1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
|
#
# Common commands that we would like to run on remote servers.
#
# These scripts are available via:
#
# SSH.remote_command(nodes) do |ssh, host|
# ssh.script.custom_script_name
# end
#
module LeapCli
module SSH
class Scripts
REQUIRED_PACKAGES = "puppet rsync lsb-release locales"
attr_reader :ssh, :host
def initialize(backend, host)
@ssh = backend
@host = host
end
#
# creates directories that are owned by root and 700 permissions
#
def mkdirs(*dirs)
raise ArgumentError.new('illegal dir name') if dirs.grep(/[\' ]/).any?
ssh.stream dirs.collect{|dir| "mkdir -m 700 -p #{dir}; "}.join
end
#
# echos "ok" if the node has been initialized and the required packages are installed, bails out otherwise.
#
def assert_initialized
begin
test_initialized_file = "test -f #{Leap::Platform.init_path}"
check_required_packages = "! dpkg-query -W --showformat='${Status}\n' #{REQUIRED_PACKAGES} 2>&1 | grep -q -E '(deinstall|no packages)'"
ssh.stream "#{test_initialized_file} && #{check_required_packages} && echo ok", :raise_error => true
rescue SSH::ExecuteError
ssh.log :error, "running deploy: node not initialized. Run `leap node init #{host}`.", :host => host
raise # will skip further action on this node
end
end
#
# bails out the deploy if the file /etc/leap/no-deploy exists.
#
def check_for_no_deploy
begin
ssh.stream "test ! -f /etc/leap/no-deploy", :raise_error => true, :log_output => false
rescue SSH::ExecuteError
ssh.log :warning, "can't continue because file /etc/leap/no-deploy exists", :host => host
raise # will skip further action on this node
end
end
#
# dumps debugging information
#
def debug
output = ssh.capture "#{Leap::Platform.leap_dir}/bin/debug.sh"
ssh.log(output, :wrap => true, :host => host.hostname, :color => :cyan)
end
#
# dumps the recent deploy history to the console
#
def history(lines)
cmd = "(test -s /var/log/leap/deploy-summary.log && tail -n #{lines} /var/log/leap/deploy-summary.log) || (test -s /var/log/leap/deploy-summary.log.1 && tail -n #{lines} /var/log/leap/deploy-summary.log.1) || (echo 'no history')"
history = ssh.capture(cmd, :log_output => false)
if history
ssh.log host.hostname, :color => :cyan, :style => :bold do
ssh.log history, :wrap => true
end
end
end
#
# apply puppet! weeeeeee
#
def puppet_apply(options)
cmd = "#{Leap::Platform.leap_dir}/bin/puppet_command set_hostname apply #{flagize(options)}"
ssh.stream cmd, :log_finish => true
end
def install_authorized_keys
ssh.log :updating, "authorized_keys" do
mkdirs '/root/.ssh'
ssh.upload! LeapCli::Path.named_path(:authorized_keys), '/root/.ssh/authorized_keys', :mode => '600'
end
end
#
# for vagrant nodes, we install insecure vagrant key to authorized_keys2, since deploy
# will overwrite authorized_keys.
#
# why force the insecure vagrant key?
# if we don't do this, then first time initialization might fail if the user has many keys
# (ssh will bomb out before it gets to the vagrant key).
# and it really doesn't make sense to ask users to pin the insecure vagrant key in their
# .ssh/config files.
#
def install_insecure_vagrant_key
ssh.log :installing, "insecure vagrant key" do
mkdirs '/root/.ssh'
ssh.upload! LeapCli::Path.vagrant_ssh_pub_key_file, '/root/.ssh/authorized_keys2', :mode => '600'
end
end
def install_prerequisites
bin_dir = File.join(Leap::Platform.leap_dir, 'bin')
node_init_path = File.join(bin_dir, 'node_init')
ssh.log :running, "node_init script" do
mkdirs bin_dir
ssh.upload! LeapCli::Path.node_init_script, node_init_path, :mode => '500'
ssh.stream node_init_path
end
end
private
def flagize(hsh)
hsh.inject([]) {|str, item|
if item[1] === false
str
elsif item[1] === true
str << "--" + item[0].to_s
else
str << "--" + item[0].to_s + " " + item[1].inspect
end
}.join(' ')
end
end
end
end
|