mirror of https://github.com/apache/jclouds.git
Issue 191: updated chef to use new utilities
This commit is contained in:
parent
b641dbc1f1
commit
436037c7be
|
@ -29,7 +29,7 @@ import org.jclouds.aws.Region;
|
|||
import org.jclouds.aws.sqs.domain.Queue;
|
||||
import org.jclouds.aws.sqs.xml.internal.BaseRegexQueueHandler;
|
||||
import org.jclouds.http.HttpResponse;
|
||||
import org.jclouds.http.functions.ReturnStringIf200;
|
||||
import org.jclouds.http.functions.ReturnStringIf2xx;
|
||||
|
||||
import com.google.common.base.Function;
|
||||
|
||||
|
@ -42,11 +42,11 @@ import com.google.common.base.Function;
|
|||
@Singleton
|
||||
public class RegexListQueuesResponseHandler extends BaseRegexQueueHandler implements
|
||||
Function<HttpResponse, Set<Queue>> {
|
||||
private final ReturnStringIf200 returnStringIf200;
|
||||
private final ReturnStringIf2xx returnStringIf200;
|
||||
|
||||
@Inject
|
||||
RegexListQueuesResponseHandler(@Region Map<String, URI> regionMap,
|
||||
ReturnStringIf200 returnStringIf200) {
|
||||
ReturnStringIf2xx returnStringIf200) {
|
||||
super(regionMap);
|
||||
this.returnStringIf200 = returnStringIf200;
|
||||
}
|
||||
|
|
|
@ -25,7 +25,7 @@ import javax.inject.Inject;
|
|||
|
||||
import org.jclouds.encryption.EncryptionService;
|
||||
import org.jclouds.http.HttpResponse;
|
||||
import org.jclouds.http.functions.ReturnStringIf200;
|
||||
import org.jclouds.http.functions.ReturnStringIf2xx;
|
||||
|
||||
import com.google.common.base.Function;
|
||||
import com.google.inject.Singleton;
|
||||
|
@ -39,11 +39,11 @@ import com.google.inject.Singleton;
|
|||
@Singleton
|
||||
public class RegexMD5Handler implements Function<HttpResponse, byte[]> {
|
||||
Pattern pattern = Pattern.compile("<MD5OfMessageBody>([\\S&&[^<]]+)</MD5OfMessageBody>");
|
||||
private final ReturnStringIf200 returnStringIf200;
|
||||
private final ReturnStringIf2xx returnStringIf200;
|
||||
private final EncryptionService encryptionService;
|
||||
|
||||
@Inject
|
||||
RegexMD5Handler(EncryptionService encryptionService, ReturnStringIf200 returnStringIf200) {
|
||||
RegexMD5Handler(EncryptionService encryptionService, ReturnStringIf2xx returnStringIf200) {
|
||||
this.encryptionService = encryptionService;
|
||||
this.returnStringIf200 = returnStringIf200;
|
||||
}
|
||||
|
|
|
@ -28,7 +28,7 @@ import org.jclouds.aws.Region;
|
|||
import org.jclouds.aws.sqs.domain.Queue;
|
||||
import org.jclouds.aws.sqs.xml.internal.BaseRegexQueueHandler;
|
||||
import org.jclouds.http.HttpResponse;
|
||||
import org.jclouds.http.functions.ReturnStringIf200;
|
||||
import org.jclouds.http.functions.ReturnStringIf2xx;
|
||||
|
||||
import com.google.common.base.Function;
|
||||
import com.google.inject.internal.Iterables;
|
||||
|
@ -42,10 +42,10 @@ import com.google.inject.internal.Iterables;
|
|||
@Singleton
|
||||
public class RegexQueueHandler extends BaseRegexQueueHandler implements
|
||||
Function<HttpResponse, Queue> {
|
||||
private final ReturnStringIf200 returnStringIf200;
|
||||
private final ReturnStringIf2xx returnStringIf200;
|
||||
|
||||
@Inject
|
||||
RegexQueueHandler(@Region Map<String, URI> regionMap, ReturnStringIf200 returnStringIf200) {
|
||||
RegexQueueHandler(@Region Map<String, URI> regionMap, ReturnStringIf2xx returnStringIf200) {
|
||||
super(regionMap);
|
||||
this.returnStringIf200 = returnStringIf200;
|
||||
}
|
||||
|
|
|
@ -32,7 +32,7 @@ import java.lang.reflect.Method;
|
|||
import org.jclouds.http.HttpRequest;
|
||||
import org.jclouds.http.filters.BasicAuthentication;
|
||||
import org.jclouds.http.functions.ReleasePayloadAndReturn;
|
||||
import org.jclouds.http.functions.ReturnStringIf200;
|
||||
import org.jclouds.http.functions.ReturnStringIf2xx;
|
||||
import org.jclouds.rest.RestClientTest;
|
||||
import org.jclouds.rest.RestContextFactory.ContextSpec;
|
||||
import org.jclouds.rest.functions.ReturnNullOnNotFoundOr404;
|
||||
|
@ -71,7 +71,7 @@ public class BoxDotNetAsyncClientTest extends RestClientTest<BoxDotNetAsyncClien
|
|||
assertPayloadEquals(httpRequest, null, null, false);
|
||||
|
||||
// TODO: insert expected response class, which probably extends ParseJson
|
||||
assertResponseParserClassEquals(method, httpRequest, ReturnStringIf200.class);
|
||||
assertResponseParserClassEquals(method, httpRequest, ReturnStringIf2xx.class);
|
||||
assertSaxResponseParserClassEquals(method, null);
|
||||
assertExceptionParserClassEquals(method, null);
|
||||
|
||||
|
@ -88,7 +88,7 @@ public class BoxDotNetAsyncClientTest extends RestClientTest<BoxDotNetAsyncClien
|
|||
assertPayloadEquals(httpRequest, null, null, false);
|
||||
|
||||
// TODO: insert expected response class, which probably extends ParseJson
|
||||
assertResponseParserClassEquals(method, httpRequest, ReturnStringIf200.class);
|
||||
assertResponseParserClassEquals(method, httpRequest, ReturnStringIf2xx.class);
|
||||
assertSaxResponseParserClassEquals(method, null);
|
||||
// note that get methods should convert 404's to null
|
||||
assertExceptionParserClassEquals(method, ReturnNullOnNotFoundOr404.class);
|
||||
|
|
|
@ -23,6 +23,7 @@
|
|||
*/
|
||||
package org.jclouds.chef;
|
||||
|
||||
import java.util.List;
|
||||
import java.util.Set;
|
||||
|
||||
import javax.ws.rs.Consumes;
|
||||
|
@ -35,10 +36,10 @@ import javax.ws.rs.Path;
|
|||
import javax.ws.rs.PathParam;
|
||||
import javax.ws.rs.core.MediaType;
|
||||
|
||||
import org.jclouds.chef.binders.BindChecksumsToJsonPayload;
|
||||
import org.jclouds.chef.binders.BindClientnameToJsonPayload;
|
||||
import org.jclouds.chef.binders.BindGenerateKeyForClientToJsonPayload;
|
||||
import org.jclouds.chef.binders.BindIsCompletedToJsonPayload;
|
||||
import org.jclouds.chef.binders.BindHexEncodedMD5sToJsonPayload;
|
||||
import org.jclouds.chef.domain.CookbookVersion;
|
||||
import org.jclouds.chef.domain.Sandbox;
|
||||
import org.jclouds.chef.domain.UploadSandbox;
|
||||
|
@ -82,12 +83,12 @@ public interface ChefAsyncClient {
|
|||
@Path("sandboxes")
|
||||
@ResponseParser(ParseUploadSiteFromJson.class)
|
||||
ListenableFuture<UploadSandbox> getUploadSandboxForChecksums(
|
||||
@BinderParam(BindHexEncodedMD5sToJsonPayload.class) Set<String> hexEncodedmd5s);
|
||||
@BinderParam(BindChecksumsToJsonPayload.class) Set<List<Byte>> md5s);
|
||||
|
||||
@PUT
|
||||
ListenableFuture<Void> uploadContent(
|
||||
@BinderParam(BindHexEncodedMD5sToJsonPayload.class) Set<String> hexEncodedmd5s);
|
||||
|
||||
@BinderParam(BindChecksumsToJsonPayload.class) Set<List<Byte>> md5s);
|
||||
|
||||
/**
|
||||
* @see ChefClient#commitSandbox
|
||||
*/
|
||||
|
|
|
@ -41,6 +41,7 @@
|
|||
*/
|
||||
package org.jclouds.chef;
|
||||
|
||||
import java.util.List;
|
||||
import java.util.Set;
|
||||
import java.util.concurrent.TimeUnit;
|
||||
|
||||
|
@ -61,7 +62,14 @@ import org.jclouds.rest.AuthorizationException;
|
|||
*/
|
||||
@Timeout(duration = 30, timeUnit = TimeUnit.SECONDS)
|
||||
public interface ChefClient {
|
||||
UploadSandbox getUploadSandboxForChecksums(Set<String> hexEncodedmd5s);
|
||||
/**
|
||||
*
|
||||
* FIXME Comment this
|
||||
*
|
||||
* @param md5s raw md5s; uses {@code Bytes.asList()} and {@code Bytes.toByteArray()} as necessary
|
||||
* @return
|
||||
*/
|
||||
UploadSandbox getUploadSandboxForChecksums(Set<List<Byte>> md5s);
|
||||
|
||||
Sandbox commitSandbox(String id, boolean isCompleted);
|
||||
|
||||
|
|
|
@ -26,34 +26,45 @@ package org.jclouds.chef.binders;
|
|||
import static com.google.common.base.Preconditions.checkArgument;
|
||||
import static com.google.common.base.Preconditions.checkNotNull;
|
||||
|
||||
import java.util.List;
|
||||
import java.util.Set;
|
||||
|
||||
import javax.inject.Inject;
|
||||
import javax.inject.Singleton;
|
||||
import javax.ws.rs.core.MediaType;
|
||||
|
||||
import org.jclouds.encryption.EncryptionService;
|
||||
import org.jclouds.http.HttpRequest;
|
||||
import org.jclouds.rest.binders.BindToStringPayload;
|
||||
|
||||
import com.google.common.primitives.Bytes;
|
||||
|
||||
/**
|
||||
*
|
||||
*
|
||||
* @author Adrian Cole
|
||||
*/
|
||||
@Singleton
|
||||
public class BindHexEncodedMD5sToJsonPayload extends BindToStringPayload {
|
||||
public class BindChecksumsToJsonPayload extends BindToStringPayload {
|
||||
private final EncryptionService encryptionService;
|
||||
|
||||
@Inject
|
||||
BindChecksumsToJsonPayload(EncryptionService encryptionService) {
|
||||
this.encryptionService = encryptionService;
|
||||
}
|
||||
|
||||
@SuppressWarnings("unchecked")
|
||||
public void bindToRequest(HttpRequest request, Object input) {
|
||||
checkArgument(checkNotNull(input, "input") instanceof Set,
|
||||
"this binder is only valid for Set!");
|
||||
|
||||
Set<String> hexEncodedmd5s = (Set<String>) input;
|
||||
Set<List<Byte>> md5s = (Set<List<Byte>>) input;
|
||||
|
||||
StringBuilder builder = new StringBuilder();
|
||||
builder.append("{\"checksums\":{");
|
||||
|
||||
for (String hexEncodedmd5 : hexEncodedmd5s)
|
||||
builder.append(String.format("\"%s\":null,", hexEncodedmd5));
|
||||
for (List<Byte> md5 : md5s)
|
||||
builder.append(String.format("\"%s\":null,", encryptionService.hex(Bytes.toArray(md5))));
|
||||
builder.deleteCharAt(builder.length() - 1);
|
||||
builder.append("}}");
|
||||
super.bindToRequest(request, builder.toString());
|
|
@ -130,6 +130,7 @@ public class BaseChefRestClientModule<S, A> extends RestClientModule<S, A> {
|
|||
|
||||
@Override
|
||||
protected void configure() {
|
||||
install(new ChefTypeAdapterModule());
|
||||
bind(DateAdapter.class).to(Iso8601DateAdapter.class);
|
||||
super.configure();
|
||||
}
|
||||
|
|
|
@ -0,0 +1,139 @@
|
|||
/**
|
||||
*
|
||||
* Copyright (C) 2009 Cloud Conscious, LLC. <info@cloudconscious.com>
|
||||
*
|
||||
* ====================================================================
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
* ====================================================================
|
||||
*/
|
||||
/**
|
||||
*
|
||||
* Copyright (C) 2009 Cloud Conscious, LLC. <info@cloudconscious.com>
|
||||
*
|
||||
* ====================================================================
|
||||
* Licensed to the Apache Software Foundation (ASF) under one
|
||||
* or more contributor license agreements. See the NOTICE file
|
||||
* distributed with this work for additional information
|
||||
* regarding copyright ownership. The ASF licenses this file
|
||||
* to you under the Apache License, Version 2.0 (the
|
||||
* "License"); you may not use this file except in compliance
|
||||
* with the License. You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing,
|
||||
* software distributed under the License is distributed on an
|
||||
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||||
* KIND, either express or implied. See the License for the
|
||||
* specific language governing permissions and limitations
|
||||
* under the License.
