hybrid_platforms_conductor 32.4.2 → 32.7.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/hybrid_platforms_conductor/deployer.rb +9 -8
- data/lib/hybrid_platforms_conductor/hpc_plugins/connector/ssh.rb +157 -81
- data/lib/hybrid_platforms_conductor/hpc_plugins/provisioner/proxmox.rb +1 -1
- data/lib/hybrid_platforms_conductor/hpc_plugins/test/deploy_freshness.rb +1 -1
- data/lib/hybrid_platforms_conductor/hpc_plugins/test/file_system.rb +1 -1
- data/lib/hybrid_platforms_conductor/hpc_plugins/test/hostname.rb +1 -1
- data/lib/hybrid_platforms_conductor/hpc_plugins/test/ip.rb +1 -1
- data/lib/hybrid_platforms_conductor/hpc_plugins/test/local_users.rb +1 -1
- data/lib/hybrid_platforms_conductor/hpc_plugins/test/mounts.rb +1 -1
- data/lib/hybrid_platforms_conductor/hpc_plugins/test/orphan_files.rb +1 -1
- data/lib/hybrid_platforms_conductor/hpc_plugins/test/spectre.rb +6 -7
- data/lib/hybrid_platforms_conductor/hpc_plugins/test/vulnerabilities.rb +7 -6
- data/lib/hybrid_platforms_conductor/nodes_handler.rb +37 -0
- data/lib/hybrid_platforms_conductor/version.rb +1 -1
- data/spec/hybrid_platforms_conductor_test/api/actions_executor/connectors/ssh/config_dsl_spec.rb +35 -0
- data/spec/hybrid_platforms_conductor_test/api/actions_executor/connectors/ssh/connections_spec.rb +65 -5
- data/spec/hybrid_platforms_conductor_test/api/actions_executor/connectors/ssh/global_helpers_spec.rb +50 -6
- data/spec/hybrid_platforms_conductor_test/api/actions_executor/connectors/ssh/node_helpers_spec.rb +1 -1
- data/spec/hybrid_platforms_conductor_test/api/actions_executor/connectors/ssh/remote_actions_spec.rb +47 -9
- data/spec/hybrid_platforms_conductor_test/api/nodes_handler/common_spec.rb +28 -0
- data/spec/hybrid_platforms_conductor_test/api/nodes_handler/config_dsl_spec.rb +71 -0
- data/spec/hybrid_platforms_conductor_test/executables/options/common_spec.rb +2 -1
- data/spec/hybrid_platforms_conductor_test/helpers/cmd_runner_helpers.rb +29 -11
- data/spec/hybrid_platforms_conductor_test/helpers/connector_ssh_helpers.rb +50 -11
- data/spec/hybrid_platforms_conductor_test/helpers/deployer_helpers.rb +14 -14
- data/spec/hybrid_platforms_conductor_test/helpers/deployer_test_helpers.rb +70 -11
- data/spec/hybrid_platforms_conductor_test/helpers/provisioner_proxmox_helpers.rb +2 -2
- metadata +3 -2
data/spec/hybrid_platforms_conductor_test/api/actions_executor/connectors/ssh/node_helpers_spec.rb
CHANGED
@@ -13,7 +13,7 @@ describe HybridPlatformsConductor::ActionsExecutor do
|
|
13
13
|
|
14
14
|
it 'provides an SSH URL that can be used by other processes to connect to this node' do
