target
stringlengths
20
113k
src_fm
stringlengths
11
86.3k
src_fm_fc
stringlengths
21
86.4k
src_fm_fc_co
stringlengths
30
86.4k
src_fm_fc_ms
stringlengths
42
86.8k
src_fm_fc_ms_ff
stringlengths
43
86.8k
@SuppressWarnings("unchecked") @Test public void testDestroyNodeTerminatesInstanceAndReturnsRefreshedNode() throws Exception { EC2Api client = createMock(EC2Api.class); InstanceApi instanceClient = createMock(InstanceApi.class); GetNodeMetadataStrategy getNode = createMock(GetNodeMetadataStrategy.class); LoadingCache<RegionAndName, String> elasticIpCache = createMock(LoadingCache.class); NodeMetadata node = createMock(NodeMetadata.class); expect(client.getInstanceApi()).andReturn((Optional) Optional.of(instanceClient)).atLeastOnce(); expect(instanceClient.terminateInstancesInRegion("region", "i-blah")).andReturn(null); expect(getNode.getNode("region/i-blah")).andReturn(node); replay(client); replay(getNode); replay(instanceClient); replay(elasticIpCache); EC2DestroyNodeStrategy destroyer = new EC2DestroyNodeStrategy(client, getNode, elasticIpCache); assertEquals(destroyer.destroyNode("region/i-blah"), node); verify(client); verify(getNode); verify(instanceClient); verify(elasticIpCache); }
@Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } @Inject protected EC2DestroyNodeStrategy(EC2Api client, GetNodeMetadataStrategy getNode, @Named("ELASTICIP") LoadingCache<RegionAndName, String> elasticIpCache); }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } @Inject protected EC2DestroyNodeStrategy(EC2Api client, GetNodeMetadataStrategy getNode, @Named("ELASTICIP") LoadingCache<RegionAndName, String> elasticIpCache); @Override NodeMetadata destroyNode(String id); }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } @Inject protected EC2DestroyNodeStrategy(EC2Api client, GetNodeMetadataStrategy getNode, @Named("ELASTICIP") LoadingCache<RegionAndName, String> elasticIpCache); @Override NodeMetadata destroyNode(String id); }
@SuppressWarnings("unchecked") @Test public void testDestroyNodeDisassociatesAndReleasesIpThenTerminatesInstanceAndReturnsRefreshedNode() throws Exception { EC2Api client = createMock(EC2Api.class); GetNodeMetadataStrategy getNode = createMock(GetNodeMetadataStrategy.class); LoadingCache<RegionAndName, String> elasticIpCache = createMock(LoadingCache.class); ElasticIPAddressApi ipClient = createMock(ElasticIPAddressApi.class); InstanceApi instanceClient = createMock(InstanceApi.class); NodeMetadata node = createMock(NodeMetadata.class); expect(elasticIpCache.get(new RegionAndName("region", "i-blah"))).andReturn("1.1.1.1"); expect(client.getElasticIPAddressApi()).andReturn((Optional) Optional.of(ipClient)).atLeastOnce(); ipClient.disassociateAddressInRegion("region", "1.1.1.1"); ipClient.releaseAddressInRegion("region", "1.1.1.1"); elasticIpCache.invalidate(new RegionAndName("region", "i-blah")); expect(client.getInstanceApi()).andReturn((Optional) Optional.of(instanceClient)).atLeastOnce(); expect(instanceClient.terminateInstancesInRegion("region", "i-blah")).andReturn(null); expect(getNode.getNode("region/i-blah")).andReturn(node); replay(client); replay(getNode); replay(elasticIpCache); replay(instanceClient); replay(ipClient); EC2DestroyNodeStrategy destroyer = new EC2DestroyNodeStrategy(client, getNode, elasticIpCache); destroyer.autoAllocateElasticIps = true; assertEquals(destroyer.destroyNode("region/i-blah"), node); verify(client); verify(getNode); verify(elasticIpCache); verify(instanceClient); verify(ipClient); }
@Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } @Inject protected EC2DestroyNodeStrategy(EC2Api client, GetNodeMetadataStrategy getNode, @Named("ELASTICIP") LoadingCache<RegionAndName, String> elasticIpCache); }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } @Inject protected EC2DestroyNodeStrategy(EC2Api client, GetNodeMetadataStrategy getNode, @Named("ELASTICIP") LoadingCache<RegionAndName, String> elasticIpCache); @Override NodeMetadata destroyNode(String id); }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } @Inject protected EC2DestroyNodeStrategy(EC2Api client, GetNodeMetadataStrategy getNode, @Named("ELASTICIP") LoadingCache<RegionAndName, String> elasticIpCache); @Override NodeMetadata destroyNode(String id); }
@SuppressWarnings("unchecked") @Test public void testDestroyNodeSafeOnCacheMissThenTerminatesInstanceAndReturnsRefreshedNode() throws Exception { EC2Api client = createMock(EC2Api.class); GetNodeMetadataStrategy getNode = createMock(GetNodeMetadataStrategy.class); LoadingCache<RegionAndName, String> elasticIpCache = createMock(LoadingCache.class); ElasticIPAddressApi ipClient = createMock(ElasticIPAddressApi.class); InstanceApi instanceClient = createMock(InstanceApi.class); NodeMetadata node = createMock(NodeMetadata.class); expect(elasticIpCache.get(new RegionAndName("region", "i-blah"))).andThrow(new CacheLoader.InvalidCacheLoadException(null)); expect(client.getInstanceApi()).andReturn((Optional) Optional.of(instanceClient)).atLeastOnce(); expect(instanceClient.terminateInstancesInRegion("region", "i-blah")).andReturn(null); expect(getNode.getNode("region/i-blah")).andReturn(node); replay(client); replay(getNode); replay(elasticIpCache); replay(instanceClient); replay(ipClient); EC2DestroyNodeStrategy destroyer = new EC2DestroyNodeStrategy(client, getNode, elasticIpCache); destroyer.autoAllocateElasticIps = true; assertEquals(destroyer.destroyNode("region/i-blah"), node); verify(client); verify(getNode); verify(elasticIpCache); verify(instanceClient); verify(ipClient); }
@Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } @Inject protected EC2DestroyNodeStrategy(EC2Api client, GetNodeMetadataStrategy getNode, @Named("ELASTICIP") LoadingCache<RegionAndName, String> elasticIpCache); }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } @Inject protected EC2DestroyNodeStrategy(EC2Api client, GetNodeMetadataStrategy getNode, @Named("ELASTICIP") LoadingCache<RegionAndName, String> elasticIpCache); @Override NodeMetadata destroyNode(String id); }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } @Inject protected EC2DestroyNodeStrategy(EC2Api client, GetNodeMetadataStrategy getNode, @Named("ELASTICIP") LoadingCache<RegionAndName, String> elasticIpCache); @Override NodeMetadata destroyNode(String id); }
@SuppressWarnings("unchecked") @Test public void testDestroyNodeSafeOnCacheExecutionExceptionThenTerminatesInstanceAndReturnsRefreshedNode() throws Exception { EC2Api client = createMock(EC2Api.class); GetNodeMetadataStrategy getNode = createMock(GetNodeMetadataStrategy.class); LoadingCache<RegionAndName, String> elasticIpCache = createMock(LoadingCache.class); ElasticIPAddressApi ipClient = createMock(ElasticIPAddressApi.class); InstanceApi instanceClient = createMock(InstanceApi.class); NodeMetadata node = createMock(NodeMetadata.class); expect(elasticIpCache.get(new RegionAndName("region", "i-blah"))).andThrow(new ExecutionException(null)); expect(client.getInstanceApi()).andReturn((Optional) Optional.of(instanceClient)).atLeastOnce(); expect(instanceClient.terminateInstancesInRegion("region", "i-blah")).andReturn(null); expect(getNode.getNode("region/i-blah")).andReturn(node); replay(client); replay(getNode); replay(elasticIpCache); replay(instanceClient); replay(ipClient); EC2DestroyNodeStrategy destroyer = new EC2DestroyNodeStrategy(client, getNode, elasticIpCache); destroyer.autoAllocateElasticIps = true; assertEquals(destroyer.destroyNode("region/i-blah"), node); verify(client); verify(getNode); verify(elasticIpCache); verify(instanceClient); verify(ipClient); }
@Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } @Inject protected EC2DestroyNodeStrategy(EC2Api client, GetNodeMetadataStrategy getNode, @Named("ELASTICIP") LoadingCache<RegionAndName, String> elasticIpCache); }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } @Inject protected EC2DestroyNodeStrategy(EC2Api client, GetNodeMetadataStrategy getNode, @Named("ELASTICIP") LoadingCache<RegionAndName, String> elasticIpCache); @Override NodeMetadata destroyNode(String id); }
EC2DestroyNodeStrategy implements DestroyNodeStrategy { @Override public NodeMetadata destroyNode(String id) { String[] parts = AWSUtils.parseHandle(id); String region = parts[0]; String instanceId = parts[1]; releaseAnyPublicIpForInstanceInRegion(instanceId, region); destroyInstanceInRegion(instanceId, region); return getNode.getNode(id); } @Inject protected EC2DestroyNodeStrategy(EC2Api client, GetNodeMetadataStrategy getNode, @Named("ELASTICIP") LoadingCache<RegionAndName, String> elasticIpCache); @Override NodeMetadata destroyNode(String id); }
@Test(expectedExceptions = IllegalArgumentException.class) public void testCreateNewKeyPairUnlessUserSpecifiedOtherwise_reusesKeyWhenToldToWithRunScriptButNoCredentials() { String region = Region.AP_SOUTHEAST_1; String group = "group"; String userSuppliedKeyPair = "myKeyPair"; CreateKeyPairAndSecurityGroupsAsNeededAndReturnRunOptions strategy = setupStrategy(); EC2TemplateOptions options = createMock(EC2TemplateOptions.class); KeyPair keyPair = createMock(KeyPair.class); expect(options.getKeyPair()).andReturn(userSuppliedKeyPair); expect(options.getLoginUser()).andReturn(null); expect(options.getLoginPassword()).andReturn(null); expect(options.getLoginPrivateKey()).andReturn(null); expect(options.shouldAuthenticateSudo()).andReturn(null); expect(options.getRunScript()).andReturn(Statements.exec("echo foo")); expect(strategy.credentialsMap.containsKey(new RegionAndName(region, userSuppliedKeyPair))).andReturn(false); replay(options); replay(keyPair); replayStrategy(strategy); assertEquals(strategy.createNewKeyPairUnlessUserSpecifiedOtherwise(region, group, options), userSuppliedKeyPair); verify(options); verify(keyPair); verifyStrategy(strategy); }
@VisibleForTesting public String createNewKeyPairUnlessUserSpecifiedOtherwise(String region, String group, TemplateOptions options) { String keyPairName = null; boolean shouldAutomaticallyCreateKeyPair = true; if (options instanceof EC2TemplateOptions) { keyPairName = EC2TemplateOptions.class.cast(options).getKeyPair(); if (keyPairName == null) shouldAutomaticallyCreateKeyPair = EC2TemplateOptions.class.cast(options) .shouldAutomaticallyCreateKeyPair(); } if (keyPairName == null && shouldAutomaticallyCreateKeyPair) { keyPairName = createOrImportKeyPair(region, group, options); } else if (keyPairName != null) { if (options.getLoginPrivateKey() != null) { String pem = options.getLoginPrivateKey(); KeyPair keyPair = KeyPair.builder().region(region).keyName(keyPairName).fingerprint( fingerprintPrivateKey(pem)).sha1OfPrivateKey(sha1PrivateKey(pem)).keyMaterial(pem).build(); RegionAndName key = new RegionAndName(region, keyPairName); credentialsMap.put(key, keyPair); } } if (options.getRunScript() != null) { RegionAndName regionAndName = new RegionAndName(region, keyPairName); checkArgument( credentialsMap.containsKey(regionAndName), "no private key configured for: %s; please use options.overrideLoginCredentialWith(rsa_private_text)", regionAndName); } return keyPairName; }
CreateKeyPairAndSecurityGroupsAsNeededAndReturnRunOptions { @VisibleForTesting public String createNewKeyPairUnlessUserSpecifiedOtherwise(String region, String group, TemplateOptions options) { String keyPairName = null; boolean shouldAutomaticallyCreateKeyPair = true; if (options instanceof EC2TemplateOptions) { keyPairName = EC2TemplateOptions.class.cast(options).getKeyPair(); if (keyPairName == null) shouldAutomaticallyCreateKeyPair = EC2TemplateOptions.class.cast(options) .shouldAutomaticallyCreateKeyPair(); } if (keyPairName == null && shouldAutomaticallyCreateKeyPair) { keyPairName = createOrImportKeyPair(region, group, options); } else if (keyPairName != null) { if (options.getLoginPrivateKey() != null) { String pem = options.getLoginPrivateKey(); KeyPair keyPair = KeyPair.builder().region(region).keyName(keyPairName).fingerprint( fingerprintPrivateKey(pem)).sha1OfPrivateKey(sha1PrivateKey(pem)).keyMaterial(pem).build(); RegionAndName key = new RegionAndName(region, keyPairName); credentialsMap.put(key, keyPair); } } if (options.getRunScript() != null) { RegionAndName regionAndName = new RegionAndName(region, keyPairName); checkArgument( credentialsMap.containsKey(regionAndName), "no private key configured for: %s; please use options.overrideLoginCredentialWith(rsa_private_text)", regionAndName); } return keyPairName; } }
CreateKeyPairAndSecurityGroupsAsNeededAndReturnRunOptions { @VisibleForTesting public String createNewKeyPairUnlessUserSpecifiedOtherwise(String region, String group, TemplateOptions options) { String keyPairName = null; boolean shouldAutomaticallyCreateKeyPair = true; if (options instanceof EC2TemplateOptions) { keyPairName = EC2TemplateOptions.class.cast(options).getKeyPair(); if (keyPairName == null) shouldAutomaticallyCreateKeyPair = EC2TemplateOptions.class.cast(options) .shouldAutomaticallyCreateKeyPair(); } if (keyPairName == null && shouldAutomaticallyCreateKeyPair) { keyPairName = createOrImportKeyPair(region, group, options); } else if (keyPairName != null) { if (options.getLoginPrivateKey() != null) { String pem = options.getLoginPrivateKey(); KeyPair keyPair = KeyPair.builder().region(region).keyName(keyPairName).fingerprint( fingerprintPrivateKey(pem)).sha1OfPrivateKey(sha1PrivateKey(pem)).keyMaterial(pem).build(); RegionAndName key = new RegionAndName(region, keyPairName); credentialsMap.put(key, keyPair); } } if (options.getRunScript() != null) { RegionAndName regionAndName = new RegionAndName(region, keyPairName); checkArgument( credentialsMap.containsKey(regionAndName), "no private key configured for: %s; please use options.overrideLoginCredentialWith(rsa_private_text)", regionAndName); } return keyPairName; } @Inject CreateKeyPairAndSecurityGroupsAsNeededAndReturnRunOptions(Function<RegionAndName, KeyPair> makeKeyPair, ConcurrentMap<RegionAndName, KeyPair> credentialsMap, @Named("SECURITY") LoadingCache<RegionAndName, String> securityGroupMap, Provider<RunInstancesOptions> optionsProvider, GroupNamingConvention.Factory namingConvention); }
CreateKeyPairAndSecurityGroupsAsNeededAndReturnRunOptions { @VisibleForTesting public String createNewKeyPairUnlessUserSpecifiedOtherwise(String region, String group, TemplateOptions options) { String keyPairName = null; boolean shouldAutomaticallyCreateKeyPair = true; if (options instanceof EC2TemplateOptions) { keyPairName = EC2TemplateOptions.class.cast(options).getKeyPair(); if (keyPairName == null) shouldAutomaticallyCreateKeyPair = EC2TemplateOptions.class.cast(options) .shouldAutomaticallyCreateKeyPair(); } if (keyPairName == null && shouldAutomaticallyCreateKeyPair) { keyPairName = createOrImportKeyPair(region, group, options); } else if (keyPairName != null) { if (options.getLoginPrivateKey() != null) { String pem = options.getLoginPrivateKey(); KeyPair keyPair = KeyPair.builder().region(region).keyName(keyPairName).fingerprint( fingerprintPrivateKey(pem)).sha1OfPrivateKey(sha1PrivateKey(pem)).keyMaterial(pem).build(); RegionAndName key = new RegionAndName(region, keyPairName); credentialsMap.put(key, keyPair); } } if (options.getRunScript() != null) { RegionAndName regionAndName = new RegionAndName(region, keyPairName); checkArgument( credentialsMap.containsKey(regionAndName), "no private key configured for: %s; please use options.overrideLoginCredentialWith(rsa_private_text)", regionAndName); } return keyPairName; } @Inject CreateKeyPairAndSecurityGroupsAsNeededAndReturnRunOptions(Function<RegionAndName, KeyPair> makeKeyPair, ConcurrentMap<RegionAndName, KeyPair> credentialsMap, @Named("SECURITY") LoadingCache<RegionAndName, String> securityGroupMap, Provider<RunInstancesOptions> optionsProvider, GroupNamingConvention.Factory namingConvention); RunInstancesOptions execute(String region, String group, Template template); @VisibleForTesting String createNewKeyPairUnlessUserSpecifiedOtherwise(String region, String group, TemplateOptions options); @VisibleForTesting Set<String> getSecurityGroupsForTagAndOptions(String region, @Nullable String group, @Nullable String vpcId, TemplateOptions options); @VisibleForTesting javax.inject.Provider<RunInstancesOptions> getOptionsProvider(); }
CreateKeyPairAndSecurityGroupsAsNeededAndReturnRunOptions { @VisibleForTesting public String createNewKeyPairUnlessUserSpecifiedOtherwise(String region, String group, TemplateOptions options) { String keyPairName = null; boolean shouldAutomaticallyCreateKeyPair = true; if (options instanceof EC2TemplateOptions) { keyPairName = EC2TemplateOptions.class.cast(options).getKeyPair(); if (keyPairName == null) shouldAutomaticallyCreateKeyPair = EC2TemplateOptions.class.cast(options) .shouldAutomaticallyCreateKeyPair(); } if (keyPairName == null && shouldAutomaticallyCreateKeyPair) { keyPairName = createOrImportKeyPair(region, group, options); } else if (keyPairName != null) { if (options.getLoginPrivateKey() != null) { String pem = options.getLoginPrivateKey(); KeyPair keyPair = KeyPair.builder().region(region).keyName(keyPairName).fingerprint( fingerprintPrivateKey(pem)).sha1OfPrivateKey(sha1PrivateKey(pem)).keyMaterial(pem).build(); RegionAndName key = new RegionAndName(region, keyPairName); credentialsMap.put(key, keyPair); } } if (options.getRunScript() != null) { RegionAndName regionAndName = new RegionAndName(region, keyPairName); checkArgument( credentialsMap.containsKey(regionAndName), "no private key configured for: %s; please use options.overrideLoginCredentialWith(rsa_private_text)", regionAndName); } return keyPairName; } @Inject CreateKeyPairAndSecurityGroupsAsNeededAndReturnRunOptions(Function<RegionAndName, KeyPair> makeKeyPair, ConcurrentMap<RegionAndName, KeyPair> credentialsMap, @Named("SECURITY") LoadingCache<RegionAndName, String> securityGroupMap, Provider<RunInstancesOptions> optionsProvider, GroupNamingConvention.Factory namingConvention); RunInstancesOptions execute(String region, String group, Template template); @VisibleForTesting String createNewKeyPairUnlessUserSpecifiedOtherwise(String region, String group, TemplateOptions options); @VisibleForTesting Set<String> getSecurityGroupsForTagAndOptions(String region, @Nullable String group, @Nullable String vpcId, TemplateOptions options); @VisibleForTesting javax.inject.Provider<RunInstancesOptions> getOptionsProvider(); @VisibleForTesting public Function<RegionAndName, KeyPair> makeKeyPair; @VisibleForTesting final ConcurrentMap<RegionAndName, KeyPair> credentialsMap; @VisibleForTesting final LoadingCache<RegionAndName, String> securityGroupMap; @VisibleForTesting final Provider<RunInstancesOptions> optionsProvider; }
@Test(expectedExceptions = NullPointerException.class, expectedExceptionsMessageRegExp = "all security groups must be non-empty") public void testsecurityGroupsIterableBadFormat() { EC2TemplateOptions options = new EC2TemplateOptions(); options.securityGroups(ImmutableSet.of("group1", "")); }
public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testCanReadRsaAndCompareFingerprintOnPublicRSAKey() throws IOException { String dsa = Strings2.toStringAndClose(getClass().getResourceAsStream("/ssh-dsa.pub")); String fingerPrint = DSAKeys.fingerprintPublicKey(dsa); assertEquals(fingerPrint, expectedFingerPrint); }
public static String fingerprintPublicKey(String publicKeyOpenSSH) { DSAPublicKeySpec publicKeySpec = publicKeySpecFromOpenSSH(publicKeyOpenSSH); return fingerprint(publicKeySpec.getP(), publicKeySpec.getQ(), publicKeySpec.getG(), publicKeySpec.getY()); }
DSAKeys { public static String fingerprintPublicKey(String publicKeyOpenSSH) { DSAPublicKeySpec publicKeySpec = publicKeySpecFromOpenSSH(publicKeyOpenSSH); return fingerprint(publicKeySpec.getP(), publicKeySpec.getQ(), publicKeySpec.getG(), publicKeySpec.getY()); } }
DSAKeys { public static String fingerprintPublicKey(String publicKeyOpenSSH) { DSAPublicKeySpec publicKeySpec = publicKeySpecFromOpenSSH(publicKeyOpenSSH); return fingerprint(publicKeySpec.getP(), publicKeySpec.getQ(), publicKeySpec.getG(), publicKeySpec.getY()); } }
DSAKeys { public static String fingerprintPublicKey(String publicKeyOpenSSH) { DSAPublicKeySpec publicKeySpec = publicKeySpecFromOpenSSH(publicKeyOpenSSH); return fingerprint(publicKeySpec.getP(), publicKeySpec.getQ(), publicKeySpec.getG(), publicKeySpec.getY()); } static String encodeAsOpenSSH(DSAPublicKey key); static DSAPublicKeySpec publicKeySpecFromOpenSSH(String idDsaPub); static DSAPublicKeySpec publicKeySpecFromOpenSSH(ByteSource supplier); static String fingerprintPublicKey(String publicKeyOpenSSH); static String fingerprint(BigInteger p, BigInteger q, BigInteger g, BigInteger y); }
DSAKeys { public static String fingerprintPublicKey(String publicKeyOpenSSH) { DSAPublicKeySpec publicKeySpec = publicKeySpecFromOpenSSH(publicKeyOpenSSH); return fingerprint(publicKeySpec.getP(), publicKeySpec.getQ(), publicKeySpec.getG(), publicKeySpec.getY()); } static String encodeAsOpenSSH(DSAPublicKey key); static DSAPublicKeySpec publicKeySpecFromOpenSSH(String idDsaPub); static DSAPublicKeySpec publicKeySpecFromOpenSSH(ByteSource supplier); static String fingerprintPublicKey(String publicKeyOpenSSH); static String fingerprint(BigInteger p, BigInteger q, BigInteger g, BigInteger y); }
@Test(expectedExceptions = IllegalArgumentException.class) public void testsecurityGroupsIterableEmptyNotOk() { EC2TemplateOptions options = new EC2TemplateOptions(); options.securityGroups(ImmutableSet.<String> of()); }
public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test(expectedExceptions = NullPointerException.class, expectedExceptionsMessageRegExp = "all security groups must be non-empty") public void testsecurityGroupsVarArgsBadFormat() { EC2TemplateOptions options = new EC2TemplateOptions(); options.securityGroups("mygroup", ""); }
public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test(expectedExceptions = IllegalArgumentException.class) public void testsecurityGroupsVarArgsEmptyNotOk() { EC2TemplateOptions options = new EC2TemplateOptions(); options.securityGroups(); }
public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions securityGroups(String... groupNames) { return securityGroups(ImmutableSet.copyOf(groupNames)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testDefaultGroupsVarArgsEmpty() { EC2TemplateOptions options = new EC2TemplateOptions(); assertEquals(options.getGroups(), ImmutableSet.of()); }
public Set<String> getGroups() { return groupNames; }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public Set<String> getGroups() { return groupNames; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public Set<String> getGroups() { return groupNames; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public Set<String> getGroups() { return groupNames; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public Set<String> getGroups() { return groupNames; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test(expectedExceptions = NullPointerException.class, expectedExceptionsMessageRegExp = "use noKeyPair option to request boot without a keypair") public void testkeyPairBadFormat() { EC2TemplateOptions options = new EC2TemplateOptions(); options.keyPair(""); }
public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testkeyPair() { EC2TemplateOptions options = new EC2TemplateOptions(); options.keyPair("mykeypair"); assertEquals(options.getKeyPair(), "mykeypair"); }
public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testNullkeyPair() { EC2TemplateOptions options = new EC2TemplateOptions(); assertEquals(options.getKeyPair(), null); }
public String getKeyPair() { return keyPair; }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public String getKeyPair() { return keyPair; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public String getKeyPair() { return keyPair; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public String getKeyPair() { return keyPair; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public String getKeyPair() { return keyPair; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test(expectedExceptions = NullPointerException.class) public void testkeyPairNPE() { keyPair(null); }
public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions keyPair(String keyPair) { checkState(!noKeyPair, "you cannot specify both options keyPair and noKeyPair"); this.keyPair = checkNotNull(emptyToNull(keyPair), "use noKeyPair option to request boot without a keypair"); return this; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testnoKeyPair() { EC2TemplateOptions options = new EC2TemplateOptions(); options.noKeyPair(); assertEquals(options.getKeyPair(), null); assert !options.shouldAutomaticallyCreateKeyPair(); }
