|
|
|
# Copyright 2019, David Wilson
|
|
|
|
#
|
|
|
|
# Redistribution and use in source and binary forms, with or without
|
|
|
|
# modification, are permitted provided that the following conditions are met:
|
|
|
|
#
|
|
|
|
# 1. Redistributions of source code must retain the above copyright notice,
|
|
|
|
# this list of conditions and the following disclaimer.
|
|
|
|
#
|
|
|
|
# 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
# this list of conditions and the following disclaimer in the documentation
|
|
|
|
# and/or other materials provided with the distribution.
|
|
|
|
#
|
|
|
|
# 3. Neither the name of the copyright holder nor the names of its contributors
|
|
|
|
# may be used to endorse or promote products derived from this software without
|
|
|
|
# specific prior written permission.
|
|
|
|
#
|
|
|
|
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
# ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
|
|
|
# LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
# POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
|
|
|
from __future__ import absolute_import
|
|
|
|
import os
|
|
|
|
import signal
|
|
|
|
import threading
|
|
|
|
|
|
|
|
import mitogen.core
|
ansible: new multiplexer/workers configuration
Following on from 152effc26c9a5918cb7ead7a97fe7fa7f81b6764,
* Pin mux to CPU 0
* Pin top-level CPU 1
* Pin workers sequentially to CPU 2..n
Nets 19.5% improvement on issue_140__thread_pileup.yml when targetting
64 Docker containers on the same 8 core/16 thread machine.
Before (prior to last scheme, no affinity at all):
2294528.731458 task-clock (msec) # 6.443 CPUs utilized
10,429,745 context-switches # 0.005 M/sec
2,049,618 cpu-migrations # 0.893 K/sec
8,258,952 page-faults # 0.004 M/sec
5,532,719,253,824 cycles # 2.411 GHz (83.35%)
3,267,471,616,230 instructions # 0.59 insn per cycle
# 1.22 stalled cycles per insn (83.35%)
662,006,455,943 branches # 288.515 M/sec (83.33%)
39,453,895,977 branch-misses # 5.96% of all branches (83.37%)
356.148064576 seconds time elapsed
After:
2226463.958975 task-clock (msec) # 7.784 CPUs utilized
9,831,466 context-switches # 0.004 M/sec
180,065 cpu-migrations # 0.081 K/sec
5,082,278 page-faults # 0.002 M/sec
5,592,548,587,259 cycles # 2.512 GHz (83.35%)
3,135,038,855,414 instructions # 0.56 insn per cycle
# 1.32 stalled cycles per insn (83.32%)
636,397,509,232 branches # 285.833 M/sec (83.30%)
39,135,441,790 branch-misses # 6.15% of all branches (83.35%)
286.036681644 seconds time elapsed
6 years ago
|
|
|
import ansible_mitogen.affinity
|
|
|
|
import ansible_mitogen.loaders
|
|
|
|
import ansible_mitogen.mixins
|
|
|
|
import ansible_mitogen.process
|
|
|
|
|
|
|
|
import ansible
|
|
|
|
import ansible.executor.process.worker
|
|
|
|
|
|
|
|
try:
|
|
|
|
# 2.8+ has a standardized "unset" object.
|
|
|
|
from ansible.utils.sentinel import Sentinel
|
|
|
|
except ImportError:
|
|
|
|
Sentinel = None
|
|
|
|
|
|
|
|
|
|
|
|
ANSIBLE_VERSION_MIN = '2.3'
|
|
|
|
ANSIBLE_VERSION_MAX = '2.8'
|
|
|
|
NEW_VERSION_MSG = (
|
|
|
|
"Your Ansible version (%s) is too recent. The most recent version\n"
|
|
|
|
"supported by Mitogen for Ansible is %s.x. Please check the Mitogen\n"
|
|
|
|
"release notes to see if a new version is available, otherwise\n"
|
|
|
|
"subscribe to the corresponding GitHub issue to be notified when\n"
|
|
|
|
"support becomes available.\n"
|
|
|
|
"\n"
|
|
|
|
" https://mitogen.rtfd.io/en/latest/changelog.html\n"
|
|
|
|
" https://github.com/dw/mitogen/issues/\n"
|
|
|
|
)
|
|
|
|
OLD_VERSION_MSG = (
|
|
|
|
"Your version of Ansible (%s) is too old. The oldest version supported by "
|
|
|
|
"Mitogen for Ansible is %s."