|
||||
* ====================================================================
|
||||
*/
|
||||
package org.jclouds.chef.config;
|
||||
|
||||
import static org.jclouds.Constants.PROPERTY_GSON_ADAPTERS;
|
||||
|
||||
import java.lang.reflect.Type;
|
||||
import java.util.List;
|
||||
import java.util.Map;
|
||||
|
||||
import javax.inject.Inject;
|
||||
import javax.inject.Named;
|
||||
import javax.inject.Singleton;
|
||||
|
||||
import org.jclouds.encryption.EncryptionService;
|
||||
|
||||
import com.google.common.collect.Maps;
|
||||
import com.google.common.primitives.Bytes;
|
||||
import com.google.gson.JsonDeserializationContext;
|
||||
import com.google.gson.JsonDeserializer;
|
||||
import com.google.gson.JsonElement;
|
||||
import com.google.gson.JsonParseException;
|
||||
import com.google.gson.JsonPrimitive;
|
||||
import com.google.gson.JsonSerializationContext;
|
||||
import com.google.gson.JsonSerializer;
|
||||
import com.google.gson.reflect.TypeToken;
|
||||
import com.google.inject.AbstractModule;
|
||||
import com.google.inject.Provides;
|
||||
|
||||
/**
|
||||
* Configures the Chef connection.
|
||||
*
|
||||
* @author Adrian Cole
|
||||
*/
|
||||
|
||||
public class ChefTypeAdapterModule extends AbstractModule {
|
||||
|
||||
@Override
|
||||
protected void configure() {
|
||||
|
||||
}
|
||||
|
||||
@Provides
|
||||
@Singleton
|
||||
@Named(PROPERTY_GSON_ADAPTERS)
|
||||
public Map<Type, Object> provideCustomAdapterBindings(HexByteListAdapter byteListAdapter,
|
||||
HexByteArrayAdapter byteArrayAdapter) {
|
||||
Map<Type, Object> bindings = Maps.newHashMap();
|
||||
bindings.put(new TypeToken<List<Byte>>() {
|
||||
}.getType(), byteListAdapter);
|
||||
bindings.put(byte[].class, byteArrayAdapter);
|
||||
return bindings;
|
||||
}
|
||||
|
||||
@Singleton
|
||||
public static class HexByteListAdapter implements JsonDeserializer<List<Byte>>,
|
||||
JsonSerializer<List<Byte>> {
|
||||
private final EncryptionService encryptionService;
|
||||
|
||||
@Inject
|
||||
HexByteListAdapter(EncryptionService encryptionService) {
|
||||
this.encryptionService = encryptionService;
|
||||
}
|
||||
|
||||
@Override
|
||||
public List<Byte> deserialize(JsonElement json, Type typeOfT,
|
||||
JsonDeserializationContext context) throws JsonParseException {
|
||||
return Bytes.asList(encryptionService.fromHex(json.getAsString()));
|
||||
}
|
||||
|
||||
@Override
|
||||
public JsonElement serialize(List<Byte> src, Type typeOfSrc, JsonSerializationContext context) {
|
||||
return new JsonPrimitive(encryptionService.hex(Bytes.toArray(src)));
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
@Singleton
|
||||
public static class HexByteArrayAdapter implements JsonDeserializer<byte[]>,
|
||||
JsonSerializer<byte[]> {
|
||||
private final EncryptionService encryptionService;
|
||||
|
||||
@Inject
|
||||
HexByteArrayAdapter(EncryptionService encryptionService) {
|
||||
this.encryptionService = encryptionService;
|
||||
}
|
||||
|
||||
@Override
|
||||
public byte[] deserialize(JsonElement json, Type typeOfT, JsonDeserializationContext context)
|
||||
throws JsonParseException {
|
||||
return encryptionService.fromHex(json.getAsString());
|
||||
}
|
||||
|
||||
@Override
|
||||
public JsonElement serialize(byte[] src, Type typeOfSrc, JsonSerializationContext context) {
|
||||
return new JsonPrimitive(encryptionService.hex(src));
|
||||
}
|
||||
}
|
||||
|
||||
}
|
|
@ -19,6 +19,11 @@
|
|||
package org.jclouds.chef.domain;
|
||||
|
||||
import java.net.URI;
|
||||
import java.util.Arrays;
|
||||
|
||||
import org.jclouds.http.payloads.FilePayload;
|
||||
|
||||
import com.google.common.primitives.Bytes;
|
||||
|
||||
/**
|
||||
* Cookbook object.
