Class: Proxy::RemoteExecution::Ssh::Runners::ScriptRunner
- Inherits:
-
Dynflow::Runner::Base
- Object
- Dynflow::Runner::Base
- Proxy::RemoteExecution::Ssh::Runners::ScriptRunner
- Includes:
- Dynflow::Runner::ProcessManagerCommand, CommandLogging
- Defined in:
- lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb
Direct Known Subclasses
Constant Summary collapse
- EXPECTED_POWER_ACTION_MESSAGES =
['restart host', 'shutdown host'].freeze
- DEFAULT_REFRESH_INTERVAL =
1
Instance Attribute Summary collapse
-
#execution_timeout_interval ⇒ Object
readonly
Returns the value of attribute execution_timeout_interval.
Class Method Summary collapse
Instance Method Summary collapse
- #close ⇒ Object
- #close_session ⇒ Object
-
#initialization_script ⇒ Object
the script that initiates the execution.
-
#initialize(options, user_method, suspended_action: nil) ⇒ ScriptRunner
constructor
A new instance of ScriptRunner.
- #kill ⇒ Object
- #preflight_checks ⇒ Object
- #prepare_start ⇒ Object
- #publish_data(data, type, pm = nil) ⇒ Object
- #refresh ⇒ Object
- #start ⇒ Object
- #timeout ⇒ Object
- #timeout_interval ⇒ Object
- #trigger(*args) ⇒ Object
Methods included from CommandLogging
#log_command, #set_pm_debug_logging
Constructor Details
#initialize(options, user_method, suspended_action: nil) ⇒ ScriptRunner
Returns a new instance of ScriptRunner.
102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 102 def initialize(, user_method, suspended_action: nil) super suspended_action: suspended_action @host = .fetch(:hostname) @script = .fetch(:script) @ssh_user = .fetch(:ssh_user, 'root') @ssh_port = .fetch(:ssh_port, 22) @host_public_key = .fetch(:host_public_key, nil) @execution_timeout_interval = .fetch(:execution_timeout_interval, nil) @client_private_key_file = settings.ssh_identity_key_file @local_working_dir = .fetch(:local_working_dir, settings.local_working_dir) @remote_working_dir = .fetch(:remote_working_dir, settings.remote_working_dir.shellescape) @socket_working_dir = .fetch(:socket_working_dir, settings.socket_working_dir) @cleanup_working_dirs = .fetch(:cleanup_working_dirs, settings.cleanup_working_dirs) @first_execution = .fetch(:first_execution, false) @user_method = user_method = end |
Instance Attribute Details
#execution_timeout_interval ⇒ Object (readonly)
Returns the value of attribute execution_timeout_interval.
97 98 99 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 97 def execution_timeout_interval @execution_timeout_interval end |
Class Method Details
.build(options, suspended_action:) ⇒ Object
121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 121 def self.build(, suspended_action:) effective_user = .fetch(:effective_user, nil) ssh_user = .fetch(:ssh_user, 'root') effective_user_method = .fetch(:effective_user_method, 'sudo') user_method = if effective_user.nil? || effective_user == ssh_user NoopUserMethod.new elsif effective_user_method == 'sudo' SudoUserMethod.new(effective_user, ssh_user, .fetch(:secrets, {}).fetch(:effective_user_password, nil)) elsif effective_user_method == 'dzdo' DzdoUserMethod.new(effective_user, ssh_user, .fetch(:secrets, {}).fetch(:effective_user_password, nil)) elsif effective_user_method == 'su' SuUserMethod.new(effective_user, ssh_user, .fetch(:secrets, {}).fetch(:effective_user_password, nil)) else raise "effective_user_method '#{effective_user_method}' not supported" end new(, user_method, suspended_action: suspended_action) end |
Instance Method Details
#close ⇒ Object
237 238 239 240 241 242 243 244 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 237 def close run_sync("rm -rf #{remote_command_dir}") if should_cleanup? rescue StandardError => e publish_exception('Error when removing remote working dir', e, false) ensure close_session if @process_manager FileUtils.rm_rf(local_command_dir) if Dir.exist?(local_command_dir) && @cleanup_working_dirs end |
#close_session ⇒ Object
