knife-rackspace 0.7.0 → 0.8.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml ADDED
@@ -0,0 +1,15 @@
1
+ ---
2
+ !binary "U0hBMQ==":
3
+ metadata.gz: !binary |-
4
+ ODUxNTU1NTRiNTE4MDg2MTczMDM3YmRjN2Q5ZGQyN2M0NWZiZDA4OA==
5
+ data.tar.gz: !binary |-
6
+ OWJlMTYxZjM0MTJiYmYxYzFjNTQ1NjRkNWVkM2U4MTY4ZTJiYTQ2Mw==
7
+ !binary "U0hBNTEy":
8
+ metadata.gz: !binary |-
9
+ NGFhYjRmNzY0ZDRlMTNkMGU3YTA2MTFjN2ZlYWQ0ZDRmZmQzNjYzYjY4NTI1
10
+ ZTQ3OTZmOTA3ZTcxMDMzODA5MzVhOGFiMjhiYjkwNjYzYzVhYTA1ZmQzMzEx
11
+ NWZjZGU4NjkxMzA5ZWRjMzFhNWIwZTJiZDUxNTNiNWFlYTY4Y2U=
12
+ data.tar.gz: !binary |-
13
+ MWJmZWQwMzIzZWJmZGM5NDU1ZDk1NGVmZTAxOTkwNTRlNmVkYjM3Y2E5NmJl
14
+ MzkwNjBhMDhjOGI4OTJhNDg5YWNhZGI5NmUxMTQ3YzgxZWY3YzI3MGU5Y2M3
15
+ YjdmODdlYzc4OWViYTZmNzdiMzVkZTg4MjMwNzg3NTg3YmZiY2E=
data/.travis.yml CHANGED
@@ -3,7 +3,6 @@ language: ruby
3
3
  rvm:
4
4
  - 2.0.0
5
5
  - 1.9.3
6
- - 1.8.7
7
6
  env:
8
7
  global:
9
8
  - secure: ! 'eEsikE/p2yz7/cFvCN/NOoljxBqjzsTWnKC7iZ+fEGGsyhKVJgWn4AasBusZ
data/CHANGELOG.md CHANGED
@@ -1,3 +1,10 @@
1
+ ## v0.8.0
2
+ * KNIFE-68 enable ability to modify ssh port number
3
+ * KNIFE-180 include option to pass :disk_config option to fog for new node bootstrap
4
+ * KNIFE-312 updated to reflect new configuration options in Fog 1.10.1
5
+ * KNIFE-314 provisioning First Gen Cloud Server is broken
6
+ * KNIFE-315 fixed DEPRECATION warnings related to use of old rackpace_auth_url and removed rackspace_endpoint
7
+
1
8
  ## v0.7.0
2
9
  * KNIFE_RACKSPACE-32 Ensure hint file is created to improve Ohai detection.
3
10
  * KNIFE-181 correct mixed use of 'rackspace_auth_url' and 'rackspace_api_auth_url'. Only 'rackspace_auth_url' is correct.
data/README.rdoc CHANGED
@@ -16,6 +16,17 @@ This plugin is distributed as a Ruby Gem. To install it, run:
16
16
 
17
17
  Depending on your system's configuration, you may need to run this command with root privileges.
18
18
 
19
+ Ensure only the latest knife-rackspace gem and no other is installed. In some cases having older versions of the gem
20
+ will cause the new OpenStack functionality not to function properly. To check:
21
+
22
+ $> gem list --local | grep knife-rackspace
23
+ knife-rackspace (0.6.2, 0.5.12)
24
+ $> gem uninstall knife-rackspace -v "= 0.5.12"
25
+ Successfully uninstalled knife-rackspace-0.5.12
26
+ $> gem list --local | grep knife-rackspace
27
+ knife-rackspace (0.6.2)
28
+
29
+
19
30
  = CONFIGURATION:
20
31
 