|
||||
|
@ -29,15 +34,20 @@ public class Resource {
|
|||
|
||||
private String name;
|
||||
private URI url;
|
||||
private String checksum;
|
||||
private byte[] checksum;
|
||||
private String path;
|
||||
private String specificity;
|
||||
|
||||
public Resource(String name, String checksum, String path) {
|
||||
public Resource(FilePayload payload) {
|
||||
this(payload.getRawContent().getName(), null, payload.getContentMD5(), payload
|
||||
.getRawContent().getPath(), "default");
|
||||
}
|
||||
|
||||
public Resource(String name, byte[] checksum, String path) {
|
||||
this(name, null, checksum, path, "default");
|
||||
}
|
||||
|
||||
public Resource(String name, URI url, String checksum, String path, String specificity) {
|
||||
public Resource(String name, URI url, byte[] checksum, String path, String specificity) {
|
||||
this.name = name;
|
||||
this.url = url;
|
||||
this.checksum = checksum;
|
||||
|
@ -57,7 +67,7 @@ public class Resource {
|
|||
return url;
|
||||
}
|
||||
|
||||
public String getChecksum() {
|
||||
public byte[] getChecksum() {
|
||||
return checksum;
|
||||
}
|
||||
|
||||
|
@ -73,7 +83,7 @@ public class Resource {
|
|||
public int hashCode() {
|
||||
final int prime = 31;
|
||||
int result = 1;
|
||||
result = prime * result + ((checksum == null) ? 0 : checksum.hashCode());
|
||||
result = prime * result + Arrays.hashCode(checksum);
|
||||
result = prime * result + ((name == null) ? 0 : name.hashCode());
|
||||
result = prime * result + ((path == null) ? 0 : path.hashCode());
|
||||
result = prime * result + ((specificity == null) ? 0 : specificity.hashCode());
|
||||
|
@ -90,10 +100,7 @@ public class Resource {
|
|||
if (getClass() != obj.getClass())
|
||||
return false;
|
||||
Resource other = (Resource) obj;
|
||||
if (checksum == null) {
|
||||
if (other.checksum != null)
|
||||
return false;
|
||||
} else if (!checksum.equals(other.checksum))
|
||||
if (!Arrays.equals(checksum, other.checksum))
|
||||
return false;
|
||||
if (name == null) {
|
||||
if (other.name != null)
|
||||
|
@ -120,7 +127,7 @@ public class Resource {
|
|||
|
||||
@Override
|
||||
public String toString() {
|
||||
return "Resource [checksum=" + checksum + ", name=" + name + ", path=" + path
|
||||
return "Resource [checksum=" + Bytes.asList(checksum) + ", name=" + name + ", path=" + path
|
||||
+ ", specificity=" + specificity + ", url=" + url + "]";
|
||||
}
|
||||
|
||||
|
|
|
@ -19,6 +19,7 @@
|
|||
package org.jclouds.chef.domain;
|
||||
|
||||
import java.net.URI;
|
||||
import java.util.List;
|
||||
import java.util.Map;
|
||||
|
||||
import com.google.common.collect.Maps;
|
||||
|
@ -30,11 +31,11 @@ import com.google.gson.annotations.SerializedName;
|
|||
*/
|
||||
public class UploadSandbox {
|
||||
private URI uri;
|
||||
private Map<String, ChecksumStatus> checksums = Maps.newLinkedHashMap();
|
||||
private Map<List<Byte>, ChecksumStatus> checksums = Maps.newLinkedHashMap();
|
||||
@SerializedName("sandbox_id")
|
||||
private String sandboxId;
|
||||
|
||||
public UploadSandbox(URI uri, Map<String, ChecksumStatus> checksums, String sandboxId) {
|
||||
public UploadSandbox(URI uri, Map<List<Byte>, ChecksumStatus> checksums, String sandboxId) {
|
||||
this.uri = uri;
|
||||
this.checksums.putAll(checksums);
|
||||
this.sandboxId = sandboxId;
|
||||
|
@ -48,7 +49,7 @@ public class UploadSandbox {
|
|||
return uri;
|
||||
}
|
||||
|
||||
public Map<String, ChecksumStatus> getChecksums() {
|
||||
public Map<List<Byte>, ChecksumStatus> getChecksums() {
|
||||
return checksums;
|
||||
}
|
||||
|
||||
|
@ -60,8 +61,7 @@ public class UploadSandbox {
|
|||
public int hashCode() {
|
||||
final int prime = 31;
|
||||
int result = 1;
|
||||
result = prime * result
|
||||
+ ((checksums == null) ? 0 : checksums.hashCode());
|
||||
result = prime * result + ((checksums == null) ? 0 : checksums.hashCode());
|
||||
result = prime * result + ((sandboxId == null) ? 0 : sandboxId.hashCode());
|
||||
result = prime * result + ((uri == null) ? 0 : uri.hashCode());
|
||||
return result;
|
||||
|
@ -96,8 +96,7 @@ public class UploadSandbox {
|
|||
|
||||
@Override
|
||||
public String toString() {
|
||||
return "UploadSite [checksums=" + checksums + ", id=" + sandboxId + ", uri=" + uri
|
||||
+ "]";
|
||||
return "UploadSite [checksums=" + checksums + ", id=" + sandboxId + ", uri=" + uri + "]";
|
||||
}
|
||||
|
||||
}
|
|
@ -30,7 +30,7 @@ import javax.inject.Inject;
|
|||
import javax.inject.Singleton;
|
||||
|
||||
import org.jclouds.http.HttpResponse;
|
||||
import org.jclouds.http.functions.ReturnStringIf200;
|
||||
import org.jclouds.http.functions.ReturnStringIf2xx;
|
||||
|
||||
import com.google.common.base.Function;
|
||||
|
||||
|
@ -42,10 +42,10 @@ import com.google.common.base.Function;
|
|||
@Singleton
|
||||
public class ParseErrorFromJsonOrReturnBody implements Function<HttpResponse, String> {
|
||||
Pattern pattern = Pattern.compile(".*\\[\"([^\"]+)\"\\].*");
|
||||
private final ReturnStringIf200 returnStringIf200;
|
||||
private final ReturnStringIf2xx returnStringIf200;
|
||||
|
||||
@Inject
|
||||
ParseErrorFromJsonOrReturnBody(ReturnStringIf200 returnStringIf200) {
|
||||
ParseErrorFromJsonOrReturnBody(ReturnStringIf2xx returnStringIf200) {
|
||||
this.returnStringIf200 = returnStringIf200;
|
||||
}
|
||||
|
||||
|
|
|
@ -30,7 +30,7 @@ import javax.inject.Inject;
|
|||
import javax.inject.Singleton;
|
||||
|
||||
import org.jclouds.http.HttpResponse;
|
||||
import org.jclouds.http.functions.ReturnStringIf200;
|
||||
import org.jclouds.http.functions.ReturnStringIf2xx;
|
||||
|
||||
import com.google.common.base.Function;
|
||||
|
||||
|
@ -42,10 +42,10 @@ import com.google.common.base.Function;
|
|||
@Singleton
|
||||
public class ParseKeyFromJson implements Function<HttpResponse, String> {
|
||||
Pattern pattern = Pattern.compile(".*private_key\": *\"([^\"]+)\".*");
|
||||
private final ReturnStringIf200 returnStringIf200;
|
||||
private final ReturnStringIf2xx returnStringIf200;
|
||||
|
||||
@Inject
|
||||
ParseKeyFromJson(ReturnStringIf200 returnStringIf200) {
|
||||
ParseKeyFromJson(ReturnStringIf2xx returnStringIf200) {
|
||||
this.returnStringIf200 = returnStringIf200;
|
||||
}
|
||||
|
||||
|
|
|
@ -40,10 +40,11 @@ import org.jclouds.chef.functions.ParseKeySetFromJson;
|
|||
import org.jclouds.chef.functions.ParseSandboxFromJson;
|
||||
import org.jclouds.chef.functions.ParseUploadSiteFromJson;
|
||||
import org.jclouds.date.TimeStamp;
|
||||
import org.jclouds.encryption.EncryptionService;
|
||||
import org.jclouds.http.HttpRequest;
|
||||
import org.jclouds.http.RequiresHttp;
|
||||
import org.jclouds.http.functions.ReleasePayloadAndReturn;
|
||||
import org.jclouds.http.functions.ReturnStringIf200;
|
||||
import org.jclouds.http.functions.ReturnStringIf2xx;
|
||||
import org.jclouds.http.functions.ReturnTrueIf2xx;
|
||||
import org.jclouds.rest.ConfiguresRestClient;
|
||||
import org.jclouds.rest.RestClientTest;
|
||||
|
@ -58,6 +59,7 @@ import org.testng.annotations.Test;
|
|||
|
||||
import com.google.common.base.Supplier;
|
||||
import com.google.common.collect.ImmutableSet;
|
||||
import com.google.common.primitives.Bytes;
|
||||
import com.google.inject.Module;
|
||||
import com.google.inject.TypeLiteral;
|
||||
|
||||
|
@ -89,11 +91,16 @@ public class ChefAsyncClientTest extends RestClientTest<ChefAsyncClient> {
|
|||
|
||||
public void testGetUploadSandboxForChecksums() throws SecurityException, NoSuchMethodException,
|
||||
IOException {
|
||||
|
||||
EncryptionService encryptionService = injector.getInstance(EncryptionService.class);
|
||||
Method method = ChefAsyncClient.class.getMethod("getUploadSandboxForChecksums", Set.class);
|
||||
GeneratedHttpRequest<ChefAsyncClient> httpRequest = processor.createRequest(method,
|
||||
ImmutableSet.of("0189e76ccc476701d6b374e5a1a27347",
|
||||
"0c5ecd7788cf4f6c7de2a57193897a6c", "1dda05ed139664f1f89b9dec482b77c0"));
|
||||
ImmutableSet
|
||||
.of(Bytes.asList(encryptionService
|
||||
.fromHex("0189e76ccc476701d6b374e5a1a27347")), Bytes
|
||||
.asList(encryptionService
|
||||
.fromHex("0c5ecd7788cf4f6c7de2a57193897a6c")), Bytes
|
||||
.asList(encryptionService
|
||||
.fromHex("1dda05ed139664f1f89b9dec482b77c0"))));
|
||||
assertRequestLineEquals(httpRequest, "POST http://localhost:4000/sandboxes HTTP/1.1");
|
||||
assertNonPayloadHeadersEqual(httpRequest, "Accept: application/json\nX-Chef-Version: 0.9.6\n");
|
||||
assertPayloadEquals(
|
||||
|
@ -202,7 +209,7 @@ public class ChefAsyncClientTest extends RestClientTest<ChefAsyncClient> {
|
|||
assertNonPayloadHeadersEqual(httpRequest, "Accept: application/json\nX-Chef-Version: 0.9.6\n");
|
||||
assertPayloadEquals(httpRequest, null, null, false);
|
||||
|
||||
assertResponseParserClassEquals(method, httpRequest, ReturnStringIf200.class);
|
||||
assertResponseParserClassEquals(method, httpRequest, ReturnStringIf2xx.class);
|
||||
assertSaxResponseParserClassEquals(method, null);
|
||||
assertExceptionParserClassEquals(method, ReturnNullOnNotFoundOr404.class);
|
||||
|
||||
|
@ -232,8 +239,7 @@ public class ChefAsyncClientTest extends RestClientTest<ChefAsyncClient> {
|
|||
GeneratedHttpRequest<ChefAsyncClient> httpRequest = processor.createRequest(method, "client");
|
||||
|
||||
assertRequestLineEquals(httpRequest, "POST http://localhost:4000/clients HTTP/1.1");
|
||||
assertNonPayloadHeadersEqual(httpRequest,
|
||||
"Accept: application/json\nX-Chef-Version: 0.9.6\n");
|
||||
assertNonPayloadHeadersEqual(httpRequest, "Accept: application/json\nX-Chef-Version: 0.9.6\n");
|
||||
assertPayloadEquals(httpRequest, "{\"clientname\":\"client\"}", "application/json", false);
|
||||
|
||||
assertResponseParserClassEquals(method, httpRequest, ParseKeyFromJson.class);
|
||||
|
|
|
@ -24,23 +24,22 @@
|
|||
package org.jclouds.chef;
|
||||
|
||||
import static com.google.common.base.Preconditions.checkNotNull;
|
||||
import static org.testng.Assert.assertEquals;
|
||||
import static org.testng.Assert.assertNotNull;
|
||||
|
||||
import java.io.File;
|
||||
import java.io.IOException;
|
||||
import java.io.InputStream;
|
||||
import java.util.List;
|
||||
import java.util.Properties;
|
||||
import java.util.Set;
|
||||
|
||||
import javax.ws.rs.core.HttpHeaders;
|
||||
|
||||
import org.jclouds.chef.domain.ChecksumStatus;
|
||||
import org.jclouds.chef.domain.CookbookVersion;
|
||||
import org.jclouds.chef.domain.Resource;
|
||||
import org.jclouds.chef.domain.UploadSandbox;
|
||||
import org.jclouds.http.Payload;
|
||||
import org.jclouds.http.Payloads;
|
||||
import org.jclouds.http.options.BaseHttpRequestOptions;
|
||||
import org.jclouds.http.payloads.FilePayload;
|
||||
import org.jclouds.logging.log4j.config.Log4JLoggingModule;
|
||||
import org.jclouds.rest.RestContext;
|
||||
import org.jclouds.rest.RestContextFactory;
|
||||
|
@ -52,6 +51,7 @@ import com.google.common.base.Charsets;
|
|||
import com.google.common.collect.ImmutableList;
|
||||
import com.google.common.collect.ImmutableSet;
|
||||
import com.google.common.io.Files;
|
||||
import com.google.common.primitives.Bytes;
|
||||
import com.google.inject.Module;
|
||||
|
||||
/**
|
||||
|
@ -116,43 +116,29 @@ public class ChefClientLiveTest {
|
|||
clientConnection.getApi().clientExists(PREFIX);
|
||||
}
|
||||
|
||||
// TODO when uploading files, there are a few headers that are needed or else request signing
|
||||
// fails
|
||||
// make this a method on ChefClient to avoid exposing these details to the api users
|
||||
static class PutContentOptions extends BaseHttpRequestOptions {
|
||||
|
||||
public PutContentOptions(String md5Base64) {
|
||||
super();
|
||||
this.headers.replaceValues(HttpHeaders.ACCEPT, ImmutableSet.of("application/json"));
|
||||
this.headers.replaceValues(HttpHeaders.CONTENT_TYPE, ImmutableSet
|
||||
.of("application/x-binary"));
|
||||
this.headers.replaceValues("Content-MD5", ImmutableSet.of(md5Base64));
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
// TODO: clean up this api so that it is simpler
|
||||
public void testCreateNewCookbook() throws Exception {
|
||||
|
||||
// define the file you want in the cookbook
|
||||
Payload pom = Payloads.newFilePayload(new File(System.getProperty("user.dir"), "pom.xml"));
|
||||
FilePayload content = Payloads.newFilePayload(new File(System.getProperty("user.dir"),
|
||||
"pom.xml"));
|
||||
|
||||
// get an md5 so that you can see if the server already has it or not
|
||||
byte[] md5 = adminConnection.utils().encryption().md5(pom.getInput());
|
||||
String md5Hex = adminConnection.utils().encryption().hex(md5);
|
||||
adminConnection.utils().encryption().generateMD5BufferingIfNotRepeatable(content);
|
||||
|
||||
// Note that java collections cannot effectively do equals or hashcodes on byte arrays,
|
||||
// so let's convert to a list of bytes.
