vagrant-aws-mscottford 0.8.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +21 -0
- data/.rspec +1 -0
- data/CHANGELOG.md +96 -0
- data/Gemfile +14 -0
- data/LICENSE +8 -0
- data/README.md +328 -0
- data/Rakefile +22 -0
- data/cortex.yaml +15 -0
- data/dummy.box +0 -0
- data/example_box/README.md +13 -0
- data/example_box/metadata.json +3 -0
- data/lib/vagrant-aws/action/connect_aws.rb +51 -0
- data/lib/vagrant-aws/action/elb_deregister_instance.rb +24 -0
- data/lib/vagrant-aws/action/elb_register_instance.rb +24 -0
- data/lib/vagrant-aws/action/is_created.rb +18 -0
- data/lib/vagrant-aws/action/is_stopped.rb +18 -0
- data/lib/vagrant-aws/action/message_already_created.rb +16 -0
- data/lib/vagrant-aws/action/message_not_created.rb +16 -0
- data/lib/vagrant-aws/action/message_will_not_destroy.rb +16 -0
- data/lib/vagrant-aws/action/package_instance.rb +192 -0
- data/lib/vagrant-aws/action/read_ssh_info.rb +53 -0
- data/lib/vagrant-aws/action/read_state.rb +38 -0
- data/lib/vagrant-aws/action/run_instance.rb +311 -0
- data/lib/vagrant-aws/action/start_instance.rb +81 -0
- data/lib/vagrant-aws/action/stop_instance.rb +28 -0
- data/lib/vagrant-aws/action/terminate_instance.rb +51 -0
- data/lib/vagrant-aws/action/timed_provision.rb +21 -0
- data/lib/vagrant-aws/action/wait_for_state.rb +41 -0
- data/lib/vagrant-aws/action/warn_networks.rb +19 -0
- data/lib/vagrant-aws/action.rb +209 -0
- data/lib/vagrant-aws/cap/winrm_info.rb +46 -0
- data/lib/vagrant-aws/config.rb +577 -0
- data/lib/vagrant-aws/errors.rb +43 -0
- data/lib/vagrant-aws/plugin.rb +78 -0
- data/lib/vagrant-aws/provider.rb +50 -0
- data/lib/vagrant-aws/util/elb.rb +58 -0
- data/lib/vagrant-aws/util/timer.rb +17 -0
- data/lib/vagrant-aws/version.rb +5 -0
- data/lib/vagrant-aws.rb +18 -0
- data/locales/en.yml +159 -0
- data/spec/spec_helper.rb +1 -0
- data/spec/vagrant-aws/config_spec.rb +374 -0
- data/templates/metadata.json.erb +3 -0
- data/templates/vagrant-aws_package_Vagrantfile.erb +5 -0
- data/vagrant-aws-mscottford.gemspec +64 -0
- metadata +177 -0
@@ -0,0 +1,50 @@
|
|
1
|
+
require "log4r"
|
2
|
+
require "vagrant"
|
3
|
+
|
4
|
+
module VagrantPlugins
|
5
|
+
module AWS
|
6
|
+
class Provider < Vagrant.plugin("2", :provider)
|
7
|
+
def initialize(machine)
|
8
|
+
@machine = machine
|
9
|
+
end
|
10
|
+
|
11
|
+
def action(name)
|
12
|
+
# Attempt to get the action method from the Action class if it
|
13
|
+
# exists, otherwise return nil to show that we don't support the
|
14
|
+
# given action.
|
15
|
+
action_method = "action_#{name}"
|
16
|
+
return Action.send(action_method) if Action.respond_to?(action_method)
|
17
|
+
nil
|
18
|
+
end
|
19
|
+
|
20
|
+
def ssh_info
|
21
|
+
# Run a custom action called "read_ssh_info" which does what it
|
22
|
+
# says and puts the resulting SSH info into the `:machine_ssh_info`
|
23
|
+
# key in the environment.
|
24
|
+
env = @machine.action("read_ssh_info", lock: false)
|
25
|
+
env[:machine_ssh_info]