21
32
  In order to communicate with the Rackspace Cloud API you will have to tell Knife about your Username and API Key. The easiest way to accomplish this is to create some entries in your <tt>knife.rb</tt> file:
@@ -37,28 +48,22 @@ To select for the previous Rackspace API (aka 'v1'), you can use the <tt>--racks
37
48
 
38
49
  knife[:rackspace_version] = 'v1'
39
50
 
40
- This plugin also has support for authenticating against an alternate API Auth URL. This is useful if you are a Rackspace Cloud UK user, here is an example of configuring your <tt>knife.rb</tt>:
51
+ This plugin also has support for authenticating against an alternate API Auth URL. This is useful if you are a using a custom endpoint, here is an example of configuring your <tt>knife.rb</tt>:
41
52
 
42
- knife[:rackspace_auth_url] = "lon.auth.api.rackspacecloud.com"
53
+ knife[:rackspace_auth_url] = "auth.my-custom-endpoint.com"
43
54
 
44
- This plugin also has support for specifying which region to create servers into:
45
55
 
46
- knife[:rackspace_endpoint] = "https://dfw.servers.api.rackspacecloud.com/v2"
47
-
48
- valid options include:
49
- DFW_ENDPOINT = 'https://dfw.servers.api.rackspacecloud.com/v2'
50
- ORD_ENDPOINT = 'https://ord.servers.api.rackspacecloud.com/v2'
51
- LON_ENDPOINT = 'https://lon.servers.api.rackspacecloud.com/v2'
56
+ Different regions can be specified by using the `--rackspace-region` switch or using the `knife[:rackspace_region]` in the knife.rb file. Valid regions include :dfw, :ord, :lon, and :syd.
52
57
 
53
58
  If you are behind a proxy you can specify it in the knife.rb file as follows:
54
59
 
55
- https_proxy https://PROXY_IP_ADDRESS:PORT
60
+ https_proxy https://PROXY_IP_ADDRESS:PORT
56
61
 
57
62
  SSL certificate verification can be disabled by include the following in your knife.rb file:
58
63
 
59
- knife[:ssl_verify_peer] = false
64
+ knife[:ssl_verify_peer] = false
60
65
 
61
- Additionally the following options may be set in your `knife.rb`:
66
+ Additionally the following options may be set in your <tt>knife.rb</tt>:
62
67
 
63
68
  * flavor
64
69
  * image
@@ -81,22 +86,39 @@ Files can be injected onto the provisioned system using the <tt>--file</tt> swit
81
86
 
82
87
  Note: You can only inject text files and the maximum destination path is 255 characters.
83
88
 
89
+ You may specify if want to manage your disk partitioning scheme with the <tt>--rackspace-disk-config DISKCONFIG</tt> option. If you bootstrap a `v2` node and leave this set to the default "AUTO", larger nodes take longer to bootstrap as it grows the disk from 10G to fill the full amount of local disk provided. This option allows you to pass "MANUAL" - which give you a node (in 1/2 to 1/4 of the time) and lets you manage ignoring, or formatting the rest of the disk on your own.
90
+
91
+ http://docs.openstack.org/essex/openstack-compute/starter/content/Launch_and_manage_instances-d1e1885.html
92
+
93
+ You may specify a custom network using the <tt>--network [LABEL_OR_ID]</tt> option. You can also remove the default internal ServiceNet and PublicNet networks by specifying the <tt>--no-default-networks</tt> switch.
94
+
84
95
  == knife rackspace server delete
85
96
 
86
- Deletes an existing server in the currently configured Rackspace Cloud account by the server/instance id. You can find the instance id by entering 'knife rackspace server list'. Please note - this does not delete the associated node and client objects from the Chef server unless you pass the <tt>-P</tt> or <tt>--purge</tt> command option. Using the <tt>--purge</tt> option with v2 nodes will attempt to delete the node and client by the name of the node.
97
+ Deletes an existing server in the currently configured Rackspace Cloud account by the server/instance id. You can find the instance id by entering <tt>knife rackspace server list</tt>. Please note - this does not delete the associated node and client objects from the Chef server unless you pass the <tt>-P</tt> or <tt>--purge</tt> command option. Using the <tt>--purge</tt> option with v2 nodes will attempt to delete the node and client by the name of the node.
87
98
 