|
15
15
|
with_test_platform_for_remote_testing do
|
16
|
-
expect(test_connector.ssh_url).to eq '
|
16
|
+
expect(test_connector.ssh_url).to eq 'hpc.node'
|
17
17
|
end
|
18
18
|
end
|
19
19
|
|
data/spec/hybrid_platforms_conductor_test/api/actions_executor/connectors/ssh/remote_actions_spec.rb
CHANGED
@@ -6,7 +6,7 @@ describe HybridPlatformsConductor::ActionsExecutor do
|
|
6
6
|
|
7
7
|
it 'executes bash commands remotely' do
|
8
8
|
with_test_platform_for_remote_testing(
|
9
|
-
expected_cmds: [[/.+\/ssh
|
9
|
+
expected_cmds: [[/.+\/ssh hpc\.node \/bin\/bash <<'EOF'\nbash_cmd.bash\nEOF/, proc { [0, 'Bash commands executed on node', ''] }]],
|
10
10
|
expected_stdout: 'Bash commands executed on node'
|
11
11
|
) do
|
12
12
|
test_connector.remote_bash('bash_cmd.bash')
|
@@ -17,7 +17,7 @@ describe HybridPlatformsConductor::ActionsExecutor do
|
|
17
17
|
with_test_platform_for_remote_testing(
|
18
18
|
expected_cmds: [
|
19
19
|
[
|
20
|
-
/.+\/ssh
|
20
|
+
/.+\/ssh hpc\.node \/bin\/bash <<'EOF'\nbash_cmd.bash\nEOF/,
|
21
21
|
proc do |cmd, log_to_file: nil, log_to_stdout: true, log_stdout_to_io: nil, log_stderr_to_io: nil, expected_code: 0, timeout: nil, no_exception: false|
|
22
22
|
expect(timeout).to eq 5
|
23
23
|
[0, '', '']
|
@@ -33,7 +33,7 @@ describe HybridPlatformsConductor::ActionsExecutor do
|
|
33
33
|
it 'executes interactive commands remotely' do
|
34
34
|
with_test_platform_for_remote_testing do
|
35
35
|
expect(test_connector).to receive(:system) do |cmd|
|
36
|
-
expect(cmd).to match /^.+\/ssh
|
36
|
+
expect(cmd).to match /^.+\/ssh hpc\.node$/
|
37
37
|
end
|
38
38
|
test_connector.remote_interactive
|
39
39
|
end
|
@@ -43,7 +43,7 @@ describe HybridPlatformsConductor::ActionsExecutor do
|
|
43
43
|
with_test_platform_for_remote_testing(
|
44
44
|
expected_cmds: [
|
45
45
|
[
|
46
|
-
/cd \/path\/to && tar\s+--create\s+--gzip\s+--file -\s+src.file \| \/.+\/ssh\s+
|
46
|
+
/cd \/path\/to && tar\s+--create\s+--gzip\s+--file -\s+src.file \| \/.+\/ssh\s+hpc\.node\s+"tar\s+--extract\s+--gunzip\s+--file -\s+--directory \/remote_path\/to\/dst.dir\s+--owner root\s+"/,
|
47
47
|
proc { [0, '', ''] }
|
48
48
|
]
|
49
49
|
]
|
@@ -56,7 +56,7 @@ describe HybridPlatformsConductor::ActionsExecutor do
|
|
56
56
|
with_test_platform_for_remote_testing(
|
57
57
|
expected_cmds: [
|
58
58
|
[
|
59
|
-
/cd \/path\/to && tar\s+--create\s+--gzip\s+--file -\s+src.file \| \/.+\/ssh\s+
|
59
|
+
/cd \/path\/to && tar\s+--create\s+--gzip\s+--file -\s+src.file \| \/.+\/ssh\s+hpc\.node\s+"tar\s+--extract\s+--gunzip\s+--file -\s+--directory \/remote_path\/to\/dst.dir\s+--owner root\s+"/,
