knife-rackspace 0.7.0 → 0.8.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +15 -0
- data/.travis.yml +0 -1
- data/CHANGELOG.md +7 -0
- data/README.rdoc +38 -16
- data/knife-rackspace.gemspec +1 -1
- data/lib/chef/knife/rackspace_base.rb +30 -15
- data/lib/chef/knife/rackspace_server_create.rb +49 -30
- data/lib/knife-rackspace/version.rb +1 -1
- data/spec/cassettes/v1/should_list_images.yml +38 -45
- data/spec/cassettes/v1/should_list_server_flavors.yml +87 -94
- data/spec/cassettes/v2/should_list_images.yml +150 -147
- data/spec/cassettes/v2/should_list_server_flavors.yml +60 -67
- data/spec/unit/rackspace_base_spec.rb +38 -0
- metadata +17 -31
checksums.yaml
ADDED
@@ -0,0 +1,15 @@
|
|
1
|
+
---
|
2
|
+
!binary "U0hBMQ==":
|
3
|
+
metadata.gz: !binary |-
|
4
|
+
ODUxNTU1NTRiNTE4MDg2MTczMDM3YmRjN2Q5ZGQyN2M0NWZiZDA4OA==
|
5
|
+
data.tar.gz: !binary |-
|
6
|
+
OWJlMTYxZjM0MTJiYmYxYzFjNTQ1NjRkNWVkM2U4MTY4ZTJiYTQ2Mw==
|
7
|
+
!binary "U0hBNTEy":
|
8
|
+
metadata.gz: !binary |-
|
9
|
+
NGFhYjRmNzY0ZDRlMTNkMGU3YTA2MTFjN2ZlYWQ0ZDRmZmQzNjYzYjY4NTI1
|
10
|
+
ZTQ3OTZmOTA3ZTcxMDMzODA5MzVhOGFiMjhiYjkwNjYzYzVhYTA1ZmQzMzEx
|
11
|
+
NWZjZGU4NjkxMzA5ZWRjMzFhNWIwZTJiZDUxNTNiNWFlYTY4Y2U=
|
12
|
+
data.tar.gz: !binary |-
|
13
|
+
MWJmZWQwMzIzZWJmZGM5NDU1ZDk1NGVmZTAxOTkwNTRlNmVkYjM3Y2E5NmJl
|
14
|
+
MzkwNjBhMDhjOGI4OTJhNDg5YWNhZGI5NmUxMTQ3YzgxZWY3YzI3MGU5Y2M3
|
15
|
+
YjdmODdlYzc4OWViYTZmNzdiMzVkZTg4MjMwNzg3NTg3YmZiY2E=
|
data/.travis.yml
CHANGED
data/CHANGELOG.md
CHANGED
@@ -1,3 +1,10 @@
|
|
1
|
+
## v0.8.0
|
2
|
+
* KNIFE-68 enable ability to modify ssh port number
|
3
|
+
* KNIFE-180 include option to pass :disk_config option to fog for new node bootstrap
|
4
|
+
* KNIFE-312 updated to reflect new configuration options in Fog 1.10.1
|
5
|
+
* KNIFE-314 provisioning First Gen Cloud Server is broken
|
6
|
+
* KNIFE-315 fixed DEPRECATION warnings related to use of old rackpace_auth_url and removed rackspace_endpoint
|
7
|
+
|
1
8
|
## v0.7.0
|
2
9
|
* KNIFE_RACKSPACE-32 Ensure hint file is created to improve Ohai detection.
|
3
10
|
* KNIFE-181 correct mixed use of 'rackspace_auth_url' and 'rackspace_api_auth_url'. Only 'rackspace_auth_url' is correct.
|
data/README.rdoc
CHANGED
@@ -16,6 +16,17 @@ This plugin is distributed as a Ruby Gem. To install it, run:
|
|
16
16
|
|
17
17
|
Depending on your system's configuration, you may need to run this command with root privileges.
