Remove Windows checks for scp/ssh/openssl

- Update docs
- Remove unused vars in nodeprep script
This commit is contained in:
Fred Park 2017-04-18 13:51:05 -07:00
Родитель 362546686d
Коммит 0161169daa
7 изменённых файлов: 21 добавлений и 64 удалений

Просмотреть файл

@ -1,6 +1,8 @@
# Change Log
## [Unreleased]
### Fixed
- Checks that prevented ssh/scp/openssl interaction on Windows
## [2.6.0rc1] - 2017-04-14
### Added
@ -24,7 +26,6 @@ can be configured using the `fault_domains` property. This was lowered from
the prior default of 3 due to managed disks and availability set restrictions
as some regions do not support 3 fault domains with this combination.
- Updated NC-series Tesla driver to 375.51
- Removed support for OpenSUSE 13.2 and SLES 12
### Fixed
- Broken Docker installations due to gpgkey changes
@ -33,6 +34,9 @@ as some regions do not support 3 fault domains with this combination.
- Allow smbd.service to auto-restart with delay
- Data ingress to glusterfs on compute with no remotefs settings
### Removed
- Host support for OpenSUSE 13.2 and SLES 12
## [2.6.0b3] - 2017-04-03
### Added
- Created [Azure App Service Site Extension](https://www.siteextensions.net/packages/batch-shipyard).

Просмотреть файл

@ -189,14 +189,6 @@ def adjust_general_settings(config):
'found in global configuration. Please update your global '
'configuration file. See the configuration doc for more '
'information.')
# adjust encryption settings on windows
if util.on_windows():
enc = settings.batch_shipyard_encryption_enabled(config)
if enc:
logger.warning(
'disabling credential encryption due to script being run '
'from Windows')
settings.set_batch_shipyard_encryption_enabled(config, False)
def populate_global_settings(config, fs_storage):
@ -1369,28 +1361,6 @@ def _adjust_settings_for_pool_creation(config):
'cannot create more than one GlusterFS volume per pool')
except KeyError:
pass
# adjust settings on windows
if util.on_windows():
if pool.ssh.ssh_public_key is None:
logger.warning(
'disabling ssh user creation due to script being run '
'from Windows and no public key is specified')
settings.remove_ssh_settings(config)
# ensure file transfer settings
if pool.transfer_files_on_pool_creation:
try:
direct = False
files = settings.global_resources_files(config)
for fdict in files:
if settings.is_direct_transfer(fdict):
direct = True
break
if direct:
raise RuntimeError(
'cannot transfer files directly to compute nodes '
'on Windows')
except KeyError:
pass
def action_fs_disks_add(resource_client, compute_client, config):

Просмотреть файл

@ -539,14 +539,6 @@ def pool_settings(config):
)
def remove_ssh_settings(config):
# type: (dict) -> None
"""Remove ssh settings from pool specification
:param dict config: configuration object
"""
config['pool_specification'].pop('ssh', None)
def set_block_until_all_global_resources_loaded(config, flag):
# type: (dict, bool) -> None
"""Set block until all global resources setting

Просмотреть файл

@ -288,7 +288,9 @@ programs must be installed to take advantage of data movement features of
Batch Shipyard:
1. An SSH client that provides `ssh` and `scp` (or `ssh.exe` and `scp.exe`
on Windows). OpenSSH with
on Windows). You can find
[OpenSSH binaries for Windows](https://github.com/PowerShell/Win32-OpenSSH/releases)
released by the PowerShell team. OpenSSH with
[HPN patches](https://www.psc.edu/index.php/using-joomla/extensions/templates/atomic/636-hpn-ssh)
can be used on the client side to further accelerate `scp` to Azure Batch
compute nodes where `hpn_server_swap` has been set to `true` in the
@ -304,8 +306,11 @@ typically placed in `~/.local/bin`. This path will need to be added to your
### Encryption Support
Batch Shipyard supports encrypting credentials that are used by backend
components within your pool deployment. In order to utilize this feature,
you must have `openssl` installed. The `install.sh` script ensures that
OpenSSL is installed. The Docker CLI image also contains OpenSSL.
you must have `openssl` (or `openssl.exe` on Windows) installed. The
`install.sh` script ensures that OpenSSL is installed on Linux. The Docker
CLI image also contains OpenSSL. You might be able to find
[OpenSSL binaries for Windows](https://wiki.openssl.org/index.php/Binaries)
on the OpenSSL wiki.
Note that all commandlines, environment variables and resource file URLs
which are stored by the Azure Batch Service are encrypted by the service.