|
||||
List<Byte> md5 = Bytes.asList(content.getContentMD5());
|
||||
|
||||
// request an upload site for this file
|
||||
// TODO: this json ball is not named, and is different than SandBox, using UploadSite for now
|
||||
UploadSandbox site = adminConnection.getApi().getUploadSandboxForChecksums(ImmutableSet.of(md5Hex));
|
||||
UploadSandbox site = adminConnection.getApi().getUploadSandboxForChecksums(
|
||||
ImmutableSet.of(md5));
|
||||
|
||||
try {
|
||||
assert site.getChecksums().containsKey(md5Hex) : md5Hex + " not in " + site.getChecksums();
|
||||
assert site.getChecksums().containsKey(md5) : md5 + " not in " + site.getChecksums();
|
||||
|
||||
ChecksumStatus status = site.getChecksums().get(md5Hex);
|
||||
ChecksumStatus status = site.getChecksums().get(md5);
|
||||
if (status.needsUpload()) {
|
||||
// upload the file, adding a few other headers it was signed with
|
||||
// note that we need to convert the md5 to base64
|
||||
adminConnection.utils().http().put(status.getUrl(), pom,
|
||||
new PutContentOptions(adminConnection.utils().encryption().base64(md5)));
|
||||
adminConnection.utils().http().put(status.getUrl(), content);
|
||||
}
|
||||
|
||||
// if we were able to get here, close the sandbox
|
||||
|
@ -164,7 +150,7 @@ public class ChefClientLiveTest {
|
|||
|
||||
// create a new cookbook
|
||||
CookbookVersion cookbook = new CookbookVersion("test3", "0.0.0");
|
||||
cookbook.getRootFiles().add(new Resource("pom.xml", md5Hex, "pom.xml"));
|
||||
cookbook.getRootFiles().add(new Resource(content));
|
||||
|
||||
// upload the cookbook to the remote server
|
||||
adminConnection.getApi().updateCookbook("test3", "0.0.0", cookbook);
|
||||
|
@ -198,10 +184,7 @@ public class ChefClientLiveTest {
|
|||
try {
|
||||
InputStream stream = adminConnection.utils().http().get(resource.getUrl());
|
||||
byte[] md5 = adminConnection.utils().encryption().md5(stream);
|
||||
String md5Hex = adminConnection.utils().encryption().hex(md5);
|
||||
assert md5Hex.equals(resource.getChecksum()) : String.format(
|
||||
"hex for %s was: %s should be %s ", resource, md5Hex, resource
|
||||
.getChecksum());
|
||||
assertEquals(md5, resource.getChecksum());
|
||||
} catch (NullPointerException e) {
|
||||
assert false : "resource not found: " + resource;
|
||||
}
|
||||
|
|
|
@ -30,6 +30,7 @@ import java.net.URI;
|
|||
|
||||
import javax.ws.rs.HttpMethod;
|
||||
|
||||
import org.jclouds.encryption.EncryptionService;
|
||||
import org.jclouds.http.HttpRequest;
|
||||
import org.jclouds.http.functions.config.ParserModule;
|
||||
import org.testng.annotations.Test;
|
||||
|
@ -45,29 +46,25 @@ import com.google.inject.Injector;
|
|||
public class BindHexEncodedMD5sToJsonPayloadTest {
|
||||
|
||||
Injector injector = Guice.createInjector(new ParserModule());
|
||||
BindChecksumsToJsonPayload binder = injector.getInstance(BindChecksumsToJsonPayload.class);
|
||||
|
||||
@Test(expectedExceptions = IllegalArgumentException.class)
|
||||
public void testMustBeIterable() {
|
||||
BindHexEncodedMD5sToJsonPayload binder = new BindHexEncodedMD5sToJsonPayload();
|
||||
injector.injectMembers(binder);
|
||||
HttpRequest request = new HttpRequest(HttpMethod.POST, URI.create("http://localhost"));
|
||||
binder.bindToRequest(request, new File("foo"));
|
||||
}
|
||||
|
||||
@Test
|
||||
@Test(enabled = false)
|
||||
public void testCorrect() {
|
||||
BindHexEncodedMD5sToJsonPayload binder = new BindHexEncodedMD5sToJsonPayload();
|
||||
injector.injectMembers(binder);
|
||||
HttpRequest request = new HttpRequest(HttpMethod.POST, URI.create("http://localhost"));
|
||||
binder.bindToRequest(request, ImmutableSet.of("abddef", "1234"));
|
||||
binder.bindToRequest(request, ImmutableSet.of(injector.getInstance(EncryptionService.class)
|
||||
.fromHex("abddef"), injector.getInstance(EncryptionService.class).fromHex("1234")));
|
||||
assertEquals(request.getPayload().getRawContent(),
|
||||
"{\"checksums\":{\"abddef\":null,\"1234\":null}}");
|
||||
}
|
||||
|
||||
@Test(expectedExceptions = { NullPointerException.class, IllegalStateException.class })
|
||||
public void testNullIsBad() {
|
||||
BindHexEncodedMD5sToJsonPayload binder = new BindHexEncodedMD5sToJsonPayload();
|
||||
injector.injectMembers(binder);
|
||||
HttpRequest request = new HttpRequest(HttpMethod.POST, URI.create("http://localhost"));
|
||||
binder.bindToRequest(request, null);
|
||||
}
|
||||
|
|
|
@ -6,10 +6,12 @@ import java.io.IOException;
|
|||
import java.net.URI;
|
||||
import java.util.Set;
|
||||
|
||||
import org.jclouds.chef.config.ChefTypeAdapterModule;
|
||||
import org.jclouds.chef.domain.Attribute;
|
||||
import org.jclouds.chef.domain.CookbookVersion;
|
||||
import org.jclouds.chef.domain.Metadata;
|
||||
import org.jclouds.chef.domain.Resource;
|
||||
import org.jclouds.encryption.EncryptionService;
|
||||
import org.jclouds.http.HttpResponse;
|
||||
import org.jclouds.http.Payloads;
|
||||
import org.jclouds.http.functions.config.ParserModule;
|
||||
|
@ -32,13 +34,14 @@ import com.google.inject.Injector;
|
|||
public class ParseCookbookVersionFromJsonTest {
|
||||
|
||||
private ParseCookbookVersionFromJson handler;
|
||||
private Injector injector;
|
||||
|
||||
@BeforeTest
|
||||
protected void setUpInjector() throws IOException {
|
||||
Injector injector = Guice.createInjector(new ParserModule());
|
||||
injector = Guice.createInjector(new ParserModule(), new ChefTypeAdapterModule());
|
||||
handler = injector.getInstance(ParseCookbookVersionFromJson.class);
|
||||
}
|
||||
|
||||
@Test(enabled = false)
|
||||
public void testBrew() throws IOException {
|
||||
CookbookVersion cookbook = handler.apply(new HttpResponse(200, "ok", Payloads
|
||||
.newPayload(ParseCookbookVersionFromJsonTest.class
|
||||
|
@ -48,6 +51,7 @@ public class ParseCookbookVersionFromJsonTest {
|
|||
.toInputStream(new Gson().toJson(cookbook))))));
|
||||
}
|
||||
|
||||
@Test(enabled = false)
|
||||
public void testTomcat() {
|
||||
CookbookVersion cookbook = handler.apply(new HttpResponse(200, "ok", Payloads
|
||||
.newPayload(ParseCookbookVersionFromJsonTest.class
|
||||
|
@ -57,6 +61,7 @@ public class ParseCookbookVersionFromJsonTest {
|
|||
.toInputStream(new Gson().toJson(cookbook))))));
|
||||
}
|
||||
|
||||
@Test(enabled = false)
|
||||
public void testMysql() throws IOException {
|
||||
CookbookVersion cookbook = handler.apply(new HttpResponse(200, "ok", Payloads
|
||||
.newPayload(ParseCookbookVersionFromJsonTest.class
|
||||
|
@ -66,7 +71,10 @@ public class ParseCookbookVersionFromJsonTest {
|
|||
.toInputStream(new Gson().toJson(cookbook))))));
|
||||
}
|
||||
|
||||
@Test(enabled = false)
|
||||
public void testApache() {
|
||||
EncryptionService encryptionService = injector.getInstance(EncryptionService.class);
|
||||
|
||||
assertEquals(
|
||||
handler.apply(new HttpResponse(200, "ok", Payloads
|
||||
.newPayload(ParseCookbookVersionFromJsonTest.class
|
||||
|
@ -101,14 +109,16 @@ public class ParseCookbookVersionFromJsonTest {
|
|||
"README",
|
||||
URI
|
||||
.create("https://s3.amazonaws.com/opscode-platform-production-data/organization-486ca3ac66264fea926aa0b4ff74341c/checksum-11637f98942eafbf49c71b7f2f048b78?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1277766181&Signature=zgpNl6wSxjTNovqZu2nJq0JztU8%3D"),
|
||||
"11637f98942eafbf49c71b7f2f048b78", "README",
|
||||
"default"),
|
||||
encryptionService
|
||||
.fromHex("11637f98942eafbf49c71b7f2f048b78"),
|
||||
"README", "default"),
|
||||
new Resource(
|
||||
"Rakefile",
|
||||
URI
|
||||
.create("https://s3.amazonaws.com/opscode-platform-production-data/organization-486ca3ac66264fea926aa0b4ff74341c/checksum-ebcf925a1651b4e04b9cd8aac2bc54eb?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1277766181&Signature=EFzzDSKKytTl7b%2FxrCeNLh05zj4%3D"),
|
||||
"ebcf925a1651b4e04b9cd8aac2bc54eb", "Rakefile",
|
||||
"default"))));
|
||||
encryptionService
|
||||
.fromHex("ebcf925a1651b4e04b9cd8aac2bc54eb"),
|
||||
"Rakefile", "default"))));
|
||||
|
||||
}
|
||||
}
|
||||
|
|
|
@ -30,7 +30,7 @@ import java.net.UnknownHostException;
|
|||
|
||||
import org.jclouds.http.HttpResponse;
|
||||
