Commit b03aaac5 authored by Spiros Koulouzis's avatar Spiros Koulouzis

composer works

parent 7843a1ed
# http://github.com/yeasy/docker-compose-files
# This compose file will start spark master node and the worker node.
# All nodes will become a cluster automatically.
# You can run: docker-compose scale worker=2
# After startup, try submit a pi calculation application.
# /urs/local/spark/bin/spark-submit --master spark://master:7077 --class org.apache.spark.examples.SparkPi /usr/local/spark/lib/spark-examples-1.4.0-hadoop2.6.0.jar 1000
master:
image: sequenceiq/spark:1.4.0
hostname: master
ports:
- "4040:4040"
- "8042:8042"
- "7077:7077"
- "8088:8088"
- "8080:8080"
restart: always
#mem_limit: 1024m
command: bash /usr/local/spark/sbin/start-master.sh && ping localhost > /dev/null
worker:
image: sequenceiq/spark:1.4.0
links:
- master:master
expose:
- "8081"
restart: always
command: bash /usr/local/spark/sbin/start-slave.sh spark://master:7077 && ping localhost >/dev/null
......@@ -72,7 +72,7 @@
<h1 class="page-header">Files and Libraries</h1>
<h3 id="artifact_gwt_json_overlay">GWT JSON Overlay</h3>
<p class="lead">Created July 6, 2017</p>
<p class="lead">Created July 7, 2017</p>
<p> <p>
The <a href="http://code.google.com/webtoolkit/">Google Web Toolkit</a> JSON Overlay library provides the JSON Overlays that
can be used to access the Web service API for this application.
......@@ -97,7 +97,7 @@
</tbody>
</table>
<h3 id="artifact_java_json_client_library">Java JSON Client Library</h3>
<p class="lead">Created July 6, 2017</p>
<p class="lead">Created July 7, 2017</p>
<p><p>
The Java client-side library is used to provide the set of Java objects that can be serialized
to/from JSON using <a href="http://jackson.codehaus.org/">Jackson</a>. This is useful for accessing the
......@@ -127,7 +127,7 @@
</tbody>
</table>
<h3 id="artifact_java_xml_client_library">Java XML Client Library</h3>
<p class="lead">Created July 6, 2017</p>
<p class="lead">Created July 7, 2017</p>
<p><p>
The Java client-side library is used to access the Web service API for this application using Java.
</p>
......@@ -149,13 +149,13 @@
</tr>
<tr class="clickable-row" data-href="drip-api-xml-client-xml-sources.jar">
<td><span class="downloadfile-name">drip-api-xml-client-xml-sources.jar</span></td>
<td><span class="downloadfile-size">21.37K</span></td>
<td><span class="downloadfile-size">21.38K</span></td>
<td><span class="downloadfile-description">The sources for the Java XML client library.</span></td>
</tr>
</tbody>
</table>
<h3 id="artifact_js_client_library">JavaScript Client Library</h3>
<p class="lead">Created July 6, 2017</p>
<p class="lead">Created July 7, 2017</p>
<p><p>
The JavaScript client-side library defines classes that can be (de)serialized to/from JSON.
This is useful for accessing the resources that are published by this application, but only
......@@ -190,7 +190,7 @@
</tbody>
</table>
<h3 id="artifact_php_json_client_library">PHP JSON Client Library</h3>
<p class="lead">Created July 6, 2017</p>
<p class="lead">Created July 7, 2017</p>
<p><p>
The PHP JSON client-side library defines the PHP classes that can be (de)serialized to/from JSON.
This is useful for accessing the resources that are published by this application, but only
......@@ -213,13 +213,13 @@
<tbody data-link="row" class="rowlink">
<tr class="clickable-row" data-href="drip-api-php.zip">
<td><span class="downloadfile-name">drip-api-php.zip</span></td>
<td><span class="downloadfile-size">5.43K</span></td>
<td><span class="downloadfile-size">5.44K</span></td>
<td><span class="downloadfile-description">&nbsp;</span></td>
</tr>
</tbody>
</table>
<h3 id="artifact_php_xml_client_library">PHP XML Client Library</h3>
<p class="lead">Created July 6, 2017</p>
<p class="lead">Created July 7, 2017</p>
<p><p>
The PHP client-side library defines the PHP classes that can be (de)serialized to/from XML.
This is useful for accessing the resources that are published by this application, but only
......@@ -251,7 +251,7 @@
</tbody>
</table>
<h3 id="artifact_ruby_json_client_library">Ruby JSON Client Library</h3>
<p class="lead">Created July 6, 2017</p>
<p class="lead">Created July 7, 2017</p>
<p><p>
The Ruby JSON client-side library defines the Ruby classes that can be (de)serialized to/from JSON.
This is useful for accessing the REST endpoints that are published by this application, but only
......
......@@ -75,6 +75,139 @@ module EnunciateHelpers
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
class DeployParameter
# the IP
attr_accessor :IP
# the user
attr_accessor :user
# the role
attr_accessor :role
# the json hash for this DeployParameter
def to_jaxb_json_hash
_h = {}
_h['IP'] = IP.to_jaxb_json_hash unless IP.nil?
_h['user'] = user.to_jaxb_json_hash unless user.nil?
_h['role'] = role.to_jaxb_json_hash unless role.nil?
return _h
end
# the json (string form) for this DeployParameter
def to_json
to_jaxb_json_hash.to_json
end
#initializes this DeployParameter with a json hash
def init_jaxb_json_hash(_o)
if !_o['IP'].nil?
_oa = _o['IP']
if(_oa.is_a? Hash)
@IP = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@IP = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@IP = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@IP.push String.from_json(_item)
else
@IP.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@IP = _oa
end
end
if !_o['user'].nil?
_oa = _o['user']
if(_oa.is_a? Hash)
@user = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@user = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@user = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@user.push String.from_json(_item)
else
@user.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@user = _oa
end
end
if !_o['role'].nil?
_oa = _o['role']
if(_oa.is_a? Hash)
@role = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@role = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@role = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@role.push String.from_json(_item)
else
@role.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@role = _oa
end
end
end
# constructs a DeployParameter from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
else
inst = new
inst.init_jaxb_json_hash o
return inst
end
end
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
......@@ -345,228 +478,95 @@ module V1
module External
# (no documentation provided)
class DeployParameter
class PlanRequest
# the IP
attr_accessor :IP
# the user
attr_accessor :user
# the role
attr_accessor :role
# the toscaID
attr_accessor :toscaID
# the managerType
attr_accessor :managerType
# the vmUserName
attr_accessor :vmUserName
# the cloudProvider
attr_accessor :cloudProvider
# the osType
attr_accessor :osType
# the domain
attr_accessor :domain
# the json hash for this DeployParameter
# the json hash for this PlanRequest
def to_jaxb_json_hash
_h = {}
_h['IP'] = IP.to_jaxb_json_hash unless IP.nil?
_h['user'] = user.to_jaxb_json_hash unless user.nil?
_h['role'] = role.to_jaxb_json_hash unless role.nil?
_h['toscaID'] = toscaID.to_jaxb_json_hash unless toscaID.nil?
_h['managerType'] = managerType.to_jaxb_json_hash unless managerType.nil?
_h['vmUserName'] = vmUserName.to_jaxb_json_hash unless vmUserName.nil?
_h['cloudProvider'] = cloudProvider.to_jaxb_json_hash unless cloudProvider.nil?
_h['osType'] = osType.to_jaxb_json_hash unless osType.nil?
_h['domain'] = domain.to_jaxb_json_hash unless domain.nil?
return _h
end
# the json (string form) for this DeployParameter
# the json (string form) for this PlanRequest
def to_json
to_jaxb_json_hash.to_json
end
#initializes this DeployParameter with a json hash
#initializes this PlanRequest with a json hash
def init_jaxb_json_hash(_o)
if !_o['IP'].nil?
_oa = _o['IP']
if !_o['toscaID'].nil?
_oa = _o['toscaID']
if(_oa.is_a? Hash)
@IP = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@IP = String.from_json(_oa) unless _oa['@class']
@toscaID = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@toscaID = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@IP = Array.new
@toscaID = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@IP.push String.from_json(_item)
@toscaID.push String.from_json(_item)
else
@IP.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@toscaID.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@IP = _oa
@toscaID = _oa
end
end
if !_o['user'].nil?
_oa = _o['user']
if !_o['managerType'].nil?
_oa = _o['managerType']
if(_oa.is_a? Hash)
@user = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@user = String.from_json(_oa) unless _oa['@class']
@managerType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@managerType = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@user = Array.new
@managerType = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@user.push String.from_json(_item)
@managerType.push String.from_json(_item)
else
@user.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@managerType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@user = _oa
@managerType = _oa
end
end
if !_o['role'].nil?
_oa = _o['role']
if !_o['vmUserName'].nil?
_oa = _o['vmUserName']
if(_oa.is_a? Hash)
@role = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@role = String.from_json(_oa) unless _oa['@class']
@vmUserName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmUserName = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@role = Array.new
@vmUserName = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@role.push String.from_json(_item)
@vmUserName.push String.from_json(_item)
else
@role.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@vmUserName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@role = _oa
end
end
end
# constructs a DeployParameter from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
else
inst = new
inst.init_jaxb_json_hash o
return inst
end
end
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
class PlanRequest
# the toscaID
attr_accessor :toscaID
# the managerType
attr_accessor :managerType
# the vmUserName
attr_accessor :vmUserName
# the cloudProvider
attr_accessor :cloudProvider
# the osType
attr_accessor :osType
# the domain
attr_accessor :domain
# the json hash for this PlanRequest
def to_jaxb_json_hash
_h = {}
_h['toscaID'] = toscaID.to_jaxb_json_hash unless toscaID.nil?
_h['managerType'] = managerType.to_jaxb_json_hash unless managerType.nil?
_h['vmUserName'] = vmUserName.to_jaxb_json_hash unless vmUserName.nil?
_h['cloudProvider'] = cloudProvider.to_jaxb_json_hash unless cloudProvider.nil?
_h['osType'] = osType.to_jaxb_json_hash unless osType.nil?
_h['domain'] = domain.to_jaxb_json_hash unless domain.nil?
return _h
end
# the json (string form) for this PlanRequest
def to_json
to_jaxb_json_hash.to_json
end
#initializes this PlanRequest with a json hash
def init_jaxb_json_hash(_o)
if !_o['toscaID'].nil?
_oa = _o['toscaID']
if(_oa.is_a? Hash)
@toscaID = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@toscaID = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@toscaID = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@toscaID.push String.from_json(_item)
else
@toscaID.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@toscaID = _oa
end
end
if !_o['managerType'].nil?
_oa = _o['managerType']
if(_oa.is_a? Hash)
@managerType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@managerType = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@managerType = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@managerType.push String.from_json(_item)
else
@managerType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@managerType = _oa
end
end
if !_o['vmUserName'].nil?
_oa = _o['vmUserName']
if(_oa.is_a? Hash)
@vmUserName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmUserName = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@vmUserName = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@vmUserName.push String.from_json(_item)
else
@vmUserName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@vmUserName = _oa
@vmUserName = _oa
end
end
if !_o['cloudProvider'].nil?