88
99
  == knife rackspace server list
89
100
 
90
- Outputs a list of all servers in the currently configured Rackspace Cloud account. Please note - this shows all instances associated with the account, some of which may not be currently managed by the Chef server. You may need to use the <tt>--rackspace-version</tt> and possibly a <tt>--rackspace-endpoint</tt> options to see nodes in different Rackspace regions.
101
+ Outputs a list of all servers in the currently configured Rackspace Cloud account. Please note - this shows all instances associated with the account, some of which may not be currently managed by the Chef server. You may need to use the <tt>--rackspace-version</tt> and <tt>--rackspace-region</tt> options to see nodes in different Rackspace regions.
91
102
 
92
103
  == knife rackspace flavor list
93
104
 
94
- Outputs a list of all available flavors (available hardware configuration for a server) available to the currently configured Rackspace Cloud account. Each flavor has a unique combination of disk space, memory capacity and priority for CPU time. This data can be useful when choosing a flavor id to pass to the <tt>knife rackspace server create</tt> subcommand. You may need to use the <tt>--rackspace-version</tt> and possibly a <tt>--rackspace-endpoint</tt> options to see nodes in different Rackspace regions.
105
+ Outputs a list of all available flavors (available hardware configuration for a server) available to the currently configured Rackspace Cloud account. Each flavor has a unique combination of disk space, memory capacity and priority for CPU time. This data can be useful when choosing a flavor id to pass to the <tt>knife rackspace server create</tt> subcommand. You may need to use the <tt>--rackspace-version</tt> and <tt>--rackspace-region</tt> options to see nodes in different Rackspace regions.
95
106
 
96
107
  == knife rackspace image list
97
108
 
98
- Outputs a list of all available images available to the currently configured Rackspace Cloud account. An image is a collection of files used to create or rebuild a server. Rackspace provides a number of pre-built OS images by default. This data can be useful when choosing an image id to pass to the <tt>knife rackspace server create</tt> subcommand. You may need to use the <tt>--rackspace-version</tt> and possibly a <tt>--rackspace-endpoint</tt> options to see nodes in different Rackspace regions.
109
+ Outputs a list of all available images available to the currently configured Rackspace Cloud account. An image is a collection of files used to create or rebuild a server. Rackspace provides a number of pre-built OS images by default. This data can be useful when choosing an image id to pass to the <tt>knife rackspace server create</tt> subcommand. You may need to use the <tt>--rackspace-version</tt> and <tt>--rackspace-region</tt> options to see nodes in different Rackspace regions.
110
+
111
+ == knife rackspace network list
112
+
113
+ Outputs a list of available networks to the currently configured Rackspace Cloud account. Networks can be added at a server during the creation process using the <tt>--network [LABEL_OR_ID]</tt> option. Knife does not currently support adding a network to an existing server.
114
+
115
+ == knife rackspace network create
116
+
117
+ Creates a new cloud network. Both the label and the CIDR are required parameters which are specified using the <tt>--label LABEL</tt> and <tt>--cidr CIDR</tt> respectively. The CIDR should be in the form of 172.16.0.0/24 or 2001:DB8::/64. Refer to http://www.rackspace.com/knowledge_center/article/using-cidr-notation-in-cloud-networks for more information.
118
+
119
+ == knife rackspace network delete
99
120
 
121
+ Deletes one or more specified networks by id. The network must be detached from all hosts before it is deleted.
100
122
 
