razor-client 1.7.0 → 1.8.1
Sign up to get free protection for your applications and to get access to all the features.
- data/NEWS.md +12 -0
- data/bin/razor +19 -23
- data/lib/razor/cli/command.rb +3 -3
- data/lib/razor/cli/navigate.rb +55 -1
- data/lib/razor/cli/parse.rb +15 -11
- data/lib/razor/cli/version.rb +1 -1
- data/spec/cli/command_spec.rb +10 -1
- data/spec/cli/navigate_spec.rb +52 -4
- data/spec/cli/parse_spec.rb +1 -2
- data/spec/fixtures/sample_api +1 -0
- data/spec/fixtures/vcr/Razor_CLI_Navigate/accept-language_header/should_allow_other_accept-language_headers.yml +10 -8
- data/spec/fixtures/vcr/Razor_CLI_Navigate/accept-language_header/should_set_the_accept-language_header.yml +10 -8
- data/spec/fixtures/vcr/Razor_CLI_Navigate/argument_formatting/should_allow_in_string.yml +110 -91
- data/spec/fixtures/vcr/Razor_CLI_Navigate/argument_formatting/should_allow_single-dash_with_single_character_flag.yml +71 -51
- data/spec/fixtures/vcr/Razor_CLI_Navigate/argument_formatting/should_allow_spaces.yml +328 -271
- data/spec/fixtures/vcr/Razor_CLI_Navigate/argument_formatting/should_not_allow_double-dash_with_single_character_flag.yml +52 -40
- data/spec/fixtures/vcr/Razor_CLI_Navigate/argument_formatting/should_not_allow_single-dash_with_multiple_character_flag.yml +49 -37
- data/spec/fixtures/vcr/Razor_CLI_Navigate/for_command_help/should_provide_command_help_for_razor_--help_command_.yml +53 -135
- data/spec/fixtures/vcr/Razor_CLI_Navigate/for_command_help/should_provide_command_help_for_razor_-h_command_.yml +53 -135
- data/spec/fixtures/vcr/Razor_CLI_Navigate/for_command_help/should_provide_command_help_for_razor_command_--help_.yml +53 -135
- data/spec/fixtures/vcr/Razor_CLI_Navigate/for_command_help/should_provide_command_help_for_razor_command_-h_.yml +53 -135
- data/spec/fixtures/vcr/Razor_CLI_Navigate/for_command_help/should_provide_command_help_for_razor_command_help_.yml +53 -135
- data/spec/fixtures/vcr/Razor_CLI_Navigate/for_command_help/should_provide_command_help_for_razor_help_command_.yml +53 -135
- data/spec/fixtures/vcr/Razor_CLI_Navigate/positional_arguments/should_allow_the_use_of_positional_arguments.yml +229 -163
- data/spec/fixtures/vcr/Razor_CLI_Navigate/positional_arguments/should_fail_with_too_many_positional_arguments.yml +49 -37
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_authentication/should_preserve_that_across_navigation.yml +25 -13
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_authentication/should_supply_that_to_the_API_service.yml +14 -8
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_invalid_parameter/should_fail_with_bad_JSON.yml +52 -40
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_invalid_parameter/should_fail_with_malformed_argument.yml +105 -90
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_multiple_arguments_with_same_name/combining_as_an_array/should_merge_an_array_into_an_existing_array.yml +549 -446
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_multiple_arguments_with_same_name/combining_as_an_array/should_merge_the_arguments_as_an_array.yml +549 -446
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_multiple_arguments_with_same_name/combining_as_an_array/should_merge_the_arguments_into_an_existing_array.yml +549 -446
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_multiple_arguments_with_same_name/combining_as_an_object/should_construct_a_json_object.yml +71 -51
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_multiple_arguments_with_same_name/combining_as_an_object/should_construct_a_json_object_with_unicode.yml +144 -100
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_multiple_arguments_with_same_name/combining_as_an_object/should_fail_with_mixed_types_array_then_hash_.yml +52 -40
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_multiple_arguments_with_same_name/combining_as_an_object/should_fail_with_mixed_types_hash_then_array_.yml +52 -40
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_no_parameters/should_fail_with_bad_JSON.yml +54 -43
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_query_parameters/should_append_limit.yml +25 -13
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_query_parameters/should_append_start.yml +25 -13
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_query_parameters/should_not_fail_when_query_returns_details_for_one_item.yml +78 -44
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_query_parameters/should_store_query_without_query_parameters.yml +130 -74
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_query_parameters/should_throw_an_error_if_the_query_parameter_is_not_in_the_API.yml +14 -8
- data/spec/fixtures/vcr/Razor_CLI_Navigate/with_query_parameters/should_throw_an_error_if_the_query_parameter_is_not_in_the_API_from_a_single_item.yml +66 -38
- data/spec/fixtures/vcr/Razor_CLI_Parse/_new/_help/should_print_a_list_of_known_endpoints.yml +12 -8
- data/spec/spec_helper.rb +4 -1
- data/spec/testing.md +25 -1
- metadata +73 -71
@@ -12,7 +12,11 @@ http_interactions:
|
|
12
12
|
Accept-Encoding:
|
13
13
|
- gzip, deflate
|
14
14
|
User-Agent:
|
15
|
-
-
|
15
|
+
- rest-client/2.0.2 (darwin x86_64) jruby/9.1.5.0 (2.3.1p0)
|
16
|
+
Accept-Language:
|
17
|
+
- en_US,en
|
18
|
+
Host:
|
19
|
+
- localhost:8150
|
16
20
|
response:
|
17
21
|
status:
|
18
22
|
code: 200
|
@@ -23,109 +27,16 @@ http_interactions:
|
|
23
27
|
X-Content-Type-Options:
|
24
28
|
- nosniff
|
25
29
|
Content-Type:
|
26
|
-
- application/json;charset=utf-8
|
27
|
-
Content-Length:
|
28
|
-
- '5650'
|
29
|
-
Date:
|
30
|
-
- Mon, 09 Mar 2015 19:54:18 GMT
|
31
|
-
body:
|
32
|
-
encoding: US-ASCII
|
33
|
-
string: '{"commands":[{"name":"add-policy-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/add-policy-tag","id":"http://localhost:8150/api/commands/add-policy-tag"},{"name":"create-broker","rel":"http://api.puppetlabs.com/razor/v1/commands/create-broker","id":"http://localhost:8150/api/commands/create-broker"},{"name":"create-hook","rel":"http://api.puppetlabs.com/razor/v1/commands/create-hook","id":"http://localhost:8150/api/commands/create-hook"},{"name":"create-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/create-policy","id":"http://localhost:8150/api/commands/create-policy"},{"name":"create-repo","rel":"http://api.puppetlabs.com/razor/v1/commands/create-repo","id":"http://localhost:8150/api/commands/create-repo"},{"name":"create-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/create-tag","id":"http://localhost:8150/api/commands/create-tag"},{"name":"create-task","rel":"http://api.puppetlabs.com/razor/v1/commands/create-task","id":"http://localhost:8150/api/commands/create-task"},{"name":"delete-broker","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-broker","id":"http://localhost:8150/api/commands/delete-broker"},{"name":"delete-hook","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-hook","id":"http://localhost:8150/api/commands/delete-hook"},{"name":"delete-node","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-node","id":"http://localhost:8150/api/commands/delete-node"},{"name":"delete-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-policy","id":"http://localhost:8150/api/commands/delete-policy"},{"name":"delete-repo","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-repo","id":"http://localhost:8150/api/commands/delete-repo"},{"name":"delete-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-tag","id":"http://localhost:8150/api/commands/delete-tag"},{"name":"disable-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/disable-policy","id":"http://localhost:8150/api/commands/disable-policy"},{"name":"enable-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/enable-policy","id":"http://localhost:8150/api/commands/enable-policy"},{"name":"modify-node-metadata","rel":"http://api.puppetlabs.com/razor/v1/commands/modify-node-metadata","id":"http://localhost:8150/api/commands/modify-node-metadata"},{"name":"modify-policy-max-count","rel":"http://api.puppetlabs.com/razor/v1/commands/modify-policy-max-count","id":"http://localhost:8150/api/commands/modify-policy-max-count"},{"name":"move-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/move-policy","id":"http://localhost:8150/api/commands/move-policy"},{"name":"reboot-node","rel":"http://api.puppetlabs.com/razor/v1/commands/reboot-node","id":"http://localhost:8150/api/commands/reboot-node"},{"name":"register-node","rel":"http://api.puppetlabs.com/razor/v1/commands/register-node","id":"http://localhost:8150/api/commands/register-node"},{"name":"reinstall-node","rel":"http://api.puppetlabs.com/razor/v1/commands/reinstall-node","id":"http://localhost:8150/api/commands/reinstall-node"},{"name":"remove-node-metadata","rel":"http://api.puppetlabs.com/razor/v1/commands/remove-node-metadata","id":"http://localhost:8150/api/commands/remove-node-metadata"},{"name":"remove-policy-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/remove-policy-tag","id":"http://localhost:8150/api/commands/remove-policy-tag"},{"name":"set-node-desired-power-state","rel":"http://api.puppetlabs.com/razor/v1/commands/set-node-desired-power-state","id":"http://localhost:8150/api/commands/set-node-desired-power-state"},{"name":"set-node-hw-info","rel":"http://api.puppetlabs.com/razor/v1/commands/set-node-hw-info","id":"http://localhost:8150/api/commands/set-node-hw-info"},{"name":"set-node-ipmi-credentials","rel":"http://api.puppetlabs.com/razor/v1/commands/set-node-ipmi-credentials","id":"http://localhost:8150/api/commands/set-node-ipmi-credentials"},{"name":"update-node-metadata","rel":"http://api.puppetlabs.com/razor/v1/commands/update-node-metadata","id":"http://localhost:8150/api/commands/update-node-metadata"},{"name":"update-tag-rule","rel":"http://api.puppetlabs.com/razor/v1/commands/update-tag-rule","id":"http://localhost:8150/api/commands/update-tag-rule"}],"collections":[{"name":"brokers","rel":"http://api.puppetlabs.com/razor/v1/collections/brokers","id":"http://localhost:8150/api/collections/brokers"},{"name":"repos","rel":"http://api.puppetlabs.com/razor/v1/collections/repos","id":"http://localhost:8150/api/collections/repos"},{"name":"tags","rel":"http://api.puppetlabs.com/razor/v1/collections/tags","id":"http://localhost:8150/api/collections/tags"},{"name":"policies","rel":"http://api.puppetlabs.com/razor/v1/collections/policies","id":"http://localhost:8150/api/collections/policies"},{"name":"nodes","rel":"http://api.puppetlabs.com/razor/v1/collections/nodes","id":"http://localhost:8150/api/collections/nodes","params":{"start":{"type":"number"},"limit":{"type":"number"}}},{"name":"tasks","rel":"http://api.puppetlabs.com/razor/v1/collections/tasks","id":"http://localhost:8150/api/collections/tasks"},{"name":"commands","rel":"http://api.puppetlabs.com/razor/v1/collections/commands","id":"http://localhost:8150/api/collections/commands"},{"name":"events","rel":"http://api.puppetlabs.com/razor/v1/collections/events","id":"http://localhost:8150/api/collections/events","params":{"start":{"type":"number"},"limit":{"type":"number"}}},{"name":"hooks","rel":"http://api.puppetlabs.com/razor/v1/collections/hooks","id":"http://localhost:8150/api/collections/hooks"}],"version":{"server":"v0.16.1-18-gd3acc7a-dirty"}}'
|
34
|
-
http_version:
|
35
|
-
recorded_at: Mon, 09 Mar 2015 19:54:18 GMT
|
36
|
-
- request:
|
37
|
-
method: get
|
38
|
-
uri: http://localhost:8150/api/commands/update-tag-rule
|
39
|
-
body:
|
40
|
-
encoding: US-ASCII
|
41
|
-
string: ''
|
42
|
-
headers:
|
43
|
-
Accept:
|
44
30
|
- application/json
|
45
|
-
Accept-Encoding:
|
46
|
-
- gzip, deflate
|
47
|
-
User-Agent:
|
48
|
-
- Ruby
|
49
|
-
response:
|
50
|
-
status:
|
51
|
-
code: 200
|
52
|
-
message: OK
|
53
|
-
headers:
|
54
|
-
Server:
|
55
|
-
- Apache-Coyote/1.1
|
56
|
-
Etag:
|
57
|
-
- '"server-version-v0.16.1-18-gd3acc7a-dirty"'
|
58
|
-
X-Content-Type-Options:
|
59
|
-
- nosniff
|
60
|
-
Content-Type:
|
61
|
-
- application/json;charset=utf-8
|
62
31
|
Content-Length:
|
63
|
-
- '
|
32
|
+
- '7110'
|
64
33
|
Date:
|
65
|
-
- Mon,
|
34
|
+
- Mon, 23 Apr 2018 19:48:15 GMT
|
66
35
|
body:
|
67
|
-
encoding:
|
68
|
-
string: '{"name":"update-tag-rule","
|
69
|
-
for an existing tag","description":"This will change the rule of the given
|
70
|
-
tag to the new rule. The tag will be\nreevaluated against all nodes and each
|
71
|
-
node''s tag attribute will be updated to\nreflect whether the tag now matches
|
72
|
-
or not, i.e., the tag will be added\nto/removed from each node''s tag as appropriate.\n\nIf
|
73
|
-
the tag is used by any policies, the update will only be performed if the\noptional
|
74
|
-
parameter `force` is set to `true`. Otherwise, it will fail.","schema":"#
|
75
|
-
Access Control\n\nThis command''s access control pattern: `commands:update-tag-rule:%{name}`\n\nWords
|
76
|
-
surrounded by `%{...}` are substitutions from the input data: typically\nthe
|
77
|
-
name of the object being modified, or some other critical detail, these\nallow
|
78
|
-
roles to be granted partial access to modify the system.\n\nFor more detail
|
79
|
-
on how the permission strings are structured and work, you can\nsee the [Shiro
|
80
|
-
Permissions documentation][shiro]. That pattern is expanded\nand then a permission
|
81
|
-
check applied to it, before the command is authorized.\n\nThese checks only
|
82
|
-
apply if security is enabled in the Razor configuration\nfile; on this server
|
83
|
-
security is currently disabled.\n\n[shiro]: http://shiro.apache.org/permissions.html\n\n#
|
84
|
-
Attributes\n\n * name\n - The tag for which to change the rule.\n - This
|
85
|
-
attribute is required.\n - It must be of type string.\n - It must match
|
86
|
-
the name of an existing tag.\n\n * rule\n - The new rule to apply to the
|
87
|
-
tag.\n - This attribute is required.\n - It must be of type array.\n\n