public EC2TemplateOptions noKeyPair() { checkState(keyPair == null, "you cannot specify both options keyPair and noKeyPair"); this.noKeyPair = true; return this; }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions noKeyPair() { checkState(keyPair == null, "you cannot specify both options keyPair and noKeyPair"); this.noKeyPair = true; return this; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions noKeyPair() { checkState(keyPair == null, "you cannot specify both options keyPair and noKeyPair"); this.noKeyPair = true; return this; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions noKeyPair() { checkState(keyPair == null, "you cannot specify both options keyPair and noKeyPair"); this.noKeyPair = true; return this; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions noKeyPair() { checkState(keyPair == null, "you cannot specify both options keyPair and noKeyPair"); this.noKeyPair = true; return this; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test(expectedExceptions = IllegalArgumentException.class) public void testinstallPrivateKeyBadFormat() { EC2TemplateOptions options = new EC2TemplateOptions(); options.installPrivateKey("whompy"); }
@Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testEncodeAsOpenSSH() throws IOException, InvalidKeySpecException, NoSuchAlgorithmException { String dsa = Strings2.toStringAndClose(getClass().getResourceAsStream("/ssh-dsa.pub")); DSAPublicKeySpec spec = DSAKeys.publicKeySpecFromOpenSSH(dsa); DSAPublicKey key = (DSAPublicKey) KeyFactory.getInstance("DSA").generatePublic(spec); assertEquals(DSAKeys.encodeAsOpenSSH(key), dsa); }
public static String encodeAsOpenSSH(DSAPublicKey key) { DSAParams params = key.getParams(); byte[] keyBlob = keyBlob(params.getP(), params.getQ(), params.getG(), key.getY()); return "ssh-dss " + base64().encode(keyBlob); }
DSAKeys { public static String encodeAsOpenSSH(DSAPublicKey key) { DSAParams params = key.getParams(); byte[] keyBlob = keyBlob(params.getP(), params.getQ(), params.getG(), key.getY()); return "ssh-dss " + base64().encode(keyBlob); } }
DSAKeys { public static String encodeAsOpenSSH(DSAPublicKey key) { DSAParams params = key.getParams(); byte[] keyBlob = keyBlob(params.getP(), params.getQ(), params.getG(), key.getY()); return "ssh-dss " + base64().encode(keyBlob); } }
DSAKeys { public static String encodeAsOpenSSH(DSAPublicKey key) { DSAParams params = key.getParams(); byte[] keyBlob = keyBlob(params.getP(), params.getQ(), params.getG(), key.getY()); return "ssh-dss " + base64().encode(keyBlob); } static String encodeAsOpenSSH(DSAPublicKey key); static DSAPublicKeySpec publicKeySpecFromOpenSSH(String idDsaPub); static DSAPublicKeySpec publicKeySpecFromOpenSSH(ByteSource supplier); static String fingerprintPublicKey(String publicKeyOpenSSH); static String fingerprint(BigInteger p, BigInteger q, BigInteger g, BigInteger y); }
DSAKeys { public static String encodeAsOpenSSH(DSAPublicKey key) { DSAParams params = key.getParams(); byte[] keyBlob = keyBlob(params.getP(), params.getQ(), params.getG(), key.getY()); return "ssh-dss " + base64().encode(keyBlob); } static String encodeAsOpenSSH(DSAPublicKey key); static DSAPublicKeySpec publicKeySpecFromOpenSSH(String idDsaPub); static DSAPublicKeySpec publicKeySpecFromOpenSSH(ByteSource supplier); static String fingerprintPublicKey(String publicKeyOpenSSH); static String fingerprint(BigInteger p, BigInteger q, BigInteger g, BigInteger y); }
@Test public void testinstallPrivateKey() throws IOException { EC2TemplateOptions options = new EC2TemplateOptions(); options.installPrivateKey("-----BEGIN RSA PRIVATE KEY-----"); assertEquals(options.getPrivateKey(), "-----BEGIN RSA PRIVATE KEY-----"); }
@Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testinstallPrivateKeyStatic() throws IOException { EC2TemplateOptions options = installPrivateKey("-----BEGIN RSA PRIVATE KEY-----"); assertEquals(options.getPrivateKey(), "-----BEGIN RSA PRIVATE KEY-----"); }
@Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test(expectedExceptions = NullPointerException.class) public void testinstallPrivateKeyNPE() { installPrivateKey(null); }
@Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions installPrivateKey(String privateKey) { return EC2TemplateOptions.class.cast(super.installPrivateKey(privateKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test(expectedExceptions = IllegalArgumentException.class) public void testauthorizePublicKeyBadFormat() { EC2TemplateOptions options = new EC2TemplateOptions(); options.authorizePublicKey("whompy"); }
@Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testauthorizePublicKey() throws IOException { EC2TemplateOptions options = new EC2TemplateOptions(); options.authorizePublicKey("ssh-rsa"); assertEquals(options.getPublicKey(), "ssh-rsa"); }
@Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testauthorizePublicKeyStatic() throws IOException { EC2TemplateOptions options = authorizePublicKey("ssh-rsa"); assertEquals(options.getPublicKey(), "ssh-rsa"); }
@Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test(expectedExceptions = NullPointerException.class) public void testauthorizePublicKeyNPE() { authorizePublicKey(null); }
@Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions authorizePublicKey(String publicKey) { return EC2TemplateOptions.class.cast(super.authorizePublicKey(publicKey)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test(expectedExceptions = IllegalArgumentException.class) public void testblockOnPortBadFormat() { EC2TemplateOptions options = new EC2TemplateOptions(); options.blockOnPort(-1, -1); }
@Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testblockOnPort() { EC2TemplateOptions options = new EC2TemplateOptions(); options.blockOnPort(22, 30); assertEquals(options.getPort(), 22); assertEquals(options.getSeconds(), 30); }
@Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testblockOnPortStatic() { EC2TemplateOptions options = blockOnPort(22, 30); assertEquals(options.getPort(), 22); assertEquals(options.getSeconds(), 30); }
@Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions blockOnPort(int port, int seconds) { return EC2TemplateOptions.class.cast(super.blockOnPort(port, seconds)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test(expectedExceptions = IllegalArgumentException.class) public void testinboundPortsBadFormat() { EC2TemplateOptions options = new EC2TemplateOptions(); options.inboundPorts(-1, -1); }
@Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testinboundPorts() { EC2TemplateOptions options = new EC2TemplateOptions(); options.inboundPorts(22, 30); assertEquals(options.getInboundPorts()[0], 22); assertEquals(options.getInboundPorts()[1], 30); }
@Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testinboundPortsStatic() { EC2TemplateOptions options = inboundPorts(22, 30); assertEquals(options.getInboundPorts()[0], 22); assertEquals(options.getInboundPorts()[1], 30); }
@Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { @Override public EC2TemplateOptions inboundPorts(int... ports) { return EC2TemplateOptions.class.cast(super.inboundPorts(ports)); } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testMaxCountDefault() { EC2TemplateOptions options = new EC2TemplateOptions(); assertEquals(options.getMaxCount(), 0); }
public int getMaxCount() { return maxCount != null ? maxCount.intValue() : 0; }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public int getMaxCount() { return maxCount != null ? maxCount.intValue() : 0; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public int getMaxCount() { return maxCount != null ? maxCount.intValue() : 0; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public int getMaxCount() { return maxCount != null ? maxCount.intValue() : 0; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public int getMaxCount() { return maxCount != null ? maxCount.intValue() : 0; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testMaxCount() { EC2TemplateOptions options = new EC2TemplateOptions(); options.maxCount(2); assertEquals(options.getMaxCount(), 2); }
public EC2TemplateOptions maxCount(Integer maxCount) { this.maxCount = maxCount; return this; }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions maxCount(Integer maxCount) { this.maxCount = maxCount; return this; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions maxCount(Integer maxCount) { this.maxCount = maxCount; return this; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions maxCount(Integer maxCount) { this.maxCount = maxCount; return this; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions maxCount(Integer maxCount) { this.maxCount = maxCount; return this; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testClientTokenDefault() { EC2TemplateOptions options = new EC2TemplateOptions(); assertNull(options.getClientToken()); }
public String getClientToken() { return clientToken; }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public String getClientToken() { return clientToken; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public String getClientToken() { return clientToken; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public String getClientToken() { return clientToken; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public String getClientToken() { return clientToken; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testClientToken() { EC2TemplateOptions options = new EC2TemplateOptions(); options.clientToken("some-token"); assertEquals(options.getClientToken(), "some-token"); }
public EC2TemplateOptions clientToken(String clientToken) { this.clientToken = checkNotNull(clientToken, "clientToken"); return this; }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions clientToken(String clientToken) { this.clientToken = checkNotNull(clientToken, "clientToken"); return this; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions clientToken(String clientToken) { this.clientToken = checkNotNull(clientToken, "clientToken"); return this; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions clientToken(String clientToken) { this.clientToken = checkNotNull(clientToken, "clientToken"); return this; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions clientToken(String clientToken) { this.clientToken = checkNotNull(clientToken, "clientToken"); return this; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test(expectedExceptions = NullPointerException.class) public void testClientTokenNPE() { EC2TemplateOptions options = new EC2TemplateOptions(); options.clientToken(null); }
public EC2TemplateOptions clientToken(String clientToken) { this.clientToken = checkNotNull(clientToken, "clientToken"); return this; }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions clientToken(String clientToken) { this.clientToken = checkNotNull(clientToken, "clientToken"); return this; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions clientToken(String clientToken) { this.clientToken = checkNotNull(clientToken, "clientToken"); return this; } }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions clientToken(String clientToken) { this.clientToken = checkNotNull(clientToken, "clientToken"); return this; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); }
EC2TemplateOptions extends TemplateOptions implements Cloneable { public EC2TemplateOptions clientToken(String clientToken) { this.clientToken = checkNotNull(clientToken, "clientToken"); return this; } @Override EC2TemplateOptions clone(); @Override void copyTo(TemplateOptions to); @Override boolean equals(Object o); @Override int hashCode(); @Override ToStringHelper string(); EC2TemplateOptions securityGroups(String... groupNames); EC2TemplateOptions securityGroups(Iterable<String> groupNames); EC2TemplateOptions userData(byte[] unencodedData); EC2TemplateOptions keyPair(String keyPair); EC2TemplateOptions noKeyPair(); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapEBSSnapshotToDeviceName(String deviceName, String snapshotId, @Nullable Integer sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination); EC2TemplateOptions mapNewVolumeToDeviceName(String deviceName, int sizeInGib, boolean deleteOnTermination, @Nullable String volumeType, @Nullable Integer iops, boolean encrypted); EC2TemplateOptions mapEphemeralDeviceToDeviceName(String deviceName, String virtualName); EC2TemplateOptions unmapDeviceNamed(String deviceName); EC2TemplateOptions blockDeviceMappings(Iterable<? extends BlockDeviceMapping> blockDeviceMappings); EC2TemplateOptions maxCount(Integer maxCount); EC2TemplateOptions clientToken(String clientToken); @Override EC2TemplateOptions blockOnPort(int port, int seconds); @Override EC2TemplateOptions inboundPorts(int... ports); @Override EC2TemplateOptions authorizePublicKey(String publicKey); @Override EC2TemplateOptions installPrivateKey(String privateKey); @Override EC2TemplateOptions blockUntilRunning(boolean blockUntilRunning); @Override EC2TemplateOptions dontAuthorizePublicKey(); @Override EC2TemplateOptions nameTask(String name); @Override EC2TemplateOptions runAsRoot(boolean runAsRoot); @Override EC2TemplateOptions runScript(Statement script); @Override EC2TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials); @Override EC2TemplateOptions overrideLoginPassword(String password); @Override EC2TemplateOptions overrideLoginPrivateKey(String privateKey); @Override EC2TemplateOptions overrideLoginUser(String loginUser); @Override EC2TemplateOptions overrideAuthenticateSudo(boolean authenticateSudo); @Override EC2TemplateOptions userMetadata(Map<String, String> userMetadata); @Override EC2TemplateOptions userMetadata(String key, String value); @Override EC2TemplateOptions nodeNames(Iterable<String> nodeNames); @Override EC2TemplateOptions networks(Iterable<String> networks); @Override EC2TemplateOptions runScript(String script); @Override EC2TemplateOptions tags(Iterable<String> tags); @Override EC2TemplateOptions wrapInInitScript(boolean wrapInInitScript); @Override EC2TemplateOptions blockOnComplete(boolean blockOnComplete); Set<String> getGroups(); String getKeyPair(); boolean shouldAutomaticallyCreateKeyPair(); byte[] getUserData(); Set<BlockDeviceMapping> getBlockDeviceMappings(); int getMaxCount(); String getClientToken(); static final EC2TemplateOptions NONE; }
@Test public void testCacheLoaderDoesNotReloadAfterAuthorizationException() throws Exception { EC2ComputeServiceContextModule module = new EC2ComputeServiceContextModule() { public Supplier<CacheLoader<RegionAndName, Image>> provideRegionAndNameToImageSupplierCacheLoader(RegionAndIdToImage delegate) { return super.provideRegionAndNameToImageSupplierCacheLoader(delegate); } }; RegionAndName regionAndName = new RegionAndName("myregion", "myname"); AuthorizationException authException = new AuthorizationException(); RegionAndIdToImage mockRegionAndIdToImage = createMock(RegionAndIdToImage.class); expect(mockRegionAndIdToImage.load(regionAndName)).andThrow(authException).once(); replay(mockRegionAndIdToImage); CacheLoader<RegionAndName, Image> cacheLoader = module.provideRegionAndNameToImageSupplierCacheLoader(mockRegionAndIdToImage).get(); for (int i = 0; i < 2; i++) { try { Image image = cacheLoader.load(regionAndName); fail("Expected Authorization exception, but got " + image); } catch (AuthorizationException e) { } } }
protected Supplier<CacheLoader<RegionAndName, Image>> provideRegionAndNameToImageSupplierCacheLoader( final RegionAndIdToImage delegate) { return Suppliers.<CacheLoader<RegionAndName, Image>>ofInstance(new CacheLoader<RegionAndName, Image>() { private final AtomicReference<AuthorizationException> authException = Atomics.newReference(); @Override public Image load(final RegionAndName key) throws Exception { Supplier<Image> rawSupplier = new Supplier<Image>() { @Override public Image get() { try { return delegate.load(key); } catch (ExecutionException e) { throw Throwables.propagate(e); } } }; return new SetAndThrowAuthorizationExceptionSupplier<Image>(rawSupplier, authException).get(); } }); }
EC2ComputeServiceContextModule extends BaseComputeServiceContextModule { protected Supplier<CacheLoader<RegionAndName, Image>> provideRegionAndNameToImageSupplierCacheLoader( final RegionAndIdToImage delegate) { return Suppliers.<CacheLoader<RegionAndName, Image>>ofInstance(new CacheLoader<RegionAndName, Image>() { private final AtomicReference<AuthorizationException> authException = Atomics.newReference(); @Override public Image load(final RegionAndName key) throws Exception { Supplier<Image> rawSupplier = new Supplier<Image>() { @Override public Image get() { try { return delegate.load(key); } catch (ExecutionException e) { throw Throwables.propagate(e); } } }; return new SetAndThrowAuthorizationExceptionSupplier<Image>(rawSupplier, authException).get(); } }); } }
EC2ComputeServiceContextModule extends BaseComputeServiceContextModule { protected Supplier<CacheLoader<RegionAndName, Image>> provideRegionAndNameToImageSupplierCacheLoader( final RegionAndIdToImage delegate) { return Suppliers.<CacheLoader<RegionAndName, Image>>ofInstance(new CacheLoader<RegionAndName, Image>() { private final AtomicReference<AuthorizationException> authException = Atomics.newReference(); @Override public Image load(final RegionAndName key) throws Exception { Supplier<Image> rawSupplier = new Supplier<Image>() { @Override public Image get() { try { return delegate.load(key); } catch (ExecutionException e) { throw Throwables.propagate(e); } } }; return new SetAndThrowAuthorizationExceptionSupplier<Image>(rawSupplier, authException).get(); } }); } }
EC2ComputeServiceContextModule extends BaseComputeServiceContextModule { protected Supplier<CacheLoader<RegionAndName, Image>> provideRegionAndNameToImageSupplierCacheLoader( final RegionAndIdToImage delegate) { return Suppliers.<CacheLoader<RegionAndName, Image>>ofInstance(new CacheLoader<RegionAndName, Image>() { private final AtomicReference<AuthorizationException> authException = Atomics.newReference(); @Override public Image load(final RegionAndName key) throws Exception { Supplier<Image> rawSupplier = new Supplier<Image>() { @Override public Image get() { try { return delegate.load(key); } catch (ExecutionException e) { throw Throwables.propagate(e); } } }; return new SetAndThrowAuthorizationExceptionSupplier<Image>(rawSupplier, authException).get(); } }); } }
EC2ComputeServiceContextModule extends BaseComputeServiceContextModule { protected Supplier<CacheLoader<RegionAndName, Image>> provideRegionAndNameToImageSupplierCacheLoader( final RegionAndIdToImage delegate) { return Suppliers.<CacheLoader<RegionAndName, Image>>ofInstance(new CacheLoader<RegionAndName, Image>() { private final AtomicReference<AuthorizationException> authException = Atomics.newReference(); @Override public Image load(final RegionAndName key) throws Exception { Supplier<Image> rawSupplier = new Supplier<Image>() { @Override public Image get() { try { return delegate.load(key); } catch (ExecutionException e) { throw Throwables.propagate(e); } } }; return new SetAndThrowAuthorizationExceptionSupplier<Image>(rawSupplier, authException).get(); } }); } }
@Test public void testApply() { IpPermissions authorization = IpPermissions.permitAnyProtocol(); org.jclouds.ec2.domain.SecurityGroup origGroup = org.jclouds.ec2.domain.SecurityGroup.builder() .region("us-east-1") .id("some-id") .name("some-group") .ownerId("some-owner") .description("some-description") .ipPermission(authorization) .build(); EC2SecurityGroupToSecurityGroup parser = createGroupParser(ImmutableSet.of(provider)); SecurityGroup group = parser.apply(origGroup); assertEquals(group.getLocation(), provider); assertEquals(group.getId(), provider.getId() + "/" + origGroup.getName()); assertEquals(group.getProviderId(), origGroup.getId()); assertEquals(group.getName(), origGroup.getName()); assertEquals(group.getIpPermissions(), (Set<IpPermission>)origGroup); assertEquals(group.getOwnerId(), origGroup.getOwnerId()); }
@Override public SecurityGroup apply(org.jclouds.ec2.domain.SecurityGroup group) { SecurityGroupBuilder builder = new SecurityGroupBuilder(); Location location = findLocationWithId(group.getRegion()); builder.location(location); builder.id(group.getRegion() + "/" + idOrName(group)); builder.providerId(group.getId()); builder.name(group.getName()); builder.ipPermissions(group); builder.ownerId(group.getOwnerId()); return builder.build(); }
EC2SecurityGroupToSecurityGroup implements Function<org.jclouds.ec2.domain.SecurityGroup, SecurityGroup> { @Override public SecurityGroup apply(org.jclouds.ec2.domain.SecurityGroup group) { SecurityGroupBuilder builder = new SecurityGroupBuilder(); Location location = findLocationWithId(group.getRegion()); builder.location(location); builder.id(group.getRegion() + "/" + idOrName(group)); builder.providerId(group.getId()); builder.name(group.getName()); builder.ipPermissions(group); builder.ownerId(group.getOwnerId()); return builder.build(); } }
EC2SecurityGroupToSecurityGroup implements Function<org.jclouds.ec2.domain.SecurityGroup, SecurityGroup> { @Override public SecurityGroup apply(org.jclouds.ec2.domain.SecurityGroup group) { SecurityGroupBuilder builder = new SecurityGroupBuilder(); Location location = findLocationWithId(group.getRegion()); builder.location(location); builder.id(group.getRegion() + "/" + idOrName(group)); builder.providerId(group.getId()); builder.name(group.getName()); builder.ipPermissions(group); builder.ownerId(group.getOwnerId()); return builder.build(); } @Inject EC2SecurityGroupToSecurityGroup(@Memoized Supplier<Set<? extends Location>> locations); }
EC2SecurityGroupToSecurityGroup implements Function<org.jclouds.ec2.domain.SecurityGroup, SecurityGroup> { @Override public SecurityGroup apply(org.jclouds.ec2.domain.SecurityGroup group) { SecurityGroupBuilder builder = new SecurityGroupBuilder(); Location location = findLocationWithId(group.getRegion()); builder.location(location); builder.id(group.getRegion() + "/" + idOrName(group)); builder.providerId(group.getId()); builder.name(group.getName()); builder.ipPermissions(group); builder.ownerId(group.getOwnerId()); return builder.build(); } @Inject EC2SecurityGroupToSecurityGroup(@Memoized Supplier<Set<? extends Location>> locations); @Override SecurityGroup apply(org.jclouds.ec2.domain.SecurityGroup group); }
EC2SecurityGroupToSecurityGroup implements Function<org.jclouds.ec2.domain.SecurityGroup, SecurityGroup> { @Override public SecurityGroup apply(org.jclouds.ec2.domain.SecurityGroup group) { SecurityGroupBuilder builder = new SecurityGroupBuilder(); Location location = findLocationWithId(group.getRegion()); builder.location(location); builder.id(group.getRegion() + "/" + idOrName(group)); builder.providerId(group.getId()); builder.name(group.getName()); builder.ipPermissions(group); builder.ownerId(group.getOwnerId()); return builder.build(); } @Inject EC2SecurityGroupToSecurityGroup(@Memoized Supplier<Set<? extends Location>> locations); @Override SecurityGroup apply(org.jclouds.ec2.domain.SecurityGroup group); }
@Test public void testApply() throws UnknownHostException { final EC2Api client = createMock(EC2Api.class); KeyPairApi keyClient = createMock(KeyPairApi.class); KeyPair pair = createMock(KeyPair.class); expect(client.getKeyPairApi()).andReturn((Optional) Optional.of(keyClient)).atLeastOnce(); expect(keyClient.createKeyPairInRegion("region", "jclouds#group#1")).andReturn(pair); replay(client); replay(keyClient); CreateUniqueKeyPair parser = Guice.createInjector(new AbstractModule() { @Override protected void configure() { Names.bindProperties(binder(), new EC2ApiMetadata().getDefaultProperties()); bind(new TypeLiteral<Supplier<String>>() { }).toInstance(Suppliers.ofInstance("1")); bind(EC2Api.class).toInstance(client); } }).getInstance(CreateUniqueKeyPair.class); assertEquals(parser.createNewKeyPairInRegion("region", "group"), pair); verify(client); verify(keyClient); }
@Override public KeyPair apply(RegionAndName from) { return createNewKeyPairInRegion(from.getRegion(), from.getName()); }
CreateUniqueKeyPair implements Function<RegionAndName, KeyPair> { @Override public KeyPair apply(RegionAndName from) { return createNewKeyPairInRegion(from.getRegion(), from.getName()); } }
CreateUniqueKeyPair implements Function<RegionAndName, KeyPair> { @Override public KeyPair apply(RegionAndName from) { return createNewKeyPairInRegion(from.getRegion(), from.getName()); } @Inject CreateUniqueKeyPair(EC2Api ec2Api, GroupNamingConvention.Factory namingConvention); }
CreateUniqueKeyPair implements Function<RegionAndName, KeyPair> { @Override public KeyPair apply(RegionAndName from) { return createNewKeyPairInRegion(from.getRegion(), from.getName()); } @Inject CreateUniqueKeyPair(EC2Api ec2Api, GroupNamingConvention.Factory namingConvention); @Override KeyPair apply(RegionAndName from); }
CreateUniqueKeyPair implements Function<RegionAndName, KeyPair> { @Override public KeyPair apply(RegionAndName from) { return createNewKeyPairInRegion(from.getRegion(), from.getName()); } @Inject CreateUniqueKeyPair(EC2Api ec2Api, GroupNamingConvention.Factory namingConvention); @Override KeyPair apply(RegionAndName from); }