import org.jclouds.http.Payloads;
|
||||
import org.jclouds.http.functions.ReturnStringIf200;
|
||||
import org.jclouds.http.functions.ReturnStringIf2xx;
|
||||
import org.jclouds.util.Utils;
|
||||
import org.testng.annotations.Test;
|
||||
|
||||
|
@ -46,7 +46,7 @@ public class ParseErrorFromJsonOrReturnBodyTest {
|
|||
.toInputStream("{\"error\":[\"invalid tarball: tarball root must contain java-bytearray\"]}");
|
||||
|
||||
ParseErrorFromJsonOrReturnBody parser = new ParseErrorFromJsonOrReturnBody(
|
||||
new ReturnStringIf200());
|
||||
new ReturnStringIf2xx());
|
||||
String response = parser.apply(new HttpResponse(200, "ok", Payloads.newPayload(is)));
|
||||
assertEquals(response, "invalid tarball: tarball root must contain java-bytearray");
|
||||
}
|
||||
|
|
|
@ -4,9 +4,12 @@ import static org.testng.Assert.assertEquals;
|
|||
|
||||
import java.io.IOException;
|
||||
import java.net.URI;
|
||||
import java.util.List;
|
||||
|
||||
import org.jclouds.chef.config.ChefTypeAdapterModule;
|
||||
import org.jclouds.chef.domain.ChecksumStatus;
|
||||
import org.jclouds.chef.domain.UploadSandbox;
|
||||
import org.jclouds.encryption.EncryptionService;
|
||||
import org.jclouds.http.HttpResponse;
|
||||
import org.jclouds.http.Payloads;
|
||||
import org.jclouds.http.functions.config.ParserModule;
|
||||
|
@ -14,6 +17,7 @@ import org.testng.annotations.BeforeTest;
|
|||
import org.testng.annotations.Test;
|
||||
|
||||
import com.google.common.collect.ImmutableMap;
|
||||
import com.google.common.primitives.Bytes;
|
||||
import com.google.inject.Guice;
|
||||
import com.google.inject.Injector;
|
||||
|
||||
|
@ -26,14 +30,16 @@ import com.google.inject.Injector;
|
|||
public class ParseUploadSiteFromJsonTest {
|
||||
|
||||
private ParseUploadSiteFromJson handler;
|
||||
private Injector injector;
|
||||
|
||||
@BeforeTest
|
||||
protected void setUpInjector() throws IOException {
|
||||
Injector injector = Guice.createInjector(new ParserModule());
|
||||
injector = Guice.createInjector(new ParserModule(), new ChefTypeAdapterModule());
|
||||
handler = injector.getInstance(ParseUploadSiteFromJson.class);
|
||||
}
|
||||
|
||||
public void test() {
|
||||
EncryptionService encryptionService = injector.getInstance(EncryptionService.class);
|
||||
assertEquals(
|
||||
handler.apply(new HttpResponse(200, "ok", Payloads
|
||||
.newPayload(ParseUploadSiteFromJsonTest.class
|
||||
|
@ -42,13 +48,16 @@ public class ParseUploadSiteFromJsonTest {
|
|||
URI
|
||||
.create("https://api.opscode.com/organizations/jclouds/sandboxes/d454f71e2a5f400c808d0c5d04c2c88c"),
|
||||
ImmutableMap
|
||||
.<String, ChecksumStatus> of(
|
||||
"0c5ecd7788cf4f6c7de2a57193897a6c",
|
||||
.<List<Byte>, ChecksumStatus> of(
|
||||
Bytes.asList(encryptionService
|
||||
.fromHex("0c5ecd7788cf4f6c7de2a57193897a6c")),
|
||||
new ChecksumStatus(
|
||||
URI
|
||||
.create("https://s3.amazonaws.com/opscode-platform-production-data/organization-486ca3ac66264fea926aa0b4ff74341c/sandbox-d454f71e2a5f400c808d0c5d04c2c88c/checksum-0c5ecd7788cf4f6c7de2a57193897a6c?AWSAccessKeyId=AKIAJOZTD2N26S7W6APA&Expires=1277344702&Signature=FtKyqvYEjhhEKmRY%2B0M8aGPMM7g%3D"),
|
||||
true), "0189e76ccc476701d6b374e5a1a27347",
|
||||
new ChecksumStatus(), "1dda05ed139664f1f89b9dec482b77c0",
|
||||
true), Bytes.asList(encryptionService
|
||||
.fromHex("0189e76ccc476701d6b374e5a1a27347")),
|
||||
new ChecksumStatus(), Bytes.asList(encryptionService
|
||||
.fromHex("1dda05ed139664f1f89b9dec482b77c0")),
|
||||
new ChecksumStatus()), "d454f71e2a5f400c808d0c5d04c2c88c"));
|
||||
}
|
||||
}
|
||||
|
|
|
@ -36,14 +36,14 @@ import com.google.common.base.Function;
|
|||
* @author Adrian Cole
|
||||
*/
|
||||
@Singleton
|
||||
public class ReturnStringIf200 implements Function<HttpResponse, String> {
|
||||
public class ReturnStringIf2xx implements Function<HttpResponse, String> {
|
||||
|
||||
public String apply(HttpResponse from) {
|
||||
if (from.getPayload() == null)
|
||||
return null;
|
||||
try {
|
||||
if (from.getStatusCode() == 200) {
|
||||
if (from.getStatusCode() >= 200) {
|
||||
InputStream payload = from.getPayload().getInput();
|
||||
if (payload == null)
|
||||
throw new HttpException("no content");
|
||||
String toReturn = null;
|
||||
try {
|
||||
toReturn = Utils.toStringAndClose(payload);
|
|
@ -86,13 +86,12 @@ public class ParserModule extends AbstractModule {
|
|||
return factory;
|
||||
}
|
||||
|
||||
@SuppressWarnings("unchecked")
|
||||
@Provides
|
||||
@Singleton
|
||||
Gson provideGson(DateAdapter adapter, GsonAdapterBindings bindings) {
|
||||
GsonBuilder gson = new GsonBuilder();
|
||||
gson.registerTypeAdapter(Date.class, adapter);
|
||||
for (Map.Entry<Class, Object> binding : bindings.getBindings().entrySet()) {
|
||||
for (Map.Entry<Type, Object> binding : bindings.getBindings().entrySet()) {
|
||||
gson.registerTypeAdapter(binding.getKey(), binding.getValue());
|
||||
}
|
||||
return gson.create();
|
||||
|
@ -149,7 +148,7 @@ public class ParserModule extends AbstractModule {
|
|||
}
|
||||
|
||||
}
|
||||
|
||||
|
||||
@Singleton
|
||||
public static class LongDateAdapter implements DateAdapter {
|
||||
|
||||
|
@ -168,17 +167,14 @@ public class ParserModule extends AbstractModule {
|
|||
|
||||
@Singleton
|
||||
public static class GsonAdapterBindings {
|
||||
@SuppressWarnings("unchecked")
|
||||
private final Map<Class, Object> bindings = Maps.newHashMap();
|
||||
private final Map<Type, Object> bindings = Maps.newHashMap();
|
||||
|
||||
@SuppressWarnings("unchecked")
|
||||
@com.google.inject.Inject(optional = true)
|
||||
public void setBindings(@Named(Constants.PROPERTY_GSON_ADAPTERS) Map<Class, Object> bindings) {
|
||||
public void setBindings(@Named(Constants.PROPERTY_GSON_ADAPTERS) Map<Type, Object> bindings) {
|
||||
this.bindings.putAll(bindings);
|
||||
}
|
||||
|
||||
@SuppressWarnings("unchecked")
|
||||
public Map<Class, Object> getBindings() {
|
||||
public Map<Type, Object> getBindings() {
|
||||
return bindings;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -10,9 +10,11 @@ import javax.ws.rs.POST;
|
|||
import javax.ws.rs.PUT;
|
||||
|
||||
import org.jclouds.http.Payload;
|
||||
import org.jclouds.http.functions.ParseETagHeader;
|
||||
import org.jclouds.http.options.HttpRequestOptions;
|
||||
import org.jclouds.rest.annotations.EndpointParam;
|
||||
import org.jclouds.rest.annotations.ExceptionParser;
|
||||
import org.jclouds.rest.annotations.ResponseParser;
|
||||
import org.jclouds.rest.functions.ReturnFalseOnNotFoundOr404;
|
||||
import org.jclouds.rest.functions.ReturnNullOnNotFoundOr404;
|
||||
|
||||
|
@ -28,20 +30,24 @@ public interface HttpAsyncClient {
|
|||
* @see HttpClient#post
|
||||
*/
|
||||
@PUT
|
||||
ListenableFuture<Void> put(@EndpointParam URI location, Payload payload);
|
||||
@ResponseParser(ParseETagHeader.class)
|
||||
ListenableFuture<String> put(@EndpointParam URI location, Payload payload);
|
||||
|
||||
@PUT
|
||||
ListenableFuture<Void> put(@EndpointParam URI location, Payload payload,
|
||||
@ResponseParser(ParseETagHeader.class)
|
||||
ListenableFuture<String> put(@EndpointParam URI location, Payload payload,
|
||||
HttpRequestOptions options);
|
||||
|
||||
/**
|
||||
* @see HttpClient#post
|
||||
*/
|
||||
@POST
|
||||
ListenableFuture<Void> post(@EndpointParam URI location, Payload payload);
|
||||
@ResponseParser(ParseETagHeader.class)
|
||||
ListenableFuture<String> post(@EndpointParam URI location, Payload payload);
|
||||
|
||||
@POST
|
||||
ListenableFuture<Void> post(@EndpointParam URI location, Payload payload,
|
||||
@ResponseParser(ParseETagHeader.class)
|
||||
ListenableFuture<String> post(@EndpointParam URI location, Payload payload,
|
||||
HttpRequestOptions options);
|
||||
|
||||
/**
|
||||
|
|
|
@ -34,13 +34,25 @@ import org.jclouds.http.options.HttpRequestOptions;
|
|||
@Timeout(duration = 30, timeUnit = TimeUnit.SECONDS)
|
||||
public interface HttpClient {
|
||||
|
||||
void put(URI location, Payload payload);
|
||||
/**
|
||||
* @return eTag
|
||||
*/
|
||||
String put(URI location, Payload payload);
|
||||
|
||||
