359 lines
13 KiB
Python
359 lines
13 KiB
Python
|
# Copyright 2019, David Wilson
|
||
|
#
|
||
|
# Redistribution and use in source and binary forms, with or without
|
||
|
# modification, are permitted provided that the following conditions are met:
|
||
|
#
|
||
|
# 1. Redistributions of source code must retain the above copyright notice,
|
||
|
# this list of conditions and the following disclaimer.
|
||
|
#
|
||
|
# 2. Redistributions in binary form must reproduce the above copyright notice,
|
||
|
# this list of conditions and the following disclaimer in the documentation
|
||
|
# and/or other materials provided with the distribution.
|
||
|
#
|
||
|
# 3. Neither the name of the copyright holder nor the names of its contributors
|
||
|
# may be used to endorse or promote products derived from this software without
|
||
|
# specific prior written permission.
|
||
|
#
|
||
|
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
||
|
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
|
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||
|
# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
||
|
# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
||
|
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
||
|
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
||
|
# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
||
|
# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
||
|
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
||
|
# POSSIBILITY OF SUCH DAMAGE.
|
||
|
|
||
|
from __future__ import absolute_import
|
||
|
import atexit
|
||
|
import errno
|
||
|
import logging
|
||
|
import os
|
||
|
import signal
|
||
|
import socket
|
||
|
import sys
|
||
|
import time
|
||
|
|
||
|
try:
|
||
|
import faulthandler
|
||
|
except ImportError:
|
||
|
faulthandler = None
|
||
|
|
||
|
import mitogen
|
||
|
import mitogen.core
|
||
|
import mitogen.debug
|
||
|
import mitogen.master
|
||
|
import mitogen.parent
|
||
|
import mitogen.service
|
||
|
import mitogen.unix
|
||
|
import mitogen.utils
|
||
|
|
||
|
import ansible
|
||
|
import ansible.constants as C
|
||
|
import ansible_mitogen.logging
|
||
|
import ansible_mitogen.services
|
||
|
|
||
|
from mitogen.core import b
|
||
|
import ansible_mitogen.affinity
|
||
|
|
||
|
|
||
|
LOG = logging.getLogger(__name__)
|
||
|
|
||
|
ANSIBLE_PKG_OVERRIDE = (
|
||
|
u"__version__ = %r\n"
|
||
|
u"__author__ = %r\n"
|
||
|
)
|
||
|
|
||
|
|
||
|
def clean_shutdown(sock):
|
||
|
"""
|
||
|
Shut the write end of `sock`, causing `recv` in the worker process to wake
|
||
|
up with a 0-byte read and initiate mux process exit, then wait for a 0-byte
|
||
|
read from the read end, which will occur after the the child closes the
|
||
|
descriptor on exit.
|
||
|
|
||
|
This is done using :mod:`atexit` since Ansible lacks any more sensible hook
|
||
|
to run code during exit, and unless some synchronization exists with
|
||
|
MuxProcess, debug logs may appear on the user's terminal *after* the prompt
|
||
|
has been printed.
|
||
|
"""
|
||
|
sock.shutdown(socket.SHUT_WR)
|
||
|
sock.recv(1)
|
||
|
|
||
|
|
||
|
def getenv_int(key, default=0):
|
||
|
"""
|
||
|
Get an integer-valued environment variable `key`, if it exists and parses
|
||
|
as an integer, otherwise return `default`.
