@Override public TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials) { return TemplateOptions.class.cast(super.overrideLoginCredentials(overridingCredentials)); }
@Override public TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials) { return TemplateOptions.class.cast(super.overrideLoginCredentials(overridingCredentials)); }
@Override public TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials) { return TemplateOptions.class.cast(super.overrideLoginCredentials(overridingCredentials)); }
@Override public TemplateOptions overrideLoginCredentials(LoginCredentials overridingCredentials) { return TemplateOptions.class.cast(super.overrideLoginCredentials(overridingCredentials)); }
public static RunScriptOptions overrideLoginCredentials(LoginCredentials credentials) { RunScriptOptions options = new RunScriptOptions(); return options.overrideLoginCredentials(credentials); }
public static RunScriptOptions overrideLoginCredentials(LoginCredentials credentials) { RunScriptOptions options = new RunScriptOptions(); return options.overrideLoginCredentials(credentials); }
public static RunScriptOptions overrideLoginCredentials(LoginCredentials credentials) { RunScriptOptions options = new RunScriptOptions(); return options.overrideLoginCredentials(credentials); }
public static RunScriptOptions overrideLoginCredentials(LoginCredentials credentials) { RunScriptOptions options = new RunScriptOptions(); return options.overrideLoginCredentials(credentials); }
public Map<? extends NodeMetadata, ExecResponse> runScriptOnNodesMatching( ClusterSpec spec, Predicate<NodeMetadata> condition, Statement statement, RunScriptOptions options) throws IOException, RunScriptOnNodesException { LoginCredentials credentials = LoginCredentials.builder() .user(spec.getClusterUser()).privateKey(spec.getPrivateKey()).build(); if (options == null) { options = defaultRunScriptOptionsForSpec(spec); } else if (options.getLoginUser() == null) { options = options.overrideLoginCredentials(credentials); } condition = Predicates .and(runningInGroup(spec.getClusterName()), condition); ComputeServiceContext context = getCompute().apply(spec); return context.getComputeService().runScriptOnNodesMatching(condition, statement, options); }
public Map<? extends NodeMetadata, ExecResponse> runScriptOnNodesMatching( ClusterSpec spec, Predicate<NodeMetadata> condition, Statement statement, RunScriptOptions options) throws IOException, RunScriptOnNodesException { LoginCredentials credentials = LoginCredentials.builder() .user(spec.getClusterUser()).privateKey(spec.getPrivateKey()).build(); if (options == null) { options = defaultRunScriptOptionsForSpec(spec); } else if (options.getLoginUser() == null) { options = options.overrideLoginCredentials(credentials); } condition = Predicates .and(runningInGroup(spec.getClusterName()), condition); ComputeServiceContext context = getCompute().apply(spec); return context.getComputeService().runScriptOnNodesMatching(condition, statement, options); }
@Test(enabled = false) protected void tryBadPassword(String group, Credentials good) throws AssertionError { try { Map<? extends NodeMetadata, ExecResponse> responses = client.runScriptOnNodesMatching( runningInGroup(group), "echo I put a bad password", wrapInInitScript(false).runAsRoot(false).overrideLoginCredentials( LoginCredentials.builder().user(good.identity).noPrivateKey().password("romeo").build())); assert responses.size() == 0 : "shouldn't pass with a bad password\n" + responses; } catch (AssertionError e) { throw e; } catch (RunScriptOnNodesException e) { assert Iterables.any(e.getNodeErrors().values(), Predicates.instanceOf(AuthorizationException.class)) : e + " not authexception!"; } }
/** * Run set of queued commands now */ public static void executeOnNodes(List<Statement> commands, boolean runAsRoot, String clustername, ComputeService compute, String username, String sshKeyName) throws RunScriptOnNodesException, InterruptedException, ExecutionException, TimeoutException { compute.runScriptOnNodesMatching( NodePredicates.runningInGroup(clustername), new StatementList(commands), new RunScriptOptions() .nameTask("Setup") .overrideLoginCredentials(Tools.getPrivateKeyCredentials(username, sshKeyName)) .wrapInInitScript(true) .overrideLoginUser(username) .blockOnComplete(true) .runAsRoot(runAsRoot)); }
@Test(enabled = false) protected void tryBadPassword(String group, Credentials good) throws AssertionError { try { Map<? extends NodeMetadata, ExecResponse> responses = client.runScriptOnNodesMatching( runningInGroup(group), "echo I put a bad password", wrapInInitScript(false).runAsRoot(false).overrideLoginCredentials( LoginCredentials.builder().user(good.identity).noPrivateKey().password("romeo").build())); assert responses.size() == 0 : "shouldn't pass with a bad password\n" + responses; } catch (AssertionError e) { throw e; } catch (RunScriptOnNodesException e) { assert Iterables.any(e.getNodeErrors().values(), Predicates.instanceOf(AuthorizationException.class)) : e + " not authexception!"; } }
wrapInInitScript(false).runAsRoot(false).overrideLoginCredentials(good)).entrySet()) { checkResponseEqualsHostname(response.getValue(), response.getKey());
wrapInInitScript(false).runAsRoot(false).overrideLoginCredentials(good)).entrySet()) { checkResponseEqualsHostname(response.getValue(), response.getKey());