|
18
18
|
|
19
|
+
Ensure only the latest knife-rackspace gem and no other is installed. In some cases having older versions of the gem
|
20
|
+
will cause the new OpenStack functionality not to function properly. To check:
|
21
|
+
|
22
|
+
$> gem list --local | grep knife-rackspace
|
23
|
+
knife-rackspace (0.6.2, 0.5.12)
|
24
|
+
$> gem uninstall knife-rackspace -v "= 0.5.12"
|
25
|
+
Successfully uninstalled knife-rackspace-0.5.12
|
26
|
+
$> gem list --local | grep knife-rackspace
|
27
|
+
knife-rackspace (0.6.2)
|
28
|
+
|
29
|
+
|
19
30
|
= CONFIGURATION:
|
20
31
|
|
21
32
|
In order to communicate with the Rackspace Cloud API you will have to tell Knife about your Username and API Key. The easiest way to accomplish this is to create some entries in your <tt>knife.rb</tt> file:
|
@@ -37,28 +48,22 @@ To select for the previous Rackspace API (aka 'v1'), you can use the <tt>--racks
|
|
37
48
|
|
38
49
|
knife[:rackspace_version] = 'v1'
|
39
50
|
|
40
|
-
This plugin also has support for authenticating against an alternate API Auth URL. This is useful if you are a
|
51
|
+
This plugin also has support for authenticating against an alternate API Auth URL. This is useful if you are a using a custom endpoint, here is an example of configuring your <tt>knife.rb</tt>:
|
41
52
|
|
42
|
-
knife[:rackspace_auth_url] = "
|
53
|
+
knife[:rackspace_auth_url] = "auth.my-custom-endpoint.com"
|
43
54
|
|
44
|
-
This plugin also has support for specifying which region to create servers into:
|
45
55
|
|
46
|
-
|
47
|
-
|
48
|
-
valid options include:
|
49
|
-
DFW_ENDPOINT = 'https://dfw.servers.api.rackspacecloud.com/v2'
|
50
|
-
ORD_ENDPOINT = 'https://ord.servers.api.rackspacecloud.com/v2'
|
51
|
-
LON_ENDPOINT = 'https://lon.servers.api.rackspacecloud.com/v2'
|
56
|
+
Different regions can be specified by using the `--rackspace-region` switch or using the `knife[:rackspace_region]` in the knife.rb file. Valid regions include :dfw, :ord, :lon, and :syd.
|
52
57
|
|
53
58
|
If you are behind a proxy you can specify it in the knife.rb file as follows:
|
54
59
|
|
55
|
-
|
60
|
+
https_proxy https://PROXY_IP_ADDRESS:PORT
|
56
61
|
|
57
62
|
SSL certificate verification can be disabled by include the following in your knife.rb file:
|
58
63
|
|
59
|
-
|
64
|
+
knife[:ssl_verify_peer] = false
|
60
65
|
|
61
|
-
Additionally the following options may be set in your
|
66
|
+
Additionally the following options may be set in your <tt>knife.rb</tt>:
|
62
67
|
|
63
68
|
* flavor
|
64
69
|
* image
|
@@ -81,22 +86,39 @@ Files can be injected onto the provisioned system using the <tt>--file</tt> swit
|
|
81
86
|
|
82
87
|
Note: You can only inject text files and the maximum destination path is 255 characters.
|
83
88
|
|
89
|
+
You may specify if want to manage your disk partitioning scheme with the <tt>--rackspace-disk-config DISKCONFIG</tt> option. If you bootstrap a `v2` node and leave this set to the default "AUTO", larger nodes take longer to bootstrap as it grows the disk from 10G to fill the full amount of local disk provided. This option allows you to pass "MANUAL" - which give you a node (in 1/2 to 1/4 of the time) and lets you manage ignoring, or formatting the rest of the disk on your own.
|
90
|
+
|
91
|
+
http://docs.openstack.org/essex/openstack-compute/starter/content/Launch_and_manage_instances-d1e1885.html
|
92
|
+
|
93
|
+
You may specify a custom network using the <tt>--network [LABEL_OR_ID]</tt> option. You can also remove the default internal ServiceNet and PublicNet networks by specifying the <tt>--no-default-networks</tt> switch.