|
||
|
"""
|
||
|
try:
|
||
|
return int(os.environ.get(key, str(default)))
|
||
|
except ValueError:
|
||
|
return default
|
||
|
|
||
|
|
||
|
def save_pid(name):
|
||
|
"""
|
||
|
When debugging and profiling, it is very annoying to poke through the
|
||
|
process list to discover the currently running Ansible and MuxProcess IDs,
|
||
|
especially when trying to catch an issue during early startup. So here, if
|
||
|
a magic environment variable set, stash them in hidden files in the CWD::
|
||
|
|
||
|
alias muxpid="cat .ansible-mux.pid"
|
||
|
alias anspid="cat .ansible-controller.pid"
|
||
|
|
||
|
gdb -p $(muxpid)
|
||
|
perf top -p $(anspid)
|
||
|
"""
|
||
|
if os.environ.get('MITOGEN_SAVE_PIDS'):
|
||
|
with open('.ansible-%s.pid' % (name,), 'w') as fp:
|
||
|
fp.write(str(os.getpid()))
|
||
|
|
||
|
|
||
|
class MuxProcess(object):
|
||
|
"""
|
||
|
Implement a subprocess forked from the Ansible top-level, as a safe place
|
||
|
to contain the Mitogen IO multiplexer thread, keeping its use of the
|
||
|
logging package (and the logging package's heavy use of locks) far away
|
||
|
from the clutches of os.fork(), which is used continuously by the
|
||
|
multiprocessing package in the top-level process.
|
||
|
|
||
|
The problem with running the multiplexer in that process is that should the
|
||
|
multiplexer thread be in the process of emitting a log entry (and holding
|
||
|
its lock) at the point of fork, in the child, the first attempt to log any
|
||
|
log entry using the same handler will deadlock the child, as in the memory
|
||
|
image the child received, the lock will always be marked held.
|
||
|
|
||
|
See https://bugs.python.org/issue6721 for a thorough description of the
|
||
|
class of problems this worker is intended to avoid.
|
||
|
"""
|
||
|
|
||
|
#: In the top-level process, this references one end of a socketpair(),
|
||
|
#: which the MuxProcess blocks reading from in order to determine when
|
||
|
#: the master process dies. Once the read returns, the MuxProcess will
|
||
|
#: begin shutting itself down.
|
||
|
worker_sock = None
|
||
|
|
||
|
#: In the worker process, this references the other end of
|
||
|
#: :py:attr:`worker_sock`.
|
||
|
child_sock = None
|
||
|
|
||
|
#: In the top-level process, this is the PID of the single MuxProcess
|
||
|
#: that was spawned.
|
||
|
worker_pid = None
|
||
|
|
||
|
#: A copy of :data:`os.environ` at the time the multiplexer process was
|
||
|
#: started. It's used by mitogen_local.py to find changes made to the
|
||
|
#: top-level environment (e.g. vars plugins -- issue #297) that must be
|
||
|
#: applied to locally executed commands and modules.
|
||
|
original_env = None
|
||
|
|
||
|
#: In both processes, this is the temporary UNIX socket used for
|
||
|
#: forked WorkerProcesses to contact the MuxProcess
|
||
|
unix_listener_path = None
|
||
|
|
||
|
#: Singleton.
|
||
|
_instance = None
|
||
|
|
||
|
@classmethod
|
||
|
def start(cls, _init_logging=True):
|
||
|
"""
|
||
|
Arrange for the subprocess to be started, if it is not already running.
|
||
|
|
||
|
The parent process picks a UNIX socket path the child will use prior to
|
||
|
fork, creates a socketpair used essentially as a semaphore, then blocks
|
||
|
waiting for the child to indicate the UNIX socket is ready for use.
|
||
|
|
||
|
:param bool _init_logging:
|
||
|
For testing, if :data:`False`, don't initialize logging.