......@@ -1211,110 +1211,156 @@ module V1
module External
module Ansible
# (no documentation provided)
class CloudCredentials < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
class BenchmarkResult < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
# the secret key
attr_accessor :secretKey
# the cloudProviderName
attr_accessor :cloudProviderName
# the accessKeyId
attr_accessor :accessKeyId
# the attributes
attr_accessor :attributes
# (no documentation provided)
attr_accessor :cloudDeploymentDomain
# (no documentation provided)
attr_accessor :start
# (no documentation provided)
attr_accessor :delta
# (no documentation provided)
attr_accessor :vmType
# (no documentation provided)
attr_accessor :host
# (no documentation provided)
attr_accessor :end
# the json hash for this CloudCredentials
# the json hash for this BenchmarkResult
def to_jaxb_json_hash
_h = super
_h['secretKey'] = secretKey.to_jaxb_json_hash unless secretKey.nil?
_h['cloudProviderName'] = cloudProviderName.to_jaxb_json_hash unless cloudProviderName.nil?
_h['accessKeyId'] = accessKeyId.to_jaxb_json_hash unless accessKeyId.nil?
_h['attributes'] = attributes.to_jaxb_json_hash unless attributes.nil?
_h['cloudDeploymentDomain'] = cloudDeploymentDomain.to_jaxb_json_hash unless cloudDeploymentDomain.nil?
_h['start'] = start.to_jaxb_json_hash unless start.nil?
_h['delta'] = delta.to_jaxb_json_hash unless delta.nil?
_h['vmType'] = vmType.to_jaxb_json_hash unless vmType.nil?
_h['host'] = host.to_jaxb_json_hash unless host.nil?
_h['end'] = end.to_jaxb_json_hash unless end.nil?
return _h
end
#initializes this CloudCredentials with a json hash
#initializes this BenchmarkResult with a json hash
def init_jaxb_json_hash(_o)
super _o
if !_o['secretKey'].nil?
_oa = _o['secretKey']
if !_o['cloudDeploymentDomain'].nil?
_oa = _o['cloudDeploymentDomain']
if(_oa.is_a? Hash)
@secretKey = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@secretKey = String.from_json(_oa) unless _oa['@class']
@cloudDeploymentDomain = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudDeploymentDomain = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@secretKey = Array.new
@cloudDeploymentDomain = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@secretKey.push String.from_json(_item)
@cloudDeploymentDomain.push String.from_json(_item)
else
@secretKey.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@cloudDeploymentDomain.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@secretKey = _oa
@cloudDeploymentDomain = _oa
end
end
if !_o['cloudProviderName'].nil?
_oa = _o['cloudProviderName']
if !_o['start'].nil?
_oa = _o['start']
if(_oa.is_a? Hash)
@cloudProviderName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudProviderName = String.from_json(_oa) unless _oa['@class']
@start = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@start = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudProviderName = Array.new
@start = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudProviderName.push String.from_json(_item)
@start.push Time.from_json(_item)
else
@cloudProviderName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@start.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudProviderName = _oa
@start = _oa
end
end
if !_o['accessKeyId'].nil?
_oa = _o['accessKeyId']
if !_o['delta'].nil?
_oa = _o['delta']
if(_oa.is_a? Hash)
@accessKeyId = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@accessKeyId = String.from_json(_oa) unless _oa['@class']
@delta = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@delta = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@accessKeyId = Array.new
@delta = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@accessKeyId.push String.from_json(_item)
@delta.push Time.from_json(_item)
else
@accessKeyId.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@delta.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@accessKeyId = _oa
@delta = _oa
end
end
if !_o['attributes'].nil?
_oa = _o['attributes']
if !_o['vmType'].nil?
_oa = _o['vmType']
if(_oa.is_a? Hash)
@attributes = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@attributes = Hash.from_json(_oa) unless _oa['@class']
@vmType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmType = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@attributes = Array.new
@vmType = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@attributes.push Hash.from_json(_item)
@vmType.push String.from_json(_item)
else
@attributes.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@vmType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@attributes = _oa
@vmType = _oa
end
end
if !_o['host'].nil?
_oa = _o['host']
if(_oa.is_a? Hash)
@host = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@host = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@host = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@host.push String.from_json(_item)
else
@host.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@host = _oa
end
end
if !_o['end'].nil?
_oa = _o['end']
if(_oa.is_a? Hash)
@end = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@end = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@end = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@end.push Time.from_json(_item)
else
@end.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@end = _oa
end
end
end
# constructs a CloudCredentials from a (parsed) JSON hash
# constructs a BenchmarkResult from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
......@@ -1344,6 +1390,8 @@ end
end
end
module Nl
module Uva
......@@ -1362,156 +1410,110 @@ module V1
module External
module Ansible
# (no documentation provided)
class BenchmarkResult < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
class CloudCredentials < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
# (no documentation provided)
attr_accessor :delta
# (no documentation provided)
attr_accessor :cloudDeploymentDomain
# (no documentation provided)
attr_accessor :vmType
# (no documentation provided)
attr_accessor :end
# (no documentation provided)
attr_accessor :start
# (no documentation provided)
attr_accessor :host
# the secret key
attr_accessor :secretKey
# the cloudProviderName
attr_accessor :cloudProviderName
# the accessKeyId
attr_accessor :accessKeyId
# the attributes
attr_accessor :attributes
# the json hash for this BenchmarkResult
# the json hash for this CloudCredentials
def to_jaxb_json_hash
_h = super
_h['delta'] = delta.to_jaxb_json_hash unless delta.nil?
_h['cloudDeploymentDomain'] = cloudDeploymentDomain.to_jaxb_json_hash unless cloudDeploymentDomain.nil?
_h['vmType'] = vmType.to_jaxb_json_hash unless vmType.nil?
_h['end'] = end.to_jaxb_json_hash unless end.nil?
_h['start'] = start.to_jaxb_json_hash unless start.nil?
_h['host'] = host.to_jaxb_json_hash unless host.nil?
_h['secretKey'] = secretKey.to_jaxb_json_hash unless secretKey.nil?
_h['cloudProviderName'] = cloudProviderName.to_jaxb_json_hash unless cloudProviderName.nil?
_h['accessKeyId'] = accessKeyId.to_jaxb_json_hash unless accessKeyId.nil?
_h['attributes'] = attributes.to_jaxb_json_hash unless attributes.nil?
return _h
end
#initializes this BenchmarkResult with a json hash
#initializes this CloudCredentials with a json hash
def init_jaxb_json_hash(_o)
super _o
if !_o['delta'].nil?
_oa = _o['delta']
if(_oa.is_a? Hash)
@delta = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@delta = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@delta = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@delta.push Time.from_json(_item)
else
@delta.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@delta = _oa
end
end
if !_o['cloudDeploymentDomain'].nil?
_oa = _o['cloudDeploymentDomain']
if(_oa.is_a? Hash)
@cloudDeploymentDomain = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudDeploymentDomain = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudDeploymentDomain = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudDeploymentDomain.push String.from_json(_item)
else
@cloudDeploymentDomain.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudDeploymentDomain = _oa
end
end
if !_o['vmType'].nil?
_oa = _o['vmType']
if !_o['secretKey'].nil?
_oa = _o['secretKey']
if(_oa.is_a? Hash)
@vmType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmType = String.from_json(_oa) unless _oa['@class']
@secretKey = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@secretKey = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@vmType = Array.new
@secretKey = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@vmType.push String.from_json(_item)
@secretKey.push String.from_json(_item)
else
@vmType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@secretKey.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@vmType = _oa
@secretKey = _oa
end
end
if !_o['end'].nil?
_oa = _o['end']
if !_o['cloudProviderName'].nil?
_oa = _o['cloudProviderName']
if(_oa.is_a? Hash)
@end = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@end = Time.from_json(_oa) unless _oa['@class']
@cloudProviderName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudProviderName = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@end = Array.new
@cloudProviderName = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@end.push Time.from_json(_item)
@cloudProviderName.push String.from_json(_item)
else
@end.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@cloudProviderName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@end = _oa
@cloudProviderName = _oa
end
end
if !_o['start'].nil?
_oa = _o['start']
if !_o['accessKeyId'].nil?
_oa = _o['accessKeyId']
if(_oa.is_a? Hash)
@start = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@start = Time.from_json(_oa) unless _oa['@class']
@accessKeyId = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@accessKeyId = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@start = Array.new
@accessKeyId = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@start.push Time.from_json(_item)
@accessKeyId.push String.from_json(_item)
else
@start.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@accessKeyId.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@start = _oa
@accessKeyId = _oa
end
end
if !_o['host'].nil?
_oa = _o['host']
if !_o['attributes'].nil?
_oa = _o['attributes']
if(_oa.is_a? Hash)
@host = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@host = String.from_json(_oa) unless _oa['@class']
@attributes = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@attributes = Hash.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@host = Array.new
@attributes = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@host.push String.from_json(_item)
@attributes.push Hash.from_json(_item)
else
@host.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@attributes.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@host = _oa
@attributes = _oa
end
end
end
# constructs a BenchmarkResult from a (parsed) JSON hash
# constructs a CloudCredentials from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
......@@ -1541,54 +1543,6 @@ end
end
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
class KeyType
# For private keys
PRIVATE = "PRIVATE"
# For public keys
PUBLIC = "PUBLIC"
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
......@@ -1712,6 +1666,52 @@ module Data
module V1
module External
# (no documentation provided)
class KeyType
# For private keys
PRIVATE = "PRIVATE"
# For public keys
PUBLIC = "PUBLIC"
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
......
......@@ -272,7 +272,7 @@ provisopned based on a TOSCA description.</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/provision</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/sample</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/{id}</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/post/provision/</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/post/provision</span>
</samp></li></ul></td>
<td class="text-nowrap"><ul class="list-unstyled"><li><samp> <span class="label label-default resource-method">DELETE</span>
</samp></li><li><samp> <span class="label label-default resource-method">GET</span>
......
......@@ -81,9 +81,9 @@ class</p>
</thead>
<tbody>
<tr>
<td> <span class="property-name">start</span>
<td> <span class="property-name">cloudDeploymentDomain</span>
</td>
<td> <span class="datatype-reference">number
<td> <span class="datatype-reference">string
</span>
</td>
<td> <span class="property-description"></span>
......@@ -99,16 +99,16 @@ class</p>
</td>
</tr>
<tr>
<td> <span class="property-name">host</span>
<td> <span class="property-name">end</span>
</td>
<td> <span class="datatype-reference">string
<td> <span class="datatype-reference">number
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">end</span>
<td> <span class="property-name">delta</span>
</td>
<td> <span class="datatype-reference">number
</span>
......@@ -117,18 +117,18 @@ class</p>
</td>
</tr>
<tr>
<td> <span class="property-name">cloudDeploymentDomain</span>
<td> <span class="property-name">start</span>
</td>
<td> <span class="datatype-reference">string
<td> <span class="datatype-reference">number
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">delta</span>
<td> <span class="property-name">host</span>
</td>
<td> <span class="datatype-reference">number
<td> <span class="datatype-reference">string
</span>
</td>
<td> <span class="property-description"></span>
......@@ -165,12 +165,12 @@ object is saved.</span></td>
<p class="lead">Example</p>
<pre class="prettyprint language-js example">{
&quot;start&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;delta&quot; : 12345,
&quot;start&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......