|
94
|
+
|
84
95
|
== knife rackspace server delete
|
85
96
|
|
86
|
-
Deletes an existing server in the currently configured Rackspace Cloud account by the server/instance id. You can find the instance id by entering
|
97
|
+
Deletes an existing server in the currently configured Rackspace Cloud account by the server/instance id. You can find the instance id by entering <tt>knife rackspace server list</tt>. Please note - this does not delete the associated node and client objects from the Chef server unless you pass the <tt>-P</tt> or <tt>--purge</tt> command option. Using the <tt>--purge</tt> option with v2 nodes will attempt to delete the node and client by the name of the node.
|
87
98
|
|
88
99
|
== knife rackspace server list
|
89
100
|
|
90
|
-
Outputs a list of all servers in the currently configured Rackspace Cloud account. Please note - this shows all instances associated with the account, some of which may not be currently managed by the Chef server. You may need to use the <tt>--rackspace-version</tt> and
|
101
|
+
Outputs a list of all servers in the currently configured Rackspace Cloud account. Please note - this shows all instances associated with the account, some of which may not be currently managed by the Chef server. You may need to use the <tt>--rackspace-version</tt> and <tt>--rackspace-region</tt> options to see nodes in different Rackspace regions.
|
91
102
|
|
92
103
|
== knife rackspace flavor list
|
93
104
|
|
94
|
-
Outputs a list of all available flavors (available hardware configuration for a server) available to the currently configured Rackspace Cloud account. Each flavor has a unique combination of disk space, memory capacity and priority for CPU time. This data can be useful when choosing a flavor id to pass to the <tt>knife rackspace server create</tt> subcommand. You may need to use the <tt>--rackspace-version</tt> and
|
105
|
+
Outputs a list of all available flavors (available hardware configuration for a server) available to the currently configured Rackspace Cloud account. Each flavor has a unique combination of disk space, memory capacity and priority for CPU time. This data can be useful when choosing a flavor id to pass to the <tt>knife rackspace server create</tt> subcommand. You may need to use the <tt>--rackspace-version</tt> and <tt>--rackspace-region</tt> options to see nodes in different Rackspace regions.
|
95
106
|
|
96
107
|
== knife rackspace image list
|
97
108
|
|
98
|
-
Outputs a list of all available images available to the currently configured Rackspace Cloud account. An image is a collection of files used to create or rebuild a server. Rackspace provides a number of pre-built OS images by default. This data can be useful when choosing an image id to pass to the <tt>knife rackspace server create</tt> subcommand. You may need to use the <tt>--rackspace-version</tt> and
|
109
|
+
Outputs a list of all available images available to the currently configured Rackspace Cloud account. An image is a collection of files used to create or rebuild a server. Rackspace provides a number of pre-built OS images by default. This data can be useful when choosing an image id to pass to the <tt>knife rackspace server create</tt> subcommand. You may need to use the <tt>--rackspace-version</tt> and <tt>--rackspace-region</tt> options to see nodes in different Rackspace regions.
|
110
|
+
|
111
|
+
== knife rackspace network list
|
112
|
+
|
113
|
+
Outputs a list of available networks to the currently configured Rackspace Cloud account. Networks can be added at a server during the creation process using the <tt>--network [LABEL_OR_ID]</tt> option. Knife does not currently support adding a network to an existing server.
|
114
|
+
|
115
|
+
== knife rackspace network create
|
116
|
+
|
117
|
+
Creates a new cloud network. Both the label and the CIDR are required parameters which are specified using the <tt>--label LABEL</tt> and <tt>--cidr CIDR</tt> respectively. The CIDR should be in the form of 172.16.0.0/24 or 2001:DB8::/64. Refer to http://www.rackspace.com/knowledge_center/article/using-cidr-notation-in-cloud-networks for more information.
|
118
|
+
|
119
|
+
== knife rackspace network delete
|
99
120
|
|
121
|
+
Deletes one or more specified networks by id. The network must be detached from all hosts before it is deleted.
