Class: RemoteCommandHandler
- Inherits:
-
Object
- Object
- RemoteCommandHandler
- Defined in:
- lib/help/remote_command_handler.rb
Overview
Provides methods to be executed via ssh to remote instances.
Direct Known Subclasses
Instance Attribute Summary collapse
-
#logger ⇒ Object
Returns the value of attribute logger.
-
#ssh_session ⇒ Object
Returns the value of attribute ssh_session.
-
#use_sudo ⇒ Object
Returns the value of attribute use_sudo.
Instance Method Summary collapse
-
#connect(ip, user, key_data, timeout = 30) ⇒ Object
Connect to the machine as root using keydata from a keyfile.
-
#connect_with_keyfile(ip, user_name, keyfile, timeout = 30) ⇒ Object
Connect to the machine as root using a keyfile.
- #create_filesystem(fs_type, volume) ⇒ Object
-
#disable_sudoers_requiretty ⇒ Object
Disable ‘Defaults requiretty’ option in sudoers file.
-
#disconnect ⇒ Object
Disconnect the current handler.
-
#drive_mounted?(path) ⇒ Boolean
Checks if the drive on path is mounted.
-
#drive_mounted_as?(device, path) ⇒ Boolean
Checks if the drive on path is mounted with the specific device.
- #echo(data, file) ⇒ Object
-
#enable_sudoers_requiretty ⇒ Object
Enable ‘Defaults requiretty’ option in sudoers file.
-
#file_exists?(path) ⇒ Boolean
Check if the path/file specified exists.
-
#get_device_label(device) ⇒ Object
Get device label.
-
#get_device_label_ext(device, fs_type) ⇒ Object
Get device label.
-
#get_output(exec_string, push_data = nil, stdout = [], stderr = []) ⇒ Object
Executes the specified #exec_string on a remote session specified as #ssh_session.
-
#get_partition_device(part) ⇒ Object
Get partition label.
-
#get_partition_fs_type(part) ⇒ Object
Get filesystem type.
-
#get_root_device ⇒ Object
Get root partition label.
-
#get_root_fs_type ⇒ Object
Get filesystem type.
-
#initialize ⇒ RemoteCommandHandler
constructor
A new instance of RemoteCommandHandler.
-
#install(software_package) ⇒ Object
Installs the software package specified.
-
#is_port_open?(ip, port) ⇒ Boolean
Checks for a given IP/port if there’s a response on that port.
-
#local_decompress_and_dump(source_filename, target_device) ⇒ Object
idecompress and a file to a device locally.
-
#local_dump_and_compress(source_device, target_filename) ⇒ Object
dump and compress a device in a file locally.
-
#local_rcopy(source_path, dest_path, exclude_path = nil) ⇒ Object
Copy directory using basic cp exclude_path: a space separated list of directory.
-
#local_rsync(source_path, dest_path, exclude_path = nil) ⇒ Object
Copy directory using options -avHx.
- #mkdir(path) ⇒ Object
- #mount(device, path) ⇒ Object
-
#remote_execute(exec_string, push_data = nil, raise_exception = false) ⇒ Object
Executes the specified #exec_string on a remote session specified.
- #remote_rsync(keyfile, source_path, dest_ip, dest_user, dest_path) ⇒ Object
-
#remote_rsync_old(keyfile, source_path, dest_ip, dest_path) ⇒ Object
Rsync directory via an ssh-tunnel.
-
#retrieve_os ⇒ Object
Returns the result of uname -a (Linux).
-
#scp(keyfile, source_path, dest_ip, dest_user, dest_path) ⇒ Object
Copy directory via an ssh-tunnel.
-
#set_device_label(device, label) ⇒ Object
Set device label.
-
#set_device_label_ext(device, label, fs_type) ⇒ Object
Set device label.
-
#stdout_contains?(exec_string, search_string = "", push_data = nil) ⇒ Boolean
Executes the specified #exec_string on a remote session specified as #ssh_session and logs the command-output into the specified #logger.
-
#tools_installed?(software_package) ⇒ Boolean
Checks if the software package specified is installed.
-
#umount(path) ⇒ Object
Unmount the specified path.
- #upload(ip, user, key_data, local_file, destination_file, timeout = 60) ⇒ Object
-
#zip(source_path, destination_file) ⇒ Object
Zip the complete contents of the source path into the destination file.
Constructor Details
#initialize ⇒ RemoteCommandHandler
Returns a new instance of RemoteCommandHandler.
