tpkg 2.3.3 → 2.3.4
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/.gitignore +1 -0
- data/Gemfile +4 -0
- data/LICENSE +20 -0
- data/Portfile +39 -0
- data/Portfile.template +39 -0
- data/README.md +43 -0
- data/Rakefile +468 -18
- data/bin/gem2tpkg +2 -2
- data/bin/tpkg +18 -13
- data/bin/tpkg_uploader +132 -0
- data/ca.pem +1 -0
- data/control +7 -0
- data/depend +3 -0
- data/externals-etch/authorized_keys +40 -0
- data/externals-etch/group +9 -0
- data/externals-etch/iptables +38 -0
- data/externals-etch/limits +30 -0
- data/externals-etch/nfs +30 -0
- data/externals-etch/sudo +30 -0
- data/externals-etch/supplemental_groups +8 -0
- data/externals-etch/sysctl +30 -0
- data/externals-etch/user +41 -0
- data/externals/group +39 -0
- data/externals/supplemental_groups +48 -0
- data/externals/user +39 -0
- data/lib/tpkg.rb +260 -991
- data/lib/tpkg/os.rb +164 -0
- data/lib/tpkg/os/debian.rb +159 -0
- data/lib/tpkg/os/freebsd.rb +113 -0
- data/lib/tpkg/os/macosx.rb +113 -0
- data/lib/tpkg/os/redhat.rb +173 -0
- data/lib/tpkg/os/solaris.rb +101 -0
- data/lib/tpkg/os/windows.rb +26 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify.rb +67 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/errors.rb +127 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/kwalify.schema.yaml +58 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/main.rb +442 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/messages.rb +173 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/meta-validator.rb +275 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/parser/base.rb +127 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/parser/yaml.rb +841 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/rule.rb +559 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/templates/genclass-java.eruby +222 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/templates/genclass-php.eruby +104 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/templates/genclass-ruby.eruby +113 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/types.rb +156 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/util.rb +158 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/util/assert-text-equal.rb +46 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/util/hash-interface.rb +18 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/util/hashlike.rb +51 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/util/option-parser.rb +220 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/util/ordered-hash.rb +57 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/util/testcase-helper.rb +112 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/validator.rb +282 -0
- data/lib/tpkg/thirdparty/kwalify-0.7.2/lib/kwalify/yaml-parser.rb +870 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh.rb +219 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/authentication/agent.rb +179 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/authentication/constants.rb +18 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/authentication/key_manager.rb +219 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/authentication/methods/abstract.rb +60 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/authentication/methods/hostbased.rb +71 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/authentication/methods/keyboard_interactive.rb +66 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/authentication/methods/password.rb +39 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/authentication/methods/publickey.rb +92 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/authentication/pageant.rb +183 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/authentication/session.rb +134 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/buffer.rb +340 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/buffered_io.rb +198 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/config.rb +205 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/connection/channel.rb +630 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/connection/constants.rb +33 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/connection/session.rb +597 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/connection/term.rb +178 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/errors.rb +85 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/key_factory.rb +102 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/known_hosts.rb +129 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/loggable.rb +61 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/packet.rb +102 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/prompt.rb +93 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/proxy/command.rb +75 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/proxy/errors.rb +14 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/proxy/http.rb +94 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/proxy/socks4.rb +70 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/proxy/socks5.rb +142 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/ruby_compat.rb +43 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/service/forward.rb +288 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/test.rb +89 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/test/channel.rb +129 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/test/extensions.rb +152 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/test/kex.rb +44 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/test/local_packet.rb +51 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/test/packet.rb +81 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/test/remote_packet.rb +38 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/test/script.rb +157 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/test/socket.rb +64 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/algorithms.rb +384 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/cipher_factory.rb +97 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/constants.rb +30 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/hmac.rb +31 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/hmac/abstract.rb +79 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/hmac/md5.rb +12 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/hmac/md5_96.rb +11 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/hmac/none.rb +15 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/hmac/sha1.rb +13 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/hmac/sha1_96.rb +11 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/identity_cipher.rb +55 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/kex.rb +13 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/kex/diffie_hellman_group1_sha1.rb +208 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/kex/diffie_hellman_group_exchange_sha1.rb +77 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/openssl.rb +127 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/packet_stream.rb +235 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/server_version.rb +71 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/session.rb +276 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/transport/state.rb +206 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/verifiers/lenient.rb +30 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/verifiers/null.rb +12 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/verifiers/strict.rb +53 -0
