstrap_version] = locate_config_value(:bootstrap_version)
|
143
|
-
bootstrap.config[:distro] = locate_config_value(:distro)
|
144
|
-
bootstrap.config[:use_sudo] = true
|
145
|
-
bootstrap.config[:template_file] = locate_config_value(:template_file)
|
146
|
-
bootstrap.config[:environment] = config[:environment]
|
147
|
-
# may be needed for vpc_mode
|
148
|
-
bootstrap.config[:no_host_key_verify] = config[:no_host_key_verify]
|
149
|
-
bootstrap
|
150
|
-
end
|
151
|
-
|
152
|
-
def tcp_test_ssh(hostname)
|
153
|
-
print("#{ui.color(".", :magenta)}")
|
154
|
-
tcp_socket = TCPSocket.new(hostname, 22)
|
155
|
-
readable = IO.select([tcp_socket], nil, nil, 5)
|
156
|
-
if readable
|
157
|
-
Chef::Log.debug("\nsshd accepting connections on #{hostname}, banner is #{tcp_socket.gets}\n")
|
158
|
-
yield
|
159
|
-
true
|
160
|
-
else
|
161
|
-
false
|
162
|
-
end
|
163
|
-
|
164
|
-
rescue Errno::ETIMEDOUT
|
165
|
-
false
|
166
|
-
rescue Errno::EPERM
|
167
|
-
false
|
168
|
-
rescue Errno::ECONNREFUSED
|
169
|
-
sleep 2
|
170
|
-
false
|
171
|
-
rescue Errno::EHOSTUNREACH
|
172
|
-
sleep 2
|
173
|
-
false
|
174
|
-
rescue Errno::ENETUNREACH
|
175
|
-
sleep 30
|
176
|
-
false
|
177
|
-
ensure
|
178
|
-
tcp_socket && tcp_socket.close
|
179
|
-
end
|
180
|
-
|
181
|
-
def run
|
182
|
-
$stdout.sync = true
|
183
|
-
|
184
|
-
options = {}
|
185
|
-
|
186
|
-
options['zoneid'] = locate_config_value(:cloudstack_zoneid)
|
187
|
-
options['templateid'] = locate_config_value(:cloudstack_templateid)
|
188
|
-
|
189
|
-
if locate_config_value(:cloudstack_serviceid) != nil
|
190
|
-
options['serviceofferingid'] = locate_config_value(:cloudstack_serviceid)
|
191
|
-
end
|
192
|
-
|
193
|
-
if locate_config_value(:server_name) != nil
|
194
|
-
options['displayname'] = locate_config_value(:server_name)
|
195
|
-
end
|
196
|
-
|
197
|
-
if locate_config_value(:host_name) != nil
|
198
|
-
options['name'] = locate_config_value(:host_name)
|
199
|
-
end
|
200
|
-
|
201
|
-
network_ids = []
|
202
|
-
if locate_config_value(:cloudstack_networkids) != []
|
203
|
-
cs_networkids = locate_config_value(:cloudstack_networkids)
|
204
|
-
cs_networkids.each do |id|
|
205
|
-
network_ids.push(id)
|
206
|
-
end
|
207
|
-
options['networkids'] = network_ids
|
208
|
-
end
|
209
|
-
|
210
|
-
security_groups = []
|
211
|
-
if locate_config_value(:cloudstack_groupids) != []
|
212
|
-
cs_groupids = locate_config_value(:cloudstack_groupids)
|
213
|
-
cs_groupids.each do |id|
|
214
|
-
security_groups.push(id)
|
215
|
-
end
|
216
|
-
options['securitygroupids'] = security_groups
|
217
|
-
elsif locate_config_value(:cloudstack_groupnames) != []
|
218
|
-
cs_groupnames = locate_config_value(:cloudstack_groupnames)
|
219
|
-
cs_groupnames.each do |name|
|
220
|
-
security_groups.push(name)
|
221
|
-
end
|
222
|
-
options['securitygroupnames'] = security_groups
|
223
|
-
end
|
224
|
-
|
225
|
-
if locate_config_value(:keypair) != nil
|
226
|
-
options['keypair'] = locate_config_value(:keypair)
|
227
|
-
end
|
228
|
-
|
229
|
-
if locate_config_value(:diskoffering) != nil
|
230
|
-
options['diskofferingid'] = locate_config_value(:diskoffering)
|
231
|
-
end
|
232
|
-
|
233
|
-
if locate_config_value(:size) != nil
|
234
|
-
options['size'] = locate_config_value(:size)
|
235
|
-
end
|
236
|
-
|
237
|
-
Chef::Log.debug("Options: #{options} \n")
|
238
|
-
|
239
|
-
server = connection.deploy_virtual_machine(options)