Просмотреть файл

@ -172,9 +172,8 @@ on how to generate an SSH keypair for use with Batch Shipyard.
the compute nodes to expire. The default is 30 days from invocation time.
* (optional) `ssh_public_key` is the path to an existing SSH public key to
use. If not specified, an RSA public/private keypair will be automatically
generated only on Linux. On Windows only, if this is option is not
specified, the SSH keys are not auto-generated and the user is not
created. This option cannot be specified with `ssh_public_key_data`.
generated if `ssh-keygen` or `ssh-keygen.exe` can be found on the `PATH`.
This option cannot be specified with `ssh_public_key_data`.
* (optional) `ssh_public_key_data` is the raw RSA public key data in OpenSSH
format, e.g., a string starting with `ssh-rsa ...`. Only one key may be
specified. This option cannot be specified with `ssh_public_key`.

Просмотреть файл

@ -175,7 +175,6 @@ optional in this configuration as it is in the pool specification. If you are
running Batch Shipyard on Windows, please refer to
[these instructions](85-batch-shipyard-ssh-docker-tunnel.md#ssh-keygen)
on how to generate an SSH keypair for use with Batch Shipyard.
* (required) `username` is the admin user to create on all virtual machines
* (optional) `ssh_public_key` is the path to a pre-existing ssh public
key to use. If this is not specified, an RSA public/private key pair will

Просмотреть файл

@ -417,17 +417,13 @@ EOF
fi
# install dependencies for storage cluster mount
if [ ! -z $sc_args ]; then
nfs_installed=0
glusterfs_installed=0
for sc_arg in ${sc_args[@]}; do
IFS=':' read -ra sc <<< "$sc_arg"
server_type=${sc[0]}
if [ $server_type == "nfs" ] && [ $nfs_installed -eq 0 ]; then
if [ $server_type == "nfs" ]; then
apt-get install -y -q --no-install-recommends nfs-common nfs4-acl-tools
nfs_installed=1
elif [ $server_type == "glusterfs" ] && [ $glusterfs_installed -eq 0 ]; then
elif [ $server_type == "glusterfs" ]; then
apt-get install -y -q --no-install-recommends glusterfs-client acl
glusterfs_installed=1
else
echo "Unknown file server type ${sc[0]} for ${sc[1]}"
exit 1
@ -511,22 +507,18 @@ elif [[ $offer == centos* ]] || [[ $offer == "rhel" ]] || [[ $offer == "oracle-l
fi
# install dependencies for storage cluster mount
if [ ! -z $sc_args ]; then
nfs_installed=0
glusterfs_installed=0
for sc_arg in ${sc_args[@]}; do
IFS=':' read -ra sc <<< "$sc_arg"
server_type=${sc[0]}
if [ $server_type == "nfs" ] && [ $nfs_installed -eq 0 ]; then
if [ $server_type == "nfs" ]; then
yum install -y nfs-utils nfs4-acl-tools
systemctl daemon-reload
$rpcbindenable
systemctl start rpcbind
nfs_installed=1
elif [ $server_type == "glusterfs" ] && [ $glusterfs_installed -eq 0 ]; then
elif [ $server_type == "glusterfs" ]; then
yum install -y epel-release centos-release-gluster38
sed -i -e "s/enabled=1/enabled=0/g" /etc/yum.repos.d/CentOS-Gluster-3.8.repo
yum install -y --enablerepo=centos-gluster38,epel glusterfs-client acl
glusterfs_installed=1
else
echo "Unknown file server type ${sc[0]} for ${sc[1]}"
exit 1
@ -603,22 +595,18 @@ elif [[ $offer == opensuse* ]] || [[ $offer == sles* ]]; then
fi
# install dependencies for storage cluster mount
if [ ! -z $sc_args ]; then
nfs_installed=0
glusterfs_installed=0
for sc_arg in ${sc_args[@]}; do
IFS=':' read -ra sc <<< "$sc_arg"
server_type=${sc[0]}
if [ $server_type == "nfs" ] && [ $nfs_installed -eq 0 ]; then
if [ $server_type == "nfs" ]; then
zypper -n in nfs-client nfs4-acl-tools
systemctl daemon-reload
systemctl enable rpcbind
systemctl start rpcbind
nfs_installed=1
elif [ $server_type == "glusterfs" ] && [ $glusterfs_installed -eq 0 ]; then
elif [ $server_type == "glusterfs" ]; then
zypper addrepo http://download.opensuse.org/repositories/filesystems/$repodir/filesystems.repo
zypper -n --gpg-auto-import-keys ref
zypper -n in glusterfs acl
glusterfs_installed=1
else
echo "Unknown file server type ${sc[0]} for ${sc[1]}"
exit 1