101
123
  = LICENSE:
102
124
 
@@ -16,8 +16,8 @@ Gem::Specification.new do |s|
16
16
  s.files = `git ls-files`.split("\n")
17
17
  s.test_files = `git ls-files -- {test,spec,features}/*`.split("\n")
18
18
  s.executables = `git ls-files -- bin/*`.split("\n").map{ |f| File.basename(f) }
19
- s.add_dependency "fog", "~> 1.6"
20
19
  s.add_dependency "knife-windows"
20
+ s.add_dependency "fog", "~> 1.12"
21
21
  s.add_dependency "chef", ">= 0.10.10"
22
22
  s.require_paths = ["lib"]
23
23
 
@@ -17,6 +17,7 @@
17
17
  #
18
18
 
19
19
  require 'chef/knife'
20
+ require 'fog'
20
21
 
21
22
  class Chef
22
23
  class Knife
@@ -56,14 +57,13 @@ class Chef
56
57
  option :rackspace_auth_url,
57
58
  :long => "--rackspace-auth-url URL",
58
59
  :description => "Your rackspace API auth url",
59
- :default => "auth.api.rackspacecloud.com",
60
60
  :proc => Proc.new { |url| Chef::Config[:knife][:rackspace_auth_url] = url }
61
61
 
62
- option :rackspace_endpoint,
63
- :long => "--rackspace-endpoint URL",
64
- :description => "Your rackspace API endpoint",
65
- :default => "https://dfw.servers.api.rackspacecloud.com/v2",
66
- :proc => Proc.new { |url| Chef::Config[:knife][:rackspace_endpoint] = url }
62
+ option :rackspace_region,
63
+ :long => "--rackspace-region REGION",
64
+ :description => "Your rackspace region",
65
+ :default => "dfw",
66
+ :proc => Proc.new { |region| Chef::Config[:knife][:rackspace_region] = region }
67
67
 
68
68
  option :file,
69
69
  :long => '--file DESTINATION-PATH=SOURCE-PATH',
@@ -81,12 +81,15 @@ class Chef
81
81
  Chef::Log.debug("rackspace_api_key #{Chef::Config[:knife][:rackspace_api_key]}")
82
82
  Chef::Log.debug("rackspace_username #{Chef::Config[:knife][:rackspace_username]}")
83
83
  Chef::Log.debug("rackspace_api_username #{Chef::Config[:knife][:rackspace_api_username]}")
84
- Chef::Log.debug("rackspace_auth_url #{Chef::Config[:knife][:rackspace_auth_url]} (config)")
85
- Chef::Log.debug("rackspace_auth_url #{config[:rackspace_auth_url]} (cli)")
86
- Chef::Log.debug("rackspace_endpoint #{Chef::Config[:knife][:rackspace_endpoint]} (config)")
87
- Chef::Log.debug("rackspace_endpoint #{config[:rackspace_endpoint]} (cli)")
88
- if (Chef::Config[:knife][:rackspace_version] == 'v1') || (config[:rackspace_version] == 'v1')
84
+ Chef::Log.debug("rackspace_auth_url #{Chef::Config[:knife][:rackspace_auth_url]}")
85
+ Chef::Log.debug("rackspace_auth_url #{config[:rackspace_api_auth_url]}")
86
+ Chef::Log.debug("rackspace_auth_url #{auth_endpoint} (using)")
87
+ Chef::Log.debug("rackspace_region #{Chef::Config[:knife][:rackspace_region]}")
88
+ Chef::Log.debug("rackspace_region #{config[:rackspace_region]}")
89
+
90
+ if version_one?
89
91
  Chef::Log.debug("rackspace v1")
92
+ region_warning_for_v1
90
93
  @connection ||= begin
91
94
  connection = Fog::Compute.new(connection_params({
92
95
  :version => 'v1'
@@ -96,19 +99,25 @@ class Chef
96
99
  Chef::Log.debug("rackspace v2")
97
100
  @connection ||= begin
98
101
  connection = Fog::Compute.new(connection_params({
99
- :version => 'v2',
100
- :rackspace_endpoint => Chef::Config[:knife][:rackspace_endpoint] || config[:rackspace_endpoint]
102
+ :version => 'v2'
101
103
  }))
102
104
  end
103
105
  end
104
106
  end
107
+
108
+ def region_warning_for_v1
109
+ if Chef::Config[:knife][:rackspace_region] || config[:rackspace_region]
110
+ Chef::Log.warn("Ignoring the rackspace_region parameter as it is only supported for Next Gen Cloud Servers (v2)")
111
+ end
112
+ end
105
113
 
