mod 'elasticsearch/elasticsearch', '0.9.5'
mod 'nanliu/staging', '1.0.3'
+
+mod 'stackforge/openstacklib', '5.1.0'
--- /dev/null
+source 'https://rubygems.org'
+
+group :development, :test do
+ gem 'puppetlabs_spec_helper', :require => false
+ gem 'metadata-json-lint'
+ gem 'puppet-lint', '~> 0.3.2'
+ gem 'rspec-puppet', '~> 1.0.1'
+ gem 'rake', '10.1.1'
+ gem 'rspec'
+ gem 'mocha'
+ gem 'json'
+ gem 'faraday', '0.8.8', :require => false
+ gem 'vcr', :require => false
+end
+
+if puppetversion = ENV['PUPPET_GEM_VERSION']
+ gem 'puppet', puppetversion, :require => false
+else
+ gem 'puppet', :require => false
+end
+
+# vim:ft=ruby
--- /dev/null
+ Apache License
+ Version 2.0, January 2004
+ http://www.apache.org/licenses/
+
+ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
+
+ 1. Definitions.
+
+ "License" shall mean the terms and conditions for use, reproduction,
+ and distribution as defined by Sections 1 through 9 of this document.
+
+ "Licensor" shall mean the copyright owner or entity authorized by
+ the copyright owner that is granting the License.
+
+ "Legal Entity" shall mean the union of the acting entity and all
+ other entities that control, are controlled by, or are under common
+ control with that entity. For the purposes of this definition,
+ "control" means (i) the power, direct or indirect, to cause the
+ direction or management of such entity, whether by contract or
+ otherwise, or (ii) ownership of fifty percent (50%) or more of the
+ outstanding shares, or (iii) beneficial ownership of such entity.
+
+ "You" (or "Your") shall mean an individual or Legal Entity
+ exercising permissions granted by this License.
+
+ "Source" form shall mean the preferred form for making modifications,
+ including but not limited to software source code, documentation
+ source, and configuration files.
+
+ "Object" form shall mean any form resulting from mechanical
+ transformation or translation of a Source form, including but
+ not limited to compiled object code, generated documentation,
+ and conversions to other media types.
+
+ "Work" shall mean the work of authorship, whether in Source or
+ Object form, made available under the License, as indicated by a
+ copyright notice that is included in or attached to the work
+ (an example is provided in the Appendix below).
+
+ "Derivative Works" shall mean any work, whether in Source or Object
+ form, that is based on (or derived from) the Work and for which the
+ editorial revisions, annotations, elaborations, or other modifications
+ represent, as a whole, an original work of authorship. For the purposes
+ of this License, Derivative Works shall not include works that remain
+ separable from, or merely link (or bind by name) to the interfaces of,
+ the Work and Derivative Works thereof.
+
+ "Contribution" shall mean any work of authorship, including
+ the original version of the Work and any modifications or additions
+ to that Work or Derivative Works thereof, that is intentionally
+ submitted to Licensor for inclusion in the Work by the copyright owner
+ or by an individual or Legal Entity authorized to submit on behalf of
+ the copyright owner. For the purposes of this definition, "submitted"
+ means any form of electronic, verbal, or written communication sent
+ to the Licensor or its representatives, including but not limited to
+ communication on electronic mailing lists, source code control systems,
+ and issue tracking systems that are managed by, or on behalf of, the
+ Licensor for the purpose of discussing and improving the Work, but
+ excluding communication that is conspicuously marked or otherwise
+ designated in writing by the copyright owner as "Not a Contribution."
+
+ "Contributor" shall mean Licensor and any individual or Legal Entity
+ on behalf of whom a Contribution has been received by Licensor and
+ subsequently incorporated within the Work.
+
+ 2. Grant of Copyright License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ copyright license to reproduce, prepare Derivative Works of,
+ publicly display, publicly perform, sublicense, and distribute the
+ Work and such Derivative Works in Source or Object form.
+
+ 3. Grant of Patent License. Subject to the terms and conditions of
+ this License, each Contributor hereby grants to You a perpetual,
+ worldwide, non-exclusive, no-charge, royalty-free, irrevocable
+ (except as stated in this section) patent license to make, have made,
+ use, offer to sell, sell, import, and otherwise transfer the Work,
+ where such license applies only to those patent claims licensable
+ by such Contributor that are necessarily infringed by their
+ Contribution(s) alone or by combination of their Contribution(s)
+ with the Work to which such Contribution(s) was submitted. If You
+ institute patent litigation against any entity (including a
+ cross-claim or counterclaim in a lawsuit) alleging that the Work
+ or a Contribution incorporated within the Work constitutes direct
+ or contributory patent infringement, then any patent licenses
+ granted to You under this License for that Work shall terminate
+ as of the date such litigation is filed.
+
+ 4. Redistribution. You may reproduce and distribute copies of the
+ Work or Derivative Works thereof in any medium, with or without
+ modifications, and in Source or Object form, provided that You
+ meet the following conditions:
+
+ (a) You must give any other recipients of the Work or
+ Derivative Works a copy of this License; and
+
+ (b) You must cause any modified files to carry prominent notices
+ stating that You changed the files; and
+
+ (c) You must retain, in the Source form of any Derivative Works
+ that You distribute, all copyright, patent, trademark, and
+ attribution notices from the Source form of the Work,
+ excluding those notices that do not pertain to any part of
+ the Derivative Works; and
+
+ (d) If the Work includes a "NOTICE" text file as part of its
+ distribution, then any Derivative Works that You distribute must
+ include a readable copy of the attribution notices contained
+ within such NOTICE file, excluding those notices that do not
+ pertain to any part of the Derivative Works, in at least one
+ of the following places: within a NOTICE text file distributed
+ as part of the Derivative Works; within the Source form or
+ documentation, if provided along with the Derivative Works; or,
+ within a display generated by the Derivative Works, if and
+ wherever such third-party notices normally appear. The contents
+ of the NOTICE file are for informational purposes only and
+ do not modify the License. You may add Your own attribution
+ notices within Derivative Works that You distribute, alongside
+ or as an addendum to the NOTICE text from the Work, provided
+ that such additional attribution notices cannot be construed
+ as modifying the License.
+
+ You may add Your own copyright statement to Your modifications and
+ may provide additional or different license terms and conditions
+ for use, reproduction, or distribution of Your modifications, or
+ for any such Derivative Works as a whole, provided Your use,
+ reproduction, and distribution of the Work otherwise complies with
+ the conditions stated in this License.
+
+ 5. Submission of Contributions. Unless You explicitly state otherwise,
+ any Contribution intentionally submitted for inclusion in the Work
+ by You to the Licensor shall be under the terms and conditions of
+ this License, without any additional terms or conditions.
+ Notwithstanding the above, nothing herein shall supersede or modify
+ the terms of any separate license agreement you may have executed
+ with Licensor regarding such Contributions.
+
+ 6. Trademarks. This License does not grant permission to use the trade
+ names, trademarks, service marks, or product names of the Licensor,
+ except as required for reasonable and customary use in describing the
+ origin of the Work and reproducing the content of the NOTICE file.
+
+ 7. Disclaimer of Warranty. Unless required by applicable law or
+ agreed to in writing, Licensor provides the Work (and each
+ Contributor provides its Contributions) on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
+ implied, including, without limitation, any warranties or conditions
+ of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
+ PARTICULAR PURPOSE. You are solely responsible for determining the
+ appropriateness of using or redistributing the Work and assume any
+ risks associated with Your exercise of permissions under this License.
+
+ 8. Limitation of Liability. In no event and under no legal theory,
+ whether in tort (including negligence), contract, or otherwise,
+ unless required by applicable law (such as deliberate and grossly
+ negligent acts) or agreed to in writing, shall any Contributor be
+ liable to You for damages, including any direct, indirect, special,
+ incidental, or consequential damages of any character arising as a
+ result of this License or out of the use or inability to use the
+ Work (including but not limited to damages for loss of goodwill,
+ work stoppage, computer failure or malfunction, or any and all
+ other commercial damages or losses), even if such Contributor
+ has been advised of the possibility of such damages.
+
+ 9. Accepting Warranty or Additional Liability. While redistributing
+ the Work or Derivative Works thereof, You may choose to offer,
+ and charge a fee for, acceptance of support, warranty, indemnity,
+ or other liability obligations and/or rights consistent with this
+ License. However, in accepting such obligations, You may act only
+ on Your own behalf and on Your sole responsibility, not on behalf
+ of any other Contributor, and only if You agree to indemnify,
+ defend, and hold each Contributor harmless for any liability
+ incurred by, or claims asserted against, such Contributor by reason
+ of your accepting any such warranty or additional liability.
+
+ END OF TERMS AND CONDITIONS
+
+ APPENDIX: How to apply the Apache License to your work.
+
+ To apply the Apache License to your work, attach the following
+ boilerplate notice, with the fields enclosed by brackets "[]"
+ replaced with your own identifying information. (Don't include
+ the brackets!) The text should be enclosed in the appropriate
+ comment syntax for the file format. We also recommend that a
+ file or class name and description of purpose be included on the
+ same "printed page" as the copyright notice for easier
+ identification within third-party archives.
+
+ Copyright 2014 Puppet Labs Inc
+
+ Licensed under the Apache License, Version 2.0 (the "License");
+ you may not use this file except in compliance with the License.
+ You may obtain a copy of the License at
+
+ http://www.apache.org/licenses/LICENSE-2.0
+
+ Unless required by applicable law or agreed to in writing, software
+ distributed under the License is distributed on an "AS IS" BASIS,
+ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+ See the License for the specific language governing permissions and
+ limitations under the License.
--- /dev/null
+openstacklib
+============
+
+5.1.0 - 2014.2 - Juno
+#### Table of Contents
+
+1. [Overview - What is the openstacklib module?](#overview)
+2. [Module Description - What does the module do?](#module-description)
+3. [Setup - The basics of getting started with openstacklib](#setup)
+4. [Implementation - An under-the-hood peek at what the module is doing](#implementation)
+5. [Limitations - OS compatibility, etc.](#limitations)
+6. [Development - Guide for contributing to the module](#development)
+7. [Contributors - Those with commits](#contributors)
+8. [Release Notes - Notes on the most recent updates to the module](#release-notes)
+
+Overview
+--------
+
+The openstacklib module is a part of [Stackforge](https://github.com/stackforge),
+an effort by the Openstack infrastructure team to provide continuous integration
+testing and code review for Openstack and Openstack community projects not part
+of the core software. The module itself is used to expose common functionality
+between Openstack modules as a library that can be utilized to avoid code
+duplication.
+
+Module Description
+------------------
+
+The openstacklib module is a library module for other Openstack modules to
+utilize. A thorough description will be added later.
+
+This module is tested in combination with other modules needed to build and
+leverage an entire Openstack software stack. These modules can be found, all
+pulled together in the [openstack module](https://github.com/stackforge/puppet-openstack).
+
+Setup
+-----
+
+### Installing openstacklib
+
+ example% puppet module install puppetlabs/openstacklib
+
+Usage
+-----
+
+### Classes and Defined Types
+
+#### Defined type: openstacklib::db::mysql
+
+The db::mysql resource is a library resource that can be used by nova, cinder,
+ceilometer, etc., to create a mysql database with configurable privileges for
+a user connecting from defined hosts.
+
+Typically this resource will be declared with a notify parameter to configure
+the sync command to execute when the database resource is changed.