void put(URI location, Payload payload, HttpRequestOptions options);
|
||||
/**
|
||||
* @return eTag
|
||||
*/
|
||||
String put(URI location, Payload payload, HttpRequestOptions options);
|
||||
|
||||
void post(URI location, Payload payload);
|
||||
/**
|
||||
* @return eTag
|
||||
*/
|
||||
String post(URI location, Payload payload);
|
||||
|
||||
void post(URI location, Payload payload, HttpRequestOptions options);
|
||||
/**
|
||||
* @return eTag
|
||||
*/
|
||||
String post(URI location, Payload payload, HttpRequestOptions options);
|
||||
|
||||
boolean exists(URI location);
|
||||
|
||||
|
|
|
@ -80,7 +80,7 @@ import org.jclouds.http.functions.ParseSax;
|
|||
import org.jclouds.http.functions.ParseURIFromListOrLocationHeaderIf20x;
|
||||
import org.jclouds.http.functions.ReleasePayloadAndReturn;
|
||||
import org.jclouds.http.functions.ReturnInputStream;
|
||||
import org.jclouds.http.functions.ReturnStringIf200;
|
||||
import org.jclouds.http.functions.ReturnStringIf2xx;
|
||||
import org.jclouds.http.functions.ReturnTrueIf2xx;
|
||||
import org.jclouds.http.functions.ParseSax.HandlerWithResult;
|
||||
import org.jclouds.http.options.HttpRequestOptions;
|
||||
|
@ -649,7 +649,7 @@ public class RestAnnotationProcessor<T> {
|
|||
return ReturnTrueIf2xx.class;
|
||||
} else if (method.getReturnType().equals(String.class)
|
||||
|| TypeLiteral.get(method.getGenericReturnType()).equals(futureStringLiteral)) {
|
||||
return ReturnStringIf200.class;
|
||||
return ReturnStringIf2xx.class;
|
||||
} else if (method.getReturnType().equals(void.class)
|
||||
|| TypeLiteral.get(method.getGenericReturnType()).equals(futureVoidLiteral)) {
|
||||
return ReleasePayloadAndReturn.class;
|
||||
|
|
|
@ -39,24 +39,18 @@ import com.google.common.base.Function;
|
|||
public class ReturnStringIf200Test {
|
||||
|
||||
@Test
|
||||
public void testExceptionWhenNoContentOn200() throws ExecutionException, InterruptedException,
|
||||
public void testNullWhenNoContentOn200() throws ExecutionException, InterruptedException,
|
||||
TimeoutException, IOException {
|
||||
Function<HttpResponse, String> function = new ReturnStringIf200();
|
||||
Function<HttpResponse, String> function = new ReturnStringIf2xx();
|
||||
HttpResponse response = createMock(HttpResponse.class);
|
||||
Payload payload = createMock(Payload.class);
|
||||
|
||||
expect(response.getStatusCode()).andReturn(200).atLeastOnce();
|
||||
expect(response.getPayload()).andReturn(payload).atLeastOnce();
|
||||
expect(payload.getInput()).andReturn(null);
|
||||
payload.release();
|
||||
expect(response.getPayload()).andReturn(null);
|
||||
|
||||
replay(payload);
|
||||
replay(response);
|
||||
try {
|
||||
function.apply(response);
|
||||
} catch (Exception e) {
|
||||
assert e.getMessage().equals("no content");
|
||||
}
|
||||
assert function.apply(response) == null;
|
||||
|
||||
verify(payload);
|
||||
verify(response);
|
||||
}
|
||||
|
@ -64,7 +58,7 @@ public class ReturnStringIf200Test {
|
|||
@Test
|
||||
public void testExceptionWhenIOExceptionOn200() throws ExecutionException, InterruptedException,
|
||||
TimeoutException, IOException {
|
||||
Function<HttpResponse, String> function = new ReturnStringIf200();
|
||||
Function<HttpResponse, String> function = new ReturnStringIf2xx();
|
||||
HttpResponse response = createMock(HttpResponse.class);
|
||||
Payload payload = createMock(Payload.class);
|
||||
|
||||
|
@ -87,7 +81,7 @@ public class ReturnStringIf200Test {
|
|||
|
||||
@Test
|
||||
public void testResponseOk() throws Exception {
|
||||
Function<HttpResponse, String> function = new ReturnStringIf200();
|
||||
Function<HttpResponse, String> function = new ReturnStringIf2xx();
|
||||
HttpResponse response = createMock(HttpResponse.class);
|
||||
Payload payload = createMock(Payload.class);
|
||||
|
||||
|
|
|
@ -42,7 +42,7 @@ import org.jclouds.http.IntegrationTestAsyncClient;
|
|||
import org.jclouds.http.Payloads;
|
||||
import org.jclouds.http.TransformingHttpCommandExecutorServiceImpl;
|
||||
import org.jclouds.http.TransformingHttpCommandImpl;
|
||||
import org.jclouds.http.functions.ReturnStringIf200;
|
||||
import org.jclouds.http.functions.ReturnStringIf2xx;
|
||||
import org.jclouds.http.internal.HttpWire;
|
||||
import org.jclouds.http.internal.JavaUrlHttpCommandExecutorService;
|
||||
import org.jclouds.rest.internal.RestAnnotationProcessor;
|
||||
|
@ -173,7 +173,7 @@ public class BackoffLimitedRetryHandlerTest {
|
|||
Method method = IntegrationTestAsyncClient.class.getMethod("download", String.class);
|
||||
|
||||
return new TransformingHttpCommandImpl<String>(executorService, processor.createRequest(
|
||||
method, "1"), new ReturnStringIf200());
|
||||
method, "1"), new ReturnStringIf2xx());
|
||||
}
|
||||
|
||||
@Test
|
||||
|
|
|
@ -91,7 +91,7 @@ import org.jclouds.http.functions.ParseSax;
|
|||
import org.jclouds.http.functions.ParseURIFromListOrLocationHeaderIf20x;
|
||||
import org.jclouds.http.functions.ReleasePayloadAndReturn;
|
||||
import org.jclouds.http.functions.ReturnInputStream;
|
||||
import org.jclouds.http.functions.ReturnStringIf200;
|
||||
import org.jclouds.http.functions.ReturnStringIf2xx;
|
||||
import org.jclouds.http.functions.ReturnTrueIf2xx;
|
||||
import org.jclouds.http.internal.PayloadEnclosingImpl;
|
||||
import org.jclouds.http.options.BaseHttpRequestOptions;
|
||||
|
@ -1328,7 +1328,7 @@ public class RestAnnotationProcessorTest extends BaseRestClientTest {
|
|||
int noTransformer();
|
||||
|
||||
@GET
|
||||
@ResponseParser(ReturnStringIf200.class)
|
||||
@ResponseParser(ReturnStringIf2xx.class)
|
||||
void oneTransformer();
|
||||
|
||||
@GET
|
||||
|
@ -1489,7 +1489,7 @@ public class RestAnnotationProcessorTest extends BaseRestClientTest {
|
|||
assertEquals(transformer, ParseURIFromListOrLocationHeaderIf20x.class);
|
||||
}
|
||||
|
||||
public static class ReturnStringIf200Context extends ReturnStringIf200 implements
|
||||
public static class ReturnStringIf200Context extends ReturnStringIf2xx implements
|
||||
InvocationContext {
|
||||
|
||||
public HttpRequest request;
|
||||
|
@ -1523,7 +1523,7 @@ public class RestAnnotationProcessorTest extends BaseRestClientTest {
|
|||
Method method = TestTransformers.class.getMethod("oneTransformer");
|
||||
Class<? extends Function<HttpResponse, ?>> transformer = factory(TestTransformers.class)
|
||||
.getParserOrThrowException(method);
|
||||
assertEquals(transformer, ReturnStringIf200.class);
|
||||
assertEquals(transformer, ReturnStringIf2xx.class);
|
||||
}
|
||||
|
||||
public interface TestRequest {
|
||||
|
@ -1539,7 +1539,7 @@ public class RestAnnotationProcessorTest extends BaseRestClientTest {
|
|||
|
||||
@GET
|
||||
@Path("/{id}")
|
||||
@ResponseParser(ReturnStringIf200.class)
|
||||
@ResponseParser(ReturnStringIf2xx.class)
|
||||
ListenableFuture<String> get(@PathParam("id") String id,
|
||||
@HeaderParam(HttpHeaders.HOST) String host);
|
||||
|
||||
|
|
|
@ -44,7 +44,6 @@ import com.google.inject.Module;
|
|||
*
|
||||
* @author Adrian Cole
|
||||
*/
|
||||
@Test
|
||||
public class NingHttpCommandExecutorServiceTest extends
|
||||
BaseHttpCommandExecutorServiceIntegrationTest {
|
||||
static {
|
||||
|
@ -79,9 +78,9 @@ public class NingHttpCommandExecutorServiceTest extends
|
|||
}
|
||||
|
||||
// OOM
|
||||
@Test(enabled=false, invocationCount = 1, timeOut = 5000)
|
||||
@Test(enabled = false, invocationCount = 1, timeOut = 5000)
|
||||
public void testGetBigFile() throws ExecutionException, InterruptedException, TimeoutException,
|
||||
IOException {
|
||||
super.testGetBigFile();
|
||||
}
|
||||
|
||||
}
|
|
@ -34,7 +34,6 @@
|
|||
<modules>
|
||||
<module>gae</module>
|
||||
<module>apachehc</module>
|
||||
<module>ning</module>
|
||||
<module>joda</module>
|
||||
<module>bouncycastle</module>
|
||||
<module>log4j</module>
|
||||
|
|
|
@ -0,0 +1,76 @@
|
|||
/**
|
||||
*
|
||||
* Copyright (C) 2010 Cloud Conscious, LLC. <info@cloudconscious.com>
|
||||
*
|
||||
* ====================================================================
|
||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
||||
* you may not use this file except in compliance with the License.