|
100
122
|
|
101
123
|
= LICENSE:
|
102
124
|
|
data/knife-rackspace.gemspec
CHANGED
@@ -16,8 +16,8 @@ Gem::Specification.new do |s|
|
|
16
16
|
s.files = `git ls-files`.split("\n")
|
17
17
|
s.test_files = `git ls-files -- {test,spec,features}/*`.split("\n")
|
18
18
|
s.executables = `git ls-files -- bin/*`.split("\n").map{ |f| File.basename(f) }
|
19
|
-
s.add_dependency "fog", "~> 1.6"
|
20
19
|
s.add_dependency "knife-windows"
|
20
|
+
s.add_dependency "fog", "~> 1.12"
|
21
21
|
s.add_dependency "chef", ">= 0.10.10"
|
22
22
|
s.require_paths = ["lib"]
|
23
23
|
|
@@ -17,6 +17,7 @@
|
|
17
17
|
#
|
18
18
|
|
19
19
|
require 'chef/knife'
|
20
|
+
require 'fog'
|
20
21
|
|
21
22
|
class Chef
|
22
23
|
class Knife
|
@@ -56,14 +57,13 @@ class Chef
|
|
56
57
|
option :rackspace_auth_url,
|
57
58
|
:long => "--rackspace-auth-url URL",
|
58
59
|
:description => "Your rackspace API auth url",
|
59
|
-
:default => "auth.api.rackspacecloud.com",
|
60
60
|
:proc => Proc.new { |url| Chef::Config[:knife][:rackspace_auth_url] = url }
|
61
61
|
|
62
|
-
option :
|
63
|
-
:long => "--rackspace-
|
64
|
-
:description => "Your rackspace
|
65
|
-
:default => "
|
66
|
-
:proc => Proc.new { |
|
62
|
+
option :rackspace_region,
|
63
|
+
:long => "--rackspace-region REGION",
|
64
|
+
:description => "Your rackspace region",
|
65
|
+
:default => "dfw",
|
66
|
+
:proc => Proc.new { |region| Chef::Config[:knife][:rackspace_region] = region }
|
67
67
|
|
68
68
|
option :file,
|
69
69
|
:long => '--file DESTINATION-PATH=SOURCE-PATH',
|
@@ -81,12 +81,15 @@ class Chef
|
|
81
81
|
Chef::Log.debug("rackspace_api_key #{Chef::Config[:knife][:rackspace_api_key]}")
|
82
82
|
Chef::Log.debug("rackspace_username #{Chef::Config[:knife][:rackspace_username]}")
|
83
83
|
Chef::Log.debug("rackspace_api_username #{Chef::Config[:knife][:rackspace_api_username]}")
|
84
|
-
Chef::Log.debug("rackspace_auth_url #{Chef::Config[:knife][:rackspace_auth_url]}
|
85
|
-
Chef::Log.debug("rackspace_auth_url #{config[:
|
86
|
-
Chef::Log.debug("
|
87
|
-
Chef::Log.debug("
|
88
|
-
|
84
|
+
Chef::Log.debug("rackspace_auth_url #{Chef::Config[:knife][:rackspace_auth_url]}")
|
85
|
+
Chef::Log.debug("rackspace_auth_url #{config[:rackspace_api_auth_url]}")
|
86
|
+
Chef::Log.debug("rackspace_auth_url #{auth_endpoint} (using)")
|
87
|
+
Chef::Log.debug("rackspace_region #{Chef::Config[:knife][:rackspace_region]}")
|
88
|
+
Chef::Log.debug("rackspace_region #{config[:rackspace_region]}")
|
89
|
+
|
90
|
+
if version_one?