......@@ -755,15 +755,15 @@ class]]>
<xs:sequence>
<xs:element name="delta" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="end" type="xs:dateTime" minOccurs="0">
<xs:element name="cloudDeploymentDomain" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="host" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="vmType" type="xs:string" minOccurs="0">
<xs:element name="start" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="cloudDeploymentDomain" type="xs:string" minOccurs="0">
<xs:element name="end" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="start" type="xs:dateTime" minOccurs="0">
<xs:element name="vmType" type="xs:string" minOccurs="0">
</xs:element>
</xs:sequence>
</xs:extension>
......
......@@ -144,12 +144,12 @@ Content-Type: application/json
<code class="prettyprint language-js">
[ {
&quot;start&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;delta&quot; : 12345,
&quot;start&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......@@ -514,12 +514,12 @@ Content-Type: application/json
<code class="prettyprint language-js">
{
&quot;start&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;delta&quot; : 12345,
&quot;start&quot; : 12345,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......
......@@ -57,7 +57,7 @@
<li><a href="#resource_ProvisionController_sample_GET"><abbr title="GET /user/v1.0/provisioner/sample">GET /user/v1.0/provisioner/sam...</abbr></a></li>
<li><a href="#resource_ProvisionController_delete_DELETE"><abbr title="DELETE /user/v1.0/provisioner/{id}">DELETE /user/v1.0/provisioner/...</abbr></a></li>
<li><a href="#resource_ProvisionController_get_GET"><abbr title="GET /user/v1.0/provisioner/{id}">GET /user/v1.0/provisioner/{id...</abbr></a></li>
<li><a href="#resource_ProvisionController_postProvisionResponse_POST"><abbr title="POST /user/v1.0/provisioner/post/provision/">POST /user/v1.0/provisioner/po...</abbr></a></li>
<li><a href="#resource_ProvisionController_postProvisionResponse_POST"><abbr title="POST /user/v1.0/provisioner/post/provision">POST /user/v1.0/provisioner/po...</abbr></a></li>
<li class="divider"></li>
<li class="text-right"><a href="#top"><small>Back to Top</small></a></li>
</ul>
......@@ -648,7 +648,7 @@ Content-Type: application/json
</div>
<div id="resource_ProvisionController_postProvisionResponse_POST">
<h3><span class="label label-default resource-method">POST</span> <span class="resource-path">/user/v1.0/provisioner/post/provision/ <a href="../user/v1.0/provisioner/post/provision/" class="glyphicon glyphicon-new-window" target="_blank"></a></span></h3>
<h3><span class="label label-default resource-method">POST</span> <span class="resource-path">/user/v1.0/provisioner/post/provision <a href="../user/v1.0/provisioner/post/provision" class="glyphicon glyphicon-new-window" target="_blank"></a></span></h3>
<p>Updates or creates a new ProvisionResponse.</p>
......@@ -731,7 +731,7 @@ Content-Type: application/json
<div class="col-md-6">
<h5>Request</h5>
<pre>
POST /user/v1.0/provisioner/post/provision/
POST /user/v1.0/provisioner/post/provision
Content-Type: application/json
Accept: application/json
......
......@@ -264,7 +264,7 @@ provisopned based on a TOSCA description.</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/provision</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/sample</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/{id}</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/post/provision/</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/post/provision</span>
</samp></li></ul></td>
<td class="text-nowrap"><ul class="list-unstyled"><li><samp> <span class="label label-default resource-method">DELETE</span>
</samp></li><li><samp> <span class="label label-default resource-method">GET</span>
......
......@@ -232,11 +232,11 @@ the DAO saves the object based on the principal how made the call</span></td>
<pre class="prettyprint language-xml example">&lt;b-----&gt;
&lt;delta&gt;...&lt;/delta&gt;
&lt;end&gt;...&lt;/end&gt;
&lt;host&gt;147.228.242.58&lt;/host&gt;
&lt;vmType&gt;...&lt;/vmType&gt;
&lt;cloudDeploymentDomain&gt;us-east-1&lt;/cloudDeploymentDomain&gt;
&lt;host&gt;147.228.242.58&lt;/host&gt;
&lt;start&gt;...&lt;/start&gt;
&lt;end&gt;...&lt;/end&gt;
&lt;vmType&gt;...&lt;/vmType&gt;
&lt;owner&gt;user1&lt;/owner&gt;
&lt;timestamp&gt;...&lt;/timestamp&gt;
&lt;/b-----&gt;
......
......@@ -72,7 +72,7 @@
<h1 class="page-header">Files and Libraries</h1>
<h3 id="artifact_gwt_json_overlay">GWT JSON Overlay</h3>
<p class="lead">Created July 6, 2017</p>
<p class="lead">Created July 7, 2017</p>
<p> <p>
The <a href="http://code.google.com/webtoolkit/">Google Web Toolkit</a> JSON Overlay library provides the JSON Overlays that
can be used to access the Web service API for this application.
......@@ -97,7 +97,7 @@
</tbody>
</table>
<h3 id="artifact_java_json_client_library">Java JSON Client Library</h3>
<p class="lead">Created July 6, 2017</p>
<p class="lead">Created July 7, 2017</p>
<p><p>
The Java client-side library is used to provide the set of Java objects that can be serialized
to/from JSON using <a href="http://jackson.codehaus.org/">Jackson</a>. This is useful for accessing the
......@@ -127,7 +127,7 @@
</tbody>
</table>
<h3 id="artifact_java_xml_client_library">Java XML Client Library</h3>
<p class="lead">Created July 6, 2017</p>
<p class="lead">Created July 7, 2017</p>
<p><p>
The Java client-side library is used to access the Web service API for this application using Java.
</p>
......@@ -149,13 +149,13 @@
</tr>
<tr class="clickable-row" data-href="drip-api-xml-client-xml-sources.jar">
<td><span class="downloadfile-name">drip-api-xml-client-xml-sources.jar</span></td>
<td><span class="downloadfile-size">21.37K</span></td>
<td><span class="downloadfile-size">21.38K</span></td>
<td><span class="downloadfile-description">The sources for the Java XML client library.</span></td>
</tr>
</tbody>
</table>
<h3 id="artifact_js_client_library">JavaScript Client Library</h3>
<p class="lead">Created July 6, 2017</p>
<p class="lead">Created July 7, 2017</p>
<p><p>
The JavaScript client-side library defines classes that can be (de)serialized to/from JSON.
This is useful for accessing the resources that are published by this application, but only
......@@ -190,7 +190,7 @@
</tbody>
</table>
<h3 id="artifact_php_json_client_library">PHP JSON Client Library</h3>
<p class="lead">Created July 6, 2017</p>
<p class="lead">Created July 7, 2017</p>
<p><p>
The PHP JSON client-side library defines the PHP classes that can be (de)serialized to/from JSON.
This is useful for accessing the resources that are published by this application, but only
......@@ -213,13 +213,13 @@
<tbody data-link="row" class="rowlink">
<tr class="clickable-row" data-href="drip-api-php.zip">
<td><span class="downloadfile-name">drip-api-php.zip</span></td>
<td><span class="downloadfile-size">5.43K</span></td>
<td><span class="downloadfile-size">5.44K</span></td>
<td><span class="downloadfile-description">&nbsp;</span></td>
</tr>
</tbody>
</table>
<h3 id="artifact_php_xml_client_library">PHP XML Client Library</h3>
<p class="lead">Created July 6, 2017</p>
<p class="lead">Created July 7, 2017</p>
<p><p>
The PHP client-side library defines the PHP classes that can be (de)serialized to/from XML.
This is useful for accessing the resources that are published by this application, but only
......@@ -251,7 +251,7 @@
</tbody>
</table>
<h3 id="artifact_ruby_json_client_library">Ruby JSON Client Library</h3>
<p class="lead">Created July 6, 2017</p>
<p class="lead">Created July 7, 2017</p>
<p><p>
The Ruby JSON client-side library defines the Ruby classes that can be (de)serialized to/from JSON.
This is useful for accessing the REST endpoints that are published by this application, but only
......
......@@ -75,6 +75,139 @@ module EnunciateHelpers
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
class DeployParameter
# the IP
attr_accessor :IP
# the user
attr_accessor :user
# the role
attr_accessor :role
# the json hash for this DeployParameter
def to_jaxb_json_hash
_h = {}
_h['IP'] = IP.to_jaxb_json_hash unless IP.nil?
_h['user'] = user.to_jaxb_json_hash unless user.nil?
_h['role'] = role.to_jaxb_json_hash unless role.nil?
return _h
end
# the json (string form) for this DeployParameter
def to_json
to_jaxb_json_hash.to_json
end
#initializes this DeployParameter with a json hash
def init_jaxb_json_hash(_o)
if !_o['IP'].nil?
_oa = _o['IP']
if(_oa.is_a? Hash)
@IP = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@IP = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@IP = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@IP.push String.from_json(_item)
else
@IP.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@IP = _oa
end
end
if !_o['user'].nil?
_oa = _o['user']
if(_oa.is_a? Hash)
@user = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@user = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@user = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@user.push String.from_json(_item)
else
@user.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@user = _oa
end
end
if !_o['role'].nil?
_oa = _o['role']
if(_oa.is_a? Hash)
@role = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@role = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@role = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@role.push String.from_json(_item)
else
@role.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@role = _oa
end
end
end
# constructs a DeployParameter from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
else
inst = new
inst.init_jaxb_json_hash o
return inst
end
end
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
......@@ -345,228 +478,95 @@ module V1
module External
# (no documentation provided)
class DeployParameter
class PlanRequest
# the IP
attr_accessor :IP
# the user
attr_accessor :user
# the role
attr_accessor :role
# the toscaID
attr_accessor :toscaID
# the managerType
attr_accessor :managerType
# the vmUserName
attr_accessor :vmUserName
# the cloudProvider
attr_accessor :cloudProvider
# the osType
attr_accessor :osType
# the domain
attr_accessor :domain
# the json hash for this DeployParameter
# the json hash for this PlanRequest
def to_jaxb_json_hash
_h = {}
_h['IP'] = IP.to_jaxb_json_hash unless IP.nil?
_h['user'] = user.to_jaxb_json_hash unless user.nil?
_h['role'] = role.to_jaxb_json_hash unless role.nil?
_h['toscaID'] = toscaID.to_jaxb_json_hash unless toscaID.nil?
_h['managerType'] = managerType.to_jaxb_json_hash unless managerType.nil?
_h['vmUserName'] = vmUserName.to_jaxb_json_hash unless vmUserName.nil?
_h['cloudProvider'] = cloudProvider.to_jaxb_json_hash unless cloudProvider.nil?
_h['osType'] = osType.to_jaxb_json_hash unless osType.nil?
_h['domain'] = domain.to_jaxb_json_hash unless domain.nil?
return _h
end
# the json (string form) for this DeployParameter
# the json (string form) for this PlanRequest
def to_json
to_jaxb_json_hash.to_json
end
#initializes this DeployParameter with a json hash
#initializes this PlanRequest with a json hash
def init_jaxb_json_hash(_o)
if !_o['IP'].nil?