+
+For example, in heat::db::mysql you might declare:
+
+```
+::openstacklib::db::mysql { 'heat':
+ password_hash => mysql_password($password),
+ dbname => $dbname,
+ user => $user,
+ host => $host,
+ charset => $charset,
+ collate => $collate,
+ allowed_hosts => $allowed_hosts,
+ notify => Exec['heat-dbsync'],
+ }
+```
+
+Some modules should ensure that the database is created before the service is
+set up. For example, in keystone::db::mysql you would have:
+
+```
+::openstacklib::db::mysql { 'keystone':
+ password_hash => mysql_password($password),
+ dbname => $dbname,
+ user => $user,
+ host => $host,
+ charset => $charset,
+ collate => $collate,
+ allowed_hosts => $allowed_hosts,
+ notify => Exec['keystone-manage db_sync'],
+ before => Service['keystone'],
+ }
+```
+
+** Parameters for openstacklib::db::mysql: **
+
+#####`password_hash`
+Password hash to use for the database user for this service;
+string; required
+
+#####`dbname`
+The name of the database
+string; optional; default to the $title of the resource, i.e. 'nova'
+
+#####`user`
+The database user to create;
+string; optional; default to the $title of the resource, i.e. 'nova'
+
+#####`host`
+The IP address or hostname of the user in mysql_grant;
+string; optional; default to '127.0.0.1'
+
+#####`charset`
+The charset to use for the database;
+string; optional; default to 'utf8'
+
+#####`collate`
+The collate to use for the database;
+string; optional; default to 'utf8_general_ci'
+
+#####`allowed_hosts`
+Additional hosts that are allowed to access this database;
+array or string; optional; default to undef
+
+#####`privileges`
+Privileges given to the database user;
+string or array of strings; optional; default to 'ALL'
+
+
+#### Defined type: openstacklib::service_validation
+
+The service_validation resource is a library resource that can be used by nova, cinder,
+ceilometer, etc., to validate that a resource is actually up and running.
+
+For example, in nova::api you might declare:
+
+```
+::openstacklib::service_validation { 'nova-api':
+ command => 'nova list',
+ }
+```
+This defined resource creates an exec-anchor pair where the anchor depends upon
+the successful exec run.
+
+** Parameters for openstacklib::service_validation: **
+
+#####`command`
+Command to run for validating the service;
+string; required
+
+#####`service_name`
+The name of the service to validate;
+string; optional; default to the $title of the resource, i.e. 'nova-api'
+
+#####`path`
+The path of the command to validate the service;
+string; optional; default to '/usr/bin:/bin:/usr/sbin:/sbin'
+
+#####`provider`
+The provider to use for the exec command;
+string; optional; default to 'shell'
+
+#####`tries`
+Number of times to retry validation;
+string; optional; default to '10'
+
+#####`try_sleep`
+Number of seconds between validation attempts;
+string; optional; default to '2'
+
+### Types and Providers
+
+#### Aviator
+
+#####`Puppet::add_aviator_params`
+
+The aviator type is not a real type, but it serves to simulate a mixin model,
+whereby other types can call out to the Puppet::add\_aviator\_params method in
+order to add aviator-specific parameters to themselves. Currently this adds the
+auth parameter to the given type. The method must be called after the type is
+declared, e.g.:
+
+```puppet
+require 'puppet/type/aviator'
+Puppet::Type.newtype(:my_type) do
+# ...
+end
+Puppet::add_aviator_params(:my_type)
+```
+
+#####`Puppet::Provider::Aviator`
+
+The aviator provider is a parent provider intended to serve as a base for other
+providers that need to authenticate against keystone in order to accomplish a
+task.
+
+**`Puppet::Provider::Aviator#authenticate`**
+
+Either creates an authenticated session or sets up an unauthenticated session
+with instance variables initialized with a token to inject into the next request.
+It takes as arguments a set of authentication parameters as a hash and a path
+to a log file. Puppet::Provider::Aviator#authencate looks for five different
+possible methods of authenticating, in the following order:
+
+1) Username and password credentials in the auth parameters
+2) The path to an openrc file containing credentials to read in the auth
+ parameters
+3) A service token in the auth parameters
+4) Environment variables set for the environment in which Puppet is running
+5) A service token in /etc/keystone/keystone.conf. This option provides
+ backwards compatibility with earlier keystone providers.
+
+If the provider has password credentials, it can create an authenticated
+session. If it only has a service token, it initializes an unauthenciated
+session and a hash of session data that can be injected into a future request.
+
+**`Puppet::Provider::Aviator#make_request`**
+
+After creating a session, the make\_request method provides an interface that
+providers can use to make requests without worrying about whether they have an
+authenticated or unauthenticated session. It takes as arguments the
+Aviator::Service it is making a request at (for example, keystone), a symbol for
+the request (for example, :list\_tenants), and optionally a block to execute
+that will set parameters for an update request.
+
+Implementation
+--------------
+
+### openstacklib
+
+openstacklib is a combination of Puppet manifest and ruby code to delivery
+configuration and extra functionality through types and providers.
+
+Limitations
+-----------
+
+* Limitations will be added as they are discovered.
+
+Development
+-----------
+
+Developer documentation for the entire puppet-openstack project.
+
+* https://wiki.openstack.org/wiki/Puppet-openstack#Developer_documentation
+
+Contributors
+------------
+
+* https://github.com/stackforge/puppet-openstacklib/graphs/contributors
+
+Versioning
+----------
+
+This module has been given version 5 to track the puppet-openstack modules. The
+versioning for the puppet-openstack modules are as follows:
+
+```
+Puppet Module :: OpenStack Version :: OpenStack Codename
+2.0.0 -> 2013.1.0 -> Grizzly
+3.0.0 -> 2013.2.0 -> Havana
+4.0.0 -> 2014.1.0 -> Icehouse
+5.0.0 -> 2014.2.0 -> Juno
+```
+
+Release Notes
+-------------
+
+**5.1.0**
+
+* Update .gitreview file for project rename
+* Adding augeas insertion check
+* MySQL: change default MySQL collate to utf8_general_ci
+* spec: pin rspec-puppet to 1.0.1
+
+**5.0.0**
+
+* This is the initial release of this module.
--- /dev/null
+require 'rubygems'
+require 'puppetlabs_spec_helper/rake_tasks'
+require 'puppet-lint/tasks/puppet-lint'
+
+PuppetLint.configuration.fail_on_warnings = true
+PuppetLint.configuration.send('disable_80chars')
+PuppetLint.configuration.ignore_paths = ["spec/**/*.pp", "pkg/**/*.pp"]
--- /dev/null
+{
+ "Gemfile": "2c4e4ae399db74816aafb47dbc3951a5",
+ "LICENSE": "53173ea25085d832ebb1e9d131dc645d",
+ "README.md": "023e14103588e6eb16aee599338f0798",
+ "Rakefile": "a61c67fc9275174b6d502c7a97d58fba",
+ "lib/puppet/parser/functions/os_database_connection.rb": "f50c5c418a4745f67b863351aa421371",
+ "lib/puppet/provider/aviator.rb": "dfec34e1929a1bb260d26b5382d596a2",
+ "lib/puppet/util/aviator.rb": "6a2f5145b59f2011f04b9598db4d66d6",
+ "manifests/db/mysql/host_access.pp": "0d4b41a44213cd2cae0febe63032b74e",
+ "manifests/db/mysql.pp": "4b2ac1ae2ef9c32c2bdcf5330faa2c85",
+ "manifests/messaging/rabbitmq.pp": "4f2a699c774c57aa645ef7300c87eb9c",
+ "manifests/policy/base.pp": "9fcbf53d8442a2e258cbe1260ac6dc6b",
+ "manifests/policy.pp": "843e98d897e3df8d8d70f8017f7b6e6e",
+ "manifests/service_validation.pp": "7b0ed110553298231d947a131e2570f5",
+ "metadata.json": "a1e6434b728214cb8a0f235468260e86",
+ "spec/classes/init_spec.rb": "62493b66358f3c7acf24b0cfe8a98391",
+ "spec/classes/openstacklib_policy_spec.rb": "806f398cc4a8a9cf11c005608879374c",
+ "spec/defines/openstacklib_db_mysql_host_access_spec.rb": "4e498ba905f57bebc98480207f73e253",
+ "spec/defines/openstacklib_db_mysql_spec.rb": "edac2c0018bb0baaf4b55920b39564e6",
+ "spec/defines/openstacklib_messaging_rabbitmq_spec.rb": "7551d7034f07951fff7cd28ca05adf42",
+ "spec/defines/openstacklib_policy_spec.rb": "6fc8d604b44f2c559bcd2222210031b3",
+ "spec/defines/openstacklib_service_validation_spec.rb": "cbb6e09a2c2bca9b04d699e3509b4827",
+ "spec/fixtures/vcr/aviator/request/with_session.yml": "36b855c8d25e2652a711b4d76ab16b20",
+ "spec/fixtures/vcr/aviator/request/without_session.yml": "ab811807ab346574e7cab61bf111be20",
+ "spec/fixtures/vcr/aviator/session/with_password.yml": "4ceea78a734539233b9de4fe60cb856c",
+ "spec/fixtures/vcr/aviator/session/with_token.yml": "ab811807ab346574e7cab61bf111be20",
+ "spec/functions/os_database_connection_spec.rb": "0cfa88f055785516f56672b1f773a461",
+ "spec/spec_helper.rb": "93f9c20dc020eba3bc244c347b8e5d34",
+ "spec/unit/provider/aviator_spec.rb": "2d736d88dbcd3bb2b4960067df71d51f"
+}
\ No newline at end of file
--- /dev/null
+require 'puppet/parser/functions'
+
+Puppet::Parser::Functions.newfunction(:os_database_connection,
+ :type => :rvalue,
+ :doc => <<-EOS
+This function builds a os_database_connection string from various parameters.
+EOS
+) do |arguments|
+
+ require 'uri'
+
+ if (arguments.size != 1) then
+ raise(Puppet::ParseError, "os_database_connection(): Wrong number of arguments " +
+ "given (#{arguments.size} for 1)")
+ end
+
+ v = arguments[0]
+ klass = v.class
+
+ unless klass == Hash
+ raise(Puppet::ParseError, "os_database_connection(): Requires an hash, got #{klass}")
+ end
+
+ v.keys.each do |key|
+ unless (v[key].class == String) or (v[key] == :undef)
+ raise(Puppet::ParseError, "os_database_connection(): #{key} should be a String")
+ end
+ end
+
+ parts = {}
+
+ unless v.include?('dialect')
+ raise(Puppet::ParseError, 'os_database_connection(): dialect is required')
+ end
+
+ if v.include?('host')
+ parts[:host] = v['host']
+ end
+
+ unless v.include?('database')
+ raise(Puppet::ParseError, 'os_database_connection(): database is required')
+ end
+
+ if v.include?('port')
+ if v.include?('host')
+ parts[:port] = v['port'].to_i
+ else
+ raise(Puppet::ParseError, 'os_database_connection(): host is required with port')
+ end
+ end
+
+ if v.include?('username') and (v['username'] != :undef) and (v['username'].to_s != '')
+ parts[:userinfo] = URI.escape(v['username'])
+ if v.include?('password') and (v['password'] != :undef) and (v['password'].to_s != '')
+ parts[:userinfo] += ":#{URI.escape(v['password'])}"
+ end
+ end
+
+ if v.include?('charset')
+ parts[:query] = "charset=#{v['charset']}"
+ end
+
+ parts[:scheme] = v['dialect']
+
+ if v.include?('host')
+ parts[:path] = "/#{v['database']}"
+ else
+ parts[:path] = "///#{v['database']}"
+ end
+
+ URI::Generic.build(parts).to_s
+end
--- /dev/null
+require 'puppet'
+require 'puppet/feature/aviator'
+require 'puppet/util/inifile'
+
+class Puppet::Provider::Aviator < Puppet::Provider
+
+ def session
+ @session ||= authenticate(resource[:auth], resource[:log_file])
+ end
+
+ def self.session
+ @session ||= authenticate(nil, nil)
+ end
+
+ def request(service, request, &block)
+ self.class.make_request(service, request, session_data, &block)
+ end
+
+ def self.request(service, request, &block)
+ self.make_request(service, request, session_data, &block)
+ end
+
+ # needed for tests
+ def session_data
+ @session_data
+ end
+
+ def self.session_data
+ @session_data
+ end
+
+ def session_data=(data)
+ @session_data=data
+ end
+
+ def self.session_data=(data)
+ @session_data=data
+ end
+
+ private
+
+ # Attempt to find credentials in this order:
+ # 1. username,password,tenant,host set in type parameters
+ # 2. openrc file path set in type parameters
+ # 3. service token and host set in type parameters
+ # 4. username,password,tenant,host set in environment variables
+ # 5. service token and host set in keystone.conf (backwards compatible version)
+ def authenticate(auth_params, log_file)
+ auth_params ||= {}
+ if password_credentials_set?(auth_params)
+ @session = get_authenticated_session(auth_params, log_file)
+
+ elsif openrc_set?(auth_params)
+ credentials = get_credentials_from_openrc(auth_params['openrc'])
+ @session = get_authenticated_session(credentials, log_file)
+
+ elsif service_credentials_set?(auth_params)
+ session_hash = get_unauthenticated_session(auth_params, log_file)
+ @session_data = session_hash[:data]
+ @session = session_hash[:session]
+
+ elsif env_vars_set?
