Adoptable Cookbooks List

Looking for a cookbook to adopt? You can now see a list of cookbooks available for adoption!
List of Adoptable Cookbooks

Supermarket Belongs to the Community

Supermarket belongs to the community. While Chef has the responsibility to keep it running and be stewards of its functionality, what it does and how it works is driven by the community. The chef/supermarket repository will continue to be where development of the Supermarket application takes place. Come be part of shaping the direction of Supermarket by opening issues and pull requests or by joining us on the Chef Mailing List.

Select Badges

Select Supported Platforms


ovh-api (7) Versions 1.1.0

Configure and control your servers on OVH by its API

cookbook 'ovh-api', '= 1.1.0'
cookbook 'ovh-api', '= 1.1.0', :supermarket
knife cookbook site install ovh-api
knife cookbook site download ovh-api
Quality 100%



Use OVH API to configure your servers, domains, etc. hosted by OVH. It includes an Ohai plugin used to load OVH information in automatic attributes.

At the moment, this cookbook can configures the firewall associated to an IP and the ohai plugin loads the hardware specifications.


Cookbooks and gems

Declared in metadata.rb and in Gemfile.


  • Should work on every GNU/Linux and may even work on Windows
  • Tested on RHEL Family 7, Debian 8 and Ubuntu 14.04



First, you should get an application key, an application secret and a consumer key with the necessary rights from OVH. More information on

Then you have to create an encrypted data bag containing these keys. By default this data bags is named secrets and its item containing the OVH keys is ovh-keys. Its decrypted content should be like:

  "id": "ovh-keys",
  "app_key": "my_app_key",
  "app_secret": "my_app_secret",
  "consumer_key": "my_consumer_key"

Finally do not forget to place the secret keys on the servers.

To verify your setup, add recipe[ovh-api::init] in your runlist. If it converges, your authentification with OVH is correctly configured.

An example of setup is given in test/integration/default directory.


Add recipe[ovh-api::firewall] in your run-list to configure the OVH firewall for this server. You can configure each IP associated to this server. The default one can be named primary.

Then for each IP, you can enable or disable the firewall and manage the rules. The configuration syntax is the same as OVH API, for which you can find the documentation at

Finally, you can find an example in .kitchen.yml.


Add recipe[ovh-api::ohai] in your run-list to install and load the Ohai plugin. It will fetch different information and put them in node['ovh'].


This cookbook is tested in kitchen with the help of webmock to intercept the HTTP REST calls.

It uses a test cookbook webmock by setting recipe[webmock::stubs] and recipe[webmock::verify] in the runlist: stubs recipe initializes webmock and create the necessarily stubs while verify recipe dumps all calls so they can later be checked by serverspec.

For more information, see .kitchen.yml and test directory.


Configuration is done by overriding default attributes. All configuration keys have a default defined in attributes/default.rb. Please read it to have a comprehensive view of what and how you can configure this cookbook behavior.

Note: for fields needing an IP address, it is possible to set an interface name, which will be resolved to its first non-local address.



Include all other recipes except init and ohai.


Initialize the OVH client.


Configure the firewall according to node['ovh-api']['firewall'].


Install and load the Ohai plugin, add OVH information about the server in node['ovh'].




Available in CHANGELOG.


Please read carefully before making a merge request.

License and Author

Copyright:: 2015-2016, Sam4Mobile

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
See the License for the specific language governing permissions and
limitations under the License.

Dependent cookbooks

ohai >= 0.0.0

Contingent cookbooks

There are no cookbooks that are contingent upon this one.

Changelog ========= 1.1.0 ----- Main: - Fix service_name detection, check all ips, not just eth0 - Create an Ohai plugin to add OVH information in node['ovh']: * service_name, service name as defined in the interface * primary_ip, static ip attributed by OVH * primary_iface, network interface on which the primary ip is defined * vrack_iface, network interface reserved for vrack * hardware, from /specifications/hardware Install it by adding recipe['ovh-api::ohai'] in your runlist Minor: - Standardize docker images among cookbooks * Create an universal image for centos/debian/ubuntu - Fix all rubocop offenses 1.0.0 ----- - Initial version with firewall configuration (/ip/firewall) - Should work almost everywhere but tested on Centos 7, Debian 8 and Ubundu 1404

Foodcritic Metric

1.1.0 passed this metric