_oa = _o['IP']
if !_o['toscaID'].nil?
_oa = _o['toscaID']
if(_oa.is_a? Hash)
@IP = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@IP = String.from_json(_oa) unless _oa['@class']
@toscaID = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@toscaID = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@IP = Array.new
@toscaID = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@IP.push String.from_json(_item)
@toscaID.push String.from_json(_item)
else
@IP.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@toscaID.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@IP = _oa
@toscaID = _oa
end
end
if !_o['user'].nil?
_oa = _o['user']
if !_o['managerType'].nil?
_oa = _o['managerType']
if(_oa.is_a? Hash)
@user = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@user = String.from_json(_oa) unless _oa['@class']
@managerType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@managerType = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@user = Array.new
@managerType = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@user.push String.from_json(_item)
@managerType.push String.from_json(_item)
else
@user.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@managerType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@user = _oa
@managerType = _oa
end
end
if !_o['role'].nil?
_oa = _o['role']
if !_o['vmUserName'].nil?
_oa = _o['vmUserName']
if(_oa.is_a? Hash)
@role = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@role = String.from_json(_oa) unless _oa['@class']
@vmUserName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmUserName = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@role = Array.new
@vmUserName = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@role.push String.from_json(_item)
@vmUserName.push String.from_json(_item)
else
@role.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@vmUserName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@role = _oa
end
end
end
# constructs a DeployParameter from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
else
inst = new
inst.init_jaxb_json_hash o
return inst
end
end
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
class PlanRequest
# the toscaID
attr_accessor :toscaID
# the managerType
attr_accessor :managerType
# the vmUserName
attr_accessor :vmUserName
# the cloudProvider
attr_accessor :cloudProvider
# the osType
attr_accessor :osType
# the domain
attr_accessor :domain
# the json hash for this PlanRequest
def to_jaxb_json_hash
_h = {}
_h['toscaID'] = toscaID.to_jaxb_json_hash unless toscaID.nil?
_h['managerType'] = managerType.to_jaxb_json_hash unless managerType.nil?
_h['vmUserName'] = vmUserName.to_jaxb_json_hash unless vmUserName.nil?
_h['cloudProvider'] = cloudProvider.to_jaxb_json_hash unless cloudProvider.nil?
_h['osType'] = osType.to_jaxb_json_hash unless osType.nil?
_h['domain'] = domain.to_jaxb_json_hash unless domain.nil?
return _h
end
# the json (string form) for this PlanRequest
def to_json
to_jaxb_json_hash.to_json
end
#initializes this PlanRequest with a json hash
def init_jaxb_json_hash(_o)
if !_o['toscaID'].nil?
_oa = _o['toscaID']
if(_oa.is_a? Hash)
@toscaID = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@toscaID = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@toscaID = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@toscaID.push String.from_json(_item)
else
@toscaID.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@toscaID = _oa
end
end
if !_o['managerType'].nil?
_oa = _o['managerType']
if(_oa.is_a? Hash)
@managerType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@managerType = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@managerType = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@managerType.push String.from_json(_item)
else
@managerType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@managerType = _oa
end
end
if !_o['vmUserName'].nil?
_oa = _o['vmUserName']
if(_oa.is_a? Hash)
@vmUserName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmUserName = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@vmUserName = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@vmUserName.push String.from_json(_item)
else
@vmUserName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@vmUserName = _oa
@vmUserName = _oa
end
end
if !_o['cloudProvider'].nil?
......@@ -1211,110 +1211,156 @@ module V1
module External
module Ansible
# (no documentation provided)
class CloudCredentials < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
class BenchmarkResult < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
# the secret key
attr_accessor :secretKey
# the cloudProviderName
attr_accessor :cloudProviderName
# the accessKeyId
attr_accessor :accessKeyId
# the attributes
attr_accessor :attributes
# (no documentation provided)
attr_accessor :cloudDeploymentDomain
# (no documentation provided)
attr_accessor :start
# (no documentation provided)
attr_accessor :delta
# (no documentation provided)
attr_accessor :vmType
# (no documentation provided)
attr_accessor :host
# (no documentation provided)
attr_accessor :end
# the json hash for this CloudCredentials
# the json hash for this BenchmarkResult
def to_jaxb_json_hash
_h = super
_h['secretKey'] = secretKey.to_jaxb_json_hash unless secretKey.nil?
_h['cloudProviderName'] = cloudProviderName.to_jaxb_json_hash unless cloudProviderName.nil?
_h['accessKeyId'] = accessKeyId.to_jaxb_json_hash unless accessKeyId.nil?
_h['attributes'] = attributes.to_jaxb_json_hash unless attributes.nil?
_h['cloudDeploymentDomain'] = cloudDeploymentDomain.to_jaxb_json_hash unless cloudDeploymentDomain.nil?
_h['start'] = start.to_jaxb_json_hash unless start.nil?
_h['delta'] = delta.to_jaxb_json_hash unless delta.nil?
_h['vmType'] = vmType.to_jaxb_json_hash unless vmType.nil?
_h['host'] = host.to_jaxb_json_hash unless host.nil?
_h['end'] = end.to_jaxb_json_hash unless end.nil?
return _h
end
#initializes this CloudCredentials with a json hash
#initializes this BenchmarkResult with a json hash
def init_jaxb_json_hash(_o)
super _o
if !_o['secretKey'].nil?
_oa = _o['secretKey']
if !_o['cloudDeploymentDomain'].nil?
_oa = _o['cloudDeploymentDomain']
if(_oa.is_a? Hash)
@secretKey = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@secretKey = String.from_json(_oa) unless _oa['@class']
@cloudDeploymentDomain = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudDeploymentDomain = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@secretKey = Array.new
@cloudDeploymentDomain = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@secretKey.push String.from_json(_item)
@cloudDeploymentDomain.push String.from_json(_item)
else
@secretKey.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@cloudDeploymentDomain.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@secretKey = _oa
@cloudDeploymentDomain = _oa
end
end
if !_o['cloudProviderName'].nil?
_oa = _o['cloudProviderName']
if !_o['start'].nil?
_oa = _o['start']
if(_oa.is_a? Hash)
@cloudProviderName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudProviderName = String.from_json(_oa) unless _oa['@class']
@start = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@start = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudProviderName = Array.new
@start = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudProviderName.push String.from_json(_item)
@start.push Time.from_json(_item)
else
@cloudProviderName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@start.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudProviderName = _oa
@start = _oa
end
end
if !_o['accessKeyId'].nil?
_oa = _o['accessKeyId']
if !_o['delta'].nil?
_oa = _o['delta']
if(_oa.is_a? Hash)
@accessKeyId = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@accessKeyId = String.from_json(_oa) unless _oa['@class']
@delta = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@delta = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@accessKeyId = Array.new
@delta = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@accessKeyId.push String.from_json(_item)
@delta.push Time.from_json(_item)
else
@accessKeyId.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@delta.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@accessKeyId = _oa
@delta = _oa
end
end
if !_o['attributes'].nil?
_oa = _o['attributes']
if !_o['vmType'].nil?
_oa = _o['vmType']
if(_oa.is_a? Hash)
@attributes = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@attributes = Hash.from_json(_oa) unless _oa['@class']
@vmType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmType = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@attributes = Array.new
@vmType = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@attributes.push Hash.from_json(_item)
@vmType.push String.from_json(_item)
else
@attributes.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@vmType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@attributes = _oa
@vmType = _oa
end
end
if !_o['host'].nil?
_oa = _o['host']
if(_oa.is_a? Hash)
@host = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@host = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@host = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@host.push String.from_json(_item)
else
@host.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@host = _oa
end
end
if !_o['end'].nil?
_oa = _o['end']
if(_oa.is_a? Hash)
@end = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@end = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@end = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@end.push Time.from_json(_item)
else
@end.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@end = _oa
end
end
end
# constructs a CloudCredentials from a (parsed) JSON hash
# constructs a BenchmarkResult from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
......@@ -1344,6 +1390,8 @@ end
end
end
module Nl
module Uva
......@@ -1362,156 +1410,110 @@ module V1
module External
module Ansible
# (no documentation provided)
class BenchmarkResult < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
class CloudCredentials < Nl::Uva::Sne::Drip::Drip::Commons::Data::V1::External::OwnedObject
# (no documentation provided)
attr_accessor :delta
# (no documentation provided)
attr_accessor :cloudDeploymentDomain
# (no documentation provided)
attr_accessor :vmType
# (no documentation provided)
attr_accessor :end
# (no documentation provided)
attr_accessor :start
# (no documentation provided)
attr_accessor :host
# the secret key
attr_accessor :secretKey
# the cloudProviderName
attr_accessor :cloudProviderName
# the accessKeyId
attr_accessor :accessKeyId
# the attributes
attr_accessor :attributes
# the json hash for this BenchmarkResult
# the json hash for this CloudCredentials
def to_jaxb_json_hash
_h = super
_h['delta'] = delta.to_jaxb_json_hash unless delta.nil?
_h['cloudDeploymentDomain'] = cloudDeploymentDomain.to_jaxb_json_hash unless cloudDeploymentDomain.nil?
_h['vmType'] = vmType.to_jaxb_json_hash unless vmType.nil?
_h['end'] = end.to_jaxb_json_hash unless end.nil?
_h['start'] = start.to_jaxb_json_hash unless start.nil?
_h['host'] = host.to_jaxb_json_hash unless host.nil?
_h['secretKey'] = secretKey.to_jaxb_json_hash unless secretKey.nil?
_h['cloudProviderName'] = cloudProviderName.to_jaxb_json_hash unless cloudProviderName.nil?
_h['accessKeyId'] = accessKeyId.to_jaxb_json_hash unless accessKeyId.nil?
_h['attributes'] = attributes.to_jaxb_json_hash unless attributes.nil?
return _h
end
#initializes this BenchmarkResult with a json hash
#initializes this CloudCredentials with a json hash
def init_jaxb_json_hash(_o)
super _o
if !_o['delta'].nil?
_oa = _o['delta']
if(_oa.is_a? Hash)
@delta = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@delta = Time.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@delta = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@delta.push Time.from_json(_item)
else
@delta.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@delta = _oa
end
end
if !_o['cloudDeploymentDomain'].nil?
_oa = _o['cloudDeploymentDomain']
if(_oa.is_a? Hash)
@cloudDeploymentDomain = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudDeploymentDomain = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@cloudDeploymentDomain = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@cloudDeploymentDomain.push String.from_json(_item)
else
@cloudDeploymentDomain.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@cloudDeploymentDomain = _oa
end
end
if !_o['vmType'].nil?
_oa = _o['vmType']
if !_o['secretKey'].nil?
_oa = _o['secretKey']
if(_oa.is_a? Hash)
@vmType = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@vmType = String.from_json(_oa) unless _oa['@class']
@secretKey = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@secretKey = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@vmType = Array.new
@secretKey = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@vmType.push String.from_json(_item)
@secretKey.push String.from_json(_item)
else
@vmType.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@secretKey.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@vmType = _oa
@secretKey = _oa
end
end
if !_o['end'].nil?
_oa = _o['end']
if !_o['cloudProviderName'].nil?