- data/lib/tpkg/thirdparty/net-ssh-2.1.0/lib/net/ssh/version.rb +62 -0
- data/lib/tpkg/version.rb +3 -0
- data/man/man1/cpan2tpkg.1 +82 -0
- data/man/man1/gem2tpkg.1 +120 -0
- data/man/man1/tpkg.1 +411 -0
- data/pkginfo +8 -0
- data/postinstall.solaris +11 -0
- data/postremove.solaris +16 -0
- data/schema/schema-1.0.5.yml +0 -0
- data/schema/schema-1.0.6.yml +0 -0
- data/schema/schema-1.0.7.yml +0 -0
- data/schema/schema-1.0.8.yml +0 -0
- data/schema/schema-1.0.9.yml +0 -0
- data/schema/schema.yml +0 -0
- data/schema/tpkg-1.0.0.dtd +0 -0
- data/schema/tpkg-1.0.1.dtd +0 -0
- data/schema/tpkg-1.0.2.dtd +0 -0
- data/schema/tpkg-1.0.3.dtd +0 -0
- data/schema/tpkg-1.0.4.dtd +0 -0
- data/schema/tpkg-1.0.5.dtd +0 -0
- data/schema/tpkg-1.0.6.dtd +0 -0
- data/schema/tpkg-1.0.7.dtd +0 -0
- data/schema/tpkg-1.0.8.dtd +0 -0
- data/schema/tpkg-1.0.9.dtd +0 -0
- data/schema/tpkg.dtd +0 -0
- data/test/TODO +30 -0
- data/test/premadetestpkg/pkg_without_file_metadata-1.0-1.tpkg +0 -0
- data/test/test_checksum.rb +53 -0
- data/test/test_compress.rb +55 -0
- data/test/test_conflict.rb +41 -0
- data/test/test_crontabs.rb +398 -0
- data/test/test_dependency.rb +1113 -0
- data/test/test_downgrade.rb +80 -0
- data/test/test_download.rb +95 -0
- data/test/test_encrypt.rb +136 -0
- data/test/test_filemetadata.rb +131 -0
- data/test/test_initscript.rb +93 -0
- data/test/test_install.rb +186 -0
- data/test/test_lock.rb +82 -0
- data/test/test_make.rb +410 -0
- data/test/test_metadata.rb +805 -0
- data/test/test_misc.rb +379 -0
- data/test/test_options.rb +1711 -0
- data/test/test_os.rb +193 -0
- data/test/test_os_debian.rb +99 -0
- data/test/test_os_freebsd.rb +89 -0
- data/test/test_os_macosx.rb +79 -0
- data/test/test_os_redhat.rb +124 -0
- data/test/test_os_solaris.rb +85 -0
- data/test/test_os_windows.rb +26 -0
- data/test/test_query.rb +134 -0
- data/test/test_remove.rb +539 -0
- data/test/test_tar.rb +99 -0
- data/test/test_unpack.rb +977 -0
- data/test/test_upgrade.rb +398 -0
- data/test/test_version.rb +54 -0
- data/test/testcmds/crontab +14 -0
- data/test/testcmds/debian/apt-cache +145 -0
- data/test/testcmds/debian/dpkg-query +16 -0
- data/test/testcmds/freebsd/pkg_info +13 -0
- data/test/testcmds/macosx/port +35 -0
- data/test/testcmds/redhat/rpmbuild +6 -0
- data/test/testcmds/redhat/yum +90 -0
- data/test/testcmds/solaris/pkginfo +25 -0
- data/test/testcmds/solaris/pkgutil +36 -0
- data/test/testpkg/reloc/encfile +2 -0
- data/test/testpkg/reloc/file +2 -0
- data/test/testpkg/reloc/precryptfile +1 -0
- data/test/testpkg/reloc/precryptfile.plaintext +3 -0
- data/test/testpkg/tpkg-bad-ownergroup.xml +25 -0
- data/test/testpkg/tpkg-bad-ownergroup.yml +18 -0
- data/test/testpkg/tpkg-default-perms.xml +28 -0
- data/test/testpkg/tpkg-default-perms.yml +20 -0
- data/test/testpkg/tpkg-good-ownergroup.xml +25 -0
- data/test/testpkg/tpkg-good-ownergroup.yml +18 -0
- data/test/testpkg/tpkg-nativedeps.yml +13 -0
- data/test/testpkg/tpkg-nofiles.xml +14 -0
- data/test/testpkg/tpkg-nofiles.yml +9 -0
- data/test/testpkg/tpkg.xml +35 -0
- data/test/testpkg/tpkg.yml +25 -0
- data/test/tpkgtest.rb +300 -0
- data/tpkg.conf +16 -0
- data/tpkg.gemspec +24 -0
- data/tpkg.spec +28 -0
- data/tpkg.xml +17 -0
- data/tpkg_profile.sh +32 -0
- metadata +306 -31
@@ -0,0 +1,33 @@
|
|
1
|
+
module Net; module SSH; module Connection
|
2
|
+
|
3
|
+
# Definitions of constants that are specific to the connection layer of the
|
4
|
+
# SSH protocol.
|
5
|
+
module Constants
|
6
|
+
|
7
|
+
#--
|
8
|
+
# Connection protocol generic messages
|
9
|
+
#++
|
10
|
+
|
11
|
+
GLOBAL_REQUEST = 80
|
12
|
+
REQUEST_SUCCESS = 81
|
13
|
+
REQUEST_FAILURE = 82
|
14
|
+
|
15
|
+
#--
|
16
|
+
# Channel related messages
|
17
|
+
#++
|
18
|
+
|
19
|
+
CHANNEL_OPEN = 90
|
20
|
+
CHANNEL_OPEN_CONFIRMATION = 91
|
21
|
+
CHANNEL_OPEN_FAILURE = 92
|
22
|
+
CHANNEL_WINDOW_ADJUST = 93
|
23
|
+
CHANNEL_DATA = 94
|
24
|
+
CHANNEL_EXTENDED_DATA = 95
|
25
|
+
CHANNEL_EOF = 96
|
26
|
+
CHANNEL_CLOSE = 97
|
27
|
+
CHANNEL_REQUEST = 98
|
28
|
+
CHANNEL_SUCCESS = 99
|
29
|
+
CHANNEL_FAILURE = 100
|
30
|
+
|
31
|
+
end
|
32
|
+
|
33
|
+
end; end end
|
@@ -0,0 +1,597 @@