|
26
|
+
end
|
27
|
+
|
28
|
+
def state
|
29
|
+
# Run a custom action we define called "read_state" which does
|
30
|
+
# what it says. It puts the state in the `:machine_state_id`
|
31
|
+
# key in the environment.
|
32
|
+
env = @machine.action("read_state", lock: false)
|
33
|
+
|
34
|
+
state_id = env[:machine_state_id]
|
35
|
+
|
36
|
+
# Get the short and long description
|
37
|
+
short = I18n.t("vagrant_aws.states.short_#{state_id}")
|
38
|
+
long = I18n.t("vagrant_aws.states.long_#{state_id}")
|
39
|
+
|
40
|
+
# Return the MachineState object
|
41
|
+
Vagrant::MachineState.new(state_id, short, long)
|
42
|
+
end
|
43
|
+
|
44
|
+
def to_s
|
45
|
+
id = @machine.id.nil? ? "new" : @machine.id
|
46
|
+
"AWS (#{id})"
|
47
|
+
end
|
48
|
+
end
|
49
|
+
end
|
50
|
+
end
|
@@ -0,0 +1,58 @@
|
|
1
|
+
module VagrantPlugins
|
2
|
+
module AWS
|
3
|
+
module ElasticLoadBalancer
|
4
|
+
|
5
|
+
def register_instance(env, elb_name, instance_id)
|
6
|
+
env[:ui].info I18n.t("vagrant_aws.elb.registering", instance_id: instance_id, elb_name: elb_name), :new_line => false
|
7
|
+
elb = get_load_balancer(env[:aws_elb], elb_name)
|
8
|
+
unless elb.instances.include? instance_id
|
9
|
+
elb.register_instances([instance_id])
|
10
|
+
env[:ui].info I18n.t("vagrant_aws.elb.ok"), :prefix => false
|
11
|
+
adjust_availability_zones env, elb
|
12
|
+
else
|
13
|
+
env[:ui].info I18n.t("vagrant_aws.elb.skipped"), :prefix => false
|
14
|
+
end
|
15
|
+
end
|
16
|
+
|
17
|
+
def deregister_instance(env, elb_name, instance_id)
|
18
|
+
env[:ui].info I18n.t("vagrant_aws.elb.deregistering", instance_id: instance_id, elb_name: elb_name), :new_line => false
|
19
|
+
elb = get_load_balancer(env[:aws_elb], elb_name)
|
20
|
+
if elb.instances.include? instance_id
|
21
|
+
elb.deregister_instances([instance_id])
|
22
|
+
env[:ui].info I18n.t("vagrant_aws.elb.ok"), :prefix => false
|
23
|
+
if env[:machine].provider_config.unregister_elb_from_az
|
24
|
+
adjust_availability_zones env, elb
|
25
|
+
end
|
26
|
+
else
|
27
|
+
env[:ui].info I18n.t("vagrant_aws.elb.skipped"), :prefix => false
|
28
|
+
end
|
29
|
+
end
|
30
|
+
|
31
|
+
def adjust_availability_zones(env, elb)
|
32
|
+
env[:ui].info I18n.t("vagrant_aws.elb.adjusting", elb_name: elb.id), :new_line => false
|
33
|
+
|
34
|
+
instances = env[:aws_compute].servers.all("instance-id" => elb.instances)
|
35
|
+
|
36
|
+
azs = if instances.empty?
|
37
|
+
["#{env[:machine].provider_config.region}a"]
|
38
|
+
else
|
39
|
+
instances.map(&:availability_zone).uniq
|
40
|
+
end
|
41
|
+
|
42
|
+
az_to_disable = elb.availability_zones - azs
|
43
|
+
az_to_enable = azs - elb.availability_zones
|
44
|
+
|
45
|
+
elb.enable_availability_zones az_to_enable unless az_to_enable.empty?
|
46
|
+
elb.disable_availability_zones az_to_disable unless az_to_disable.empty?
|
47
|
+
|
48
|
+
env[:ui].info I18n.t("vagrant_aws.elb.ok"), :prefix => false
|
49
|
+
end
|
50
|
+
|
51
|
+
private
|
52
|
+
|
53
|
+
def get_load_balancer(aws, name)
|
54
|
+
aws.load_balancers.find { |lb| lb.id == name } or raise Errors::ElbDoesNotExistError
|
55
|
+
end
|
56
|
+
end
|
57
|
+
end
|
58
|
+
end
|
@@ -0,0 +1,17 @@
|
|
1
|
+
module VagrantPlugins
|
2
|
+
module AWS
|
3
|
+
module Util
|
4
|
+
class Timer
|
5
|
+
# A basic utility method that times the execution of the given
|
6
|
+
# block and returns it.
|
7
|
+
def self.time
|
8
|
+
start_time = Time.now.to_f
|
9
|
+
yield
|
10
|
+
end_time = Time.now.to_f
|
11
|
+
|
12
|
+
end_time - start_time
|
13
|
+
end
|
14
|
+
end
|
15
|
+
end
|
16
|
+
end
|
17
|
+
end
|
data/lib/vagrant-aws.rb
ADDED
@@ -0,0 +1,18 @@
|
|
1
|
+
require "pathname"
|
2
|
+
|
3
|
+
require "vagrant-aws/plugin"
|
4
|
+
|
5
|
+
module VagrantPlugins
|
6
|
+
module AWS
|
7
|
+
lib_path = Pathname.new(File.expand_path("../vagrant-aws", __FILE__))
|
8
|
+
autoload :Action, lib_path.join("action")
|
9
|
+
autoload :Errors, lib_path.join("errors")