_oa = _o['cloudProviderName']
if(_oa.is_a? Hash)
@end = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@end = Time.from_json(_oa) unless _oa['@class']
@cloudProviderName = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@cloudProviderName = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@end = Array.new
@cloudProviderName = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@end.push Time.from_json(_item)
@cloudProviderName.push String.from_json(_item)
else
@end.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@cloudProviderName.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@end = _oa
@cloudProviderName = _oa
end
end
if !_o['start'].nil?
_oa = _o['start']
if !_o['accessKeyId'].nil?
_oa = _o['accessKeyId']
if(_oa.is_a? Hash)
@start = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@start = Time.from_json(_oa) unless _oa['@class']
@accessKeyId = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@accessKeyId = String.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@start = Array.new
@accessKeyId = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@start.push Time.from_json(_item)
@accessKeyId.push String.from_json(_item)
else
@start.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@accessKeyId.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@start = _oa
@accessKeyId = _oa
end
end
if !_o['host'].nil?
_oa = _o['host']
if !_o['attributes'].nil?
_oa = _o['attributes']
if(_oa.is_a? Hash)
@host = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@host = String.from_json(_oa) unless _oa['@class']
@attributes = EnunciateHelpers::LAMB_CLASS_AWARE.call(_oa) if _oa['@class']
@attributes = Hash.from_json(_oa) unless _oa['@class']
elsif (_oa.is_a? Array)
#an array(of hashes hopefully) or scalar
@host = Array.new
@attributes = Array.new
_oa.each { | _item |
if ((_item.nil? || _item['@class'].nil?)rescue true)
@host.push String.from_json(_item)
@attributes.push Hash.from_json(_item)
else
@host.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
@attributes.push EnunciateHelpers::LAMB_CLASS_AWARE.call(_item)
end
}
else
@host = _oa
@attributes = _oa
end
end
end
# constructs a BenchmarkResult from a (parsed) JSON hash
# constructs a CloudCredentials from a (parsed) JSON hash
def self.from_json(o)
if o.nil?
return nil
......@@ -1541,54 +1543,6 @@ end
end
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
class KeyType
# For private keys
PRIVATE = "PRIVATE"
# For public keys
PUBLIC = "PUBLIC"
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
......@@ -1712,6 +1666,52 @@ module Data
module V1
module External
# (no documentation provided)
class KeyType
# For private keys
PRIVATE = "PRIVATE"
# For public keys
PUBLIC = "PUBLIC"
end
end
end
end
end
end
end
end
end
end
module Nl
module Uva
module Sne
module Drip
module Drip
module Commons
module Data
module V1
module External
# (no documentation provided)
......
......@@ -272,7 +272,7 @@ provisopned based on a TOSCA description.</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/provision</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/sample</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/{id}</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/post/provision/</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/post/provision</span>
</samp></li></ul></td>
<td class="text-nowrap"><ul class="list-unstyled"><li><samp> <span class="label label-default resource-method">DELETE</span>
</samp></li><li><samp> <span class="label label-default resource-method">GET</span>
......
......@@ -81,54 +81,54 @@ class</p>
</thead>
<tbody>
<tr>
<td> <span class="property-name">delta</span>
<td> <span class="property-name">cloudDeploymentDomain</span>
</td>
<td> <span class="datatype-reference">number
<td> <span class="datatype-reference">string
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">cloudDeploymentDomain</span>
<td> <span class="property-name">start</span>
</td>
<td> <span class="datatype-reference">string
<td> <span class="datatype-reference">number
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">vmType</span>
<td> <span class="property-name">delta</span>
</td>
<td> <span class="datatype-reference">string
<td> <span class="datatype-reference">number
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">end</span>
<td> <span class="property-name">vmType</span>
</td>
<td> <span class="datatype-reference">number
<td> <span class="datatype-reference">string
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">start</span>
<td> <span class="property-name">host</span>
</td>
<td> <span class="datatype-reference">number
<td> <span class="datatype-reference">string
</span>
</td>
<td> <span class="property-description"></span>
</td>
</tr>
<tr>
<td> <span class="property-name">host</span>
<td> <span class="property-name">end</span>
</td>
<td> <span class="datatype-reference">string
<td> <span class="datatype-reference">number
</span>
</td>
<td> <span class="property-description"></span>
......@@ -165,12 +165,12 @@ object is saved.</span></td>
<p class="lead">Example</p>
<pre class="prettyprint language-js example">{
&quot;delta&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;end&quot; : 12345,
&quot;start&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......
......@@ -69,7 +69,7 @@ class</p>
<dl class="dl-horizontal">
<dt>Subtypes</dt>
<dd><a href="json_KeyPair.html">KeyPair</a>, <a href="json_AnsibleOutput.html">AnsibleOutput</a>, <a href="json_CloudCredentials.html">CloudCredentials</a>, <a href="json_BenchmarkResult.html">BenchmarkResult</a>, <a href="json_DeployResponse.html">DeployResponse</a>, <a href="json_ProvisionRequest.html">ProvisionRequest</a>, <a href="json_Script.html">Script</a>, <a href="json_KeyValueHolder.html">KeyValueHolder</a>, <a href="json_DeployRequest.html">DeployRequest</a>, <a href="json_ProvisionResponse.html">ProvisionResponse</a></dd>
<dd><a href="json_KeyPair.html">KeyPair</a>, <a href="json_AnsibleOutput.html">AnsibleOutput</a>, <a href="json_BenchmarkResult.html">BenchmarkResult</a>, <a href="json_CloudCredentials.html">CloudCredentials</a>, <a href="json_DeployResponse.html">DeployResponse</a>, <a href="json_ProvisionRequest.html">ProvisionRequest</a>, <a href="json_Script.html">Script</a>, <a href="json_KeyValueHolder.html">KeyValueHolder</a>, <a href="json_DeployRequest.html">DeployRequest</a>, <a href="json_ProvisionResponse.html">ProvisionResponse</a></dd>
</dl>
<table class="table datatype-properties">
......
......@@ -753,17 +753,17 @@ class]]>
<xs:complexContent>
<xs:extension base="ownedObject">
<xs:sequence>
<xs:element name="host" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="vmType" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="end" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="delta" type="xs:dateTime" minOccurs="0">
<xs:element name="cloudDeploymentDomain" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="start" type="xs:dateTime" minOccurs="0">
</xs:element>
<xs:element name="cloudDeploymentDomain" type="xs:string" minOccurs="0">
<xs:element name="host" type="xs:string" minOccurs="0">
</xs:element>
<xs:element name="delta" type="xs:dateTime" minOccurs="0">
</xs:element>
</xs:sequence>
</xs:extension>
......
......@@ -144,12 +144,12 @@ Content-Type: application/json
<code class="prettyprint language-js">
[ {
&quot;delta&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;end&quot; : 12345,
&quot;start&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......@@ -514,12 +514,12 @@ Content-Type: application/json
<code class="prettyprint language-js">
{
&quot;delta&quot; : 12345,
&quot;cloudDeploymentDomain&quot; : &quot;us-east-1&quot;,
&quot;vmType&quot; : &quot;...&quot;,
&quot;end&quot; : 12345,
&quot;start&quot; : 12345,
&quot;delta&quot; : 12345,
&quot;vmType&quot; : &quot;...&quot;,
&quot;host&quot; : &quot;147.228.242.58&quot;,
&quot;end&quot; : 12345,
&quot;owner&quot; : &quot;user1&quot;,
&quot;id&quot; : &quot;58e3946e0fb4f562d84ba1ad&quot;,
&quot;timestamp&quot; : 12345
......
......@@ -57,7 +57,7 @@
<li><a href="#resource_ProvisionController_sample_GET"><abbr title="GET /user/v1.0/provisioner/sample">GET /user/v1.0/provisioner/sam...</abbr></a></li>
<li><a href="#resource_ProvisionController_delete_DELETE"><abbr title="DELETE /user/v1.0/provisioner/{id}">DELETE /user/v1.0/provisioner/...</abbr></a></li>
<li><a href="#resource_ProvisionController_get_GET"><abbr title="GET /user/v1.0/provisioner/{id}">GET /user/v1.0/provisioner/{id...</abbr></a></li>
<li><a href="#resource_ProvisionController_postProvisionResponse_POST"><abbr title="POST /user/v1.0/provisioner/post/provision/">POST /user/v1.0/provisioner/po...</abbr></a></li>
<li><a href="#resource_ProvisionController_postProvisionResponse_POST"><abbr title="POST /user/v1.0/provisioner/post/provision">POST /user/v1.0/provisioner/po...</abbr></a></li>
<li class="divider"></li>
<li class="text-right"><a href="#top"><small>Back to Top</small></a></li>
</ul>
......@@ -648,7 +648,7 @@ Content-Type: application/json
</div>
<div id="resource_ProvisionController_postProvisionResponse_POST">
<h3><span class="label label-default resource-method">POST</span> <span class="resource-path">/user/v1.0/provisioner/post/provision/ <a href="./user/v1.0/provisioner/post/provision/" class="glyphicon glyphicon-new-window" target="_blank"></a></span></h3>
<h3><span class="label label-default resource-method">POST</span> <span class="resource-path">/user/v1.0/provisioner/post/provision <a href="./user/v1.0/provisioner/post/provision" class="glyphicon glyphicon-new-window" target="_blank"></a></span></h3>
<p>Updates or creates a new ProvisionResponse.</p>
......@@ -731,7 +731,7 @@ Content-Type: application/json
<div class="col-md-6">
<h5>Request</h5>
<pre>
POST /user/v1.0/provisioner/post/provision/
POST /user/v1.0/provisioner/post/provision
Content-Type: application/json
Accept: application/json
......
......@@ -264,7 +264,7 @@ provisopned based on a TOSCA description.</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/provision</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/sample</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/{id}</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/post/provision/</span>
</samp></li><li><samp> <span class="resource-path">/user/v1.0/provisioner/post/provision</span>
</samp></li></ul></td>
<td class="text-nowrap"><ul class="list-unstyled"><li><samp> <span class="label label-default resource-method">DELETE</span>
</samp></li><li><samp> <span class="label label-default resource-method">GET</span>
......
......@@ -231,12 +231,12 @@ the DAO saves the object based on the principal how made the call</span></td>
<p class="lead">Example</p>
<pre class="prettyprint language-xml example">&lt;b-----&gt;
&lt;host&gt;147.228.242.58&lt;/host&gt;
&lt;vmType&gt;...&lt;/vmType&gt;
&lt;end&gt;...&lt;/end&gt;
&lt;delta&gt;...&lt;/delta&gt;
&lt;start&gt;...&lt;/start&gt;
&lt;cloudDeploymentDomain&gt;us-east-1&lt;/cloudDeploymentDomain&gt;
&lt;start&gt;...&lt;/start&gt;
&lt;host&gt;147.228.242.58&lt;/host&gt;
&lt;delta&gt;...&lt;/delta&gt;
&lt;owner&gt;user1&lt;/owner&gt;
&lt;timestamp&gt;...&lt;/timestamp&gt;
&lt;/b-----&gt;
......