+ credentials = get_credentials_from_env
+ @session = get_authenticated_session(credentials, log_file)
+
+ else # Last effort: try to get the token from keystone.conf
+ session_hash = self.class.try_auth_with_token(keystone_file, log_file)
+ @session_data = session_hash[:data]
+ @session = session_hash[:session]
+ end
+ end
+
+ def self.authenticate(auth_params, log_file)
+ auth_params = {} unless auth_params
+ if env_vars_set?
+ credentials = get_credentials_from_env
+ @session = get_authenticated_session(credentials, log_file)
+
+ else # Last effort: try to get the token from keystone.conf
+ session_hash = try_auth_with_token(keystone_file, log_file)
+ @session_data = session_hash[:data]
+ @session = session_hash[:session]
+ end
+ end
+
+
+ def self.try_auth_with_token(conf_file, log_file)
+ service_token = get_admin_token_from_keystone_file(conf_file)
+ auth_url = get_auth_url_from_keystone_file(conf_file)
+ session_hash = {}
+ if service_token
+ credentials = {
+ 'service_token' => service_token,
+ 'host_uri' => auth_url,
+ }
+ session_hash = get_unauthenticated_session(credentials, log_file)
+ else # All authentication efforts failed
+ raise(Puppet::Error, 'No credentials provided.')
+ end
+ end
+
+
+ def self.make_request(service, request, session_data, &block)
+ response = nil
+ if service && service.default_session_data
+ response = service.request(request, :endpoint_type => 'admin') do |params|
+ yield(params) if block
+ end
+ elsif session_data
+ response = service.request(request, :endpoint_type => 'admin',
+ :session_data => session_data) do |params|
+ yield(params) if block
+ end
+ else
+ raise(Puppet::Error, 'Cannot make a request with no session data.')
+ end
+ if response.body.hash['error']
+ raise(Puppet::Error, "Error making request: #{response.body.hash['error']['code']} #{response.body.hash['error']['title']}")
+ end
+ response
+ end
+
+
+ def password_credentials_set?(auth_params)
+ auth_params['username'] && auth_params['password'] && auth_params['tenant_name'] && auth_params['host_uri']
+ end
+
+
+ def openrc_set?(auth_params)
+ auth_params['openrc']
+ end
+
+
+ def service_credentials_set?(auth_params)
+ auth_params['service_token'] && auth_params['host_uri']
+ end
+
+
+ def self.env_vars_set?
+ ENV['OS_USERNAME'] && ENV['OS_PASSWORD'] && ENV['OS_TENANT_NAME'] && ENV['OS_AUTH_URL']
+ end
+
+
+ def env_vars_set?
+ self.class.env_vars_set?
+ end
+
+
+ def get_credentials_from_openrc(file)
+ creds = {}
+ begin
+ File.open(file).readlines.delete_if{|l| l=~ /^#/}.each do |line|
+ key, value = line.split('=')
+ key = key.split(' ').last
+ value = value.chomp.gsub(/'/, '')
+ creds[key] = value
+ end
+ return creds
+ rescue Exception => error
+ return {}
+ end
+ end
+
+
+ def self.get_credentials_from_env
+ ENV.to_hash.dup.delete_if { |key, _| ! (key =~ /^OS/) } # Ruby 1.8.7
+ end
+
+ def get_credentials_from_env
+ self.class.get_credentials_from_env
+ end
+
+
+ def self.keystone_file
+ keystone_file = Puppet::Util::IniConfig::File.new
+ keystone_file.read('/etc/keystone/keystone.conf')
+ keystone_file
+ end
+
+ def keystone_file
+ return @keystone_file if @keystone_file
+ @keystone_file = Puppet::Util::IniConfig::File.new
+ @keystone_file.read('/etc/keystone/keystone.conf')
+ @keystone_file
+ end
+
+
+ def self.get_admin_token_from_keystone_file(conf_file)
+ if conf_file and conf_file['DEFAULT'] and conf_file['DEFAULT']['admin_token']
+ return "#{conf_file['DEFAULT']['admin_token'].strip}"
+ else
+ return nil
+ end
+ end
+
+ def get_admin_token_from_keystone_file
+ conf_file = keystone_file
+ self.class.get_admin_token_from_keystone_file(conf_file)
+ end
+
+
+ def self.get_auth_url_from_keystone_file(conf_file)
+ if conf_file
+ if conf_file['DEFAULT']
+ if conf_file['DEFAULT']['admin_endpoint']
+ auth_url = conf_file['DEFAULT']['admin_endpoint'].strip
+ return versioned_endpoint(auth_url)
+ end
+
+ if conf_file['DEFAULT']['admin_port']
+ admin_port = conf_file['DEFAULT']['admin_port'].strip
+ else
+ admin_port = '35357'
+ end
+
+ if conf_file['DEFAULT']['admin_bind_host']
+ host = conf_file['DEFAULT']['admin_bind_host'].strip
+ if host == "0.0.0.0"
+ host = "127.0.0.1"
+ end
+ else
+ host = "127.0.0.1"
+ end
+ end
+
+ if conf_file['ssl'] && conf_file['ssl']['enable'] && conf_file['ssl']['enable'].strip.downcase == 'true'
+ protocol = 'https'
+ else
+ protocol = 'http'
+ end
+ end
+
+ "#{protocol}://#{host}:#{admin_port}/v2.0/"
+ end
+
+ def get_auth_url_from_keystone_file
+ self.class.get_auth_url_from_keystone_file(keystone_file)
+ end
+
+
+ def self.make_configuration(credentials)
+ host_uri = versioned_endpoint(credentials['host_uri'] || credentials['OS_AUTH_URL'], credentials['api_version'])
+ {
+ :provider => 'openstack',
+ :auth_service => {
+ :name => 'identity',
+ :host_uri => host_uri,
+ :request => 'create_token',
+ :validator => 'list_tenants',
+ },
+ :auth_credentials => {
+ :username => credentials['username'] || credentials['OS_USERNAME'],
+ :password => credentials['password'] || credentials['OS_PASSWORD'],
+ :tenant_name => credentials['tenant_name'] || credentials['OS_TENANT_NAME']
+ }
+ }
+ end
+
+
+ def self.get_authenticated_session(credentials, log_file)
+ configuration = make_configuration(credentials)
+ session = ::Aviator::Session.new(:config => configuration, :log_file => log_file)
+ session.authenticate
+ session
+ end
+
+ def get_authenticated_session(credentials, log_file)
+ self.class.get_authenticated_session(credentials, log_file)
+ end
+
+
+ def self.get_unauthenticated_session(credentials, log_file)
+ configuration = {
+ :provider => 'openstack',
+ }
+ session_data = {
+ :base_url => credentials['host_uri'],
+ :service_token => credentials['service_token']
+ }
+ session = ::Aviator::Session.new(:config => configuration, :log_file => log_file)
+ { :session => session, :data => session_data }
+ end
+
+ def get_unauthenticated_session(credentials, log_file)
+ self.class.get_unauthenticated_session(credentials, log_file)
+ end
+
+
+ def self.versioned_endpoint(endpoint, version = 'v2.0')
+ version = 'v2.0' if version.nil?
+ if endpoint =~ /\/#{version}\/?$/ || endpoint =~ /\/v2.0\/?$/ || endpoint =~ /\/v3\/?$/
+ endpoint
+ else
+ "#{endpoint.chomp('/')}/#{version}"
+ end
+ end
+end
--- /dev/null
+# Add the auth parameter to whatever type is given
+module Puppet::Util::Aviator
+ def self.add_aviator_params(type)
+
+ type.newparam(:auth) do
+
+ desc <<EOT
+Hash of authentication credentials. Credentials can be specified as
+password credentials, e.g.:
+
+auth => {
+ 'username' => 'test',
+ 'password' => 'passw0rd',
+ 'tenant_name' => 'test',
+ 'host_uri' => 'http://localhost:35357/v2.0',
+}
+
+or a path to an openrc file containing these credentials, e.g.:
+
+auth => {
+ 'openrc' => '/root/openrc',
+}
+
+or a service token and host, e.g.:
+
+auth => {
+ 'service_token' => 'ADMIN',
+ 'host_uri' => 'http://localhost:35357/v2.0',
+}
+
+If not present, the provider will first look for environment variables
+for password credentials and then to /etc/keystone/keystone.conf for a
+service token.
+EOT
+
+ validate do |value|
+ raise(Puppet::Error, 'This property must be a hash') unless value.is_a?(Hash)
+ end
+ end
+
+ type.newparam(:log_file) do
+ desc 'Log file. Defaults to no logging.'