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
def _assert_supported_release():
|
|
|
|
"""
|
|
|
|
Throw AnsibleError with a descriptive message in case of being loaded into
|
|
|
|
an unsupported Ansible release.
|
|
|
|
"""
|
|
|
|
v = ansible.__version__
|
|
|
|
|
|
|
|
if v[:len(ANSIBLE_VERSION_MIN)] < ANSIBLE_VERSION_MIN:
|
|
|
|
raise ansible.errors.AnsibleError(
|
|
|
|
OLD_VERSION_MSG % (v, ANSIBLE_VERSION_MIN)
|
|
|
|
)
|
|
|
|
|
|
|
|
if v[:len(ANSIBLE_VERSION_MAX)] > ANSIBLE_VERSION_MAX:
|
|
|
|
raise ansible.errors.AnsibleError(
|
|
|
|
NEW_VERSION_MSG % (ansible.__version__, ANSIBLE_VERSION_MAX)
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
def _patch_awx_callback():
|
|
|
|
"""
|
|
|
|
issue #400: AWX loads a display callback that suffers from thread-safety
|
|
|
|
issues. Detect the presence of older AWX versions and patch the bug.
|
|
|
|
"""
|
|
|
|
# AWX uses sitecustomize.py to force-load this package. If it exists, we're
|
|
|
|
# running under AWX.
|
|
|
|
try:
|
|
|
|
from awx_display_callback.events import EventContext
|
|
|
|
from awx_display_callback.events import event_context
|
|
|
|
except ImportError:
|
|
|
|
return
|
|
|
|
|
|
|
|
if hasattr(EventContext(), '_local'):
|
|
|
|
# Patched version.
|
|
|
|
return
|
|
|
|
|
|
|
|
def patch_add_local(self, **kwargs):
|
|
|
|
tls = vars(self._local)
|
|
|
|
ctx = tls.setdefault('_ctx', {})
|
|
|
|
ctx.update(kwargs)
|
|
|
|
|
|
|
|
EventContext._local = threading.local()
|
|
|
|
EventContext.add_local = patch_add_local
|
|
|
|
|
|
|
|
_patch_awx_callback()
|
|
|
|
|
|
|
|
|
|
|
|
def wrap_action_loader__get(name, *args, **kwargs):
|
|
|
|
"""
|
|
|
|
While the mitogen strategy is active, trap action_loader.get() calls,
|
|
|
|
augmenting any fetched class with ActionModuleMixin, which replaces various
|
|
|
|
helper methods inherited from ActionBase with implementations that avoid
|
|
|
|
the use of shell fragments wherever possible.
|
|
|
|
|
|
|
|
This is used instead of static subclassing as it generalizes to third party
|
|
|
|
action modules outside the Ansible tree.
|
|
|
|
"""
|
|
|
|
get_kwargs = {'class_only': True}
|
|
|
|
if ansible.__version__ >= '2.8':
|
|
|
|
get_kwargs['collection_list'] = kwargs.pop('collection_list', None)
|
|
|
|
|
|
|
|
klass = action_loader__get(name, **get_kwargs)
|
|
|
|
if klass:
|
|
|
|
bases = (ansible_mitogen.mixins.ActionModuleMixin, klass)
|
|
|
|
adorned_klass = type(str(name), bases, {})
|
|
|
|
if kwargs.get('class_only'):
|
|
|
|
return adorned_klass
|
|
|
|
return adorned_klass(*args, **kwargs)
|
|
|
|
|
|
|
|
|
|
|
|
def wrap_connection_loader__get(name, *args, **kwargs):
|
|
|
|
"""
|
|
|
|
While the strategy is active, rewrite connection_loader.get() calls for
|
|
|
|
some transports into requests for a compatible Mitogen transport.
|
|
|
|
"""
|
|
|
|
if name in ('docker', 'kubectl', 'jail', 'local', 'lxc',
|
|
|
|
'lxd', 'machinectl', 'setns', 'ssh'):
|
ansible: connection delegation v1
This implements the first edition of Connection Delegation, where
delegating connection establishment is initially single-threaded.
ansible_mitogen/strategy.py:
ansible_mitogen/plugins/connection/*:
Begin splitting connection.Connection into subclasses, exposing them
directly as "mitogen_ssh", "mitogen_local", etc. connection types.
This is far from removing strategy.py, but it's a tiny start.
ansible_mitogen/connection.py:
* config_from_play_context() and config_from_host_vars() build up a
huge dictionary containing either more or less PlayContext contents,
or our best attempt at reconstructing a host's connection config
from its hostvars, where that config is not the current
WorkerProcess target.
They both produce the same format with the same keys, allowing
remaining code to have a single input format.
These dicts contain fields named after how Ansible refers to them,
e.g. "sudo_exe".