106
114
  def connection_params(options={})
107
115
  hash = options.merge({
108
116
  :provider => 'Rackspace',
109
117
  :rackspace_api_key => Chef::Config[:knife][:rackspace_api_key],
110
118
  :rackspace_username => (Chef::Config[:knife][:rackspace_username] || Chef::Config[:knife][:rackspace_api_username]),
111
- :rackspace_auth_url => Chef::Config[:knife][:rackspace_auth_url] || config[:rackspace_auth_url]
119
+ :rackspace_auth_url => auth_endpoint,
120
+ :rackspace_region => locate_config_value(:rackspace_region)
112
121
  })
113
122
 
114
123
  hash[:connection_options] ||= {}
@@ -124,6 +133,12 @@ class Chef
124
133
  hash
125
134
  end
126
135
 
136
+ def auth_endpoint
137
+ url = locate_config_value(:rackspace_auth_url)
138
+ return url if url
139
+ (locate_config_value(:rackspace_region) == 'lon') ? ::Fog::Rackspace::UK_AUTH_ENDPOINT : ::Fog::Rackspace::US_AUTH_ENDPOINT
140
+ end
141
+
127
142
  def locate_config_value(key)
128
143
  key = key.to_sym
129
144
  Chef::Config[:knife][key] || config[key]
@@ -168,7 +183,7 @@ class Chef
168
183
  end
169
184
 
170
185
  def rackspace_api_version
171
- version = Chef::Config[:knife][:rackspace_version] || 'v2'
186
+ version = locate_config_value(:rackspace_version) || 'v2'
172
187
  version.downcase
173
188
  end
174
189
 
@@ -27,7 +27,7 @@ class Chef
27
27
 
28
28
  include Knife::RackspaceBase
29
29
  include Chef::Knife::WinrmBase
30
-
30
+
31
31
 
32
32
  deps do
33
33
  require 'fog'
@@ -81,6 +81,13 @@ class Chef
81
81
  :long => "--ssh-password PASSWORD",
82
82
  :description => "The ssh password"
83
83
 
84
+ option :ssh_port,
85
+ :short => "-p PORT",
86
+ :long => "--ssh-port PORT",
87
+ :description => "The ssh port",
88
+ :default => "22",
89
+ :proc => Proc.new { |key| Chef::Config[:knife][:ssh_port] = key }
90
+
84
91
  option :identity_file,
85
92
  :short => "-i IDENTITY_FILE",
86
93
  :long => "--identity-file IDENTITY_FILE",
@@ -157,23 +164,29 @@ class Chef
157
164
  Chef::Config[:knife][:rackspace_networks] ||= []
158
165
  (Chef::Config[:knife][:rackspace_networks] << name).uniq!
159
166
  }
160
-
167
+
161
168
  option :bootstrap_protocol,
162
- :long => "--bootstrap-protocol protocol",
163
- :description => "Protocol to bootstrap Windows servers. options: winrm",
164
- :default => nil
169
+ :long => "--bootstrap-protocol protocol",
170
+ :description => "Protocol to bootstrap Windows servers. options: winrm",
171
+ :default => nil
165
172
 
