2013-08-07 15:54:53 +00:00
|
|
|
# (c) 2012, Michael DeHaan <michael.dehaan@gmail.com>
|
|
|
|
#
|
|
|
|
# This file is part of Ansible
|
|
|
|
#
|
|
|
|
# Ansible is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# Ansible is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with Ansible. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
import json
|
|
|
|
import os
|
|
|
|
import base64
|
|
|
|
import socket
|
2013-08-11 05:41:18 +00:00
|
|
|
import struct
|
2013-08-29 00:27:18 +00:00
|
|
|
import time
|
2013-09-30 19:08:07 +00:00
|
|
|
from ansible.callbacks import vvv, vvvv
|
2013-08-11 05:41:18 +00:00
|
|
|
from ansible.runner.connection_plugins.ssh import Connection as SSHConnection
|
2013-09-04 20:50:53 +00:00
|
|
|
from ansible.runner.connection_plugins.paramiko_ssh import Connection as ParamikoConnection
|
2013-08-07 15:54:53 +00:00
|
|
|
from ansible import utils
|
|
|
|
from ansible import errors
|
|
|
|
from ansible import constants
|
|
|
|
|
2013-08-28 15:05:52 +00:00
|
|
|
# the chunk size to read and send, assuming mtu 1500 and
|
|
|
|
# leaving room for base64 (+33%) encoding and header (8 bytes)
|
|
|
|
# ((1400-8)/4)*3) = 1044
|
|
|
|
# which leaves room for the TCP/IP header. We set this to a
|
|
|
|
# multiple of the value to speed up file reads.
|
|
|
|
CHUNK_SIZE=1044*20
|
|
|
|
|
2013-08-07 15:54:53 +00:00
|
|
|
class Connection(object):
|
|
|
|
''' raw socket accelerated connection '''
|
|
|
|
|
2013-08-11 05:41:18 +00:00
|
|
|
def __init__(self, runner, host, port, user, password, private_key_file, *args, **kwargs):
|
|
|
|
|
2013-08-07 15:54:53 +00:00
|
|
|
self.runner = runner
|
2013-08-11 05:41:18 +00:00
|
|
|
self.host = host
|
|
|
|
self.context = None
|
|
|
|
self.conn = None
|
2013-08-27 20:25:54 +00:00
|
|
|
self.user = user
|
2013-08-11 05:41:18 +00:00
|
|
|
self.key = utils.key_for_hostname(host)
|
2013-08-27 20:25:54 +00:00
|
|
|
self.port = port[0]
|
2013-09-04 20:29:46 +00:00
|
|
|
self.accport = port[1]
|
2013-08-11 05:41:18 +00:00
|
|
|
self.is_connected = False
|
2013-08-07 15:54:53 +00:00
|
|
|
|
2013-09-05 14:52:10 +00:00
|
|
|
if not self.port:
|
|
|
|
self.port = constants.DEFAULT_REMOTE_PORT
|
|
|
|
elif not isinstance(self.port, int):
|
|
|
|
self.port = int(self.port)
|
|
|
|
|
|
|
|
if not self.accport:
|
|
|
|
self.accport = constants.ACCELERATE_PORT
|
|
|
|
elif not isinstance(self.accport, int):
|
|
|
|
self.accport = int(self.accport)
|
|
|
|
|
2013-09-04 20:50:53 +00:00
|
|
|
if self.runner.original_transport == "paramiko":
|
|
|
|
self.ssh = ParamikoConnection(
|
|
|
|
runner=self.runner,
|
|
|
|
host=self.host,
|
|
|
|
port=self.port,
|
|
|
|
user=self.user,
|
|
|
|
password=password,
|
|
|
|
private_key_file=private_key_file
|
|
|
|
)
|
|
|
|
else:
|
|
|
|
self.ssh = SSHConnection(
|
|
|
|
runner=self.runner,
|
|
|
|
host=self.host,
|
|
|
|
port=self.port,
|
|
|
|
user=self.user,
|
|
|
|
password=password,
|
|
|
|
private_key_file=private_key_file
|
|
|
|
)
|
2013-08-27 20:25:54 +00:00
|
|
|
|
2013-08-07 15:54:53 +00:00
|
|
|
# attempt to work around shared-memory funness
|
|
|
|
if getattr(self.runner, 'aes_keys', None):
|
|
|
|
utils.AES_KEYS = self.runner.aes_keys
|
|
|
|
|
2013-09-04 20:29:46 +00:00
|
|
|
def _execute_accelerate_module(self):
|
2013-09-30 19:08:07 +00:00
|
|
|
args = "password=%s port=%s debug=%d" % (base64.b64encode(self.key.__str__()), str(self.accport), int(utils.VERBOSITY))
|
2013-09-04 20:29:46 +00:00
|
|
|
inject = dict(password=self.key)
|
2013-09-25 13:54:54 +00:00
|
|
|
if self.runner.accelerate_inventory_host:
|
|
|
|
inject = utils.combine_vars(inject, self.runner.inventory.get_variables(self.runner.accelerate_inventory_host))
|
|
|
|
else:
|
|
|
|
inject = utils.combine_vars(inject, self.runner.inventory.get_variables(self.host))
|
2013-09-30 19:08:07 +00:00
|
|
|
vvvv("attempting to start up the accelerate daemon...")
