2014-03-11 05:38:31 +00:00
|
|
|
require "timeout"
|
|
|
|
|
|
|
|
require "log4r"
|
|
|
|
|
2014-03-14 16:55:27 +00:00
|
|
|
require_relative "helper"
|
2014-03-11 05:38:31 +00:00
|
|
|
require_relative "shell"
|
2014-04-24 03:38:16 +00:00
|
|
|
require_relative "command_filter"
|
2014-03-11 05:38:31 +00:00
|
|
|
|
|
|
|
module VagrantPlugins
|
|
|
|
module CommunicatorWinRM
|
|
|
|
# Provides communication channel for Vagrant commands via WinRM.
|
|
|
|
class Communicator < Vagrant.plugin("2", :communicator)
|
|
|
|
def self.match?(machine)
|
|
|
|
# This is useless, and will likely be removed in the future (this
|
|
|
|
# whole method).
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
|
|
|
def initialize(machine)
|
2014-04-24 14:50:24 +00:00
|
|
|
@cmd_filter = CommandFilter.new()
|
|
|
|
@logger = Log4r::Logger.new("vagrant::communication::winrm")
|
2014-04-24 03:38:16 +00:00
|
|
|
@machine = machine
|
|
|
|
@shell = nil
|
2014-03-11 05:38:31 +00:00
|
|
|
|
2014-03-14 16:34:08 +00:00
|
|
|
@logger.info("Initializing WinRMCommunicator")
|
2014-03-11 05:38:31 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def ready?
|
2014-03-14 16:34:08 +00:00
|
|
|
@logger.info("Checking whether WinRM is ready...")
|
2014-03-11 05:38:31 +00:00
|
|
|
|
|
|
|
Timeout.timeout(@machine.config.winrm.timeout) do
|
2014-04-21 04:00:52 +00:00
|
|
|
shell(true).powershell("hostname")
|
2014-03-11 05:38:31 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
@logger.info("WinRM is ready!")
|
|
|
|
return true
|
|
|
|
rescue Vagrant::Errors::VagrantError => e
|
|
|
|
# We catch a `VagrantError` which would signal that something went
|
|
|
|
# wrong expectedly in the `connect`, which means we didn't connect.
|
|
|
|
@logger.info("WinRM not up: #{e.inspect}")
|
|
|
|
|
|
|
|
# We reset the shell to trigger calling of winrm_finder again.
|
|
|
|
# This resolves a problem when using vSphere where the ssh_info was not refreshing
|
|
|
|
# thus never getting the correct hostname.
|
|
|
|
@shell = nil
|
|
|
|
return false
|
|
|
|
end
|
|
|
|
|
2014-04-21 04:00:52 +00:00
|
|
|
def shell(reload=false)
|
|
|
|
@shell = nil if reload
|
2014-03-11 05:38:31 +00:00
|
|
|
@shell ||= create_shell
|
|
|
|
end
|
|
|
|
|
|
|
|
def execute(command, opts={}, &block)
|
2014-04-24 03:38:16 +00:00
|
|
|
# If this is a *nix command with no Windows equivilant, don't run it
|
|
|
|
command = @cmd_filter.filter(command)
|
|
|
|
return 0 if command.empty?
|
|
|
|
|
2014-03-11 05:38:31 +00:00
|
|
|
opts = {
|
2014-05-07 16:47:47 +00:00
|
|
|
command: command,
|
|
|
|
elevated: false,
|
2014-04-24 15:26:38 +00:00
|
|
|
error_check: true,
|
|
|
|
error_class: Errors::ExecutionError,
|
|
|
|
error_key: :execution_error,
|
2014-05-07 16:47:47 +00:00
|
|
|
good_exit: 0,
|
2014-04-24 15:26:38 +00:00
|
|
|
shell: :powershell,
|
2014-03-11 05:38:31 +00:00
|
|
|
}.merge(opts || {})
|
2014-04-22 18:29:22 +00:00
|
|
|
|
2014-05-07 16:47:47 +00:00
|
|
|
opts[:good_exit] = Array(opts[:good_exit])
|
|
|
|
|
2014-04-24 15:24:12 +00:00
|
|
|
if opts[:elevated]
|
2014-05-19 15:04:59 +00:00
|
|
|
guest_script_path = create_elevated_shell_script(command)
|
|
|
|
command = "powershell -executionpolicy bypass -file #{guest_script_path}"
|
2014-04-24 15:24:12 +00:00
|
|
|
end
|
|
|
|
|
2014-04-22 18:29:22 +00:00
|
|
|
output = shell.send(opts[:shell], command, &block)
|
2014-04-24 04:49:28 +00:00
|
|
|
execution_output(output, opts)
|
2014-03-11 05:38:31 +00:00
|
|
|
end
|
|
|
|
alias_method :sudo, :execute
|
|
|
|
|
|
|
|
def test(command, opts=nil)
|
2014-04-24 03:38:16 +00:00
|
|
|
# If this is a *nix command with no Windows equivilant, assume failure
|
|
|
|
command = @cmd_filter.filter(command)
|
|
|
|
return false if command.empty?