166
173
  option :server_create_timeout,
167
- :long => "--server-create-timeout timeout",
168
- :description => "How long to wait until the server is ready; default is 600 seconds",
169
- :default => 600,
170
- :proc => Proc.new { |v| Chef::Config[:knife][:server_create_timeouts] = v}
174
+ :long => "--server-create-timeout timeout",
175
+ :description => "How long to wait until the server is ready; default is 600 seconds",
176
+ :default => 600,
177
+ :proc => Proc.new { |v| Chef::Config[:knife][:server_create_timeouts] = v}
171
178
 
172
179
  option :bootstrap_proxy,
173
- :long => "--bootstrap-proxy PROXY_URL",
174
- :description => "The proxy server for the node being bootstrapped",
175
- :proc => Proc.new { |v| Chef::Config[:knife][:bootstrap_proxy] = v }
176
-
180
+ :long => "--bootstrap-proxy PROXY_URL",
181
+ :description => "The proxy server for the node being bootstrapped",
182
+ :proc => Proc.new { |v| Chef::Config[:knife][:bootstrap_proxy] = v }
183
+
184
+ option :rackspace_disk_config,
185
+ :long => "--rackspace-disk-config DISKCONFIG",
186
+ :description => "Specify if want to manage your own disk partitioning scheme (AUTO or MANUAL), default is AUTO",
187
+ :proc => Proc.new { |k| Chef::Config[:knife][:rackspace_disk_config] = k },
188
+ :default => "AUTO"
189
+
177
190
 
178
191
  def load_winrm_deps
179
192
  require 'winrm'
@@ -182,9 +195,10 @@ class Chef
182
195
  require 'chef/knife/core/windows_bootstrap_context'
183
196
  require 'chef/knife/winrm'
184
197
  end
185
-
198
+
186
199
  def tcp_test_ssh(hostname)
187
- tcp_socket = TCPSocket.new(hostname, 22)
200
+ ssh_port = Chef::Config[:knife][:ssh_port] || config[:ssh_port]
201
+ tcp_socket = TCPSocket.new(hostname, ssh_port)
188
202
  readable = IO.select([tcp_socket], nil, nil, 5)
189
203
  if readable
190
204
  Chef::Log.debug("sshd accepting connections on #{hostname}, banner is #{tcp_socket.gets}")
@@ -216,7 +230,7 @@ class Chef
216
230
  end
217
231
  [dest, src]
218
232
  end
219
-
233
+
220
234
  def encode_file(file)
221
235
  begin
222
236
  filename = File.expand_path(file)
@@ -227,7 +241,7 @@ class Chef
227
241
  end
228
242
  Base64.encode64(content)
229
243
  end
230
-
244
+
231
245
  def files
232
246
  return {} unless Chef::Config[:knife][:file]
233
247
 
@@ -235,7 +249,7 @@ class Chef
235
249
  Chef::Config[:knife][:file].each do |arg|
236
250
  dest, src = parse_file_argument(arg)
237
251
  Chef::Log.debug("Inject file #{src} into #{dest}")
238
- files << {
252
+ files << {
239
253
  :path => dest,
240
254
  :contents => encode_file(src)
241
255
  }
@@ -244,7 +258,7 @@ class Chef
244
258
  end
245
259
 
246
260
 
247
-
261
+
248
262
  def tcp_test_winrm(hostname, port)
249
263
  TCPSocket.new(hostname, port)
250
264
  return true
@@ -265,7 +279,7 @@ class Chef
265
279
  sleep 2
266
280
  false
267
281
  end
268
-
282
+
269
283
 
270
284
  def run
271
285
  $stdout.sync = true
@@ -274,11 +288,11 @@ class Chef
274
288
  ui.error("You have not provided a valid image value. Please note the short option for this value recently changed from '-i' to '-I'.")
275
289
  exit 1
276
290
  end
277
-
291
+
278
292
  if locate_config_value(:bootstrap_protocol) == 'winrm'
279
293
  load_winrm_deps
280
294
  end
281
-
295
+
282
296
  node_name = get_node_name(config[:chef_node_name] || config[:server_name])
283
297
  networks = get_networks(Chef::Config[:knife][:rackspace_networks])
284
298
 