@SuppressWarnings( { "unchecked" }) @Test public void testApplyWithIllegalStateException() throws UnknownHostException { final EC2Api client = createMock(EC2Api.class); KeyPairApi keyClient = createMock(KeyPairApi.class); final Supplier<String> uniqueIdSupplier = createMock(Supplier.class); KeyPair pair = createMock(KeyPair.class); expect(client.getKeyPairApi()).andReturn((Optional) Optional.of(keyClient)).atLeastOnce(); expect(uniqueIdSupplier.get()).andReturn("1"); expect(keyClient.createKeyPairInRegion("region", "jclouds#group#1")).andThrow(new IllegalStateException()); expect(uniqueIdSupplier.get()).andReturn("2"); expect(keyClient.createKeyPairInRegion("region", "jclouds#group#2")).andReturn(pair); replay(client); replay(keyClient); replay(uniqueIdSupplier); CreateUniqueKeyPair parser = Guice.createInjector(new AbstractModule() { @Override protected void configure() { Names.bindProperties(binder(), new EC2ApiMetadata().getDefaultProperties()); bind(new TypeLiteral<Supplier<String>>() { }).toInstance(uniqueIdSupplier); bind(EC2Api.class).toInstance(client); } }).getInstance(CreateUniqueKeyPair.class); assertEquals(parser.createNewKeyPairInRegion("region", "group"), pair); verify(client); verify(keyClient); verify(uniqueIdSupplier); }
@VisibleForTesting KeyPair createNewKeyPairInRegion(String region, String group) { checkNotNull(region, "region"); checkNotNull(group, "group"); logger.debug(">> creating keyPair region(%s) group(%s)", region, group); KeyPair keyPair = null; String prefix = group; while (keyPair == null) { String keyName = namingConvention.create().uniqueNameForGroup(prefix); try { keyPair = ec2Api.getKeyPairApi().get().createKeyPairInRegion(region, keyName); } catch (IllegalStateException e) { logger.trace(" invalid keyname (%s in %s); retrying", keyName, region); } } logger.debug("<< created keyPair(%s)", keyPair); return keyPair; }
CreateUniqueKeyPair implements Function<RegionAndName, KeyPair> { @VisibleForTesting KeyPair createNewKeyPairInRegion(String region, String group) { checkNotNull(region, "region"); checkNotNull(group, "group"); logger.debug(">> creating keyPair region(%s) group(%s)", region, group); KeyPair keyPair = null; String prefix = group; while (keyPair == null) { String keyName = namingConvention.create().uniqueNameForGroup(prefix); try { keyPair = ec2Api.getKeyPairApi().get().createKeyPairInRegion(region, keyName); } catch (IllegalStateException e) { logger.trace(" invalid keyname (%s in %s); retrying", keyName, region); } } logger.debug("<< created keyPair(%s)", keyPair); return keyPair; } }
CreateUniqueKeyPair implements Function<RegionAndName, KeyPair> { @VisibleForTesting KeyPair createNewKeyPairInRegion(String region, String group) { checkNotNull(region, "region"); checkNotNull(group, "group"); logger.debug(">> creating keyPair region(%s) group(%s)", region, group); KeyPair keyPair = null; String prefix = group; while (keyPair == null) { String keyName = namingConvention.create().uniqueNameForGroup(prefix); try { keyPair = ec2Api.getKeyPairApi().get().createKeyPairInRegion(region, keyName); } catch (IllegalStateException e) { logger.trace(" invalid keyname (%s in %s); retrying", keyName, region); } } logger.debug("<< created keyPair(%s)", keyPair); return keyPair; } @Inject CreateUniqueKeyPair(EC2Api ec2Api, GroupNamingConvention.Factory namingConvention); }
CreateUniqueKeyPair implements Function<RegionAndName, KeyPair> { @VisibleForTesting KeyPair createNewKeyPairInRegion(String region, String group) { checkNotNull(region, "region"); checkNotNull(group, "group"); logger.debug(">> creating keyPair region(%s) group(%s)", region, group); KeyPair keyPair = null; String prefix = group; while (keyPair == null) { String keyName = namingConvention.create().uniqueNameForGroup(prefix); try { keyPair = ec2Api.getKeyPairApi().get().createKeyPairInRegion(region, keyName); } catch (IllegalStateException e) { logger.trace(" invalid keyname (%s in %s); retrying", keyName, region); } } logger.debug("<< created keyPair(%s)", keyPair); return keyPair; } @Inject CreateUniqueKeyPair(EC2Api ec2Api, GroupNamingConvention.Factory namingConvention); @Override KeyPair apply(RegionAndName from); }
CreateUniqueKeyPair implements Function<RegionAndName, KeyPair> { @VisibleForTesting KeyPair createNewKeyPairInRegion(String region, String group) { checkNotNull(region, "region"); checkNotNull(group, "group"); logger.debug(">> creating keyPair region(%s) group(%s)", region, group); KeyPair keyPair = null; String prefix = group; while (keyPair == null) { String keyName = namingConvention.create().uniqueNameForGroup(prefix); try { keyPair = ec2Api.getKeyPairApi().get().createKeyPairInRegion(region, keyName); } catch (IllegalStateException e) { logger.trace(" invalid keyname (%s in %s); retrying", keyName, region); } } logger.debug("<< created keyPair(%s)", keyPair); return keyPair; } @Inject CreateUniqueKeyPair(EC2Api ec2Api, GroupNamingConvention.Factory namingConvention); @Override KeyPair apply(RegionAndName from); }
@SuppressWarnings("unchecked") @Test public void testWhenInstancesPresentSingleCall() { EC2Api client = createMock(EC2Api.class); InstanceApi instanceClient = createMock(InstanceApi.class); expect(client.getInstanceApi()).andReturn((Optional) Optional.of(instanceClient)); expect(instanceClient.describeInstancesInRegion("us-east-1", "i-aaaa", "i-bbbb")).andReturn( Set.class.cast(ImmutableSet.of(Reservation.builder().region("us-east-1") .instances(ImmutableSet.of(instance1, instance2)).build()))); replay(client, instanceClient); PresentInstances fn = new PresentInstances(client); assertEquals(fn.apply(ImmutableSet.of(new RegionAndName("us-east-1", "i-aaaa"), new RegionAndName("us-east-1", "i-bbbb"))), ImmutableSet.of(instance1, instance2)); verify(client, instanceClient); }
@Override public Set<RunningInstance> apply(Set<RegionAndName> regionAndIds) { if (checkNotNull(regionAndIds, "regionAndIds").isEmpty()) return ImmutableSet.of(); Builder<RunningInstance> builder = ImmutableSet.<RunningInstance> builder(); Multimap<String, String> regionToInstanceIds = transformValues(index(regionAndIds, regionFunction()), nameFunction()); for (Map.Entry<String, Collection<String>> entry : regionToInstanceIds.asMap().entrySet()) { String region = entry.getKey(); Collection<String> instanceIds = entry.getValue(); logger.trace("looking for instances %s in region %s", instanceIds, region); builder.addAll(concat(client.getInstanceApi().get().describeInstancesInRegion(region, toArray(instanceIds, String.class)))); } return builder.build(); }
PresentInstances implements Function<Set<RegionAndName>, Set<RunningInstance>> { @Override public Set<RunningInstance> apply(Set<RegionAndName> regionAndIds) { if (checkNotNull(regionAndIds, "regionAndIds").isEmpty()) return ImmutableSet.of(); Builder<RunningInstance> builder = ImmutableSet.<RunningInstance> builder(); Multimap<String, String> regionToInstanceIds = transformValues(index(regionAndIds, regionFunction()), nameFunction()); for (Map.Entry<String, Collection<String>> entry : regionToInstanceIds.asMap().entrySet()) { String region = entry.getKey(); Collection<String> instanceIds = entry.getValue(); logger.trace("looking for instances %s in region %s", instanceIds, region); builder.addAll(concat(client.getInstanceApi().get().describeInstancesInRegion(region, toArray(instanceIds, String.class)))); } return builder.build(); } }
PresentInstances implements Function<Set<RegionAndName>, Set<RunningInstance>> { @Override public Set<RunningInstance> apply(Set<RegionAndName> regionAndIds) { if (checkNotNull(regionAndIds, "regionAndIds").isEmpty()) return ImmutableSet.of(); Builder<RunningInstance> builder = ImmutableSet.<RunningInstance> builder(); Multimap<String, String> regionToInstanceIds = transformValues(index(regionAndIds, regionFunction()), nameFunction()); for (Map.Entry<String, Collection<String>> entry : regionToInstanceIds.asMap().entrySet()) { String region = entry.getKey(); Collection<String> instanceIds = entry.getValue(); logger.trace("looking for instances %s in region %s", instanceIds, region); builder.addAll(concat(client.getInstanceApi().get().describeInstancesInRegion(region, toArray(instanceIds, String.class)))); } return builder.build(); } @Inject PresentInstances(EC2Api client); }
PresentInstances implements Function<Set<RegionAndName>, Set<RunningInstance>> { @Override public Set<RunningInstance> apply(Set<RegionAndName> regionAndIds) { if (checkNotNull(regionAndIds, "regionAndIds").isEmpty()) return ImmutableSet.of(); Builder<RunningInstance> builder = ImmutableSet.<RunningInstance> builder(); Multimap<String, String> regionToInstanceIds = transformValues(index(regionAndIds, regionFunction()), nameFunction()); for (Map.Entry<String, Collection<String>> entry : regionToInstanceIds.asMap().entrySet()) { String region = entry.getKey(); Collection<String> instanceIds = entry.getValue(); logger.trace("looking for instances %s in region %s", instanceIds, region); builder.addAll(concat(client.getInstanceApi().get().describeInstancesInRegion(region, toArray(instanceIds, String.class)))); } return builder.build(); } @Inject PresentInstances(EC2Api client); @Override Set<RunningInstance> apply(Set<RegionAndName> regionAndIds); @Override String toString(); }
PresentInstances implements Function<Set<RegionAndName>, Set<RunningInstance>> { @Override public Set<RunningInstance> apply(Set<RegionAndName> regionAndIds) { if (checkNotNull(regionAndIds, "regionAndIds").isEmpty()) return ImmutableSet.of(); Builder<RunningInstance> builder = ImmutableSet.<RunningInstance> builder(); Multimap<String, String> regionToInstanceIds = transformValues(index(regionAndIds, regionFunction()), nameFunction()); for (Map.Entry<String, Collection<String>> entry : regionToInstanceIds.asMap().entrySet()) { String region = entry.getKey(); Collection<String> instanceIds = entry.getValue(); logger.trace("looking for instances %s in region %s", instanceIds, region); builder.addAll(concat(client.getInstanceApi().get().describeInstancesInRegion(region, toArray(instanceIds, String.class)))); } return builder.build(); } @Inject PresentInstances(EC2Api client); @Override Set<RunningInstance> apply(Set<RegionAndName> regionAndIds); @Override String toString(); }
@Test public void testApply() throws Exception { WindowsLoginCredentialsFromEncryptedData f = new WindowsLoginCredentialsFromEncryptedData(new JCECrypto()); PasswordData passwordData = PasswordData.builder() .instanceId("i-2574e22a") .timestamp(dateService.iso8601DateParse("2012-07-30T07:27:23.000+0000")) .passwordData(ENCRYPTED_PASSWORD).build(); LoginCredentials credentials = f.apply(new PasswordDataAndPrivateKey(passwordData, PRIVATE_KEY)); assertEquals(credentials.getUser(), "Administrator"); assertEquals(credentials.getOptionalPassword().get(), "u4.y9mb;nR."); assertFalse(credentials.getOptionalPrivateKey().isPresent()); }
@Override public LoginCredentials apply(@Nullable PasswordDataAndPrivateKey dataAndKey) { if (dataAndKey == null) return null; try { KeySpec keySpec = Pems.privateKeySpec(dataAndKey.getPrivateKey()); KeyFactory kf = crypto.rsaKeyFactory(); PrivateKey privKey = kf.generatePrivate(keySpec); Cipher cipher = crypto.cipher("RSA"); cipher.init(Cipher.DECRYPT_MODE, privKey); byte[] cipherText = base64().decode(dataAndKey.getPasswordData().getPasswordData()); byte[] plainText = cipher.doFinal(cipherText); String password = new String(plainText, Charsets.US_ASCII); return LoginCredentials.builder() .user("Administrator") .password(password) .noPrivateKey() .build(); } catch (Exception e) { throw Throwables.propagate(e); } }
WindowsLoginCredentialsFromEncryptedData implements Function<PasswordDataAndPrivateKey, LoginCredentials> { @Override public LoginCredentials apply(@Nullable PasswordDataAndPrivateKey dataAndKey) { if (dataAndKey == null) return null; try { KeySpec keySpec = Pems.privateKeySpec(dataAndKey.getPrivateKey()); KeyFactory kf = crypto.rsaKeyFactory(); PrivateKey privKey = kf.generatePrivate(keySpec); Cipher cipher = crypto.cipher("RSA"); cipher.init(Cipher.DECRYPT_MODE, privKey); byte[] cipherText = base64().decode(dataAndKey.getPasswordData().getPasswordData()); byte[] plainText = cipher.doFinal(cipherText); String password = new String(plainText, Charsets.US_ASCII); return LoginCredentials.builder() .user("Administrator") .password(password) .noPrivateKey() .build(); } catch (Exception e) { throw Throwables.propagate(e); } } }
WindowsLoginCredentialsFromEncryptedData implements Function<PasswordDataAndPrivateKey, LoginCredentials> { @Override public LoginCredentials apply(@Nullable PasswordDataAndPrivateKey dataAndKey) { if (dataAndKey == null) return null; try { KeySpec keySpec = Pems.privateKeySpec(dataAndKey.getPrivateKey()); KeyFactory kf = crypto.rsaKeyFactory(); PrivateKey privKey = kf.generatePrivate(keySpec); Cipher cipher = crypto.cipher("RSA"); cipher.init(Cipher.DECRYPT_MODE, privKey); byte[] cipherText = base64().decode(dataAndKey.getPasswordData().getPasswordData()); byte[] plainText = cipher.doFinal(cipherText); String password = new String(plainText, Charsets.US_ASCII); return LoginCredentials.builder() .user("Administrator") .password(password) .noPrivateKey() .build(); } catch (Exception e) { throw Throwables.propagate(e); } } @Inject WindowsLoginCredentialsFromEncryptedData(Crypto crypto); }
WindowsLoginCredentialsFromEncryptedData implements Function<PasswordDataAndPrivateKey, LoginCredentials> { @Override public LoginCredentials apply(@Nullable PasswordDataAndPrivateKey dataAndKey) { if (dataAndKey == null) return null; try { KeySpec keySpec = Pems.privateKeySpec(dataAndKey.getPrivateKey()); KeyFactory kf = crypto.rsaKeyFactory(); PrivateKey privKey = kf.generatePrivate(keySpec); Cipher cipher = crypto.cipher("RSA"); cipher.init(Cipher.DECRYPT_MODE, privKey); byte[] cipherText = base64().decode(dataAndKey.getPasswordData().getPasswordData()); byte[] plainText = cipher.doFinal(cipherText); String password = new String(plainText, Charsets.US_ASCII); return LoginCredentials.builder() .user("Administrator") .password(password) .noPrivateKey() .build(); } catch (Exception e) { throw Throwables.propagate(e); } } @Inject WindowsLoginCredentialsFromEncryptedData(Crypto crypto); @Override LoginCredentials apply(@Nullable PasswordDataAndPrivateKey dataAndKey); }
WindowsLoginCredentialsFromEncryptedData implements Function<PasswordDataAndPrivateKey, LoginCredentials> { @Override public LoginCredentials apply(@Nullable PasswordDataAndPrivateKey dataAndKey) { if (dataAndKey == null) return null; try { KeySpec keySpec = Pems.privateKeySpec(dataAndKey.getPrivateKey()); KeyFactory kf = crypto.rsaKeyFactory(); PrivateKey privKey = kf.generatePrivate(keySpec); Cipher cipher = crypto.cipher("RSA"); cipher.init(Cipher.DECRYPT_MODE, privKey); byte[] cipherText = base64().decode(dataAndKey.getPasswordData().getPasswordData()); byte[] plainText = cipher.doFinal(cipherText); String password = new String(plainText, Charsets.US_ASCII); return LoginCredentials.builder() .user("Administrator") .password(password) .noPrivateKey() .build(); } catch (Exception e) { throw Throwables.propagate(e); } } @Inject WindowsLoginCredentialsFromEncryptedData(Crypto crypto); @Override LoginCredentials apply(@Nullable PasswordDataAndPrivateKey dataAndKey); }
@SuppressWarnings("unchecked") @Test public void testApply() throws ExecutionException { EC2ImageParser parser = createMock(EC2ImageParser.class); EC2Api caller = createMock(EC2Api.class); AMIApi client = createMock(AMIApi.class); org.jclouds.ec2.domain.Image ec2Image = createMock(org.jclouds.ec2.domain.Image.class); Image image = createNiceMock(Image.class); Set<? extends org.jclouds.ec2.domain.Image> images = ImmutableSet.<org.jclouds.ec2.domain.Image> of(ec2Image); expect(caller.getAMIApi()).andReturn((Optional) Optional.of(client)).atLeastOnce(); expect(client.describeImagesInRegion("region", imageIds("ami"))).andReturn(Set.class.cast(images)); expect(parser.apply(ec2Image)).andReturn(image); replay(caller); replay(image); replay(parser); replay(client); RegionAndIdToImage function = new RegionAndIdToImage(parser, caller); assertEquals(function.load(new RegionAndName("region", "ami")), image); verify(caller); verify(image); verify(image); verify(client); }
@Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } }
RegionAndIdToImage extends CacheLoader<RegionAndName, Image> { @Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } } }
RegionAndIdToImage extends CacheLoader<RegionAndName, Image> { @Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } } @Inject RegionAndIdToImage(EC2ImageParser parser, EC2Api sync); }
RegionAndIdToImage extends CacheLoader<RegionAndName, Image> { @Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } } @Inject RegionAndIdToImage(EC2ImageParser parser, EC2Api sync); @Override Image load(RegionAndName key); static String message(RegionAndName key, Exception e); }
RegionAndIdToImage extends CacheLoader<RegionAndName, Image> { @Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } } @Inject RegionAndIdToImage(EC2ImageParser parser, EC2Api sync); @Override Image load(RegionAndName key); static String message(RegionAndName key, Exception e); }
@SuppressWarnings("unchecked") @Test(expectedExceptions = ExecutionException.class) public void testApplyNotFoundMakesExecutionException() throws ExecutionException { EC2ImageParser parser = createMock(EC2ImageParser.class); EC2Api caller = createMock(EC2Api.class); AMIApi client = createMock(AMIApi.class); org.jclouds.ec2.domain.Image ec2Image = createMock(org.jclouds.ec2.domain.Image.class); Image image = createNiceMock(Image.class); Set<? extends org.jclouds.ec2.domain.Image> images = ImmutableSet.<org.jclouds.ec2.domain.Image> of(ec2Image); expect(caller.getAMIApi()).andReturn((Optional) Optional.of(client)).atLeastOnce(); expect(client.describeImagesInRegion("region", imageIds("ami"))).andReturn(Set.class.cast(images)); expect(parser.apply(ec2Image)).andThrow(new ResourceNotFoundException()); replay(caller); replay(image); replay(parser); replay(client); RegionAndIdToImage function = new RegionAndIdToImage(parser, caller); assertEquals(function.load(new RegionAndName("region", "ami")), null); verify(caller); verify(image); verify(parser); verify(client); }
@Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } }
RegionAndIdToImage extends CacheLoader<RegionAndName, Image> { @Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } } }
RegionAndIdToImage extends CacheLoader<RegionAndName, Image> { @Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } } @Inject RegionAndIdToImage(EC2ImageParser parser, EC2Api sync); }
RegionAndIdToImage extends CacheLoader<RegionAndName, Image> { @Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } } @Inject RegionAndIdToImage(EC2ImageParser parser, EC2Api sync); @Override Image load(RegionAndName key); static String message(RegionAndName key, Exception e); }
RegionAndIdToImage extends CacheLoader<RegionAndName, Image> { @Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } } @Inject RegionAndIdToImage(EC2ImageParser parser, EC2Api sync); @Override Image load(RegionAndName key); static String message(RegionAndName key, Exception e); }
@SuppressWarnings("unchecked") @Test(expectedExceptions = ExecutionException.class) public void testApplyNoSuchElementExceptionMakesExecutionException() throws ExecutionException { EC2ImageParser parser = createMock(EC2ImageParser.class); EC2Api caller = createMock(EC2Api.class); AMIApi client = createMock(AMIApi.class); org.jclouds.ec2.domain.Image ec2Image = createMock(org.jclouds.ec2.domain.Image.class); Image image = createNiceMock(Image.class); Set<? extends org.jclouds.ec2.domain.Image> images = ImmutableSet.<org.jclouds.ec2.domain.Image> of(ec2Image); expect(caller.getAMIApi()).andReturn((Optional) Optional.of(client)).atLeastOnce(); expect(client.describeImagesInRegion("region", imageIds("ami"))).andReturn(Set.class.cast(images)); expect(parser.apply(ec2Image)).andThrow(new NoSuchElementException()); replay(caller); replay(image); replay(parser); replay(client); RegionAndIdToImage function = new RegionAndIdToImage(parser, caller); assertEquals(function.load(new RegionAndName("region", "ami")), null); verify(caller); verify(image); verify(parser); verify(client); }
@Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } }
RegionAndIdToImage extends CacheLoader<RegionAndName, Image> { @Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } } }
RegionAndIdToImage extends CacheLoader<RegionAndName, Image> { @Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } } @Inject RegionAndIdToImage(EC2ImageParser parser, EC2Api sync); }
RegionAndIdToImage extends CacheLoader<RegionAndName, Image> { @Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } } @Inject RegionAndIdToImage(EC2ImageParser parser, EC2Api sync); @Override Image load(RegionAndName key); static String message(RegionAndName key, Exception e); }
RegionAndIdToImage extends CacheLoader<RegionAndName, Image> { @Override public Image load(RegionAndName key) throws ExecutionException { try { org.jclouds.ec2.domain.Image image = Iterables.getOnlyElement(sync.getAMIApi().get() .describeImagesInRegion(key.getRegion(), imageIds(key.getName()))); return parser.apply(image); } catch (Exception e) { throw new ExecutionException(message(key, e), e); } } @Inject RegionAndIdToImage(EC2ImageParser parser, EC2Api sync); @Override Image load(RegionAndName key); static String message(RegionAndName key, Exception e); }
@Test public void testReturnsPublicIpOnMatch() throws Exception { EC2Api client = createMock(EC2Api.class); ElasticIPAddressApi ipClient = createMock(ElasticIPAddressApi.class); expect(client.getElasticIPAddressApi()).andReturn((Optional) Optional.of(ipClient)).atLeastOnce(); expect(ipClient.describeAddressesInRegion("region")).andReturn( ImmutableSet.<PublicIpInstanceIdPair> of(new PublicIpInstanceIdPair("region", "1.1.1.1", "i-blah", null))) .atLeastOnce(); replay(client); replay(ipClient); LoadPublicIpForInstanceOrNull parser = new LoadPublicIpForInstanceOrNull(client); assertEquals(parser.load(new RegionAndName("region", "i-blah")), "1.1.1.1"); verify(client); verify(ipClient); }
@Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } }
LoadPublicIpForInstanceOrNull extends CacheLoader<RegionAndName, String> { @Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } } }
LoadPublicIpForInstanceOrNull extends CacheLoader<RegionAndName, String> { @Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } } @Inject LoadPublicIpForInstanceOrNull(EC2Api client); }
LoadPublicIpForInstanceOrNull extends CacheLoader<RegionAndName, String> { @Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } } @Inject LoadPublicIpForInstanceOrNull(EC2Api client); @Override String load(final RegionAndName key); }
LoadPublicIpForInstanceOrNull extends CacheLoader<RegionAndName, String> { @Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } } @Inject LoadPublicIpForInstanceOrNull(EC2Api client); @Override String load(final RegionAndName key); }
@Test public void testReturnsNullWhenNotFound() throws Exception { EC2Api client = createMock(EC2Api.class); ElasticIPAddressApi ipClient = createMock(ElasticIPAddressApi.class); expect(client.getElasticIPAddressApi()).andReturn((Optional) Optional.of(ipClient)).atLeastOnce(); expect(ipClient.describeAddressesInRegion("region")).andReturn(ImmutableSet.<PublicIpInstanceIdPair> of()) .atLeastOnce(); replay(client); replay(ipClient); LoadPublicIpForInstanceOrNull parser = new LoadPublicIpForInstanceOrNull(client); assertEquals(parser.load(new RegionAndName("region", "i-blah")), null); verify(client); verify(ipClient); }
@Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } }
LoadPublicIpForInstanceOrNull extends CacheLoader<RegionAndName, String> { @Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } } }
LoadPublicIpForInstanceOrNull extends CacheLoader<RegionAndName, String> { @Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } } @Inject LoadPublicIpForInstanceOrNull(EC2Api client); }
LoadPublicIpForInstanceOrNull extends CacheLoader<RegionAndName, String> { @Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } } @Inject LoadPublicIpForInstanceOrNull(EC2Api client); @Override String load(final RegionAndName key); }
LoadPublicIpForInstanceOrNull extends CacheLoader<RegionAndName, String> { @Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } } @Inject LoadPublicIpForInstanceOrNull(EC2Api client); @Override String load(final RegionAndName key); }