|
60
60
|
proc do |cmd, log_to_file: nil, log_to_stdout: true, log_stdout_to_io: nil, log_stderr_to_io: nil, expected_code: 0, timeout: nil, no_exception: false|
|
61
61
|
expect(timeout).to eq 5
|
62
62
|
[0, '', '']
|
@@ -76,7 +76,7 @@ describe HybridPlatformsConductor::ActionsExecutor do
|
|
76
76
|
[
|
77
77
|
/.+\/hpc_temp_cmds_.+\.sh$/,
|
78
78
|
proc do |received_cmd|
|
79
|
-
expect(File.read(received_cmd)).to match /.+\/ssh
|
79
|
+
expect(File.read(received_cmd)).to match /.+\/ssh hpc\.node \/bin\/bash <<'EOF'\n#{Regexp.escape(cmd)}\nEOF/
|
80
80
|
[0, 'Bash commands executed on node', '']
|
81
81
|
end
|
82
82
|
]
|
@@ -92,7 +92,7 @@ describe HybridPlatformsConductor::ActionsExecutor do
|
|
92
92
|
with_test_platform_for_remote_testing(
|
93
93
|
expected_cmds: [
|
94
94
|
[
|
95
|
-
/cd \/path\/to && tar\s+--create\s+--gzip\s+--file -\s+src.file \| \/.+\/ssh\s+
|
95
|
+
/cd \/path\/to && tar\s+--create\s+--gzip\s+--file -\s+src.file \| \/.+\/ssh\s+hpc\.node\s+"sudo -u root tar\s+--extract\s+--gunzip\s+--file -\s+--directory \/remote_path\/to\/dst.dir\s+--owner root\s+"/,
|
96
96
|
proc { [0, '', ''] }
|
97
97
|
]
|
98
98
|
]
|
@@ -101,11 +101,25 @@ describe HybridPlatformsConductor::ActionsExecutor do
|
|
101
101
|
end
|
102
102
|
end
|
103
103
|
|
104
|
+
it 'copies files remotely with a different sudo' do
|
105
|
+
with_test_platform_for_remote_testing(
|
106
|
+
expected_cmds: [
|
107
|
+
[
|
108
|
+
/cd \/path\/to && tar\s+--create\s+--gzip\s+--file -\s+src.file \| \/.+\/ssh\s+hpc\.node\s+"other_sudo --user root tar\s+--extract\s+--gunzip\s+--file -\s+--directory \/remote_path\/to\/dst.dir\s+--owner root\s+"/,
|
109
|
+
proc { [0, '', ''] }
|
110
|
+
]
|
111
|
+
],
|
112
|
+
additional_config: 'sudo_for { |user| "other_sudo --user #{user}" }'
|
113
|
+
) do
|
114
|
+
test_connector.remote_copy('/path/to/src.file', '/remote_path/to/dst.dir', sudo: true)
|
115
|
+
end
|
116
|
+
end
|
117
|
+
|
104
118
|
it 'copies files remotely with a different owner' do
|
105
119
|
with_test_platform_for_remote_testing(
|
106
120
|
expected_cmds: [
|
107
121
|
[
|
108
|
-
/cd \/path\/to && tar\s+--create\s+--gzip\s+--file -\s+--owner remote_user\s+src.file \| \/.+\/ssh\s+
|
122
|
+
/cd \/path\/to && tar\s+--create\s+--gzip\s+--file -\s+--owner remote_user\s+src.file \| \/.+\/ssh\s+hpc\.node\s+"tar\s+--extract\s+--gunzip\s+--file -\s+--directory \/remote_path\/to\/dst.dir\s+--owner root\s+"/,
|
109
123
|
proc { [0, '', ''] }
|
110
124
|
]
|
111
125
|
]
|
@@ -118,7 +132,7 @@ describe HybridPlatformsConductor::ActionsExecutor do