+ defaultto('/dev/null')
+ end
+ end
+end
--- /dev/null
+# == Definition: openstacklib::db::mysql
+#
+# This resource configures a mysql database for an OpenStack service
+#
+# == Parameters:
+#
+# [*password_hash*]
+# Password hash to use for the database user for this service;
+# string; required
+#
+# [*dbname*]
+# The name of the database
+# string; optional; default to the $title of the resource, i.e. 'nova'
+#
+# [*user*]
+# The database user to create;
+# string; optional; default to the $title of the resource, i.e. 'nova'
+#
+# [*host*]
+# The IP address or hostname of the user in mysql_grant;
+# string; optional; default to '127.0.0.1'
+#
+# [*charset*]
+# The charset to use for the database;
+# string; optional; default to 'utf8'
+#
+# [*collate*]
+# The collate to use for the database;
+# string; optional; default to 'utf8_general_ci'
+#
+# [*allowed_hosts*]
+# Additional hosts that are allowed to access this database;
+# array or string; optional; default to undef
+#
+# [*privileges*]
+# Privileges given to the database user;
+# string or array of strings; optional; default to 'ALL'
+
+define openstacklib::db::mysql (
+ $password_hash,
+ $dbname = $title,
+ $user = $title,
+ $host = '127.0.0.1',
+ $charset = 'utf8',
+ $collate = 'utf8_general_ci',
+ $allowed_hosts = [],
+ $privileges = 'ALL',
+) {
+
+ include ::mysql::client
+
+ mysql_database { $dbname:
+ ensure => present,
+ charset => $charset,
+ collate => $collate,
+ require => [ Class['mysql::server'], Class['mysql::client'] ],
+ }
+
+ $allowed_hosts_list = unique(concat(any2array($allowed_hosts), [$host]))
+ $real_allowed_hosts = prefix($allowed_hosts_list, "${dbname}_")
+
+ openstacklib::db::mysql::host_access { $real_allowed_hosts:
+ user => $user,
+ password_hash => $password_hash,
+ database => $dbname,
+ privileges => $privileges,
+ }
+}
--- /dev/null
+# Allow a user to access the database for the service
+#
+# == Namevar
+# String with the form dbname_host. The host part of the string is the host
+# to allow
+#
+# == Parameters
+# [*user*]
+# username to allow
+#
+# [*password_hash*]
+# user password hash
+#
+# [*database*]
+# the database name
+#
+# [*privileges*]
+# the privileges to grant to this user
+#
+define openstacklib::db::mysql::host_access (
+ $user,
+ $password_hash,
+ $database,
+ $privileges,
+) {
+ validate_re($title, '_', 'Title must be $dbname_$host')
+
+ $host = inline_template('<%= @title.split("_").last %>')
+
+ mysql_user { "${user}@${host}":
+ password_hash => $password_hash,
+ require => Mysql_database[$database],
+ }
+
+ mysql_grant { "${user}@${host}/${database}.*":
+ privileges => $privileges,
+ table => "${database}.*",
+ require => Mysql_user["${user}@${host}"],
+ user => "${user}@${host}",
+ }
+}
--- /dev/null
+#
+# Copyright (C) 2014 eNovance SAS <licensing@enovance.com>
+#
+# Author: Emilien Macchi <emilien.macchi@enovance.com>
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+# == Definition: openstacklib::messaging::rabbitmq
+#
+# This resource creates RabbitMQ resources for an OpenStack service.
+#
+# == Parameters:
+#
+# [*userid*]
+# (optional) The username to use when connecting to Rabbit
+# Defaults to 'guest'
+#
+# [*password*]
+# (optional) The password to use when connecting to Rabbit
+# Defaults to 'guest'
+#
+# [*virtual_host*]
+# (optional) The virtual host to use when connecting to Rabbit
+# Defaults to '/'
+#
+# [*is_admin*]
+# (optional) If the user should be admin or not
+# Defaults to false
+#
+# [*configure_permission*]
+# (optional) Define configure permission
+# Defaults to '.*'
+#
+# [*write_permission*]
+# (optional) Define write permission
+# Defaults to '.*'
+#
+# [*read_permission*]
+# (optional) Define read permission
+# Defaults to '.*'
+#
+# [*manage_user*]
+# (optional) Manage or not the user
+# Defaults to true
+#
+# [*manage_user_permissions*]
+# (optional) Manage or not user permissions
+# Defaults to true
+#
+# [*manage_vhost*]
+# (optional) Manage or not the vhost
+# Defaults to true
+#
+define openstacklib::messaging::rabbitmq(
+ $userid = 'guest',
+ $password = 'guest',
+ $virtual_host = '/',
+ $is_admin = false,
+ $configure_permission = '.*',
+ $write_permission = '.*',
+ $read_permission = '.*',
+ $manage_user = true,
+ $manage_user_permissions = true,
+ $manage_vhost = true,
+) {
+
+ if $manage_user {
+ if $userid == 'guest' {
+ $is_admin_real = false
+ } else {
+ $is_admin_real = $is_admin
+ }
+ ensure_resource('rabbitmq_user', $userid, {
+ 'admin' => $is_admin_real,
+ 'password' => $password,
+ 'provider' => 'rabbitmqctl',
+ })
+ }
+
+ if $manage_user_permissions {
+ ensure_resource('rabbitmq_user_permissions', "${userid}@${virtual_host}", {
+ 'configure_permission' => $configure_permission,
+ 'write_permission' => $write_permission,
+ 'read_permission' => $read_permission,
+ 'provider' => 'rabbitmqctl',
+ })
+ }
+
+ if $manage_vhost {
+ ensure_resource('rabbitmq_vhost', $virtual_host, {
+ 'provider' => 'rabbitmqctl',
+ })
+ }
+
+}
--- /dev/null
+# == Class: openstacklib::policies
+#
+# This resource is an helper to call the policy definition
+#
+# == Parameters:
+#
+# [*policies*]
+# Hash of policies one would like to set to specific values
+# hash; optional
+#
+class openstacklib::policy (
+ $policies = {},
+) {
+
+ validate_hash($policies)
+
+ create_resources('openstacklib::policy::base', $policies)
+
+}
--- /dev/null
+# == Definition: openstacklib::policy::base
+#
+# This resource configures the policy.json file for an OpenStack service
+#
+# == Parameters:
+#
+# [*file_path*]
+# Path to the policy.json file
+# string; required
+#
+# [*key*]
+# The key to replace the value for
+# string; required; the key to replace the value for
+#
+# [*value*]
+# The value to set
+# string; optional; the value to set
+#
+define openstacklib::policy::base (
+ $file_path,
+ $key,
+ $value = '',
+) {
+
+ # Add entry if it doesn't exists
+ augeas { "${file_path}-${key}-${value}-add":
+ lens => 'Json.lns',
+ incl => $file_path,
+ changes => [
+ "set dict/entry[last()+1] \"${key}\"",
+ "set dict/entry[last()]/string \"${value}\""
+ ],
+ onlyif => "match dict/entry[*][.=\"${key}\"] size == 0"
+ }
+
+ # Requires that the entry is added before this call or it will fail.
+ augeas { "${file_path}-${key}-${value}" :
+ lens => 'Json.lns',
+ incl => $file_path,
+ changes => "set dict/entry[*][.=\"${key}\"]/string ${value}",
+ require => Augeas["${file_path}-${key}-${value}-add"]
+ }
+
+}
+
--- /dev/null
+#
+# Copyright (C) 2014 eNovance SAS <licensing@enovance.com>
+#
+# Author: Emilien Macchi <emilien.macchi@enovance.com>
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+#
+# == Definition: openstacklib::service_validation
+#
+# This resource does service validation for an OpenStack service.
+#
+# == Parameters:
+#
+# [*command*]
+# Command to run for validating the service;
+# string; required
+#
+# [*service_name*]
+# The name of the service to validate;
+# string; optional; default to the $title of the resource, i.e. 'nova-api'
+#
+# [*path*]
+# The path of the command to validate the service;
+# string; optional; default to '/usr/bin:/bin:/usr/sbin:/sbin'
+#
+# [*provider*]
+# The provider to use for the exec command;
+# string; optional; default to 'shell'
+#
+# [*tries*]
+# Number of times to retry validation;
+# string; optional; default to '10'
+#
+# [*try_sleep*]
+# Number of seconds between validation attempts;
+# string; optional; default to '2'
+#
+define openstacklib::service_validation(
+ $command,
+ $service_name = $name,
+ $path = '/usr/bin:/bin:/usr/sbin:/sbin',
+ $provider = shell,
+ $tries = '10',
+ $try_sleep = '2',
+) {
+
+ exec { "execute ${service_name} validation":
+ path => $path,
+ provider => $provider,
+ command => $command,
+ tries => $tries,
+ try_sleep => $try_sleep,
+ }
+
+ anchor { "create ${service_name} anchor":
+ require => Exec["execute ${service_name} validation"],
+ }
+
+}
--- /dev/null
+{
+ "name": "stackforge-openstacklib",
+ "version": "5.1.0",
+ "author": "Puppet Labs and OpenStack Contributors",
+ "summary": "Puppet OpenStack Libraries",
+ "license": "Apache-2.0",
+ "source": "git://github.com/openstack/puppet-openstacklib.git",
+ "project_page": "https://launchpad.net/puppet-openstacklib",
+ "issues_url": "https://bugs.launchpad.net/puppet-openstacklib",
+ "dependencies": [
+ {"name":"aimonb/aviator","version_requirement":">=0.4.2 <1.0.0"},
+ {"name":"puppetlabs/mysql","version_requirement":">=2.2.0 <3.0.0"},
+ {"name":"puppetlabs/stdlib","version_requirement":">=4.0.0 <5.0.0"},
+ {"name":"puppetlabs/rabbitmq","version_requirement":">=2.0.2 <4.0.0"}
+ ],
+ "requirements": [
+ {
+ "name": "pe",
+ "version_requirement": "3.x"
+ },
+ {
+ "name": "puppet",
+ "version_requirement": "3.x"
+ }
+ ],
+ "operatingsystem_support": [
+ {
+ "operatingsystem": "Debian",
+ "operatingsystemrelease": [
+ "7"
+ ]
+ },
+ {
+ "operatingsystem": "Fedora",
+ "operatingsystemrelease": [
+ "20"
+ ]
+ },
+ {
+ "operatingsystem": "RedHat",
+ "operatingsystemrelease": [
+ "6.5",
+ "7"
+ ]
+ },
+ {
+ "operatingsystem": "Ubuntu",
+ "operatingsystemrelease": [
+ "12.04",
+ "14.04"
+ ]
+ }
+ ],
+ "description": "Puppet module library to expose common functionality between OpenStack modules."