@Test public void testReturnsNullWhenNotAssigned() throws Exception { EC2Api client = createMock(EC2Api.class); ElasticIPAddressApi ipClient = createMock(ElasticIPAddressApi.class); expect(client.getElasticIPAddressApi()).andReturn((Optional) Optional.of(ipClient)).atLeastOnce(); expect(ipClient.describeAddressesInRegion("region")).andReturn( ImmutableSet.<PublicIpInstanceIdPair> of(new PublicIpInstanceIdPair("region", "1.1.1.1", null, null))) .atLeastOnce(); replay(client); replay(ipClient); LoadPublicIpForInstanceOrNull parser = new LoadPublicIpForInstanceOrNull(client); assertEquals(parser.load(new RegionAndName("region", "i-blah")), null); verify(client); verify(ipClient); }
@Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } }
LoadPublicIpForInstanceOrNull extends CacheLoader<RegionAndName, String> { @Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } } }
LoadPublicIpForInstanceOrNull extends CacheLoader<RegionAndName, String> { @Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } } @Inject LoadPublicIpForInstanceOrNull(EC2Api client); }
LoadPublicIpForInstanceOrNull extends CacheLoader<RegionAndName, String> { @Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } } @Inject LoadPublicIpForInstanceOrNull(EC2Api client); @Override String load(final RegionAndName key); }
LoadPublicIpForInstanceOrNull extends CacheLoader<RegionAndName, String> { @Override public String load(final RegionAndName key) throws Exception { try { return Iterables.find(client.getElasticIPAddressApi().get().describeAddressesInRegion(key.getRegion()), new Predicate<PublicIpInstanceIdPair>() { @Override public boolean apply(PublicIpInstanceIdPair input) { return key.getName().equals(input.getInstanceId()); } }).getPublicIp(); } catch (NoSuchElementException e) { return null; } } @Inject LoadPublicIpForInstanceOrNull(EC2Api client); @Override String load(final RegionAndName key); }
@Test(expectedExceptions = AuthorizationException.class) public void testAuthorizationExceptionIsThrownOnBadKeys() { PrivateKeySupplier supplier = new PrivateKeySupplier( Suppliers.ofInstance(new Credentials("MOMMA", "FileNotFoundCredential")), new PrivateKeyForCredentials()); supplier.get(); }
@Override public PrivateKey get() { try { return keyCache.getUnchecked(checkNotNull(creds.get(), "credential supplier returned null")); } catch (UncheckedExecutionException e) { AuthorizationException authorizationException = getFirstThrowableOfType(e, AuthorizationException.class); if (authorizationException != null) { throw authorizationException; } throw e; } }
PrivateKeySupplier implements Supplier<PrivateKey> { @Override public PrivateKey get() { try { return keyCache.getUnchecked(checkNotNull(creds.get(), "credential supplier returned null")); } catch (UncheckedExecutionException e) { AuthorizationException authorizationException = getFirstThrowableOfType(e, AuthorizationException.class); if (authorizationException != null) { throw authorizationException; } throw e; } } }
PrivateKeySupplier implements Supplier<PrivateKey> { @Override public PrivateKey get() { try { return keyCache.getUnchecked(checkNotNull(creds.get(), "credential supplier returned null")); } catch (UncheckedExecutionException e) { AuthorizationException authorizationException = getFirstThrowableOfType(e, AuthorizationException.class); if (authorizationException != null) { throw authorizationException; } throw e; } } @Inject PrivateKeySupplier(@Provider Supplier<Credentials> creds, PrivateKeyForCredentials loader); }
PrivateKeySupplier implements Supplier<PrivateKey> { @Override public PrivateKey get() { try { return keyCache.getUnchecked(checkNotNull(creds.get(), "credential supplier returned null")); } catch (UncheckedExecutionException e) { AuthorizationException authorizationException = getFirstThrowableOfType(e, AuthorizationException.class); if (authorizationException != null) { throw authorizationException; } throw e; } } @Inject PrivateKeySupplier(@Provider Supplier<Credentials> creds, PrivateKeyForCredentials loader); @Override PrivateKey get(); }
PrivateKeySupplier implements Supplier<PrivateKey> { @Override public PrivateKey get() { try { return keyCache.getUnchecked(checkNotNull(creds.get(), "credential supplier returned null")); } catch (UncheckedExecutionException e) { AuthorizationException authorizationException = getFirstThrowableOfType(e, AuthorizationException.class); if (authorizationException != null) { throw authorizationException; } throw e; } } @Inject PrivateKeySupplier(@Provider Supplier<Credentials> creds, PrivateKeyForCredentials loader); @Override PrivateKey get(); }
@Test public void testGet500WithoutError() { AtmosUtils utils = createMock(AtmosUtils.class); BackoffLimitedRetryHandler backoffLimitedRetryHandler = createMock(BackoffLimitedRetryHandler.class); HttpCommand command = createMock(HttpCommand.class); expect(command.getFailureCount()).andReturn(0).once(); expect(command.incrementFailureCount()).andReturn(1).once(); replay(utils, backoffLimitedRetryHandler, command); AtmosServerErrorRetryHandler retry = new AtmosServerErrorRetryHandler(backoffLimitedRetryHandler, utils); assertFalse(retry.shouldRetryRequest(command, HttpResponse.builder().statusCode(500).build())); verify(utils, backoffLimitedRetryHandler, command); }
public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { if (command.getFailureCount() > retryCountLimit) { return false; } if (response.getStatusCode() == 500) { byte[] content = HttpUtils.closeClientButKeepContentStream(response); if (content != null) { try { AtmosError error = utils.parseAtmosErrorFromContent(command, response, new String(content)); if (error.getCode() == AtmosErrorCode.SERVER_BUSY.getCode()) { return backoffHandler.shouldRetryRequest(command, response); } command.incrementFailureCount(); } catch (HttpException e) { logger.warn(e, "error parsing response: %s", new String(content)); } } else { command.incrementFailureCount(); } return false; } return false; }
AtmosServerErrorRetryHandler implements HttpRetryHandler { public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { if (command.getFailureCount() > retryCountLimit) { return false; } if (response.getStatusCode() == 500) { byte[] content = HttpUtils.closeClientButKeepContentStream(response); if (content != null) { try { AtmosError error = utils.parseAtmosErrorFromContent(command, response, new String(content)); if (error.getCode() == AtmosErrorCode.SERVER_BUSY.getCode()) { return backoffHandler.shouldRetryRequest(command, response); } command.incrementFailureCount(); } catch (HttpException e) { logger.warn(e, "error parsing response: %s", new String(content)); } } else { command.incrementFailureCount(); } return false; } return false; } }
AtmosServerErrorRetryHandler implements HttpRetryHandler { public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { if (command.getFailureCount() > retryCountLimit) { return false; } if (response.getStatusCode() == 500) { byte[] content = HttpUtils.closeClientButKeepContentStream(response); if (content != null) { try { AtmosError error = utils.parseAtmosErrorFromContent(command, response, new String(content)); if (error.getCode() == AtmosErrorCode.SERVER_BUSY.getCode()) { return backoffHandler.shouldRetryRequest(command, response); } command.incrementFailureCount(); } catch (HttpException e) { logger.warn(e, "error parsing response: %s", new String(content)); } } else { command.incrementFailureCount(); } return false; } return false; } @Inject AtmosServerErrorRetryHandler(BackoffLimitedRetryHandler backoffHandler, AtmosUtils utils); }
AtmosServerErrorRetryHandler implements HttpRetryHandler { public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { if (command.getFailureCount() > retryCountLimit) { return false; } if (response.getStatusCode() == 500) { byte[] content = HttpUtils.closeClientButKeepContentStream(response); if (content != null) { try { AtmosError error = utils.parseAtmosErrorFromContent(command, response, new String(content)); if (error.getCode() == AtmosErrorCode.SERVER_BUSY.getCode()) { return backoffHandler.shouldRetryRequest(command, response); } command.incrementFailureCount(); } catch (HttpException e) { logger.warn(e, "error parsing response: %s", new String(content)); } } else { command.incrementFailureCount(); } return false; } return false; } @Inject AtmosServerErrorRetryHandler(BackoffLimitedRetryHandler backoffHandler, AtmosUtils utils); boolean shouldRetryRequest(HttpCommand command, HttpResponse response); }
AtmosServerErrorRetryHandler implements HttpRetryHandler { public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { if (command.getFailureCount() > retryCountLimit) { return false; } if (response.getStatusCode() == 500) { byte[] content = HttpUtils.closeClientButKeepContentStream(response); if (content != null) { try { AtmosError error = utils.parseAtmosErrorFromContent(command, response, new String(content)); if (error.getCode() == AtmosErrorCode.SERVER_BUSY.getCode()) { return backoffHandler.shouldRetryRequest(command, response); } command.incrementFailureCount(); } catch (HttpException e) { logger.warn(e, "error parsing response: %s", new String(content)); } } else { command.incrementFailureCount(); } return false; } return false; } @Inject AtmosServerErrorRetryHandler(BackoffLimitedRetryHandler backoffHandler, AtmosUtils utils); boolean shouldRetryRequest(HttpCommand command, HttpResponse response); }
@Test public void testGet500WithError1040() { AtmosUtils utils = createMock(AtmosUtils.class); BackoffLimitedRetryHandler backoffLimitedRetryHandler = createMock(BackoffLimitedRetryHandler.class); HttpCommand command = createMock(HttpCommand.class); String content = String.format(HTTP_MESSAGE_FORMAT, 1040, "The server is busy. Please try again"); HttpResponse response = HttpResponse.builder().statusCode(500).payload(content).build(); expect(command.getFailureCount()).andReturn(0).once(); expect(utils.parseAtmosErrorFromContent(command, response, content)).andReturn(new AtmosError(1040, "The server is busy. Please try again")).once(); expect(backoffLimitedRetryHandler.shouldRetryRequest(command, response)).andReturn(true).once(); replay(utils, backoffLimitedRetryHandler, command); AtmosServerErrorRetryHandler retry = new AtmosServerErrorRetryHandler(backoffLimitedRetryHandler, utils); assertTrue(retry.shouldRetryRequest(command, response)); verify(utils, backoffLimitedRetryHandler, command); }
public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { if (command.getFailureCount() > retryCountLimit) { return false; } if (response.getStatusCode() == 500) { byte[] content = HttpUtils.closeClientButKeepContentStream(response); if (content != null) { try { AtmosError error = utils.parseAtmosErrorFromContent(command, response, new String(content)); if (error.getCode() == AtmosErrorCode.SERVER_BUSY.getCode()) { return backoffHandler.shouldRetryRequest(command, response); } command.incrementFailureCount(); } catch (HttpException e) { logger.warn(e, "error parsing response: %s", new String(content)); } } else { command.incrementFailureCount(); } return false; } return false; }
AtmosServerErrorRetryHandler implements HttpRetryHandler { public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { if (command.getFailureCount() > retryCountLimit) { return false; } if (response.getStatusCode() == 500) { byte[] content = HttpUtils.closeClientButKeepContentStream(response); if (content != null) { try { AtmosError error = utils.parseAtmosErrorFromContent(command, response, new String(content)); if (error.getCode() == AtmosErrorCode.SERVER_BUSY.getCode()) { return backoffHandler.shouldRetryRequest(command, response); } command.incrementFailureCount(); } catch (HttpException e) { logger.warn(e, "error parsing response: %s", new String(content)); } } else { command.incrementFailureCount(); } return false; } return false; } }
AtmosServerErrorRetryHandler implements HttpRetryHandler { public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { if (command.getFailureCount() > retryCountLimit) { return false; } if (response.getStatusCode() == 500) { byte[] content = HttpUtils.closeClientButKeepContentStream(response); if (content != null) { try { AtmosError error = utils.parseAtmosErrorFromContent(command, response, new String(content)); if (error.getCode() == AtmosErrorCode.SERVER_BUSY.getCode()) { return backoffHandler.shouldRetryRequest(command, response); } command.incrementFailureCount(); } catch (HttpException e) { logger.warn(e, "error parsing response: %s", new String(content)); } } else { command.incrementFailureCount(); } return false; } return false; } @Inject AtmosServerErrorRetryHandler(BackoffLimitedRetryHandler backoffHandler, AtmosUtils utils); }
AtmosServerErrorRetryHandler implements HttpRetryHandler { public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { if (command.getFailureCount() > retryCountLimit) { return false; } if (response.getStatusCode() == 500) { byte[] content = HttpUtils.closeClientButKeepContentStream(response); if (content != null) { try { AtmosError error = utils.parseAtmosErrorFromContent(command, response, new String(content)); if (error.getCode() == AtmosErrorCode.SERVER_BUSY.getCode()) { return backoffHandler.shouldRetryRequest(command, response); } command.incrementFailureCount(); } catch (HttpException e) { logger.warn(e, "error parsing response: %s", new String(content)); } } else { command.incrementFailureCount(); } return false; } return false; } @Inject AtmosServerErrorRetryHandler(BackoffLimitedRetryHandler backoffHandler, AtmosUtils utils); boolean shouldRetryRequest(HttpCommand command, HttpResponse response); }
AtmosServerErrorRetryHandler implements HttpRetryHandler { public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { if (command.getFailureCount() > retryCountLimit) { return false; } if (response.getStatusCode() == 500) { byte[] content = HttpUtils.closeClientButKeepContentStream(response); if (content != null) { try { AtmosError error = utils.parseAtmosErrorFromContent(command, response, new String(content)); if (error.getCode() == AtmosErrorCode.SERVER_BUSY.getCode()) { return backoffHandler.shouldRetryRequest(command, response); } command.incrementFailureCount(); } catch (HttpException e) { logger.warn(e, "error parsing response: %s", new String(content)); } } else { command.incrementFailureCount(); } return false; } return false; } @Inject AtmosServerErrorRetryHandler(BackoffLimitedRetryHandler backoffHandler, AtmosUtils utils); boolean shouldRetryRequest(HttpCommand command, HttpResponse response); }
@Test(expectedExceptions = IllegalArgumentException.class) public void testMustBeAtmosObject() { HttpRequest request = HttpRequest.builder().method("POST").endpoint("http: binder.bindToRequest(request, new File("foo")); }
@Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } @Inject protected BindMetadataToHeaders(BindUserMetadataToHeaders metaBinder); }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } @Inject protected BindMetadataToHeaders(BindUserMetadataToHeaders metaBinder); @Override R bindToRequest(R request, Object input); }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } @Inject protected BindMetadataToHeaders(BindUserMetadataToHeaders metaBinder); @Override R bindToRequest(R request, Object input); }
@Test(expectedExceptions = NullPointerException.class) public void testNullIsBad() { HttpRequest request = HttpRequest.builder().method("GET").endpoint("http: binder.bindToRequest(request, null); }
@Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } @Inject protected BindMetadataToHeaders(BindUserMetadataToHeaders metaBinder); }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } @Inject protected BindMetadataToHeaders(BindUserMetadataToHeaders metaBinder); @Override R bindToRequest(R request, Object input); }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } @Inject protected BindMetadataToHeaders(BindUserMetadataToHeaders metaBinder); @Override R bindToRequest(R request, Object input); }
@Test(expectedExceptions = NullPointerException.class) public void testNullPayloadIsBad() { AtmosObject object = injector.getInstance(AtmosObject.Factory.class).create(null); HttpRequest request = HttpRequest.builder().method("GET").endpoint("http: binder.bindToRequest(request, object); }
@Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } @Inject protected BindMetadataToHeaders(BindUserMetadataToHeaders metaBinder); }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } @Inject protected BindMetadataToHeaders(BindUserMetadataToHeaders metaBinder); @Override R bindToRequest(R request, Object input); }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } @Inject protected BindMetadataToHeaders(BindUserMetadataToHeaders metaBinder); @Override R bindToRequest(R request, Object input); }
@Test(expectedExceptions = IllegalArgumentException.class) public void testNullContentLengthIllegal() { AtmosObject object = injector.getInstance(AtmosObject.Factory.class).create(null); Payload payload = Payloads.newStringPayload(""); payload.getContentMetadata().setContentLength(null); object.setPayload(payload); HttpRequest request = HttpRequest.builder().method("GET").endpoint("http: binder.bindToRequest(request, object); }
@Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } @Inject protected BindMetadataToHeaders(BindUserMetadataToHeaders metaBinder); }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } @Inject protected BindMetadataToHeaders(BindUserMetadataToHeaders metaBinder); @Override R bindToRequest(R request, Object input); }
BindMetadataToHeaders implements Binder { @Override public <R extends HttpRequest> R bindToRequest(R request, Object input) { checkArgument(checkNotNull(input, "input") instanceof AtmosObject, "this binder is only valid for AtmosObject!"); checkNotNull(request, "request"); AtmosObject object = AtmosObject.class.cast(input); checkNotNull(object.getPayload(), "object payload"); checkArgument(object.getPayload().getContentMetadata().getContentLength() != null, "contentLength must be set, streaming not supported"); byte[] contentMD5 = object.getContentMetadata().getContentMD5(); if (contentMD5 != null) { request = (R) request.toBuilder() .addHeader(AtmosHeaders.CHECKSUM, "MD5/0/" + BaseEncoding.base16().encode(contentMD5)) .build(); } return metaBinder.bindToRequest(request, object.getUserMetadata()); } @Inject protected BindMetadataToHeaders(BindUserMetadataToHeaders metaBinder); @Override R bindToRequest(R request, Object input); }
@Test public void testFoundIsNullWhenEndpointNotSet() throws Exception { assertNull(new EndpointIfAlreadyExists().createOrPropagate(new KeyAlreadyExistsException())); }
@Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); }
EndpointIfAlreadyExists implements Fallback<URI>, InvocationContext<EndpointIfAlreadyExists> { @Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); } }
EndpointIfAlreadyExists implements Fallback<URI>, InvocationContext<EndpointIfAlreadyExists> { @Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); } }
EndpointIfAlreadyExists implements Fallback<URI>, InvocationContext<EndpointIfAlreadyExists> { @Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); } @Override URI createOrPropagate(Throwable t); @Override EndpointIfAlreadyExists setContext(HttpRequest request); }
EndpointIfAlreadyExists implements Fallback<URI>, InvocationContext<EndpointIfAlreadyExists> { @Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); } @Override URI createOrPropagate(Throwable t); @Override EndpointIfAlreadyExists setContext(HttpRequest request); }
@Test(expectedExceptions = RuntimeException.class) public void testNotFoundPropagates() throws Exception { new EndpointIfAlreadyExists().createOrPropagate(new RuntimeException()); }
@Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); }
EndpointIfAlreadyExists implements Fallback<URI>, InvocationContext<EndpointIfAlreadyExists> { @Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); } }
EndpointIfAlreadyExists implements Fallback<URI>, InvocationContext<EndpointIfAlreadyExists> { @Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); } }
EndpointIfAlreadyExists implements Fallback<URI>, InvocationContext<EndpointIfAlreadyExists> { @Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); } @Override URI createOrPropagate(Throwable t); @Override EndpointIfAlreadyExists setContext(HttpRequest request); }
EndpointIfAlreadyExists implements Fallback<URI>, InvocationContext<EndpointIfAlreadyExists> { @Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); } @Override URI createOrPropagate(Throwable t); @Override EndpointIfAlreadyExists setContext(HttpRequest request); }
@Test(expectedExceptions = NullPointerException.class) public void testNullIsBad() throws Exception { new EndpointIfAlreadyExists().createOrPropagate(null); }
@Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); }
EndpointIfAlreadyExists implements Fallback<URI>, InvocationContext<EndpointIfAlreadyExists> { @Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); } }
EndpointIfAlreadyExists implements Fallback<URI>, InvocationContext<EndpointIfAlreadyExists> { @Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); } }
EndpointIfAlreadyExists implements Fallback<URI>, InvocationContext<EndpointIfAlreadyExists> { @Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); } @Override URI createOrPropagate(Throwable t); @Override EndpointIfAlreadyExists setContext(HttpRequest request); }
EndpointIfAlreadyExists implements Fallback<URI>, InvocationContext<EndpointIfAlreadyExists> { @Override public URI createOrPropagate(Throwable t) throws Exception { if (checkNotNull(t, "throwable") instanceof KeyAlreadyExistsException) { return endpoint; } throw propagate(t); } @Override URI createOrPropagate(Throwable t); @Override EndpointIfAlreadyExists setContext(HttpRequest request); }
@Test void testCreateStringToSign() throws IOException { String expects = Strings2.toStringAndClose(getClass().getResourceAsStream("/hashstring.txt")); HttpRequest request = newRequest(preconstructedHeaders().build()); String toSign = filter.createStringToSign(request); assertEquals(toSign, expects); }
public String createStringToSign(HttpRequest request) { utils.logRequest(signatureLog, request, ">>"); StringBuilder buffer = new StringBuilder(); appendMethod(request, buffer); appendPayloadMetadata(request, buffer); appendHttpHeaders(request, buffer); appendCanonicalizedResource(request, buffer); appendCanonicalizedHeaders(request, buffer); if (signatureWire.enabled()) signatureWire.output(buffer.toString()); return buffer.toString(); }
SignRequest implements HttpRequestFilter { public String createStringToSign(HttpRequest request) { utils.logRequest(signatureLog, request, ">>"); StringBuilder buffer = new StringBuilder(); appendMethod(request, buffer); appendPayloadMetadata(request, buffer); appendHttpHeaders(request, buffer); appendCanonicalizedResource(request, buffer); appendCanonicalizedHeaders(request, buffer); if (signatureWire.enabled()) signatureWire.output(buffer.toString()); return buffer.toString(); } }
SignRequest implements HttpRequestFilter { public String createStringToSign(HttpRequest request) { utils.logRequest(signatureLog, request, ">>"); StringBuilder buffer = new StringBuilder(); appendMethod(request, buffer); appendPayloadMetadata(request, buffer); appendHttpHeaders(request, buffer); appendCanonicalizedResource(request, buffer); appendCanonicalizedHeaders(request, buffer); if (signatureWire.enabled()) signatureWire.output(buffer.toString()); return buffer.toString(); } @Inject SignRequest(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, @TimeStamp Provider<String> timeStampProvider, Crypto crypto, HttpUtils utils); }
SignRequest implements HttpRequestFilter { public String createStringToSign(HttpRequest request) { utils.logRequest(signatureLog, request, ">>"); StringBuilder buffer = new StringBuilder(); appendMethod(request, buffer); appendPayloadMetadata(request, buffer); appendHttpHeaders(request, buffer); appendCanonicalizedResource(request, buffer); appendCanonicalizedHeaders(request, buffer); if (signatureWire.enabled()) signatureWire.output(buffer.toString()); return buffer.toString(); } @Inject SignRequest(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, @TimeStamp Provider<String> timeStampProvider, Crypto crypto, HttpUtils utils); @Override HttpRequest filter(HttpRequest request); String createStringToSign(HttpRequest request); String calculateSignature(String toSign); String signString(String toSign); }
SignRequest implements HttpRequestFilter { public String createStringToSign(HttpRequest request) { utils.logRequest(signatureLog, request, ">>"); StringBuilder buffer = new StringBuilder(); appendMethod(request, buffer); appendPayloadMetadata(request, buffer); appendHttpHeaders(request, buffer); appendCanonicalizedResource(request, buffer); appendCanonicalizedHeaders(request, buffer); if (signatureWire.enabled()) signatureWire.output(buffer.toString()); return buffer.toString(); } @Inject SignRequest(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, @TimeStamp Provider<String> timeStampProvider, Crypto crypto, HttpUtils utils); @Override HttpRequest filter(HttpRequest request); String createStringToSign(HttpRequest request); String calculateSignature(String toSign); String signString(String toSign); }