|
||
|
"""
|
||
|
if cls.worker_sock is not None:
|
||
|
return
|
||
|
|
||
|
if faulthandler is not None:
|
||
|
faulthandler.enable()
|
||
|
|
||
|
mitogen.utils.setup_gil()
|
||
|
cls.unix_listener_path = mitogen.unix.make_socket_path()
|
||
|
cls.worker_sock, cls.child_sock = socket.socketpair()
|
||
|
atexit.register(lambda: clean_shutdown(cls.worker_sock))
|
||
|
mitogen.core.set_cloexec(cls.worker_sock.fileno())
|
||
|
mitogen.core.set_cloexec(cls.child_sock.fileno())
|
||
|
|
||
|
cls.profiling = os.environ.get('MITOGEN_PROFILING') is not None
|
||
|
if cls.profiling:
|
||
|
mitogen.core.enable_profiling()
|
||
|
if _init_logging:
|
||
|
ansible_mitogen.logging.setup()
|
||
|
|
||
|
cls.original_env = dict(os.environ)
|
||
|
cls.child_pid = os.fork()
|
||
|
if cls.child_pid:
|
||
|
save_pid('controller')
|
||
|
ansible_mitogen.logging.set_process_name('top')
|
||
|
ansible_mitogen.affinity.policy.assign_controller()
|
||
|
cls.child_sock.close()
|
||
|
cls.child_sock = None
|
||
|
mitogen.core.io_op(cls.worker_sock.recv, 1)
|
||
|
else:
|
||
|
save_pid('mux')
|
||
|
ansible_mitogen.logging.set_process_name('mux')
|
||
|
ansible_mitogen.affinity.policy.assign_muxprocess()
|
||
|
cls.worker_sock.close()
|
||
|
cls.worker_sock = None
|
||
|
self = cls()
|
||
|
self.worker_main()
|
||
|
|
||
|
def worker_main(self):
|
||
|
"""
|
||
|
The main function of for the mux process: setup the Mitogen broker
|
||
|
thread and ansible_mitogen services, then sleep waiting for the socket
|
||
|
connected to the parent to be closed (indicating the parent has died).
|
||
|
"""
|
||
|
self._setup_master()
|
||
|
self._setup_services()
|
||
|
|
||
|
try:
|
||
|
# Let the parent know our listening socket is ready.
|
||
|
mitogen.core.io_op(self.child_sock.send, b('1'))
|
||
|
# Block until the socket is closed, which happens on parent exit.
|
||
|
mitogen.core.io_op(self.child_sock.recv, 1)
|
||
|
finally:
|
||
|
self.broker.shutdown()
|
||
|
self.broker.join()
|
||
|
|
||
|
# Test frameworks living somewhere higher on the stack of the
|
||
|
# original parent process may try to catch sys.exit(), so do a C
|
||
|
# level exit instead.
|
||
|
os._exit(0)
|
||
|
|
||
|
def _enable_router_debug(self):
|
||
|
if 'MITOGEN_ROUTER_DEBUG' in os.environ:
|
||
|
self.router.enable_debug()
|
||
|
|
||
|
def _enable_stack_dumps(self):
|
||
|
secs = getenv_int('MITOGEN_DUMP_THREAD_STACKS', default=0)
|
||
|
if secs:
|
||
|
mitogen.debug.dump_to_logger(secs=secs)
|
||
|
|
||
|
def _setup_simplejson(self, responder):
|
||
|
"""
|
||
|
We support serving simplejson for Python 2.4 targets on Ansible 2.3, at
|
||
|
least so the package's own CI Docker scripts can run without external
|
||
|
help, however newer versions of simplejson no longer support Python
|
||
|
2.4. Therefore override any installed/loaded version with a
|
||
|
2.4-compatible version we ship in the compat/ directory.
|
||
|
"""
|
||
|
responder.whitelist_prefix('simplejson')
|
||
|
|
||
|
# issue #536: must be at end of sys.path, in case existing newer
|
||
|
# version is already loaded.
|
||
|
compat_path = os.path.join(os.path.dirname(__file__), 'compat')
|
||
|
sys.path.append(compat_path)
|
||
|
|
||
|
for fullname, is_pkg, suffix in (
|
||
|
(u'simplejson', True, '__init__.py'),
|
||
|
(u'simplejson.decoder', False, 'decoder.py'),
|
||
|
(u'simplejson.encoder', False, 'encoder.py'),
|
||
|
(u'simplejson.scanner', False, 'scanner.py'),
|
||
|
):
|
||
|
path = os.path.join(compat_path, 'simplejson', suffix)
|
||
|
fp = open(path, 'rb')
|
||
|
try:
|
||
|
source = fp.read()
|
||
|
finally:
|
||
|
fp.close()
|
||
|
|
||
|
responder.add_source_override(
|
||
|
fullname=fullname,
|
||
|
path=path,
|
||
|
source=source,
|
||
|
is_pkg=is_pkg,
|
||
|
)
|
||
|
|
||
|
def _setup_responder(self, responder):
|
||
|
"""
|
||
|
Configure :class:`mitogen.master.ModuleResponder` to only permit
|
||
|
certain packages, and to generate custom responses for certain modules.