* _config_from_via() parses a basic connection specification like
"username@inventory_name" into one of the aforementioned dicts.
* _stack_from_config() produces a list of dicts describing the order
in which (Mitogen) connections should be established, such that each
element is proxied via= the previous element. The dicts produced by
this function use Mitogen keyword arguments, the former di.
These dicts contain fields named after how Mitogen refers to them,
e.g. "sudo_path".
* Pass the stack to ContextService, which is responsible for actual
setup of the full chain.
ansible_mitogen/services.py:
Teach get() to walk the supplied stack, establishing each connection
in turn, creating refounts for it before continuing.
TODO: refcounting is broken in a variety of cases.
7 years ago
|
|
|
name = 'mitogen_' + name
|
|
|
|
return connection_loader__get(name, *args, **kwargs)
|
|
|
|
|
|
|
|
|
|
|
|
def wrap_worker__run(*args, **kwargs):
|
|
|
|
"""
|
|
|
|
While the strategy is active, rewrite connection_loader.get() calls for
|
|
|
|
some transports into requests for a compatible Mitogen transport.
|
|
|
|
"""
|
|
|
|
# Ignore parent's attempts to murder us when we still need to write
|
|
|
|
# profiling output.
|
|
|
|
if mitogen.core._profile_hook.__name__ != '_profile_hook':
|
|
|
|
signal.signal(signal.SIGTERM, signal.SIG_IGN)
|
|
|
|
|
|
|
|
ansible_mitogen.logging.set_process_name('task')
|
|
|
|
ansible_mitogen.affinity.policy.assign_worker()
|
|
|
|
return mitogen.core._profile_hook('WorkerProcess',
|
|
|
|
lambda: worker__run(*args, **kwargs)
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
|
|
class StrategyMixin(object):
|
|
|
|
"""
|
|
|
|
This mix-in enhances any built-in strategy by arranging for various Mitogen
|
|
|
|
services to be initialized in the Ansible top-level process, and for worker
|
|
|
|
processes to grow support for using those top-level services to communicate
|
|
|
|
with and execute modules on remote hosts.
|
|
|
|
|
|
|
|
Mitogen:
|
|
|
|
|
|
|
|
A private Broker IO multiplexer thread is created to dispatch IO
|
|
|
|
between the local Router and any connected streams, including streams
|
|
|
|
connected to Ansible WorkerProcesses, and SSH commands implementing
|
|
|
|
connections to remote machines.
|
|
|
|
|
|
|
|
A Router is created that implements message dispatch to any locally
|
|
|
|
registered handlers, and message routing for remote streams. Router is
|
|
|
|
the junction point through which WorkerProceses and remote SSH contexts
|
|
|
|
can communicate.
|
|
|
|
|
|
|
|
Router additionally adds message handlers for a variety of base
|
|
|
|
services, review the Standard Handles section of the How It Works guide
|
|
|
|
in the documentation.
|
|
|
|
|
|
|
|
A ContextService is installed as a message handler in the master
|
|
|
|
process and run on a private thread. It is responsible for accepting
|
|
|
|
requests to establish new SSH connections from worker processes, and
|
|
|
|
ensuring precisely one connection exists and is reused for subsequent
|
|
|
|
playbook steps. The service presently runs in a single thread, so to
|
|
|
|
begin with, new SSH connections are serialized.
|
|
|
|
|
|
|
|
Finally a mitogen.unix listener is created through which WorkerProcess
|
|
|
|
can establish a connection back into the master process, in order to
|
|
|
|
avail of ContextService. A UNIX listener socket is necessary as there
|
|
|
|
is no more sane mechanism to arrange for IPC between the Router in the
|
|
|
|
master process, and the corresponding Router in the worker process.
|
|
|
|
|
|
|
|
Ansible:
|
|
|
|
|
|
|
|
PluginLoader monkey patches are installed to catch attempts to create
|
|
|
|
connection and action plug-ins.
|
|
|
|
|
|
|
|
For connection plug-ins, if the desired method is "local" or "ssh", it
|
|
|
|
is redirected to the "mitogen" connection plug-in. That plug-in
|
|
|
|
implements communication via a UNIX socket connection to the top-level
|
|
|
|
Ansible process, and uses ContextService running in the top-level
|
|
|
|
process to actually establish and manage the connection.
|
|
|
|
|
|
|
|
For action plug-ins, the original class is looked up as usual, but a
|
|
|
|
new subclass is created dynamically in order to mix-in
|
|
|
|
ansible_mitogen.target.ActionModuleMixin, which overrides many of the
|
|
|
|
methods usually inherited from ActionBase in order to replace them with
|
|
|
|
pure-Python equivalents that avoid the use of shell.
