198 lines
6 KiB
Rust
198 lines
6 KiB
Rust
use std::collections::{HashMap, HashSet};
|
|
use std::convert::TryInto;
|
|
use std::process::Stdio;
|
|
|
|
use async_trait::async_trait;
|
|
use futures::future::join3;
|
|
use tokio::process::Command;
|
|
use tokio::io::{AsyncWriteExt, BufReader};
|
|
|
|
use super::{CopyDirection, CopyOptions, Host};
|
|
use crate::nix::{StorePath, Profile, Goal, NixResult, NixCommand, NixError, Key, SYSTEM_PROFILE};
|
|
use crate::util::{CommandExecution, capture_stream};
|
|
use crate::progress::ProcessProgress;
|
|
|
|
const DEPLOY_KEY_TEMPLATE: &'static str = include_str!("./deploy-key.template");
|
|
|
|
/// A remote machine connected over SSH.
|
|
#[derive(Debug)]
|
|
pub struct Ssh {
|
|
/// The username to use to connect.
|
|
user: String,
|
|
|
|
/// The hostname or IP address to connect to.
|
|
host: String,
|
|
|
|
friendly_name: String,
|
|
path_cache: HashSet<StorePath>,
|
|
progress_bar: ProcessProgress,
|
|
logs: String,
|
|
}
|
|
|
|
#[async_trait]
|
|
impl Host for Ssh {
|
|
async fn copy_closure(&mut self, closure: &StorePath, direction: CopyDirection, options: CopyOptions) -> NixResult<()> {
|
|
let command = self.nix_copy_closure(closure, direction, options);
|
|
self.run_command(command).await
|
|
}
|
|
async fn realize_remote(&mut self, derivation: &StorePath) -> NixResult<Vec<StorePath>> {
|
|
// FIXME
|
|
let paths = self.ssh(&["nix-store", "--no-gc-warning", "--realise", derivation.as_path().to_str().unwrap()])
|
|
.capture_output()
|
|
.await;
|
|
|
|
match paths {
|
|
Ok(paths) => {
|
|
paths.lines().map(|p| p.to_string().try_into()).collect()
|
|
}
|
|
Err(e) => Err(e),
|
|
}
|
|
}
|
|
async fn upload_keys(&mut self, keys: &HashMap<String, Key>) -> NixResult<()> {
|
|
for (name, key) in keys {
|
|
self.upload_key(&name, &key).await?;
|
|
}
|
|
|
|
Ok(())
|
|
}
|
|
async fn activate(&mut self, profile: &Profile, goal: Goal) -> NixResult<()> {
|
|
if goal.should_switch_profile() {
|
|
let path = profile.as_path().to_str().unwrap();
|
|
let set_profile = self.ssh(&["nix-env", "--profile", SYSTEM_PROFILE, "--set", path]);
|
|
self.run_command(set_profile).await?;
|
|
}
|
|
|
|
let activation_command = profile.activation_command(goal).unwrap();
|
|
let v: Vec<&str> = activation_command.iter().map(|s| &**s).collect();
|
|
let command = self.ssh(&v);
|
|
self.run_command(command).await
|
|
}
|
|
fn set_progress_bar(&mut self, bar: ProcessProgress) {
|
|
self.progress_bar = bar;
|
|
}
|
|
async fn dump_logs(&self) -> Option<&str> {
|
|
Some(&self.logs)
|
|
}
|
|
}
|
|
|
|
impl Ssh {
|
|
pub fn new(user: String, host: String) -> Self {
|
|
let friendly_name = host.clone();
|
|
Self {
|
|
user,
|
|
host,
|
|
friendly_name,
|
|
path_cache: HashSet::new(),
|
|
progress_bar: ProcessProgress::default(),
|
|
logs: String::new(),
|
|
}
|
|
}
|
|
|
|