|
|
1
|
+
require 'net/ssh/loggable'
|
2
|
+
require 'net/ssh/ruby_compat'
|
3
|
+
require 'net/ssh/connection/channel'
|
4
|
+
require 'net/ssh/connection/constants'
|
5
|
+
require 'net/ssh/service/forward'
|
6
|
+
|
7
|
+
module Net; module SSH; module Connection
|
8
|
+
|
9
|
+
# A session class representing the connection service running on top of
|
10
|
+
# the SSH transport layer. It manages the creation of channels (see
|
11
|
+
# #open_channel), and the dispatching of messages to the various channels.
|
12
|
+
# It also encapsulates the SSH event loop (via #loop and #process),
|
13
|
+
# and serves as a central point-of-reference for all SSH-related services (e.g.
|
14
|
+
# port forwarding, SFTP, SCP, etc.).
|
15
|
+
#
|
16
|
+
# You will rarely (if ever) need to instantiate this class directly; rather,
|
17
|
+
# you'll almost always use Net::SSH.start to initialize a new network
|
18
|
+
# connection, authenticate a user, and return a new connection session,
|
19
|
+
# all in one call.
|
20
|
+
#
|
21
|
+
# Net::SSH.start("localhost", "user") do |ssh|
|
22
|
+
# # 'ssh' is an instance of Net::SSH::Connection::Session
|
23
|
+
# ssh.exec! "/etc/init.d/some_process start"
|
24
|
+
# end
|
25
|
+
class Session
|
26
|
+
include Constants, Loggable
|
27
|
+
|
28
|
+
# The underlying transport layer abstraction (see Net::SSH::Transport::Session).
|
29
|
+
attr_reader :transport
|
30
|
+
|
31
|
+
# The map of options that were used to initialize this instance.
|
32
|
+
attr_reader :options
|
33
|
+
|
34
|
+
# The collection of custom properties for this instance. (See #[] and #[]=).
|
35
|
+
attr_reader :properties
|
36
|
+
|
37
|
+
# The map of channels, each key being the local-id for the channel.
|
38
|
+
attr_reader :channels #:nodoc:
|
39
|
+
|
40
|
+
# The map of listeners that the event loop knows about. See #listen_to.
|
41
|
+
attr_reader :listeners #:nodoc:
|
42
|
+
|
43
|
+
# The map of specialized handlers for opening specific channel types. See
|
44
|
+
# #on_open_channel.
|
45
|
+
attr_reader :channel_open_handlers #:nodoc:
|
46
|
+
|
47
|
+
# The list of callbacks for pending requests. See #send_global_request.
|
48
|
+
attr_reader :pending_requests #:nodoc:
|
49
|
+
|
50
|
+
class NilChannel
|
51
|
+
def initialize(session)
|
52
|
+
@session = session
|
53
|
+
end
|
54
|
+
|
55
|
+
def method_missing(sym, *args)
|
56
|
+
@session.lwarn { "ignoring request #{sym.inspect} for non-existent (closed?) channel; probably ssh server bug" }
|
57
|
+
end
|
58
|
+
end
|
59
|
+
|
60
|
+
# Create a new connection service instance atop the given transport
|
61
|
+
# layer. Initializes the listeners to be only the underlying socket object.
|
62
|
+
def initialize(transport, options={})
|
63
|
+
self.logger = transport.logger
|
64
|
+
|
65
|
+
@transport = transport
|
66
|
+
@options = options
|
67
|
+
|
68
|
+
@channel_id_counter = -1
|
69
|
+
@channels = Hash.new(NilChannel.new(self))
|
70
|
+
@listeners = { transport.socket => nil }
|
71
|
+
@pending_requests = []
|
72
|
+
@channel_open_handlers = {}
|
73
|
+
@on_global_request = {}
|
74
|
+
@properties = (options[:properties] || {}).dup
|
75
|
+
end
|
76
|
+
|
77
|
+
# Retrieves a custom property from this instance. This can be used to
|
78
|
+
# store additional state in applications that must manage multiple
|
79
|
+
# SSH connections.
|
80
|
+
def [](key)
|
81
|
+
@properties[key]
|
82
|
+
end
|
83
|
+
|
84
|
+
# Sets a custom property for this instance.
|
85
|
+
def []=(key, value)
|
86
|
+
@properties[key] = value
|
87
|
+
end
|
88
|
+
|
89
|
+
# Returns the name of the host that was given to the transport layer to
|
90
|
+
# connect to.
|
91
|
+
def host
|
92
|
+
transport.host
|
93
|
+
end
|
94
|
+
|
95
|
+
# Returns true if the underlying transport has been closed. Note that
|
96
|
+
# this can be a little misleading, since if the remote server has
|
97
|
+
# closed the connection, the local end will still think it is open
|
98
|
+
# until the next operation on the socket. Nevertheless, this method can
|
99
|
+
# be useful if you just want to know if _you_ have closed the connection.
|
100
|
+
def closed?
