mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
Merge branch 'connection-locking' of https://github.com/amenonsen/ansible into amenonsen-connection-locking
This commit is contained in:
commit
7034bbef30
4 changed files with 30 additions and 13 deletions
|
@ -23,6 +23,7 @@ import multiprocessing
|
||||||
import os
|
import os
|
||||||
import socket
|
import socket
|
||||||
import sys
|
import sys
|
||||||
|
import tempfile
|
||||||
|
|
||||||
from ansible import constants as C
|
from ansible import constants as C
|
||||||
from ansible.errors import AnsibleError
|
from ansible.errors import AnsibleError
|
||||||
|
@ -78,6 +79,10 @@ class TaskQueueManager:
|
||||||
self._failed_hosts = dict()
|
self._failed_hosts = dict()
|
||||||
self._unreachable_hosts = dict()
|
self._unreachable_hosts = dict()
|
||||||
|
|
||||||
|
# A temporary file (opened pre-fork) used by connection plugins for
|
||||||
|
# inter-process locking.
|
||||||
|
self._options.connection_lockfile = tempfile.TemporaryFile()
|
||||||
|
|
||||||
self._final_q = multiprocessing.Queue()
|
self._final_q = multiprocessing.Queue()
|
||||||
|
|
||||||
# create the pool of worker threads, based on the number of forks specified
|
# create the pool of worker threads, based on the number of forks specified
|
||||||
|
|
|
@ -161,6 +161,7 @@ class PlayContext(Base):
|
||||||
_private_key_file = FieldAttribute(isa='string', default=C.DEFAULT_PRIVATE_KEY_FILE)
|
_private_key_file = FieldAttribute(isa='string', default=C.DEFAULT_PRIVATE_KEY_FILE)
|
||||||
_timeout = FieldAttribute(isa='int', default=C.DEFAULT_TIMEOUT)
|
_timeout = FieldAttribute(isa='int', default=C.DEFAULT_TIMEOUT)
|
||||||
_shell = FieldAttribute(isa='string')
|
_shell = FieldAttribute(isa='string')
|
||||||
|
_connection_lockfd= FieldAttribute(isa='int', default=None)
|
||||||
|
|
||||||
# privilege escalation fields
|
# privilege escalation fields
|
||||||
_become = FieldAttribute(isa='bool')
|
_become = FieldAttribute(isa='bool')
|
||||||
|
@ -244,6 +245,11 @@ class PlayContext(Base):
|
||||||
if options.connection:
|
if options.connection:
|
||||||
self.connection = options.connection
|
self.connection = options.connection
|
||||||
|
|
||||||
|
# The lock file is opened in the parent process, and the workers will
|
||||||
|
# inherit the open file, so we just need to help them find it.
|
||||||
|
if options.connection_lockfile:
|
||||||
|
self.connection_lockfd = options.connection_lockfile.fileno()
|
||||||
|
|
||||||
self.remote_user = options.remote_user
|
self.remote_user = options.remote_user
|
||||||
self.private_key_file = options.private_key_file
|
self.private_key_file = options.private_key_file
|
||||||
|
|
||||||
|
|
|
@ -155,3 +155,13 @@ class ConnectionBase(with_metaclass(ABCMeta, object)):
|
||||||
if incorrect_password in output:
|
if incorrect_password in output:
|
||||||
raise AnsibleError('Incorrect %s password' % self._play_context.become_method)
|
raise AnsibleError('Incorrect %s password' % self._play_context.become_method)
|
||||||
|
|
||||||
|
def lock_connection(self):
|
||||||
|
f = self._play_context.connection_lockfd
|
||||||
|
self._display.vvvv('CONNECTION: pid %d waiting for lock on %d' % (os.getpid(), f))
|
||||||
|
fcntl.lockf(f, fcntl.LOCK_EX)
|
||||||
|
self._display.vvvv('CONNECTION: pid %d acquired lock on %d' % (os.getpid(), f))
|
||||||
|
|
||||||
|
def unlock_connection(self):
|
||||||
|
f = self._play_context.connection_lockfd
|
||||||
|
fcntl.lockf(f, fcntl.LOCK_UN)
|
||||||
|
self._display.vvvv('CONNECTION: pid %d released lock on %d' % (os.getpid(), f))
|
||||||
|
|
|
@ -71,16 +71,15 @@ class MyAddPolicy(object):
|
||||||
local L{HostKeys} object, and saving it. This is used by L{SSHClient}.