|
10
|
+
|
11
|
+
# This returns the path to the source of this plugin.
|
12
|
+
#
|
13
|
+
# @return [Pathname]
|
14
|
+
def self.source_root
|
15
|
+
@source_root ||= Pathname.new(File.expand_path("../../", __FILE__))
|
16
|
+
end
|
17
|
+
end
|
18
|
+
end
|
data/locales/en.yml
ADDED
@@ -0,0 +1,159 @@
|
|
1
|
+
en:
|
2
|
+
vagrant_aws:
|
3
|
+
already_status: |-
|
4
|
+
The machine is already %{status}.
|
5
|
+
burning_ami: |-
|
6
|
+
Waiting for the AMI '%{ami_id}' to burn...
|
7
|
+
elb:
|
8
|
+
adjusting: |-
|
9
|
+
Adjusting availability zones of ELB %{elb_name}...
|
10
|
+
registering: |-
|
11
|
+
Registering %{instance_id} at ELB %{elb_name}...
|
12
|
+
deregistering: |-
|
13
|
+
Deregistering %{instance_id} from ELB %{elb_name}...
|
14
|
+
ok: |-
|
15
|
+
ok
|
16
|
+
skipped: |-
|
17
|
+
skipped
|
18
|
+
|
19
|
+
launching_instance: |-
|
20
|
+
Launching an instance with the following settings...
|
21
|
+
launch_no_keypair: |-
|
22
|
+
Warning! You didn't specify a keypair to launch your instance with.
|
23
|
+
This can sometimes result in not being able to access your instance.
|
24
|
+
launch_vpc_warning: |-
|
25
|
+
Warning! You're launching this instance into a VPC without an
|
26
|
+
elastic IP. Please verify you're properly connected to a VPN so
|
27
|
+
you can access this machine, otherwise Vagrant will not be able
|
28
|
+
to SSH into it.
|
29
|
+
not_created: |-
|
30
|
+
Instance is not created. Please run `vagrant up` first.
|
31
|
+
packaging_instance: |-
|
32
|
+
Burning instance %{instance_id} into an ami
|
33
|
+
packaging_instance_complete: |-
|
34
|
+
Burn was successful in %{time_seconds}s
|
35
|
+
ready: |-
|
36
|
+
Machine is booted and ready for use!
|
37
|
+
rsync_not_found_warning: |-
|
38
|
+
Warning! Folder sync disabled because the rsync binary is missing in the %{side}.
|
39
|
+
Make sure rsync is installed and the binary can be found in the PATH.
|
40
|
+
rsync_folder: |-
|
41
|
+
Rsyncing folder: %{hostpath} => %{guestpath}
|
42
|
+
source_dest_checks_no_vpc: |-
|
43
|
+
Warning! Ignoring source_dest_checks flag as it can only be configured on
|
44
|
+
a VPC instance.
|
45
|
+
starting: |-
|
46
|
+
Starting the instance...
|
47
|
+
stopping: |-
|
48
|
+
Stopping the instance...
|
49
|
+
terminating: |-
|
50
|
+
Terminating the instance...
|
51
|
+
waiting_for_ready: |-
|
52
|
+
Waiting for instance to become "ready"...
|
53
|
+
waiting_for_ssh: |-
|
54
|
+
Waiting for SSH to become available...
|
55
|
+
warn_networks: |-
|
56
|
+
Warning! The AWS provider doesn't support any of the Vagrant
|
57
|
+
high-level network configurations (`config.vm.network`). They
|
58
|
+
will be silently ignored.
|
59
|
+
warn_ssh_access: |-
|
60
|
+
Warning! Vagrant might not be able to SSH into the instance.
|
61
|
+
Please check your security groups settings.
|
62
|
+
will_not_destroy: |-
|
63
|
+
The instance '%{name}' will not be destroyed, since the confirmation
|
64
|
+
was declined.