|
101
|
+
transport.closed?
|
102
|
+
end
|
103
|
+
|
104
|
+
# Closes the session gracefully, blocking until all channels have
|
105
|
+
# successfully closed, and then closes the underlying transport layer
|
106
|
+
# connection.
|
107
|
+
def close
|
108
|
+
info { "closing remaining channels (#{channels.length} open)" }
|
109
|
+
channels.each { |id, channel| channel.close }
|
110
|
+
loop { channels.any? }
|
111
|
+
transport.close
|
112
|
+
end
|
113
|
+
|
114
|
+
# Performs a "hard" shutdown of the connection. In general, this should
|
115
|
+
# never be done, but it might be necessary (in a rescue clause, for instance,
|
116
|
+
# when the connection needs to close but you don't know the status of the
|
117
|
+
# underlying protocol's state).
|
118
|
+
def shutdown!
|
119
|
+
transport.shutdown!
|
120
|
+
end
|
121
|
+
|
122
|
+
# preserve a reference to Kernel#loop
|
123
|
+
alias :loop_forever :loop
|
124
|
+
|
125
|
+
# Returns +true+ if there are any channels currently active on this
|
126
|
+
# session. By default, this will not include "invisible" channels
|
127
|
+
# (such as those created by forwarding ports and such), but if you pass
|
128
|
+
# a +true+ value for +include_invisible+, then those will be counted.
|
129
|
+
#
|
130
|
+
# This can be useful for determining whether the event loop should continue
|
131
|
+
# to be run.
|
132
|
+
#
|
133
|
+
# ssh.loop { ssh.busy? }
|
134
|
+
def busy?(include_invisible=false)
|
135
|
+
if include_invisible
|
136
|
+
channels.any?
|
137
|
+
else
|
138
|
+
channels.any? { |id, ch| !ch[:invisible] }
|
139
|
+
end
|
140
|
+
end
|
141
|
+
|
142
|
+
# The main event loop. Calls #process until #process returns false. If a
|
143
|
+
# block is given, it is passed to #process, otherwise a default proc is
|
144
|
+
# used that just returns true if there are any channels active (see #busy?).
|
145
|
+
# The # +wait+ parameter is also passed through to #process (where it is
|
146
|
+
# interpreted as the maximum number of seconds to wait for IO.select to return).
|
147
|
+
#
|
148
|
+
# # loop for as long as there are any channels active
|
149
|
+
# ssh.loop
|
150
|
+
#
|
151
|
+
# # loop for as long as there are any channels active, but make sure
|
152
|
+
# # the event loop runs at least once per 0.1 second
|
153
|
+
# ssh.loop(0.1)
|
154
|
+
#
|
155
|
+
# # loop until ctrl-C is pressed
|
156
|
+
# int_pressed = false
|
157
|
+
# trap("INT") { int_pressed = true }
|
158
|
+
# ssh.loop(0.1) { not int_pressed }
|
159
|
+
def loop(wait=nil, &block)