@@ -287,11 +301,15 @@ class Chef
287
301
  :image_id => Chef::Config[:knife][:image],
288
302
  :flavor_id => locate_config_value(:flavor),
289
303
  :metadata => Chef::Config[:knife][:rackspace_metadata],
304
+ :disk_config => Chef::Config[:knife][:rackspace_disk_config],
290
305
  :personality => files
291
306
  )
292
- server.save(
293
- :networks => networks
294
- )
307
+
308
+ if version_one?
309
+ server.save
310
+ else
311
+ server.save(:networks => networks)
312
+ end
295
313
 
296
314
  msg_pair("Instance ID", server.id)
297
315
  msg_pair("Host ID", server.host_id)
@@ -304,7 +322,7 @@ class Chef
304
322
  end
305
323
 
306
324
  print "\n#{ui.color("Waiting server", :magenta)}"
307
-
325
+
308
326
  server.wait_for(Integer(locate_config_value(:server_create_timeout))) { print "."; ready? }
309
327
  # wait for it to be ready to do stuff
310
328
 
@@ -358,13 +376,14 @@ class Chef
358
376
  bootstrap.name_args = [bootstrap_ip_address]
359
377
  bootstrap.config[:ssh_user] = config[:ssh_user] || "root"
360
378
  bootstrap.config[:ssh_password] = server.password
379
+ bootstrap.config[:ssh_port] = Chef::Config[:knife][:ssh_port] || config[:ssh_port]
361
380
  bootstrap.config[:identity_file] = config[:identity_file]
362
381
  bootstrap.config[:host_key_verify] = config[:host_key_verify]
363
382
  # bootstrap will run as root...sudo (by default) also messes up Ohai on CentOS boxes
364
383
  bootstrap.config[:use_sudo] = true unless config[:ssh_user] == 'root'
365
384
  bootstrap_common_params(bootstrap, server)
366
385
  end
367
-
386
+
368
387
  def bootstrap_common_params(bootstrap, server)
369
388
  bootstrap.config[:environment] = config[:environment]
370
389
  bootstrap.config[:run_list] = config[:run_list]
@@ -380,12 +399,12 @@ class Chef
380
399
  bootstrap.config[:first_boot_attributes] = config[:first_boot_attributes]
381
400
  bootstrap.config[:bootstrap_proxy] = locate_config_value(:bootstrap_proxy)
382
401
  bootstrap.config[:encrypted_data_bag_secret] = config[:encrypted_data_bag_secret]
383
- bootstrap.config[:encrypted_data_bag_secret_file] = config[:encrypted_data_bag_secret_file]
402
+ bootstrap.config[:encrypted_data_bag_secret_file] = config[:encrypted_data_bag_secret_file]
384
403
  Chef::Config[:knife][:hints] ||= {}
385
404
  Chef::Config[:knife][:hints]["rackspace"] ||= {}
386
405
  bootstrap
387
406
  end
388
-
407
+
389
408
  def bootstrap_for_windows_node(server, bootstrap_ip_address)
390
409
  bootstrap = Chef::Knife::BootstrapWindowsWinrm.new
391
410
  bootstrap.name_args = [bootstrap_ip_address]
@@ -416,7 +435,7 @@ class Chef
416
435
  nets = []
417
436
  end
418
437
  available_networks = connection.networks.all
419
-
438
+
420
439
  names.each do |name|
421
440
  net = available_networks.detect{|n| n.label == name || n.id == name}
422
441
  if(net)
@@ -1,6 +1,6 @@
1
1
  module Knife
2
2
  module Rackspace
3
- VERSION = "0.7.0"
3
+ VERSION = "0.8.0"
4
4
  MAJOR, MINOR, TINY = VERSION.split('.')
5
5
  end
6
6
  end