async fn run_command(&mut self, command: Command) -> NixResult<()> {
|
|
let mut execution = CommandExecution::new(command);
|
|
|
|
execution.set_progress_bar(self.progress_bar.clone());
|
|
|
|
let result = execution.run().await;
|
|
|
|
// FIXME: Bad - Order of lines is messed up
|
|
let (stdout, stderr) = execution.get_logs();
|
|
self.logs += stdout.unwrap();
|
|
self.logs += stderr.unwrap();
|
|
|
|
result
|
|
}
|
|
|
|
fn ssh_target(&self) -> String {
|
|
format!("{}@{}", self.user, self.host)
|
|
}
|
|
|
|
fn nix_copy_closure(&self, path: &StorePath, direction: CopyDirection, options: CopyOptions) -> Command {
|
|
let mut command = Command::new("nix-copy-closure");
|
|
match direction {
|
|
CopyDirection::ToRemote => {
|
|
command.arg("--to");
|
|
}
|
|
CopyDirection::FromRemote => {
|
|
command.arg("--from");
|
|
}
|
|
}
|
|
|
|
// FIXME: Host-agnostic abstraction
|
|
if options.include_outputs {
|
|
command.arg("--include-outputs");
|
|
}
|
|
if options.use_substitutes {
|
|
command.arg("--use-substitutes");
|
|
}
|
|
if options.gzip {
|
|
command.arg("--gzip");
|
|
}
|
|
|
|
command
|
|
.arg(&self.ssh_target())
|
|
.arg(path.as_path());
|
|
|
|
command
|
|
}
|
|
|
|
fn ssh(&self, command: &[&str]) -> Command {
|
|
// TODO: Allow configuation of SSH parameters
|
|
|
|
let mut cmd = Command::new("ssh");
|
|
cmd.arg(self.ssh_target())
|
|
.args(&["-o", "StrictHostKeyChecking=accept-new", "-T"])
|
|
.arg("--")
|
|
.args(command);
|
|
|
|
cmd
|
|
}
|
|
}
|
|
|
|
impl Ssh {
|
|
/// Uploads a single key.
|
|
async fn upload_key(&mut self, name: &str, key: &Key) -> NixResult<()> {
|
|
self.progress_bar.log(&format!("Deploying key {}", name));
|
|
|
|
let dest_path = key.dest_dir.join(name);
|
|
|
|
let remote_command = DEPLOY_KEY_TEMPLATE.to_string()
|
|
.replace("%DESTINATION%", dest_path.to_str().unwrap())
|
|
.replace("%USER%", &key.user)
|
|
.replace("%GROUP%", &key.group)
|
|
.replace("%PERMISSIONS%", &key.permissions);
|
|
|
|
let mut command = self.ssh(&["sh", "-c", &remote_command]);
|
|
|
|
command.stdin(Stdio::piped());
|
|
command.stderr(Stdio::piped());
|
|
command.stdout(Stdio::piped());
|
|
|
|
let mut child = command.spawn()?;
|
|
|
|
let mut stdin = child.stdin.take().unwrap();
|
|
stdin.write_all(key.text.as_bytes()).await?;
|
|
stdin.flush().await?;
|
|
drop(stdin);
|
|
|
|
let stdout = BufReader::new(child.stdout.take().unwrap());
|
|
let stderr = BufReader::new(child.stderr.take().unwrap());
|
|
|
|
let futures = join3(
|
|
capture_stream(stdout, self.progress_bar.clone()),
|
|
capture_stream(stderr, self.progress_bar.clone()),
|
|
child.wait(),
|
|
);
|
|
let (stdout_str, stderr_str, exit) = futures.await;
|
|
self.logs += &stdout_str;
|
|
self.logs += &stderr_str;
|
|
|
|
let exit = exit?;
|
|
|
|
if exit.success() {
|
|
Ok(())
|
|
} else {
|
|
Err(NixError::NixFailure { exit_code: exit.code().unwrap() })
|
|
}
|
|
}
|
|
}
|