|
160
|
+
running = block || Proc.new { busy? }
|
161
|
+
loop_forever { break unless process(wait, &running) }
|
162
|
+
end
|
163
|
+
|
164
|
+
# The core of the event loop. It processes a single iteration of the event
|
165
|
+
# loop. If a block is given, it should return false when the processing
|
166
|
+
# should abort, which causes #process to return false. Otherwise,
|
167
|
+
# #process returns true. The session itself is yielded to the block as its
|
168
|
+
# only argument.
|
169
|
+
#
|
170
|
+
# If +wait+ is nil (the default), this method will block until any of the
|
171
|
+
# monitored IO objects are ready to be read from or written to. If you want
|
172
|
+
# it to not block, you can pass 0, or you can pass any other numeric value
|
173
|
+
# to indicate that it should block for no more than that many seconds.
|
174
|
+
# Passing 0 is a good way to poll the connection, but if you do it too
|
175
|
+
# frequently it can make your CPU quite busy!
|
176
|
+
#
|
177
|
+
# This will also cause all active channels to be processed once each (see
|
178
|
+
# Net::SSH::Connection::Channel#on_process).
|
179
|
+
#
|
180
|
+
# # process multiple Net::SSH connections in parallel
|
181
|
+
# connections = [
|
182
|
+
# Net::SSH.start("host1", ...),
|
183
|
+
# Net::SSH.start("host2", ...)
|
184
|
+
# ]
|
185
|
+
#
|
186
|
+
# connections.each do |ssh|
|
187
|
+
# ssh.exec "grep something /in/some/files"
|
188
|
+
# end
|
189
|
+
#
|
190
|
+
# condition = Proc.new { |s| s.busy? }
|
191
|
+
#
|
192
|
+
# loop do
|
193
|
+
# connections.delete_if { |ssh| !ssh.process(0.1, &condition) }
|
194
|
+
# break if connections.empty?
|
195
|
+
# end
|
196
|
+
def process(wait=nil, &block)
|
197
|
+
return false unless preprocess(&block)
|
198
|
+
|
199
|
+
r = listeners.keys
|
200
|
+
w = r.select { |w2| w2.respond_to?(:pending_write?) && w2.pending_write? }
|
201
|
+
readers, writers, = Net::SSH::Compat.io_select(r, w, nil, wait)
|
202
|
+
|
203
|
+
postprocess(readers, writers)
|
204
|
+
end
|
205
|
+
|
206
|
+
# This is called internally as part of #process. It dispatches any
|
207
|
+
# available incoming packets, and then runs Net::SSH::Connection::Channel#process
|
208
|
+
# for any active channels. If a block is given, it is invoked at the
|
209
|
+
# start of the method and again at the end, and if the block ever returns
|
210
|
+
# false, this method returns false. Otherwise, it returns true.
|
211
|
+
def preprocess
|
212
|
+
return false if block_given? && !yield(self)
|
213
|
+
dispatch_incoming_packets
|
214
|
+
channels.each { |id, channel| channel.process unless channel.closing? }
|
215
|
+
return false if block_given? && !yield(self)
|
216
|
+
return true
|
217
|
+
end
|
218
|
+
|
219
|
+
# This is called internally as part of #process. It loops over the given
|
220
|
+
# arrays of reader IO's and writer IO's, processing them as needed, and
|
221
|
+
# then calls Net::SSH::Transport::Session#rekey_as_needed to allow the
|
222
|
+
# transport layer to rekey. Then returns true.
|
223
|
+
def postprocess(readers, writers)
|
224
|
+
Array(readers).each do |reader|
|
225
|
+
if listeners[reader]
|
226
|
+
listeners[reader].call(reader)
|
227
|
+
else
|
228
|
+
if reader.fill.zero?
|
229
|
+
reader.close
|
230
|
+
stop_listening_to(reader)
|
231
|
+
end
|
232
|
+
end
|
233
|
+
end
|
234
|
+
|
235
|
+
Array(writers).each do |writer|
|
236
|
+
writer.send_pending
|
237
|
+
end
|
238
|
+
|
239
|
+
transport.rekey_as_needed
|
240
|
+
|
241
|
+
return true
|
242
|
+
end
|
243
|
+
|
244
|
+
# Send a global request of the given type. The +extra+ parameters must
|
245
|
+
# be even in number, and conform to the same format as described for
|
246
|
+
# Net::SSH::Buffer.from. If a callback is not specified, the request will
|
247
|
+
# not require a response from the server, otherwise the server is required
|
248
|
+
# to respond and indicate whether the request was successful or not. This
|
249
|
+
# success or failure is indicated by the callback being invoked, with the
|
250
|
+
# first parameter being true or false (success, or failure), and the second
|
251
|
+
# being the packet itself.
|
252
|
+
#
|
253
|
+
# Generally, Net::SSH will manage global requests that need to be sent
|
254
|
+
# (e.g. port forward requests and such are handled in the Net::SSH::Service::Forward
|
255
|
+
# class, for instance). However, there may be times when you need to
|
256
|
+
# send a global request that isn't explicitly handled by Net::SSH, and so
|
257
|
+
# this method is available to you.
|
258
|
+
#
|
259
|
+
# ssh.send_global_request("keep-alive@openssh.com")
|
260
|
+
def send_global_request(type, *extra, &callback)
|
261
|
+
info { "sending global request #{type}" }
|
262
|
+
msg = Buffer.from(:byte, GLOBAL_REQUEST, :string, type.to_s, :bool, !callback.nil?, *extra)
|
263
|
+
send_message(msg)
