2012-04-19 04:53:19 +00:00
|
|
|
require "pathname"
|
|
|
|
require "tempfile"
|
2012-01-07 01:36:51 +00:00
|
|
|
|
2013-07-12 13:40:41 +00:00
|
|
|
require "vagrant/util/downloader"
|
|
|
|
|
2012-04-19 04:53:19 +00:00
|
|
|
module VagrantPlugins
|
|
|
|
module Shell
|
2012-11-07 05:21:36 +00:00
|
|
|
class Provisioner < Vagrant.plugin("2", :provisioner)
|
2013-01-13 23:48:52 +00:00
|
|
|
def provision
|
2014-04-12 04:27:54 +00:00
|
|
|
if @config.vm.communicator == :winrm
|
|
|
|
provision_winrm
|
|
|
|
else
|
|
|
|
provision_ssh
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
protected
|
|
|
|
|
|
|
|
# This is the provision method called if SSH is what is running
|
|
|
|
# on the remote end, which assumes a POSIX-style host.
|
|
|
|
def provision_ssh
|
2013-11-25 21:36:51 +00:00
|
|
|
args = ""
|
2014-02-14 20:43:27 +00:00
|
|
|
if config.args.is_a?(String)
|
2014-02-14 19:47:36 +00:00
|
|
|
args = " #{config.args.to_s}"
|
2013-12-06 19:28:32 +00:00
|
|
|
elsif config.args.is_a?(Array)
|
2014-02-14 20:43:27 +00:00
|
|
|
args = config.args.map { |a| quote_and_escape(a) }
|
2013-11-25 21:36:51 +00:00
|
|
|
args = " #{args.join(" ")}"
|
2013-07-19 01:35:37 +00:00
|
|
|
end
|
2013-11-25 21:36:51 +00:00
|
|
|
|
2013-01-13 23:48:52 +00:00
|
|
|
command = "chmod +x #{config.upload_path} && #{config.upload_path}#{args}"
|
2011-01-23 19:52:24 +00:00
|
|
|
|
2013-01-13 23:48:52 +00:00
|
|
|
with_script_file do |path|
|
|
|
|
# Upload the script to the machine
|
|
|
|
@machine.communicate.tap do |comm|
|
2013-04-11 12:05:50 +00:00
|
|
|
# Reset upload path permissions for the current ssh user
|
|
|
|
user = @machine.ssh_info[:username]
|
|
|
|
comm.sudo("chown -R #{user} #{config.upload_path}",
|
|
|
|
:error_check => false)
|
|
|
|
|
2013-01-13 23:48:52 +00:00
|
|
|
comm.upload(path.to_s, config.upload_path)
|
2011-01-23 19:52:24 +00:00
|
|
|
|
2013-04-10 18:27:45 +00:00
|
|
|
if config.path
|
2014-03-08 22:43:35 +00:00
|
|
|
@machine.ui.detail(I18n.t("vagrant.provisioners.shell.running",
|
2013-04-10 18:27:45 +00:00
|
|
|
script: path.to_s))
|
|
|
|
else
|
2014-03-08 22:43:35 +00:00
|
|
|
@machine.ui.detail(I18n.t("vagrant.provisioners.shell.running",
|
2013-04-10 18:27:45 +00:00
|
|
|
script: "inline script"))
|
|
|
|
end
|
|
|
|
|
2013-01-13 23:48:52 +00:00
|
|
|
# Execute it with sudo
|
2013-08-29 05:29:49 +00:00
|
|
|
comm.execute(command, sudo: config.privileged) do |type, data|
|
2013-01-13 23:48:52 +00:00
|
|
|
if [:stderr, :stdout].include?(type)