|
240
|
-
jobid = server['deployvirtualmachineresponse'].fetch('jobid')
|
241
|
-
|
242
|
-
server_start = connection.query_async_job_result('jobid'=>jobid)
|
243
|
-
|
244
|
-
Chef::Log.debug("Job ID: #{jobid} \n")
|
245
|
-
|
246
|
-
print "#{ui.color("Waiting for server", :magenta)}"
|
247
|
-
while server_start['queryasyncjobresultresponse'].fetch('jobstatus') == 0
|
248
|
-
print "#{ui.color(".", :magenta)}"
|
249
|
-
sleep(15)
|
250
|
-
server_start = connection.query_async_job_result('jobid'=>jobid)
|
251
|
-
Chef::Log.debug("Server_Start: #{server_start} \n")
|
252
|
-
end
|
253
|
-
puts "\n\n"
|
254
|
-
|
255
|
-
if server_start['queryasyncjobresultresponse'].fetch('jobstatus') == 2
|
256
|
-
errortext = server_start['queryasyncjobresultresponse'].fetch('jobresult').fetch('errortext')
|
257
|
-
puts "#{ui.color("ERROR! Job failed with #{errortext}", :red)}"
|
258
|
-
end
|
259
|
-
|
260
|
-
if server_start['queryasyncjobresultresponse'].fetch('jobstatus') == 1
|
261
|
-
|
262
|
-
Chef::Log.debug("Job ID: #{jobid} \n")
|
263
|
-
Chef::Log.debug("Options: #{options} \n")
|
264
|
-
server_start = connection.query_async_job_result('jobid'=>jobid)
|
265
|
-
Chef::Log.debug("Server_Start: #{server_start} \n")
|
266
|
-
|
267
|
-
server_info = server_start['queryasyncjobresultresponse']['jobresult']['virtualmachine']
|
268
|
-
|
269
|
-
server_name = server_info['displayname']
|
270
|
-
server_id = server_info['name']
|
271
|
-
server_serviceoffering = server_info['serviceofferingname']
|
272
|
-
server_template = server_info['templatename']
|
273
|
-
if server_info['password'] != nil
|
274
|
-
ssh_password = server_info['password']
|
275
|
-
else
|
276
|
-
ssh_password = locate_config_value(:ssh_password)
|
277
|
-
end
|
278
|
-
|
279
|
-
ssh_user = locate_config_value(:ssh_user)
|
280
|
-
|
281
|
-
public_ip = nil
|
282
|
-
|
283
|
-
if server_info['nic'].size > 0
|
284
|
-
public_ip = server_info['nic'].first['ipaddress']
|
285
|
-
end
|
286
|
-
|
287
|
-
puts "\n\n"
|
288
|
-
puts "#{ui.color("Name", :cyan)}: #{server_name}"
|
289
|
-
puts "#{ui.color("Public IP", :cyan)}: #{public_ip}"
|
290
|
-
puts "#{ui.color("Username", :cyan)}: #{ssh_user}"
|
291
|
-
puts "#{ui.color("Password", :cyan)}: #{ssh_password}"
|
292
|
-
|
293
|
-
print "\n#{ui.color("Waiting for sshd", :magenta)}"
|
294
|
-
|
295
|
-
print("#{ui.color(".", :magenta)}") until tcp_test_ssh(public_ip) { sleep @initial_sleep_delay ||= 10; puts("done") }
|
296
|
-
|
297
|
-
puts("#{ui.color("Waiting for password/keys to sync.", :magenta)}")
|
298
|
-
sleep 15
|
299
|
-
|
300
|
-
bootstrap_for_node(public_ip, ssh_user, ssh_password).run
|
301
|
-
|
302
|
-
Chef::Log.debug("#{server_info}")
|
303
|
-
|
304
|
-
puts "\n"
|
305
|
-
puts "#{ui.color("Instance Name", :green)}: #{server_name}"
|
306
|
-
puts "#{ui.color("Instance ID", :green)}: #{server_id}"
|
307
|
-
puts "#{ui.color("Service Offering", :green)}: #{server_serviceoffering}"
|
308
|
-
puts "#{ui.color("Template", :green)}: #{server_template}"
|
309
|
-
puts "#{ui.color("Public IP Address", :green)}: #{public_ip}"
|
310
|
-
puts "#{ui.color("User", :green)}: #{ssh_user}"
|
311
|
-
puts "#{ui.color("Password", :green)}: #{ssh_password}"
|
312
|
-
puts "#{ui.color("Environment", :green)}: #{config[:environment] || '_default'}"
|
313
|
-
puts "#{ui.color("Run List", :green)}: #{config[:run_list].join(', ')}"