|
65
|
+
|
66
|
+
config:
|
67
|
+
access_key_id_required: |-
|
68
|
+
An access key ID must be specified via "access_key_id"
|
69
|
+
ami_required: |-
|
70
|
+
An AMI must be configured via "ami" (region: #{region})
|
71
|
+
private_key_missing: |-
|
72
|
+
The specified private key for AWS could not be found
|
73
|
+
region_required: |-
|
74
|
+
A region must be specified via "region"
|
75
|
+
secret_access_key_required: |-
|
76
|
+
A secret access key is required via "secret_access_key"
|
77
|
+
subnet_id_required_with_public_ip: |-
|
78
|
+
If you assign a public IP address to an instance in a VPC, a subnet must be specifed via "subnet_id"
|
79
|
+
aws_info_required: |-
|
80
|
+
One or more of the needed AWS credentials are missing. No environment variables
|
81
|
+
are set nor profile '%{profile}' exists at '%{location}'
|
82
|
+
|
83
|
+
errors:
|
84
|
+
fog_error: |-
|
85
|
+
There was an error talking to AWS. The error message is shown
|
86
|
+
below:
|
87
|
+
|
88
|
+
%{message}
|
89
|
+
internal_fog_error: |-
|
90
|
+
There was an error talking to AWS. The error message is shown
|
91
|
+
below:
|
92
|
+
|
93
|
+
Error: %{error}
|
94
|
+
Response: %{response}
|
95
|
+
instance_ready_timeout: |-
|
96
|
+
The instance never became "ready" in AWS. The timeout currently
|
97
|
+
set waiting for the instance to become ready is %{timeout} seconds.
|
98
|
+
Please verify that the machine properly boots. If you need more time
|
99
|
+
set the `instance_ready_timeout` configuration on the AWS provider.
|
100
|
+
instance_package_error: |-
|
101
|
+
There was an error packaging the instance. See details below for more info.
|
102
|
+
|
103
|
+
AMI Id: %{ami_id}
|
104
|
+
Error: %{err}
|
105
|
+
instance_package_timeout: |-
|
106
|
+
The AMI failed to become "ready" in AWS. The timeout currently
|
107
|
+
set waiting for the instance to become ready is %{timeout} seconds. For
|
108
|
+
larger instances AMI burning may take long periods of time. Please
|
109
|
+
ensure the timeout is set high enough, it can be changed by adjusting
|
110
|
+
the `instance_package_timeout` configuration on the AWS provider.
|
111
|
+
rsync_error: |-
|
112
|
+
There was an error when attempting to rsync a shared folder.
|
113
|
+
Please inspect the error message below for more info.
|
114
|
+
|
115
|
+
Host path: %{hostpath}
|
116
|
+
Guest path: %{guestpath}
|
117
|
+
Error: %{stderr}
|
118
|
+
mkdir_error: |-
|
119
|
+
There was an error when attempting to create a shared host folder.
|
120
|
+
Please inspect the error message below for more info.
|
121
|
+
|
122
|
+
Host path: %{hostpath}
|
123
|
+
Error: %{err}
|
124
|
+
elb_does_not_exist: |-
|
125
|
+
ELB configured for the instance does not exist
|
126
|
+
|
127
|
+
states:
|
128
|
+
short_not_created: |-
|
129
|
+
not created
|
130
|
+
long_not_created: |-
|
131
|
+
The EC2 instance is not created. Run `vagrant up` to create it.
|
132
|
+
|
133
|
+
short_stopped: |-
|
134
|
+
stopped
|
135
|
+
long_stopped: |-
|
136
|
+
The EC2 instance is stopped. Run `vagrant up` to start it.
|
137
|
+
|
138
|
+
short_stopping: |-
|
139
|
+
stopping
|
140
|
+
long_stopping: |-
|
141
|
+
The EC2 instance is stopping. Wait until is completely stopped to
|
142
|
+
run `vagrant up` and start it.
|
143
|
+
|
144
|
+
short_pending: |-
|
145
|
+
pending
|
146
|
+
long_pending: |-
|
147
|
+
The EC2 instance is pending a start (i.e. this is a transition state).
|
148
|
+
|
149
|
+
short_running: |-
|
150
|
+
running
|
151
|
+
long_running: |-
|
152
|
+
The EC2 instance is running. To stop this machine, you can run
|
153
|
+
`vagrant halt`. To destroy the machine, you can run `vagrant destroy`.
|
154
|
+
|
155
|
+
short_pending: |-
|
156
|
+
pending
|
157
|
+
long_pending: |-
|
158
|
+
The EC2 instance is still being initialized. To destroy this machine,
|
159
|
+
you can run `vagrant destroy`.
