PACKAGE=libpve-apiclient-perl
PKGVER=1.0
-PKGREL=1
+PKGREL=2
DEB=${PACKAGE}_${PKGVER}-${PKGREL}_all.deb
DESTDIR=
-PERL5DIR=/usr/share/perl5
+PERL5DIR=${DESTDIR}/usr/share/perl5
+DOCDIR=${DESTDIR}/usr/share/doc/${PACKAGE}
all: ${DEB}
lintian ${DEB}
install:
- install -D -m 0644 PVE/APIClient/LWP.pm ${DESTDIR}${PERL5DIR}/PVE/APIClient/LWP.pm
+ install -D -m 0644 PVE/APIClient/LWP.pm ${PERL5DIR}/PVE/APIClient/LWP.pm
+ install -d -m 755 ${DOCDIR}/examples
+ install -m 0755 examples/example1.pl ${DOCDIR}/examples
.PHONY: upload
upload: ${DEB}
+libpve-apiclient-perl (1.0-2) unstable; urgency=medium
+
+ * add simple example code: example1.pl
+
+ -- Proxmox Support Team <support@proxmox.com> Wed, 28 Dec 2016 10:46:52 +0100
+
libpve-apiclient-perl (1.0-1) unstable; urgency=medium
* first try
--- /dev/null
+#!/usr/bin/perl -w
+
+# NOTE: you need to run this on a PVE host, or modify the source to
+# provide username/password/hostname from somewhere else.
+
+use strict;
+use PVE::APIClient::LWP;
+
+use PVE::AccessControl;
+use PVE::INotify;
+use JSON;
+
+# normally you use username/password,
+# but we can simply create a ticket and CRSF token if we are root
+# running on a pve host
+
+my $hostname = PVE::INotify::read_file("hostname");
+
+my $ticket = PVE::AccessControl::assemble_ticket('root@pam');
+my $csrftoken = PVE::AccessControl::assemble_csrf_prevention_token('root@pam');
+
+my $conn = PVE::APIClient::LWP->new(
+ #username => 'root@pam',
+ #password => 'yourpassword',
+ ticket => $ticket,
+ csrftoken => $csrftoken,
+ host => $hostname,
+ # allow manual fingerprint verification
+ manual_verification => 1,
+ );
+
+my $res = $conn->get("api2/json/", {});
+
+print to_json($res, { pretty => 1, canonical => 1});