@Test void testSignString() throws IOException, NoSuchAlgorithmException, InvalidKeyException { HttpRequest request = newRequest(preconstructedHeaders().build()); String toSign = filter.createStringToSign(request); String signature = filter.signString(toSign); assertEquals(signature, EXPECTED_SIGNATURE); }
public String signString(String toSign) { try { ByteProcessor<byte[]> hmacSHA1 = asByteProcessor(crypto.hmacSHA1(base64().decode(creds.get().credential))); return base64().encode(readBytes(toInputStream(toSign), hmacSHA1)); } catch (Exception e) { throw new HttpException("error signing request", e); } }
SignRequest implements HttpRequestFilter { public String signString(String toSign) { try { ByteProcessor<byte[]> hmacSHA1 = asByteProcessor(crypto.hmacSHA1(base64().decode(creds.get().credential))); return base64().encode(readBytes(toInputStream(toSign), hmacSHA1)); } catch (Exception e) { throw new HttpException("error signing request", e); } } }
SignRequest implements HttpRequestFilter { public String signString(String toSign) { try { ByteProcessor<byte[]> hmacSHA1 = asByteProcessor(crypto.hmacSHA1(base64().decode(creds.get().credential))); return base64().encode(readBytes(toInputStream(toSign), hmacSHA1)); } catch (Exception e) { throw new HttpException("error signing request", e); } } @Inject SignRequest(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, @TimeStamp Provider<String> timeStampProvider, Crypto crypto, HttpUtils utils); }
SignRequest implements HttpRequestFilter { public String signString(String toSign) { try { ByteProcessor<byte[]> hmacSHA1 = asByteProcessor(crypto.hmacSHA1(base64().decode(creds.get().credential))); return base64().encode(readBytes(toInputStream(toSign), hmacSHA1)); } catch (Exception e) { throw new HttpException("error signing request", e); } } @Inject SignRequest(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, @TimeStamp Provider<String> timeStampProvider, Crypto crypto, HttpUtils utils); @Override HttpRequest filter(HttpRequest request); String createStringToSign(HttpRequest request); String calculateSignature(String toSign); String signString(String toSign); }
SignRequest implements HttpRequestFilter { public String signString(String toSign) { try { ByteProcessor<byte[]> hmacSHA1 = asByteProcessor(crypto.hmacSHA1(base64().decode(creds.get().credential))); return base64().encode(readBytes(toInputStream(toSign), hmacSHA1)); } catch (Exception e) { throw new HttpException("error signing request", e); } } @Inject SignRequest(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, @TimeStamp Provider<String> timeStampProvider, Crypto crypto, HttpUtils utils); @Override HttpRequest filter(HttpRequest request); String createStringToSign(HttpRequest request); String calculateSignature(String toSign); String signString(String toSign); }
@Test void testFilter() throws IOException, NoSuchAlgorithmException, InvalidKeyException { HttpRequest request = newRequest(inputHeaders().build()); request = filter.filter(request); assertEquals(request.getFirstHeaderOrNull(AtmosHeaders.SIGNATURE), EXPECTED_SIGNATURE); }
@Override public HttpRequest filter(HttpRequest request) throws HttpException { Builder<String, String> builder = ImmutableMap.builder(); builder.put(AtmosHeaders.UID, creds.get().identity); String date = timeStampProvider.get(); builder.put(HttpHeaders.DATE, date); if (request.getHeaders().containsKey(AtmosHeaders.DATE)) builder.put(AtmosHeaders.DATE, date); request = request.toBuilder().replaceHeaders(Multimaps.forMap(builder.build())).build(); String signature = calculateSignature(createStringToSign(request)); request = request.toBuilder().replaceHeader(AtmosHeaders.SIGNATURE, signature).build(); utils.logRequest(signatureLog, request, "<<"); return request; }
SignRequest implements HttpRequestFilter { @Override public HttpRequest filter(HttpRequest request) throws HttpException { Builder<String, String> builder = ImmutableMap.builder(); builder.put(AtmosHeaders.UID, creds.get().identity); String date = timeStampProvider.get(); builder.put(HttpHeaders.DATE, date); if (request.getHeaders().containsKey(AtmosHeaders.DATE)) builder.put(AtmosHeaders.DATE, date); request = request.toBuilder().replaceHeaders(Multimaps.forMap(builder.build())).build(); String signature = calculateSignature(createStringToSign(request)); request = request.toBuilder().replaceHeader(AtmosHeaders.SIGNATURE, signature).build(); utils.logRequest(signatureLog, request, "<<"); return request; } }
SignRequest implements HttpRequestFilter { @Override public HttpRequest filter(HttpRequest request) throws HttpException { Builder<String, String> builder = ImmutableMap.builder(); builder.put(AtmosHeaders.UID, creds.get().identity); String date = timeStampProvider.get(); builder.put(HttpHeaders.DATE, date); if (request.getHeaders().containsKey(AtmosHeaders.DATE)) builder.put(AtmosHeaders.DATE, date); request = request.toBuilder().replaceHeaders(Multimaps.forMap(builder.build())).build(); String signature = calculateSignature(createStringToSign(request)); request = request.toBuilder().replaceHeader(AtmosHeaders.SIGNATURE, signature).build(); utils.logRequest(signatureLog, request, "<<"); return request; } @Inject SignRequest(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, @TimeStamp Provider<String> timeStampProvider, Crypto crypto, HttpUtils utils); }
SignRequest implements HttpRequestFilter { @Override public HttpRequest filter(HttpRequest request) throws HttpException { Builder<String, String> builder = ImmutableMap.builder(); builder.put(AtmosHeaders.UID, creds.get().identity); String date = timeStampProvider.get(); builder.put(HttpHeaders.DATE, date); if (request.getHeaders().containsKey(AtmosHeaders.DATE)) builder.put(AtmosHeaders.DATE, date); request = request.toBuilder().replaceHeaders(Multimaps.forMap(builder.build())).build(); String signature = calculateSignature(createStringToSign(request)); request = request.toBuilder().replaceHeader(AtmosHeaders.SIGNATURE, signature).build(); utils.logRequest(signatureLog, request, "<<"); return request; } @Inject SignRequest(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, @TimeStamp Provider<String> timeStampProvider, Crypto crypto, HttpUtils utils); @Override HttpRequest filter(HttpRequest request); String createStringToSign(HttpRequest request); String calculateSignature(String toSign); String signString(String toSign); }
SignRequest implements HttpRequestFilter { @Override public HttpRequest filter(HttpRequest request) throws HttpException { Builder<String, String> builder = ImmutableMap.builder(); builder.put(AtmosHeaders.UID, creds.get().identity); String date = timeStampProvider.get(); builder.put(HttpHeaders.DATE, date); if (request.getHeaders().containsKey(AtmosHeaders.DATE)) builder.put(AtmosHeaders.DATE, date); request = request.toBuilder().replaceHeaders(Multimaps.forMap(builder.build())).build(); String signature = calculateSignature(createStringToSign(request)); request = request.toBuilder().replaceHeader(AtmosHeaders.SIGNATURE, signature).build(); utils.logRequest(signatureLog, request, "<<"); return request; } @Inject SignRequest(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, @TimeStamp Provider<String> timeStampProvider, Crypto crypto, HttpUtils utils); @Override HttpRequest filter(HttpRequest request); String createStringToSign(HttpRequest request); String calculateSignature(String toSign); String signString(String toSign); }
@Test void testFilterReplacesOldValues() throws IOException, NoSuchAlgorithmException, InvalidKeyException { HttpRequest request = newRequest(inputHeaders().put(AtmosHeaders.SIGNATURE, "foo") .put(HttpHeaders.DATE, "foo").put(AtmosHeaders.DATE, "foo").put(AtmosHeaders.UID, "foo") .build()); request = filter.filter(request); assertEquals(request.getFirstHeaderOrNull(AtmosHeaders.SIGNATURE), EXPECTED_SIGNATURE); }
@Override public HttpRequest filter(HttpRequest request) throws HttpException { Builder<String, String> builder = ImmutableMap.builder(); builder.put(AtmosHeaders.UID, creds.get().identity); String date = timeStampProvider.get(); builder.put(HttpHeaders.DATE, date); if (request.getHeaders().containsKey(AtmosHeaders.DATE)) builder.put(AtmosHeaders.DATE, date); request = request.toBuilder().replaceHeaders(Multimaps.forMap(builder.build())).build(); String signature = calculateSignature(createStringToSign(request)); request = request.toBuilder().replaceHeader(AtmosHeaders.SIGNATURE, signature).build(); utils.logRequest(signatureLog, request, "<<"); return request; }
SignRequest implements HttpRequestFilter { @Override public HttpRequest filter(HttpRequest request) throws HttpException { Builder<String, String> builder = ImmutableMap.builder(); builder.put(AtmosHeaders.UID, creds.get().identity); String date = timeStampProvider.get(); builder.put(HttpHeaders.DATE, date); if (request.getHeaders().containsKey(AtmosHeaders.DATE)) builder.put(AtmosHeaders.DATE, date); request = request.toBuilder().replaceHeaders(Multimaps.forMap(builder.build())).build(); String signature = calculateSignature(createStringToSign(request)); request = request.toBuilder().replaceHeader(AtmosHeaders.SIGNATURE, signature).build(); utils.logRequest(signatureLog, request, "<<"); return request; } }
SignRequest implements HttpRequestFilter { @Override public HttpRequest filter(HttpRequest request) throws HttpException { Builder<String, String> builder = ImmutableMap.builder(); builder.put(AtmosHeaders.UID, creds.get().identity); String date = timeStampProvider.get(); builder.put(HttpHeaders.DATE, date); if (request.getHeaders().containsKey(AtmosHeaders.DATE)) builder.put(AtmosHeaders.DATE, date); request = request.toBuilder().replaceHeaders(Multimaps.forMap(builder.build())).build(); String signature = calculateSignature(createStringToSign(request)); request = request.toBuilder().replaceHeader(AtmosHeaders.SIGNATURE, signature).build(); utils.logRequest(signatureLog, request, "<<"); return request; } @Inject SignRequest(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, @TimeStamp Provider<String> timeStampProvider, Crypto crypto, HttpUtils utils); }
SignRequest implements HttpRequestFilter { @Override public HttpRequest filter(HttpRequest request) throws HttpException { Builder<String, String> builder = ImmutableMap.builder(); builder.put(AtmosHeaders.UID, creds.get().identity); String date = timeStampProvider.get(); builder.put(HttpHeaders.DATE, date); if (request.getHeaders().containsKey(AtmosHeaders.DATE)) builder.put(AtmosHeaders.DATE, date); request = request.toBuilder().replaceHeaders(Multimaps.forMap(builder.build())).build(); String signature = calculateSignature(createStringToSign(request)); request = request.toBuilder().replaceHeader(AtmosHeaders.SIGNATURE, signature).build(); utils.logRequest(signatureLog, request, "<<"); return request; } @Inject SignRequest(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, @TimeStamp Provider<String> timeStampProvider, Crypto crypto, HttpUtils utils); @Override HttpRequest filter(HttpRequest request); String createStringToSign(HttpRequest request); String calculateSignature(String toSign); String signString(String toSign); }
SignRequest implements HttpRequestFilter { @Override public HttpRequest filter(HttpRequest request) throws HttpException { Builder<String, String> builder = ImmutableMap.builder(); builder.put(AtmosHeaders.UID, creds.get().identity); String date = timeStampProvider.get(); builder.put(HttpHeaders.DATE, date); if (request.getHeaders().containsKey(AtmosHeaders.DATE)) builder.put(AtmosHeaders.DATE, date); request = request.toBuilder().replaceHeaders(Multimaps.forMap(builder.build())).build(); String signature = calculateSignature(createStringToSign(request)); request = request.toBuilder().replaceHeader(AtmosHeaders.SIGNATURE, signature).build(); utils.logRequest(signatureLog, request, "<<"); return request; } @Inject SignRequest(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, @TimeStamp Provider<String> timeStampProvider, Crypto crypto, HttpUtils utils); @Override HttpRequest filter(HttpRequest request); String createStringToSign(HttpRequest request); String calculateSignature(String toSign); String signString(String toSign); }
@Test(expectedExceptions = IllegalStateException.class, expectedExceptionsMessageRegExp = "imageDrive call failed") public void testDiskIsDestroyedIfImageFails() { Supplier<Map<String, WellKnownImage>> preInstalledImageSupplier = Suppliers.ofInstance(Maps .<String, WellKnownImage> newHashMap()); LoadingCache<String, DriveInfo> driveCache = CacheBuilder.newBuilder().build( new CacheLoader<String, DriveInfo>() { @Override public DriveInfo load(String key) throws Exception { throw new IllegalStateException("cache should not be used"); } }); ElasticStackApi api = EasyMock.createMock(ElasticStackApi.class); Predicate<DriveInfo> driveNotClaimed = Predicates.alwaysTrue(); DriveInfo mockDrive = new DriveInfo.Builder().uuid(UUID.randomUUID().toString()).name("mock") .metrics(new DriveMetrics.Builder().build()).build(); expect(api.createDrive(anyObject(DriveInfo.class))).andReturn(mockDrive); api.imageDrive(image.getId(), mockDrive.getUuid(), ImageConversionType.GUNZIP); expectLastCall().andThrow(new IllegalStateException("imageDrive call failed")); api.destroyDrive(mockDrive.getUuid()); expectLastCall(); replay(api); ElasticStackComputeServiceAdapter adapter = new ElasticStackComputeServiceAdapter(api, driveNotClaimed, preInstalledImageSupplier, driveCache, "12345678", MoreExecutors.newDirectExecutorService()); try { adapter.createNodeWithGroupEncodedIntoName("mock-group", "mock-name", template); } catch (IllegalStateException ex) { verify(api); throw ex; } }
@Override public NodeAndInitialCredentials<ServerInfo> createNodeWithGroupEncodedIntoName(String tag, String name, Template template) { long bootSize = (long) (template.getHardware().getVolumes().get(0).getSize() * 1024 * 1024 * 1024L); logger.debug(">> creating boot drive bytes(%d)", bootSize); DriveInfo drive = client .createDrive(new Drive.Builder().name(template.getImage().getId()).size(bootSize).build()); logger.debug("<< drive (%s)", drive); boolean success = driveNotClaimed.apply(drive); if (!success) { client.destroyDrive(drive.getUuid()); throw new IllegalStateException(String.format("could not create drive %s in time!", drive)); } logger.debug(">> imaging boot drive source(%s)", template.getImage().getId()); try { client.imageDrive(template.getImage().getId(), drive.getUuid(), ImageConversionType.GUNZIP); } catch (IllegalStateException ex) { logger.debug(">> could not image drive(%s). Cleaning up resources. [%s]", drive.getUuid(), ex.getMessage()); client.destroyDrive(drive.getUuid()); throw ex; } boolean ready = driveNotClaimed.apply(drive); if (!ready) { client.destroyDrive(drive.getUuid()); throw new IllegalStateException(String.format("could not image drive %s in time!", drive)); } logger.debug("<< imaged (%s)", drive); template.getOptions().userMetadata(ComputeServiceConstants.NODE_GROUP_KEY, tag); Server toCreate = small(name, drive.getUuid(), defaultVncPassword).mem(template.getHardware().getRam()) .cpu((int) (template.getHardware().getProcessors().get(0).getSpeed())) .tags(template.getOptions().getTags()).userMetadata(template.getOptions().getUserMetadata()).build(); ServerInfo from = client.createServer(toCreate); client.startServer(from.getUuid()); from = client.getServerInfo(from.getUuid()); return new NodeAndInitialCredentials<ServerInfo>(from, from.getUuid(), LoginCredentials.builder() .password(defaultVncPassword).build()); }
ElasticStackComputeServiceAdapter implements ComputeServiceAdapter<ServerInfo, Hardware, DriveInfo, Location> { @Override public NodeAndInitialCredentials<ServerInfo> createNodeWithGroupEncodedIntoName(String tag, String name, Template template) { long bootSize = (long) (template.getHardware().getVolumes().get(0).getSize() * 1024 * 1024 * 1024L); logger.debug(">> creating boot drive bytes(%d)", bootSize); DriveInfo drive = client .createDrive(new Drive.Builder().name(template.getImage().getId()).size(bootSize).build()); logger.debug("<< drive (%s)", drive); boolean success = driveNotClaimed.apply(drive); if (!success) { client.destroyDrive(drive.getUuid()); throw new IllegalStateException(String.format("could not create drive %s in time!", drive)); } logger.debug(">> imaging boot drive source(%s)", template.getImage().getId()); try { client.imageDrive(template.getImage().getId(), drive.getUuid(), ImageConversionType.GUNZIP); } catch (IllegalStateException ex) { logger.debug(">> could not image drive(%s). Cleaning up resources. [%s]", drive.getUuid(), ex.getMessage()); client.destroyDrive(drive.getUuid()); throw ex; } boolean ready = driveNotClaimed.apply(drive); if (!ready) { client.destroyDrive(drive.getUuid()); throw new IllegalStateException(String.format("could not image drive %s in time!", drive)); } logger.debug("<< imaged (%s)", drive); template.getOptions().userMetadata(ComputeServiceConstants.NODE_GROUP_KEY, tag); Server toCreate = small(name, drive.getUuid(), defaultVncPassword).mem(template.getHardware().getRam()) .cpu((int) (template.getHardware().getProcessors().get(0).getSpeed())) .tags(template.getOptions().getTags()).userMetadata(template.getOptions().getUserMetadata()).build(); ServerInfo from = client.createServer(toCreate); client.startServer(from.getUuid()); from = client.getServerInfo(from.getUuid()); return new NodeAndInitialCredentials<ServerInfo>(from, from.getUuid(), LoginCredentials.builder() .password(defaultVncPassword).build()); } }
ElasticStackComputeServiceAdapter implements ComputeServiceAdapter<ServerInfo, Hardware, DriveInfo, Location> { @Override public NodeAndInitialCredentials<ServerInfo> createNodeWithGroupEncodedIntoName(String tag, String name, Template template) { long bootSize = (long) (template.getHardware().getVolumes().get(0).getSize() * 1024 * 1024 * 1024L); logger.debug(">> creating boot drive bytes(%d)", bootSize); DriveInfo drive = client .createDrive(new Drive.Builder().name(template.getImage().getId()).size(bootSize).build()); logger.debug("<< drive (%s)", drive); boolean success = driveNotClaimed.apply(drive); if (!success) { client.destroyDrive(drive.getUuid()); throw new IllegalStateException(String.format("could not create drive %s in time!", drive)); } logger.debug(">> imaging boot drive source(%s)", template.getImage().getId()); try { client.imageDrive(template.getImage().getId(), drive.getUuid(), ImageConversionType.GUNZIP); } catch (IllegalStateException ex) { logger.debug(">> could not image drive(%s). Cleaning up resources. [%s]", drive.getUuid(), ex.getMessage()); client.destroyDrive(drive.getUuid()); throw ex; } boolean ready = driveNotClaimed.apply(drive); if (!ready) { client.destroyDrive(drive.getUuid()); throw new IllegalStateException(String.format("could not image drive %s in time!", drive)); } logger.debug("<< imaged (%s)", drive); template.getOptions().userMetadata(ComputeServiceConstants.NODE_GROUP_KEY, tag); Server toCreate = small(name, drive.getUuid(), defaultVncPassword).mem(template.getHardware().getRam()) .cpu((int) (template.getHardware().getProcessors().get(0).getSpeed())) .tags(template.getOptions().getTags()).userMetadata(template.getOptions().getUserMetadata()).build(); ServerInfo from = client.createServer(toCreate); client.startServer(from.getUuid()); from = client.getServerInfo(from.getUuid()); return new NodeAndInitialCredentials<ServerInfo>(from, from.getUuid(), LoginCredentials.builder() .password(defaultVncPassword).build()); } @Inject ElasticStackComputeServiceAdapter(ElasticStackApi client, Predicate<DriveInfo> driveNotClaimed, @Memoized Supplier<Map<String, WellKnownImage>> preinstalledImages, LoadingCache<String, DriveInfo> cache, @Named(ElasticStackConstants.PROPERTY_VNC_PASSWORD) String defaultVncPassword, @Named(Constants.PROPERTY_USER_THREADS) ListeningExecutorService userExecutor); }
ElasticStackComputeServiceAdapter implements ComputeServiceAdapter<ServerInfo, Hardware, DriveInfo, Location> { @Override public NodeAndInitialCredentials<ServerInfo> createNodeWithGroupEncodedIntoName(String tag, String name, Template template) { long bootSize = (long) (template.getHardware().getVolumes().get(0).getSize() * 1024 * 1024 * 1024L); logger.debug(">> creating boot drive bytes(%d)", bootSize); DriveInfo drive = client .createDrive(new Drive.Builder().name(template.getImage().getId()).size(bootSize).build()); logger.debug("<< drive (%s)", drive); boolean success = driveNotClaimed.apply(drive); if (!success) { client.destroyDrive(drive.getUuid()); throw new IllegalStateException(String.format("could not create drive %s in time!", drive)); } logger.debug(">> imaging boot drive source(%s)", template.getImage().getId()); try { client.imageDrive(template.getImage().getId(), drive.getUuid(), ImageConversionType.GUNZIP); } catch (IllegalStateException ex) { logger.debug(">> could not image drive(%s). Cleaning up resources. [%s]", drive.getUuid(), ex.getMessage()); client.destroyDrive(drive.getUuid()); throw ex; } boolean ready = driveNotClaimed.apply(drive); if (!ready) { client.destroyDrive(drive.getUuid()); throw new IllegalStateException(String.format("could not image drive %s in time!", drive)); } logger.debug("<< imaged (%s)", drive); template.getOptions().userMetadata(ComputeServiceConstants.NODE_GROUP_KEY, tag); Server toCreate = small(name, drive.getUuid(), defaultVncPassword).mem(template.getHardware().getRam()) .cpu((int) (template.getHardware().getProcessors().get(0).getSpeed())) .tags(template.getOptions().getTags()).userMetadata(template.getOptions().getUserMetadata()).build(); ServerInfo from = client.createServer(toCreate); client.startServer(from.getUuid()); from = client.getServerInfo(from.getUuid()); return new NodeAndInitialCredentials<ServerInfo>(from, from.getUuid(), LoginCredentials.builder() .password(defaultVncPassword).build()); } @Inject ElasticStackComputeServiceAdapter(ElasticStackApi client, Predicate<DriveInfo> driveNotClaimed, @Memoized Supplier<Map<String, WellKnownImage>> preinstalledImages, LoadingCache<String, DriveInfo> cache, @Named(ElasticStackConstants.PROPERTY_VNC_PASSWORD) String defaultVncPassword, @Named(Constants.PROPERTY_USER_THREADS) ListeningExecutorService userExecutor); @Override NodeAndInitialCredentials<ServerInfo> createNodeWithGroupEncodedIntoName(String tag, String name, Template template); @Override Iterable<Hardware> listHardwareProfiles(); @Override Iterable<DriveInfo> listImages(); @Override Iterable<ServerInfo> listNodes(); @Override Iterable<ServerInfo> listNodesByIds(final Iterable<String> ids); @Override Iterable<Location> listLocations(); @Override ServerInfo getNode(String id); @Override DriveInfo getImage(String id); @Override void destroyNode(String id); @Override void rebootNode(String id); @Override void resumeNode(String id); @Override void suspendNode(String id); }
ElasticStackComputeServiceAdapter implements ComputeServiceAdapter<ServerInfo, Hardware, DriveInfo, Location> { @Override public NodeAndInitialCredentials<ServerInfo> createNodeWithGroupEncodedIntoName(String tag, String name, Template template) { long bootSize = (long) (template.getHardware().getVolumes().get(0).getSize() * 1024 * 1024 * 1024L); logger.debug(">> creating boot drive bytes(%d)", bootSize); DriveInfo drive = client .createDrive(new Drive.Builder().name(template.getImage().getId()).size(bootSize).build()); logger.debug("<< drive (%s)", drive); boolean success = driveNotClaimed.apply(drive); if (!success) { client.destroyDrive(drive.getUuid()); throw new IllegalStateException(String.format("could not create drive %s in time!", drive)); } logger.debug(">> imaging boot drive source(%s)", template.getImage().getId()); try { client.imageDrive(template.getImage().getId(), drive.getUuid(), ImageConversionType.GUNZIP); } catch (IllegalStateException ex) { logger.debug(">> could not image drive(%s). Cleaning up resources. [%s]", drive.getUuid(), ex.getMessage()); client.destroyDrive(drive.getUuid()); throw ex; } boolean ready = driveNotClaimed.apply(drive); if (!ready) { client.destroyDrive(drive.getUuid()); throw new IllegalStateException(String.format("could not image drive %s in time!", drive)); } logger.debug("<< imaged (%s)", drive); template.getOptions().userMetadata(ComputeServiceConstants.NODE_GROUP_KEY, tag); Server toCreate = small(name, drive.getUuid(), defaultVncPassword).mem(template.getHardware().getRam()) .cpu((int) (template.getHardware().getProcessors().get(0).getSpeed())) .tags(template.getOptions().getTags()).userMetadata(template.getOptions().getUserMetadata()).build(); ServerInfo from = client.createServer(toCreate); client.startServer(from.getUuid()); from = client.getServerInfo(from.getUuid()); return new NodeAndInitialCredentials<ServerInfo>(from, from.getUuid(), LoginCredentials.builder() .password(defaultVncPassword).build()); } @Inject ElasticStackComputeServiceAdapter(ElasticStackApi client, Predicate<DriveInfo> driveNotClaimed, @Memoized Supplier<Map<String, WellKnownImage>> preinstalledImages, LoadingCache<String, DriveInfo> cache, @Named(ElasticStackConstants.PROPERTY_VNC_PASSWORD) String defaultVncPassword, @Named(Constants.PROPERTY_USER_THREADS) ListeningExecutorService userExecutor); @Override NodeAndInitialCredentials<ServerInfo> createNodeWithGroupEncodedIntoName(String tag, String name, Template template); @Override Iterable<Hardware> listHardwareProfiles(); @Override Iterable<DriveInfo> listImages(); @Override Iterable<ServerInfo> listNodes(); @Override Iterable<ServerInfo> listNodesByIds(final Iterable<String> ids); @Override Iterable<Location> listLocations(); @Override ServerInfo getNode(String id); @Override DriveInfo getImage(String id); @Override void destroyNode(String id); @Override void rebootNode(String id); @Override void resumeNode(String id); @Override void suspendNode(String id); }