|
89
91
|
Chef::Log.debug("rackspace v1")
|
92
|
+
region_warning_for_v1
|
90
93
|
@connection ||= begin
|
91
94
|
connection = Fog::Compute.new(connection_params({
|
92
95
|
:version => 'v1'
|
@@ -96,19 +99,25 @@ class Chef
|
|
96
99
|
Chef::Log.debug("rackspace v2")
|
97
100
|
@connection ||= begin
|
98
101
|
connection = Fog::Compute.new(connection_params({
|
99
|
-
:version => 'v2'
|
100
|
-
:rackspace_endpoint => Chef::Config[:knife][:rackspace_endpoint] || config[:rackspace_endpoint]
|
102
|
+
:version => 'v2'
|
101
103
|
}))
|
102
104
|
end
|
103
105
|
end
|
104
106
|
end
|
107
|
+
|
108
|
+
def region_warning_for_v1
|
109
|
+
if Chef::Config[:knife][:rackspace_region] || config[:rackspace_region]
|
110
|
+
Chef::Log.warn("Ignoring the rackspace_region parameter as it is only supported for Next Gen Cloud Servers (v2)")
|
111
|
+
end
|
112
|
+
end
|
105
113
|
|
106
114
|
def connection_params(options={})
|
107
115
|
hash = options.merge({
|
108
116
|
:provider => 'Rackspace',
|
109
117
|
:rackspace_api_key => Chef::Config[:knife][:rackspace_api_key],
|
110
118
|
:rackspace_username => (Chef::Config[:knife][:rackspace_username] || Chef::Config[:knife][:rackspace_api_username]),
|
111
|
-
:rackspace_auth_url =>
|
119
|
+
:rackspace_auth_url => auth_endpoint,
|
120
|
+
:rackspace_region => locate_config_value(:rackspace_region)
|
112
121
|
})
|
113
122
|
|
114
123
|
hash[:connection_options] ||= {}
|
@@ -124,6 +133,12 @@ class Chef
|
|
124
133
|
hash
|
125
134
|
end
|
126
135
|
|
136
|
+
def auth_endpoint
|
137
|
+
url = locate_config_value(:rackspace_auth_url)
|
138
|
+
return url if url
|
139
|
+
(locate_config_value(:rackspace_region) == 'lon') ? ::Fog::Rackspace::UK_AUTH_ENDPOINT : ::Fog::Rackspace::US_AUTH_ENDPOINT
|
140
|
+
end
|
141
|
+
|
127
142
|
def locate_config_value(key)
|
128
143
|
key = key.to_sym
|
129
144
|
Chef::Config[:knife][key] || config[key]
|
@@ -168,7 +183,7 @@ class Chef
|
|
168
183
|
end
|
169
184
|
|
170
185
|
def rackspace_api_version
|
171
|
-
version =
|
186
|
+
version = locate_config_value(:rackspace_version) || 'v2'
|
172
187
|
version.downcase
|
173
188
|
end
|
174
189
|
|
@@ -27,7 +27,7 @@ class Chef
|
|
27
27
|
|
28
28
|
include Knife::RackspaceBase
|
29
29
|
include Chef::Knife::WinrmBase
|
30
|
-
|
30
|
+
|
31
31
|
|
32
32
|
deps do
|
33
33
|
require 'fog'
|
@@ -81,6 +81,13 @@ class Chef
|
|
81
81
|
:long => "--ssh-password PASSWORD",
|
82
82
|
:description => "The ssh password"
|
83
83
|
|
84
|
+
option :ssh_port,
|
85
|
+
:short => "-p PORT",
|
86
|
+
:long => "--ssh-port PORT",
|
87
|
+
:description => "The ssh port",
|
88
|
+
:default => "22",
|
89
|
+
:proc => Proc.new { |key| Chef::Config[:knife][:ssh_port] = key }
|
90
|
+
|
84
91
|
option :identity_file,
|
85
92
|
:short => "-i IDENTITY_FILE",
|
86
93
|
:long => "--identity-file IDENTITY_FILE",
|
@@ -157,23 +164,29 @@ class Chef
|
|
157
164
|
Chef::Config[:knife][:rackspace_networks] ||= []
|
158
165
|
(Chef::Config[:knife][:rackspace_networks] << name).uniq!