|
314
|
-
end
|
315
|
-
|
316
|
-
end
|
317
|
-
|
318
|
-
end
|
319
|
-
end
|
320
|
-
end
|
1
|
+
# Author:: Jeff Moody (<jmoody@datapipe.com>), Takashi Kanai (<anikundesu@gmail.com>)
|
2
|
+
# Copyright:: Copyright (c) 2012 Datapipe, Copyright (c) 2012 IDC Frontier Inc.
|
3
|
+
# License:: Apache License, Version 2.0
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
#
|
17
|
+
|
18
|
+
require 'chef/knife/bootstrap'
|
19
|
+
Chef::Knife::Bootstrap.load_deps
|
20
|
+
require 'socket'
|
21
|
+
require 'net/ssh/multi'
|
22
|
+
require 'chef/json_compat'
|
23
|
+
require 'chef/knife/cloudstack_base'
|
24
|
+
|
25
|
+
class Chef
|
26
|
+
class Knife
|
27
|
+
class CloudstackServerCreate < Knife
|
28
|
+
|
29
|
+
include Knife::CloudstackBase
|
30
|
+
|
31
|
+
banner "knife cloudstack server create -s SERVICEID -t TEMPLATEID -z ZONEID (options)"
|
32
|
+
|
33
|
+
option :cloudstack_serviceid,
|
34
|
+
:short => "-s SERVICEID",
|
35
|
+
:long => "--serviceid SERVICEID",
|
36
|
+
:description => "The CloudStack service offering ID."
|
37
|
+
|
38
|
+
option :cloudstack_templateid,
|
39
|
+
:short => "-t TEMPLATEID",
|
40
|
+
:long => "--templateid TEMPLATEID",
|
41
|
+
:description => "The CloudStack template ID for the server."
|
42
|
+
|
43
|
+
option :cloudstack_zoneid,
|
44
|
+
:short => "-z ZONEID",
|
45
|
+
:long => "--zoneid ZONE",
|
46
|
+
:description => "The CloudStack zone ID for the server."
|
47
|
+
|
48
|
+
option :cloudstack_networkids,
|
49
|
+
:short => "-w NETWORKIDS",
|
50
|
+
:long => "--networkids NETWORKIDS",
|
51
|
+
:description => "Comma separated list of CloudStack network IDs.",
|
52
|
+
:proc => lambda { |n| n.split(/[\s,]+/) },
|
53
|
+
:default => []
|
54
|
+
|
55
|
+
option :cloudstack_groupids,
|
56
|
+
:short => "-g SECURITYGROUPIDS",
|
57
|
+
:long => "--groupids SECURITYGROUPIDS",
|
58
|
+
:description => "Comma separated list of CloudStack Security Group IDs.",
|
59
|
+
:proc => lambda { |n| n.split(/[\s,]+/) },
|
60
|
+
:default => []
|
61
|
+
|
62
|
+
option :cloudstack_groupnames,
|
63
|
+
:short => "-G SECURITYGROUPNAMES",
|
64
|
+
:long => "--groupnames SECURITYGROUPNAMES",
|
65
|
+
:description => "Comma separated list of CloudStack Security Group names. Each group name must be encapuslated in quotes if it contains whitespace.",
|
66
|
+
:proc => lambda { |n| n.split(/[\s,]+/) },
|
67
|
+
:default => []
|
68
|
+
|
69
|
+
option :distro,
|
70
|
+
:short => "-d DISTRO",
|
71
|
+
:long => "--distro DISTRO",
|
72
|
+
:description => "Bootstrap a distro using a template; default is 'chef-full'",
|
73
|
+
:proc => Proc.new { |d| Chef::Config[:knife][:distro] = d },
|
74
|
+
:default => "chef-full"
|
75
|
+
|
76
|
+
option :template_file,
|
77
|
+
:long => "--template-file TEMPLATE",
|
78
|
+
:description => "Full path to location of template to use",
|
79
|
+
:proc => Proc.new { |t| Chef::Config[:knife][:template_file] = t },
|
80
|
+
:default => false
|
81
|
+
|
82
|
+
option :run_list,
|
83
|
+
:short => "-r RUN_LIST",
|
84
|
+
:long => "--run-list RUN_LIST",
|
85
|
+
:description => "Comma separated list of roles/recipes to apply",