@Test public void test401ShouldRetry() { HttpCommand command = createMock(HttpCommand.class); HttpRequest request = createMock(HttpRequest.class); HttpResponse response = createMock(HttpResponse.class); @SuppressWarnings("unchecked") LoadingCache<Credentials, AuthInfo> cache = createMock(LoadingCache.class); BackoffLimitedRetryHandler backoffHandler = createMock(BackoffLimitedRetryHandler.class); expect(command.getCurrentRequest()).andReturn(request); cache.invalidateAll(); expectLastCall(); expect(response.getPayload()).andReturn(Payloads.newStringPayload("")).anyTimes(); expect(response.getStatusCode()).andReturn(401).atLeastOnce(); replay(command); replay(response); replay(cache); replay(backoffHandler); RetryOnRenew retry = new RetryOnRenew(cache, backoffHandler); assertTrue(retry.shouldRetryRequest(command, response)); verify(command); verify(response); verify(cache); }
@Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; }
RetryOnRenew implements HttpRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; } }
RetryOnRenew implements HttpRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; } @Inject RetryOnRenew(LoadingCache<Credentials, AuthInfo> authenticationResponseCache, BackoffLimitedRetryHandler backoffHandler); }
RetryOnRenew implements HttpRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; } @Inject RetryOnRenew(LoadingCache<Credentials, AuthInfo> authenticationResponseCache, BackoffLimitedRetryHandler backoffHandler); @Override boolean shouldRetryRequest(HttpCommand command, HttpResponse response); }
RetryOnRenew implements HttpRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; } @Inject RetryOnRenew(LoadingCache<Credentials, AuthInfo> authenticationResponseCache, BackoffLimitedRetryHandler backoffHandler); @Override boolean shouldRetryRequest(HttpCommand command, HttpResponse response); }
@Test public void test401ShouldRetry4Times() { HttpCommand command = createMock(HttpCommand.class); HttpRequest request = createMock(HttpRequest.class); HttpResponse response = createMock(HttpResponse.class); @SuppressWarnings("unchecked") LoadingCache<Credentials, AuthInfo> cache = createMock(LoadingCache.class); BackoffLimitedRetryHandler backoffHandler = createMock(BackoffLimitedRetryHandler.class); expect(command.getCurrentRequest()).andReturn(request).anyTimes(); expect(request.getHeaders()).andStubReturn(null); cache.invalidateAll(); expectLastCall().anyTimes(); expect(response.getPayload()).andReturn(Payloads.newStringPayload("")).anyTimes(); expect(response.getStatusCode()).andReturn(401).anyTimes(); replay(command, request, response, cache); RetryOnRenew retry = new RetryOnRenew(cache, backoffHandler); for (int i = 0; i < RetryOnRenew.NUM_RETRIES - 1; ++i) { assertTrue(retry.shouldRetryRequest(command, response), "Expected retry to succeed"); } assertFalse(retry.shouldRetryRequest(command, response), "Expected retry to fail on attempt " + RetryOnRenew.NUM_RETRIES); verify(command, response, cache); }
@Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; }
RetryOnRenew implements HttpRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; } }
RetryOnRenew implements HttpRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; } @Inject RetryOnRenew(LoadingCache<Credentials, AuthInfo> authenticationResponseCache, BackoffLimitedRetryHandler backoffHandler); }
RetryOnRenew implements HttpRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; } @Inject RetryOnRenew(LoadingCache<Credentials, AuthInfo> authenticationResponseCache, BackoffLimitedRetryHandler backoffHandler); @Override boolean shouldRetryRequest(HttpCommand command, HttpResponse response); }
RetryOnRenew implements HttpRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; } @Inject RetryOnRenew(LoadingCache<Credentials, AuthInfo> authenticationResponseCache, BackoffLimitedRetryHandler backoffHandler); @Override boolean shouldRetryRequest(HttpCommand command, HttpResponse response); }
@Test public void test408ShouldRetry() { HttpCommand command = createMock(HttpCommand.class); HttpResponse response = createMock(HttpResponse.class); @SuppressWarnings("unchecked") LoadingCache<Credentials, AuthInfo> cache = createMock(LoadingCache.class); BackoffLimitedRetryHandler backoffHandler = createMock(BackoffLimitedRetryHandler.class); expect(backoffHandler.shouldRetryRequest(command, response)).andReturn(true).once(); expect(response.getStatusCode()).andReturn(408).once(); replay(command); replay(response); replay(cache); replay(backoffHandler); RetryOnRenew retry = new RetryOnRenew(cache, backoffHandler); assertTrue(retry.shouldRetryRequest(command, response)); verify(command); verify(response); verify(cache); verify(backoffHandler); }
@Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; }
RetryOnRenew implements HttpRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; } }
RetryOnRenew implements HttpRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; } @Inject RetryOnRenew(LoadingCache<Credentials, AuthInfo> authenticationResponseCache, BackoffLimitedRetryHandler backoffHandler); }
RetryOnRenew implements HttpRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; } @Inject RetryOnRenew(LoadingCache<Credentials, AuthInfo> authenticationResponseCache, BackoffLimitedRetryHandler backoffHandler); @Override boolean shouldRetryRequest(HttpCommand command, HttpResponse response); }
RetryOnRenew implements HttpRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { boolean retry = false; switch (response.getStatusCode()) { case 401: Multimap<String, String> headers = command.getCurrentRequest().getHeaders(); if (headers != null && headers.containsKey(AuthHeaders.AUTH_USER) && headers.containsKey(AuthHeaders.AUTH_KEY) && !headers.containsKey(AuthHeaders.AUTH_TOKEN)) { retry = false; } else { Integer count = retryCountMap.getIfPresent(command); if (count == null) { logger.debug("invalidating authentication token - first time for %s", command); retryCountMap.put(command, 1); authenticationResponseCache.invalidateAll(); retry = true; } else { if (count + 1 >= NUM_RETRIES) { logger.debug("too many 401s - giving up after: %s for %s", count, command); retry = false; } else { logger.debug("invalidating authentication token - retry %s for %s", count, command); retryCountMap.put(command, count + 1); authenticationResponseCache.invalidateAll(); Uninterruptibles.sleepUninterruptibly(5, TimeUnit.SECONDS); retry = true; } } } break; case 408: return backoffHandler.shouldRetryRequest(command, response); } return retry; } @Inject RetryOnRenew(LoadingCache<Credentials, AuthInfo> authenticationResponseCache, BackoffLimitedRetryHandler backoffHandler); @Override boolean shouldRetryRequest(HttpCommand command, HttpResponse response); }
@Test(expectedExceptions = IllegalArgumentException.class) public void testCredentialTypeOfWithoutAnnotation() { CredentialTypes.credentialTypeOf(""); }
public static <T> String credentialTypeOf(T input) { Class<?> authenticationType = input.getClass(); CredentialType credentialType = findCredentialType(authenticationType); checkArgument(credentialType != null, "programming error: %s should have annotation %s", authenticationType, CredentialType.class.getName()); return credentialType.value(); }
CredentialTypes { public static <T> String credentialTypeOf(T input) { Class<?> authenticationType = input.getClass(); CredentialType credentialType = findCredentialType(authenticationType); checkArgument(credentialType != null, "programming error: %s should have annotation %s", authenticationType, CredentialType.class.getName()); return credentialType.value(); } }
CredentialTypes { public static <T> String credentialTypeOf(T input) { Class<?> authenticationType = input.getClass(); CredentialType credentialType = findCredentialType(authenticationType); checkArgument(credentialType != null, "programming error: %s should have annotation %s", authenticationType, CredentialType.class.getName()); return credentialType.value(); } }
CredentialTypes { public static <T> String credentialTypeOf(T input) { Class<?> authenticationType = input.getClass(); CredentialType credentialType = findCredentialType(authenticationType); checkArgument(credentialType != null, "programming error: %s should have annotation %s", authenticationType, CredentialType.class.getName()); return credentialType.value(); } static String credentialTypeOf(T input); static Map<String, T> indexByCredentialType(Iterable<T> iterable); static CredentialType findCredentialType(Class<?> input); }
CredentialTypes { public static <T> String credentialTypeOf(T input) { Class<?> authenticationType = input.getClass(); CredentialType credentialType = findCredentialType(authenticationType); checkArgument(credentialType != null, "programming error: %s should have annotation %s", authenticationType, CredentialType.class.getName()); return credentialType.value(); } static String credentialTypeOf(T input); static Map<String, T> indexByCredentialType(Iterable<T> iterable); static CredentialType findCredentialType(Class<?> input); static final String API_ACCESS_KEY_CREDENTIALS; static final String PASSWORD_CREDENTIALS; static final String TOKEN_CREDENTIALS; }
@Test(expectedExceptions = IllegalArgumentException.class) public void testIndexByCredentialTypeWithoutAnnotation() { CredentialTypes.indexByCredentialType(ImmutableSet.of("")); }
public static <T> Map<String, T> indexByCredentialType(Iterable<T> iterable) { return Maps.uniqueIndex(iterable, new Function<T, String>() { @Override public String apply(T input) { return credentialTypeOf(input); } }); }
CredentialTypes { public static <T> Map<String, T> indexByCredentialType(Iterable<T> iterable) { return Maps.uniqueIndex(iterable, new Function<T, String>() { @Override public String apply(T input) { return credentialTypeOf(input); } }); } }
CredentialTypes { public static <T> Map<String, T> indexByCredentialType(Iterable<T> iterable) { return Maps.uniqueIndex(iterable, new Function<T, String>() { @Override public String apply(T input) { return credentialTypeOf(input); } }); } }
CredentialTypes { public static <T> Map<String, T> indexByCredentialType(Iterable<T> iterable) { return Maps.uniqueIndex(iterable, new Function<T, String>() { @Override public String apply(T input) { return credentialTypeOf(input); } }); } static String credentialTypeOf(T input); static Map<String, T> indexByCredentialType(Iterable<T> iterable); static CredentialType findCredentialType(Class<?> input); }
CredentialTypes { public static <T> Map<String, T> indexByCredentialType(Iterable<T> iterable) { return Maps.uniqueIndex(iterable, new Function<T, String>() { @Override public String apply(T input) { return credentialTypeOf(input); } }); } static String credentialTypeOf(T input); static Map<String, T> indexByCredentialType(Iterable<T> iterable); static CredentialType findCredentialType(Class<?> input); static final String API_ACCESS_KEY_CREDENTIALS; static final String PASSWORD_CREDENTIALS; static final String TOKEN_CREDENTIALS; }
@Test public void testUnknown500DoesNotRetry() { AWSUtils utils = createMock(AWSUtils.class); HttpCommand command = createMock(HttpCommand.class); replay(utils, command); AWSServerErrorRetryHandler retry = new AWSServerErrorRetryHandler(utils, ImmutableSet.<String> of()); assertFalse(retry.shouldRetryRequest(command, HttpResponse.builder().statusCode(INTERNAL_SERVER_ERROR.getStatusCode()).build())); verify(utils, command); }
@Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; }
AWSServerErrorRetryHandler extends BackoffLimitedRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; } }
AWSServerErrorRetryHandler extends BackoffLimitedRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; } @Inject AWSServerErrorRetryHandler(AWSUtils utils, @ServerError Set<String> retryableServerCodes); }
AWSServerErrorRetryHandler extends BackoffLimitedRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; } @Inject AWSServerErrorRetryHandler(AWSUtils utils, @ServerError Set<String> retryableServerCodes); @Override boolean shouldRetryRequest(HttpCommand command, HttpResponse response); void imposeBackoffExponentialDelay(long period, int pow, int failureCount, int max, String commandDescription); }
AWSServerErrorRetryHandler extends BackoffLimitedRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; } @Inject AWSServerErrorRetryHandler(AWSUtils utils, @ServerError Set<String> retryableServerCodes); @Override boolean shouldRetryRequest(HttpCommand command, HttpResponse response); void imposeBackoffExponentialDelay(long period, int pow, int failureCount, int max, String commandDescription); }
@Test(dataProvider = "codes") public void testDoesBackoffAndRetryForHttpStatusCodeAndErrorCode(int httpStatusCode, String errorCode) { AWSUtils utils = createMock(AWSUtils.class); HttpCommand command = createMock(HttpCommand.class); HttpRequest putBucket = HttpRequest.builder().method(PUT) .endpoint("https: HttpResponse response = HttpResponse.builder().statusCode(httpStatusCode) .payload(Payloads.newStringPayload(String.format("<Error><Code>%s</Code></Error>", errorCode))).build(); expect(command.getCurrentRequest()).andReturn(putBucket); final AtomicInteger counter = new AtomicInteger(); expect(command.incrementFailureCount()).andAnswer(new IAnswer<Integer>() { @Override public Integer answer() throws Throwable { return counter.incrementAndGet(); } }).anyTimes(); expect(command.isReplayable()).andReturn(true).anyTimes(); expect(command.getFailureCount()).andAnswer(new IAnswer<Integer>() { @Override public Integer answer() throws Throwable { return counter.get(); } }).anyTimes(); AWSError error = new AWSError(); error.setCode(errorCode); expect(utils.parseAWSErrorFromContent(putBucket, response)).andReturn(error); replay(utils, command); AWSServerErrorRetryHandler retry = new AWSServerErrorRetryHandler(utils, ImmutableSet.of("RequestLimitExceeded", "InternalError")); assert retry.shouldRetryRequest(command, response); verify(utils, command); }
@Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; }
AWSServerErrorRetryHandler extends BackoffLimitedRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; } }
AWSServerErrorRetryHandler extends BackoffLimitedRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; } @Inject AWSServerErrorRetryHandler(AWSUtils utils, @ServerError Set<String> retryableServerCodes); }
AWSServerErrorRetryHandler extends BackoffLimitedRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; } @Inject AWSServerErrorRetryHandler(AWSUtils utils, @ServerError Set<String> retryableServerCodes); @Override boolean shouldRetryRequest(HttpCommand command, HttpResponse response); void imposeBackoffExponentialDelay(long period, int pow, int failureCount, int max, String commandDescription); }
AWSServerErrorRetryHandler extends BackoffLimitedRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; } @Inject AWSServerErrorRetryHandler(AWSUtils utils, @ServerError Set<String> retryableServerCodes); @Override boolean shouldRetryRequest(HttpCommand command, HttpResponse response); void imposeBackoffExponentialDelay(long period, int pow, int failureCount, int max, String commandDescription); }
@Test public void test504DoesRetry() { AWSUtils utils = createMock(AWSUtils.class); HttpCommand command = createMock(HttpCommand.class); expect(command.getFailureCount()).andReturn(1).anyTimes(); expect(command.incrementFailureCount()).andReturn(1); expect(command.isReplayable()).andReturn(true); replay(utils, command); AWSServerErrorRetryHandler retry = new AWSServerErrorRetryHandler(utils, ImmutableSet.<String> of()); assertTrue(retry.shouldRetryRequest(command, HttpResponse.builder().statusCode(504).build())); verify(utils, command); }
@Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; }
AWSServerErrorRetryHandler extends BackoffLimitedRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; } }
AWSServerErrorRetryHandler extends BackoffLimitedRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; } @Inject AWSServerErrorRetryHandler(AWSUtils utils, @ServerError Set<String> retryableServerCodes); }
AWSServerErrorRetryHandler extends BackoffLimitedRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; } @Inject AWSServerErrorRetryHandler(AWSUtils utils, @ServerError Set<String> retryableServerCodes); @Override boolean shouldRetryRequest(HttpCommand command, HttpResponse response); void imposeBackoffExponentialDelay(long period, int pow, int failureCount, int max, String commandDescription); }
AWSServerErrorRetryHandler extends BackoffLimitedRetryHandler { @Override public boolean shouldRetryRequest(HttpCommand command, HttpResponse response) { switch (response.getStatusCode()) { case 500: case 503: if (response.getPayload() != null) { closeClientButKeepContentStream(response); AWSError error = utils.parseAWSErrorFromContent(command.getCurrentRequest(), response); if (error != null) { return shouldRetryRequestOnError(command, response, error); } } break; case 504: return super.shouldRetryRequest(command, response); } return false; } @Inject AWSServerErrorRetryHandler(AWSUtils utils, @ServerError Set<String> retryableServerCodes); @Override boolean shouldRetryRequest(HttpCommand command, HttpResponse response); void imposeBackoffExponentialDelay(long period, int pow, int failureCount, int max, String commandDescription); }
@SuppressWarnings("CheckReturnValue") @Test(expectedExceptions = IllegalStateException.class) public void testTTLLessThanMin() { UpdateCDNContainerOptions options = new UpdateCDNContainerOptions().ttl(CDN_TTL_MIN - 1); options.buildRequestHeaders().get(CDN_TTL); }
public UpdateCDNContainerOptions ttl(int ttl) { checkState(ttl >= Integer.valueOf(CDN_TTL_MIN), "ttl must be >= " + CDN_TTL_MIN); checkState(ttl <= Integer.valueOf(CDN_TTL_MAX), "ttl must be <= " + CDN_TTL_MAX); headers.put(CDN_TTL, Integer.toString(ttl)); return this; }
UpdateCDNContainerOptions extends BaseHttpRequestOptions { public UpdateCDNContainerOptions ttl(int ttl) { checkState(ttl >= Integer.valueOf(CDN_TTL_MIN), "ttl must be >= " + CDN_TTL_MIN); checkState(ttl <= Integer.valueOf(CDN_TTL_MAX), "ttl must be <= " + CDN_TTL_MAX); headers.put(CDN_TTL, Integer.toString(ttl)); return this; } }
UpdateCDNContainerOptions extends BaseHttpRequestOptions { public UpdateCDNContainerOptions ttl(int ttl) { checkState(ttl >= Integer.valueOf(CDN_TTL_MIN), "ttl must be >= " + CDN_TTL_MIN); checkState(ttl <= Integer.valueOf(CDN_TTL_MAX), "ttl must be <= " + CDN_TTL_MAX); headers.put(CDN_TTL, Integer.toString(ttl)); return this; } }
UpdateCDNContainerOptions extends BaseHttpRequestOptions { public UpdateCDNContainerOptions ttl(int ttl) { checkState(ttl >= Integer.valueOf(CDN_TTL_MIN), "ttl must be >= " + CDN_TTL_MIN); checkState(ttl <= Integer.valueOf(CDN_TTL_MAX), "ttl must be <= " + CDN_TTL_MAX); headers.put(CDN_TTL, Integer.toString(ttl)); return this; } UpdateCDNContainerOptions ttl(int ttl); UpdateCDNContainerOptions logRetention(boolean logRetention); UpdateCDNContainerOptions enabled(boolean enabled); UpdateCDNContainerOptions staticWebsiteDirectoryType(MediaType directoryType); UpdateCDNContainerOptions staticWebsiteErrorPage(String errorPage); UpdateCDNContainerOptions staticWebsiteIndexPage(String indexPage); UpdateCDNContainerOptions staticWebsiteListings(boolean listings); UpdateCDNContainerOptions staticWebsiteListingsCSS(String listingsCSS); }
UpdateCDNContainerOptions extends BaseHttpRequestOptions { public UpdateCDNContainerOptions ttl(int ttl) { checkState(ttl >= Integer.valueOf(CDN_TTL_MIN), "ttl must be >= " + CDN_TTL_MIN); checkState(ttl <= Integer.valueOf(CDN_TTL_MAX), "ttl must be <= " + CDN_TTL_MAX); headers.put(CDN_TTL, Integer.toString(ttl)); return this; } UpdateCDNContainerOptions ttl(int ttl); UpdateCDNContainerOptions logRetention(boolean logRetention); UpdateCDNContainerOptions enabled(boolean enabled); UpdateCDNContainerOptions staticWebsiteDirectoryType(MediaType directoryType); UpdateCDNContainerOptions staticWebsiteErrorPage(String errorPage); UpdateCDNContainerOptions staticWebsiteIndexPage(String indexPage); UpdateCDNContainerOptions staticWebsiteListings(boolean listings); UpdateCDNContainerOptions staticWebsiteListingsCSS(String listingsCSS); static final UpdateCDNContainerOptions NONE; }
@SuppressWarnings("CheckReturnValue") @Test(expectedExceptions = IllegalStateException.class) public void testTTLGreaterThanMax() { UpdateCDNContainerOptions options = new UpdateCDNContainerOptions().ttl(CDN_TTL_MAX + 1); options.buildRequestHeaders().get(CDN_TTL); }
public UpdateCDNContainerOptions ttl(int ttl) { checkState(ttl >= Integer.valueOf(CDN_TTL_MIN), "ttl must be >= " + CDN_TTL_MIN); checkState(ttl <= Integer.valueOf(CDN_TTL_MAX), "ttl must be <= " + CDN_TTL_MAX); headers.put(CDN_TTL, Integer.toString(ttl)); return this; }
UpdateCDNContainerOptions extends BaseHttpRequestOptions { public UpdateCDNContainerOptions ttl(int ttl) { checkState(ttl >= Integer.valueOf(CDN_TTL_MIN), "ttl must be >= " + CDN_TTL_MIN); checkState(ttl <= Integer.valueOf(CDN_TTL_MAX), "ttl must be <= " + CDN_TTL_MAX); headers.put(CDN_TTL, Integer.toString(ttl)); return this; } }
UpdateCDNContainerOptions extends BaseHttpRequestOptions { public UpdateCDNContainerOptions ttl(int ttl) { checkState(ttl >= Integer.valueOf(CDN_TTL_MIN), "ttl must be >= " + CDN_TTL_MIN); checkState(ttl <= Integer.valueOf(CDN_TTL_MAX), "ttl must be <= " + CDN_TTL_MAX); headers.put(CDN_TTL, Integer.toString(ttl)); return this; } }
UpdateCDNContainerOptions extends BaseHttpRequestOptions { public UpdateCDNContainerOptions ttl(int ttl) { checkState(ttl >= Integer.valueOf(CDN_TTL_MIN), "ttl must be >= " + CDN_TTL_MIN); checkState(ttl <= Integer.valueOf(CDN_TTL_MAX), "ttl must be <= " + CDN_TTL_MAX); headers.put(CDN_TTL, Integer.toString(ttl)); return this; } UpdateCDNContainerOptions ttl(int ttl); UpdateCDNContainerOptions logRetention(boolean logRetention); UpdateCDNContainerOptions enabled(boolean enabled); UpdateCDNContainerOptions staticWebsiteDirectoryType(MediaType directoryType); UpdateCDNContainerOptions staticWebsiteErrorPage(String errorPage); UpdateCDNContainerOptions staticWebsiteIndexPage(String indexPage); UpdateCDNContainerOptions staticWebsiteListings(boolean listings); UpdateCDNContainerOptions staticWebsiteListingsCSS(String listingsCSS); }
UpdateCDNContainerOptions extends BaseHttpRequestOptions { public UpdateCDNContainerOptions ttl(int ttl) { checkState(ttl >= Integer.valueOf(CDN_TTL_MIN), "ttl must be >= " + CDN_TTL_MIN); checkState(ttl <= Integer.valueOf(CDN_TTL_MAX), "ttl must be <= " + CDN_TTL_MAX); headers.put(CDN_TTL, Integer.toString(ttl)); return this; } UpdateCDNContainerOptions ttl(int ttl); UpdateCDNContainerOptions logRetention(boolean logRetention); UpdateCDNContainerOptions enabled(boolean enabled); UpdateCDNContainerOptions staticWebsiteDirectoryType(MediaType directoryType); UpdateCDNContainerOptions staticWebsiteErrorPage(String errorPage); UpdateCDNContainerOptions staticWebsiteIndexPage(String indexPage); UpdateCDNContainerOptions staticWebsiteListings(boolean listings); UpdateCDNContainerOptions staticWebsiteListingsCSS(String listingsCSS); static final UpdateCDNContainerOptions NONE; }
@Test public void testBase() { assertEquals( json.toJson(converter.apply(ImmutableListMultimap.<String, Supplier<JsonBall>> of("java", Suppliers.ofInstance(new JsonBall("java"))))), "{\"java\":\"java\"}"); }
@Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); @Override Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from); }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); @Override Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from); }
@Test(expectedExceptions = IllegalArgumentException.class) public void testIllegal() { json.toJson(converter.apply(ImmutableListMultimap.<String, Supplier<JsonBall>> of("java", Suppliers.ofInstance(new JsonBall("java")), "java/system", Suppliers.ofInstance(new JsonBall("system"))))); }
@Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); @Override Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from); }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); @Override Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from); }
@Test public void testOne() { assertEquals( json.toJson(converter.apply(ImmutableListMultimap.<String, Supplier<JsonBall>> of("java", Suppliers.ofInstance(new JsonBall("{\"time\":\"time\"}")), "java/system", Suppliers.ofInstance(new JsonBall("system"))))), "{\"java\":{\"time\":\"time\",\"system\":\"system\"}}"); }
@Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); @Override Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from); }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); @Override Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from); }
@Test public void testOneDuplicate() { assertEquals( json.toJson(converter.apply(ImmutableListMultimap.<String, Supplier<JsonBall>> of("java", Suppliers.ofInstance(new JsonBall("{\"time\":\"time\"}")), "java", Suppliers.ofInstance(new JsonBall("{\"system\":\"system\"}"))))), "{\"java\":{\"time\":\"time\",\"system\":\"system\"}}"); }
@Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); @Override Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from); }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); @Override Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from); }
@Test public void testMerge() { assertEquals( json.toJson(converter.apply(ImmutableListMultimap.<String, Supplier<JsonBall>> of("java", Suppliers.ofInstance(new JsonBall("{\"time\":{\"1\":\"hello\"}}")), "java/time", Suppliers.ofInstance(new JsonBall("{\"2\":\"goodbye\"}"))))), "{\"java\":{\"time\":{\"1\":\"hello\",\"2\":\"goodbye\"}}}"); }
@Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); @Override Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from); }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); @Override Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from); }
@Test public void testMergeNestedTwice() { assertEquals( json.toJson(converter.apply(ImmutableListMultimap.<String, Supplier<JsonBall>> of("java", Suppliers.ofInstance(new JsonBall("{\"time\":{\"1\":\"hello\"}}")), "java", Suppliers.ofInstance(new JsonBall("{\"time\":{\"2\":\"goodbye\"}}"))))), "{\"java\":{\"time\":{\"1\":\"hello\",\"2\":\"goodbye\"}}}"); }
@Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); @Override Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from); }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); @Override Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from); }
@Test public void testReplaceList() { assertEquals( json.toJson(converter.apply(ImmutableListMultimap.<String, Supplier<JsonBall>> of("java", Suppliers.ofInstance(new JsonBall("{\"time\":{\"1\":[\"hello\"]}}")), "java/time", Suppliers.ofInstance(new JsonBall("{\"1\":[\"goodbye\"]}"))))), "{\"java\":{\"time\":{\"1\":[\"goodbye\"]}}}"); }
@Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); @Override Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from); }
NestSlashKeys implements Function<Multimap<String, Supplier<JsonBall>>, Map<String, JsonBall>> { @Override public Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from) { Map<String, JsonBall> autoAttrs = mergeSameKeys(from); Map<String, JsonBall> modifiableFlatMap = Maps.newLinkedHashMap(Maps.filterKeys(autoAttrs, new Predicate<String>() { @Override public boolean apply(String input) { return input.indexOf('/') == -1; } })); Map<String, JsonBall> withSlashesMap = Maps.difference(autoAttrs, modifiableFlatMap).entriesOnlyOnLeft(); for (Entry<String, JsonBall> entry : withSlashesMap.entrySet()) { List<String> keyParts = Lists.newArrayList(Splitter.on('/').split(entry.getKey())); JsonBall toInsert = entry.getValue(); try { putUnderContext(keyParts, toInsert, modifiableFlatMap); } catch (IllegalArgumentException e) { throw new IllegalArgumentException("error inserting value in entry: " + entry.getKey(), e); } } return modifiableFlatMap; } @Inject NestSlashKeys(Json json); @Override Map<String, JsonBall> apply(Multimap<String, Supplier<JsonBall>> from); }
@Test public void testWithNoRunlist() { ChefApi chef = createMock(ChefApi.class); Supplier<Map<String, JsonBall>> automaticSupplier = Suppliers.<Map<String, JsonBall>> ofInstance(ImmutableMap.<String, JsonBall> of()); Node nodeWithAutomatic = Node.builder().name("name").environment("_default") .automaticAttributes(automaticSupplier.get()).build(); chef.createNode(nodeWithAutomatic); replay(chef); CreateNodeAndPopulateAutomaticAttributesImpl updater = new CreateNodeAndPopulateAutomaticAttributesImpl(chef, automaticSupplier); updater.execute("name", ImmutableSet.<String> of()); verify(chef); }
@Override public Node execute(Node node) { logger.trace("creating node %s", node.getName()); Node withAutomatic = Node.builder() .name(node.getName()) .normalAttributes(node.getNormalAttributes()) .overrideAttributes(node.getOverrideAttributes()) .defaultAttributes(node.getDefaultAttributes()) .automaticAttributes(node.getAutomaticAttributes()) .automaticAttributes(automaticSupplier.get()) .runList(node.getRunList()) .environment(node.getEnvironment()) .build(); chef.createNode(withAutomatic); logger.debug("created node %s", withAutomatic.getName()); return node; }
CreateNodeAndPopulateAutomaticAttributesImpl implements CreateNodeAndPopulateAutomaticAttributes { @Override public Node execute(Node node) { logger.trace("creating node %s", node.getName()); Node withAutomatic = Node.builder() .name(node.getName()) .normalAttributes(node.getNormalAttributes()) .overrideAttributes(node.getOverrideAttributes()) .defaultAttributes(node.getDefaultAttributes()) .automaticAttributes(node.getAutomaticAttributes()) .automaticAttributes(automaticSupplier.get()) .runList(node.getRunList()) .environment(node.getEnvironment()) .build(); chef.createNode(withAutomatic); logger.debug("created node %s", withAutomatic.getName()); return node; } }
CreateNodeAndPopulateAutomaticAttributesImpl implements CreateNodeAndPopulateAutomaticAttributes { @Override public Node execute(Node node) { logger.trace("creating node %s", node.getName()); Node withAutomatic = Node.builder() .name(node.getName()) .normalAttributes(node.getNormalAttributes()) .overrideAttributes(node.getOverrideAttributes()) .defaultAttributes(node.getDefaultAttributes()) .automaticAttributes(node.getAutomaticAttributes()) .automaticAttributes(automaticSupplier.get()) .runList(node.getRunList()) .environment(node.getEnvironment()) .build(); chef.createNode(withAutomatic); logger.debug("created node %s", withAutomatic.getName()); return node; } @Inject CreateNodeAndPopulateAutomaticAttributesImpl(ChefApi chef, @Automatic Supplier<Map<String, JsonBall>> automaticSupplier); }
CreateNodeAndPopulateAutomaticAttributesImpl implements CreateNodeAndPopulateAutomaticAttributes { @Override public Node execute(Node node) { logger.trace("creating node %s", node.getName()); Node withAutomatic = Node.builder() .name(node.getName()) .normalAttributes(node.getNormalAttributes()) .overrideAttributes(node.getOverrideAttributes()) .defaultAttributes(node.getDefaultAttributes()) .automaticAttributes(node.getAutomaticAttributes()) .automaticAttributes(automaticSupplier.get()) .runList(node.getRunList()) .environment(node.getEnvironment()) .build(); chef.createNode(withAutomatic); logger.debug("created node %s", withAutomatic.getName()); return node; } @Inject CreateNodeAndPopulateAutomaticAttributesImpl(ChefApi chef, @Automatic Supplier<Map<String, JsonBall>> automaticSupplier); @Override Node execute(Node node); @Override Node execute(String nodeName, Iterable<String> runList); }
CreateNodeAndPopulateAutomaticAttributesImpl implements CreateNodeAndPopulateAutomaticAttributes { @Override public Node execute(Node node) { logger.trace("creating node %s", node.getName()); Node withAutomatic = Node.builder() .name(node.getName()) .normalAttributes(node.getNormalAttributes()) .overrideAttributes(node.getOverrideAttributes()) .defaultAttributes(node.getDefaultAttributes()) .automaticAttributes(node.getAutomaticAttributes()) .automaticAttributes(automaticSupplier.get()) .runList(node.getRunList()) .environment(node.getEnvironment()) .build(); chef.createNode(withAutomatic); logger.debug("created node %s", withAutomatic.getName()); return node; } @Inject CreateNodeAndPopulateAutomaticAttributesImpl(ChefApi chef, @Automatic Supplier<Map<String, JsonBall>> automaticSupplier); @Override Node execute(Node node); @Override Node execute(String nodeName, Iterable<String> runList); }
@Test public void test() { ChefApi chef = createMock(ChefApi.class); Map<String, JsonBall> automatic = ImmutableMap.<String, JsonBall> of(); Supplier<Map<String, JsonBall>> automaticSupplier = Suppliers.<Map<String, JsonBall>> ofInstance(automatic); Node node = Node.builder().name("name").environment("_default").build(); Node nodeWithAutomatic = Node.builder().name("name").environment("_default").automaticAttributes(automatic) .build(); expect(chef.getNode("name")).andReturn(node); expect(chef.updateNode(nodeWithAutomatic)).andReturn(null); replay(chef); UpdateAutomaticAttributesOnNodeImpl updater = new UpdateAutomaticAttributesOnNodeImpl(chef, automaticSupplier); updater.execute("name"); verify(chef); }
@Override public void execute(String nodeName) { logger.trace("updating node %s", nodeName); Node node = chef.getNode(nodeName); Node updated = Node.builder() .name(node.getName()) .normalAttributes(node.getNormalAttributes()) .overrideAttributes(node.getOverrideAttributes()) .defaultAttributes(node.getDefaultAttributes()) .automaticAttributes(automaticSupplier.get()) .runList(node.getRunList()) .environment(node.getEnvironment()) .build(); chef.updateNode(updated); logger.debug("updated node %s", nodeName); }
UpdateAutomaticAttributesOnNodeImpl implements UpdateAutomaticAttributesOnNode { @Override public void execute(String nodeName) { logger.trace("updating node %s", nodeName); Node node = chef.getNode(nodeName); Node updated = Node.builder() .name(node.getName()) .normalAttributes(node.getNormalAttributes()) .overrideAttributes(node.getOverrideAttributes()) .defaultAttributes(node.getDefaultAttributes()) .automaticAttributes(automaticSupplier.get()) .runList(node.getRunList()) .environment(node.getEnvironment()) .build(); chef.updateNode(updated); logger.debug("updated node %s", nodeName); } }
UpdateAutomaticAttributesOnNodeImpl implements UpdateAutomaticAttributesOnNode { @Override public void execute(String nodeName) { logger.trace("updating node %s", nodeName); Node node = chef.getNode(nodeName); Node updated = Node.builder() .name(node.getName()) .normalAttributes(node.getNormalAttributes()) .overrideAttributes(node.getOverrideAttributes()) .defaultAttributes(node.getDefaultAttributes()) .automaticAttributes(automaticSupplier.get()) .runList(node.getRunList()) .environment(node.getEnvironment()) .build(); chef.updateNode(updated); logger.debug("updated node %s", nodeName); } @Inject UpdateAutomaticAttributesOnNodeImpl(ChefApi chef, @Automatic Supplier<Map<String, JsonBall>> automaticSupplier); }
UpdateAutomaticAttributesOnNodeImpl implements UpdateAutomaticAttributesOnNode { @Override public void execute(String nodeName) { logger.trace("updating node %s", nodeName); Node node = chef.getNode(nodeName); Node updated = Node.builder() .name(node.getName()) .normalAttributes(node.getNormalAttributes()) .overrideAttributes(node.getOverrideAttributes()) .defaultAttributes(node.getDefaultAttributes()) .automaticAttributes(automaticSupplier.get()) .runList(node.getRunList()) .environment(node.getEnvironment()) .build(); chef.updateNode(updated); logger.debug("updated node %s", nodeName); } @Inject UpdateAutomaticAttributesOnNodeImpl(ChefApi chef, @Automatic Supplier<Map<String, JsonBall>> automaticSupplier); @Override void execute(String nodeName); }
UpdateAutomaticAttributesOnNodeImpl implements UpdateAutomaticAttributesOnNode { @Override public void execute(String nodeName) { logger.trace("updating node %s", nodeName); Node node = chef.getNode(nodeName); Node updated = Node.builder() .name(node.getName()) .normalAttributes(node.getNormalAttributes()) .overrideAttributes(node.getOverrideAttributes()) .defaultAttributes(node.getDefaultAttributes()) .automaticAttributes(automaticSupplier.get()) .runList(node.getRunList()) .environment(node.getEnvironment()) .build(); chef.updateNode(updated); logger.debug("updated node %s", nodeName); } @Inject UpdateAutomaticAttributesOnNodeImpl(ChefApi chef, @Automatic Supplier<Map<String, JsonBall>> automaticSupplier); @Override void execute(String nodeName); }
@Test(expectedExceptions = IllegalStateException.class) public void testMustHaveValidatorName() { Optional<PrivateKey> validatorCredential = Optional.of(createMock(PrivateKey.class)); GroupToBootScript fn = new GroupToBootScript(Suppliers.ofInstance(URI.create("http: CacheLoader.from(Functions.forMap(ImmutableMap.of("foo", BootstrapConfig.builder().build()))), installChefOmnibus, Optional.<String> absent(), validatorCredential); fn.apply("foo", null); }
public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } @Inject GroupToBootScript(@Provider Supplier<URI> endpoint, CacheLoader<String, BootstrapConfig> bootstrapConfigForGroup, @InstallChef Statement installChef, @Validator Optional<String> validatorName, @Validator Optional<PrivateKey> validatorCredential); }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } @Inject GroupToBootScript(@Provider Supplier<URI> endpoint, CacheLoader<String, BootstrapConfig> bootstrapConfigForGroup, @InstallChef Statement installChef, @Validator Optional<String> validatorName, @Validator Optional<PrivateKey> validatorCredential); Statement apply(String group, @Nullable String nodeName); }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } @Inject GroupToBootScript(@Provider Supplier<URI> endpoint, CacheLoader<String, BootstrapConfig> bootstrapConfigForGroup, @InstallChef Statement installChef, @Validator Optional<String> validatorName, @Validator Optional<PrivateKey> validatorCredential); Statement apply(String group, @Nullable String nodeName); }
@Test(expectedExceptions = IllegalStateException.class) public void testMustHaveValidatorCredential() { GroupToBootScript fn = new GroupToBootScript(Suppliers.ofInstance(URI.create("http: CacheLoader.from(Functions.forMap(ImmutableMap.of("foo", BootstrapConfig.builder().build()))), installChefOmnibus, validatorName, Optional.<PrivateKey> absent()); fn.apply("foo", null); }
public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } @Inject GroupToBootScript(@Provider Supplier<URI> endpoint, CacheLoader<String, BootstrapConfig> bootstrapConfigForGroup, @InstallChef Statement installChef, @Validator Optional<String> validatorName, @Validator Optional<PrivateKey> validatorCredential); }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } @Inject GroupToBootScript(@Provider Supplier<URI> endpoint, CacheLoader<String, BootstrapConfig> bootstrapConfigForGroup, @InstallChef Statement installChef, @Validator Optional<String> validatorName, @Validator Optional<PrivateKey> validatorCredential); Statement apply(String group, @Nullable String nodeName); }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } @Inject GroupToBootScript(@Provider Supplier<URI> endpoint, CacheLoader<String, BootstrapConfig> bootstrapConfigForGroup, @InstallChef Statement installChef, @Validator Optional<String> validatorName, @Validator Optional<PrivateKey> validatorCredential); Statement apply(String group, @Nullable String nodeName); }
@Test(expectedExceptions = IllegalArgumentException.class, expectedExceptionsMessageRegExp = "Key 'foo' not present in map") public void testMustHaveRunScriptsName() { Optional<PrivateKey> validatorCredential = Optional.of(createMock(PrivateKey.class)); GroupToBootScript fn = new GroupToBootScript(Suppliers.ofInstance(URI.create("http: CacheLoader.from(Functions.forMap(ImmutableMap.<String, BootstrapConfig> of())), installChefOmnibus, validatorName, validatorCredential); fn.apply("foo", null); }
public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } @Inject GroupToBootScript(@Provider Supplier<URI> endpoint, CacheLoader<String, BootstrapConfig> bootstrapConfigForGroup, @InstallChef Statement installChef, @Validator Optional<String> validatorName, @Validator Optional<PrivateKey> validatorCredential); }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } @Inject GroupToBootScript(@Provider Supplier<URI> endpoint, CacheLoader<String, BootstrapConfig> bootstrapConfigForGroup, @InstallChef Statement installChef, @Validator Optional<String> validatorName, @Validator Optional<PrivateKey> validatorCredential); Statement apply(String group, @Nullable String nodeName); }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } @Inject GroupToBootScript(@Provider Supplier<URI> endpoint, CacheLoader<String, BootstrapConfig> bootstrapConfigForGroup, @InstallChef Statement installChef, @Validator Optional<String> validatorName, @Validator Optional<PrivateKey> validatorCredential); Statement apply(String group, @Nullable String nodeName); }
@Test(expectedExceptions = NullPointerException.class, expectedExceptionsMessageRegExp = "null value in entry: foo=null") public void testMustHaveRunScriptsValue() { Optional<PrivateKey> validatorCredential = Optional.of(createMock(PrivateKey.class)); GroupToBootScript fn = new GroupToBootScript(Suppliers.ofInstance(URI.create("http: CacheLoader.from(Functions.forMap(ImmutableMap.of("foo", (BootstrapConfig) null))), installChefOmnibus, validatorName, validatorCredential); fn.apply("foo", null); }
public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } @Inject GroupToBootScript(@Provider Supplier<URI> endpoint, CacheLoader<String, BootstrapConfig> bootstrapConfigForGroup, @InstallChef Statement installChef, @Validator Optional<String> validatorName, @Validator Optional<PrivateKey> validatorCredential); }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } @Inject GroupToBootScript(@Provider Supplier<URI> endpoint, CacheLoader<String, BootstrapConfig> bootstrapConfigForGroup, @InstallChef Statement installChef, @Validator Optional<String> validatorName, @Validator Optional<PrivateKey> validatorCredential); Statement apply(String group, @Nullable String nodeName); }
GroupToBootScript { public Statement apply(String group, @Nullable String nodeName) { BootstrapConfig config = null; try { config = bootstrapConfigForGroup.load(checkNotNull(group, "group")); } catch (Exception ex) { throw Throwables.propagate(ex); } String chefConfigDir = "{root}etc{fs}chef"; String chefBootFile = chefConfigDir + "{fs}first-boot.json"; ImmutableList.Builder<Statement> statements = ImmutableList.builder(); statements.add(new ExitInsteadOfReturn(installChef)); statements.add(exec("{md} " + chefConfigDir)); if (config.getSslCAFile() != null) { statements.add(createOrOverwriteFile(chefConfigDir + "{fs}chef-server.crt", Splitter.on(newLinePattern).split(config.getSslCAFile()))); } statements.add(createClientRbFile(chefConfigDir + "{fs}client.rb", group, nodeName, config)); statements.add(createOrOverwriteFile(chefConfigDir + "{fs}validation.pem", Splitter.on(newLinePattern).split(Pems.pem(validatorCredential.get())))); statements.add(createAttributesFile(chefBootFile, config)); statements.add(exec("chef-client -j " + chefBootFile)); return new StatementList(statements.build()); } @Inject GroupToBootScript(@Provider Supplier<URI> endpoint, CacheLoader<String, BootstrapConfig> bootstrapConfigForGroup, @InstallChef Statement installChef, @Validator Optional<String> validatorName, @Validator Optional<PrivateKey> validatorCredential); Statement apply(String group, @Nullable String nodeName); }
@Test public void testWithValidResource() { Function<Object, URI> function = new UriForResource(); Resource res = Resource.builder().name("test").url(URI.create("http: URI result = function.apply(res); assertEquals(res.getUrl().toString(), result.toString()); }
@Override public URI apply(Object input) { checkArgument(checkNotNull(input, "input") instanceof Resource, "This function can only be applied to Resource objects"); return ((Resource) input).getUrl(); }
UriForResource implements Function<Object, URI> { @Override public URI apply(Object input) { checkArgument(checkNotNull(input, "input") instanceof Resource, "This function can only be applied to Resource objects"); return ((Resource) input).getUrl(); } }
UriForResource implements Function<Object, URI> { @Override public URI apply(Object input) { checkArgument(checkNotNull(input, "input") instanceof Resource, "This function can only be applied to Resource objects"); return ((Resource) input).getUrl(); } }
UriForResource implements Function<Object, URI> { @Override public URI apply(Object input) { checkArgument(checkNotNull(input, "input") instanceof Resource, "This function can only be applied to Resource objects"); return ((Resource) input).getUrl(); } @Override URI apply(Object input); }
UriForResource implements Function<Object, URI> { @Override public URI apply(Object input) { checkArgument(checkNotNull(input, "input") instanceof Resource, "This function can only be applied to Resource objects"); return ((Resource) input).getUrl(); } @Override URI apply(Object input); }
@Test(expectedExceptions = IllegalStateException.class) public void testWhenNoDatabagItem() throws IOException { ChefApi chefApi = createMock(ChefApi.class); Client client = createMock(Client.class); BootstrapConfigForGroup fn = new BootstrapConfigForGroup("jclouds", chefApi, json); expect(chefApi.getDatabagItem("jclouds", "foo")).andReturn(null); replay(client, chefApi); fn.apply("foo"); verify(client, chefApi); }
@Override public BootstrapConfig apply(String from) { DatabagItem bootstrapConfig = api.getDatabagItem(databag, from); checkState(bootstrapConfig != null, "databag item %s/%s not found", databag, from); return json.fromJson(bootstrapConfig.toString(), BootstrapConfig.class); }
BootstrapConfigForGroup implements Function<String, BootstrapConfig> { @Override public BootstrapConfig apply(String from) { DatabagItem bootstrapConfig = api.getDatabagItem(databag, from); checkState(bootstrapConfig != null, "databag item %s/%s not found", databag, from); return json.fromJson(bootstrapConfig.toString(), BootstrapConfig.class); } }
BootstrapConfigForGroup implements Function<String, BootstrapConfig> { @Override public BootstrapConfig apply(String from) { DatabagItem bootstrapConfig = api.getDatabagItem(databag, from); checkState(bootstrapConfig != null, "databag item %s/%s not found", databag, from); return json.fromJson(bootstrapConfig.toString(), BootstrapConfig.class); } @Inject BootstrapConfigForGroup(@Named(CHEF_BOOTSTRAP_DATABAG) String databag, ChefApi api, Json json); }
BootstrapConfigForGroup implements Function<String, BootstrapConfig> { @Override public BootstrapConfig apply(String from) { DatabagItem bootstrapConfig = api.getDatabagItem(databag, from); checkState(bootstrapConfig != null, "databag item %s/%s not found", databag, from); return json.fromJson(bootstrapConfig.toString(), BootstrapConfig.class); } @Inject BootstrapConfigForGroup(@Named(CHEF_BOOTSTRAP_DATABAG) String databag, ChefApi api, Json json); @Override BootstrapConfig apply(String from); }
BootstrapConfigForGroup implements Function<String, BootstrapConfig> { @Override public BootstrapConfig apply(String from) { DatabagItem bootstrapConfig = api.getDatabagItem(databag, from); checkState(bootstrapConfig != null, "databag item %s/%s not found", databag, from); return json.fromJson(bootstrapConfig.toString(), BootstrapConfig.class); } @Inject BootstrapConfigForGroup(@Named(CHEF_BOOTSTRAP_DATABAG) String databag, ChefApi api, Json json); @Override BootstrapConfig apply(String from); }
@Test public void testReturnsItem() throws IOException { ChefApi chefApi = createMock(ChefApi.class); Client client = createMock(Client.class); BootstrapConfigForGroup fn = new BootstrapConfigForGroup("jclouds", chefApi, json); DatabagItem databag = new DatabagItem("foo", "{\"environment\":\"development\",\"ssl_ca_file\":\"/etc/certs/chef-server.crt\"," + "\"ssl_verify_mode\": \":verify_peer\"," + "\"run_list\":[\"recipe[apache2]\",\"role[webserver]\"]," + "\"attributes\":{\"tomcat6\":{\"ssl_port\":8433}}}"); expect(chefApi.getDatabagItem("jclouds", "foo")).andReturn(databag); replay(client, chefApi); BootstrapConfig config = fn.apply("foo"); assertEquals(config.getEnvironment(), "development"); assertEquals(config.getSslCAFile(), "/etc/certs/chef-server.crt"); assertEquals(config.getSslVerifyMode(), SSLVerifyMode.PEER); assertEquals(config.getRunList().get(0), "recipe[apache2]"); assertEquals(config.getRunList().get(1), "role[webserver]"); assertEquals(config.getAttributes().toString(), "{\"tomcat6\":{\"ssl_port\":8433}}"); verify(client, chefApi); }
