vagrant/plugins/communicators/winrm/shell.rb

154 lines
4.6 KiB
Ruby
Raw Normal View History

require "timeout"
require "log4r"
require "vagrant/util/retryable"
require "vagrant/util/silence_warnings"
Vagrant::Util::SilenceWarnings.silence! do
require "winrm"
end
require_relative "file_manager"
module VagrantPlugins
module CommunicatorWinRM
class WinRMShell
include Vagrant::Util::Retryable
# These are the exceptions that we retry because they represent
# errors that are generally fixed from a retry and don't
# necessarily represent immediate failure cases.
@@exceptions_to_retry_on = [
HTTPClient::KeepAliveDisconnected,
WinRM::WinRMHTTPTransportError,
Errno::EACCES,
Errno::EADDRINUSE,
Errno::ECONNREFUSED,
Errno::ECONNRESET,
Errno::ENETUNREACH,
Errno::EHOSTUNREACH,
Timeout::Error
]
attr_reader :logger
attr_reader :username
attr_reader :password
attr_reader :host
attr_reader :port
attr_reader :timeout_in_seconds
attr_reader :max_tries
2014-06-03 03:49:19 +00:00
attr_reader :ssl
attr_reader :ssl_peer_verification
def initialize(host, username, password, options = {})
@logger = Log4r::Logger.new("vagrant::communication::winrmshell")
@logger.debug("initializing WinRMShell")
@host = host
@port = options[:port] || (options[:ssl] ? 5986 : 5985)
@username = username
@password = password
@timeout_in_seconds = options[:timeout_in_seconds] || 60
@max_tries = options[:max_tries] || 20
@ssl = options[:ssl] || false
@ssl_peer_verification = options[:ssl_peer_verification] || true
end
def powershell(command, &block)
# ensure an exit code
command << "\r\n"
command << "if ($?) { exit 0 } else { if($LASTEXITCODE) { exit $LASTEXITCODE } else { exit 1 } }"
execute_shell(command, :powershell, &block)
end
def cmd(command, &block)
execute_shell(command, :cmd, &block)
end
def wql(query, &block)
execute_shell(query, :wql, &block)
end
def upload(from, to)
FileManager.new(self).upload(from, to)
end
def download(from, to)
FileManager.new(self).download(from, to)
end
protected
def execute_shell(command, shell=:powershell, &block)
raise Errors::WinRMInvalidShell, shell: shell unless [:powershell, :cmd, :wql].include?(shell)
begin
execute_shell_with_retry(command, shell, &block)
rescue => e
raise_winrm_exception(e, shell, command)
end
end
def execute_shell_with_retry(command, shell, &block)
retryable(tries: @max_tries, on: @@exceptions_to_retry_on, sleep: 10) do
@logger.debug("#{shell} executing:\n#{command}")
output = session.send(shell, command) do |out, err|
block.call(:stdout, out) if block_given? && out
block.call(:stderr, err) if block_given? && err
end
@logger.debug("Output: #{output.inspect}")
return output
end
end
def raise_winrm_exception(winrm_exception, shell, command)
# If the error is a 401, we can return a more specific error message
if winrm_exception.message.include?("401")
raise Errors::AuthError,
user: @username,
password: @password,
endpoint: endpoint,
message: winrm_exception.message
end
raise Errors::ExecutionError,
shell: shell,
command: command,
message: winrm_exception.message
end
def new_session
@logger.info("Attempting to connect to WinRM...")
@logger.info(" - Host: #{@host}")
@logger.info(" - Port: #{@port}")
@logger.info(" - Username: #{@username}")
2014-06-03 03:49:19 +00:00
@logger.info(" - SSL: #{@ssl}")
client = ::WinRM::WinRMWebService.new(endpoint, :plaintext, endpoint_options)
client.set_timeout(@timeout_in_seconds)
client.toggle_nori_type_casting(:off) #we don't want coersion of types
client
end
def session
@session ||= new_session
end
def endpoint
2014-06-03 03:49:19 +00:00
"http#{@ssl ? 's' : ''}://#{@host}:#{@port}/wsman"
end
def endpoint_options
{ user: @username,
pass: @password,
host: @host,
port: @port,
operation_timeout: @timeout_in_seconds,
2014-06-03 03:49:19 +00:00
basic_auth_only: true,
no_ssl_peer_verification: !@ssl_peer_verification }
end
end #WinShell class
end
end