|
2014-03-11 05:38:31 +00:00
|
|
|
|
|
|
|
opts = { :error_check => false }.merge(opts || {})
|
|
|
|
execute(command, opts) == 0
|
|
|
|
end
|
|
|
|
|
|
|
|
def upload(from, to)
|
2014-04-21 04:00:52 +00:00
|
|
|
@logger.info("Uploading: #{from} to #{to}")
|
2014-03-11 05:38:31 +00:00
|
|
|
shell.upload(from, to)
|
|
|
|
end
|
|
|
|
|
|
|
|
def download(from, to)
|
2014-04-21 04:00:52 +00:00
|
|
|
@logger.info("Downloading: #{from} to #{to}")
|
2014-03-11 05:38:31 +00:00
|
|
|
shell.download(from, to)
|
|
|
|
end
|
|
|
|
|
|
|
|
protected
|
|
|
|
|
|
|
|
# This creates anew WinRMShell based on the information we know
|
|
|
|
# about this machine.
|
|
|
|
def create_shell
|
2014-03-14 16:55:27 +00:00
|
|
|
host_address = Helper.winrm_address(@machine)
|
2014-05-21 02:30:53 +00:00
|
|
|
host_port = Helper.winrm_port(
|
|
|
|
@machine, host_address == "127.0.0.1")
|
2014-03-11 05:38:31 +00:00
|
|
|
|
|
|
|
WinRMShell.new(
|
|
|
|
host_address,
|
|
|
|
@machine.config.winrm.username,
|
|
|
|
@machine.config.winrm.password,
|
|
|
|
port: host_port,
|
|
|
|
timeout_in_seconds: @machine.config.winrm.timeout,
|
|
|
|
max_tries: @machine.config.winrm.max_tries,
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
2014-05-19 15:04:59 +00:00
|
|
|
# Creates and uploads a PowerShell script which wraps the specified
|
|
|
|
# command in a scheduled task. The scheduled task allows commands to
|
|
|
|
# run on the guest as a true local admin without any of the restrictions
|
|
|
|
# that WinRM puts in place.
|
|
|
|
#
|
|
|
|
# @return The path to elevated_shell.ps1 on the guest
|
|
|
|
def create_elevated_shell_script(command)
|
|
|
|
path = File.expand_path("../scripts/elevated_shell.ps1", __FILE__)
|
|
|
|
script = Vagrant::Util::TemplateRenderer.render(path, options: {
|
|
|
|
username: shell.username,
|
|
|
|
password: shell.password,
|
|
|
|
command: command,
|
|
|
|
})
|
|
|
|
guest_script_path = "c:/tmp/vagrant-elevated-shell.ps1"
|
|
|
|
file = Tempfile.new(["vagrant-elevated-shell", "ps1"])
|
|
|
|
begin
|
|
|
|
file.write(script)
|
|
|
|
file.fsync
|
|
|
|
file.close
|
|
|
|
upload(file.path, guest_script_path)
|
|
|
|
ensure
|
|
|
|
file.close
|
|
|
|
file.unlink
|
|
|
|
end
|
|
|
|
guest_script_path
|
|
|
|
end
|
|
|
|
|
2014-04-24 04:49:28 +00:00
|
|
|
# Handles the raw WinRM shell result and converts it to a
|
|
|
|
# standard Vagrant communicator result
|
|
|
|
def execution_output(output, opts)
|
|
|
|
if opts[:shell] == :wql
|
|
|
|
return output
|
2014-05-07 16:47:47 +00:00
|
|
|
elsif opts[:error_check] && \
|
2014-05-07 17:09:14 +00:00
|
|
|
!opts[:good_exit].include?(output[:exitcode])
|
2014-04-24 04:49:28 +00:00
|
|
|
raise_execution_error(output, opts)
|
|
|
|
end
|
|
|
|
output[:exitcode]
|
|
|
|
end
|
|
|
|
|
|
|
|
def raise_execution_error(output, opts)
|
2014-03-11 05:38:31 +00:00
|
|
|
# The error classes expect the translation key to be _key, but that makes for an ugly
|
|
|
|
# configuration parameter, so we set it here from `error_key`
|
2014-04-24 04:49:28 +00:00
|
|
|
msg = "Command execution failed with an exit code of #{output[:exitcode]}"
|
2014-04-24 15:26:38 +00:00
|
|
|
error_opts = opts.merge(_key: opts[:error_key], message: msg)
|
2014-03-11 05:38:31 +00:00
|
|
|
raise opts[:error_class], error_opts
|
|
|
|
end
|
|
|
|
end #WinRM class
|
|
|
|
end
|
|
|
|
end
|