|
|
118
132
|
with_test_platform_for_remote_testing(
|
119
133
|
expected_cmds: [
|
120
134
|
[
|
121
|
-
/cd \/path\/to && tar\s+--create\s+--gzip\s+--file -\s+--group remote_group\s+src.file \| \/.+\/ssh\s+
|
135
|
+
/cd \/path\/to && tar\s+--create\s+--gzip\s+--file -\s+--group remote_group\s+src.file \| \/.+\/ssh\s+hpc\.node\s+"tar\s+--extract\s+--gunzip\s+--file -\s+--directory \/remote_path\/to\/dst.dir\s+--owner root\s+"/,
|
122
136
|
proc { [0, '', ''] }
|
123
137
|
]
|
124
138
|
]
|
@@ -127,6 +141,30 @@ describe HybridPlatformsConductor::ActionsExecutor do
|
|
127
141
|
end
|
128
142
|
end
|
129
143
|
|
144
|
+
it 'executes bash commands remotely without Session Exec capabilities' do
|
145
|
+
with_test_platform_for_remote_testing(
|
146
|
+
expected_cmds: [[/^\{ cat \| .+\/ssh hpc\.node -T; } <<'EOF'\nbash_cmd.bash\nEOF$/, proc { [0, 'Bash commands executed on node', ''] }]],
|
147
|
+
expected_stdout: 'Bash commands executed on node',
|
148
|
+
session_exec: false
|
149
|
+
) do
|
150
|
+
test_connector.remote_bash('bash_cmd.bash')
|
151
|
+
end
|
152
|
+
end
|
153
|
+
|
154
|
+
it 'copies files remotely without Session Exec capabilities' do
|
155
|
+
with_test_platform_for_remote_testing(
|
156
|
+
expected_cmds: [
|
157
|
+
[
|
158
|
+
/^scp -S .+\/ssh \/path\/to\/src.file hpc\.node:\/remote_path\/to\/dst.dir$/,
|
159
|
+
proc { [0, '', ''] }
|
160
|
+
]
|
161
|
+
],
|
162
|
+
session_exec: false
|
163
|
+
) do
|
164
|
+
test_connector.remote_copy('/path/to/src.file', '/remote_path/to/dst.dir')
|
165
|
+
end
|
166
|
+
end
|
167
|
+
|
130
168
|
end
|
131
169
|
|
132
170
|
end
|
@@ -124,4 +124,32 @@ describe HybridPlatformsConductor::NodesHandler do
|
|
124
124
|
end
|
125
125
|
end
|
126
126
|
|
127
|
+
it 'computes the correct sudo for different nodes' do
|
128
|
+
with_test_platform(
|
129
|
+
{
|
130
|
+
nodes: {
|
131
|
+
'node1' => {},
|
132
|
+
'node2' => {},
|
133
|
+
'node3' => {}
|
134
|
+
}
|
135
|
+
},
|
136
|
+
false,
|
137
|
+
'
|
138
|
+
for_nodes(%w[node1 node2]) do
|
139
|
+
sudo_for { |user| "alt_sudo1 -p #{user}" }
|
140
|
+
end
|
141
|
+
for_nodes(\'node2\') do
|
142
|
+
sudo_for { |user| "alt_sudo2 -q #{user}" }
|
143
|
+
end
|
144
|
+
'
|
145
|
+
) do
|
146
|
+
expect(test_nodes_handler.sudo_on('node1')).to eq 'alt_sudo1 -p root'
|
147
|
+
expect(test_nodes_handler.sudo_on('node1', 'test_user')).to eq 'alt_sudo1 -p test_user'
|
148
|
+
expect(test_nodes_handler.sudo_on('node2')).to eq 'alt_sudo2 -q root'
|
149
|
+
expect(test_nodes_handler.sudo_on('node2', 'test_user')).to eq 'alt_sudo2 -q test_user'
|
150
|
+