|
|
|
|
# Output the data with the proper color based on the stream.
|
|
|
|
color = type == :stdout ? :green : :red
|
2011-07-06 06:09:36 +00:00
|
|
|
|
2013-11-24 00:05:44 +00:00
|
|
|
options = {
|
|
|
|
new_line: false,
|
|
|
|
prefix: false,
|
|
|
|
}
|
|
|
|
options[:color] = color if !config.keep_color
|
|
|
|
|
|
|
|
@machine.env.ui.info(data, options)
|
2013-01-13 23:48:52 +00:00
|
|
|
end
|
2011-12-15 03:02:10 +00:00
|
|
|
end
|
2011-01-23 19:52:24 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-04-12 04:27:54 +00:00
|
|
|
# This provisions using WinRM, which assumes a PowerShell
|
|
|
|
# console on the other side.
|
|
|
|
def provision_winrm
|
|
|
|
# TODO
|
|
|
|
end
|
2011-12-15 06:43:45 +00:00
|
|
|
|
2013-11-25 21:36:51 +00:00
|
|
|
# Quote and escape strings for shell execution, thanks to Capistrano.
|
2013-07-19 01:35:37 +00:00
|
|
|
def quote_and_escape(text, quote = '"')
|
|
|
|
"#{quote}#{text.gsub(/#{quote}/) { |m| "#{m}\\#{m}#{m}" }}#{quote}"
|
|
|
|
end
|
|
|
|
|
2011-07-06 06:09:36 +00:00
|
|
|
# This method yields the path to a script to upload and execute
|
|
|
|
# on the remote server. This method will properly clean up the
|
|
|
|
# script file if needed.
|
|
|
|
def with_script_file
|
2013-04-23 06:32:13 +00:00
|
|
|
script = nil
|
|
|
|
|
2013-07-12 13:40:41 +00:00
|
|
|
if config.remote?
|
2014-04-12 04:27:54 +00:00
|
|
|
download_path = @machine.env.tmp_path.join(
|
|
|
|
"#{@machine.id}-remote-script")
|
2013-07-12 13:40:41 +00:00
|
|
|
download_path.delete if download_path.file?
|
|
|
|
|
|
|
|
Vagrant::Util::Downloader.new(config.path, download_path).download!
|
|
|
|
script = download_path.read
|
|
|
|
|
|
|
|
download_path.delete
|
|
|
|
elsif config.path
|
2011-07-06 06:09:36 +00:00
|
|
|
# Just yield the path to that file...
|
2013-01-13 23:48:52 +00:00
|
|
|
root_path = @machine.env.root_path
|
2013-04-23 06:32:13 +00:00
|
|
|
script = Pathname.new(config.path).expand_path(root_path).read
|
|
|
|
else
|
|
|
|
# The script is just the inline code...
|
|
|
|
script = config.inline
|
2011-07-06 06:09:36 +00:00
|
|
|
end
|
|
|
|
|
2013-09-19 11:33:58 +00:00
|
|
|
# Replace Windows line endings with Unix ones unless binary file
|
2013-09-21 00:24:59 +00:00
|
|
|
script.gsub!(/\r\n?$/, "\n") if !config.binary
|
2013-04-23 06:32:13 +00:00
|
|
|
|
2011-07-06 06:09:36 +00:00
|
|
|
# Otherwise we have an inline script, we need to Tempfile it,
|
|
|
|
# and handle it specially...
|
|
|
|
file = Tempfile.new('vagrant-shell')
|
2012-10-13 02:51:25 +00:00
|
|
|
|
2012-10-12 00:14:59 +00:00
|
|
|
# Unless you set binmode, on a Windows host the shell script will
|
|
|
|
# have CRLF line endings instead of LF line endings, causing havoc
|
|
|
|
# when the guest executes it. This fixes [GH-1181].
|
|
|
|
file.binmode
|
2012-10-13 02:51:25 +00:00
|
|
|
|
2011-07-06 06:09:36 +00:00
|
|
|
begin
|
2013-04-23 06:32:13 +00:00
|
|
|
file.write(script)
|
2011-07-06 06:09:36 +00:00
|
|
|
file.fsync
|
2013-02-07 23:23:18 +00:00
|
|
|
file.close
|
2011-07-06 06:09:36 +00:00
|
|
|
yield file.path
|
|
|
|
ensure
|
|
|
|
file.close
|
|
|
|
file.unlink
|
|
|
|
end
|
|
|
|
end
|
2011-01-23 19:52:24 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|