|
data/spec/spec_helper.rb
ADDED
@@ -0,0 +1 @@
|
|
1
|
+
|
@@ -0,0 +1,374 @@
|
|
1
|
+
require "vagrant-aws/config"
|
2
|
+
require 'rspec/its'
|
3
|
+
|
4
|
+
# remove deprecation warnings
|
5
|
+
# (until someone decides to update the whole spec file to rspec 3.4)
|
6
|
+
RSpec.configure do |config|
|
7
|
+
# ...
|
8
|
+
config.mock_with :rspec do |c|
|
9
|
+
c.syntax = [:should, :expect]
|
10
|
+
end
|
11
|
+
config.expect_with :rspec do |c|
|
12
|
+
c.syntax = [:should, :expect]
|
13
|
+
end
|
14
|
+
end
|
15
|
+
|
16
|
+
describe VagrantPlugins::AWS::Config do
|
17
|
+
let(:instance) { described_class.new }
|
18
|
+
|
19
|
+
# Ensure tests are not affected by AWS credential environment variables
|
20
|
+
before :each do
|
21
|
+
ENV.stub(:[] => nil)
|
22
|
+
end
|
23
|
+
|
24
|
+
describe "defaults" do
|
25
|
+
subject do
|
26
|
+
instance.tap do |o|
|
27
|
+
o.finalize!
|
28
|
+
end
|
29
|
+
end
|
30
|
+
|
31
|
+
its("access_key_id") { should be_nil }
|
32
|
+
its("ami") { should be_nil }
|
33
|
+
its("availability_zone") { should be_nil }
|
34
|
+
its("instance_ready_timeout") { should == 120 }
|
35
|
+
its("instance_check_interval") { should == 2 }
|
36
|
+
its("instance_package_timeout") { should == 600 }
|
37
|
+
its("instance_type") { should == "m3.medium" }
|
38
|
+
its("keypair_name") { should be_nil }
|
39
|
+
its("private_ip_address") { should be_nil }
|
40
|
+
its("region") { should == "us-east-1" }
|
41
|
+
its("secret_access_key") { should be_nil }
|
42
|
+
its("session_token") { should be_nil }
|
43
|
+
its("security_groups") { should == [] }
|
44
|
+
its("subnet_id") { should be_nil }
|
45
|
+
its("iam_instance_profile_arn") { should be_nil }
|
46
|
+
its("iam_instance_profile_name") { should be_nil }
|
47
|
+
its("tags") { should == {} }
|
48
|
+
its("package_tags") { should == {} }
|
49
|
+
its("user_data") { should be_nil }
|
50
|
+
its("use_iam_profile") { should be false }
|
51
|
+
its("block_device_mapping") {should == [] }
|
52
|
+
its("elastic_ip") { should be_nil }
|
53
|
+
its("terminate_on_shutdown") { should == false }
|
54
|
+
its("ssh_host_attribute") { should be_nil }
|
55
|
+
its("monitoring") { should == false }
|
56
|
+
its("ebs_optimized") { should == false }
|
57
|
+
its("source_dest_check") { should be_nil }
|
58
|
+
its("associate_public_ip") { should == false }
|
59
|
+
its("unregister_elb_from_az") { should == true }
|
60
|
+
its("tenancy") { should == "default" }
|
61
|
+
end
|
62
|
+
|
63
|
+
describe "overriding defaults" do
|
64
|
+
# I typically don't meta-program in tests, but this is a very
|
65
|
+
# simple boilerplate test, so I cut corners here. It just sets
|
66
|
+
# each of these attributes to "foo" in isolation, and reads the value
|
67
|
+
# and asserts the proper result comes back out.
|
68
|
+
[:access_key_id, :ami, :availability_zone, :instance_ready_timeout,
|
69
|
+
:instance_package_timeout, :instance_type, :keypair_name, :ssh_host_attribute,
|
70
|
+
:ebs_optimized, :region, :secret_access_key, :session_token, :monitoring,
|
71
|
+
:associate_public_ip, :subnet_id, :tags, :package_tags, :elastic_ip,
|
72
|
+
:terminate_on_shutdown, :iam_instance_profile_arn, :iam_instance_profile_name,
|
73
|
+
:use_iam_profile, :user_data, :block_device_mapping,
|
74
|
+
:source_dest_check].each do |attribute|
|
75
|
+
|
76
|
+
it "should not default #{attribute} if overridden" do
|
77
|
+
# but these should always come together, so you need to set them all or nothing
|
78
|
+
instance.send("access_key_id=".to_sym, "foo")
|
79
|
+
instance.send("secret_access_key=".to_sym, "foo")
|
80
|
+
instance.send("session_token=".to_sym, "foo")
|
81
|
+
instance.send("#{attribute}=".to_sym, "foo")
|
82
|
+
instance.finalize!
|
83
|
+
instance.send(attribute).should == "foo"
|
84
|
+
end
|
85
|
+
end
|
86
|
+
it "should not default security_groups if overridden" do
|
87
|
+
instance.security_groups = "foo"
|
88
|
+
instance.finalize!
|
89
|
+
instance.security_groups.should == ["foo"]
|
90
|
+
end
|
91
|
+
end
|
92
|
+
|
93
|
+
describe "getting credentials from environment" do
|
94
|
+
context "without EC2 credential environment variables" do
|
95
|
+
subject do
|
96
|
+
instance.tap do |o|
|
97
|
+
o.finalize!