expect(test_nodes_handler.sudo_on('node3')).to eq 'sudo -u root'
|
151
|
+
expect(test_nodes_handler.sudo_on('node3', 'test_user')).to eq 'sudo -u test_user'
|
152
|
+
end
|
153
|
+
end
|
154
|
+
|
127
155
|
end
|
@@ -0,0 +1,71 @@
|
|
1
|
+
describe HybridPlatformsConductor::NodesHandler do
|
2
|
+
|
3
|
+
context 'checking config DSL' do
|
4
|
+
|
5
|
+
it 'adds helpers for master cmdbs' do
|
6
|
+
with_test_platform(
|
7
|
+
{
|
8
|
+
nodes: {
|
9
|
+
'node1' => {},
|
10
|
+
'node2' => {},
|
11
|
+
'node3' => {}
|
12
|
+
}
|
13
|
+
},
|
14
|
+
false,
|
15
|
+
'
|
16
|
+
master_cmdbs(
|
17
|
+
test_cmdb: :property1,
|
18
|
+
test_cmdb2: :property2
|
19
|
+
)
|
20
|
+
for_nodes(\'node2\') do
|
21
|
+
master_cmdbs(test_cmdb: :property3)
|
22
|
+
end
|
23
|
+
'
|
24
|
+
) do
|
25
|
+
register_test_cmdb(%i[test_cmdb test_cmdb2])
|
26
|
+
expect(test_config.cmdb_masters).to eq [
|
27
|
+
{
|
28
|
+
nodes_selectors_stack: [],
|
29
|
+
cmdb_masters: {
|
30
|
+
test_cmdb: [:property1],
|
31
|
+
test_cmdb2: [:property2]
|
32
|
+
}
|
33
|
+
},
|
34
|
+
{
|
35
|
+
nodes_selectors_stack: ['node2'],
|
36
|
+
cmdb_masters: {
|
37
|
+
test_cmdb: [:property3]
|
38
|
+
}
|
39
|
+
}
|
40
|
+
]
|
41
|
+
end
|
42
|
+
end
|
43
|
+
|
44
|
+
it 'adds helpers for configurable sudo' do
|
45
|
+
with_test_platform(
|
46
|
+
{
|
47
|
+
nodes: {
|
48
|
+
'node1' => {},
|
49
|
+
'node2' => {},
|
50
|
+
'node3' => {}
|
51
|
+
}
|
52
|
+
},
|
53
|
+
false,
|
54
|
+
'
|
55
|
+
sudo_for { |user| "alt_sudo1 -p #{user}" }
|
56
|
+
for_nodes(\'node2\') do
|
57
|
+
sudo_for { |user| "alt_sudo2 -q #{user}" }
|
58
|
+
end
|
59
|
+
'
|
60
|
+
) do
|
61
|
+
expect(test_config.sudo_procs.size).to eq 2
|
62
|
+
expect(test_config.sudo_procs[0][:nodes_selectors_stack]).to eq []
|
63
|
+
expect(test_config.sudo_procs[0][:sudo_proc].call('test_user')).to eq 'alt_sudo1 -p test_user'
|
64
|
+
expect(test_config.sudo_procs[1][:nodes_selectors_stack]).to eq ['node2']
|
65
|
+
expect(test_config.sudo_procs[1][:sudo_proc].call('test_user')).to eq 'alt_sudo2 -q test_user'
|
66
|
+
end
|
67
|
+
end
|
68
|
+
|
69
|
+
end
|
70
|
+
|
71
|
+
end
|
@@ -50,7 +50,8 @@ describe 'executables\' common options' do
|
|
50
50
|
with_test_platform_for_common_options do
|
51
51
|
exit_code, stdout, stderr = run executable, *(['--debug'] + default_options)
|
52
52
|
expect(exit_code).to eq 0
|
53
|
-
|
53
|
+
# Make sure to ignore the deployment markers from stderr.
|
54
|
+
expect(stderr.gsub("===== [ node1 / node1_service ] - HPC Service Check ===== Begin\n===== [ node1 / node1_service ] - HPC Service Check ===== End\n", '')).to eq ''