|
264
|
+
pending_requests << callback if callback
|
265
|
+
self
|
266
|
+
end
|
267
|
+
|
268
|
+
# Requests that a new channel be opened. By default, the channel will be
|
269
|
+
# of type "session", but if you know what you're doing you can select any
|
270
|
+
# of the channel types supported by the SSH protocol. The +extra+ parameters
|
271
|
+
# must be even in number and conform to the same format as described for
|
272
|
+
# Net::SSH::Buffer.from. If a callback is given, it will be invoked when
|
273
|
+
# the server confirms that the channel opened successfully. The sole parameter
|
274
|
+
# for the callback is the channel object itself.
|
275
|
+
#
|
276
|
+
# In general, you'll use #open_channel without any arguments; the only
|
277
|
+
# time you'd want to set the channel type or pass additional initialization
|
278
|
+
# data is if you were implementing an SSH extension.
|
279
|
+
#
|
280
|
+
# channel = ssh.open_channel do |ch|
|
281
|
+
# ch.exec "grep something /some/files" do |ch, success|
|
282
|
+
# ...
|
283
|
+
# end
|
284
|
+
# end
|
285
|
+
#
|
286
|
+
# channel.wait
|
287
|
+
def open_channel(type="session", *extra, &on_confirm)
|
288
|
+
local_id = get_next_channel_id
|
289
|
+
channel = Channel.new(self, type, local_id, &on_confirm)
|
290
|
+
|
291
|
+
msg = Buffer.from(:byte, CHANNEL_OPEN, :string, type, :long, local_id,
|
292
|
+
:long, channel.local_maximum_window_size,
|
293
|
+
:long, channel.local_maximum_packet_size, *extra)
|
294
|
+
send_message(msg)
|
295
|
+
|
296
|
+
channels[local_id] = channel
|
297
|
+
end
|
298
|
+
|
299
|
+
# A convenience method for executing a command and interacting with it. If
|
300
|
+
# no block is given, all output is printed via $stdout and $stderr. Otherwise,
|
301
|
+
# the block is called for each data and extended data packet, with three
|
302
|
+
# arguments: the channel object, a symbol indicating the data type
|
303
|
+
# (:stdout or :stderr), and the data (as a string).
|
304
|
+
#
|
305
|
+
# Note that this method returns immediately, and requires an event loop
|
306
|
+
# (see Session#loop) in order for the command to actually execute.
|
307
|
+
#
|
308
|
+
# This is effectively identical to calling #open_channel, and then
|
309
|
+
# Net::SSH::Connection::Channel#exec, and then setting up the channel
|
310
|
+
# callbacks. However, for most uses, this will be sufficient.
|
311
|
+
#
|
312
|
+
# ssh.exec "grep something /some/files" do |ch, stream, data|
|
313
|
+
# if stream == :stderr
|
314
|
+
# puts "ERROR: #{data}"
|
315
|
+
# else
|
316
|
+
# puts data
|
317
|
+
# end
|
318
|
+
# end
|
319
|
+
def exec(command, &block)
|
320
|
+
open_channel do |channel|
|
321
|
+
channel.exec(command) do |ch, success|
|
322
|
+
raise "could not execute command: #{command.inspect}" unless success
|
323
|
+
|
324
|
+
channel.on_data do |ch2, data|
|
325
|
+
if block
|
326
|
+
block.call(ch2, :stdout, data)
|
327
|
+
else
|
328
|
+
$stdout.print(data)
|
329
|
+
end
|
330
|
+
end
|
331
|
+
|
332
|
+
channel.on_extended_data do |ch2, type, data|
|
333
|
+
if block
|
334
|
+
block.call(ch2, :stderr, data)
|
335
|
+
else
|
336
|
+
$stderr.print(data)
|
337
|
+
end
|
338
|
+
end
|
339
|
+
end
|
340
|
+
end
|
341
|
+
end
|
342
|
+
|
343
|
+
# Same as #exec, except this will block until the command finishes. Also,
|
344
|
+
# if a block is not given, this will return all output (stdout and stderr)
|
345
|
+
# as a single string.
|
346
|
+
#
|
347
|
+
# matches = ssh.exec!("grep something /some/files")
|
348
|
+
def exec!(command, &block)
|
349
|
+
block ||= Proc.new do |ch, type, data|
|
350
|
+
ch[:result] ||= ""
|
351
|
+
ch[:result] << data
|
352
|
+
end
|
353
|
+
|
354
|
+
channel = exec(command, &block)
|
355
|
+
channel.wait
|
356
|
+
|
357
|
+
return channel[:result]
|
358
|
+
end
|
359
|
+
|
360
|
+
# Enqueues a message to be sent to the server as soon as the socket is
|
361
|
+
# available for writing. Most programs will never need to call this, but
|
362
|
+
# if you are implementing an extension to the SSH protocol, or if you
|
363
|
+
# need to send a packet that Net::SSH does not directly support, you can
|
364
|
+
# use this to send it.
|
365
|
+
#
|
366
|
+
# ssh.send_message(Buffer.from(:byte, REQUEST_SUCCESS).to_s)
|
367
|
+
def send_message(message)
|
368
|
+
transport.enqueue_message(message)
|
369
|
+
end
|
370
|
+
|
371
|
+
# Adds an IO object for the event loop to listen to. If a callback
|
372
|
+
# is given, it will be invoked when the io is ready to be read, otherwise,
|
373
|
+
# the io will merely have its #fill method invoked.
|
374
|
+
#
|
375
|
+
# Any +io+ value passed to this method _must_ have mixed into it the
|
376
|
+
# Net::SSH::BufferedIo functionality, typically by calling #extend on the
|
377
|
+
# object.
|
378
|
+
#
|
379
|
+
# The following example executes a process on the remote server, opens
|
380
|
+
# a socket to somewhere, and then pipes data from that socket to the
|
381
|
+
# remote process' stdin stream:
|
382
|
+
#
|
383
|
+
# channel = ssh.open_channel do |ch|
|
384
|
+
# ch.exec "/some/process/that/wants/input" do |ch, success|
|
385
|
+
# abort "can't execute!" unless success
|
386
|
+
#
|
387
|
+
# io = TCPSocket.new(somewhere, port)
|
388
|
+
# io.extend(Net::SSH::BufferedIo)
|
389
|
+
# ssh.listen_to(io)
|
390
|
+
#
|
391
|
+
# ch.on_process do
|
392
|
+
# if io.available > 0
|
393
|
+
# ch.send_data(io.read_available)
|
394
|
+
# end
|
395
|
+
# end
|
396
|
+
#
|
397
|
+
# ch.on_close do
|
398
|
+
# ssh.stop_listening_to(io)
|
399
|
+
# io.close
|
400
|
+
# end
|
401
|
+
# end
|
402
|
+
# end
|
403
|
+
#
|
404
|
+
# channel.wait
|
405
|
+
def listen_to(io, &callback)