9 10 11 12 |
# File 'lib/help/remote_command_handler.rb', line 9 def initialize() @logger = Logger.new(STDOUT) @use_sudo = false end |
Instance Attribute Details
#logger ⇒ Object
Returns the value of attribute logger.
8 9 10 |
# File 'lib/help/remote_command_handler.rb', line 8 def logger @logger end |
#ssh_session ⇒ Object
Returns the value of attribute ssh_session.
8 9 10 |
# File 'lib/help/remote_command_handler.rb', line 8 def ssh_session @ssh_session end |
#use_sudo ⇒ Object
Returns the value of attribute use_sudo.
8 9 10 |
# File 'lib/help/remote_command_handler.rb', line 8 def use_sudo @use_sudo end |
Instance Method Details
#connect(ip, user, key_data, timeout = 30) ⇒ Object
Connect to the machine as root using keydata from a keyfile. Params:
-
ip: ip address of the machine to connect to
-
user: user name
-
key_data: key_data to be used for authentication
NB: set paranoid to false in order to avoid server key verification, thus avoiding probleme when IP are reused
47 48 49 50 51 |
# File 'lib/help/remote_command_handler.rb', line 47 def connect(ip, user, key_data, timeout = 30) @use_sudo = false @ssh_session = Net::SSH.start(ip, user, :key_data => [key_data], :timeout => timeout, :paranoid => false, :verbose => :warn) @use_sudo = true unless user.strip == 'root' end |
#connect_with_keyfile(ip, user_name, keyfile, timeout = 30) ⇒ Object
Connect to the machine as root using a keyfile. Params:
-
ip: ip address of the machine to connect to
-
keyfile: path of the keyfile to be used for authentication
35 36 37 38 39 |
# File 'lib/help/remote_command_handler.rb', line 35 def connect_with_keyfile(ip, user_name, keyfile, timeout = 30) @use_sudo = false @ssh_session = Net::SSH.start(ip, user_name, :keys => [keyfile], :timeout => timeout, :verbose => :warn) @use_sudo = true unless user_name.strip == 'root' end |
#create_filesystem(fs_type, volume) ⇒ Object
141 142 143 144 145 |
# File 'lib/help/remote_command_handler.rb', line 141 def create_filesystem(fs_type, volume) e = "mkfs -t #{fs_type} #{volume}" #remote_execute(e, "y") #TODO: quiet mode? remote_execute(e, "y", false) end |
#disable_sudoers_requiretty ⇒ Object
Disable ‘Defaults requiretty’ option in sudoers file
216 217 218 219 220 221 222 223 |
# File 'lib/help/remote_command_handler.rb', line 216 def disable_sudoers_requiretty() e = "sed -r -e \'s/^(Defaults[[:blank:]]+requiretty)$/# \\1/\' -i /etc/sudoers" @logger.debug "going to execute '#{e}'" status = remote_exec_helper(e, nil, nil, true) if status != true raise Exception.new("disabling 'requiretty' from sudoers failed with status: #{status}") end end |
#disconnect ⇒ Object
Disconnect the current handler
54 55 56 |
# File 'lib/help/remote_command_handler.rb', line 54 def disconnect @ssh_session.close end |
#drive_mounted?(path) ⇒ Boolean
Checks if the drive on path is mounted
158 159 160 161 162 163 164 165 166 167 |
# File 'lib/help/remote_command_handler.rb', line 158 def drive_mounted?(path) #check if drive mounted drive_found = stdout_contains?("mount", "on #{path} type") if drive_found return file_exists?(path) else @logger.debug "not mounted (since #{path} non-existing)" false end end |
#drive_mounted_as?(device, path) ⇒ Boolean
Checks if the drive on path is mounted with the specific device
170 171 172 173 |
# File 'lib/help/remote_command_handler.rb', line 170 def drive_mounted_as?(device, path) #check if drive mounted stdout_contains?("mount", "#{device} on #{path} type") end |
#echo(data, file) ⇒ Object
279 280 281 282 283 284 285 286 |
# File 'lib/help/remote_command_handler.rb', line 279 def echo(data, file) exec = "echo #{data} > #{file}" @logger.debug "going to execute #{exec}" remote_execute(exec, nil, true) if !file_exists?(file) raise Exception.new("file #{file} could not be created") end end |
#enable_sudoers_requiretty ⇒ Object