|
54
55
|
end
|
55
56
|
end
|
56
57
|
|
@@ -8,14 +8,27 @@ module HybridPlatformsConductorTest
|
|
8
8
|
# Run expectations on the expected commands to be called.
|
9
9
|
#
|
10
10
|
# Parameters::
|
11
|
-
# * *commands* (Array<
|
12
|
-
# *
|
13
|
-
#
|
11
|
+
# * *commands* (Array<Array>): List of expected commands that should be called on CmdRunner. Each specification is a list containing those items:
|
12
|
+
# * *0* (String or Regexp): The command name or regexp matching the command name
|
13
|
+
# * *1* (Proc): The mocking code to be called in place of the real command:
|
14
|
+
# * Parameters::
|
15
|
+
# * Same parameters as CmdRunner@run_cmd
|
16
|
+
# * Result::
|
17
|
+
# * Same results as CmdRunner@run_cmd
|
18
|
+
# * *2* (Hash): Optional hash of options. Can be ommited. [default = {}]
|
19
|
+
# * *optional* (Boolean): If true then don't fail if the command to be mocked has not been called [default: false]
|
14
20
|
# * *cmd_runner* (CmdRunner): The CmdRunner to mock [default: test_cmd_runner]
|
15
21
|
# * Proc: Code called with the command runner mocked
|
16
22
|
def with_cmd_runner_mocked(commands, cmd_runner: test_cmd_runner)
|
17
|
-
|
18
|
-
|
23
|
+
remaining_expected_commands = commands.map do |(expected_command, command_code, options)|
|
24
|
+
[
|
25
|
+
expected_command,
|
26
|
+
command_code,
|
27
|
+
{
|
28
|
+
optional: false
|
29
|
+
}.merge(options || {})
|
30
|
+
]
|
31
|
+
end
|
19
32
|
# We need to protect the access to this array as the mocked commands can be called by competing threads
|
20
33
|
remaining_expected_commands_mutex = Mutex.new
|
21
34
|
allow(cmd_runner).to receive(:run_cmd) do |cmd, log_to_file: nil, log_to_stdout: true, log_stdout_to_io: nil, log_stderr_to_io: nil, expected_code: 0, timeout: nil, no_exception: false|
|
@@ -23,7 +36,7 @@ module HybridPlatformsConductorTest
|
|
23
36
|
found_command = nil
|
24
37
|
found_command_code = nil
|
25
38
|
remaining_expected_commands_mutex.synchronize do
|
26
|
-
remaining_expected_commands.delete_if do |(expected_command, command_code)|
|
39
|
+
remaining_expected_commands.delete_if do |(expected_command, command_code, _options)|
|
27
40
|
break unless found_command.nil?
|
28
41
|
if (expected_command.is_a?(String) && expected_command == cmd) || (expected_command.is_a?(Regexp) && cmd =~ expected_command)
|
29
42
|
found_command = expected_command
|
@@ -64,14 +77,19 @@ module HybridPlatformsConductorTest
|
|
64
77
|
log_stderr_to_io << mocked_stderr if !mocked_stderr.empty? && !log_stderr_to_io.nil?
|
65
78
|
[mocked_exit_status, mocked_stdout, mocked_stderr]
|
66
79
|
else
|
67
|
-
|
68
|
-
|
69
|
-
|
80
|
+
raise "Unexpected command run:\n#{cmd}\nRemaining expected commands:\n#{
|
81
|
+
remaining_expected_commands.map do |(expected_command, _command_code, _options)|
|
82
|
+
expected_command
|
83
|
+
end.join("\n")
|
84
|
+
}"
|
70
85
|
end
|
71
86
|
end
|
72
87
|
yield
|
73
|
-
expect(
|
74
|
-
|
88
|
+
expect(
|
89
|
+
remaining_expected_commands.select do |(_expected_command, _command_code, options)|
|
90
|
+
!options[:optional]
|
91
|
+
end
|
92
|
+
).to eq([]), "Expected CmdRunner commands were not run:\n#{remaining_expected_commands.map(&:first).join("\n")}"
|
75
93
|
# Un-mock the command runner
|
76
94
|
allow(cmd_runner).to receive(:run_cmd).and_call_original
|
77
95
|
end
|
@@ -10,39 +10,58 @@ module HybridPlatformsConductorTest
|
|
10
10
|
# Parameters::
|
11
11
|
# * *nodes_connections* (Hash<String, Hash<Symbol,Object> >): Nodes' connections info, per node name:
|
12
12
|
# * *connection* (String): Connection string (fqdn, IP...) used by SSH
|
13
