Files
herolib/lib/builder/executor_ssh.v
Mahmoud-Emad b9dc8996f5 feat: Improve Ubuntu installation and SSH execution
- Update example configuration comments
- Refactor server rescue check to use file_exists
- Add Ubuntu installation timeout and polling constants
- Implement non-interactive installation script execution
- Enhance SSH execution with argument parsing
- Add check to skip reinstallation if Ubuntu is already installed
- Copy SSH key to new system during installation
- Poll for installation completion with progress updates
- Use `node.exec` instead of `node.exec_interactive`
- Use `execvp` correctly for shell execution
- Recreate node connection after server reboot
- Adjust SSH wait timeout to milliseconds
2025-11-28 10:37:47 +02:00

267 lines
7.8 KiB
V

module builder
import os
import rand
import incubaid.herolib.osal.core as osal
import incubaid.herolib.osal.rsync
import incubaid.herolib.core.pathlib
import incubaid.herolib.data.ipaddress
import incubaid.herolib.ui.console
import incubaid.herolib.core.texttools
@[heap]
pub struct ExecutorSSH {
pub mut:
ipaddr ipaddress.IPAddress
sshkey string
user string = 'root' // default will be root
initialized bool
retry int = 1 // nr of times something will be retried before failing, need to check also what error is, only things which should be retried need to be done
debug bool = true
}
fn (mut executor ExecutorSSH) init() ! {
if !executor.initialized {
mut addr := executor.ipaddr.addr
if addr == '' {
addr = 'localhost'
}
if executor.ipaddr.port == 0 {
executor.ipaddr.port = 22
}
// TODO: doesn't work with ipv6 after working with ipv4, need better check too, because this slows everything down
// cmd := "sh -c 'ssh-keyscan -H ${executor.ipaddr.addr} -p ${executor.ipaddr.port} -t ecdsa-sha2-nistp256 2>/dev/null >> ~/.ssh/known_hosts'"
// osal.execute_silent(cmd) or { return error('cannot add the ssh keys to known hosts') }
executor.initialized = true
}
}
pub fn (mut executor ExecutorSSH) debug_on() {
executor.debug = true
}
pub fn (mut executor ExecutorSSH) debug_off() {
executor.debug = false
}
pub fn (mut executor ExecutorSSH) exec(args_ ExecArgs) !string {
mut args := args_
if executor.debug {
console.print_debug('execute ${executor.ipaddr.addr}: ${args.cmd}')
}
mut port := ''
if executor.ipaddr.port > 10 {
port = '-p ${executor.ipaddr.port}'
}
if args.cmd.contains('\n') {
// need to upload the file first
args.cmd = texttools.dedent(args.cmd)
executor.file_write('/tmp/toexec.sh', args.cmd)!
args.cmd = 'bash /tmp/toexec.sh'
}
args.cmd = 'ssh -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ${executor.user}@${executor.ipaddr.addr} ${port} "${args.cmd}"'
res := osal.exec(cmd: args.cmd, stdout: args.stdout, debug: executor.debug)!
return res.output
}
pub fn (mut executor ExecutorSSH) exec_interactive(args_ ExecArgs) ! {
mut args := args_
mut port := ''
if executor.ipaddr.port > 10 {
port = '-p ${executor.ipaddr.port}'
}
if args.cmd.contains('\n') {
args.cmd = texttools.dedent(args.cmd)
// need to upload the file first
executor.file_write('/tmp/toexec.sh', args.cmd)!
args.cmd = 'bash /tmp/toexec.sh'
}
args.cmd = 'ssh -tt -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null ${executor.user}@${executor.ipaddr.addr} ${port} "${args.cmd}"'
console.print_debug(args.cmd)
osal.execute_interactive(args.cmd)!
}
pub fn (mut executor ExecutorSSH) file_write(path string, text string) ! {
if executor.debug {
console.print_debug('${executor.ipaddr.addr} file write: ${path}')
}
local_path := '/tmp/${rand.uuid_v4()}'
os.write_file(local_path, text)!
executor.upload(source: local_path, dest: path, stdout: false)!
os.rm(local_path)!