|
local L{HostKeys} object, and saving it. This is used by L{SSHClient}.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
def __init__(self, new_stdin):
|
def __init__(self, new_stdin, connection):
|
||||||
self._new_stdin = new_stdin
|
self._new_stdin = new_stdin
|
||||||
|
self.connection = connection
|
||||||
|
|
||||||
def missing_host_key(self, client, hostname, key):
|
def missing_host_key(self, client, hostname, key):
|
||||||
|
|
||||||
if C.HOST_KEY_CHECKING:
|
if C.HOST_KEY_CHECKING:
|
||||||
|
|
||||||
# FIXME: need to fix lock file stuff
|
self.connection.lock_connection()
|
||||||
#fcntl.lockf(self.runner.process_lockfile, fcntl.LOCK_EX)
|
|
||||||
#fcntl.lockf(self.runner.output_lockfile, fcntl.LOCK_EX)
|
|
||||||
|
|
||||||
old_stdin = sys.stdin
|
old_stdin = sys.stdin
|
||||||
sys.stdin = self._new_stdin
|
sys.stdin = self._new_stdin
|
||||||
|
@ -94,17 +93,11 @@ class MyAddPolicy(object):
|
||||||
inp = raw_input(AUTHENTICITY_MSG % (hostname, ktype, fingerprint))
|
inp = raw_input(AUTHENTICITY_MSG % (hostname, ktype, fingerprint))
|
||||||
sys.stdin = old_stdin
|
sys.stdin = old_stdin
|
||||||
|
|
||||||
|
self.connection.unlock_connection()
|
||||||
|
|
||||||
if inp not in ['yes','y','']:
|
if inp not in ['yes','y','']:
|
||||||
# FIXME: lock file stuff
|
|
||||||
#fcntl.flock(self.runner.output_lockfile, fcntl.LOCK_UN)
|
|
||||||
#fcntl.flock(self.runner.process_lockfile, fcntl.LOCK_UN)
|
|
||||||
raise AnsibleError("host connection rejected by user")
|
raise AnsibleError("host connection rejected by user")
|
||||||
|
|
||||||
# FIXME: lock file stuff
|
|
||||||
#fcntl.lockf(self.runner.output_lockfile, fcntl.LOCK_UN)
|
|
||||||
#fcntl.lockf(self.runner.process_lockfile, fcntl.LOCK_UN)
|
|
||||||
|
|
||||||
|
|
||||||
key._added_by_ansible_this_time = True
|
key._added_by_ansible_this_time = True
|
||||||
|
|
||||||
# existing implementation below:
|
# existing implementation below:
|
||||||
|
@ -159,7 +152,7 @@ class Connection(ConnectionBase):
|
||||||
pass # file was not found, but not required to function
|
pass # file was not found, but not required to function
|
||||||
ssh.load_system_host_keys()
|
ssh.load_system_host_keys()
|
||||||
|
|
||||||
ssh.set_missing_host_key_policy(MyAddPolicy(self._new_stdin))
|
ssh.set_missing_host_key_policy(MyAddPolicy(self._new_stdin, self))
|
||||||
|
|
||||||
allow_agent = True
|
allow_agent = True
|
||||||
|
|
||||||
|
@ -365,6 +358,9 @@ class Connection(ConnectionBase):
|
||||||
if C.HOST_KEY_CHECKING and C.PARAMIKO_RECORD_HOST_KEYS and self._any_keys_added():
|
if C.HOST_KEY_CHECKING and C.PARAMIKO_RECORD_HOST_KEYS and self._any_keys_added():
|
||||||
|
|
||||||
# add any new SSH host keys -- warning -- this could be slow
|
# add any new SSH host keys -- warning -- this could be slow
|
||||||
|
# (This doesn't acquire the connection lock because it needs
|
||||||
|
# to exclude only other known_hosts writers, not connections
|
||||||
|
# that are starting up.)
|
||||||
lockfile = self.keyfile.replace("known_hosts",".known_hosts.lock")
|
lockfile = self.keyfile.replace("known_hosts",".known_hosts.lock")
|
||||||
dirname = os.path.dirname(self.keyfile)
|
dirname = os.path.dirname(self.keyfile)
|
||||||
makedirs_safe(dirname)
|
makedirs_safe(dirname)
|
||||||
|
|
Loading…
Reference in a new issue