|
159
166
|
}
|
160
|
-
|
167
|
+
|
161
168
|
option :bootstrap_protocol,
|
162
|
-
|
163
|
-
|
164
|
-
|
169
|
+
:long => "--bootstrap-protocol protocol",
|
170
|
+
:description => "Protocol to bootstrap Windows servers. options: winrm",
|
171
|
+
:default => nil
|
165
172
|
|
166
173
|
option :server_create_timeout,
|
167
|
-
|
168
|
-
|
169
|
-
|
170
|
-
|
174
|
+
:long => "--server-create-timeout timeout",
|
175
|
+
:description => "How long to wait until the server is ready; default is 600 seconds",
|
176
|
+
:default => 600,
|
177
|
+
:proc => Proc.new { |v| Chef::Config[:knife][:server_create_timeouts] = v}
|
171
178
|
|
172
179
|
option :bootstrap_proxy,
|
173
|
-
|
174
|
-
|
175
|
-
|
176
|
-
|
180
|
+
:long => "--bootstrap-proxy PROXY_URL",
|
181
|
+
:description => "The proxy server for the node being bootstrapped",
|
182
|
+
:proc => Proc.new { |v| Chef::Config[:knife][:bootstrap_proxy] = v }
|
183
|
+
|
184
|
+
option :rackspace_disk_config,
|
185
|
+
:long => "--rackspace-disk-config DISKCONFIG",
|
186
|
+
:description => "Specify if want to manage your own disk partitioning scheme (AUTO or MANUAL), default is AUTO",
|
187
|
+
:proc => Proc.new { |k| Chef::Config[:knife][:rackspace_disk_config] = k },
|
188
|
+
:default => "AUTO"
|
189
|
+
|
177
190
|
|
178
191
|
def load_winrm_deps
|
179
192
|
require 'winrm'
|
@@ -182,9 +195,10 @@ class Chef
|
|
182
195
|
require 'chef/knife/core/windows_bootstrap_context'
|
183
196
|
require 'chef/knife/winrm'
|
184
197
|
end
|
185
|
-
|
198
|
+
|
186
199
|
def tcp_test_ssh(hostname)
|
187
|
-
|
200
|
+
ssh_port = Chef::Config[:knife][:ssh_port] || config[:ssh_port]
|
201
|
+
tcp_socket = TCPSocket.new(hostname, ssh_port)
|
188
202
|
readable = IO.select([tcp_socket], nil, nil, 5)
|
189
203
|
if readable
|
190
204
|
Chef::Log.debug("sshd accepting connections on #{hostname}, banner is #{tcp_socket.gets}")
|
@@ -216,7 +230,7 @@ class Chef
|
|
216
230
|
end
|
217
231
|
[dest, src]
|
218
232
|
end
|
219
|
-
|
233
|
+
|
220
234
|
def encode_file(file)
|
221
235
|
begin
|
222
236
|
filename = File.expand_path(file)
|
@@ -227,7 +241,7 @@ class Chef
|
|
227
241
|
end
|
228
242
|
Base64.encode64(content)
|
229
243
|
end
|
230
|
-
|
244
|
+
|
231
245
|
def files
|
232
246
|
return {} unless Chef::Config[:knife][:file]
|
233
247
|
|
@@ -235,7 +249,7 @@ class Chef
|
|
235
249
|
Chef::Config[:knife][:file].each do |arg|
|
236
250
|
dest, src = parse_file_argument(arg)
|
237
251
|
Chef::Log.debug("Inject file #{src} into #{dest}")
|
238
|
-
files << {
|
252
|
+
files << {
|
239
253
|
:path => dest,
|
240
254
|
:contents => encode_file(src)
|
241
255
|
}
|
@@ -244,7 +258,7 @@ class Chef
|
|
244
258
|
end
|
245
259
|
|
246
260
|
|
247
|
-
|
261
|
+
|
248
262
|
def tcp_test_winrm(hostname, port)
|
249
263
|
TCPSocket.new(hostname, port)
|
250
264
|
return true
|
@@ -265,7 +279,7 @@ class Chef
|
|
265
279
|
sleep 2
|
266
280
|
false
|
267
281
|
end
|
268
|
-
|
282
|
+
|
269
283
|
|
270
284
|
def run
|
271
285
|
$stdout.sync = true
|
@@ -274,11 +288,11 @@ class Chef
|
|
274
288
|
ui.error("You have not provided a valid image value. Please note the short option for this value recently changed from '-i' to '-I'.")