Enable ‘Defaults requiretty’ option in sudoers file
226 227 228 229 230 231 232 233 |
# File 'lib/help/remote_command_handler.rb', line 226 def enable_sudoers_requiretty() e = "sed -r -e \'s/^#[[:blank:]]*(Defaults[[:blank:]]+requiretty)$/\\1/\' -i /etc/sudoers" @logger.debug "going to execute '#{e}'" status = remote_exec_helper(e, nil, nil, true) if status != true raise Exception.new("enabling 'requiretty' from sudoers failed with status: #{status}") end end |
#file_exists?(path) ⇒ Boolean
Check if the path/file specified exists
59 60 61 |
# File 'lib/help/remote_command_handler.rb', line 59 def file_exists?(path) remote_execute("ls #{path}") end |
#get_device_label(device) ⇒ Object
Get device label
81 82 83 |
# File 'lib/help/remote_command_handler.rb', line 81 def get_device_label(device) get_output("e2label #{device}").strip end |
#get_device_label_ext(device, fs_type) ⇒ Object
Get device label
86 87 88 89 90 91 92 93 |
# File 'lib/help/remote_command_handler.rb', line 86 def get_device_label_ext(device, fs_type) if fs_type.eql?("xfs") cmd = "xfs_admin -l #{device} | sed -r -e 's/^label[[:blank:]]*=[[:blank:]]*\"(.*)\"$/\\1/'" else cmd = "e2label #{device}" end get_output(cmd).strip end |
#get_output(exec_string, push_data = nil, stdout = [], stderr = []) ⇒ Object
Executes the specified #exec_string on a remote session specified as #ssh_session. When #push_data is specified, the data will be used as input for the command and thus allows to respond in advance to commands that ask the user something. It returns stdout. When #stdout or #stderr is specified as arrays, the respective output is also written into those arrays.
331 332 333 334 335 336 337 |
# File 'lib/help/remote_command_handler.rb', line 331 def get_output(exec_string, push_data = nil, stdout = [], stderr = []) exec_string = "echo #{push_data} >tmp.txt; #{exec_string} <tmp.txt; rm -f tmp.txt" unless push_data == nil stdout = [] stderr = [] remote_exec_helper(exec_string, stdout, stderr, true) stdout.join() end |
#get_partition_device(part) ⇒ Object
Get partition label
75 76 77 78 |
# File 'lib/help/remote_command_handler.rb', line 75 def get_partition_device(part) #get_output("cat /etc/mtab | grep -E '[[:blank:]]+" + "#{part}" + "[[:blank:]]+' | cut -d ' ' -f 1").strip get_output("mount | grep -E '[[:blank:]]+" + "#{part}" + "[[:blank:]]+' | cut -d ' ' -f 1").strip end |
#get_partition_fs_type(part) ⇒ Object
Get filesystem type
116 117 118 |
# File 'lib/help/remote_command_handler.rb', line 116 def get_partition_fs_type(part) get_output("cat /etc/mtab | grep -E '[[:blank:]]+" + "#{part}" + "[[:blank:]]+' | cut -d ' ' -f 3").strip end |
#get_root_device ⇒ Object
Get root partition label
69 70 71 72 |
# File 'lib/help/remote_command_handler.rb', line 69 def get_root_device() #get_output("cat /etc/mtab | grep -E '[[:blank:]]+\/[[:blank:]]+' | cut -d ' ' -f 1").strip get_output("mount | grep -E '[[:blank:]]+\/[[:blank:]]+' | cut -d ' ' -f 1").strip end |
#get_root_fs_type ⇒ Object
Get filesystem type
111 112 113 |
# File 'lib/help/remote_command_handler.rb', line 111 def get_root_fs_type() get_output("cat /etc/mtab | grep -E '[[:blank:]]+\/[[:blank:]]+' | cut -d ' ' -f 3").strip end |
#install(software_package) ⇒ Object
Installs the software package specified.
121 122 123 124 125 126 127 128 129 130 |
# File 'lib/help/remote_command_handler.rb', line 121 def install(software_package) e = "yum -yq install #{software_package}" yum = remote_execute(e) if !yum @logger.info("yum installation failed; try apt-get") e = "apt-get -yq install #{software_package}" apt = remote_execute(e) @logger.info("apt=get installation? #{apt}") end end |
#is_port_open?(ip, port) ⇒ Boolean
Checks for a given IP/port if there’s a response on that port.
15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 |
# File 'lib/help/remote_command_handler.rb', line 15 def is_port_open?(ip, port) begin Timeout::timeout(5) do begin s = TCPSocket.new(ip, port) s.close return true rescue Errno::ECONNREFUSED, Errno::EHOSTUNREACH return false end end rescue Timeout::Error return false end end |
#local_decompress_and_dump(source_filename, target_device) ⇒ Object
idecompress and a file to a device locally
260 261 262 263 264 |
# File 'lib/help/remote_command_handler.rb', line 260 def local_decompress_and_dump(source_filename, target_device) e = "sh -c 'gunzip -c #{source_filename} | dd of=#{target_device}'" @logger.debug "going to execute #{e}" status = remote_exec_helper(e, nil, nil, true) end |
#local_dump_and_compress(source_device, target_filename) ⇒ Object
dump and compress a device in a file locally
253 254 255 256 257 |
# File 'lib/help/remote_command_handler.rb', line 253 def local_dump_and_compress(source_device, target_filename) e = "sh -c 'dd if=#{source_device} | gzip > #{target_filename}'" @logger.debug "going to execute #{e}" status = remote_exec_helper(e, nil, nil, true) end |
#local_rcopy(source_path, dest_path, exclude_path = nil) ⇒ Object
Copy directory using basic cp exclude_path: a space separated list of directory
184 185 186 187 188 189 190 191 192 193 194 195 |
# File 'lib/help/remote_command_handler.rb', line 184 def local_rcopy(source_path, dest_path, exclude_path = nil) e = "" if exclude_path.nil? || exclude_path.empty? e = "cp -Rpv #{source_path} #{dest_path}" else # only one level of exclusion exclusion_regexp = exclude_path.gsub(' ', '|') e = "for dir in $(ls -d #{source_path}* | grep -E -v '#{exclusion_regexp}'); do cp -Rpv $dir #{dest_path}; done;" end @logger.debug "going to execute #{e}" remote_exec_helper(e, nil, nil, false) end |
#local_rsync(source_path, dest_path, exclude_path = nil) ⇒ Object
Copy directory using options -avHx
198 199 200 201 202 203 204 205 206 |
# File 'lib/help/remote_command_handler.rb', line 198 def local_rsync(source_path, dest_path, exclude_path = nil) exclude = "" if exclude_path != nil exclude = "--exclude #{exclude_path}" end e = "rsync -avHx #{exclude} #{source_path} #{dest_path}" @logger.debug "going to execute #{e}" remote_exec_helper(e, nil, nil, true) #TODO: handle output in stderr? end |
#mkdir(path) ⇒ Object
147 148 149 150 |
# File 'lib/help/remote_command_handler.rb', line 147 def mkdir(path) e = "mkdir #{path}" remote_execute(e, nil, true) end |
#mount(device, path) ⇒ Object
152 153 154 155 |
# File 'lib/help/remote_command_handler.rb', line 152 def mount(device, path) e = "mount #{device} #{path}" remote_execute(e, nil, true) end |
#remote_execute(exec_string, push_data = nil, raise_exception = false) ⇒ Object
Executes the specified #exec_string on a remote session specified. When #push_data is specified, the data will be used as input for the command and thus allow to respond in advance to commands that ask the user something. The method will return true if nothing was written into stderr, otherwise false. When #raise_exception is set, an exception will be raised instead of returning false.
295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 |
# File 'lib/help/remote_command_handler.rb', line 295 def remote_execute(exec_string, push_data = nil, raise_exception = false) exec_string = "sh -c 'echo #{push_data} >tmp.txt; #{exec_string} <tmp.txt; rm -f tmp.txt'" unless push_data == nil stdout = [] stderr = [] result = remote_exec_helper(exec_string, stdout, stderr, true) #dump stdout in case of error if result == false em = "RemoteCommandHandler: #{exec_string} lead to stdout message: #{stdout.join().strip}" @logger.info(em) unless stdout.size == 0 end em = "RemoteCommandHandler: #{exec_string} lead to stderr message: #{stderr.join().strip}" @logger.info(em) unless stderr.size == 0 raise Exception.new(em) unless result == true || raise_exception == false result end |
#remote_rsync(keyfile, source_path, dest_ip, dest_user, dest_path) ⇒ Object
235 236 237 238 239 240 241 242 243 |
# File 'lib/help/remote_command_handler.rb', line 235 def remote_rsync(keyfile, source_path, dest_ip, dest_user, dest_path) e = "rsync -rlpgoDzq --rsh 'ssh -o stricthostkeychecking=no -i #{keyfile}' --rsync-path='sudo rsync'"+ " #{source_path} #{dest_user}@#{dest_ip}:#{dest_path}" @logger.debug "going to execute #{e}" status = remote_exec_helper(e, nil, nil, true) #TODO: handle output in stderr? if status != true raise Exception.new("rsync bewteen source and target servers failed with status: #{status}") end end |
#remote_rsync_old(keyfile, source_path, dest_ip, dest_path) ⇒ Object
Rsync directory via an ssh-tunnel.