|
2013-08-11 05:41:18 +00:00
|
|
|
self.ssh.connect()
|
2013-08-13 03:57:41 +00:00
|
|
|
tmp_path = self.runner._make_tmp_path(self.ssh)
|
2013-09-04 20:29:46 +00:00
|
|
|
return self.runner._execute_module(self.ssh, tmp_path, 'accelerate', args, inject=inject)
|
2013-08-07 15:54:53 +00:00
|
|
|
|
2013-08-11 05:41:18 +00:00
|
|
|
def connect(self, allow_ssh=True):
|
2013-08-07 15:54:53 +00:00
|
|
|
''' activates the connection object '''
|
|
|
|
|
2013-08-11 05:41:18 +00:00
|
|
|
try:
|
2013-08-27 18:12:35 +00:00
|
|
|
if not self.is_connected:
|
|
|
|
# TODO: make the timeout and retries configurable?
|
2013-09-03 17:27:58 +00:00
|
|
|
tries = 3
|
2013-08-27 18:12:35 +00:00
|
|
|
self.conn = socket.socket()
|
2013-09-19 19:11:36 +00:00
|
|
|
self.conn.settimeout(constants.ACCELERATE_CONNECT_TIMEOUT)
|
2013-09-30 19:08:07 +00:00
|
|
|
vvvv("attempting connection to %s via the accelerated port %d" % (self.host,self.accport))
|
2013-08-27 18:12:35 +00:00
|
|
|
while tries > 0:
|
|
|
|
try:
|
2013-09-04 20:29:46 +00:00
|
|
|
self.conn.connect((self.host,self.accport))
|
2013-08-27 18:12:35 +00:00
|
|
|
break
|
|
|
|
except:
|
2013-09-30 19:08:07 +00:00
|
|
|
vvvv("failed, retrying...")
|
2013-08-27 18:12:35 +00:00
|
|
|
time.sleep(0.1)
|
|
|
|
tries -= 1
|
|
|
|
if tries == 0:
|
2013-08-30 18:24:24 +00:00
|
|
|
vvv("Could not connect via the accelerated connection, exceeded # of tries")
|
2013-08-27 18:12:35 +00:00
|
|
|
raise errors.AnsibleError("Failed to connect")
|
2013-09-19 19:11:36 +00:00
|
|
|
self.conn.settimeout(self.runner.accelerate_timeout)
|
2013-08-11 05:41:18 +00:00
|
|
|
except:
|
|
|
|
if allow_ssh:
|
2013-08-27 18:12:35 +00:00
|
|
|
vvv("Falling back to ssh to startup accelerated mode")
|
2013-09-04 20:29:46 +00:00
|
|
|
res = self._execute_accelerate_module()
|
2013-09-03 17:27:58 +00:00
|
|
|
if not res.is_successful():
|
|
|
|
raise errors.AnsibleError("Failed to launch the accelerated daemon on %s (reason: %s)" % (self.host,res.result.get('msg')))
|
2013-08-11 05:41:18 +00:00
|
|
|
return self.connect(allow_ssh=False)
|
|
|
|
else:
|
2013-09-04 20:29:46 +00:00
|
|
|
raise errors.AnsibleError("Failed to connect to %s:%s" % (self.host,self.accport))
|
2013-08-11 05:41:18 +00:00
|
|
|
self.is_connected = True
|
2013-08-07 15:54:53 +00:00
|
|
|
return self
|
|
|
|
|
2013-08-11 05:41:18 +00:00
|
|
|
def send_data(self, data):
|
|
|
|
packed_len = struct.pack('Q',len(data))
|
|
|
|