|
||||
* You may obtain a copy of the License at
|
||||
*
|
||||
* http://www.apache.org/licenses/LICENSE-2.0
|
||||
*
|
||||
* Unless required by applicable law or agreed to in writing, software
|
||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
* See the License for the specific language governing permissions and
|
||||
* limitations under the License.
|
||||
* ====================================================================
|
||||
*/
|
||||
package org.jclouds.gogrid.config;
|
||||
|
||||
import static org.jclouds.Constants.PROPERTY_GSON_ADAPTERS;
|
||||
|
||||
import java.lang.reflect.Type;
|
||||
import java.util.Map;
|
||||
|
||||
import javax.inject.Singleton;
|
||||
|
||||
import org.jclouds.gogrid.domain.IpState;
|
||||
import org.jclouds.gogrid.domain.JobState;
|
||||
import org.jclouds.gogrid.domain.LoadBalancerOs;
|
||||
import org.jclouds.gogrid.domain.LoadBalancerPersistenceType;
|
||||
import org.jclouds.gogrid.domain.LoadBalancerState;
|
||||
import org.jclouds.gogrid.domain.LoadBalancerType;
|
||||
import org.jclouds.gogrid.domain.ObjectType;
|
||||
import org.jclouds.gogrid.domain.ServerImageState;
|
||||
import org.jclouds.gogrid.domain.ServerImageType;
|
||||
import org.jclouds.gogrid.functions.internal.CustomDeserializers;
|
||||
import org.jclouds.http.functions.config.ParserModule.DateAdapter;
|
||||
|
||||
import com.google.common.collect.Maps;
|
||||
import com.google.inject.AbstractModule;
|
||||
import com.google.inject.Provides;
|
||||
|
||||
/**
|
||||
* Configures the GoGrid connection.
|
||||
*
|
||||
* @author Adrian Cole
|
||||
* @author Oleksiy Yarmula
|
||||
*/
|
||||
|
||||
public class GoGridJsonAdapterModule extends AbstractModule {
|
||||
|
||||
@Provides
|
||||
@Singleton
|
||||
@com.google.inject.name.Named(PROPERTY_GSON_ADAPTERS)
|
||||
public Map<Type, Object> provideCustomAdapterBindings() {
|
||||
Map<Type, Object> bindings = Maps.newHashMap();
|
||||
bindings.put(ObjectType.class, new CustomDeserializers.ObjectTypeAdapter());
|
||||
bindings.put(LoadBalancerOs.class, new CustomDeserializers.LoadBalancerOsAdapter());
|
||||
bindings.put(LoadBalancerState.class, new CustomDeserializers.LoadBalancerStateAdapter());
|
||||
bindings.put(LoadBalancerPersistenceType.class,
|
||||
new CustomDeserializers.LoadBalancerPersistenceTypeAdapter());
|
||||
bindings.put(LoadBalancerType.class, new CustomDeserializers.LoadBalancerTypeAdapter());
|
||||
bindings.put(IpState.class, new CustomDeserializers.IpStateAdapter());
|
||||
bindings.put(JobState.class, new CustomDeserializers.JobStateAdapter());
|
||||
bindings.put(ServerImageState.class, new CustomDeserializers.ServerImageStateAdapter());
|
||||
bindings.put(ServerImageType.class, new CustomDeserializers.ServerImageTypeAdapter());
|
||||
return bindings;
|
||||
}
|
||||
|
||||
@Override
|
||||
protected void configure() {
|
||||
bind(DateAdapter.class).to(DateSecondsAdapter.class);
|
||||
}
|
||||
|
||||
}
|
|
@ -18,29 +18,17 @@
|
|||
*/
|
||||
package org.jclouds.gogrid.config;
|
||||
|
||||
import static org.jclouds.Constants.PROPERTY_GSON_ADAPTERS;
|
||||
import static org.jclouds.Constants.PROPERTY_SESSION_INTERVAL;
|
||||
|
||||
import java.util.Map;
|
||||
import java.util.concurrent.TimeUnit;
|
||||
|
||||
import javax.inject.Named;
|
||||
import javax.inject.Singleton;
|
||||
|
||||
import org.jclouds.concurrent.ExpirableSupplier;
|
||||
import org.jclouds.date.TimeStamp;
|
||||
import org.jclouds.gogrid.GoGridAsyncClient;
|
||||
import org.jclouds.gogrid.GoGridClient;
|
||||
import org.jclouds.gogrid.domain.IpState;
|
||||
import org.jclouds.gogrid.domain.JobState;
|
||||
import org.jclouds.gogrid.domain.LoadBalancerOs;
|
||||
import org.jclouds.gogrid.domain.LoadBalancerPersistenceType;
|
||||
import org.jclouds.gogrid.domain.LoadBalancerState;
|
||||
import org.jclouds.gogrid.domain.LoadBalancerType;
|
||||
import org.jclouds.gogrid.domain.ObjectType;
|
||||
import org.jclouds.gogrid.domain.ServerImageState;
|
||||
import org.jclouds.gogrid.domain.ServerImageType;
|
||||
import org.jclouds.gogrid.functions.internal.CustomDeserializers;
|
||||
import org.jclouds.gogrid.handlers.GoGridErrorHandler;
|
||||
import org.jclouds.gogrid.services.GridImageAsyncClient;
|
||||
import org.jclouds.gogrid.services.GridImageClient;
|
||||
|
@ -57,13 +45,11 @@ import org.jclouds.http.RequiresHttp;
|
|||
import org.jclouds.http.annotation.ClientError;
|
||||
import org.jclouds.http.annotation.Redirection;
|
||||
import org.jclouds.http.annotation.ServerError;
|
||||
import org.jclouds.http.functions.config.ParserModule.DateAdapter;
|
||||
import org.jclouds.rest.ConfiguresRestClient;
|
||||
import org.jclouds.rest.config.RestClientModule;
|
||||
|
||||
import com.google.common.base.Supplier;
|
||||
import com.google.common.collect.ImmutableMap;
|
||||
import com.google.common.collect.Maps;
|
||||
import com.google.inject.Provides;
|
||||
|
||||
/**
|
||||
|
@ -94,25 +80,6 @@ public class GoGridRestClientModule extends RestClientModule<GoGridClient, GoGri
|
|||
return cache.get();
|
||||
}
|
||||
|
||||
@SuppressWarnings("unchecked")
|
||||
@Provides
|
||||
@Singleton
|
||||
@com.google.inject.name.Named(PROPERTY_GSON_ADAPTERS)
|
||||
public Map<Class, Object> provideCustomAdapterBindings() {
|
||||
Map<Class, Object> bindings = Maps.newHashMap();
|
||||
bindings.put(ObjectType.class, new CustomDeserializers.ObjectTypeAdapter());
|
||||
bindings.put(LoadBalancerOs.class, new CustomDeserializers.LoadBalancerOsAdapter());
|
||||
bindings.put(LoadBalancerState.class, new CustomDeserializers.LoadBalancerStateAdapter());
|
||||
bindings.put(LoadBalancerPersistenceType.class,
|
||||
new CustomDeserializers.LoadBalancerPersistenceTypeAdapter());
|
||||
bindings.put(LoadBalancerType.class, new CustomDeserializers.LoadBalancerTypeAdapter());
|
||||
bindings.put(IpState.class, new CustomDeserializers.IpStateAdapter());
|
||||
bindings.put(JobState.class, new CustomDeserializers.JobStateAdapter());
|
||||
bindings.put(ServerImageState.class, new CustomDeserializers.ServerImageStateAdapter());
|
||||
bindings.put(ServerImageType.class, new CustomDeserializers.ServerImageTypeAdapter());
|
||||
return bindings;
|
||||
}
|
||||
|
||||
/**
|
||||
* borrowing concurrency code to ensure that caching takes place properly
|
||||
*/
|
||||
|
@ -135,7 +102,7 @@ public class GoGridRestClientModule extends RestClientModule<GoGridClient, GoGri
|
|||
|
||||
@Override
|
||||
protected void configure() {
|
||||
bind(DateAdapter.class).to(DateSecondsAdapter.class);
|
||||
install(new GoGridJsonAdapterModule());
|
||||
super.configure();
|
||||
}
|
||||
|
||||
|
|
|
@ -21,6 +21,7 @@ package org.jclouds.gogrid.functions;
|
|||
import static org.testng.Assert.assertEquals;
|
||||
|
||||
import java.io.InputStream;
|
||||
import java.lang.reflect.Type;
|
||||
import java.net.UnknownHostException;
|
||||
import java.util.Date;
|
||||
import java.util.Map;
|
||||
|
@ -84,12 +85,12 @@ public class ParseJobsFromJsonResponseTest {
|
|||
super.configure();
|
||||
}
|
||||
|
||||
@SuppressWarnings( { "unused", "unchecked" })
|
||||
@SuppressWarnings("unused")
|
||||
@Provides
|
||||
@Singleton
|
||||
@com.google.inject.name.Named(Constants.PROPERTY_GSON_ADAPTERS)
|
||||
public Map<Class, Object> provideCustomAdapterBindings() {
|
||||
Map<Class, Object> bindings = Maps.newHashMap();
|
||||