|
+
# * *ip* (String): IP used by SSH (can be different from connection in case of transformed SSH) [default: connection]
|
13
14
|
# * *user* (String): User used by SSH
|
14
15
|
# * *times* (Integer): Number of times this connection should be used [default: 1]
|
15
16
|
# * *control_master_create_error* (String or nil): Error to simulate during the SSH ControlMaster creation, or nil for none [default: nil]
|
16
17
|
# * *with_control_master_create* (Boolean): Do we create the control master? [default: true]
|
17
18
|
# * *with_control_master_check* (Boolean): Do we check the control master? [default: false]
|
18
19
|
# * *with_control_master_destroy* (Boolean): Do we destroy the control master? [default: true]
|
20
|
+
# * *with_control_master_destroy_optional* (Boolean): If true, then consider the ControlMaster destruction to be optional [default: false]
|
19
21
|
# * *with_strict_host_key_checking* (Boolean): Do we use strict host key checking? [default: true]
|
20
22
|
# * *with_batch_mode* (Boolean): Do we use BatchMode when creating the control master? [default: true]
|
23
|
+
# * *with_session_exec* (Boolean): Do we use Sessien Exec capabilities when creating the control master? [default: true]
|
21
24
|
# Result::
|
22
|
-
# * Array<
|
25
|
+
# * Array<Array>: The expected commands that should be used, and their corresponding mocked code and options
|
23
26
|
def ssh_expected_commands_for(
|
24
27
|
nodes_connections,
|
25
28
|
with_control_master_create: true,
|
26
29
|
with_control_master_check: false,
|
27
30
|
with_control_master_destroy: true,
|
31
|
+
with_control_master_destroy_optional: false,
|
28
32
|
with_strict_host_key_checking: true,
|
29
|
-
with_batch_mode: true
|
33
|
+
with_batch_mode: true,
|
34
|
+
with_session_exec: true
|
30
35
|
)
|
31
36
|
nodes_connections.map do |node, node_connection_info|
|
32
37
|
node_connection_info[:times] = 1 unless node_connection_info.key?(:times)
|
33
38
|
ssh_commands_once = []
|
34
39
|
ssh_commands_per_connection = []
|
35
40
|
if with_strict_host_key_checking
|
41
|
+
ip = node_connection_info[:ip] || node_connection_info[:connection]
|
36
42
|
ssh_commands_once.concat([
|
37
43
|
[
|
38
|
-
"ssh-keyscan #{
|
39
|
-
proc { [0, "#{
|
44
|
+
"ssh-keyscan #{ip}",
|
45
|
+
proc { [0, "#{ip} ssh-rsa fake_host_key_for_#{ip}", ''] }
|
40
46
|
]
|
41
47
|
])
|
42
48
|
end
|
43
49
|
if with_control_master_create
|
50
|
+
control_master_created = false
|
44
51
|
ssh_commands_per_connection << [
|
45
|
-
|
52
|
+
if with_session_exec
|
53
|
+
/^.+\/ssh #{with_batch_mode ? '-o BatchMode=yes ' : ''}-o ControlMaster=yes -o ControlPersist=yes hpc\.#{Regexp.escape(node)} true$/
|
54
|
+
else
|
55
|
+
# Mock the user hitting enter as the Control Master will be created in another thread and the main thread waits for user input.
|
56
|
+
expect($stdin).to receive(:gets) do
|
57
|
+
# We have to wait for the Control Master creation thread to actually create the Control Master before hitting Enter.
|
58
|
+
while !control_master_created do
|
59
|
+
sleep 0.1
|
60
|
+
end
|
61
|
+
"\n"
|
62
|
+
end
|
63
|
+
/^xterm -e '.+\/ssh -o ControlMaster=yes -o ControlPersist=yes hpc\.#{Regexp.escape(node)}'$/
|
64
|
+
end,
|
46
65
|
proc do
|
47
66
|
control_file = test_actions_executor.connector(:ssh).send(:control_master_file, node_connection_info[:connection], '22', node_connection_info[:user])
|
48
67
|
# Fail if the ControlMaster file already exists, as would SSH do if the file is stalled
|
@@ -51,6 +70,10 @@ module HybridPlatformsConductorTest
|
|
51
70
|
elsif node_connection_info[:control_master_create_error].nil?