}
pub fn (mut executor ExecutorSSH) file_read(path string) !string {
if executor.debug {
console.print_debug('${executor.ipaddr.addr} file read: ${path}')
}
local_path := '/tmp/${rand.uuid_v4()}'
executor.download(source: path, dest: local_path)!
r := os.read_file(local_path)!
os.rm(local_path) or { panic(err) }
return r
}
pub fn (mut executor ExecutorSSH) file_exists(path string) bool {
if executor.debug {
console.print_debug('${executor.ipaddr.addr} file exists: ${path}')
}
output := executor.exec(cmd: 'test -f ${path} && echo found || echo not found', stdout: false) or {
return false
}
if output == 'found' {
return true
}
return false
}
// carefull removes everything
pub fn (mut executor ExecutorSSH) delete(path string) ! {
if executor.debug {
console.print_debug('${executor.ipaddr.addr} file delete: ${path}')
}
executor.exec(cmd: 'rm -rf ${path}', stdout: false) or { panic(err) }
}
// upload from local FS to executor FS
pub fn (mut executor ExecutorSSH) download(args SyncArgs) ! {
mut addr := '${executor.user}@${executor.ipaddr.addr}:${executor.ipaddr.port}'
if executor.ipaddr.cat == .ipv6 {
addr = '\'${executor.user}@[${executor.ipaddr.addr}]\':${executor.ipaddr.port}'
}
mut rsargs := rsync.RsyncArgs{
source: args.source
dest: args.dest
delete: args.delete
ipaddr_src: addr
ignore: args.ignore
ignore_default: args.ignore_default
stdout: args.stdout
}
rsync.rsync(rsargs)!
}
// download from executor FS to local FS
pub fn (mut executor ExecutorSSH) upload(args SyncArgs) ! {
mut p := pathlib.get(args.source)
if !p.exists() {
return error('Cannot upload ${args}')
}
mut psize := p.size_kb()!
// source string
// dest string
// delete bool // do we want to delete the destination
// ipaddr string // e.g. root@192.168.5.5:33 (can be without root@ or :port)
// ignore []string // arguments to ignore e.g. ['*.pyc','*.bak']
// ignore_default bool = true // if set will ignore a common set
// stdout bool = true
// fast_rsync bool = true
if args.ignore.len == 0 && psize < 100 {
mut addr2 := '${executor.user}@${executor.ipaddr.addr}:${args.dest}'
if executor.ipaddr.cat == .ipv6 {
addr2 = '\'${executor.user}@[${executor.ipaddr.addr}]\':${args.dest}'
}
cmd := "scp -o \"StrictHostKeyChecking=no\" -P ${executor.ipaddr.port} ${args.source} ${addr2}"
// console.print_debug(cmd)
res := os.execute(cmd)
if res.exit_code > 0 {
return error('cannot upload over ssh: ${cmd}')
}
return
}
mut addr := '${executor.user}@${executor.ipaddr.addr}:${executor.ipaddr.port}'
if executor.ipaddr.cat == .ipv6 {
addr = '\'${executor.user}@[${executor.ipaddr.addr}]\':${executor.ipaddr.port}'
}
mut rsargs := rsync.RsyncArgs{
source: args.source
dest: args.dest
delete: args.delete
ipaddr_dst: addr
ignore: args.ignore
ignore_default: args.ignore_default
stdout: args.stdout
fast_rsync: args.fast_rsync
}
rsync.rsync(rsargs)!
}
// get environment variables from the executor
pub fn (mut executor ExecutorSSH) environ_get() !map[string]string {
env := executor.exec(cmd: 'env', stdout: false) or { return error('can not get environment') }
// if executor.debug {
// console.print_header(' ${executor.ipaddr.addr} env get')
// }
mut res := map[string]string{}
if env.contains('\n') {
for line in env.split('\n') {
if line.contains('=') {
splitted := line.split('=')
key := splitted[0].trim(' ')
val := splitted[1].trim(' ')
res[key] = val
}
}
}
return res
}
/*
Executor info or meta data
accessing type Executor won't allow to access the
fields of the struct, so this is workaround
*/
pub fn (mut executor ExecutorSSH) info() map[string]string {
return {
'category': 'ssh'
'sshkey': executor.sshkey
'user': executor.user
'ipaddress': executor.ipaddr.addr
'port': '${executor.ipaddr.port}'
}
}
// ssh shell on the node default ssh port, or any custom port that may be
// forwarding ssh traffic to certain container
pub fn (mut executor ExecutorSSH) shell(cmd string) ! {
mut args := ['-o', 'StrictHostKeyChecking=no', '-o', 'UserKnownHostsFile=/dev/null',
'${executor.user}@${executor.ipaddr.addr}', '-p', '${executor.ipaddr.port}']
if cmd.len > 0 {
args << cmd
}
os.execvp('ssh', args)!
}
pub fn (mut executor ExecutorSSH) list(path string) ![]string {
if !executor.dir_exists(path) {
panic('Dir Not found')
}
mut res := []string{}
output := executor.exec(cmd: 'ls ${path}', stdout: false)!
for line in output.split('\n') {
res << line
}
return res
}
pub fn (mut executor ExecutorSSH) dir_exists(path string) bool {
output := executor.exec(cmd: 'test -d ${path} && echo found || echo not found', stdout: false) or {
return false
}
if output.trim_space() == 'found' {
return true
}
return false
}