|
86
|
+
:proc => lambda { |o| o.split(/[\s,]+/) },
|
87
|
+
:default => []
|
88
|
+
|
89
|
+
option :ssh_user,
|
90
|
+
:short => "-x USERNAME",
|
91
|
+
:long => "--ssh-user USERNAME",
|
92
|
+
:description => "The ssh username",
|
93
|
+
:default => 'root'
|
94
|
+
|
95
|
+
option :ssh_password,
|
96
|
+
:short => "-P PASSWORD",
|
97
|
+
:long => "--ssh-password PASSWORD",
|
98
|
+
:description => "The ssh password"
|
99
|
+
|
100
|
+
option :identity_file,
|
101
|
+
:short => "-i PRIVATE_KEY_FILE",
|
102
|
+
:long => "--identity-file PRIVATE_KEY_FILE",
|
103
|
+
:description => "The Private key file for authenticating SSH session. --keypair option is also needed."
|
104
|
+
|
105
|
+
option :server_name,
|
106
|
+
:short => "-N NAME",
|
107
|
+
:long => "--display-name NAME",
|
108
|
+
:description => "The instance display name"
|
109
|
+
|
110
|
+
option :host_name,
|
111
|
+
:short => "-H NAME",
|
112
|
+
:long => "--hostname NAME",
|
113
|
+
:description => "The instance host name"
|
114
|
+
|
115
|
+
option :keypair,
|
116
|
+
:short => "-k KEYPAIR",
|
117
|
+
:long => "--keypair KEYPAIR",
|
118
|
+
:description => "The CloudStack Key Pair to use for SSH key authentication."
|
119
|
+
|
120
|
+
option :diskoffering,
|
121
|
+
:short => "-D DISKOFFERINGID",
|
122
|
+
:long => "--diskoffering DISKOFFERINGID",
|
123
|
+
:description => "Specifies either the Disk Offering ID for the ROOT disk for an ISO template, or a DATA disk."
|
124
|
+
|
125
|
+
option :size,
|
126
|
+
:short => "-Z SIZE",
|
127
|
+
:long => "--size SIZE",
|
128
|
+
:description => "Specifies the arbitrary Disk Size for DATADISK volume in GB. Must be passed with custom size Disk Offering ID."
|
129
|
+
|
130
|
+
def bootstrap_for_node(host, user, password)
|
131
|
+
Chef::Log.debug("Bootstrap host: #{host}")
|
132
|
+
Chef::Log.debug("Bootstrap user: #{user}")
|
133
|
+
Chef::Log.debug("Bootstrap pass: #{password}")
|
134
|
+
bootstrap = Chef::Knife::Bootstrap.new
|
135
|
+
bootstrap.name_args = host
|
136
|
+
bootstrap.config[:run_list] = config[:run_list]
|
137
|
+
bootstrap.config[:ssh_user] = user
|
138
|
+
bootstrap.config[:ssh_password] = password
|
139
|
+
bootstrap.config[:identity_file] = locate_config_value(:identity_file)
|
140
|
+
bootstrap.config[:chef_node_name] = config[:server_name] if config[:server_name]
|
141
|
+
bootstrap.config[:prerelease] = config[:prerelease]
|
142
|
+
bootstrap.config[:bootstrap_version] = locate_config_value(:bootstrap_version)
|
143
|
+
bootstrap.config[:distro] = locate_config_value(:distro)
|
144
|
+
bootstrap.config[:use_sudo] = true
|
145
|
+
bootstrap.config[:template_file] = locate_config_value(:template_file)
|
146
|
+
bootstrap.config[:environment] = config[:environment]
|
147
|
+
# may be needed for vpc_mode
|
148
|
+
bootstrap.config[:no_host_key_verify] = config[:no_host_key_verify]
|
149
|
+
bootstrap
|
150
|
+
end
|
151
|
+
|
152
|
+
def tcp_test_ssh(hostname)
|
153
|
+
print("#{ui.color(".", :magenta)}")
|
154
|
+
tcp_socket = TCPSocket.new(hostname, 22)
|
155
|
+
readable = IO.select([tcp_socket], nil, nil, 5)
|
156
|
+