|
98
|
+
end
|
99
|
+
end
|
100
|
+
|
101
|
+
its("access_key_id") { should be_nil }
|
102
|
+
its("secret_access_key") { should be_nil }
|
103
|
+
its("session_token") { should be_nil }
|
104
|
+
end
|
105
|
+
|
106
|
+
context "with EC2 credential environment variables" do
|
107
|
+
before :each do
|
108
|
+
ENV.stub(:[]).with("AWS_ACCESS_KEY_ID").and_return("access_key")
|
109
|
+
ENV.stub(:[]).with("AWS_SECRET_ACCESS_KEY").and_return("secret_key")
|
110
|
+
ENV.stub(:[]).with("AWS_SESSION_TOKEN").and_return("session_token")
|
111
|
+
end
|
112
|
+
|
113
|
+
subject do
|
114
|
+
instance.tap do |o|
|
115
|
+
o.finalize!
|
116
|
+
end
|
117
|
+
end
|
118
|
+
|
119
|
+
its("access_key_id") { should == "access_key" }
|
120
|
+
its("secret_access_key") { should == "secret_key" }
|
121
|
+
its("session_token") { should == "session_token" }
|
122
|
+
end
|
123
|
+
end
|
124
|
+
|
125
|
+
|
126
|
+
describe "getting credentials when there is an AWS profile" do
|
127
|
+
## ENV has been nuked so ENV['HOME'] will be a empty string when Credentials#get_aws_info gets called
|
128
|
+
let(:filename_cfg) { "/.aws/config" }
|
129
|
+
let(:filename_keys) { "/.aws/credentials" }
|
130
|
+
let(:data_cfg) {
|
131
|
+
"[default]
|
132
|
+
region=eu-west-1
|
133
|
+
output=json
|
134
|
+
|
135
|
+
[profile user1]
|
136
|
+
region=us-east-1
|
137
|
+
output=text
|
138
|
+
|
139
|
+
[profile user2]
|
140
|
+
region=us-east-1
|
141
|
+
output=text
|
142
|
+
|
143
|
+
[profile user3]
|
144
|
+
region=us-west-2
|
145
|
+
output=text
|
146
|
+
" }
|
147
|
+
let(:data_keys) {
|
148
|
+
"[default]
|
149
|
+
aws_access_key_id=AKIdefault
|
150
|
+
aws_secret_access_key=PASSdefault
|
151
|
+
|
152
|
+
[user1]
|
153
|
+
aws_access_key_id=AKIuser1
|
154
|
+
aws_secret_access_key=PASSuser1
|
155
|
+
|
156
|
+
[user2]
|
157
|
+
aws_access_key_id=AKIuser2
|
158
|
+
aws_secret_access_key=PASSuser2
|
159
|
+
aws_session_token=TOKuser2
|
160
|
+
|
161
|
+
[user3]
|
162
|
+
aws_access_key_id=AKIuser3
|
163
|
+
aws_secret_access_key=PASSuser3
|
164
|
+
aws_session_token= TOKuser3
|
165
|
+
" }
|
166
|
+
# filenames and file data when using AWS_SHARED_CREDENTIALS_FILE and AWS_CONFIG_FILE
|
167
|
+
let(:sh_dir) { "/aws_shared/" }
|
168
|
+
let(:sh_filename_cfg) { sh_dir + "config" }
|
169
|
+
let(:sh_filename_keys) { sh_dir + "credentials" }
|
170
|
+
let(:sh_data_cfg) { "[default]\nregion=sh-region\noutput=text" }
|
171
|
+
let(:sh_data_keys) { "[default]\naws_access_key_id=AKI_set_shared\naws_secret_access_key=set_shared_foobar" }
|
172
|
+
|
173
|
+
context "with EC2 credential environment variables set" do
|
174
|
+
subject do
|
175
|
+
ENV.stub(:[]).with("AWS_ACCESS_KEY_ID").and_return("env_access_key")
|
176
|
+
ENV.stub(:[]).with("AWS_SECRET_ACCESS_KEY").and_return("env_secret_key")
|
177
|
+
ENV.stub(:[]).with("AWS_SESSION_TOKEN").and_return("env_session_token")
|
178
|
+
ENV.stub(:[]).with("AWS_DEFAULT_REGION").and_return("env_region")
|
179
|
+
allow(File).to receive(:read).with(filename_cfg).and_return(data_cfg)
|
180
|
+
allow(File).to receive(:read).with(filename_keys).and_return(data_keys)
|
181
|
+
instance.tap do |o|
|
182
|
+
o.finalize!