......@@ -15,13 +15,13 @@
*/
package nl.uva.sne.drip.api.dao;
import nl.uva.sne.drip.drip.commons.data.v1.external.PlaybookRepresentation;
import nl.uva.sne.drip.drip.commons.data.v1.external.ConfigurationRepresentation;
import org.springframework.data.mongodb.repository.MongoRepository;
/**
*
* @author S. Koulouzis
*/
public interface PlaybookDao extends MongoRepository<PlaybookRepresentation, String> {
public interface ConfigurationDao extends MongoRepository<ConfigurationRepresentation, String> {
}
......@@ -20,7 +20,7 @@ import java.util.List;
import java.util.Map;
import nl.uva.sne.drip.api.exception.NotFoundException;
import nl.uva.sne.drip.commons.utils.Constants;
import nl.uva.sne.drip.drip.commons.data.v1.external.PlaybookRepresentation;
import nl.uva.sne.drip.drip.commons.data.v1.external.ConfigurationRepresentation;
import nl.uva.sne.drip.commons.utils.Converter;
import nl.uva.sne.drip.drip.commons.data.v1.external.User;
import org.json.JSONException;
......@@ -31,7 +31,7 @@ import org.springframework.security.access.prepost.PreAuthorize;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.stereotype.Service;
import org.springframework.web.multipart.MultipartFile;
import nl.uva.sne.drip.api.dao.PlaybookDao;
import nl.uva.sne.drip.api.dao.ConfigurationDao;
/**
*
......@@ -39,18 +39,18 @@ import nl.uva.sne.drip.api.dao.PlaybookDao;
*/
@Service
@PreAuthorize("isAuthenticated()")
public class PlaybookService {
public class ConfigurationService {
@Autowired
private PlaybookDao dao;
private ConfigurationDao dao;
public String get(String id, String fromat) throws JSONException, NotFoundException {
PlaybookRepresentation playbook = findOne(id);
if (playbook == null) {
ConfigurationRepresentation configuration = findOne(id);
if (configuration == null) {
throw new NotFoundException();
}
Map<String, Object> map = playbook.getKeyValue();
Map<String, Object> map = configuration.getKeyValue();
if (fromat != null && fromat.toLowerCase().equals("yml")) {
String ymlStr = Converter.map2YmlString(map);
......@@ -80,30 +80,30 @@ public class PlaybookService {
public String saveYamlString(String yamlString, String name) throws IOException {
yamlString = yamlString.replaceAll("\\.", "\uff0E");
Map<String, Object> map = Converter.ymlString2Map(yamlString);
PlaybookRepresentation t = new PlaybookRepresentation();
ConfigurationRepresentation t = new ConfigurationRepresentation();
t.setKvMap(map);
save(t);
return t.getId();
}
@PostAuthorize("(returnObject.owner == authentication.name) or (hasRole('ROLE_ADMIN'))")
public PlaybookRepresentation delete(String id) {
PlaybookRepresentation tr = dao.findOne(id);
public ConfigurationRepresentation delete(String id) {
ConfigurationRepresentation tr = dao.findOne(id);
dao.delete(tr);
return tr;
}
@PostFilter("(filterObject.owner == authentication.name) or (hasRole('ROLE_ADMIN'))")
public List<PlaybookRepresentation> findAll() {
public List<ConfigurationRepresentation> findAll() {
return dao.findAll();
}
@PostAuthorize("(returnObject.owner == authentication.name) or (hasRole('ROLE_ADMIN'))")
public PlaybookRepresentation findOne(String id) {
public ConfigurationRepresentation findOne(String id) {
return dao.findOne(id);
}
private PlaybookRepresentation save(PlaybookRepresentation t) {
private ConfigurationRepresentation save(ConfigurationRepresentation t) {
User user = (User) SecurityContextHolder.getContext().getAuthentication().getPrincipal();
String owner = user.getUsername();
t.setOwner(owner);
......@@ -115,9 +115,9 @@ public class PlaybookService {
dao.deleteAll();
}
public String saveStringContents(String playbookContents) throws IOException {
Map<String, Object> map = Converter.cleanStringContents(playbookContents, false);
PlaybookRepresentation t = new PlaybookRepresentation();
public String saveStringContents(String yamlContents) throws IOException {
Map<String, Object> map = Converter.cleanStringContents(yamlContents, false);
ConfigurationRepresentation t = new ConfigurationRepresentation();
t.setKvMap(map);
save(t);
return t.getId();
......
......@@ -78,14 +78,13 @@ public class DeployService {
@Value("${message.broker.host}")
private String messageBrokerHost;
@Autowired
private CloudCredentialsService cloudCredentialsService;
// @Autowired
// private CloudCredentialsService cloudCredentialsService;
@Autowired
private ProvisionService provisionService;
@Autowired
private PlaybookService playbookService;
private ConfigurationService configurationService;
@Autowired
private BenchmarkResultService benchmarkResultService;
......@@ -186,6 +185,11 @@ public class DeployService {
parameters.add(ansibleParameter);
}
if (managerType.toLowerCase().equals("swarm") && configurationID != null) {
MessageParameter composerParameter = createComposerParameter(configurationID);
parameters.add(composerParameter);
}
Message deployInvokationMessage = new Message();
deployInvokationMessage.setParameters(parameters);
deployInvokationMessage.setCreationDate(System.currentTimeMillis());
......@@ -228,12 +232,24 @@ public class DeployService {
}
private MessageParameter createAnsibleParameter(String configurationID) throws JSONException {
String playbook = playbookService.get(configurationID, "yml");
MessageParameter ansibleParameter = new MessageParameter();
ansibleParameter.setName("playbook");
ansibleParameter.setEncoding("UTF-8");
ansibleParameter.setValue(playbook);
return ansibleParameter;
return createConfigurationParameter(configurationID, "ansible");
}
private MessageParameter createComposerParameter(String configurationID) throws JSONException {
MessageParameter configurationParameter = createConfigurationParameter(configurationID, "composer");
Map<String, String> attributes = new HashMap<>();
attributes.put("name", configurationID);
configurationParameter.setAttributes(attributes);
return configurationParameter;
}
private MessageParameter createConfigurationParameter(String configurationID, String confType) throws JSONException {
String configuration = configurationService.get(configurationID, "yml");
MessageParameter configurationParameter = new MessageParameter();
configurationParameter.setName(confType);
configurationParameter.setEncoding("UTF-8");
configurationParameter.setValue(configuration);
return configurationParameter;
}
private DeployResponse handleResponse(List<MessageParameter> params, DeployRequest deployInfo) throws KeyException, IOException, Exception {
......
......@@ -17,7 +17,7 @@ package nl.uva.sne.drip.api.v1.rest;
import com.webcohesion.enunciate.metadata.rs.ResponseCode;
import com.webcohesion.enunciate.metadata.rs.StatusCodes;
import nl.uva.sne.drip.drip.commons.data.v1.external.PlaybookRepresentation;
import nl.uva.sne.drip.drip.commons.data.v1.external.ConfigurationRepresentation;
import java.io.IOException;
import java.util.ArrayList;
import java.util.List;
......@@ -36,7 +36,7 @@ import org.springframework.web.multipart.MultipartFile;
import org.springframework.web.bind.annotation.PathVariable;
import nl.uva.sne.drip.api.exception.BadRequestException;
import nl.uva.sne.drip.api.exception.NotFoundException;
import nl.uva.sne.drip.api.service.PlaybookService;
import nl.uva.sne.drip.api.service.ConfigurationService;
import nl.uva.sne.drip.api.service.UserService;
import org.springframework.web.bind.annotation.RequestBody;
......@@ -55,7 +55,7 @@ import org.springframework.web.bind.annotation.RequestBody;
public class ConfigurationController {
@Autowired
private PlaybookService playbookService;
private ConfigurationService configurationService;
/**
* Post a deployment configuration.
......@@ -72,7 +72,7 @@ public class ConfigurationController {
public @ResponseBody
String post(@RequestBody String yamlContents) {
try {
return playbookService.saveStringContents(yamlContents);
return configurationService.saveStringContents(yamlContents);
} catch (IOException ex) {
throw new BadRequestException("Not valid contents");
}
......@@ -97,7 +97,7 @@ public class ConfigurationController {
throw new BadRequestException("Must uplaod a file");
}
try {
return playbookService.saveFile(file);
return configurationService.saveFile(file);
} catch (IOException | IllegalStateException ex) {
throw new BadRequestException("Not valid contents");
}
......@@ -120,7 +120,7 @@ public class ConfigurationController {
public @ResponseBody
String get(@PathVariable("id") String id, @RequestParam(value = "format") String format) {
try {
return playbookService.get(id, format);
return configurationService.get(id, format);
} catch (JSONException | NotFoundException ex) {
throw new BadRequestException("Not valid contents");
}
......@@ -139,7 +139,7 @@ public class ConfigurationController {
})
public @ResponseBody
String delete(@PathVariable("id") String id) {
playbookService.delete(id);
configurationService.delete(id);
return "Deleted : " + id;
}
......@@ -155,9 +155,9 @@ public class ConfigurationController {
})
public @ResponseBody
List<String> getIds() {
List<PlaybookRepresentation> all = playbookService.findAll();
List<ConfigurationRepresentation> all = configurationService.findAll();
List<String> ids = new ArrayList<>();
for (PlaybookRepresentation tr : all) {
for (ConfigurationRepresentation tr : all) {
ids.add(tr.getId());
}
return ids;
......@@ -175,7 +175,7 @@ public class ConfigurationController {
})
public @ResponseBody
String deleteAll() {
playbookService.deleteAll();
configurationService.deleteAll();
return "Done";
}
......
......@@ -19,8 +19,6 @@ import com.webcohesion.enunciate.metadata.rs.ResponseCode;
import com.webcohesion.enunciate.metadata.rs.StatusCodes;
import java.util.ArrayList;
import java.util.List;
import java.util.logging.Level;
import java.util.logging.Logger;
import javax.annotation.security.RolesAllowed;
import nl.uva.sne.drip.api.exception.BadRequestException;
import nl.uva.sne.drip.api.exception.InternalServerErrorException;
......
......@@ -19,11 +19,12 @@ import com.fasterxml.jackson.annotation.JsonInclude;
import org.springframework.data.mongodb.core.mapping.Document;
/**
* This class represents a playbook used by ansible manager to deploy software.
* This class represents a configuration ( playbook used by ansible manager or
* composer for docker-composer) to deploy software.
*
* @author S. Koulouzis
*/
@Document
@JsonInclude(JsonInclude.Include.NON_NULL)
public class PlaybookRepresentation extends KeyValueHolder {
public class ConfigurationRepresentation extends KeyValueHolder {
}
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
DEB [20170707-18:28:52.906] thr=1 paramiko.transport: starting thread (client mode): 0xf18b3b10L
DEB [20170707-18:28:52.906] thr=1 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:28:52.927] thr=1 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:28:52.927] thr=1 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:28:52.942] thr=1 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:28:52.943] thr=1 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:28:52.943] thr=1 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:28:52.943] thr=1 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:28:52.943] thr=1 paramiko.transport: Compression agreed: none
DEB [20170707-18:28:53.111] thr=1 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:28:53.111] thr=1 paramiko.transport: Switch to new keys ...