if readable
|
157
|
+
Chef::Log.debug("\nsshd accepting connections on #{hostname}, banner is #{tcp_socket.gets}\n")
|
158
|
+
yield
|
159
|
+
true
|
160
|
+
else
|
161
|
+
false
|
162
|
+
end
|
163
|
+
|
164
|
+
rescue Errno::ETIMEDOUT
|
165
|
+
false
|
166
|
+
rescue Errno::EPERM
|
167
|
+
false
|
168
|
+
rescue Errno::ECONNREFUSED
|
169
|
+
sleep 2
|
170
|
+
false
|
171
|
+
rescue Errno::EHOSTUNREACH
|
172
|
+
sleep 2
|
173
|
+
false
|
174
|
+
rescue Errno::ENETUNREACH
|
175
|
+
sleep 30
|
176
|
+
false
|
177
|
+
ensure
|
178
|
+
tcp_socket && tcp_socket.close
|
179
|
+
end
|
180
|
+
|
181
|
+
def run
|
182
|
+
$stdout.sync = true
|
183
|
+
|
184
|
+
options = {}
|
185
|
+
|
186
|
+
options['zoneid'] = locate_config_value(:cloudstack_zoneid)
|
187
|
+
options['templateid'] = locate_config_value(:cloudstack_templateid)
|
188
|
+
|
189
|
+
if locate_config_value(:cloudstack_serviceid) != nil
|
190
|
+
options['serviceofferingid'] = locate_config_value(:cloudstack_serviceid)
|
191
|
+
end
|
192
|
+
|
193
|
+
if locate_config_value(:server_name) != nil
|
194
|
+
options['displayname'] = locate_config_value(:server_name)
|
195
|
+
end
|
196
|
+
|
197
|
+
if locate_config_value(:host_name) != nil
|
198
|
+
options['name'] = locate_config_value(:host_name)
|
199
|
+
end
|
200
|
+
|
201
|
+
network_ids = []
|
202
|
+
if locate_config_value(:cloudstack_networkids) != []
|
203
|
+
cs_networkids = locate_config_value(:cloudstack_networkids)
|
204
|
+
cs_networkids.each do |id|
|
205
|
+
network_ids.push(id)
|
206
|
+
end
|
207
|
+
options['networkids'] = network_ids
|
208
|
+
end
|
209
|
+
|
210
|
+
security_groups = []
|
211
|
+
if locate_config_value(:cloudstack_groupids) != []
|
212
|
+
cs_groupids = locate_config_value(:cloudstack_groupids)
|
213
|
+
cs_groupids.each do |id|
|
214
|
+
security_groups.push(id)
|
215
|
+
end
|
216
|
+
options['securitygroupids'] = security_groups
|
217
|
+
elsif locate_config_value(:cloudstack_groupnames) != []
|
218
|
+
cs_groupnames = locate_config_value(:cloudstack_groupnames)
|
219
|
+
cs_groupnames.each do |name|
|
220
|
+
security_groups.push(name)
|
221
|
+
end
|
222
|
+
options['securitygroupnames'] = security_groups
|
223
|
+
end
|
224
|
+
|
225
|
+
if locate_config_value(:keypair) != nil
|
226
|
+
options['keypair'] = locate_config_value(:keypair)
|
227
|
+
end
|
228
|
+
|
229
|
+
if locate_config_value(:diskoffering) != nil
|
230
|
+
options['diskofferingid'] = locate_config_value(:diskoffering)
|
231
|
+
end
|
232
|
+
|
233
|
+
if locate_config_value(:size) != nil
|
234
|
+
options['size'] = locate_config_value(:size)
|
235
|
+
end
|
236
|
+
|
237
|
+
Chef::Log.debug("Options: #{options} \n")
|
238
|
+
|
239
|
+
server = connection.deploy_virtual_machine(options)
|
240
|
+
jobid = server['deployvirtualmachineresponse'].fetch('jobid')
|
241
|
+
|
242
|
+
server_start = connection.query_async_job_result('jobid'=>jobid)
|
243
|
+
|
244
|
+
Chef::Log.debug("Job ID: #{jobid} \n")
|
245
|
+
|
246
|
+
print "#{ui.color("Waiting for server", :magenta)}"
|
247
|
+
while server_start['queryasyncjobresultresponse'].fetch('jobstatus') == 0