|
406
|
+
listeners[io] = callback
|
407
|
+
end
|
408
|
+
|
409
|
+
# Removes the given io object from the listeners collection, so that the
|
410
|
+
# event loop will no longer monitor it.
|
411
|
+
def stop_listening_to(io)
|
412
|
+
listeners.delete(io)
|
413
|
+
end
|
414
|
+
|
415
|
+
# Returns a reference to the Net::SSH::Service::Forward service, which can
|
416
|
+
# be used for forwarding ports over SSH.
|
417
|
+
def forward
|
418
|
+
@forward ||= Service::Forward.new(self)
|
419
|
+
end
|
420
|
+
|
421
|
+
# Registers a handler to be invoked when the server wants to open a
|
422
|
+
# channel on the client. The callback receives the connection object,
|
423
|
+
# the new channel object, and the packet itself as arguments, and should
|
424
|
+
# raise ChannelOpenFailed if it is unable to open the channel for some
|
425
|
+
# reason. Otherwise, the channel will be opened and a confirmation message
|
426
|
+
# sent to the server.
|
427
|
+
#
|
428
|
+
# This is used by the Net::SSH::Service::Forward service to open a channel
|
429
|
+
# when a remote forwarded port receives a connection. However, you are
|
430
|
+
# welcome to register handlers for other channel types, as needed.
|
431
|
+
def on_open_channel(type, &block)
|
432
|
+
channel_open_handlers[type] = block
|
433
|
+
end
|
434
|
+
|
435
|
+
# Registers a handler to be invoked when the server sends a global request
|
436
|
+
# of the given type. The callback receives the request data as the first
|
437
|
+
# parameter, and true/false as the second (indicating whether a response
|
438
|
+
# is required). If the callback sends the response, it should return
|
439
|
+
# :sent. Otherwise, if it returns true, REQUEST_SUCCESS will be sent, and
|
440
|
+
# if it returns false, REQUEST_FAILURE will be sent.
|
441
|
+
def on_global_request(type, &block)
|
442
|
+
old, @on_global_request[type] = @on_global_request[type], block
|
443
|
+
old
|
444
|
+
end
|
445
|
+
|
446
|
+
private
|
447
|
+
|
448
|
+
# Read all pending packets from the connection and dispatch them as
|
449
|
+
# appropriate. Returns as soon as there are no more pending packets.
|
450
|
+
def dispatch_incoming_packets
|
451
|
+
while packet = transport.poll_message
|
452
|
+
unless MAP.key?(packet.type)
|
453
|
+
raise Net::SSH::Exception, "unexpected response #{packet.type} (#{packet.inspect})"
|
454
|
+
end
|
455
|
+
|
456
|
+
send(MAP[packet.type], packet)
|
457
|
+
end
|
458
|
+
end
|
459
|
+
|
460
|
+
# Returns the next available channel id to be assigned, and increments
|
461
|
+
# the counter.
|
462
|
+
def get_next_channel_id
|
463
|
+
@channel_id_counter += 1
|
464
|
+
end
|
465
|
+
|
466
|
+
# Invoked when a global request is received. The registered global
|
467
|
+
# request callback will be invoked, if one exists, and the necessary
|
468
|
+
# reply returned.
|
469
|
+
def global_request(packet)
|
470
|
+
info { "global request received: #{packet[:request_type]} #{packet[:want_reply]}" }
|
471
|
+
callback = @on_global_request[packet[:request_type]]
|
472
|
+
result = callback ? callback.call(packet[:request_data], packet[:want_reply]) : false
|
473
|
+
|
474
|
+
if result != :sent && result != true && result != false
|
475
|
+
raise "expected global request handler for `#{packet[:request_type]}' to return true, false, or :sent, but got #{result.inspect}"
|
476
|
+
end
|
477
|
+
|
478
|
+
if packet[:want_reply] && result != :sent
|
479
|
+
msg = Buffer.from(:byte, result ? REQUEST_SUCCESS : REQUEST_FAILURE)
|
480
|
+
send_message(msg)
|
481
|
+
end
|
482
|
+
end
|
483
|
+
|
484
|
+
# Invokes the next pending request callback with +true+.
|
485
|
+
def request_success(packet)
|
486
|
+
info { "global request success" }
|
487
|
+
callback = pending_requests.shift
|
488
|
+
callback.call(true, packet) if callback
|
489
|
+
end
|
490
|
+
|
491
|
+
# Invokes the next pending request callback with +false+.
|
492
|
+
def request_failure(packet)