return self.conn.sendall(packed_len + data)
|
|
|
|
|
|
|
|
def recv_data(self):
|
|
|
|
header_len = 8 # size of a packed unsigned long long
|
|
|
|
data = b""
|
2013-08-27 18:12:35 +00:00
|
|
|
try:
|
2013-09-30 19:08:07 +00:00
|
|
|
vvvv("%s: in recv_data(), waiting for the header" % self.host)
|
2013-08-27 18:12:35 +00:00
|
|
|
while len(data) < header_len:
|
|
|
|
d = self.conn.recv(1024)
|
|
|
|
if not d:
|
2013-09-30 19:08:07 +00:00
|
|
|
vvvv("%s: received nothing, bailing out" % self.host)
|
2013-08-27 18:12:35 +00:00
|
|
|
return None
|
|
|
|
data += d
|
2013-09-30 19:08:07 +00:00
|
|
|
vvvv("%s: got the header, unpacking" % self.host)
|
2013-08-27 18:12:35 +00:00
|
|
|
data_len = struct.unpack('Q',data[:header_len])[0]
|
|
|
|
data = data[header_len:]
|
2013-09-30 19:08:07 +00:00
|
|
|
vvvv("%s: data received so far (expecting %d): %d" % (self.host,data_len,len(data)))
|
2013-08-27 18:12:35 +00:00
|
|
|
while len(data) < data_len:
|
|
|
|
d = self.conn.recv(1024)
|
|
|
|
if not d:
|
2013-09-30 19:08:07 +00:00
|
|
|
vvvv("%s: received nothing, bailing out" % self.host)
|
2013-08-27 18:12:35 +00:00
|
|
|
return None
|
|
|
|
data += d
|
2013-09-30 19:08:07 +00:00
|
|
|
vvvv("%s: received all of the data, returning" % self.host)
|
2013-08-27 18:12:35 +00:00
|
|
|
return data
|
|
|
|
except socket.timeout:
|
|
|
|
raise errors.AnsibleError("timed out while waiting to receive data")
|
2013-08-11 05:41:18 +00:00
|
|
|
|
2013-08-07 15:54:53 +00:00
|
|
|
def exec_command(self, cmd, tmp_path, sudo_user, sudoable=False, executable='/bin/sh'):
|
|
|
|
''' run a command on the remote host '''
|
|
|
|
|
2013-09-05 20:11:26 +00:00
|
|
|
if executable == "":
|
|
|
|
executable = constants.DEFAULT_EXECUTABLE
|
|
|
|
|
2013-09-16 01:19:38 +00:00
|
|
|
if self.runner.sudo and sudoable and sudo_user:
|
2013-08-27 18:12:35 +00:00
|
|
|
cmd, prompt = utils.make_sudo_cmd(sudo_user, executable, cmd)
|
|
|
|
|
2013-08-07 15:54:53 +00:00
|
|
|
vvv("EXEC COMMAND %s" % cmd)
|
|
|
|
|
|
|
|
data = dict(
|
|
|
|
mode='command',
|
|
|
|
cmd=cmd,
|
|
|
|
tmp_path=tmp_path,
|
|
|
|
executable=executable,
|
|
|
|
)
|
|
|
|
data = utils.jsonify(data)
|
2013-08-11 05:41:18 +00:00
|
|
|
data = utils.encrypt(self.key, data)
|
|
|
|
if self.send_data(data):
|
2013-09-05 06:10:45 +00:00
|
|
|
raise errors.AnsibleError("Failed to send command to %s" % self.host)
|
2013-08-07 15:54:53 +00:00
|
|
|
|
2013-10-01 20:19:21 +00:00
|
|
|
while True:
|
|
|
|
# we loop here while waiting for the response, because a
|
|
|
|
# long running command may cause us to receive keepalive packets
|
|
|
|
# ({"pong":"true"}) rather than the response we want.
|
|
|
|
response = self.recv_data()
|
|
|
|
if not response:
|
|
|
|
raise errors.AnsibleError("Failed to get a response from %s" % self.host)
|
|
|
|
response = utils.decrypt(self.key, response)
|
|
|
|
response = utils.parse_json(response)
|
|
|
|
if "pong" in response:
|
|
|
|
# it's a keepalive, go back to waiting
|
|
|
|
vvvv("received a keepalive packet")
|
|
|
|
continue
|
|
|
|
else:
|
|
|
|
vvvv("received the response")
|
|
|
|
break
|
2013-08-07 15:54:53 +00:00
|
|
|
|
|
|
|
return (response.get('rc',None), '', response.get('stdout',''), response.get('stderr',''))
|
|
|
|
|
|
|
|
def put_file(self, in_path, out_path):
|
|
|
|
|
|
|
|
''' transfer a file from local to remote '''
|
|
|
|
vvv("PUT %s TO %s" % (in_path, out_path), host=self.host)
|
|
|
|
|
|
|
|
if not os.path.exists(in_path):
|
|
|
|
raise errors.AnsibleFileNotFound("file or module does not exist: %s" % in_path)
|
|
|
|
|
2013-08-28 15:05:52 +00:00
|
|
|
fd = file(in_path, 'rb')
|
|
|
|
fstat = os.stat(in_path)
|
|
|
|
try:
|
|
|
|
vvv("PUT file is %d bytes" % fstat.st_size)
|
|
|
|
while fd.tell() < fstat.st_size:
|
|
|
|
data = fd.read(CHUNK_SIZE)
|
|
|
|
last = False
|
|
|
|
if fd.tell() >= fstat.st_size:
|
|
|
|
last = True
|
|
|
|
data = dict(mode='put', data=base64.b64encode(data), out_path=out_path, last=last)
|
|
|
|
if self.runner.sudo:
|
|
|
|
data['user'] = self.runner.sudo_user
|
|
|
|
data = utils.jsonify(data)
|
|
|
|
data = utils.encrypt(self.key, data)
|
|
|
|
|
|
|
|
if self.send_data(data):
|
|
|
|
raise errors.AnsibleError("failed to send the file to %s" % self.host)
|
|
|
|
|
|
|
|
response = self.recv_data()
|
|
|
|
if not response:
|
|
|
|
raise errors.AnsibleError("Failed to get a response from %s" % self.host)
|
|
|
|
response = utils.decrypt(self.key, response)
|
|
|
|
response = utils.parse_json(response)
|
|
|
|
|
|
|
|
if response.get('failed',False):
|
|
|
|
raise errors.AnsibleError("failed to put the file in the requested location")
|
|
|
|
finally:
|
|
|
|
fd.close()
|
|
|
|
response = self.recv_data()
|
|
|
|
if not response:
|
|
|
|
raise errors.AnsibleError("Failed to get a response from %s" % self.host)
|
|
|
|
response = utils.decrypt(self.key, response)
|
|
|
|
response = utils.parse_json(response)
|
|
|
|
|
|
|
|
if response.get('failed',False):
|
|
|
|
raise errors.AnsibleError("failed to put the file in the requested location")
|
2013-08-07 15:54:53 +00:00
|
|
|
|
|
|
|
def fetch_file(self, in_path, out_path):
|
|
|
|
''' save a remote file to the specified path '''
|
|
|
|
vvv("FETCH %s TO %s" % (in_path, out_path), host=self.host)
|
|
|
|
|
|
|
|
data = dict(mode='fetch', in_path=in_path)
|
|
|
|
data = utils.jsonify(data)
|
2013-08-11 05:41:18 +00:00
|
|
|
data = utils.encrypt(self.key, data)
|
|
|
|
if self.send_data(data):
|
2013-08-27 18:12:35 +00:00
|
|
|
raise errors.AnsibleError("failed to initiate the file fetch with %s" % self.host)
|
2013-08-07 15:54:53 +00:00
|
|
|
|
|
|
|
fh = open(out_path, "w")
|
2013-08-28 15:05:52 +00:00
|
|
|
try:
|
|
|
|
bytes = 0
|
|
|
|
while True:
|
|
|
|
response = self.recv_data()
|
|
|
|
if not response:
|
|
|
|
raise errors.AnsibleError("Failed to get a response from %s" % self.host)
|
|
|
|
response = utils.decrypt(self.key, response)
|
|
|
|
response = utils.parse_json(response)
|
|
|
|
if response.get('failed', False):
|
|
|
|
raise errors.AnsibleError("Error during file fetch, aborting")
|
|
|
|
out = base64.b64decode(response['data'])
|
|
|
|
fh.write(out)
|
|
|
|
bytes += len(out)
|
|
|
|
# send an empty response back to signify we
|
|
|
|
# received the last chunk without errors
|
|
|
|
data = utils.jsonify(dict())
|
|
|
|
data = utils.encrypt(self.key, data)
|
|
|
|
if self.send_data(data):
|
|
|
|
raise errors.AnsibleError("failed to send ack during file fetch")
|
|
|
|
if response.get('last', False):
|
|
|
|
break
|
|
|
|
finally:
|
|
|
|
# we don't currently care about this final response,
|
|
|
|
# we just receive it and drop it. It may be used at some
|
|
|
|
# point in the future or we may just have the put/fetch
|
|
|
|
# operations not send back a final response at all
|
|
|
|
response = self.recv_data()
|
|
|
|
vvv("FETCH wrote %d bytes to %s" % (bytes, out_path))
|
|
|
|
fh.close()
|
2013-08-07 15:54:53 +00:00
|
|
|
|
|
|
|
def close(self):
|
|
|
|
''' terminate the connection '''
|
|
|
|
# Be a good citizen
|
|
|
|
try:
|
|
|
|
self.conn.close()
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
|