|
248
|
+
print "#{ui.color(".", :magenta)}"
|
249
|
+
sleep(15)
|
250
|
+
server_start = connection.query_async_job_result('jobid'=>jobid)
|
251
|
+
Chef::Log.debug("Server_Start: #{server_start} \n")
|
252
|
+
end
|
253
|
+
puts "\n\n"
|
254
|
+
|
255
|
+
if server_start['queryasyncjobresultresponse'].fetch('jobstatus') == 2
|
256
|
+
errortext = server_start['queryasyncjobresultresponse'].fetch('jobresult').fetch('errortext')
|
257
|
+
puts "#{ui.color("ERROR! Job failed with #{errortext}", :red)}"
|
258
|
+
end
|
259
|
+
|
260
|
+
if server_start['queryasyncjobresultresponse'].fetch('jobstatus') == 1
|
261
|
+
|
262
|
+
Chef::Log.debug("Job ID: #{jobid} \n")
|
263
|
+
Chef::Log.debug("Options: #{options} \n")
|
264
|
+
server_start = connection.query_async_job_result('jobid'=>jobid)
|
265
|
+
Chef::Log.debug("Server_Start: #{server_start} \n")
|
266
|
+
|
267
|
+
server_info = server_start['queryasyncjobresultresponse']['jobresult']['virtualmachine']
|
268
|
+
|
269
|
+
server_name = server_info['displayname']
|
270
|
+
server_id = server_info['name']
|
271
|
+
server_serviceoffering = server_info['serviceofferingname']
|
272
|
+
server_template = server_info['templatename']
|
273
|
+
if server_info['password'] != nil
|
274
|
+
ssh_password = server_info['password']
|
275
|
+
else
|
276
|
+
ssh_password = locate_config_value(:ssh_password)
|
277
|
+
end
|
278
|
+
|
279
|
+
ssh_user = locate_config_value(:ssh_user)
|
280
|
+
|
281
|
+
public_ip = nil
|
282
|
+
|
283
|
+
if server_info['nic'].size > 0
|
284
|
+
public_ip = server_info['nic'].first['ipaddress']
|
285
|
+
end
|
286
|
+
|
287
|
+
puts "\n\n"
|
288
|
+
puts "#{ui.color("Name", :cyan)}: #{server_name}"
|
289
|
+
puts "#{ui.color("Public IP", :cyan)}: #{public_ip}"
|
290
|
+
puts "#{ui.color("Username", :cyan)}: #{ssh_user}"
|
291
|
+
puts "#{ui.color("Password", :cyan)}: #{ssh_password}"
|
292
|
+
|
293
|
+
print "\n#{ui.color("Waiting for sshd", :magenta)}"
|
294
|
+
|
295
|
+
print("#{ui.color(".", :magenta)}") until tcp_test_ssh(public_ip) { sleep @initial_sleep_delay ||= 10; puts("done") }
|
296
|
+
|
297
|
+
puts("#{ui.color("Waiting for password/keys to sync.", :magenta)}")
|
298
|
+
sleep 15
|
299
|
+
|
300
|
+
bootstrap_for_node(public_ip, ssh_user, ssh_password).run
|
301
|
+
|
302
|
+
Chef::Log.debug("#{server_info}")
|
303
|
+
|
304
|
+
puts "\n"
|
305
|
+
puts "#{ui.color("Instance Name", :green)}: #{server_name}"
|
306
|
+
puts "#{ui.color("Instance ID", :green)}: #{server_id}"
|
307
|
+
puts "#{ui.color("Service Offering", :green)}: #{server_serviceoffering}"
|
308
|
+
puts "#{ui.color("Template", :green)}: #{server_template}"
|
309
|
+
puts "#{ui.color("Public IP Address", :green)}: #{public_ip}"
|
310
|
+
puts "#{ui.color("User", :green)}: #{ssh_user}"
|
311
|
+
puts "#{ui.color("Password", :green)}: #{ssh_password}"
|
312
|
+
puts "#{ui.color("Environment", :green)}: #{config[:environment] || '_default'}"
|
313
|
+
puts "#{ui.color("Run List", :green)}: #{config[:run_list].join(', ')}"
|
314
|
+
end
|
315
|
+
|
316
|
+
end
|
317
|
+
|
318
|
+
end
|
319
|
+
end
|
320
|
+
end
|