public Map<Type, Object> provideCustomAdapterBindings() {
|
||||
Map<Type, Object> bindings = Maps.newHashMap();
|
||||
bindings.put(ObjectType.class, new CustomDeserializers.ObjectTypeAdapter());
|
||||
bindings.put(JobState.class, new CustomDeserializers.JobStateAdapter());
|
||||
return bindings;
|
||||
|
|
|
@ -21,6 +21,7 @@ package org.jclouds.gogrid.functions;
|
|||
import static org.testng.Assert.assertEquals;
|
||||
|
||||
import java.io.InputStream;
|
||||
import java.lang.reflect.Type;
|
||||
import java.net.UnknownHostException;
|
||||
import java.util.Map;
|
||||
import java.util.SortedSet;
|
||||
|
@ -65,14 +66,14 @@ public class ParseLoadBalancersFromJsonResponseTest {
|
|||
SortedSet<LoadBalancer> response = parser.apply(is);
|
||||
Option dc = new Option(1l, "US-West-1", "US West 1 Datacenter");
|
||||
|
||||
LoadBalancer loadBalancer = new LoadBalancer(6372L, "Balancer", null, new IpPortPair(
|
||||
new Ip(1313082L, "204.51.240.181", "204.51.240.176/255.255.255.240", true,
|
||||
IpState.ASSIGNED, dc), 80), ImmutableSortedSet.of(new IpPortPair(
|
||||
new Ip(1313086L, "204.51.240.185", "204.51.240.176/255.255.255.240", true,
|
||||
IpState.ASSIGNED, dc), 80), new IpPortPair(new Ip(1313089L, "204.51.240.188",
|
||||
"204.51.240.176/255.255.255.240", true, IpState.ASSIGNED, dc), 80)),
|
||||
LoadBalancerType.ROUND_ROBIN, LoadBalancerPersistenceType.NONE, LoadBalancerOs.F5,
|
||||
LoadBalancerState.ON, dc);
|
||||
LoadBalancer loadBalancer = new LoadBalancer(6372L, "Balancer", null, new IpPortPair(new Ip(
|
||||
1313082L, "204.51.240.181", "204.51.240.176/255.255.255.240", true,
|
||||
IpState.ASSIGNED, dc), 80), ImmutableSortedSet.of(
|
||||
new IpPortPair(new Ip(1313086L, "204.51.240.185", "204.51.240.176/255.255.255.240",
|
||||
true, IpState.ASSIGNED, dc), 80), new IpPortPair(new Ip(1313089L,
|
||||
"204.51.240.188", "204.51.240.176/255.255.255.240", true, IpState.ASSIGNED,
|
||||
dc), 80)), LoadBalancerType.ROUND_ROBIN, LoadBalancerPersistenceType.NONE,
|
||||
LoadBalancerOs.F5, LoadBalancerState.ON, dc);
|
||||
assertEquals(Iterables.getOnlyElement(response), loadBalancer);
|
||||
}
|
||||
|
||||
|
@ -85,10 +86,10 @@ public class ParseLoadBalancersFromJsonResponseTest {
|
|||
|
||||
@Provides
|
||||
@Singleton
|
||||
@SuppressWarnings( { "unused", "unchecked" })
|
||||
@SuppressWarnings( { "unused" })
|
||||
@com.google.inject.name.Named(Constants.PROPERTY_GSON_ADAPTERS)
|
||||
public Map<Class, Object> provideCustomAdapterBindings() {
|
||||
Map<Class, Object> bindings = Maps.newHashMap();
|
||||
public Map<Type, Object> provideCustomAdapterBindings() {
|
||||
Map<Type, Object> bindings = Maps.newHashMap();
|
||||
bindings.put(LoadBalancerOs.class, new CustomDeserializers.LoadBalancerOsAdapter());
|
||||
bindings.put(LoadBalancerState.class, new CustomDeserializers.LoadBalancerStateAdapter());
|
||||
bindings.put(LoadBalancerPersistenceType.class,
|
||||
|
|
|
@ -21,6 +21,7 @@ package org.jclouds.gogrid.functions;
|
|||
import static org.testng.Assert.assertEquals;
|
||||
|
||||
import java.io.InputStream;
|
||||
import java.lang.reflect.Type;
|
||||
import java.net.UnknownHostException;
|
||||
import java.util.Map;
|
||||
|
||||
|
@ -67,10 +68,10 @@ public class ParseServerNameToCredentialsMapFromJsonResponseTest {
|
|||
|
||||
@Provides
|
||||
@Singleton
|
||||
@SuppressWarnings( { "unused", "unchecked" })
|
||||
@SuppressWarnings("unused")
|
||||
@com.google.inject.name.Named(Constants.PROPERTY_GSON_ADAPTERS)
|
||||
public Map<Class, Object> provideCustomAdapterBindings() {
|
||||
Map<Class, Object> bindings = Maps.newHashMap();
|
||||
public Map<Type, Object> provideCustomAdapterBindings() {
|
||||
Map<Type, Object> bindings = Maps.newHashMap();
|
||||
bindings.put(IpState.class, new CustomDeserializers.IpStateAdapter());
|
||||
bindings.put(ServerImageType.class, new CustomDeserializers.ServerImageTypeAdapter());
|
||||
bindings.put(ServerImageState.class, new CustomDeserializers.ServerImageStateAdapter());
|
||||
|
|
|
@ -34,7 +34,7 @@ import java.util.SortedSet;
|
|||
import javax.inject.Singleton;
|
||||
|
||||
import org.jclouds.Constants;
|
||||
import org.jclouds.gogrid.config.DateSecondsAdapter;
|
||||
import org.jclouds.gogrid.config.GoGridJsonAdapterModule;
|
||||
import org.jclouds.gogrid.domain.BillingToken;
|
||||
import org.jclouds.gogrid.domain.Customer;
|
||||
import org.jclouds.gogrid.domain.Ip;
|
||||
|
@ -93,7 +93,7 @@ public class ParseServersFromJsonResponseTest {
|
|||
Injector i = Guice.createInjector(new ParserModule() {
|
||||
@Override
|
||||
protected void configure() {
|
||||
bind(DateAdapter.class).to(DateSecondsAdapter.class);
|
||||
install(new GoGridJsonAdapterModule());
|
||||
super.configure();
|
||||
}
|
||||
|
||||
|
|
|
@ -55,12 +55,11 @@ public class IBMDeveloperCloudParserModule extends AbstractModule {
|
|||
}
|
||||
}
|
||||
|
||||
@SuppressWarnings("unchecked")
|
||||
@Provides
|
||||
@Singleton
|
||||
@Named(Constants.PROPERTY_GSON_ADAPTERS)
|
||||
public Map<Class, Object> provideCustomAdapterBindings(CurlyBraceCapableURIAdapter adapter) {
|
||||
return ImmutableMap.<Class, Object> of(URI.class, adapter);
|
||||
public Map<Type, Object> provideCustomAdapterBindings(CurlyBraceCapableURIAdapter adapter) {
|
||||
return ImmutableMap.<Type, Object> of(URI.class, adapter);
|
||||
}
|
||||
|
||||
@Override
|
||||
|
|
|
@ -27,7 +27,7 @@ import javax.inject.Inject;
|
|||
|
||||
import org.jclouds.http.HttpRequest;
|
||||
import org.jclouds.http.HttpResponse;
|
||||
import org.jclouds.http.functions.ReturnStringIf200;
|
||||
import org.jclouds.http.functions.ReturnStringIf2xx;
|
||||
import org.jclouds.rest.InvocationContext;
|
||||
import org.jclouds.rest.internal.GeneratedHttpRequest;
|
||||
|
||||
|
@ -38,11 +38,11 @@ import com.google.common.base.Function;
|
|||
* @author Adrian Cole
|
||||
*/
|
||||
public class AddMetadataItemIntoMap implements Function<HttpResponse, Void>, InvocationContext {
|
||||
ReturnStringIf200 returnIf200;
|
||||
ReturnStringIf2xx returnIf200;
|
||||
private GeneratedHttpRequest<?> request;
|
||||
|
||||
@Inject
|
||||
private AddMetadataItemIntoMap(ReturnStringIf200 returnIf200) {
|
||||
private AddMetadataItemIntoMap(ReturnStringIf2xx returnIf200) {
|
||||
this.returnIf200 = returnIf200;
|
||||
}
|
||||
|
||||
|
|
|
@ -31,7 +31,7 @@ import org.jclouds.blobstore.domain.Blob;
|
|||
import org.jclouds.http.HttpRequest;
|
||||
import org.jclouds.http.RequiresHttp;
|
||||
import org.jclouds.http.functions.ReleasePayloadAndReturn;
|
||||
import org.jclouds.http.functions.ReturnStringIf200;
|
||||
import org.jclouds.http.functions.ReturnStringIf2xx;
|
||||
import org.jclouds.nirvanix.sdn.config.SDNRestClientModule;
|
||||
import org.jclouds.nirvanix.sdn.filters.AddSessionTokenToRequest;
|
||||
import org.jclouds.nirvanix.sdn.filters.InsertUserContextIntoPath;
|
||||
|
@ -148,7 +148,7 @@ public class SDNAsyncClientTest extends RestClientTest<SDNAsyncClient> {
|
|||
assertNonPayloadHeadersEqual(request, "");
|
||||
assertPayloadEquals(request, null, null, false);
|
||||
|
||||
assertResponseParserClassEquals(method, request, ReturnStringIf200.class);
|
||||
assertResponseParserClassEquals(method, request, ReturnStringIf2xx.class);
|
||||
assertSaxResponseParserClassEquals(method, null);
|
||||
assertExceptionParserClassEquals(method, null);
|
||||
|
||||
|
|
Loading…
Reference in New Issue