|
||
|
"""
|
||
|
responder.whitelist_prefix('ansible')
|
||
|
responder.whitelist_prefix('ansible_mitogen')
|
||
|
self._setup_simplejson(responder)
|
||
|
|
||
|
# Ansible 2.3 is compatible with Python 2.4 targets, however
|
||
|
# ansible/__init__.py is not. Instead, executor/module_common.py writes
|
||
|
# out a 2.4-compatible namespace package for unknown reasons. So we
|
||
|
# copy it here.
|
||
|
responder.add_source_override(
|
||
|
fullname='ansible',
|
||
|
path=ansible.__file__,
|
||
|
source=(ANSIBLE_PKG_OVERRIDE % (
|
||
|
ansible.__version__,
|
||
|
ansible.__author__,
|
||
|
)).encode(),
|
||
|
is_pkg=True,
|
||
|
)
|
||
|
|
||
|
def _setup_master(self):
|
||
|
"""
|
||
|
Construct a Router, Broker, and mitogen.unix listener
|
||
|
"""
|
||
|
self.broker = mitogen.master.Broker(install_watcher=False)
|
||
|
self.router = mitogen.master.Router(
|
||
|
broker=self.broker,
|
||
|
max_message_size=4096 * 1048576,
|
||
|
)
|
||
|
self._setup_responder(self.router.responder)
|
||
|
mitogen.core.listen(self.broker, 'shutdown', self.on_broker_shutdown)
|
||
|
mitogen.core.listen(self.broker, 'exit', self.on_broker_exit)
|
||
|
self.listener = mitogen.unix.Listener(
|
||
|
router=self.router,
|
||
|
path=self.unix_listener_path,
|
||
|
backlog=C.DEFAULT_FORKS,
|
||
|
)
|
||
|
self._enable_router_debug()
|
||
|
self._enable_stack_dumps()
|
||
|
|
||
|
def _setup_services(self):
|
||
|
"""
|
||
|
Construct a ContextService and a thread to service requests for it
|
||
|
arriving from worker processes.
|
||
|
"""
|
||
|
self.pool = mitogen.service.Pool(
|
||
|
router=self.router,
|
||
|
services=[
|
||
|
mitogen.service.FileService(router=self.router),
|
||
|
mitogen.service.PushFileService(router=self.router),
|
||
|
ansible_mitogen.services.ContextService(self.router),
|
||
|
ansible_mitogen.services.ModuleDepService(self.router),
|
||
|
],
|
||
|
size=getenv_int('MITOGEN_POOL_SIZE', default=32),
|
||
|
)
|
||
|
LOG.debug('Service pool configured: size=%d', self.pool.size)
|
||
|
|
||
|
def on_broker_shutdown(self):
|
||
|
"""
|
||
|
Respond to broker shutdown by beginning service pool shutdown. Do not
|
||
|
join on the pool yet, since that would block the broker thread which
|
||
|
then cannot clean up pending handlers, which is required for the
|
||
|
threads to exit gracefully.
|
||
|
"""
|
||
|
# In normal operation we presently kill the process because there is
|
||
|
# not yet any way to cancel connect().
|
||
|
self.pool.stop(join=self.profiling)
|
||
|
|
||
|
def on_broker_exit(self):
|
||
|
"""
|
||
|
Respond to the broker thread about to exit by sending SIGTERM to
|
||
|
ourself. In future this should gracefully join the pool, but TERM is
|
||
|
fine for now.
|
||
|
"""
|
||
|
if not self.profiling:
|
||
|
# In normal operation we presently kill the process because there is
|
||
|
# not yet any way to cancel connect(). When profiling, threads
|
||
|
# including the broker must shut down gracefully, otherwise pstats
|
||
|
# won't be written.
|
||
|
os.kill(os.getpid(), signal.SIGTERM)
|