+}
--- /dev/null
+require 'spec_helper'
--- /dev/null
+require 'spec_helper'
+
+describe 'openstacklib::policy' do
+
+ let :params do
+ {
+ :policies => {
+ 'foo' => {
+ 'file_path' => '/etc/nova/policy.json',
+ 'key' => 'context_is_admin',
+ 'value' => 'foo:bar'
+ }
+ }
+ }
+ end
+
+ it 'configures the proper policy' do
+ should contain_openstacklib__policy__base('foo').with(
+ :file_path => '/etc/nova/policy.json',
+ :key => 'context_is_admin',
+ :value => 'foo:bar'
+ )
+ end
+
+end
--- /dev/null
+require 'spec_helper'
+
+describe 'openstacklib::db::mysql::host_access' do
+
+ let :pre_condition do
+ "include mysql::server\n" +
+ "openstacklib::db::mysql { 'nova':\n" +
+ " password_hash => 'AA1420F182E88B9E5F874F6FBE7459291E8F4601'}"
+ end
+
+ shared_examples 'openstacklib::db::mysql::host_access examples' do
+
+ context 'with required parameters' do
+ let (:title) { 'nova_10.0.0.1' }
+ let :params do
+ { :user => 'foobar',
+ :password_hash => 'AA1420F182E88B9E5F874F6FBE7459291E8F4601',
+ :database => 'nova',
+ :privileges => 'ALL' }
+ end
+
+ it { should contain_mysql_user("#{params[:user]}@10.0.0.1").with(
+ :password_hash => params[:password_hash]
+ )}
+
+ it { should contain_mysql_grant("#{params[:user]}@10.0.0.1/#{params[:database]}.*").with(
+ :user => "#{params[:user]}@10.0.0.1",
+ :privileges => 'ALL',
+ :table => "#{params[:database]}.*"
+ )}
+ end
+
+ end
+
+ context 'on a Debian osfamily' do
+ let :facts do
+ { :osfamily => "Debian" }
+ end
+
+ include_examples 'openstacklib::db::mysql::host_access examples'
+ end
+
+ context 'on a RedHat osfamily' do
+ let :facts do
+ { :osfamily => 'RedHat' }
+ end
+
+ include_examples 'openstacklib::db::mysql::host_access examples'
+ end
+end
--- /dev/null
+require 'spec_helper'
+
+describe 'openstacklib::db::mysql' do
+
+ let :pre_condition do
+ 'include mysql::server'
+ end
+
+ let (:title) { 'nova' }
+
+ let :required_params do
+ { :password_hash => 'AA1420F182E88B9E5F874F6FBE7459291E8F4601' }
+ end
+
+ shared_examples 'openstacklib::db::mysql examples' do
+
+ context 'with only required parameters' do
+ let :params do
+ required_params
+ end
+
+ it { should contain_mysql_database(title).with(
+ :charset => 'utf8',
+ :collate => 'utf8_general_ci'
+ )}
+ it { should contain_openstacklib__db__mysql__host_access("#{title}_127.0.0.1").with(
+ :user => title,
+ :database => title,
+ :privileges => 'ALL'
+ )}
+ end
+
+ context 'with overriding dbname parameter' do
+ let :params do
+ { :dbname => 'foobar' }.merge(required_params)
+ end
+
+ it { should contain_mysql_database(params[:dbname]).with(
+ :charset => 'utf8',
+ :collate => 'utf8_general_ci'
+ )}
+ it { should contain_openstacklib__db__mysql__host_access("#{params[:dbname]}_127.0.0.1").with(
+ :user => title,
+ :database => params[:dbname],
+ :privileges => 'ALL'
+ )}
+ end
+
+ context 'with overriding user parameter' do
+ let :params do
+ { :user => 'foobar' }.merge(required_params)
+ end
+
+ it { should contain_mysql_database(title).with(
+ :charset => 'utf8',
+ :collate => 'utf8_general_ci'
+ )}
+ it { should contain_openstacklib__db__mysql__host_access("#{title}_127.0.0.1").with(
+ :user => params[:user],
+ :database => title,
+ :privileges => 'ALL',
+ )}
+ end
+
+ context 'when overriding charset parameter' do
+ let :params do
+ { :charset => 'latin1' }.merge(required_params)
+ end
+
+ it { should contain_mysql_database(title).with_charset(params[:charset]) }
+ end
+
+ context 'when omitting the required parameter password_hash' do
+ let :params do
+ required_params.delete(:password_hash)
+ end
+ it { expect { should raise_error(Puppet::Error) } }
+ end
+
+ context 'when notifying other resources' do
+ let :pre_condition do
+ 'exec {"nova-db-sync":}'
+ end
+ let :params do
+ { :notify => 'Exec[nova-db-sync]'}.merge(required_params)
+ end
+
+ it { should contain_exec('nova-db-sync').that_subscribes_to("Openstacklib::Db::Mysql[#{title}]") }
+ end
+
+ context 'when required for other openstack services' do
+ let :pre_condition do
+ 'service {"keystone":}'
+ end
+ let :title do
+ 'keystone'
+ end
+ let :params do
+ { :before => 'Service[keystone]'}.merge(required_params)
+ end
+
+ it { should contain_service('keystone').that_requires("Openstacklib::Db::Mysql[keystone]") }
+ end
+
+ context "overriding allowed_hosts parameter with array value" do
+ let :params do
+ { :allowed_hosts => ['127.0.0.1','%'] }.merge(required_params)
+ end
+
+ it {should contain_openstacklib__db__mysql__host_access("#{title}_127.0.0.1").with(
+ :user => title,
+ :password_hash => params[:password_hash],
+ :database => title
+ )}
+ it {should contain_openstacklib__db__mysql__host_access("#{title}_%").with(
+ :user => title,
+ :password_hash => params[:password_hash],
+ :database => title
+ )}
+ end
+
+ context "overriding allowed_hosts parameter with string value" do
+ let :params do
+ { :allowed_hosts => '192.168.1.1' }.merge(required_params)
+ end
+
+ it {should contain_openstacklib__db__mysql__host_access("#{title}_192.168.1.1").with(
+ :user => title,
+ :password_hash => params[:password_hash],
+ :database => title
+ )}
+ end
+
+ context "overriding allowed_hosts parameter equals to host param " do
+ let :params do
+ { :allowed_hosts => '127.0.0.1' }.merge(required_params)
+ end
+
+ it {should contain_openstacklib__db__mysql__host_access("#{title}_127.0.0.1").with(
+ :user => title,
+ :password_hash => params[:password_hash],
+ :database => title
+ )}
+ end
+
+ end
+
+ context 'on a Debian osfamily' do
+ let :facts do
+ { :osfamily => "Debian" }
+ end
+
+ include_examples 'openstacklib::db::mysql examples'
+ end
+
+ context 'on a RedHat osfamily' do
+ let :facts do
+ { :osfamily => 'RedHat' }
+ end
+
+ include_examples 'openstacklib::db::mysql examples'
+ end
+end
--- /dev/null
+#
+# Copyright (C) 2014 eNovance SAS <licensing@enovance.com>
+#
+# Author: Emilien Macchi <emilien.macchi@enovance.com>
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+
+require 'spec_helper'
+
+describe 'openstacklib::messaging::rabbitmq' do
+
+ let (:title) { 'nova' }
+
+ shared_examples 'openstacklib::messaging::rabbitmq examples' do
+
+ let :params do
+ {}
+ end
+
+ context 'with default parameters' do
+ it { should contain_rabbitmq_user('guest').with(
+ :admin => false,
+ :password => 'guest',
+ :provider => 'rabbitmqctl',
+ )}
+ it { should contain_rabbitmq_user_permissions('guest@/').with(
+ :configure_permission => '.*',
+ :write_permission => '.*',
+ :read_permission => '.*',
+ :provider => 'rabbitmqctl',
+ )}
+ it { should contain_rabbitmq_vhost('/').with(
+ :provider => 'rabbitmqctl',
+ )}
+ end
+
+ context 'with custom parameters' do
+ before :each do
+ params.merge!(
+ :userid => 'nova',
+ :password => 'secrete',
+ :virtual_host => '/nova',
+ :is_admin => true,
+ :configure_permission => '.nova',
+ :write_permission => '.nova',
+ :read_permission => '.nova'
+ )
+ end
+
+ it { should contain_rabbitmq_user('nova').with(
+ :admin => true,
+ :password => 'secrete',
+ :provider => 'rabbitmqctl',
+ )}
+ it { should contain_rabbitmq_user_permissions('nova@/nova').with(
+ :configure_permission => '.nova',
+ :write_permission => '.nova',
+ :read_permission => '.nova',
+ :provider => 'rabbitmqctl',
+ )}
+ it { should contain_rabbitmq_vhost('/nova').with(
+ :provider => 'rabbitmqctl',
+ )}
+ end
+
+ context 'when disabling vhost management' do
+ before :each do
+ params.merge!( :manage_vhost => false )
+ end
+
+ it { should_not contain_rabbitmq_vhost }
+ end
+
+ end
+
+ context 'on a Debian osfamily' do
+ let :facts do
+ { :osfamily => "Debian" }
+ end
+
+ include_examples 'openstacklib::messaging::rabbitmq examples'
+ end
+
+ context 'on a RedHat osfamily' do
+ let :facts do
+ { :osfamily => 'RedHat' }
+ end
+
+ include_examples 'openstacklib::messaging::rabbitmq examples'
+ end
+end
--- /dev/null
+require 'spec_helper'
+
+describe 'openstacklib::policy::base' do
+
+ let :title do
+ 'nova-contest_is_admin'
+ end
+
+ let :params do
+ {:file_path => '/etc/nova/policy.json',
+ :key => 'context_is_admin',
+ :value => 'foo:bar'}
+ end
+
+ it 'configures the proper policy' do
+ should contain_augeas('/etc/nova/policy.json-context_is_admin-foo:bar').with(
+ 'lens' => 'Json.lns',
+ 'incl' => '/etc/nova/policy.json',
+ 'changes' => 'set dict/entry[*][.="context_is_admin"]/string foo:bar',
+ 'require' => 'Augeas[/etc/nova/policy.json-context_is_admin-foo:bar-add]'
+ )
+ end
+
+ it 'configures the proper policy' do
+ should contain_augeas('/etc/nova/policy.json-context_is_admin-foo:bar-add').with(
+ 'lens' => 'Json.lns',
+ 'incl' => '/etc/nova/policy.json',
+ 'changes' => [
+ 'set dict/entry[last()+1] "context_is_admin"',
+ 'set dict/entry[last()]/string "foo:bar"'
+ ],
+ 'onlyif' => 'match dict/entry[*][.="context_is_admin"] size == 0'
+ )
+ end
+
+end
+
--- /dev/null
+#
+# Copyright (C) 2014 eNovance SAS <licensing@enovance.com>
+#
+# Author: Emilien Macchi <emilien.macchi@enovance.com>
+#
+# Licensed under the Apache License, Version 2.0 (the "License"); you may
+# not use this file except in compliance with the License. You may obtain
+# a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+# License for the specific language governing permissions and limitations
+# under the License.