DEB [20170707-18:28:53.114] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:28:53.115] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/1.txt
DEB [20170707-18:28:53.182] thr=1 paramiko.transport: userauth is OK
INF [20170707-18:28:53.206] thr=1 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:28:53.216] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:28:53.274] thr=1 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:28:53.274] thr=1 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:28:53.296] thr=1 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:28:53.316] thr=1 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:28:53.317] thr=1 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:28:53.333] thr=3 paramiko.transport: starting thread (client mode): 0xf190f710L
DEB [20170707-18:28:53.333] thr=3 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:28:53.354] thr=3 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:28:53.354] thr=3 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:28:53.369] thr=3 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:28:53.370] thr=3 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:28:53.370] thr=3 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:28:53.370] thr=3 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:28:53.370] thr=3 paramiko.transport: Compression agreed: none
DEB [20170707-18:28:53.431] thr=3 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:28:53.431] thr=3 paramiko.transport: Switch to new keys ...
DEB [20170707-18:28:53.434] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:28:53.435] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/2.txt
DEB [20170707-18:28:53.502] thr=3 paramiko.transport: userauth is OK
INF [20170707-18:28:53.524] thr=3 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:28:53.536] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:28:53.582] thr=3 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:28:53.582] thr=3 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:28:53.616] thr=3 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:28:53.638] thr=3 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:28:53.638] thr=3 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:28:53.654] thr=4 paramiko.transport: starting thread (client mode): 0xe3f34250L
DEB [20170707-18:28:53.655] thr=4 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:28:53.674] thr=4 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:28:53.675] thr=4 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:28:53.690] thr=4 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:28:53.690] thr=4 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:28:53.691] thr=4 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:28:53.691] thr=4 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:28:53.691] thr=4 paramiko.transport: Compression agreed: none
DEB [20170707-18:28:53.755] thr=4 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:28:53.756] thr=4 paramiko.transport: Switch to new keys ...
DEB [20170707-18:28:53.756] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:28:53.757] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/1.txt
DEB [20170707-18:28:53.826] thr=4 paramiko.transport: userauth is OK
INF [20170707-18:28:53.848] thr=4 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:28:53.858] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:28:53.904] thr=4 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:28:53.905] thr=4 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:28:53.938] thr=4 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:28:53.968] thr=4 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:28:53.969] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:28:53.970] thr=4 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:28:53.985] thr=4 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:28:53.985] thr=4 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:28:54.055] thr=4 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:28:54.077] thr=4 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:28:54.078] thr=2 paramiko.transport: [chan 2] Max packet in: 32768 bytes
DEB [20170707-18:28:54.079] thr=4 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:28:54.094] thr=4 paramiko.transport: [chan 2] Max packet out: 32768 bytes
DEB [20170707-18:28:54.094] thr=4 paramiko.transport: Secsh channel 2 opened.
DEB [20170707-18:28:54.163] thr=4 paramiko.transport: [chan 2] Sesch channel 2 request ok
DEB [20170707-18:28:54.923] thr=4 paramiko.transport: [chan 2] EOF received (2)
DEB [20170707-18:28:54.940] thr=4 paramiko.transport: starting thread (client mode): 0xe3f34250L
DEB [20170707-18:28:54.940] thr=4 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:28:54.960] thr=4 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:28:54.961] thr=4 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:28:54.976] thr=4 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:28:54.976] thr=4 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:28:54.977] thr=4 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:28:54.977] thr=4 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:28:54.977] thr=4 paramiko.transport: Compression agreed: none
DEB [20170707-18:28:55.039] thr=4 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:28:55.040] thr=4 paramiko.transport: Switch to new keys ...
DEB [20170707-18:28:55.041] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:28:55.042] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/2.txt
DEB [20170707-18:28:55.110] thr=4 paramiko.transport: userauth is OK
INF [20170707-18:28:55.132] thr=4 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:28:55.143] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:28:55.220] thr=4 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:28:55.220] thr=4 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:28:55.260] thr=4 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:03.668] thr=4 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:03.669] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:03.669] thr=4 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:03.685] thr=4 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:03.685] thr=4 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:03.755] thr=4 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:03.786] thr=4 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:03.786] thr=4 paramiko.transport: EOF in transport thread
DEB [20170707-18:29:03.804] thr=5 paramiko.transport: starting thread (client mode): 0xe3f34ed0L
DEB [20170707-18:29:03.804] thr=5 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:03.824] thr=5 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:03.825] thr=5 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:03.840] thr=5 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:03.841] thr=5 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:03.841] thr=5 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:03.841] thr=5 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:03.841] thr=5 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:03.903] thr=5 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:03.903] thr=5 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:03.904] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:03.905] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444932887/1.txt
DEB [20170707-18:29:03.974] thr=5 paramiko.transport: userauth is OK
INF [20170707-18:29:03.997] thr=5 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:04.006] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:04.073] thr=5 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:04.073] thr=5 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:04.123] thr=5 paramiko.transport: [chan 0] Sesch channel 0 request ok
INF [20170707-18:29:04.140] thr=2 paramiko.transport.sftp: [chan 0] Opened sftp connection (server version 3)
DEB [20170707-18:29:04.140] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/')
DEB [20170707-18:29:04.157] thr=2 paramiko.transport.sftp: [chan 0] normalize('/tmp/')
DEB [20170707-18:29:04.175] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb')
DEB [20170707-18:29:04.192] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb') -> 00000000
DEB [20170707-18:29:04.193] thr=2 paramiko.transport.sftp: [chan 0] close(00000000)
DEB [20170707-18:29:04.225] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/docker-compose.yml')
DEB [20170707-18:29:04.242] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:04.259] thr=5 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:04.259] thr=5 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:04.291] thr=5 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:04.320] thr=5 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:04.321] thr=5 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:29:04.321] thr=5 paramiko.transport: Dropping user packet because connection is dead.
DEB [20170707-18:29:04.321] thr=5 paramiko.transport: Dropping user packet because connection is dead.
DEB [20170707-18:29:14.347] thr=6 paramiko.transport: starting thread (client mode): 0xe3f3c590L
DEB [20170707-18:29:14.347] thr=6 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:14.374] thr=6 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:14.374] thr=6 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:14.389] thr=6 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:14.390] thr=6 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:14.390] thr=6 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:14.390] thr=6 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:14.390] thr=6 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:14.454] thr=6 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:14.454] thr=6 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:14.456] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:14.457] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/1.txt
DEB [20170707-18:29:14.522] thr=6 paramiko.transport: userauth is OK
INF [20170707-18:29:14.548] thr=6 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:14.558] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:14.629] thr=6 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:14.630] thr=6 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:14.675] thr=6 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:14.706] thr=6 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:14.707] thr=6 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:14.723] thr=7 paramiko.transport: starting thread (client mode): 0xe3f34790L
DEB [20170707-18:29:14.723] thr=7 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:14.749] thr=7 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:14.749] thr=7 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:14.765] thr=7 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:14.839] thr=7 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:14.840] thr=7 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:14.842] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:14.843] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/2.txt
DEB [20170707-18:29:14.910] thr=7 paramiko.transport: userauth is OK
INF [20170707-18:29:14.939] thr=7 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:14.944] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:15.017] thr=7 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:15.017] thr=7 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:15.062] thr=7 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:15.089] thr=7 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:15.090] thr=7 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:15.106] thr=8 paramiko.transport: starting thread (client mode): 0xe2ec6a90L
DEB [20170707-18:29:15.106] thr=8 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:15.130] thr=8 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:15.131] thr=8 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:15.146] thr=8 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:15.146] thr=8 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:15.146] thr=8 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:15.147] thr=8 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:15.147] thr=8 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:15.214] thr=8 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:15.215] thr=8 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:15.216] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:15.217] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/1.txt
DEB [20170707-18:29:15.282] thr=8 paramiko.transport: userauth is OK
INF [20170707-18:29:15.308] thr=8 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:15.318] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:15.386] thr=8 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:15.386] thr=8 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:15.436] thr=8 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:15.487] thr=8 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:15.488] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:15.489] thr=8 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:15.504] thr=8 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:15.504] thr=8 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:15.575] thr=8 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:15.610] thr=8 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:15.610] thr=8 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:29:15.610] thr=2 paramiko.transport: [chan 2] Max packet in: 32768 bytes
DEB [20170707-18:29:15.678] thr=8 paramiko.transport: [chan 2] Max packet out: 32768 bytes
DEB [20170707-18:29:15.678] thr=8 paramiko.transport: Secsh channel 2 opened.
DEB [20170707-18:29:15.728] thr=8 paramiko.transport: [chan 2] Sesch channel 2 request ok
DEB [20170707-18:29:16.461] thr=8 paramiko.transport: [chan 2] EOF received (2)
DEB [20170707-18:29:16.462] thr=8 paramiko.transport: EOF in transport thread
DEB [20170707-18:29:16.480] thr=9 paramiko.transport: starting thread (client mode): 0xe2ec6c90L
DEB [20170707-18:29:16.480] thr=9 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:16.500] thr=9 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:16.500] thr=9 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:16.515] thr=9 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:16.516] thr=9 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:16.516] thr=9 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:16.516] thr=9 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:16.516] thr=9 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:16.582] thr=9 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:16.582] thr=9 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:16.583] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:16.584] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/2.txt
DEB [20170707-18:29:16.650] thr=9 paramiko.transport: userauth is OK
INF [20170707-18:29:16.672] thr=9 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:16.685] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:16.749] thr=9 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:16.749] thr=9 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:16.802] thr=9 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:29:17.326] thr=9 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:29:17.326] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:17.327] thr=9 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:29:17.342] thr=9 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:17.343] thr=9 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:17.410] thr=9 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:17.435] thr=9 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:17.452] thr=10 paramiko.transport: starting thread (client mode): 0xe3f34890L
DEB [20170707-18:29:17.453] thr=10 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:29:17.473] thr=10 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:29:17.474] thr=10 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:29:17.489] thr=10 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:29:17.489] thr=10 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:29:17.490] thr=10 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:29:17.490] thr=10 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:29:17.490] thr=10 paramiko.transport: Compression agreed: none
DEB [20170707-18:29:17.551] thr=10 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:29:17.551] thr=10 paramiko.transport: Switch to new keys ...