|
88
|
-
* force\n - By default this command will fail if the tag is in use by an
|
89
|
-
existing\n policy. This flag allows you to override that, and force the
|
90
|
-
change to\n apply despite the tag being in use.\n \n This will
|
91
|
-
not change policy binding of nodes, which may lead to some\n counter-intuitive
|
92
|
-
results such as a node that does *not* match policy\n tags being bound
|
93
|
-
to the policy.\n - It must be of type boolean.\n","examples":{"api":"An
|
94
|
-
example of updating a tag rule, and forcing reevaluation:\n\n{\n \"name\":
|
95
|
-
\"small\",\n \"rule\": [\"<=\", [\"fact\", \"processorcount\"], \"2\"],\n \"force\":
|
96
|
-
true\n}","cli":"An example of updating a tag rule, and forcing reevaluation:\n\nrazor
|
97
|
-
update-tag-rule --name small --force \\\n --rule ''[\"<=\", [\"fact\",
|
98
|
-
\"processorcount\"], \"2\"]''"},"full":"# SYNOPSIS\nUpdate the matching rule
|
99
|
-
for an existing tag\n\n# DESCRIPTION\nThis will change the rule of the given
|
100
|
-
tag to the new rule. The tag will be\nreevaluated against all nodes and each
|
101
|
-
node''s tag attribute will be updated to\nreflect whether the tag now matches
|
102
|
-
or not, i.e., the tag will be added\nto/removed from each node''s tag as appropriate.\n\nIf
|
103
|
-
the tag is used by any policies, the update will only be performed if the\noptional
|
104
|
-
parameter `force` is set to `true`. Otherwise, it will fail.\n# Access Control\n\nThis
|
105
|
-
command''s access control pattern: `commands:update-tag-rule:%{name}`\n\nWords
|
106
|
-
surrounded by `%{...}` are substitutions from the input data: typically\nthe
|
107
|
-
name of the object being modified, or some other critical detail, these\nallow
|
108
|
-
roles to be granted partial access to modify the system.\n\nFor more detail
|
109
|
-
on how the permission strings are structured and work, you can\nsee the [Shiro
|
110
|
-
Permissions documentation][shiro]. That pattern is expanded\nand then a permission
|
111
|
-
check applied to it, before the command is authorized.\n\nThese checks only
|
112
|
-
apply if security is enabled in the Razor configuration\nfile; on this server
|
113
|
-
security is currently disabled.\n\n[shiro]: http://shiro.apache.org/permissions.html\n\n#
|
114
|
-
Attributes\n\n * name\n - The tag for which to change the rule.\n - This
|
115
|
-
attribute is required.\n - It must be of type string.\n - It must match
|
116
|
-
the name of an existing tag.\n\n * rule\n - The new rule to apply to the
|
117
|
-
tag.\n - This attribute is required.\n - It must be of type array.\n\n
|
118
|
-
* force\n - By default this command will fail if the tag is in use by an
|
119
|
-
existing\n policy. This flag allows you to override that, and force the
|
120
|
-
change to\n apply despite the tag being in use.\n \n This will
|
121
|
-
not change policy binding of nodes, which may lead to some\n counter-intuitive
|
122
|
-
results such as a node that does *not* match policy\n tags being bound
|
123
|
-
to the policy.\n - It must be of type boolean.\n\n# EXAMPLES\n\n An example
|
124
|
-
of updating a tag rule, and forcing reevaluation:\n \n {\n \"name\":
|
125
|
-
\"small\",\n \"rule\": [\"<=\", [\"fact\", \"processorcount\"], \"2\"],\n \"force\":
|
126
|
-
true\n }\n"},"schema":{"name":{"type":"string"},"rule":{"type":"array"},"force":{"type":"boolean"}}}'
|
36
|
+
encoding: UTF-8
|
37
|
+
string: '{"commands":[{"name":"add-policy-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/add-policy-tag","id":"http://localhost:8150/api/commands/add-policy-tag"},{"name":"create-broker","rel":"http://api.puppetlabs.com/razor/v1/commands/create-broker","id":"http://localhost:8150/api/commands/create-broker"},{"name":"create-hook","rel":"http://api.puppetlabs.com/razor/v1/commands/create-hook","id":"http://localhost:8150/api/commands/create-hook"},{"name":"create-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/create-policy","id":"http://localhost:8150/api/commands/create-policy"},{"name":"create-repo","rel":"http://api.puppetlabs.com/razor/v1/commands/create-repo","id":"http://localhost:8150/api/commands/create-repo"},{"name":"create-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/create-tag","id":"http://localhost:8150/api/commands/create-tag"},{"name":"create-task","rel":"http://api.puppetlabs.com/razor/v1/commands/create-task","id":"http://localhost:8150/api/commands/create-task"},{"name":"delete-broker","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-broker","id":"http://localhost:8150/api/commands/delete-broker"},{"name":"delete-hook","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-hook","id":"http://localhost:8150/api/commands/delete-hook"},{"name":"delete-node","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-node","id":"http://localhost:8150/api/commands/delete-node"},{"name":"delete-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-policy","id":"http://localhost:8150/api/commands/delete-policy"},{"name":"delete-repo","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-repo","id":"http://localhost:8150/api/commands/delete-repo"},{"name":"delete-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-tag","id":"http://localhost:8150/api/commands/delete-tag"},{"name":"disable-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/disable-policy","id":"http://localhost:8150/api/commands/disable-policy"},{"name":"enable-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/enable-policy","id":"http://localhost:8150/api/commands/enable-policy"},{"name":"modify-node-metadata","rel":"http://api.puppetlabs.com/razor/v1/commands/modify-node-metadata","id":"http://localhost:8150/api/commands/modify-node-metadata"},{"name":"modify-policy-max-count","rel":"http://api.puppetlabs.com/razor/v1/commands/modify-policy-max-count","id":"http://localhost:8150/api/commands/modify-policy-max-count"},{"name":"move-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/move-policy","id":"http://localhost:8150/api/commands/move-policy"},{"name":"reboot-node","rel":"http://api.puppetlabs.com/razor/v1/commands/reboot-node","id":"http://localhost:8150/api/commands/reboot-node"},{"name":"register-node","rel":"http://api.puppetlabs.com/razor/v1/commands/register-node","id":"http://localhost:8150/api/commands/register-node"},{"name":"reinstall-node","rel":"http://api.puppetlabs.com/razor/v1/commands/reinstall-node","id":"http://localhost:8150/api/commands/reinstall-node"},{"name":"remove-node-metadata","rel":"http://api.puppetlabs.com/razor/v1/commands/remove-node-metadata","id":"http://localhost:8150/api/commands/remove-node-metadata"},{"name":"remove-policy-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/remove-policy-tag","id":"http://localhost:8150/api/commands/remove-policy-tag"},{"name":"run-hook","rel":"http://api.puppetlabs.com/razor/v1/commands/run-hook","id":"http://localhost:8150/api/commands/run-hook"},{"name":"set-node-desired-power-state","rel":"http://api.puppetlabs.com/razor/v1/commands/set-node-desired-power-state","id":"http://localhost:8150/api/commands/set-node-desired-power-state"},{"name":"set-node-hw-info","rel":"http://api.puppetlabs.com/razor/v1/commands/set-node-hw-info","id":"http://localhost:8150/api/commands/set-node-hw-info"},{"name":"set-node-ipmi-credentials","rel":"http://api.puppetlabs.com/razor/v1/commands/set-node-ipmi-credentials","id":"http://localhost:8150/api/commands/set-node-ipmi-credentials"},{"name":"update-broker-configuration","rel":"http://api.puppetlabs.com/razor/v1/commands/update-broker-configuration","id":"http://localhost:8150/api/commands/update-broker-configuration"},{"name":"update-hook-configuration","rel":"http://api.puppetlabs.com/razor/v1/commands/update-hook-configuration","id":"http://localhost:8150/api/commands/update-hook-configuration"},{"name":"update-node-metadata","rel":"http://api.puppetlabs.com/razor/v1/commands/update-node-metadata","id":"http://localhost:8150/api/commands/update-node-metadata"},{"name":"update-policy-broker","rel":"http://api.puppetlabs.com/razor/v1/commands/update-policy-broker","id":"http://localhost:8150/api/commands/update-policy-broker"},{"name":"update-policy-node-metadata","rel":"http://api.puppetlabs.com/razor/v1/commands/update-policy-node-metadata","id":"http://localhost:8150/api/commands/update-policy-node-metadata"},{"name":"update-policy-repo","rel":"http://api.puppetlabs.com/razor/v1/commands/update-policy-repo","id":"http://localhost:8150/api/commands/update-policy-repo"},{"name":"update-policy-task","rel":"http://api.puppetlabs.com/razor/v1/commands/update-policy-task","id":"http://localhost:8150/api/commands/update-policy-task"},{"name":"update-repo-task","rel":"http://api.puppetlabs.com/razor/v1/commands/update-repo-task","id":"http://localhost:8150/api/commands/update-repo-task"},{"name":"update-tag-rule","rel":"http://api.puppetlabs.com/razor/v1/commands/update-tag-rule","id":"http://localhost:8150/api/commands/update-tag-rule"}],"collections":[{"name":"brokers","rel":"http://api.puppetlabs.com/razor/v1/collections/brokers","id":"http://localhost:8150/api/collections/brokers"},{"name":"repos","rel":"http://api.puppetlabs.com/razor/v1/collections/repos","id":"http://localhost:8150/api/collections/repos"},{"name":"tags","rel":"http://api.puppetlabs.com/razor/v1/collections/tags","id":"http://localhost:8150/api/collections/tags"},{"name":"policies","rel":"http://api.puppetlabs.com/razor/v1/collections/policies","id":"http://localhost:8150/api/collections/policies"},{"name":"nodes","rel":"http://api.puppetlabs.com/razor/v1/collections/nodes","id":"http://localhost:8150/api/collections/nodes","params":{"start":{"type":"number"},"limit":{"type":"number"}}},{"name":"tasks","rel":"http://api.puppetlabs.com/razor/v1/collections/tasks","id":"http://localhost:8150/api/collections/tasks"},{"name":"commands","rel":"http://api.puppetlabs.com/razor/v1/collections/commands","id":"http://localhost:8150/api/collections/commands"},{"name":"events","rel":"http://api.puppetlabs.com/razor/v1/collections/events","id":"http://localhost:8150/api/collections/events","params":{"start":{"type":"number"},"limit":{"type":"number"}}},{"name":"hooks","rel":"http://api.puppetlabs.com/razor/v1/collections/hooks","id":"http://localhost:8150/api/collections/hooks"},{"name":"config","rel":"http://api.puppetlabs.com/razor/v1/collections/config","id":"http://localhost:8150/api/collections/config"}],"version":{"server":"v1.8.0-dirty"}}'
|
127
38
|
http_version:
|
128
|
-
recorded_at: Mon,
|
39
|
+
recorded_at: Mon, 23 Apr 2018 19:48:15 GMT
|
129
40
|
- request:
|
130
41
|
method: get
|
131
42
|
uri: http://localhost:8150/api/commands/update-tag-rule
|
@@ -138,7 +49,11 @@ http_interactions:
|
|
138
49
|
Accept-Encoding:
|
139
50
|
- gzip, deflate
|
140
51
|
User-Agent:
|
141
|
-
-
|
52
|
+
- rest-client/2.0.2 (darwin x86_64) jruby/9.1.5.0 (2.3.1p0)
|
53
|
+
Accept-Language:
|
54
|
+
- en_US,en
|
55
|
+
Host:
|
56
|
+
- localhost:8150
|
142
57
|
response:
|
143
58
|
status:
|
144
59
|
code: 200
|
@@ -147,17 +62,17 @@ http_interactions:
|
|
147
62
|
Server:
|
148
63
|
- Apache-Coyote/1.1
|
149
64
|
Etag:
|
150
|
-
- '"server-version-
|
65
|
+
- '"server-version-v1.8.0-dirty"'
|
151
66
|
X-Content-Type-Options:
|
152
67
|
- nosniff
|
153
68
|
Content-Type:
|
154
|
-
- application/json
|
69
|
+
- application/json
|
155
70
|
Content-Length:
|
156
|
-
- '
|
71
|
+
- '5021'
|
157
72
|
Date:
|
158
|
-
- Mon,
|
73
|
+
- Mon, 23 Apr 2018 19:48:15 GMT
|
159
74
|
body:
|
160
|
-
encoding:
|
75
|
+
encoding: UTF-8
|
161
76
|
string: '{"name":"update-tag-rule","help":{"summary":"Update the matching rule
|
162
77
|
for an existing tag","description":"This will change the rule of the given
|
163
78
|
tag to the new rule. The tag will be\nreevaluated against all nodes and each
|
@@ -176,23 +91,26 @@ http_interactions:
|
|
176
91
|
security is currently disabled.\n\n[shiro]: http://shiro.apache.org/permissions.html\n\n#
|
177
92
|
Attributes\n\n * name\n - The tag for which to change the rule.\n - This
|
178
93
|
attribute is required.\n - It must be of type string.\n - It must match
|
179
|
-
the name of an existing tag.\n\n * rule\n -
|
180
|
-
tag.\n - This attribute is required.\n -
|
181
|
-
|
182
|
-
|
183
|
-
|
184
|
-
|
185
|
-
|
186
|
-
to the policy.\n - It
|
187
|
-
example of updating a tag
|
188
|
-
\
|
189
|
-
true\n}","cli":"An
|
190
|
-
|
191
|
-
\"
|
192
|
-
|
193
|
-
tag
|
194
|
-
|
195
|
-
|
94
|
+
the name of an existing tag.\n - Its argument position is 0.\n\n * rule\n -
|
95
|
+
The new rule to apply to the tag.\n - This attribute is required.\n -
|
96
|
+
It must be of type array.\n - Its argument position is 1.\n\n * force\n -
|
97
|
+
By default this command will fail if the tag is in use by an existing\n policy. This
|
98
|
+
flag allows you to override that, and force the change to\n apply despite
|
99
|
+
the tag being in use.\n \n This will not change policy binding of
|
100
|
+
nodes, which may lead to some\n counter-intuitive results such as a node
|
101
|
+
that does *not* match policy\n tags being bound to the policy.\n - It
|
102
|
+
must be of type boolean.\n","examples":{"api":"An example of updating a tag
|
103
|
+
rule, and forcing reevaluation:\n\n{\n \"name\": \"small\",\n \"rule\":
|
104
|
+
[\"<=\", [\"fact\", \"processorcount\"], \"2\"],\n \"force\": true\n}","cli":"An
|
105
|
+
example of updating a tag rule, and forcing reevaluation:\n\n razor update-tag-rule
|
106
|
+
--name small --force \\\n --rule ''[\"<=\", [\"fact\", \"processorcount\"],
|
107
|
+
\"2\"]''\n\nWith positional arguments, this can be shortened:\n\n razor
|
108
|
+
update-tag-rule small ''[[\"<=\", [\"fact\", \"processorcount\"], \"2\"]]''
|
109
|
+
\\\n --force"},"full":"# SYNOPSIS\nUpdate the matching rule for an
|
110
|
+
existing tag\n\n# DESCRIPTION\nThis will change the rule of the given tag
|
111
|
+
to the new rule. The tag will be\nreevaluated against all nodes and each node''s
|
112
|
+
tag attribute will be updated to\nreflect whether the tag now matches or not,
|
113
|
+
i.e., the tag will be added\nto/removed from each node''s tag as appropriate.\n\nIf
|
196
114
|
the tag is used by any policies, the update will only be performed if the\noptional
|
197
115
|
parameter `force` is set to `true`. Otherwise, it will fail.\n# Access Control\n\nThis
|
198
116
|
command''s access control pattern: `commands:update-tag-rule:%{name}`\n\nWords
|
@@ -206,17 +124,17 @@ http_interactions:
|
|
206
124
|
security is currently disabled.\n\n[shiro]: http://shiro.apache.org/permissions.html\n\n#
|
207
125
|
Attributes\n\n * name\n - The tag for which to change the rule.\n - This
|
208
126
|
attribute is required.\n - It must be of type string.\n - It must match
|
209
|
-
the name of an existing tag.\n\n * rule\n -
|
210
|
-
tag.\n - This attribute is required.\n -
|
211
|
-
|
212
|
-
|
213
|
-
|
214
|
-
|
215
|
-
|
216
|
-
|
217
|
-
of updating a tag rule,
|
218
|
-
\
|
219
|
-
true\n }\n"},"schema":{"name":{"type":"string"},"rule":{"type":"array"},"force":{"type":"boolean"}}}'
|
127
|
+
the name of an existing tag.\n - Its argument position is 0.\n\n * rule\n -
|
128
|
+
The new rule to apply to the tag.\n - This attribute is required.\n -
|
129
|
+
It must be of type array.\n - Its argument position is 1.\n\n * force\n -
|
130
|
+
By default this command will fail if the tag is in use by an existing\n policy. This
|
131
|
+
flag allows you to override that, and force the change to\n apply despite
|
132
|
+
the tag being in use.\n \n This will not change policy binding of
|
133
|
+
nodes, which may lead to some\n counter-intuitive results such as a node
|
134
|
+
that does *not* match policy\n tags being bound to the policy.\n - It
|
135
|
+
must be of type boolean.\n\n# EXAMPLES\n\n An example of updating a tag rule,
|
136
|
+
and forcing reevaluation:\n \n {\n \"name\": \"small\",\n \"rule\":
|
137
|
+
[\"<=\", [\"fact\", \"processorcount\"], \"2\"],\n \"force\": true\n }\n"},"schema":{"name":{"type":"string","position":0},"rule":{"type":"array","position":1},"force":{"type":"boolean"}}}'
|
220
138
|
http_version:
|
221
|
-
recorded_at: Mon,
|
222
|
-
recorded_with: VCR
|
139
|
+
recorded_at: Mon, 23 Apr 2018 19:48:15 GMT
|
140
|
+
recorded_with: VCR 4.0.0
|
@@ -12,7 +12,11 @@ http_interactions:
|
|
12
12
|
Accept-Encoding:
|
13
13
|
- gzip, deflate
|
14
14
|
User-Agent:
|
15
|
-
-
|
15
|
+
- rest-client/2.0.2 (darwin x86_64) jruby/9.1.5.0 (2.3.1p0)
|
16
|
+
Accept-Language:
|
17
|
+
- en_US,en
|
18
|
+
Host:
|
19
|
+
- localhost:8150
|
16
20
|
response:
|
17
21
|
status:
|
18
22
|
code: 200
|
@@ -23,109 +27,16 @@ http_interactions:
|
|
23
27
|
X-Content-Type-Options:
|
24
28
|
- nosniff
|
25
29
|
Content-Type:
|
26
|
-
- application/json;charset=utf-8
|
27
|
-
Content-Length:
|
28
|
-
- '5650'
|
29
|
-
Date:
|
30
|
-
- Mon, 09 Mar 2015 19:54:40 GMT
|
31
|
-
body:
|
32
|
-
encoding: US-ASCII
|
33
|
-
string: '{"commands":[{"name":"add-policy-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/add-policy-tag","id":"http://localhost:8150/api/commands/add-policy-tag"},{"name":"create-broker","rel":"http://api.puppetlabs.com/razor/v1/commands/create-broker","id":"http://localhost:8150/api/commands/create-broker"},{"name":"create-hook","rel":"http://api.puppetlabs.com/razor/v1/commands/create-hook","id":"http://localhost:8150/api/commands/create-hook"},{"name":"create-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/create-policy","id":"http://localhost:8150/api/commands/create-policy"},{"name":"create-repo","rel":"http://api.puppetlabs.com/razor/v1/commands/create-repo","id":"http://localhost:8150/api/commands/create-repo"},{"name":"create-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/create-tag","id":"http://localhost:8150/api/commands/create-tag"},{"name":"create-task","rel":"http://api.puppetlabs.com/razor/v1/commands/create-task","id":"http://localhost:8150/api/commands/create-task"},{"name":"delete-broker","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-broker","id":"http://localhost:8150/api/commands/delete-broker"},{"name":"delete-hook","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-hook","id":"http://localhost:8150/api/commands/delete-hook"},{"name":"delete-node","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-node","id":"http://localhost:8150/api/commands/delete-node"},{"name":"delete-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-policy","id":"http://localhost:8150/api/commands/delete-policy"},{"name":"delete-repo","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-repo","id":"http://localhost:8150/api/commands/delete-repo"},{"name":"delete-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-tag","id":"http://localhost:8150/api/commands/delete-tag"},{"name":"disable-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/disable-policy","id":"http://localhost:8150/api/commands/disable-policy"},{"name":"enable-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/enable-policy","id":"http://localhost:8150/api/commands/enable-policy"},{"name":"modify-node-metadata","rel":"http://api.puppetlabs.com/razor/v1/commands/modify-node-metadata","id":"http://localhost:8150/api/commands/modify-node-metadata"},{"name":"modify-policy-max-count","rel":"http://api.puppetlabs.com/razor/v1/commands/modify-policy-max-count","id":"http://localhost:8150/api/commands/modify-policy-max-count"},{"name":"move-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/move-policy","id":"http://localhost:8150/api/commands/move-policy"},{"name":"reboot-node","rel":"http://api.puppetlabs.com/razor/v1/commands/reboot-node","id":"http://localhost:8150/api/commands/reboot-node"},{"name":"register-node","rel":"http://api.puppetlabs.com/razor/v1/commands/register-node","id":"http://localhost:8150/api/commands/register-node"},{"name":"reinstall-node","rel":"http://api.puppetlabs.com/razor/v1/commands/reinstall-node","id":"http://localhost:8150/api/commands/reinstall-node"},{"name":"remove-node-metadata","rel":"http://api.puppetlabs.com/razor/v1/commands/remove-node-metadata","id":"http://localhost:8150/api/commands/remove-node-metadata"},{"name":"remove-policy-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/remove-policy-tag","id":"http://localhost:8150/api/commands/remove-policy-tag"},{"name":"set-node-desired-power-state","rel":"http://api.puppetlabs.com/razor/v1/commands/set-node-desired-power-state","id":"http://localhost:8150/api/commands/set-node-desired-power-state"},{"name":"set-node-hw-info","rel":"http://api.puppetlabs.com/razor/v1/commands/set-node-hw-info","id":"http://localhost:8150/api/commands/set-node-hw-info"},{"name":"set-node-ipmi-credentials","rel":"http://api.puppetlabs.com/razor/v1/commands/set-node-ipmi-credentials","id":"http://localhost:8150/api/commands/set-node-ipmi-credentials"},{"name":"update-node-metadata","rel":"http://api.puppetlabs.com/razor/v1/commands/update-node-metadata","id":"http://localhost:8150/api/commands/update-node-metadata"},{"name":"update-tag-rule","rel":"http://api.puppetlabs.com/razor/v1/commands/update-tag-rule","id":"http://localhost:8150/api/commands/update-tag-rule"}],"collections":[{"name":"brokers","rel":"http://api.puppetlabs.com/razor/v1/collections/brokers","id":"http://localhost:8150/api/collections/brokers"},{"name":"repos","rel":"http://api.puppetlabs.com/razor/v1/collections/repos","id":"http://localhost:8150/api/collections/repos"},{"name":"tags","rel":"http://api.puppetlabs.com/razor/v1/collections/tags","id":"http://localhost:8150/api/collections/tags"},{"name":"policies","rel":"http://api.puppetlabs.com/razor/v1/collections/policies","id":"http://localhost:8150/api/collections/policies"},{"name":"nodes","rel":"http://api.puppetlabs.com/razor/v1/collections/nodes","id":"http://localhost:8150/api/collections/nodes","params":{"start":{"type":"number"},"limit":{"type":"number"}}},{"name":"tasks","rel":"http://api.puppetlabs.com/razor/v1/collections/tasks","id":"http://localhost:8150/api/collections/tasks"},{"name":"commands","rel":"http://api.puppetlabs.com/razor/v1/collections/commands","id":"http://localhost:8150/api/collections/commands"},{"name":"events","rel":"http://api.puppetlabs.com/razor/v1/collections/events","id":"http://localhost:8150/api/collections/events","params":{"start":{"type":"number"},"limit":{"type":"number"}}},{"name":"hooks","rel":"http://api.puppetlabs.com/razor/v1/collections/hooks","id":"http://localhost:8150/api/collections/hooks"}],"version":{"server":"v0.16.1-18-gd3acc7a-dirty"}}'
|
34
|
-
http_version:
|
35
|
-
recorded_at: Mon, 09 Mar 2015 19:54:40 GMT
|
36
|
-
- request:
|
37
|
-
method: get
|
38
|
-
uri: http://localhost:8150/api/commands/update-tag-rule
|
39
|
-
body:
|
40
|
-
encoding: US-ASCII
|
41
|
-
string: ''
|
42
|
-
headers:
|
43
|
-
Accept:
|
44
30
|
- application/json
|
45
|
-
Accept-Encoding:
|
46
|
-
- gzip, deflate
|
47
|
-
User-Agent:
|
48
|
-
- Ruby
|
49
|
-
response:
|
50
|
-
status:
|
51
|
-
code: 200
|
52
|
-
message: OK
|
53
|
-
headers:
|
54
|
-
Server:
|
55
|
-
- Apache-Coyote/1.1
|
56
|
-
Etag:
|
57
|
-
- '"server-version-v0.16.1-18-gd3acc7a-dirty"'
|
58
|
-
X-Content-Type-Options:
|
59
|
-
- nosniff
|
60
|
-
Content-Type:
|
61
|
-
- application/json;charset=utf-8
|
62
31
|
Content-Length:
|
63
|
-
- '
|
32
|
+
- '7110'
|
64
33
|
Date:
|
65
|
-
- Mon,
|
34
|
+
- Mon, 23 Apr 2018 19:48:41 GMT
|
66
35
|
body:
|
67
|
-
encoding:
|
68
|
-
string: '{"name":"update-tag-rule","
|
69
|
-
for an existing tag","description":"This will change the rule of the given
|
70
|
-
tag to the new rule. The tag will be\nreevaluated against all nodes and each
|
71
|
-
node''s tag attribute will be updated to\nreflect whether the tag now matches
|
72
|
-
or not, i.e., the tag will be added\nto/removed from each node''s tag as appropriate.\n\nIf
|
73
|
-
the tag is used by any policies, the update will only be performed if the\noptional
|
74
|
-
parameter `force` is set to `true`. Otherwise, it will fail.","schema":"#
|
75
|
-
Access Control\n\nThis command''s access control pattern: `commands:update-tag-rule:%{name}`\n\nWords
|
76
|
-
surrounded by `%{...}` are substitutions from the input data: typically\nthe
|
77
|
-
name of the object being modified, or some other critical detail, these\nallow
|
78
|
-
roles to be granted partial access to modify the system.\n\nFor more detail
|
79
|
-
on how the permission strings are structured and work, you can\nsee the [Shiro
|
80
|
-
Permissions documentation][shiro]. That pattern is expanded\nand then a permission
|
81
|
-
check applied to it, before the command is authorized.\n\nThese checks only
|
82
|
-
apply if security is enabled in the Razor configuration\nfile; on this server
|
83
|
-
security is currently disabled.\n\n[shiro]: http://shiro.apache.org/permissions.html\n\n#
|
84
|
-
Attributes\n\n * name\n - The tag for which to change the rule.\n - This
|
85
|
-
attribute is required.\n - It must be of type string.\n - It must match
|
86
|
-
the name of an existing tag.\n\n * rule\n - The new rule to apply to the
|
87
|
-
tag.\n - This attribute is required.\n - It must be of type array.\n\n
|
88
|
-
* force\n - By default this command will fail if the tag is in use by an
|
89
|
-
existing\n policy. This flag allows you to override that, and force the
|
90
|
-
change to\n apply despite the tag being in use.\n \n This will
|
91
|
-
not change policy binding of nodes, which may lead to some\n counter-intuitive
|
92
|
-
results such as a node that does *not* match policy\n tags being bound
|
93
|
-
to the policy.\n - It must be of type boolean.\n","examples":{"api":"An
|
94
|
-
example of updating a tag rule, and forcing reevaluation:\n\n{\n \"name\":
|
95
|
-
\"small\",\n \"rule\": [\"<=\", [\"fact\", \"processorcount\"], \"2\"],\n \"force\":
|
96
|
-
true\n}","cli":"An example of updating a tag rule, and forcing reevaluation:\n\nrazor
|
97
|
-
update-tag-rule --name small --force \\\n --rule ''[\"<=\", [\"fact\",
|
98
|
-
\"processorcount\"], \"2\"]''"},"full":"# SYNOPSIS\nUpdate the matching rule
|
99
|
-
for an existing tag\n\n# DESCRIPTION\nThis will change the rule of the given
|
100
|
-
tag to the new rule. The tag will be\nreevaluated against all nodes and each
|
101
|
-
node''s tag attribute will be updated to\nreflect whether the tag now matches
|
102
|
-
or not, i.e., the tag will be added\nto/removed from each node''s tag as appropriate.\n\nIf
|
103
|
-
the tag is used by any policies, the update will only be performed if the\noptional
|
104
|
-
parameter `force` is set to `true`. Otherwise, it will fail.\n# Access Control\n\nThis
|
105
|
-
command''s access control pattern: `commands:update-tag-rule:%{name}`\n\nWords
|
106
|
-
surrounded by `%{...}` are substitutions from the input data: typically\nthe
|
107
|
-
name of the object being modified, or some other critical detail, these\nallow
|
108
|
-
roles to be granted partial access to modify the system.\n\nFor more detail
|
109
|
-
on how the permission strings are structured and work, you can\nsee the [Shiro
|
110
|
-
Permissions documentation][shiro]. That pattern is expanded\nand then a permission
|
111
|
-
check applied to it, before the command is authorized.\n\nThese checks only
|
112
|
-
apply if security is enabled in the Razor configuration\nfile; on this server
|
113
|
-
security is currently disabled.\n\n[shiro]: http://shiro.apache.org/permissions.html\n\n#
|
114
|
-
Attributes\n\n * name\n - The tag for which to change the rule.\n - This
|
115
|
-
attribute is required.\n - It must be of type string.\n - It must match
|
116
|
-
the name of an existing tag.\n\n * rule\n - The new rule to apply to the
|
117
|
-
tag.\n - This attribute is required.\n - It must be of type array.\n\n
|
118
|
-
* force\n - By default this command will fail if the tag is in use by an
|
119
|
-
existing\n policy. This flag allows you to override that, and force the
|
120
|
-
change to\n apply despite the tag being in use.\n \n This will
|
121
|
-
not change policy binding of nodes, which may lead to some\n counter-intuitive
|
122
|
-
results such as a node that does *not* match policy\n tags being bound
|
123
|
-
to the policy.\n - It must be of type boolean.\n\n# EXAMPLES\n\n An example
|
124
|
-
of updating a tag rule, and forcing reevaluation:\n \n {\n \"name\":
|
125
|
-
\"small\",\n \"rule\": [\"<=\", [\"fact\", \"processorcount\"], \"2\"],\n \"force\":
|
126
|
-
true\n }\n"},"schema":{"name":{"type":"string"},"rule":{"type":"array"},"force":{"type":"boolean"}}}'
|
36
|
+
encoding: UTF-8
|
37
|
+
string: '{"commands":[{"name":"add-policy-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/add-policy-tag","id":"http://localhost:8150/api/commands/add-policy-tag"},{"name":"create-broker","rel":"http://api.puppetlabs.com/razor/v1/commands/create-broker","id":"http://localhost:8150/api/commands/create-broker"},{"name":"create-hook","rel":"http://api.puppetlabs.com/razor/v1/commands/create-hook","id":"http://localhost:8150/api/commands/create-hook"},{"name":"create-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/create-policy","id":"http://localhost:8150/api/commands/create-policy"},{"name":"create-repo","rel":"http://api.puppetlabs.com/razor/v1/commands/create-repo","id":"http://localhost:8150/api/commands/create-repo"},{"name":"create-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/create-tag","id":"http://localhost:8150/api/commands/create-tag"},{"name":"create-task","rel":"http://api.puppetlabs.com/razor/v1/commands/create-task","id":"http://localhost:8150/api/commands/create-task"},{"name":"delete-broker","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-broker","id":"http://localhost:8150/api/commands/delete-broker"},{"name":"delete-hook","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-hook","id":"http://localhost:8150/api/commands/delete-hook"},{"name":"delete-node","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-node","id":"http://localhost:8150/api/commands/delete-node"},{"name":"delete-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-policy","id":"http://localhost:8150/api/commands/delete-policy"},{"name":"delete-repo","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-repo","id":"http://localhost:8150/api/commands/delete-repo"},{"name":"delete-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/delete-tag","id":"http://localhost:8150/api/commands/delete-tag"},{"name":"disable-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/disable-policy","id":"http://localhost:8150/api/commands/disable-policy"},{"name":"enable-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/enable-policy","id":"http://localhost:8150/api/commands/enable-policy"},{"name":"modify-node-metadata","rel":"http://api.puppetlabs.com/razor/v1/commands/modify-node-metadata","id":"http://localhost:8150/api/commands/modify-node-metadata"},{"name":"modify-policy-max-count","rel":"http://api.puppetlabs.com/razor/v1/commands/modify-policy-max-count","id":"http://localhost:8150/api/commands/modify-policy-max-count"},{"name":"move-policy","rel":"http://api.puppetlabs.com/razor/v1/commands/move-policy","id":"http://localhost:8150/api/commands/move-policy"},{"name":"reboot-node","rel":"http://api.puppetlabs.com/razor/v1/commands/reboot-node","id":"http://localhost:8150/api/commands/reboot-node"},{"name":"register-node","rel":"http://api.puppetlabs.com/razor/v1/commands/register-node","id":"http://localhost:8150/api/commands/register-node"},{"name":"reinstall-node","rel":"http://api.puppetlabs.com/razor/v1/commands/reinstall-node","id":"http://localhost:8150/api/commands/reinstall-node"},{"name":"remove-node-metadata","rel":"http://api.puppetlabs.com/razor/v1/commands/remove-node-metadata","id":"http://localhost:8150/api/commands/remove-node-metadata"},{"name":"remove-policy-tag","rel":"http://api.puppetlabs.com/razor/v1/commands/remove-policy-tag","id":"http://localhost:8150/api/commands/remove-policy-tag"},{"name":"run-hook","rel":"http://api.puppetlabs.com/razor/v1/commands/run-hook","id":"http://localhost:8150/api/commands/run-hook"},{"name":"set-node-desired-power-state","rel":"http://api.puppetlabs.com/razor/v1/commands/set-node-desired-power-state","id":"http://localhost:8150/api/commands/set-node-desired-power-state"},{"name":"set-node-hw-info","rel":"http://api.puppetlabs.com/razor/v1/commands/set-node-hw-info","id":"http://localhost:8150/api/commands/set-node-hw-info"},{"name":"set-node-ipmi-credentials","rel":"http://api.puppetlabs.com/razor/v1/commands/set-node-ipmi-credentials","id":"http://localhost:8150/api/commands/set-node-ipmi-credentials"},{"name":"update-broker-configuration","rel":"http://api.puppetlabs.com/razor/v1/commands/update-broker-configuration","id":"http://localhost:8150/api/commands/update-broker-configuration"},{"name":"update-hook-configuration","rel":"http://api.puppetlabs.com/razor/v1/commands/update-hook-configuration","id":"http://localhost:8150/api/commands/update-hook-configuration"},{"name":"update-node-metadata","rel":"http://api.puppetlabs.com/razor/v1/commands/update-node-metadata","id":"http://localhost:8150/api/commands/update-node-metadata"},{"name":"update-policy-broker","rel":"http://api.puppetlabs.com/razor/v1/commands/update-policy-broker","id":"http://localhost:8150/api/commands/update-policy-broker"},{"name":"update-policy-node-metadata","rel":"http://api.puppetlabs.com/razor/v1/commands/update-policy-node-metadata","id":"http://localhost:8150/api/commands/update-policy-node-metadata"},{"name":"update-policy-repo","rel":"http://api.puppetlabs.com/razor/v1/commands/update-policy-repo","id":"http://localhost:8150/api/commands/update-policy-repo"},{"name":"update-policy-task","rel":"http://api.puppetlabs.com/razor/v1/commands/update-policy-task","id":"http://localhost:8150/api/commands/update-policy-task"},{"name":"update-repo-task","rel":"http://api.puppetlabs.com/razor/v1/commands/update-repo-task","id":"http://localhost:8150/api/commands/update-repo-task"},{"name":"update-tag-rule","rel":"http://api.puppetlabs.com/razor/v1/commands/update-tag-rule","id":"http://localhost:8150/api/commands/update-tag-rule"}],"collections":[{"name":"brokers","rel":"http://api.puppetlabs.com/razor/v1/collections/brokers","id":"http://localhost:8150/api/collections/brokers"},{"name":"repos","rel":"http://api.puppetlabs.com/razor/v1/collections/repos","id":"http://localhost:8150/api/collections/repos"},{"name":"tags","rel":"http://api.puppetlabs.com/razor/v1/collections/tags","id":"http://localhost:8150/api/collections/tags"},{"name":"policies","rel":"http://api.puppetlabs.com/razor/v1/collections/policies","id":"http://localhost:8150/api/collections/policies"},{"name":"nodes","rel":"http://api.puppetlabs.com/razor/v1/collections/nodes","id":"http://localhost:8150/api/collections/nodes","params":{"start":{"type":"number"},"limit":{"type":"number"}}},{"name":"tasks","rel":"http://api.puppetlabs.com/razor/v1/collections/tasks","id":"http://localhost:8150/api/collections/tasks"},{"name":"commands","rel":"http://api.puppetlabs.com/razor/v1/collections/commands","id":"http://localhost:8150/api/collections/commands"},{"name":"events","rel":"http://api.puppetlabs.com/razor/v1/collections/events","id":"http://localhost:8150/api/collections/events","params":{"start":{"type":"number"},"limit":{"type":"number"}}},{"name":"hooks","rel":"http://api.puppetlabs.com/razor/v1/collections/hooks","id":"http://localhost:8150/api/collections/hooks"},{"name":"config","rel":"http://api.puppetlabs.com/razor/v1/collections/config","id":"http://localhost:8150/api/collections/config"}],"version":{"server":"v1.8.0-dirty"}}'
|
127
38
|
http_version:
|
128
|
-
recorded_at: Mon,
|
39
|
+
recorded_at: Mon, 23 Apr 2018 19:48:41 GMT
|
129
40
|
- request:
|
130
41
|
method: get
|
131
42
|
uri: http://localhost:8150/api/commands/update-tag-rule
|
@@ -138,7 +49,11 @@ http_interactions:
|
|
138
49
|
Accept-Encoding:
|
139
50
|
- gzip, deflate
|
140
51
|
User-Agent:
|
141
|
-
-
|
52
|
+
- rest-client/2.0.2 (darwin x86_64) jruby/9.1.5.0 (2.3.1p0)
|
53
|
+
Accept-Language:
|
54
|
+
- en_US,en
|
55
|
+
Host:
|
56
|
+
- localhost:8150
|
142
57
|
response:
|
143
58
|
status:
|
144
59
|
code: 200
|
@@ -147,17 +62,17 @@ http_interactions:
|
|
147
62
|
Server:
|
148
63
|
- Apache-Coyote/1.1
|
149
64
|
Etag:
|
150
|
-
- '"server-version-
|
65
|
+
- '"server-version-v1.8.0-dirty"'
|
151
66
|
X-Content-Type-Options:
|
152
67
|
- nosniff
|
153
68
|
Content-Type:
|
154
|
-
- application/json
|
69
|
+
- application/json
|
155
70
|
Content-Length:
|
156
|
-
- '
|
71
|
+
- '5021'
|
157
72
|
Date:
|
158
|
-
- Mon,
|
73
|
+
- Mon, 23 Apr 2018 19:48:41 GMT
|
159
74
|
body:
|
160
|
-
encoding:
|
75
|
+
encoding: UTF-8
|
161
76
|
string: '{"name":"update-tag-rule","help":{"summary":"Update the matching rule
|
162
77
|
for an existing tag","description":"This will change the rule of the given
|
163
78
|
tag to the new rule. The tag will be\nreevaluated against all nodes and each
|
@@ -176,23 +91,26 @@ http_interactions:
|
|
176
91
|
security is currently disabled.\n\n[shiro]: http://shiro.apache.org/permissions.html\n\n#
|
177
92
|
Attributes\n\n * name\n - The tag for which to change the rule.\n - This
|
178
93
|
attribute is required.\n - It must be of type string.\n - It must match
|
179
|
-
the name of an existing tag.\n\n * rule\n -
|
180
|
-
tag.\n - This attribute is required.\n -
|
181
|
-
|
182
|
-
|
183
|
-
|
184
|
-
|
185
|
-
|
186
|
-
to the policy.\n - It
|
187
|
-
example of updating a tag
|
188
|
-
\
|
189
|
-
true\n}","cli":"An
|
190
|
-
|
191
|
-
\"
|
192
|
-
|
193
|
-
tag
|
194
|
-
|
195
|
-
|
94
|
+
the name of an existing tag.\n - Its argument position is 0.\n\n * rule\n -
|
95
|
+
The new rule to apply to the tag.\n - This attribute is required.\n -
|
96
|
+
It must be of type array.\n - Its argument position is 1.\n\n * force\n -
|
97
|
+
By default this command will fail if the tag is in use by an existing\n policy. This
|
98
|
+
flag allows you to override that, and force the change to\n apply despite
|
99
|
+
the tag being in use.\n \n This will not change policy binding of
|
100
|
+
nodes, which may lead to some\n counter-intuitive results such as a node
|
101
|
+
that does *not* match policy\n tags being bound to the policy.\n - It
|
102
|
+
must be of type boolean.\n","examples":{"api":"An example of updating a tag
|
103
|
+
rule, and forcing reevaluation:\n\n{\n \"name\": \"small\",\n \"rule\":
|
104
|
+
[\"<=\", [\"fact\", \"processorcount\"], \"2\"],\n \"force\": true\n}","cli":"An
|
105
|
+
example of updating a tag rule, and forcing reevaluation:\n\n razor update-tag-rule
|
106
|
+
--name small --force \\\n --rule ''[\"<=\", [\"fact\", \"processorcount\"],
|
107
|
+
\"2\"]''\n\nWith positional arguments, this can be shortened:\n\n razor
|
108
|
+
update-tag-rule small ''[[\"<=\", [\"fact\", \"processorcount\"], \"2\"]]''
|
109
|
+
\\\n --force"},"full":"# SYNOPSIS\nUpdate the matching rule for an
|
110
|
+
existing tag\n\n# DESCRIPTION\nThis will change the rule of the given tag
|
111
|
+
to the new rule. The tag will be\nreevaluated against all nodes and each node''s
|
112
|
+
tag attribute will be updated to\nreflect whether the tag now matches or not,
|
113
|
+
i.e., the tag will be added\nto/removed from each node''s tag as appropriate.\n\nIf
|
196
114
|
the tag is used by any policies, the update will only be performed if the\noptional
|
197
115
|
parameter `force` is set to `true`. Otherwise, it will fail.\n# Access Control\n\nThis
|
198
116
|
command''s access control pattern: `commands:update-tag-rule:%{name}`\n\nWords
|
@@ -206,17 +124,17 @@ http_interactions:
|
|
206
124
|
security is currently disabled.\n\n[shiro]: http://shiro.apache.org/permissions.html\n\n#
|
207
125
|
Attributes\n\n * name\n - The tag for which to change the rule.\n - This
|
208
126
|
attribute is required.\n - It must be of type string.\n - It must match
|
209
|
-
the name of an existing tag.\n\n * rule\n -
|
210
|
-
tag.\n - This attribute is required.\n -
|
211
|
-
|
212
|
-
|
213
|
-
|
214
|
-
|
215
|
-
|
216
|
-
|
217
|
-
of updating a tag rule,
|
218
|
-
\
|
219
|
-
true\n }\n"},"schema":{"name":{"type":"string"},"rule":{"type":"array"},"force":{"type":"boolean"}}}'
|
127
|
+
the name of an existing tag.\n - Its argument position is 0.\n\n * rule\n -
|
128
|
+
The new rule to apply to the tag.\n - This attribute is required.\n -
|
129
|
+
It must be of type array.\n - Its argument position is 1.\n\n * force\n -
|
130
|
+
By default this command will fail if the tag is in use by an existing\n policy. This
|
131
|
+
flag allows you to override that, and force the change to\n apply despite
|
132
|
+
the tag being in use.\n \n This will not change policy binding of
|
133
|
+
nodes, which may lead to some\n counter-intuitive results such as a node
|
134
|
+
that does *not* match policy\n tags being bound to the policy.\n - It
|
135
|
+
must be of type boolean.\n\n# EXAMPLES\n\n An example of updating a tag rule,
|
136
|
+
and forcing reevaluation:\n \n {\n \"name\": \"small\",\n \"rule\":
|
137
|
+
[\"<=\", [\"fact\", \"processorcount\"], \"2\"],\n \"force\": true\n }\n"},"schema":{"name":{"type":"string","position":0},"rule":{"type":"array","position":1},"force":{"type":"boolean"}}}'
|
220
138
|
http_version:
|
221
|
-
recorded_at: Mon,
|
222
|
-
recorded_with: VCR
|
139
|
+
recorded_at: Mon, 23 Apr 2018 19:48:41 GMT
|
140
|
+
recorded_with: VCR 4.0.0
|