+
+require 'spec_helper'
+
+describe 'openstacklib::service_validation' do
+
+ let (:title) { 'nova-api' }
+
+ let :required_params do
+ { :command => 'nova list' }
+ end
+
+ shared_examples 'openstacklib::service_validation examples' do
+
+ context 'with only required parameters' do
+ let :params do
+ required_params
+ end
+
+ it { should contain_exec("execute #{title} validation").with(
+ :path => '/usr/bin:/bin:/usr/sbin:/sbin',
+ :provider => 'shell',
+ :command => 'nova list',
+ :tries => '10',
+ :try_sleep => '2',
+ )}
+
+ it { should contain_anchor("create #{title} anchor").with(
+ :require => "Exec[execute #{title} validation]",
+ )}
+
+ end
+
+ context 'when omitting a required parameter command' do
+ let :params do
+ required_params.delete(:command)
+ end
+ it { expect { should raise_error(Puppet::Error) } }
+ end
+
+ end
+
+ context 'on a Debian osfamily' do
+ let :facts do
+ { :osfamily => "Debian" }
+ end
+
+ include_examples 'openstacklib::service_validation examples'
+ end
+
+ context 'on a RedHat osfamily' do
+ let :facts do
+ { :osfamily => 'RedHat' }
+ end
+
+ include_examples 'openstacklib::service_validation examples'
+ end
+end
--- /dev/null
+---
+ http_interactions:
+ - request:
+ method: post
+ uri: "http://192.168.11.4:35357/v2.0/tokens"
+ body:
+ encoding: UTF-8
+ string: "{\x22auth\x22:{\x22passwordCredentials\x22:{\x22username\x22:\x22admin\x22,\x22password\x22:\x22fyby-tet\x22},\x22tenantName\x22:\x22admin\x22}}"
+ headers:
+ Content-Type:
+ - application/json
+ User-Agent:
+ - "Faraday v0.8.8"
+ response:
+ status:
+ code: 200
+ message:
+ headers:
+ vary:
+ - X-Auth-Token
+ content-type:
+ - application/json
+ content-length:
+ - "9780"
+ date:
+ - "Tue, 30 Sep 2014 06:59:48 GMT"
+ connection:
+ - close
+ body:
+ encoding: UTF-8
+ string: "{\x22access\x22: {\x22token\x22: {\x22issued_at\x22: \x222014-09-30T06:59:48.338940\x22, \x22expires\x22: \x222014-09-30T07:59:48Z\x22, \x22id\x22: \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-RlLHNwpLzYtvKIwdj0TxIecbF9PuTkWMEZ9Kxl+KE8F4dJOnv0XnAiWZ8QzrMZOo4d+owLJmNNLE1TKfGqv8ughdcrjHtUicHT2E0AOfO3ylEhJPsazUl8XIIWQ4sMWTrs0ROMiZnWPWbomYb49LIaREHD6nDfZX+EDZbHSfPVLTYVL-+qkiIH52-lXqz-OKPCn+Lt3RzXYDzapZd8cpzVgJpTuq2YKMZ+H06yvHFCTZNN49j6kZHz0Qkn2MjbwU8sH10wA7W6k=\x22, \x22tenant\x22: {\x22description\x22: \x22admin tenant\x22, \x22enabled\x22: true, \x22id\x22: \x22c518b36fa220499b85ba9a71014ce2a5\x22, \x22name\x22: \x22admin\x22}}, \x22serviceCatalog\x22: [{\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8774/v2/c518b36fa220499b85ba9a71014ce2a5\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8774/v2/c518b36fa220499b85ba9a71014ce2a5\x22, \x22id\x22: \x221bb7585b33814b829872eb442021898a\x22, \x22publicURL\x22: \x22http://192.168.11.4:8774/v2/c518b36fa220499b85ba9a71014ce2a5\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22compute\x22, \x22name\x22: \x22nova\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:9696/\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:9696/\x22, \x22id\x22: \x22aa7d45653ab24df6ba9d184a5edd4f13\x22, \x22publicURL\x22: \x22http://192.168.11.4:9696/\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22network\x22, \x22name\x22: \x22neutron\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8776/v2/c518b36fa220499b85ba9a71014ce2a5\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8776/v2/c518b36fa220499b85ba9a71014ce2a5\x22, \x22id\x22: \x222bf4d9c6ba804353bcdcedfc50103bb6\x22, \x22publicURL\x22: \x22http://192.168.11.4:8776/v2/c518b36fa220499b85ba9a71014ce2a5\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22volumev2\x22, \x22name\x22: \x22cinderv2\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8774/v3\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8774/v3\x22, \x22id\x22: \x223fd840cbadd346ab916b06af1f4e5bf0\x22, \x22publicURL\x22: \x22http://192.168.11.4:8774/v3\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22computev3\x22, \x22name\x22: \x22novav3\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:9292\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:9292\x22, \x22id\x22: \x2212c935790bc94a789c72f9bbb21f39bc\x22, \x22publicURL\x22: \x22http://192.168.11.4:9292\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22image\x22, \x22name\x22: \x22glance\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8777\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8777\x22, \x22id\x22: \x221ce4901d8915423e96dab3fe1fb3663c\x22, \x22publicURL\x22: \x22http://192.168.11.4:8777\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22metering\x22, \x22name\x22: \x22ceilometer\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8000/v1/\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8000/v1/\x22, \x22id\x22: \x225e8f11c97e8043b5bde05bea2de4616c\x22, \x22publicURL\x22: \x22http://192.168.11.4:8000/v1/\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22cloudformation\x22, \x22name\x22: \x22heat-cfn\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8776/v1/c518b36fa220499b85ba9a71014ce2a5\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8776/v1/c518b36fa220499b85ba9a71014ce2a5\x22, \x22id\x22: \x2254b9ec28bc604252b00cfe6e0e44aa94\x22, \x22publicURL\x22: \x22http://192.168.11.4:8776/v1/c518b36fa220499b85ba9a71014ce2a5\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22volume\x22, \x22name\x22: \x22cinder\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8773/services/Admin\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8773/services/Cloud\x22, \x22id\x22: \x22075ec79b0be341baabe2e9b120591f48\x22, \x22publicURL\x22: \x22http://192.168.11.4:8773/services/Cloud\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22ec2\x22, \x22name\x22: \x22nova_ec2\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8004/v1/c518b36fa220499b85ba9a71014ce2a5\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8004/v1/c518b36fa220499b85ba9a71014ce2a5\x22, \x22id\x22: \x22262c4b373678468a9855a3ebc6015960\x22, \x22publicURL\x22: \x22http://192.168.11.4:8004/v1/c518b36fa220499b85ba9a71014ce2a5\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22orchestration\x22, \x22name\x22: \x22heat\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:35357/v2.0\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:5000/v2.0\x22, \x22id\x22: \x22089fdb22249546b99a1e57aec0b1e76c\x22, \x22publicURL\x22: \x22http://192.168.11.4:5000/v2.0\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22identity\x22, \x22name\x22: \x22keystone\x22}], \x22user\x22: {\x22username\x22: \x22admin\x22, \x22roles_links\x22: [], \x22id\x22: \x223f76b94667434cf3bdc323cf021c50f8\x22, \x22roles\x22: [{\x22name\x22: \x22admin\x22}], \x22name\x22: \x22admin\x22}, \x22metadata\x22: {\x22is_admin\x22: 0, \x22roles\x22: [\x221e8bc5d1f3a448e9a2a1cda58d97f92b\x22]}}}"
+ http_version:
+ recorded_at: "Tue, 30 Sep 2014 06:59:48 GMT"
+ - request:
+ method: get
+ uri: "http://172.16.33.4:35357/v2.0/tenants"
+ body:
+ encoding: US-ASCII
+ string: ""
+ headers:
+ Content-Type:
+ - application/json
+ User-Agent:
+ - "Faraday v0.8.8"
+ X-Auth-Token:
+ - "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-RlLHNwpLzYtvKIwdj0TxIecbF9PuTkWMEZ9Kxl+KE8F4dJOnv0XnAiWZ8QzrMZOo4d+owLJmNNLE1TKfGqv8ughdcrjHtUicHT2E0AOfO3ylEhJPsazUl8XIIWQ4sMWTrs0ROMiZnWPWbomYb49LIaREHD6nDfZX+EDZbHSfPVLTYVL-+qkiIH52-lXqz-OKPCn+Lt3RzXYDzapZd8cpzVgJpTuq2YKMZ+H06yvHFCTZNN49j6kZHz0Qkn2MjbwU8sH10wA7W6k="
+ response:
+ status:
+ code: 200
+ message:
+ headers:
+ vary:
+ - X-Auth-Token
+ content-type:
+ - application/json
+ content-length:
+ - "491"
+ date:
+ - "Tue, 30 Sep 2014 06:59:48 GMT"
+ connection:
+ - close
+ body:
+ encoding: UTF-8
+ string: "{\x22tenants_links\x22: [], \x22tenants\x22: [{\x22description\x22: \x22Test tenant\x22, \x22enabled\x22: true, \x22id\x22: \x2234e463e2bab24f78990ca864e4a28ba2\x22, \x22name\x22: \x22test2\x22}, {\x22description\x22: \x22Tenant for the openstack services\x22, \x22enabled\x22: true, \x22id\x22: \x2268c8fcf77aff4b409cc158c0f6cbff7b\x22, \x22name\x22: \x22services\x22}, {\x22description\x22: \x22Test tenant\x22, \x22enabled\x22: true, \x22id\x22: \x22c330f1bc663648df9c1e7835a1e7a955\x22, \x22name\x22: \x22test\x22}, {\x22description\x22: \x22admin tenant\x22, \x22enabled\x22: true, \x22id\x22: \x22c518b36fa220499b85ba9a71014ce2a5\x22, \x22name\x22: \x22admin\x22}]}"
+ http_version:
+ recorded_at: "Tue, 30 Sep 2014 06:59:48 GMT"
+ recorded_with: "VCR 2.9.3"
\ No newline at end of file
--- /dev/null
+---
+ http_interactions:
+ - request:
+ method: get
+ uri: "http://192.168.11.4:35357/v2.0/tenants"
+ body:
+ encoding: US-ASCII
+ string: ""
+ headers:
+ Content-Type:
+ - application/json
+ User-Agent:
+ - "Faraday v0.8.8"
+ X-Auth-Token:
+ - sosp-kyl
+ response:
+ status:
+ code: 200
+ message:
+ headers:
+ vary:
+ - X-Auth-Token
+ content-type:
+ - application/json
+ content-length:
+ - "491"
+ date:
+ - "Tue, 30 Sep 2014 06:59:48 GMT"
+ connection:
+ - close
+ body:
+ encoding: UTF-8
+ string: "{\x22tenants_links\x22: [], \x22tenants\x22: [{\x22description\x22: \x22Test tenant\x22, \x22enabled\x22: true, \x22id\x22: \x2234e463e2bab24f78990ca864e4a28ba2\x22, \x22name\x22: \x22test2\x22}, {\x22description\x22: \x22Tenant for the openstack services\x22, \x22enabled\x22: true, \x22id\x22: \x2268c8fcf77aff4b409cc158c0f6cbff7b\x22, \x22name\x22: \x22services\x22}, {\x22description\x22: \x22Test tenant\x22, \x22enabled\x22: true, \x22id\x22: \x22c330f1bc663648df9c1e7835a1e7a955\x22, \x22name\x22: \x22test\x22}, {\x22description\x22: \x22admin tenant\x22, \x22enabled\x22: true, \x22id\x22: \x22c518b36fa220499b85ba9a71014ce2a5\x22, \x22name\x22: \x22admin\x22}]}"
+ http_version:
+ recorded_at: "Tue, 30 Sep 2014 06:59:48 GMT"
+ recorded_with: "VCR 2.9.3"
\ No newline at end of file
--- /dev/null
+---
+ http_interactions:
+ - request:
+ method: post
+ uri: "http://192.168.11.4:35357/v2.0/tokens"
+ body:
+ encoding: UTF-8
+ string: "{\x22auth\x22:{\x22passwordCredentials\x22:{\x22username\x22:\x22admin\x22,\x22password\x22:\x22fyby-tet\x22},\x22tenantName\x22:\x22admin\x22}}"
+ headers:
+ Content-Type:
+ - application/json
+ User-Agent:
+ - "Faraday v0.8.8"
+ response:
+ status:
+ code: 200
+ message:
+ headers:
+ vary:
+ - X-Auth-Token
+ content-type:
+ - application/json
+ content-length:
+ - "9780"
+ date:
+ - "Tue, 30 Sep 2014 07:16:15 GMT"
+ connection:
+ - close
+ body:
+ encoding: UTF-8
+ string: "{\x22access\x22: {\x22token\x22: {\x22issued_at\x22: \x222014-09-30T07:16:15.042778\x22, \x22expires\x22: \x222014-09-30T08:16:15Z\x22, \x22id\x22: \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-wDqT5nJTlbafOjofSXsHG683LaipA7oPoH-ARUPDxXIZfevRue7bQQB3I4cWIUSItIPyW4xDpF+iHy3QOm+I-3v3ctze2Z3Rp0TRaYFsItTZZETsSXI28yBt9+3Dsk3a7Vv10HAZetbV1i6qu6avLcJsmN-1J3KLwCDSEvpMgDAcpzAnhba1fi+X8GrCCTz4c1uIcPfsHxX4g8gNkB4-VT0lkRmfSxdrGeRz0uN12oDqgCL64IV1mJ6Bi9Unh15QFcLwU0F8ote+joG9G29fw3WDzneXHIeEIZSBXmOAX2kQBOnZa2sZg8gls=\x22, \x22tenant\x22: {\x22description\x22: \x22admin tenant\x22, \x22enabled\x22: true, \x22id\x22: \x22c518b36fa220499b85ba9a71014ce2a5\x22, \x22name\x22: \x22admin\x22}}, \x22serviceCatalog\x22: [{\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8774/v2/c518b36fa220499b85ba9a71014ce2a5\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8774/v2/c518b36fa220499b85ba9a71014ce2a5\x22, \x22id\x22: \x221bb7585b33814b829872eb442021898a\x22, \x22publicURL\x22: \x22http://192.168.11.4:8774/v2/c518b36fa220499b85ba9a71014ce2a5\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22compute\x22, \x22name\x22: \x22nova\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:9696/\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:9696/\x22, \x22id\x22: \x22aa7d45653ab24df6ba9d184a5edd4f13\x22, \x22publicURL\x22: \x22http://192.168.11.4:9696/\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22network\x22, \x22name\x22: \x22neutron\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8776/v2/c518b36fa220499b85ba9a71014ce2a5\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8776/v2/c518b36fa220499b85ba9a71014ce2a5\x22, \x22id\x22: \x222bf4d9c6ba804353bcdcedfc50103bb6\x22, \x22publicURL\x22: \x22http://192.168.11.4:8776/v2/c518b36fa220499b85ba9a71014ce2a5\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22volumev2\x22, \x22name\x22: \x22cinderv2\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8774/v3\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8774/v3\x22, \x22id\x22: \x223fd840cbadd346ab916b06af1f4e5bf0\x22, \x22publicURL\x22: \x22http://192.168.11.4:8774/v3\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22computev3\x22, \x22name\x22: \x22novav3\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:9292\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:9292\x22, \x22id\x22: \x2212c935790bc94a789c72f9bbb21f39bc\x22, \x22publicURL\x22: \x22http://192.168.11.4:9292\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22image\x22, \x22name\x22: \x22glance\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8777\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8777\x22, \x22id\x22: \x221ce4901d8915423e96dab3fe1fb3663c\x22, \x22publicURL\x22: \x22http://192.168.11.4:8777\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22metering\x22, \x22name\x22: \x22ceilometer\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8000/v1/\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8000/v1/\x22, \x22id\x22: \x225e8f11c97e8043b5bde05bea2de4616c\x22, \x22publicURL\x22: \x22http://192.168.11.4:8000/v1/\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22cloudformation\x22, \x22name\x22: \x22heat-cfn\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8776/v1/c518b36fa220499b85ba9a71014ce2a5\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8776/v1/c518b36fa220499b85ba9a71014ce2a5\x22, \x22id\x22: \x2254b9ec28bc604252b00cfe6e0e44aa94\x22, \x22publicURL\x22: \x22http://192.168.11.4:8776/v1/c518b36fa220499b85ba9a71014ce2a5\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22volume\x22, \x22name\x22: \x22cinder\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8773/services/Admin\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8773/services/Cloud\x22, \x22id\x22: \x22075ec79b0be341baabe2e9b120591f48\x22, \x22publicURL\x22: \x22http://192.168.11.4:8773/services/Cloud\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22ec2\x22, \x22name\x22: \x22nova_ec2\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:8004/v1/c518b36fa220499b85ba9a71014ce2a5\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:8004/v1/c518b36fa220499b85ba9a71014ce2a5\x22, \x22id\x22: \x22262c4b373678468a9855a3ebc6015960\x22, \x22publicURL\x22: \x22http://192.168.11.4:8004/v1/c518b36fa220499b85ba9a71014ce2a5\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22orchestration\x22, \x22name\x22: \x22heat\x22}, {\x22endpoints\x22: [{\x22adminURL\x22: \x22http://172.16.33.4:35357/v2.0\x22, \x22region\x22: \x22openstack\x22, \x22internalURL\x22: \x22http://172.16.33.4:5000/v2.0\x22, \x22id\x22: \x22089fdb22249546b99a1e57aec0b1e76c\x22, \x22publicURL\x22: \x22http://192.168.11.4:5000/v2.0\x22}], \x22endpoints_links\x22: [], \x22type\x22: \x22identity\x22, \x22name\x22: \x22keystone\x22}], \x22user\x22: {\x22username\x22: \x22admin\x22, \x22roles_links\x22: [], \x22id\x22: \x223f76b94667434cf3bdc323cf021c50f8\x22, \x22roles\x22: [{\x22name\x22: \x22admin\x22}], \x22name\x22: \x22admin\x22}, \x22metadata\x22: {\x22is_admin\x22: 0, \x22roles\x22: [\x221e8bc5d1f3a448e9a2a1cda58d97f92b\x22]}}}"
+ http_version:
+ recorded_at: "Tue, 30 Sep 2014 07:16:15 GMT"
+ - request:
+ method: get
+ uri: "http://192.168.11.4:5000/v2.0/tenants"
+ body:
+ encoding: US-ASCII
+ string: ""
+ headers:
+ Content-Type:
+ - application/json
+ User-Agent:
+ - "Faraday v0.8.8"
+ X-Auth-Token:
+ - "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-wDqT5nJTlbafOjofSXsHG683LaipA7oPoH-ARUPDxXIZfevRue7bQQB3I4cWIUSItIPyW4xDpF+iHy3QOm+I-3v3ctze2Z3Rp0TRaYFsItTZZETsSXI28yBt9+3Dsk3a7Vv10HAZetbV1i6qu6avLcJsmN-1J3KLwCDSEvpMgDAcpzAnhba1fi+X8GrCCTz4c1uIcPfsHxX4g8gNkB4-VT0lkRmfSxdrGeRz0uN12oDqgCL64IV1mJ6Bi9Unh15QFcLwU0F8ote+joG9G29fw3WDzneXHIeEIZSBXmOAX2kQBOnZa2sZg8gls="
+ response:
+ status:
+ code: 200
+ message:
+ headers:
+ vary:
+ - X-Auth-Token
+ content-type:
+ - application/json
+ content-length:
+ - "143"
+ date:
+ - "Tue, 30 Sep 2014 07:16:15 GMT"
+ connection:
+ - close
+ body:
+ encoding: UTF-8
+ string: "{\x22tenants_links\x22: [], \x22tenants\x22: [{\x22description\x22: \x22admin tenant\x22, \x22enabled\x22: true, \x22id\x22: \x22c518b36fa220499b85ba9a71014ce2a5\x22, \x22name\x22: \x22admin\x22}]}"
+ http_version:
+ recorded_at: "Tue, 30 Sep 2014 07:16:15 GMT"
+ recorded_with: "VCR 2.9.3"
\ No newline at end of file
--- /dev/null
+---
+ http_interactions:
+ - request:
+ method: get
+ uri: "http://192.168.11.4:35357/v2.0/tenants"
+ body:
+ encoding: US-ASCII
+ string: ""
+ headers:
+ Content-Type:
+ - application/json
+ User-Agent:
+ - "Faraday v0.8.8"
+ X-Auth-Token:
+ - sosp-kyl
+ response:
+ status:
+ code: 200
+ message:
+ headers:
+ vary:
+ - X-Auth-Token
+ content-type:
+ - application/json
+ content-length:
+ - "491"
+ date:
+ - "Tue, 30 Sep 2014 06:59:48 GMT"
+ connection:
+ - close
+ body:
+ encoding: UTF-8
+ string: "{\x22tenants_links\x22: [], \x22tenants\x22: [{\x22description\x22: \x22Test tenant\x22, \x22enabled\x22: true, \x22id\x22: \x2234e463e2bab24f78990ca864e4a28ba2\x22, \x22name\x22: \x22test2\x22}, {\x22description\x22: \x22Tenant for the openstack services\x22, \x22enabled\x22: true, \x22id\x22: \x2268c8fcf77aff4b409cc158c0f6cbff7b\x22, \x22name\x22: \x22services\x22}, {\x22description\x22: \x22Test tenant\x22, \x22enabled\x22: true, \x22id\x22: \x22c330f1bc663648df9c1e7835a1e7a955\x22, \x22name\x22: \x22test\x22}, {\x22description\x22: \x22admin tenant\x22, \x22enabled\x22: true, \x22id\x22: \x22c518b36fa220499b85ba9a71014ce2a5\x22, \x22name\x22: \x22admin\x22}]}"
+ http_version:
+ recorded_at: "Tue, 30 Sep 2014 06:59:48 GMT"
+ recorded_with: "VCR 2.9.3"
\ No newline at end of file
--- /dev/null
+require 'spec_helper'
+
+describe 'os_database_connection' do
+
+ it 'refuses String' do
+ should run.with_params('foo').\
+ and_raise_error(Puppet::ParseError, /Requires an hash/)
+ end
+
+ it 'refuses Array' do
+ should run.with_params(['foo']).\
+ and_raise_error(Puppet::ParseError, /Requires an hash/)
+ end
+
+ it 'refuses without at least one argument' do
+ should run.with_params().\
+ and_raise_error(Puppet::ParseError, /Wrong number of arguments/)
+ end
+
+ it 'refuses too many arguments' do
+ should run.with_params('foo', 'bar').\
+ and_raise_error(Puppet::ParseError, /Wrong number of arguments/)
+ end
+
+ it 'fails if port is provided with missing host' do
+ should run.with_params({
+ 'dialect' => 'sqlite',
+ 'database' => '/var/lib/keystone/keystone.db',
+ 'port' => '3306',
+ 'charset' => 'utf-8'
+ }).and_raise_error(Puppet::ParseError, /host is required with port/)
+ end
+
+ context 'creates the correct connection URI' do
+
+ it 'with all parameters' do
+ should run.with_params({
+ 'dialect' => 'mysql',
+ 'host' => '127.0.0.1',
+ 'port' => '3306',
+ 'database' => 'test',
+ 'username' => 'guest',
+ 'password' => 's3cr3t',
+ 'charset' => 'utf-8'
+ }).and_return('mysql://guest:s3cr3t@127.0.0.1:3306/test?charset=utf-8')
+ end
+
+ it 'without port' do
+ should run.with_params({
+ 'dialect' => 'mysql',
+ 'host' => '127.0.0.1',
+ 'database' => 'test',
+ 'username' => 'guest',
+ 'password' => 's3cr3t',
+ 'charset' => 'utf-8'
+ }).and_return('mysql://guest:s3cr3t@127.0.0.1/test?charset=utf-8')
+ end
+
+ it 'without host and port' do
+ should run.with_params({
+ 'dialect' => 'sqlite',
+ 'database' => '/var/lib/keystone/keystone.db',
+ 'charset' => 'utf-8'
+ }).and_return('sqlite:////var/lib/keystone/keystone.db?charset=utf-8')
+ end
+
+ it 'without username and password' do
+ should run.with_params({
+ 'dialect' => 'mysql',
+ 'host' => '127.0.0.1',
+ 'port' => '3306',
+ 'database' => 'test',
+ 'charset' => 'utf-8'
+ }).and_return('mysql://127.0.0.1:3306/test?charset=utf-8')
+ end
+
+ it 'with username set to undef' do
+ should run.with_params({
+ 'dialect' => 'mysql',
+ 'host' => '127.0.0.1',
+ 'port' => '3306',
+ 'database' => 'test',
+ 'username' => :undef,
+ 'charset' => 'utf-8'
+ }).and_return('mysql://127.0.0.1:3306/test?charset=utf-8')
+ end
+
+ it 'with username set to an empty string' do
+ should run.with_params({
+ 'dialect' => 'mysql',
+ 'host' => '127.0.0.1',
+ 'port' => '3306',
+ 'database' => 'test',
+ 'username' => '',
+ 'charset' => 'utf-8'
+ }).and_return('mysql://127.0.0.1:3306/test?charset=utf-8')
+ end
+
+ it 'without password' do
+ should run.with_params({
+ 'dialect' => 'mysql',
+ 'host' => '127.0.0.1',
+ 'port' => '3306',
+ 'database' => 'test',
+ 'username' => 'guest',
+ 'charset' => 'utf-8'
+ }).and_return('mysql://guest@127.0.0.1:3306/test?charset=utf-8')
+ end
+
+ it 'with password set to undef' do
+ should run.with_params({
+ 'dialect' => 'mysql',
+ 'host' => '127.0.0.1',
+ 'port' => '3306',
+ 'database' => 'test',
+ 'username' => 'guest',
+ 'password' => :undef,
+ 'charset' => 'utf-8'
+ }).and_return('mysql://guest@127.0.0.1:3306/test?charset=utf-8')
+ end
+
+ it 'with password set to an empty string' do
+ should run.with_params({
+ 'dialect' => 'mysql',
+ 'host' => '127.0.0.1',
+ 'port' => '3306',
+ 'database' => 'test',
+ 'username' => 'guest',
+ 'password' => '',
+ 'charset' => 'utf-8'
+ }).and_return('mysql://guest@127.0.0.1:3306/test?charset=utf-8')
+ end
+ end
+end
--- /dev/null
+require 'puppetlabs_spec_helper/module_spec_helper'
+require 'vcr'
+
+VCR.configure do |c|
+ c.cassette_library_dir = 'spec/fixtures/vcr'
+ c.hook_into :faraday
+end
--- /dev/null
+# Load libraries from aviator here to simulate how they live together in a real puppet run
+$LOAD_PATH.push(File.join(File.dirname(__FILE__), '..', '..', 'fixtures', 'modules', 'aviator', 'lib'))
+require 'puppet'
+require 'vcr'
+require 'spec_helper'
+require 'puppet/provider/aviator'
+
+
+describe Puppet::Provider::Aviator do
+
+ before(:each) do
+ ENV['OS_USERNAME'] = nil
+ ENV['OS_PASSWORD'] = nil
+ ENV['OS_TENANT_NAME'] = nil
+ ENV['OS_AUTH_URL'] = nil
+ end
+
+ let(:log_file) { '/tmp/aviator_spec.log' }
+
+ let(:type) do
+ Puppet::Type.newtype(:test_resource) do
+ newparam(:name, :namevar => true)
+ newparam(:auth)
+ newparam(:log_file)
+ end
+ end
+
+
+ shared_examples 'creating a session using environment variables' do
+ it 'creates an authenticated session' do
+ ENV['OS_USERNAME'] = 'admin'
+ ENV['OS_PASSWORD'] = 'fyby-tet'
+ ENV['OS_TENANT_NAME'] = 'admin'
+ ENV['OS_AUTH_URL'] = 'http://192.168.11.4:35357/v2.0'
+ response = nil
+ VCR.use_cassette('aviator/session/with_password') do
+ session = provider.session
+ response = session.identity_service.request(:list_tenants, :session_data => provider.session_data)
+ end
+ expect(response.status).to eq(200)
+ end
+ end
+
+ shared_examples 'creating a session using a service token from keystone.conf' do
+ it 'creates an unauthenticated session' do
+ data = "[DEFAULT]\nadmin_token=sosp-kyl\nadmin_endpoint=http://192.168.11.4:35357/v2.0"
+ response = nil
+ VCR.use_cassette('aviator/session/with_token') do
+ # Stubbing File.read produces inconsistent results because of how IniConfig
+ # overrides the File class in some versions of Puppet.