|
183
|
+
end
|
184
|
+
end
|
185
|
+
its("access_key_id") { should == "env_access_key" }
|
186
|
+
its("secret_access_key") { should == "env_secret_key" }
|
187
|
+
its("session_token") { should == "env_session_token" }
|
188
|
+
its("region") { should == "env_region" }
|
189
|
+
end
|
190
|
+
|
191
|
+
context "without EC2 credential environment variables but with AWS_CONFIG_FILE and AWS_SHARED_CREDENTIALS_FILE set" do
|
192
|
+
subject do
|
193
|
+
allow(File).to receive(:exist?).and_return(true)
|
194
|
+
allow(File).to receive(:read).with(filename_cfg).and_return(data_cfg)
|
195
|
+
allow(File).to receive(:read).with(filename_keys).and_return(data_keys)
|
196
|
+
ENV.stub(:[]).with("AWS_CONFIG_FILE").and_return(sh_filename_cfg)
|
197
|
+
ENV.stub(:[]).with("AWS_SHARED_CREDENTIALS_FILE").and_return(sh_filename_keys)
|
198
|
+
allow(File).to receive(:read).with(sh_filename_cfg).and_return(sh_data_cfg)
|
199
|
+
allow(File).to receive(:read).with(sh_filename_keys).and_return(sh_data_keys)
|
200
|
+
instance.tap do |o|
|
201
|
+
o.finalize!
|
202
|
+
end
|
203
|
+
end
|
204
|
+
its("access_key_id") { should == "AKI_set_shared" }
|
205
|
+
its("secret_access_key") { should == "set_shared_foobar" }
|
206
|
+
its("session_token") { should be_nil }
|
207
|
+
its("region") { should == "sh-region" }
|
208
|
+
end
|
209
|
+
|
210
|
+
context "without any credential environment variables and fallback to default profile at default location" do
|
211
|
+
subject do
|
212
|
+
allow(File).to receive(:exist?).and_return(true)
|
213
|
+
allow(File).to receive(:read).with(filename_cfg).and_return(data_cfg)
|
214
|
+
allow(File).to receive(:read).with(filename_keys).and_return(data_keys)
|
215
|
+
instance.tap do |o|
|
216
|
+
o.finalize!
|
217
|
+
end
|
218
|
+
end
|
219
|
+
its("access_key_id") { should == "AKIdefault" }
|
220
|
+
its("secret_access_key") { should == "PASSdefault" }
|
221
|
+
its("session_token") { should be_nil }
|
222
|
+
end
|
223
|
+
|
224
|
+
context "without any credential environment variables and chosing a profile" do
|
225
|
+
subject do
|
226
|
+
allow(File).to receive(:exist?).and_return(true)
|
227
|
+
allow(File).to receive(:read).with(filename_cfg).and_return(data_cfg)
|
228
|
+
allow(File).to receive(:read).with(filename_keys).and_return(data_keys)
|
229
|
+
instance.aws_profile = "user3"
|
230
|
+
instance.tap do |o|
|
231
|
+
o.finalize!
|
232
|
+
end
|
233
|
+
end
|
234
|
+
its("access_key_id") { should == "AKIuser3" }
|
235
|
+
its("secret_access_key") { should == "PASSuser3" }
|
236
|
+
its("session_token") { should == "TOKuser3" }
|
237
|
+
its("region") { should == "us-west-2" }
|
238
|
+
end
|
239
|
+
end
|
240
|
+
|
241
|
+
|
242
|
+
|
243
|
+
describe "region config" do
|
244
|
+
let(:config_access_key_id) { "foo" }
|
245
|
+
let(:config_ami) { "foo" }
|
246
|
+
let(:config_instance_type) { "foo" }
|
247
|
+
let(:config_keypair_name) { "foo" }
|
248
|
+
let(:config_region) { "foo" }
|
249
|
+
let(:config_secret_access_key) { "foo" }
|
250
|
+
let(:config_session_token) { "foo" }
|
251
|
+
|
252
|
+
def set_test_values(instance)
|
253
|
+
instance.access_key_id = config_access_key_id
|
254
|
+
instance.ami = config_ami
|
255
|
+
instance.instance_type = config_instance_type
|
256
|
+
instance.keypair_name = config_keypair_name
|
257
|
+
instance.region = config_region
|
258
|
+
instance.secret_access_key = config_secret_access_key
|
259
|
+
instance.session_token = config_session_token
|
260
|
+
end
|
261
|
+
|
262
|
+
it "should raise an exception if not finalized" do
|
263
|
+
expect { instance.get_region_config("us-east-1") }.
|
264
|
+
to raise_error
|
265
|
+
end
|
266
|
+
|
267
|
+
context "with no specific config set" do
|
268
|
+
subject do
|
269
|
+
# Set the values on the top-level object
|
270
|
+
set_test_values(instance)
|
271
|
+
|
272
|
+
# Finalize so we can get the region config
|
273
|
+
instance.finalize!
|
274
|
+
|
275
|
+
# Get a lower level region
|
276
|
+
instance.get_region_config("us-east-1")
|
277
|
+
end
|
278
|
+
|
279
|
+
its("access_key_id") { should == config_access_key_id }
|
280
|
+
its("ami") { should == config_ami }
|
281
|
+
its("instance_type") { should == config_instance_type }
|
282
|
+
its("keypair_name") { should == config_keypair_name }
|
283
|
+
its("region") { should == config_region }
|
284
|
+
its("secret_access_key") { should == config_secret_access_key }
|
285
|
+
its("session_token") { should == config_session_token }
|
286
|
+
end
|
287
|
+
|
288
|
+
context "with a specific config set" do
|
289
|
+
let(:region_name) { "hashi-region" }
|
290
|
+
|
291
|
+
subject do
|
292
|
+
# Set the values on a specific region
|
293
|
+
instance.region_config region_name do |config|
|
294
|
+
set_test_values(config)
|
295
|
+
end
|
296
|
+
|
297
|
+
# Finalize so we can get the region config
|
298
|
+
instance.finalize!
|
299
|
+
|
300
|
+
# Get the region
|
301
|
+
instance.get_region_config(region_name)
|
302
|
+
end
|
303
|
+
|
304
|
+
its("access_key_id") { should == config_access_key_id }
|
305
|
+
its("ami") { should == config_ami }
|
306
|
+
its("instance_type") { should == config_instance_type }
|
307
|
+
its("keypair_name") { should == config_keypair_name }
|
308
|
+
its("region") { should == region_name }
|
309
|
+
its("secret_access_key") { should == config_secret_access_key }
|
310
|
+
its("session_token") { should == config_session_token }
|
311
|
+
end
|
312
|
+
|
313
|
+
describe "inheritance of parent config" do
|
314
|
+
let(:region_name) { "hashi-region" }
|
315
|
+
|
316
|
+
subject do
|
317
|
+
# Set the values on a specific region
|
318
|
+
instance.region_config region_name do |config|
|
319
|
+
config.ami = "child"
|
320
|
+
end
|
321
|
+
|
322
|
+
# Set some top-level values
|
323
|
+
instance.access_key_id = "parent"
|
324
|
+
instance.secret_access_key = "parent"
|
325
|
+
instance.ami = "parent"
|
326
|
+
|
327
|
+
# Finalize and get the region
|
328
|
+
instance.finalize!
|
329
|
+
instance.get_region_config(region_name)
|
330
|
+
end
|
331
|
+
|
332
|
+
its("access_key_id") { should == "parent" }
|
333
|
+
its("secret_access_key") { should == "parent" }
|
334
|
+
its("ami") { should == "child" }
|
335
|
+
end
|
336
|
+
|
337
|
+
describe "shortcut configuration" do
|
338
|
+
subject do
|
339
|
+
# Use the shortcut configuration to set some values
|
340
|
+
instance.region_config "us-east-1", :ami => "child"
|
341
|
+
instance.finalize!
|
342
|
+
instance.get_region_config("us-east-1")
|
343
|
+
end
|
344
|
+
|
345
|
+
its("ami") { should == "child" }
|
346
|
+
end
|
347
|
+
|
348
|
+
describe "merging" do
|
349
|
+
let(:first) { described_class.new }
|
350
|
+
let(:second) { described_class.new }
|
351
|
+
|
352
|
+
it "should merge the tags and block_device_mappings" do
|
353
|
+
first.tags["one"] = "one"
|
354
|
+
second.tags["two"] = "two"
|
355
|
+
first.package_tags["three"] = "three"
|
356
|
+
second.package_tags["four"] = "four"
|
357
|
+
first.block_device_mapping = [{:one => "one"}]
|
358
|
+
second.block_device_mapping = [{:two => "two"}]
|
359
|
+
|
360
|
+
third = first.merge(second)
|
361
|
+
third.tags.should == {
|
362
|
+
"one" => "one",
|
363
|
+
"two" => "two"
|
364
|
+
}
|
365
|
+
third.package_tags.should == {
|
366
|
+
"three" => "three",
|
367
|
+
"four" => "four"
|
368
|
+
}
|
369
|
+
third.block_device_mapping.index({:one => "one"}).should_not be_nil
|
370
|
+
third.block_device_mapping.index({:two => "two"}).should_not be_nil
|
371
|
+
end
|
372
|
+
end
|
373
|
+
end
|
374
|
+
end
|