DEB [20170707-18:29:17.553] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:29:17.554] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499444954330/1.txt
DEB [20170707-18:29:17.622] thr=10 paramiko.transport: userauth is OK
INF [20170707-18:29:17.648] thr=10 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:29:17.655] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:29:17.717] thr=10 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:29:17.718] thr=10 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:29:17.736] thr=10 paramiko.transport: [chan 0] Sesch channel 0 request ok
INF [20170707-18:29:17.753] thr=2 paramiko.transport.sftp: [chan 0] Opened sftp connection (server version 3)
DEB [20170707-18:29:17.753] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/')
DEB [20170707-18:29:17.770] thr=2 paramiko.transport.sftp: [chan 0] normalize('/tmp/')
DEB [20170707-18:29:17.786] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb')
DEB [20170707-18:29:17.803] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb') -> 00000000
DEB [20170707-18:29:17.803] thr=2 paramiko.transport.sftp: [chan 0] close(00000000)
DEB [20170707-18:29:17.835] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/docker-compose.yml')
DEB [20170707-18:29:17.852] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:29:17.868] thr=10 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:29:17.868] thr=10 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:29:17.901] thr=10 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:29:17.930] thr=10 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:29:17.931] thr=10 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:29:17.932] thr=10 paramiko.transport: EOF in transport thread
DEB [20170707-18:30:28.007] thr=11 paramiko.transport: starting thread (client mode): 0xe2ec6fd0L
DEB [20170707-18:30:28.008] thr=11 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:28.034] thr=11 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:28.034] thr=11 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:28.050] thr=11 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:28.118] thr=11 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:28.118] thr=11 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:28.120] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:28.121] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/1.txt
DEB [20170707-18:30:28.186] thr=11 paramiko.transport: userauth is OK
INF [20170707-18:30:28.212] thr=11 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:28.222] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:28.289] thr=11 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:28.289] thr=11 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:28.339] thr=11 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:30:28.371] thr=11 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:30:28.372] thr=11 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:30:28.388] thr=12 paramiko.transport: starting thread (client mode): 0xe2ed2d90L
DEB [20170707-18:30:28.388] thr=12 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:28.413] thr=12 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:28.413] thr=12 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:28.429] thr=12 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:28.429] thr=12 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:28.429] thr=12 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:28.429] thr=12 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:28.430] thr=12 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:28.494] thr=12 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:28.495] thr=12 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:28.495] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:28.496] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/2.txt
DEB [20170707-18:30:28.562] thr=12 paramiko.transport: userauth is OK
INF [20170707-18:30:28.586] thr=12 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:28.597] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:28.652] thr=12 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:28.653] thr=12 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:28.678] thr=12 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:30:28.702] thr=12 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:30:28.703] thr=12 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:30:28.719] thr=13 paramiko.transport: starting thread (client mode): 0xe3f39f90L
DEB [20170707-18:30:28.719] thr=13 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:28.740] thr=13 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:28.740] thr=13 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:28.756] thr=13 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:28.820] thr=13 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:28.820] thr=13 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:28.821] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:28.822] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/1.txt
DEB [20170707-18:30:28.890] thr=13 paramiko.transport: userauth is OK
INF [20170707-18:30:28.912] thr=13 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:28.922] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:28.978] thr=13 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:28.978] thr=13 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:29.003] thr=13 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:30:29.041] thr=13 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:30:29.042] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:30:29.043] thr=13 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:30:29.059] thr=13 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:30:29.059] thr=13 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:30:29.127] thr=13 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:30:29.156] thr=13 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:30:29.156] thr=2 paramiko.transport: [chan 2] Max packet in: 32768 bytes
DEB [20170707-18:30:29.157] thr=13 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:30:29.173] thr=13 paramiko.transport: [chan 2] Max packet out: 32768 bytes
DEB [20170707-18:30:29.173] thr=13 paramiko.transport: Secsh channel 2 opened.
DEB [20170707-18:30:29.243] thr=13 paramiko.transport: [chan 2] Sesch channel 2 request ok
DEB [20170707-18:30:30.011] thr=13 paramiko.transport: [chan 2] EOF received (2)
DEB [20170707-18:30:30.029] thr=14 paramiko.transport: starting thread (client mode): 0xe2ee1f50L
DEB [20170707-18:30:30.029] thr=14 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:30.049] thr=14 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:30.049] thr=14 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:30.065] thr=14 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:30.065] thr=14 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:30.065] thr=14 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:30.066] thr=14 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:30.066] thr=14 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:30.127] thr=14 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:30.127] thr=14 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:30.130] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:30.131] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/2.txt
DEB [20170707-18:30:30.198] thr=14 paramiko.transport: userauth is OK
INF [20170707-18:30:30.220] thr=14 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:30.231] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:30.329] thr=14 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:30.330] thr=14 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:30.348] thr=14 paramiko.transport: [chan 0] Sesch channel 0 request ok
DEB [20170707-18:30:30.855] thr=14 paramiko.transport: [chan 0] EOF received (0)
DEB [20170707-18:30:30.855] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:30:30.856] thr=14 paramiko.transport: [chan 0] EOF sent (0)
DEB [20170707-18:30:30.871] thr=14 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:30:30.872] thr=14 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:30:31.006] thr=14 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:30:31.042] thr=14 paramiko.transport: [chan 1] EOF received (1)
DEB [20170707-18:30:31.042] thr=14 paramiko.transport: [chan 1] EOF sent (1)
DEB [20170707-18:30:31.042] thr=14 paramiko.transport: Dropping user packet because connection is dead.
DEB [20170707-18:30:31.042] thr=14 paramiko.transport: Dropping user packet because connection is dead.
DEB [20170707-18:30:31.059] thr=15 paramiko.transport: starting thread (client mode): 0xe3f399d0L
DEB [20170707-18:30:31.060] thr=15 paramiko.transport: Local version/idstring: SSH-2.0-paramiko_2.1.2
DEB [20170707-18:30:31.086] thr=15 paramiko.transport: Remote version/idstring: SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2.8
INF [20170707-18:30:31.086] thr=15 paramiko.transport: Connected (version 2.0, client OpenSSH_6.6.1p1)
DEB [20170707-18:30:31.101] thr=15 paramiko.transport: kex algos:[u'curve25519-sha256@libssh.org', u'ecdh-sha2-nistp256', u'ecdh-sha2-nistp384', u'ecdh-sha2-nistp521', u'diffie-hellman-group-exchange-sha256', u'diffie-hellman-group-exchange-sha1', u'diffie-hellman-group14-sha1', u'diffie-hellman-group1-sha1'] server key:[u'ssh-rsa', u'ssh-dss', u'ecdsa-sha2-nistp256', u'ssh-ed25519'] client encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] server encrypt:[u'aes128-ctr', u'aes192-ctr', u'aes256-ctr', u'arcfour256', u'arcfour128', u'aes128-gcm@openssh.com', u'aes256-gcm@openssh.com', u'chacha20-poly1305@openssh.com', u'aes128-cbc', u'3des-cbc', u'blowfish-cbc', u'cast128-cbc', u'aes192-cbc', u'aes256-cbc', u'arcfour', u'rijndael-cbc@lysator.liu.se'] client mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] server mac:[u'hmac-md5-etm@openssh.com', u'hmac-sha1-etm@openssh.com', u'umac-64-etm@openssh.com', u'umac-128-etm@openssh.com', u'hmac-sha2-256-etm@openssh.com', u'hmac-sha2-512-etm@openssh.com', u'hmac-ripemd160-etm@openssh.com', u'hmac-sha1-96-etm@openssh.com', u'hmac-md5-96-etm@openssh.com', u'hmac-md5', u'hmac-sha1', u'umac-64@openssh.com', u'umac-128@openssh.com', u'hmac-sha2-256', u'hmac-sha2-512', u'hmac-ripemd160', u'hmac-ripemd160@openssh.com', u'hmac-sha1-96', u'hmac-md5-96'] client compress:[u'none', u'zlib@openssh.com'] server compress:[u'none', u'zlib@openssh.com'] client lang:[u''] server lang:[u''] kex follows?False
DEB [20170707-18:30:31.102] thr=15 paramiko.transport: Kex agreed: diffie-hellman-group1-sha1
DEB [20170707-18:30:31.102] thr=15 paramiko.transport: Cipher agreed: aes128-ctr
DEB [20170707-18:30:31.102] thr=15 paramiko.transport: MAC agreed: hmac-sha2-256
DEB [20170707-18:30:31.102] thr=15 paramiko.transport: Compression agreed: none
DEB [20170707-18:30:31.173] thr=15 paramiko.transport: kex engine KexGroup1 specified hash_algo <built-in function openssl_sha1>
DEB [20170707-18:30:31.173] thr=15 paramiko.transport: Switch to new keys ...
DEB [20170707-18:30:31.181] thr=2 paramiko.transport: Adding ssh-rsa host key for 147.228.242.156: 91534f594c88f39d865e5cabdc3a421a
DEB [20170707-18:30:31.182] thr=2 paramiko.transport: Trying key a32cf0d982cb904e8ddee5232852a3c0 from /home/alogo/workspace/DRIP/drip-deployer/1499445027991/1.txt
DEB [20170707-18:30:31.242] thr=15 paramiko.transport: userauth is OK
INF [20170707-18:30:31.268] thr=15 paramiko.transport: Authentication (publickey) successful!
DEB [20170707-18:30:31.283] thr=2 paramiko.transport: [chan 0] Max packet in: 32768 bytes
DEB [20170707-18:30:31.346] thr=15 paramiko.transport: [chan 0] Max packet out: 32768 bytes
DEB [20170707-18:30:31.346] thr=15 paramiko.transport: Secsh channel 0 opened.
DEB [20170707-18:30:31.364] thr=15 paramiko.transport: [chan 0] Sesch channel 0 request ok
INF [20170707-18:30:31.381] thr=2 paramiko.transport.sftp: [chan 0] Opened sftp connection (server version 3)
DEB [20170707-18:30:31.381] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/')
DEB [20170707-18:30:31.398] thr=2 paramiko.transport.sftp: [chan 0] normalize('/tmp/')
DEB [20170707-18:30:31.414] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb')
DEB [20170707-18:30:31.431] thr=2 paramiko.transport.sftp: [chan 0] open('/tmp/docker-compose.yml', 'wb') -> 00000000
DEB [20170707-18:30:31.432] thr=2 paramiko.transport.sftp: [chan 0] close(00000000)
DEB [20170707-18:30:31.463] thr=2 paramiko.transport.sftp: [chan 0] stat('/tmp/docker-compose.yml')
DEB [20170707-18:30:31.480] thr=2 paramiko.transport: [chan 1] Max packet in: 32768 bytes
DEB [20170707-18:30:31.497] thr=15 paramiko.transport: [chan 1] Max packet out: 32768 bytes
DEB [20170707-18:30:31.497] thr=15 paramiko.transport: Secsh channel 1 opened.
DEB [20170707-18:30:31.529] thr=15 paramiko.transport: [chan 1] Sesch channel 1 request ok
DEB [20170707-18:30:31.566] thr=15 paramiko.transport: [chan 1] EOF received (1)
......@@ -14,6 +14,7 @@ import ansible_playbook
import sys, argparse
from threading import Thread
from time import sleep
import os.path
if len(sys.argv) > 1:
......@@ -41,7 +42,12 @@ def handleDelivery(message):
node_num = 0
vm_list = []
current_milli_time = lambda: int(round(time.time() * 1000))
path = os.path.dirname(os.path.abspath(__file__)) + "/"+ str(current_milli_time()) + "/"
try:
path = os.path.dirname(os.path.abspath(__file__)) + "/"+ str(current_milli_time()) + "/"
except NameError:
import sys
path = os.path.dirname(os.path.abspath(sys.argv[0])) + "/"+ str(current_milli_time()) + "/"
if not os.path.exists(path):
os.makedirs(path)
......@@ -71,7 +77,11 @@ def handleDelivery(message):
elif name == "composer":
value = param["value"]
compose_file = path + "docker-compose.yml"
compose_name = param["attributes"]["name"]
if not param["attributes"] == None and not param["attributes"]["name"] == None :
compose_name = param["attributes"]["name"]
else:
current_milli_time = lambda: int(round(time.time() * 1000))
compose_name = "service_"+str(current_milli_time())
fo = open(compose_file, "w")
fo.write(value)
fo.close()
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment