Class: Aptible::Api::Operation

Inherits:
Resource
  • Object
show all
Defined in:
lib/aptible/api/operation.rb

Instance Method Summary collapse

Methods inherited from Resource

#namespace, #root_url

Instance Method Details

#failed?Boolean

Returns:

  • (Boolean)


67
68
69
# File 'lib/aptible/api/operation.rb', line 67

def failed?
  status == 'failed'
end

#logs_urlObject



59
60
61
# File 'lib/aptible/api/operation.rb', line 59

def logs_url
  links['logs'].href
end

#succeeded?Boolean

Returns:

  • (Boolean)


63
64
65
# File 'lib/aptible/api/operation.rb', line 63

def succeeded?
  status == 'succeeded'
end

#userObject



52
53
54
55
56
57
# File 'lib/aptible/api/operation.rb', line 52

def user
  auth = Aptible::Auth::User.new(token: token, headers: headers)
  auth.find_by_url(links['user'].href)
rescue StandardError
  nil
end

#with_ssh_cmd(private_key_file, host: nil, port: nil, host_key: nil) ⇒ Object



71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
# File 'lib/aptible/api/operation.rb', line 71

def with_ssh_cmd(private_key_file, host: nil, port: nil, host_key: nil)
  # We expect that the public key will be found next to the private key,
  # which is also what SSH itself expects. If that's not the case, then
  # we'll just fail. The Aptible CLI will always ensure credentials are
  # set up properly (other consumers are of course responsible for doing
  # the same!).
  public_key_file = "#{private_key_file}.pub"

  private_key = File.read(private_key_file)
  public_key = File.read(public_key_file)

  connection = create_ssh_portal_connection!(ssh_public_key: public_key)
  certificate = connection.ssh_certificate_body

  # Backups can be restored across stacks, and the operation executes
  # on the destiantion stack. Assuming all future cross-stack operations
  # will behave the same way, fingers crossed they'll "just work"
  stack = .try(&:stack) || .stack
  host ||= stack.ssh_portal_host
  port ||= stack.ssh_portal_port
  host_key ||= stack.ssh_host_rsa_public_key

  with_temporary_known_hosts(
    host, port, host_key
  ) do |known_hosts_file|
    with_temporary_id(private_key, public_key, certificate) do |id_file|
      cmd = [
        'ssh',
        "#{connection.ssh_user}@#{host}",
        '-p', port.to_s,
        '-i', id_file,
        '-o', 'IdentitiesOnly=yes',
        '-o', "UserKnownHostsFile=#{known_hosts_file}",
        '-o', 'StrictHostKeyChecking=yes'
      ]

      # If we aren't allowed to create a pty, then we shouldn't try to
      # allocate once, or we'll get an awkward error.
      cmd << '-T' unless connection.ssh_pty

      yield cmd, connection
    end
  end
end