|
493
|
+
info { "global request failure" }
|
494
|
+
callback = pending_requests.shift
|
495
|
+
callback.call(false, packet) if callback
|
496
|
+
end
|
497
|
+
|
498
|
+
# Called when the server wants to open a channel. If no registered
|
499
|
+
# channel handler exists for the given channel type, CHANNEL_OPEN_FAILURE
|
500
|
+
# is returned, otherwise the callback is invoked and everything proceeds
|
501
|
+
# accordingly.
|
502
|
+
def channel_open(packet)
|
503
|
+
info { "channel open #{packet[:channel_type]}" }
|
504
|
+
|
505
|
+
local_id = get_next_channel_id
|
506
|
+
channel = Channel.new(self, packet[:channel_type], local_id)
|
507
|
+
channel.do_open_confirmation(packet[:remote_id], packet[:window_size], packet[:packet_size])
|
508
|
+
|
509
|
+
callback = channel_open_handlers[packet[:channel_type]]
|
510
|
+
|
511
|
+
if callback
|
512
|
+
begin
|
513
|
+
callback[self, channel, packet]
|
514
|
+
rescue ChannelOpenFailed => err
|
515
|
+
failure = [err.code, err.reason]
|
516
|
+
else
|
517
|
+
channels[local_id] = channel
|
518
|
+
msg = Buffer.from(:byte, CHANNEL_OPEN_CONFIRMATION, :long, channel.remote_id, :long, channel.local_id, :long, channel.local_maximum_window_size, :long, channel.local_maximum_packet_size)
|
519
|
+
end
|
520
|
+
else
|
521
|
+
failure = [3, "unknown channel type #{channel.type}"]
|
522
|
+
end
|
523
|
+
|
524
|
+
if failure
|
525
|
+
error { failure.inspect }
|
526
|
+
msg = Buffer.from(:byte, CHANNEL_OPEN_FAILURE, :long, channel.remote_id, :long, failure[0], :string, failure[1], :string, "")
|
527
|
+
end
|
528
|
+
|
529
|
+
send_message(msg)
|
530
|
+
end
|
531
|
+
|
532
|
+
def channel_open_confirmation(packet)
|
533
|
+
info { "channel_open_confirmation: #{packet[:local_id]} #{packet[:remote_id]} #{packet[:window_size]} #{packet[:packet_size]}" }
|
534
|
+
channel = channels[packet[:local_id]]
|
535
|
+
channel.do_open_confirmation(packet[:remote_id], packet[:window_size], packet[:packet_size])
|
536
|
+
end
|
537
|
+
|
538
|
+
def channel_open_failure(packet)
|
539
|
+
error { "channel_open_failed: #{packet[:local_id]} #{packet[:reason_code]} #{packet[:description]}" }
|
540
|
+
channel = channels.delete(packet[:local_id])
|
541
|
+
channel.do_open_failed(packet[:reason_code], packet[:description])
|
542
|
+
end
|
543
|
+
|
544
|
+
def channel_window_adjust(packet)
|
545
|
+
info { "channel_window_adjust: #{packet[:local_id]} +#{packet[:extra_bytes]}" }
|
546
|
+
channels[packet[:local_id]].do_window_adjust(packet[:extra_bytes])
|
547
|
+
end
|
548
|
+
|
549
|
+
def channel_request(packet)
|
550
|
+
info { "channel_request: #{packet[:local_id]} #{packet[:request]} #{packet[:want_reply]}" }
|
551
|
+
channels[packet[:local_id]].do_request(packet[:request], packet[:want_reply], packet[:request_data])
|
552
|
+
end
|
553
|
+
|
554
|
+
def channel_data(packet)
|
555
|
+
info { "channel_data: #{packet[:local_id]} #{packet[:data].length}b" }
|
556
|
+
channels[packet[:local_id]].do_data(packet[:data])
|
557
|
+
end
|
558
|
+
|
559
|
+
def channel_extended_data(packet)
|
560
|
+
info { "channel_extended_data: #{packet[:local_id]} #{packet[:data_type]} #{packet[:data].length}b" }
|
561
|
+
channels[packet[:local_id]].do_extended_data(packet[:data_type], packet[:data])
|
562
|
+
end
|
563
|
+
|
564
|
+
def channel_eof(packet)
|
565
|
+
info { "channel_eof: #{packet[:local_id]}" }
|
566
|
+
channels[packet[:local_id]].do_eof
|
567
|
+
end
|
568
|
+
|
569
|
+
def channel_close(packet)
|
570
|
+
info { "channel_close: #{packet[:local_id]}" }
|
571
|
+
|
572
|
+
channel = channels[packet[:local_id]]
|
573
|
+
channel.close
|
574
|
+
|
575
|
+
channels.delete(packet[:local_id])
|
576
|
+
channel.do_close
|
577
|
+
end
|
578
|
+
|
579
|
+
def channel_success(packet)
|
580
|
+
info { "channel_success: #{packet[:local_id]}" }
|
581
|
+
channels[packet[:local_id]].do_success
|
582
|
+
end
|
583
|
+
|
584
|
+
def channel_failure(packet)
|
585
|
+
info { "channel_failure: #{packet[:local_id]}" }
|
586
|
+
channels[packet[:local_id]].do_failure
|
587
|
+
end
|
588
|
+
|
589
|
+
MAP = Constants.constants.inject({}) do |memo, name|
|
590
|
+
value = const_get(name)
|
591
|
+
next unless Integer === value
|
592
|
+
memo[value] = name.downcase.to_sym
|
593
|
+
memo
|
594
|
+
end
|
595
|
+
end
|
596
|
+
|
597
|
+
end; end; end
|