209 210 211 212 213 |
# File 'lib/help/remote_command_handler.rb', line 209 def remote_rsync_old(keyfile, source_path, dest_ip, dest_path) e = "rsync -rlpgoDzq -e "+'"'+"ssh -o stricthostkeychecking=no -i #{keyfile}"+'"'+" #{source_path} root@#{dest_ip}:#{dest_path}" @logger.debug "going to execute #{e}" remote_exec_helper(e, nil, nil, false) #TODO: handle output in stderr? end |
#retrieve_os ⇒ Object
Returns the result of uname -a (Linux)
64 65 66 |
# File 'lib/help/remote_command_handler.rb', line 64 def retrieve_os() get_output("uname -r").strip end |
#scp(keyfile, source_path, dest_ip, dest_user, dest_path) ⇒ Object
Copy directory via an ssh-tunnel.
246 247 248 249 250 |
# File 'lib/help/remote_command_handler.rb', line 246 def scp(keyfile, source_path, dest_ip, dest_user, dest_path) e = "scp -Cpqr -o stricthostkeychecking=no -i #{keyfile} #{source_path} #{dest_user}@#{dest_ip}:#{dest_path}" @logger.debug "going to execute #{e}" remote_exec_helper(e, nil, nil, false) #TODO: handle output in stderr? end |
#set_device_label(device, label) ⇒ Object
Set device label
96 97 98 |
# File 'lib/help/remote_command_handler.rb', line 96 def set_device_label(device, label) remote_execute("e2label #{device} #{label}", nil, false) end |
#set_device_label_ext(device, label, fs_type) ⇒ Object
Set device label
101 102 103 104 105 106 107 108 |
# File 'lib/help/remote_command_handler.rb', line 101 def set_device_label_ext(device, label, fs_type) if fs_type.eql?("xfs") cmd = "xfs_admin -L #{label} #{device}" else cmd = "e2label #{device} #{label}" end remote_execute(cmd, nil, false) end |
#stdout_contains?(exec_string, search_string = "", push_data = nil) ⇒ Boolean
Executes the specified #exec_string on a remote session specified as #ssh_session and logs the command-output into the specified #logger. When #push_data is specified, the data will be used as input for the command and thus allows to respond in advance to commands that ask the user something. If the output in stdout contains the specified #search_string, the method returns true otherwise false. Output to stderr will be logged.
317 318 319 320 321 322 323 324 |
# File 'lib/help/remote_command_handler.rb', line 317 def stdout_contains?(exec_string, search_string = "", push_data = nil) exec_string = "echo #{push_data} >tmp.txt; #{exec_string} <tmp.txt; rm -f tmp.txt" unless push_data == nil stdout = [] stderr = [] remote_exec_helper(exec_string, stdout, stderr) @logger.info("RemoteCommandHandler: #{exec_string} lead to stderr message: #{stderr.join().strip}") unless stderr.size == 0 stdout.join().include?(search_string) end |
#tools_installed?(software_package) ⇒ Boolean
Checks if the software package specified is installed.
133 134 135 136 137 138 139 |
# File 'lib/help/remote_command_handler.rb', line 133 def tools_installed?(software_package) exec_string = "which #{software_package}" stdout = [] stderr = [] result = remote_exec_helper(exec_string, stdout, stderr) return result == true && stdout.size > 0 end |
#umount(path) ⇒ Object
Unmount the specified path.
176 177 178 179 180 |
# File 'lib/help/remote_command_handler.rb', line 176 def umount(path) exec_string = "umount #{path}" remote_execute(exec_string) !drive_mounted?(path) end |
#upload(ip, user, key_data, local_file, destination_file, timeout = 60) ⇒ Object
339 340 341 342 343 344 345 |
# File 'lib/help/remote_command_handler.rb', line 339 def upload(ip, user, key_data, local_file, destination_file, timeout = 60) Timeout::timeout(timeout) { Net::SCP.start(ip, user, {:key_data => [key_data], :timeout => timeout}) do |scp| scp.upload!(local_file, destination_file) end } end |
#zip(source_path, destination_file) ⇒ Object
Zip the complete contents of the source path into the destination file. Returns the an array with stderr output messages.
268 269 270 271 272 273 274 275 276 277 |
# File 'lib/help/remote_command_handler.rb', line 268 def zip(source_path, destination_file) begin exec = "cd #{source_path}; zip -ryq #{destination_file} *" stderr = [] get_output(exec, nil, nil, stderr) return stderr rescue Exception => e raise Exception.new("zip failed due to #{e.}") end end |