@Override public BootstrapConfig apply(String from) { DatabagItem bootstrapConfig = api.getDatabagItem(databag, from); checkState(bootstrapConfig != null, "databag item %s/%s not found", databag, from); return json.fromJson(bootstrapConfig.toString(), BootstrapConfig.class); }
BootstrapConfigForGroup implements Function<String, BootstrapConfig> { @Override public BootstrapConfig apply(String from) { DatabagItem bootstrapConfig = api.getDatabagItem(databag, from); checkState(bootstrapConfig != null, "databag item %s/%s not found", databag, from); return json.fromJson(bootstrapConfig.toString(), BootstrapConfig.class); } }
BootstrapConfigForGroup implements Function<String, BootstrapConfig> { @Override public BootstrapConfig apply(String from) { DatabagItem bootstrapConfig = api.getDatabagItem(databag, from); checkState(bootstrapConfig != null, "databag item %s/%s not found", databag, from); return json.fromJson(bootstrapConfig.toString(), BootstrapConfig.class); } @Inject BootstrapConfigForGroup(@Named(CHEF_BOOTSTRAP_DATABAG) String databag, ChefApi api, Json json); }
BootstrapConfigForGroup implements Function<String, BootstrapConfig> { @Override public BootstrapConfig apply(String from) { DatabagItem bootstrapConfig = api.getDatabagItem(databag, from); checkState(bootstrapConfig != null, "databag item %s/%s not found", databag, from); return json.fromJson(bootstrapConfig.toString(), BootstrapConfig.class); } @Inject BootstrapConfigForGroup(@Named(CHEF_BOOTSTRAP_DATABAG) String databag, ChefApi api, Json json); @Override BootstrapConfig apply(String from); }
BootstrapConfigForGroup implements Function<String, BootstrapConfig> { @Override public BootstrapConfig apply(String from) { DatabagItem bootstrapConfig = api.getDatabagItem(databag, from); checkState(bootstrapConfig != null, "databag item %s/%s not found", databag, from); return json.fromJson(bootstrapConfig.toString(), BootstrapConfig.class); } @Inject BootstrapConfigForGroup(@Named(CHEF_BOOTSTRAP_DATABAG) String databag, ChefApi api, Json json); @Override BootstrapConfig apply(String from); }
@Test void canonicalizedPathRemovesMultipleSlashes() { assertEquals(signing_obj.canonicalPath(" }
@VisibleForTesting String canonicalPath(String path) { path = path.replaceAll("\\/+", "/"); return path.endsWith("/") && path.length() > 1 ? path.substring(0, path.length() - 1) : path; }
SignedHeaderAuth implements HttpRequestFilter { @VisibleForTesting String canonicalPath(String path) { path = path.replaceAll("\\/+", "/"); return path.endsWith("/") && path.length() > 1 ? path.substring(0, path.length() - 1) : path; } }
SignedHeaderAuth implements HttpRequestFilter { @VisibleForTesting String canonicalPath(String path) { path = path.replaceAll("\\/+", "/"); return path.endsWith("/") && path.length() > 1 ? path.substring(0, path.length() - 1) : path; } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); }
SignedHeaderAuth implements HttpRequestFilter { @VisibleForTesting String canonicalPath(String path) { path = path.replaceAll("\\/+", "/"); return path.endsWith("/") && path.length() > 1 ? path.substring(0, path.length() - 1) : path; } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); HttpRequest filter(HttpRequest input); String createStringToSign(String request, String hashedPath, String contentHash, String timestamp); String sign(String toSign); }
SignedHeaderAuth implements HttpRequestFilter { @VisibleForTesting String canonicalPath(String path) { path = path.replaceAll("\\/+", "/"); return path.endsWith("/") && path.length() > 1 ? path.substring(0, path.length() - 1) : path; } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); HttpRequest filter(HttpRequest input); String createStringToSign(String request, String hashedPath, String contentHash, String timestamp); String sign(String toSign); static final String SIGNING_DESCRIPTION; }
@Test void canonicalizedPathRemovesTrailingSlash() { assertEquals(signing_obj.canonicalPath("/path/"), "/path"); }
@VisibleForTesting String canonicalPath(String path) { path = path.replaceAll("\\/+", "/"); return path.endsWith("/") && path.length() > 1 ? path.substring(0, path.length() - 1) : path; }
SignedHeaderAuth implements HttpRequestFilter { @VisibleForTesting String canonicalPath(String path) { path = path.replaceAll("\\/+", "/"); return path.endsWith("/") && path.length() > 1 ? path.substring(0, path.length() - 1) : path; } }
SignedHeaderAuth implements HttpRequestFilter { @VisibleForTesting String canonicalPath(String path) { path = path.replaceAll("\\/+", "/"); return path.endsWith("/") && path.length() > 1 ? path.substring(0, path.length() - 1) : path; } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); }
SignedHeaderAuth implements HttpRequestFilter { @VisibleForTesting String canonicalPath(String path) { path = path.replaceAll("\\/+", "/"); return path.endsWith("/") && path.length() > 1 ? path.substring(0, path.length() - 1) : path; } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); HttpRequest filter(HttpRequest input); String createStringToSign(String request, String hashedPath, String contentHash, String timestamp); String sign(String toSign); }
SignedHeaderAuth implements HttpRequestFilter { @VisibleForTesting String canonicalPath(String path) { path = path.replaceAll("\\/+", "/"); return path.endsWith("/") && path.length() > 1 ? path.substring(0, path.length() - 1) : path; } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); HttpRequest filter(HttpRequest input); String createStringToSign(String request, String hashedPath, String contentHash, String timestamp); String sign(String toSign); static final String SIGNING_DESCRIPTION; }
@Test void shouldGenerateTheCorrectStringToSignAndSignatureWithNoBody() { HttpRequest request = HttpRequest.builder().method(HttpMethod.DELETE).endpoint("http: .build(); request = signing_obj.filter(request); Multimap<String, String> headersWithoutContentLength = LinkedHashMultimap.create(request.getHeaders()); assertEqualsNoOrder(headersWithoutContentLength.entries().toArray(), EXPECTED_SIGN_RESULT_EMPTY.entries() .toArray()); }
public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); }
SignedHeaderAuth implements HttpRequestFilter { public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); } }
SignedHeaderAuth implements HttpRequestFilter { public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); }
SignedHeaderAuth implements HttpRequestFilter { public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); HttpRequest filter(HttpRequest input); String createStringToSign(String request, String hashedPath, String contentHash, String timestamp); String sign(String toSign); }
SignedHeaderAuth implements HttpRequestFilter { public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); HttpRequest filter(HttpRequest input); String createStringToSign(String request, String hashedPath, String contentHash, String timestamp); String sign(String toSign); static final String SIGNING_DESCRIPTION; }
@Test void shouldNotChokeWhenSigningARequestForAResourceWithALongName() { StringBuilder path = new StringBuilder("nodes/"); for (int i = 0; i < 100; i++) path.append('A'); HttpRequest request = HttpRequest.builder().method(HttpMethod.PUT) .endpoint("http: signing_obj.filter(request); }
public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); }
SignedHeaderAuth implements HttpRequestFilter { public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); } }
SignedHeaderAuth implements HttpRequestFilter { public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); }
SignedHeaderAuth implements HttpRequestFilter { public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); HttpRequest filter(HttpRequest input); String createStringToSign(String request, String hashedPath, String contentHash, String timestamp); String sign(String toSign); }
SignedHeaderAuth implements HttpRequestFilter { public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); HttpRequest filter(HttpRequest input); String createStringToSign(String request, String hashedPath, String contentHash, String timestamp); String sign(String toSign); static final String SIGNING_DESCRIPTION; }
@Test void shouldReplacePercentage3FWithQuestionMarkAtUrl() { StringBuilder path = new StringBuilder("nodes/"); path.append("test/cookbooks/myCookBook%3Fnum_versions=5"); HttpRequest request = HttpRequest.builder().method(HttpMethod.GET) .endpoint("http: request = signing_obj.filter(request); assertTrue(request.getRequestLine().contains("?num_versions=5")); }
public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); }
SignedHeaderAuth implements HttpRequestFilter { public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); } }
SignedHeaderAuth implements HttpRequestFilter { public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); }
SignedHeaderAuth implements HttpRequestFilter { public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); HttpRequest filter(HttpRequest input); String createStringToSign(String request, String hashedPath, String contentHash, String timestamp); String sign(String toSign); }
SignedHeaderAuth implements HttpRequestFilter { public HttpRequest filter(HttpRequest input) throws HttpException { HttpRequest request = input.toBuilder().endpoint(input.getEndpoint().toString().replace("%3F", "?")).build(); String contentHash = hashBody(request.getPayload()); Multimap<String, String> headers = ArrayListMultimap.create(); headers.put("X-Ops-Content-Hash", contentHash); String timestamp = timeStampProvider.get(); String toSign = createStringToSign(request.getMethod(), hashPath(request.getEndpoint().getPath()), contentHash, timestamp); headers.put("X-Ops-Userid", creds.get().identity); headers.put("X-Ops-Sign", SIGNING_DESCRIPTION); request = calculateAndReplaceAuthorizationHeaders(request, toSign); headers.put("X-Ops-Timestamp", timestamp); utils.logRequest(signatureLog, request, "<<"); return request.toBuilder().replaceHeaders(headers).build(); } @Inject SignedHeaderAuth(SignatureWire signatureWire, @org.jclouds.location.Provider Supplier<Credentials> creds, Supplier<PrivateKey> supplyKey, @TimeStamp Provider<String> timeStampProvider, HttpUtils utils, Crypto crypto); HttpRequest filter(HttpRequest input); String createStringToSign(String request, String hashedPath, String contentHash, String timestamp); String sign(String toSign); static final String SIGNING_DESCRIPTION; }
@Test(expectedExceptions = NullPointerException.class) public void canNotAddEnvRunListMapThatIsNull() { Role.builder().envRunList((Map<String, List<String>>) null); }
public static Builder builder() { return new Builder(); }
Role { public static Builder builder() { return new Builder(); } }
Role { public static Builder builder() { return new Builder(); } @ConstructorProperties({ "name", "description", "default_attributes", "run_list", "override_attributes", "env_run_lists" }) protected Role(String name, String description, @Nullable Map<String, JsonBall> defaultAttributes, @Nullable List<String> runList, @Nullable Map<String, JsonBall> overrideAttributes, @Nullable Map<String, List<String>> envRunList); }
Role { public static Builder builder() { return new Builder(); } @ConstructorProperties({ "name", "description", "default_attributes", "run_list", "override_attributes", "env_run_lists" }) protected Role(String name, String description, @Nullable Map<String, JsonBall> defaultAttributes, @Nullable List<String> runList, @Nullable Map<String, JsonBall> overrideAttributes, @Nullable Map<String, List<String>> envRunList); static Builder builder(); String getName(); String getDescription(); Map<String, JsonBall> getOverrideAttributes(); Map<String, JsonBall> getDefaultAttributes(); List<String> getRunList(); Map<String, List<String>> getEnvRunList(); @Override int hashCode(); @Override boolean equals(Object obj); @Override String toString(); }
Role { public static Builder builder() { return new Builder(); } @ConstructorProperties({ "name", "description", "default_attributes", "run_list", "override_attributes", "env_run_lists" }) protected Role(String name, String description, @Nullable Map<String, JsonBall> defaultAttributes, @Nullable List<String> runList, @Nullable Map<String, JsonBall> overrideAttributes, @Nullable Map<String, List<String>> envRunList); static Builder builder(); String getName(); String getDescription(); Map<String, JsonBall> getOverrideAttributes(); Map<String, JsonBall> getDefaultAttributes(); List<String> getRunList(); Map<String, List<String>> getEnvRunList(); @Override int hashCode(); @Override boolean equals(Object obj); @Override String toString(); }
@Test(expectedExceptions = NullPointerException.class) public void canNotAddRunListForEnvironmentThatIsNull() { Role.builder().envRunList("does.not.matter", (List<String>) null); }
public static Builder builder() { return new Builder(); }
Role { public static Builder builder() { return new Builder(); } }
Role { public static Builder builder() { return new Builder(); } @ConstructorProperties({ "name", "description", "default_attributes", "run_list", "override_attributes", "env_run_lists" }) protected Role(String name, String description, @Nullable Map<String, JsonBall> defaultAttributes, @Nullable List<String> runList, @Nullable Map<String, JsonBall> overrideAttributes, @Nullable Map<String, List<String>> envRunList); }
Role { public static Builder builder() { return new Builder(); } @ConstructorProperties({ "name", "description", "default_attributes", "run_list", "override_attributes", "env_run_lists" }) protected Role(String name, String description, @Nullable Map<String, JsonBall> defaultAttributes, @Nullable List<String> runList, @Nullable Map<String, JsonBall> overrideAttributes, @Nullable Map<String, List<String>> envRunList); static Builder builder(); String getName(); String getDescription(); Map<String, JsonBall> getOverrideAttributes(); Map<String, JsonBall> getDefaultAttributes(); List<String> getRunList(); Map<String, List<String>> getEnvRunList(); @Override int hashCode(); @Override boolean equals(Object obj); @Override String toString(); }
Role { public static Builder builder() { return new Builder(); } @ConstructorProperties({ "name", "description", "default_attributes", "run_list", "override_attributes", "env_run_lists" }) protected Role(String name, String description, @Nullable Map<String, JsonBall> defaultAttributes, @Nullable List<String> runList, @Nullable Map<String, JsonBall> overrideAttributes, @Nullable Map<String, List<String>> envRunList); static Builder builder(); String getName(); String getDescription(); Map<String, JsonBall> getOverrideAttributes(); Map<String, JsonBall> getDefaultAttributes(); List<String> getRunList(); Map<String, List<String>> getEnvRunList(); @Override int hashCode(); @Override boolean equals(Object obj); @Override String toString(); }
@Test(expectedExceptions = NullPointerException.class) public void canNotUseNullEnvNameWhenAddingEnvRunListEntry() { Role.builder().envRunListElement((String) null, "does.not.matter"); }
public static Builder builder() { return new Builder(); }
Role { public static Builder builder() { return new Builder(); } }
Role { public static Builder builder() { return new Builder(); } @ConstructorProperties({ "name", "description", "default_attributes", "run_list", "override_attributes", "env_run_lists" }) protected Role(String name, String description, @Nullable Map<String, JsonBall> defaultAttributes, @Nullable List<String> runList, @Nullable Map<String, JsonBall> overrideAttributes, @Nullable Map<String, List<String>> envRunList); }
Role { public static Builder builder() { return new Builder(); } @ConstructorProperties({ "name", "description", "default_attributes", "run_list", "override_attributes", "env_run_lists" }) protected Role(String name, String description, @Nullable Map<String, JsonBall> defaultAttributes, @Nullable List<String> runList, @Nullable Map<String, JsonBall> overrideAttributes, @Nullable Map<String, List<String>> envRunList); static Builder builder(); String getName(); String getDescription(); Map<String, JsonBall> getOverrideAttributes(); Map<String, JsonBall> getDefaultAttributes(); List<String> getRunList(); Map<String, List<String>> getEnvRunList(); @Override int hashCode(); @Override boolean equals(Object obj); @Override String toString(); }
Role { public static Builder builder() { return new Builder(); } @ConstructorProperties({ "name", "description", "default_attributes", "run_list", "override_attributes", "env_run_lists" }) protected Role(String name, String description, @Nullable Map<String, JsonBall> defaultAttributes, @Nullable List<String> runList, @Nullable Map<String, JsonBall> overrideAttributes, @Nullable Map<String, List<String>> envRunList); static Builder builder(); String getName(); String getDescription(); Map<String, JsonBall> getOverrideAttributes(); Map<String, JsonBall> getDefaultAttributes(); List<String> getRunList(); Map<String, List<String>> getEnvRunList(); @Override int hashCode(); @Override boolean equals(Object obj); @Override String toString(); }
@Test(expectedExceptions = NullPointerException.class) public void canNotUseNullEntryWhenAddingEnvRunListEntry() { Role.builder().envRunListElement("does.not.matter", (String) null); }
public static Builder builder() { return new Builder(); }
Role { public static Builder builder() { return new Builder(); } }
Role { public static Builder builder() { return new Builder(); } @ConstructorProperties({ "name", "description", "default_attributes", "run_list", "override_attributes", "env_run_lists" }) protected Role(String name, String description, @Nullable Map<String, JsonBall> defaultAttributes, @Nullable List<String> runList, @Nullable Map<String, JsonBall> overrideAttributes, @Nullable Map<String, List<String>> envRunList); }
Role { public static Builder builder() { return new Builder(); } @ConstructorProperties({ "name", "description", "default_attributes", "run_list", "override_attributes", "env_run_lists" }) protected Role(String name, String description, @Nullable Map<String, JsonBall> defaultAttributes, @Nullable List<String> runList, @Nullable Map<String, JsonBall> overrideAttributes, @Nullable Map<String, List<String>> envRunList); static Builder builder(); String getName(); String getDescription(); Map<String, JsonBall> getOverrideAttributes(); Map<String, JsonBall> getDefaultAttributes(); List<String> getRunList(); Map<String, List<String>> getEnvRunList(); @Override int hashCode(); @Override boolean equals(Object obj); @Override String toString(); }
Role { public static Builder builder() { return new Builder(); } @ConstructorProperties({ "name", "description", "default_attributes", "run_list", "override_attributes", "env_run_lists" }) protected Role(String name, String description, @Nullable Map<String, JsonBall> defaultAttributes, @Nullable List<String> runList, @Nullable Map<String, JsonBall> overrideAttributes, @Nullable Map<String, List<String>> envRunList); static Builder builder(); String getName(); String getDescription(); Map<String, JsonBall> getOverrideAttributes(); Map<String, JsonBall> getDefaultAttributes(); List<String> getRunList(); Map<String, List<String>> getEnvRunList(); @Override int hashCode(); @Override boolean equals(Object obj); @Override String toString(); }
@Test(expectedExceptions = IllegalStateException.class) public void testFailWhenTooManyPasswords() throws UnknownHostException { InputStream is = getClass().getResourceAsStream("/test_credentials_list.json"); HttpResponse response = HttpResponse.builder().statusCode(200).message("ok").payload(is).build(); ParseCredentialsFromJsonResponse parser = i.getInstance(ParseCredentialsFromJsonResponse.class); parser.apply(response); }
@Override public Credentials apply(HttpResponse input) { Map<String, Credentials> returnVal = parser.apply(input); checkState(!(returnVal.size() > 1), "expecting only 1 credential in response, but had more: " + returnVal.keySet()); return (!returnVal.isEmpty()) ? Iterables.getOnlyElement(returnVal.values()) : null; }
ParseCredentialsFromJsonResponse implements Function<HttpResponse, Credentials> { @Override public Credentials apply(HttpResponse input) { Map<String, Credentials> returnVal = parser.apply(input); checkState(!(returnVal.size() > 1), "expecting only 1 credential in response, but had more: " + returnVal.keySet()); return (!returnVal.isEmpty()) ? Iterables.getOnlyElement(returnVal.values()) : null; } }
ParseCredentialsFromJsonResponse implements Function<HttpResponse, Credentials> { @Override public Credentials apply(HttpResponse input) { Map<String, Credentials> returnVal = parser.apply(input); checkState(!(returnVal.size() > 1), "expecting only 1 credential in response, but had more: " + returnVal.keySet()); return (!returnVal.isEmpty()) ? Iterables.getOnlyElement(returnVal.values()) : null; } @Inject ParseCredentialsFromJsonResponse( ParseServerNameToCredentialsMapFromJsonResponse parser); }
ParseCredentialsFromJsonResponse implements Function<HttpResponse, Credentials> { @Override public Credentials apply(HttpResponse input) { Map<String, Credentials> returnVal = parser.apply(input); checkState(!(returnVal.size() > 1), "expecting only 1 credential in response, but had more: " + returnVal.keySet()); return (!returnVal.isEmpty()) ? Iterables.getOnlyElement(returnVal.values()) : null; } @Inject ParseCredentialsFromJsonResponse( ParseServerNameToCredentialsMapFromJsonResponse parser); @Override Credentials apply(HttpResponse input); }
ParseCredentialsFromJsonResponse implements Function<HttpResponse, Credentials> { @Override public Credentials apply(HttpResponse input) { Map<String, Credentials> returnVal = parser.apply(input); checkState(!(returnVal.size() > 1), "expecting only 1 credential in response, but had more: " + returnVal.keySet()); return (!returnVal.isEmpty()) ? Iterables.getOnlyElement(returnVal.values()) : null; } @Inject ParseCredentialsFromJsonResponse( ParseServerNameToCredentialsMapFromJsonResponse parser); @Override Credentials apply(HttpResponse input); }
@Test public void testValid() throws UnknownHostException { InputStream is = getClass().getResourceAsStream("/test_credential.json"); HttpResponse response = HttpResponse.builder().statusCode(200).message("ok").payload(is).build(); ParseCredentialsFromJsonResponse parser = i.getInstance(ParseCredentialsFromJsonResponse.class); Credentials creds = parser.apply(response); assertEquals(creds.identity, "root"); assertEquals(creds.credential, "zot40ced"); }
@Override public Credentials apply(HttpResponse input) { Map<String, Credentials> returnVal = parser.apply(input); checkState(!(returnVal.size() > 1), "expecting only 1 credential in response, but had more: " + returnVal.keySet()); return (!returnVal.isEmpty()) ? Iterables.getOnlyElement(returnVal.values()) : null; }
ParseCredentialsFromJsonResponse implements Function<HttpResponse, Credentials> { @Override public Credentials apply(HttpResponse input) { Map<String, Credentials> returnVal = parser.apply(input); checkState(!(returnVal.size() > 1), "expecting only 1 credential in response, but had more: " + returnVal.keySet()); return (!returnVal.isEmpty()) ? Iterables.getOnlyElement(returnVal.values()) : null; } }
ParseCredentialsFromJsonResponse implements Function<HttpResponse, Credentials> { @Override public Credentials apply(HttpResponse input) { Map<String, Credentials> returnVal = parser.apply(input); checkState(!(returnVal.size() > 1), "expecting only 1 credential in response, but had more: " + returnVal.keySet()); return (!returnVal.isEmpty()) ? Iterables.getOnlyElement(returnVal.values()) : null; } @Inject ParseCredentialsFromJsonResponse( ParseServerNameToCredentialsMapFromJsonResponse parser); }
ParseCredentialsFromJsonResponse implements Function<HttpResponse, Credentials> { @Override public Credentials apply(HttpResponse input) { Map<String, Credentials> returnVal = parser.apply(input); checkState(!(returnVal.size() > 1), "expecting only 1 credential in response, but had more: " + returnVal.keySet()); return (!returnVal.isEmpty()) ? Iterables.getOnlyElement(returnVal.values()) : null; } @Inject ParseCredentialsFromJsonResponse( ParseServerNameToCredentialsMapFromJsonResponse parser); @Override Credentials apply(HttpResponse input); }
ParseCredentialsFromJsonResponse implements Function<HttpResponse, Credentials> { @Override public Credentials apply(HttpResponse input) { Map<String, Credentials> returnVal = parser.apply(input); checkState(!(returnVal.size() > 1), "expecting only 1 credential in response, but had more: " + returnVal.keySet()); return (!returnVal.isEmpty()) ? Iterables.getOnlyElement(returnVal.values()) : null; } @Inject ParseCredentialsFromJsonResponse( ParseServerNameToCredentialsMapFromJsonResponse parser); @Override Credentials apply(HttpResponse input); }