231 232 233 234 235 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 231 def close_session raise 'Control socket file does not exist' unless File.exist?(socket_file) @logger.debug("Sending exit request for session #{@ssh_user}@#{@host}") @connection.disconnect! end |
#initialization_script ⇒ Object
the script that initiates the execution
189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 189 def initialization_script su_method = @user_method.instance_of?(SuUserMethod) # pipe the output to tee while capturing the exit code in a file " sh <<EOF | /usr/bin/tee \#{@output_path}\n \#{@remote_script_wrapper} \#{@user_method.cli_command_prefix}\#{su_method ? \"'\#{@remote_script} < /dev/null '\" : \"\#{@remote_script} < /dev/null\"}\n echo \\\\$?>\#{@exit_code_path}\n EOF\n if [ -f \#{@exit_code_path} ] && [ $(wc -l < \#{@exit_code_path}) -gt 0 ]; then\n exit $(cat \#{@exit_code_path})\n else\n exit 1\n fi\n SCRIPT\nend\n" |
#kill ⇒ Object
212 213 214 215 216 217 218 219 220 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 212 def kill if @process_manager&.started? run_sync("pkill -P $(cat #{@pid_path})") else logger.debug('connection closed') end rescue StandardError => e publish_exception('Unexpected error', e, false) end |
#preflight_checks ⇒ Object
163 164 165 166 167 168 169 170 171 172 173 174 175 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 163 def preflight_checks ensure_remote_command(cp_script_to_remote("#!/bin/sh\nexec true", 'test'), error: 'Failed to execute script on remote machine, exit code: %{exit_code}.' ) unless @user_method.is_a? NoopUserMethod path = cp_script_to_remote("#!/bin/sh\nexec #{@user_method.cli_command_prefix} true", 'effective-user-test') ensure_remote_command(path, error: 'Failed to change to effective user, exit code: %{exit_code}', tty: true, user_method: @user_method, close_stdin: false) end end |
#prepare_start ⇒ Object
177 178 179 180 181 182 183 184 185 186 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 177 def prepare_start @remote_script = cp_script_to_remote @output_path = File.join(File.dirname(@remote_script), 'output') @exit_code_path = File.join(File.dirname(@remote_script), 'exit_code') @pid_path = File.join(File.dirname(@remote_script), 'pid') @remote_script_wrapper = upload_data( "echo $$ > #{@pid_path}; exec \"$@\";", File.join(File.dirname(@remote_script), 'script-wrapper'), 555) end |
#publish_data(data, type, pm = nil) ⇒ Object
246 247 248 249 250 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 246 def publish_data(data, type, pm = nil) pm ||= @process_manager super(data.force_encoding('UTF-8'), type) unless @user_method.filter_password?(data) @user_method.on_data(data, pm.stdin) if pm end |
#refresh ⇒ Object
205 206 207 208 209 210 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 205 def refresh return if @process_manager.nil? super ensure check_expecting_disconnect end |
#start ⇒ Object
144 145 146 147 148 149 150 151 152 153 154 155 156 157 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 144 def start Proxy::RemoteExecution::Utils.prune_known_hosts!(@host, @ssh_port, logger) if @first_execution ensure_local_directory(@socket_working_dir) @connection = MultiplexedSSHConnection.new(.merge(:id => @id), logger: logger) @connection.establish! preflight_checks prepare_start script = initialization_script logger.debug("executing script:\n#{indent_multiline(script)}") trigger(script) rescue StandardError, NotImplementedError => e logger.error("error while initializing command #{e.class} #{e.message}:\n #{e.backtrace.join("\n")}") publish_exception('Error initializing command', e) end |
#timeout ⇒ Object
222 223 224 225 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 222 def timeout @logger.debug('job timed out') super end |
#timeout_interval ⇒ Object
227 228 229 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 227 def timeout_interval execution_timeout_interval end |
#trigger(*args) ⇒ Object
159 160 161 |
# File 'lib/smart_proxy_remote_execution_ssh/runners/script_runner.rb', line 159 def trigger(*args) run_async(*args) end |