|
275
289
|
exit 1
|
276
290
|
end
|
277
|
-
|
291
|
+
|
278
292
|
if locate_config_value(:bootstrap_protocol) == 'winrm'
|
279
293
|
load_winrm_deps
|
280
294
|
end
|
281
|
-
|
295
|
+
|
282
296
|
node_name = get_node_name(config[:chef_node_name] || config[:server_name])
|
283
297
|
networks = get_networks(Chef::Config[:knife][:rackspace_networks])
|
284
298
|
|
@@ -287,11 +301,15 @@ class Chef
|
|
287
301
|
:image_id => Chef::Config[:knife][:image],
|
288
302
|
:flavor_id => locate_config_value(:flavor),
|
289
303
|
:metadata => Chef::Config[:knife][:rackspace_metadata],
|
304
|
+
:disk_config => Chef::Config[:knife][:rackspace_disk_config],
|
290
305
|
:personality => files
|
291
306
|
)
|
292
|
-
|
293
|
-
|
294
|
-
|
307
|
+
|
308
|
+
if version_one?
|
309
|
+
server.save
|
310
|
+
else
|
311
|
+
server.save(:networks => networks)
|
312
|
+
end
|
295
313
|
|
296
314
|
msg_pair("Instance ID", server.id)
|
297
315
|
msg_pair("Host ID", server.host_id)
|
@@ -304,7 +322,7 @@ class Chef
|
|
304
322
|
end
|
305
323
|
|
306
324
|
print "\n#{ui.color("Waiting server", :magenta)}"
|
307
|
-
|
325
|
+
|
308
326
|
server.wait_for(Integer(locate_config_value(:server_create_timeout))) { print "."; ready? }
|
309
327
|
# wait for it to be ready to do stuff
|
310
328
|
|
@@ -358,13 +376,14 @@ class Chef
|
|
358
376
|
bootstrap.name_args = [bootstrap_ip_address]
|
359
377
|
bootstrap.config[:ssh_user] = config[:ssh_user] || "root"
|
360
378
|
bootstrap.config[:ssh_password] = server.password
|
379
|
+
bootstrap.config[:ssh_port] = Chef::Config[:knife][:ssh_port] || config[:ssh_port]
|
361
380
|
bootstrap.config[:identity_file] = config[:identity_file]
|
362
381
|
bootstrap.config[:host_key_verify] = config[:host_key_verify]
|
363
382
|
# bootstrap will run as root...sudo (by default) also messes up Ohai on CentOS boxes
|
364
383
|
bootstrap.config[:use_sudo] = true unless config[:ssh_user] == 'root'
|
365
384
|
bootstrap_common_params(bootstrap, server)
|
366
385
|
end
|
367
|
-
|
386
|
+
|
368
387
|
def bootstrap_common_params(bootstrap, server)
|
369
388
|
bootstrap.config[:environment] = config[:environment]
|
370
389
|
bootstrap.config[:run_list] = config[:run_list]
|
@@ -380,12 +399,12 @@ class Chef
|
|
380
399
|
bootstrap.config[:first_boot_attributes] = config[:first_boot_attributes]
|
381
400
|
bootstrap.config[:bootstrap_proxy] = locate_config_value(:bootstrap_proxy)
|
382
401
|
bootstrap.config[:encrypted_data_bag_secret] = config[:encrypted_data_bag_secret]
|
383
|
-
bootstrap.config[:encrypted_data_bag_secret_file] = config[:encrypted_data_bag_secret_file]
|
402
|
+
bootstrap.config[:encrypted_data_bag_secret_file] = config[:encrypted_data_bag_secret_file]
|
384
403
|
Chef::Config[:knife][:hints] ||= {}
|
385
404
|
Chef::Config[:knife][:hints]["rackspace"] ||= {}
|
386
405
|
bootstrap
|
387
406
|
end
|
388
|
-
|
407
|
+
|
389
408
|
def bootstrap_for_windows_node(server, bootstrap_ip_address)
|
390
409
|
bootstrap = Chef::Knife::BootstrapWindowsWinrm.new
|
391
410
|
bootstrap.name_args = [bootstrap_ip_address]
|
@@ -416,7 +435,7 @@ class Chef
|
|
416
435
|
nets = []
|
417
436
|
end
|
418
437
|
available_networks = connection.networks.all
|
419
|
-
|
438
|
+
|
420
439
|
names.each do |name|
|
421
440
|
net = available_networks.detect{|n| n.label == name || n.id == name}
|
422
441
|
if(net)
|