+ # Stubbing FileType.filetype(:flat) simplifies working with IniConfig
+ Puppet::Util::FileType.filetype(:flat).any_instance.expects(:read).returns(StringIO.new(data).read)
+ session = provider.session
+ Puppet::Util::FileType.filetype(:flat).any_instance.unstub(:read)
+ response = session.identity_service.request(:list_tenants, :session_data => provider.session_data)
+ end
+
+ expect(response.status).to eq(200)
+ end
+ end
+
+ shared_examples 'it has no credentials' do
+ it 'fails to authenticate' do
+ expect{ provider.session }.to raise_error(Puppet::Error, /No credentials provided/)
+ end
+ end
+
+ shared_examples 'making request with an existing session' do
+ it 'makes a successful request' do
+ VCR.use_cassette('aviator/request/with_session') do
+ session = provider.session
+ response = provider.request(session.identity_service, :list_tenants)
+ expect(response.status).to eq(200)
+ end
+ end
+ end
+
+ shared_examples 'making request with injected session data' do
+ it 'makes a successful request' do
+ VCR.use_cassette('aviator/request/without_session') do
+ session = provider.session
+ response = provider.request(session.identity_service, :list_tenants)
+ expect(response.status).to eq(200)
+ end
+ end
+ end
+
+ shared_examples 'making request with no session or session data' do
+ it 'fails to make a request' do
+ expect{ provider.request(nil, :list_tenants) }.to raise_error(Puppet::Error, /Cannot make a request/)
+ end
+ end
+
+ describe '#session' do
+
+ context 'with valid password credentials in parameters' do
+ let(:resource_attrs) do
+ {
+ :name => 'stubresource',
+ :auth => {
+ 'username' => 'admin',
+ 'password' => 'fyby-tet',
+ 'tenant_name' => 'admin',
+ 'host_uri' => 'http://192.168.11.4:35357/v2.0',
+ }
+ }
+ end
+
+ it 'creates a session' do
+ provider = Puppet::Provider::Aviator.new(type.new(resource_attrs))
+ response = nil
+ VCR.use_cassette('aviator/session/with_password') do
+ session = provider.session
+ response = session.identity_service.request(:list_tenants)
+ end
+ expect(response.status).to eq(200)
+ end
+ end
+
+ context 'with valid openrc file in parameters' do
+ data = "export OS_USERNAME='admin'\nexport OS_PASSWORD='fyby-tet'\nexport OS_TENANT_NAME='admin'\nexport OS_AUTH_URL='http://192.168.11.4:35357/v2.0'"
+ let(:resource_attrs) do
+ {
+ :name => 'stubresource',
+ :auth => {
+ 'openrc' => '/root/openrc'
+ }
+ }
+ end
+
+ it 'creates a session' do
+ provider = Puppet::Provider::Aviator.new(type.new(resource_attrs))
+ response = nil
+ VCR.use_cassette('aviator/session/with_password') do
+ File.expects(:open).with('/root/openrc').returns(StringIO.new(data))
+ session = provider.session
+ File.unstub(:open) # Ignore File.open calls to cassette file
+ response = session.identity_service.request(:list_tenants)
+ end
+ expect(response.status).to eq(200)
+ end
+ end
+
+ context 'with valid service token in parameters' do
+ let(:resource_attrs) do
+ {
+ :name => 'stubresource',
+ :auth => {
+ 'service_token' => 'sosp-kyl',
+ 'host_uri' => 'http://192.168.11.4:35357/v2.0'
+ }
+ }
+ end
+
+ subject(:session) do
+ provider = Puppet::Provider::Aviator.new(type.new(resource_attrs))
+ VCR.use_cassette('aviator/session/with_token') do
+ session = provider.session
+ response = session.identity_service.request(:list_tenants, :session_data => provider.session_data)
+ end
+ end
+
+ it 'creates a session' do
+ expect(session.status).to eq(200)
+ end
+
+ end
+
+ context 'with valid password credentials in environment variables' do
+ it_behaves_like 'creating a session using environment variables' do
+ let(:resource_attrs) do
+ {
+ :name => 'stubresource',
+ }
+ end
+ let(:provider) do
+ Puppet::Provider::Aviator.new(type.new(resource_attrs))
+ end
+ end
+ end
+
+ context 'with valid service token in keystone.conf' do
+ it_behaves_like 'creating a session using a service token from keystone.conf' do
+ let(:resource_attrs) do
+ {
+ :name => 'stubresource',
+ }
+ end
+ let(:provider) do
+ Puppet::Provider::Aviator.new(type.new(resource_attrs))
+ end
+ end
+
+ end
+
+ context 'with no valid credentials' do
+ it_behaves_like 'it has no credentials' do
+ let(:resource_attrs) do
+ {
+ :name => 'stubresource',
+ }
+ end
+ let(:provider) { Puppet::Provider::Aviator.new(type.new(resource_attrs)) }
+ end
+ end
+
+ end
+
+
+ describe '::session' do
+
+ context 'with valid password credentials in environment variables' do
+ it_behaves_like 'creating a session using environment variables' do
+ let(:provider) { Puppet::Provider::Aviator.dup }
+ end
+ end
+
+ context 'with valid service token in keystone.conf' do
+ it_behaves_like 'creating a session using a service token from keystone.conf' do
+ let(:provider) { Puppet::Provider::Aviator.dup }
+ end
+ end
+
+ context 'with no valid credentials' do
+ it_behaves_like 'it has no credentials' do
+ let(:provider) { Puppet::Provider::Aviator.dup }
+ end
+ end
+ end
+
+ describe '#request' do
+ context 'when a session exists' do
+ it_behaves_like 'making request with an existing session' do
+ let(:resource_attrs) do
+ {
+ :name => 'stubresource',
+ :auth => {
+ 'username' => 'admin',
+ 'password' => 'fyby-tet',
+ 'tenant_name' => 'admin',
+ 'host_uri' => 'http://192.168.11.4:35357/v2.0',
+ }
+ }
+ end
+ let (:provider) { Puppet::Provider::Aviator.new(type.new(resource_attrs)) }
+ end
+ end
+
+ context 'when injecting session data' do
+ let(:resource_attrs) do
+ {
+ :name => 'stubresource',
+ :auth => {
+ 'service_token' => 'sosp-kyl',
+ 'host_uri' => 'http://192.168.11.4:35357/v2.0'
+ }
+ }
+ end
+ let(:provider) { Puppet::Provider::Aviator.new(type.new(resource_attrs)) }
+ it 'makes a successful request' do
+ provider = Puppet::Provider::Aviator.new(type.new(resource_attrs))
+ VCR.use_cassette('aviator/request/without_session') do
+ session = provider.session
+ response = provider.request(session.identity_service, :list_tenants)
+ expect(response.status).to eq(200)
+ end
+ end
+ end
+
+ context 'when there is no session or session data' do
+ it_behaves_like 'making request with no session or session data' do
+ let(:resource_attrs) do
+ {
+ :name => 'stubresource',
+ }
+ end
+ let(:provider) {Puppet::Provider::Aviator.new(type.new(resource_attrs)) }
+ end
+ end
+ end
+
+ describe '::request' do
+ context 'when a session exists' do
+
+ it_behaves_like 'making request with an existing session' do
+ let(:provider) { provider = Puppet::Provider::Aviator.dup }
+ before(:each) do
+ ENV['OS_USERNAME'] = 'admin'
+ ENV['OS_PASSWORD'] = 'fyby-tet'
+ ENV['OS_TENANT_NAME'] = 'admin'
+ ENV['OS_AUTH_URL'] = 'http://192.168.11.4:35357/v2.0'
+ end
+ end
+ end
+
+ context 'when injecting session data' do
+ let(:session_data) do
+ {
+ :base_url => 'http://192.168.11.4:35357/v2.0',
+ :service_token => 'sosp-kyl'
+ }
+ end
+ it 'makes a successful request' do
+ provider = Puppet::Provider::Aviator.dup
+ VCR.use_cassette('aviator/request/without_session') do
+ session = ::Aviator::Session.new(:config => { :provider => 'openstack' }, :log_file => log_file)
+ provider.session_data = session_data
+ response = provider.request(session.identity_service, :list_tenants)
+ expect(response.status).to eq(200)
+ end
+ end
+ end
+
+ context 'when there is no session or session data' do
+ it_behaves_like 'making request with no session or session data' do
+ let(:provider) { Puppet::Provider::Aviator.dup }
+ end
+ end
+ end
+end