|
52
71
|
# Really touch a fake control file, as ssh connector checks for its existence
|
53
72
|
File.write(control_file, '')
|
73
|
+
control_master_created = true
|
74
|
+
# If there is no Session Exec, this is done in a separate thread.
|
75
|
+
# So keep it alive until the user wants to stop it (which is done using an ssh -O exit command).
|
76
|
+
loop { sleep 0.1 } unless with_session_exec
|
54
77
|
[0, '', '']
|
55
78
|
else
|
56
79
|
[255, '', node_connection_info[:control_master_create_error]]
|
@@ -60,18 +83,19 @@ module HybridPlatformsConductorTest
|
|
60
83
|
end
|
61
84
|
if with_control_master_check
|
62
85
|
ssh_commands_per_connection << [
|
63
|
-
/^.+\/ssh -O check
|
86
|
+
/^.+\/ssh -O check hpc\.#{Regexp.escape(node)}$/,
|
64
87
|
proc { [0, '', ''] }
|
65
88
|
]
|
66
89
|
end
|
67
90
|
if with_control_master_destroy
|
68
91
|
ssh_commands_per_connection << [
|
69
|
-
/^.+\/ssh -O exit
|
92
|
+
/^.+\/ssh -O exit hpc\.#{Regexp.escape(node)} 2>&1 \| grep -v 'Exit request sent\.'$/,
|
70
93
|
proc do
|
71
94
|
# Really mock the control file deletion
|
72
95
|
File.unlink(test_actions_executor.connector(:ssh).send(:control_master_file, node_connection_info[:connection], '22', node_connection_info[:user]))
|
73
96
|
[1, '', '']
|
74
|
-
end
|
97
|
+
end,
|
98
|
+
{ optional: with_control_master_destroy_optional }
|
75
99
|
]
|
76
100
|
end
|
77
101
|
ssh_commands_once + ssh_commands_per_connection * node_connection_info[:times]
|
@@ -94,9 +118,23 @@ module HybridPlatformsConductorTest
|
|
94
118
|
# * *expected_stderr* (String): Expected stderr after client code execution [default: '']
|
95
119
|
# * *timeout* (Integer or nil): Timeout to prepare the connector for [default: nil]
|
96
120
|
# * *password* (String or nil): Password to set for the node, or nil for none [default: nil]
|
121
|
+
# * *additional_config* (String): Additional config [default: '']
|
122
|
+
# * *session_exec* (Boolean): Do we mock a node having an SSH connection accepting Session Exec? [default: true]
|
97
123
|
# * Proc: Client code to execute testing
|
98
|
-
def with_test_platform_for_remote_testing(
|
99
|
-
|
124
|
+
def with_test_platform_for_remote_testing(
|
125
|
+
expected_cmds: [],
|
126
|
+
expected_stdout: '',
|
127
|
+
expected_stderr: '',
|
128
|
+
timeout: nil,
|
129
|
+
password: nil,
|
130
|
+
additional_config: '',
|
131
|
+
session_exec: true
|
132
|
+
)
|
133
|
+
with_test_platform(
|
134
|
+
{ nodes: { 'node' => { meta: { host_ip: '192.168.42.42', ssh_session_exec: session_exec ? 'true' : 'false' } } } },
|
135
|
+
false,
|
136
|
+
additional_config
|
137
|
+
) do
|
100
138
|
with_cmd_runner_mocked(
|
101
139
|
[
|
102
140
|
['which env', proc { [0, "/usr/bin/env\n", ''] }],
|
@@ -105,7 +143,8 @@ module HybridPlatformsConductorTest
|
|
105
143
|
(password ? [['sshpass -V', proc { [0, "sshpass 1.06\n", ''] }]] : []) +
|
106
144
|
ssh_expected_commands_for(
|
107
145
|
{ 'node' => { connection: '192.168.42.42', user: 'test_user' } },
|
108
|
-
with_batch_mode: password.nil
|
146
|
+
with_batch_mode: password.nil?,
|
147
|
+
with_session_exec: session_exec
|
109
148
|
) +
|
110
149
|
expected_cmds
|
111
150
|
) do
|