|
|
|
|
|
|
|
|
In particular, _execute_module() is overridden with an implementation
|
|
|
|
that uses ansible_mitogen.target.run_module() executed in the target
|
|
|
|
Context. run_module() implements module execution by importing the
|
|
|
|
module as if it were a normal Python module, and capturing its output
|
|
|
|
in the remote process. Since the Mitogen module loader is active in the
|
|
|
|
remote process, all the heavy lifting of transferring the action module
|
|
|
|
and its dependencies are automatically handled by Mitogen.
|
|
|
|
"""
|
|
|
|
def _install_wrappers(self):
|
|
|
|
"""
|
|
|
|
Install our PluginLoader monkey patches and update global variables
|
|
|
|
with references to the real functions.
|
|
|
|
"""
|
|
|
|
global action_loader__get
|
|
|
|
action_loader__get = ansible_mitogen.loaders.action_loader.get
|
|
|
|
ansible_mitogen.loaders.action_loader.get = wrap_action_loader__get
|
|
|
|
|
|
|
|
global connection_loader__get
|
|
|
|
connection_loader__get = ansible_mitogen.loaders.connection_loader.get
|
|
|
|
ansible_mitogen.loaders.connection_loader.get = wrap_connection_loader__get
|
|
|
|
|
|
|
|
global worker__run
|
|
|
|
worker__run = ansible.executor.process.worker.WorkerProcess.run
|
|
|
|
ansible.executor.process.worker.WorkerProcess.run = wrap_worker__run
|
|
|
|
|
|
|
|
def _remove_wrappers(self):
|
|
|
|
"""
|
|
|
|
Uninstall the PluginLoader monkey patches.
|
|
|
|
"""
|
|
|
|
ansible_mitogen.loaders.action_loader.get = action_loader__get
|
|
|
|
ansible_mitogen.loaders.connection_loader.get = connection_loader__get
|
|
|
|
ansible.executor.process.worker.WorkerProcess.run = worker__run
|
|
|
|
|
|
|
|
def _add_plugin_paths(self):
|
|
|
|
"""
|
|
|
|
Add the Mitogen plug-in directories to the ModuleLoader path, avoiding
|
|
|
|
the need for manual configuration.
|
|
|
|
"""
|
|
|
|
base_dir = os.path.join(os.path.dirname(__file__), 'plugins')
|
|
|
|
ansible_mitogen.loaders.connection_loader.add_directory(
|
|
|
|
os.path.join(base_dir, 'connection')
|
|
|
|
)
|
|
|
|
ansible_mitogen.loaders.action_loader.add_directory(
|
|
|
|
os.path.join(base_dir, 'action')
|
|
|
|
)
|
|
|
|
|
|
|
|
def _queue_task(self, host, task, task_vars, play_context):
|
|
|
|
"""
|
|
|
|
Many PluginLoader caches are defective as they are only populated in
|
|
|
|
the ephemeral WorkerProcess. Touch each plug-in path before forking to
|
|
|
|
ensure all workers receive a hot cache.
|
|
|
|
"""
|
|
|
|
ansible_mitogen.loaders.module_loader.find_plugin(
|
|
|
|
name=task.action,
|
|
|
|
mod_type='',
|
|
|
|
)
|
|
|
|
ansible_mitogen.loaders.action_loader.get(
|
|
|
|
name=task.action,
|
|
|
|
class_only=True,
|
|
|
|
)
|
|
|
|
if play_context.connection is not Sentinel:
|
|
|
|
# 2.8 appears to defer computing this until inside the worker.
|
|
|
|
# TODO: figure out where it has moved.
|
|
|
|
ansible_mitogen.loaders.connection_loader.get(
|
|
|
|
name=play_context.connection,
|
|
|
|
class_only=True,
|
|
|
|
)
|
|
|
|
|
|
|
|
return super(StrategyMixin, self)._queue_task(
|
|
|
|
host=host,
|
|
|
|
task=task,
|
|
|
|
task_vars=task_vars,
|
|
|
|
play_context=play_context,
|
|
|
|
)
|
|
|
|
|
|
|
|
def run(self, iterator, play_context, result=0):
|
|
|
|
"""
|
|
|
|
Arrange for a mitogen.master.Router to be available for the duration of
|
|
|
|
the strategy's real run() method.
|
|
|
|
"""
|
|
|
|
_assert_supported_release()
|
|
|
|
|
|
|
|
ansible_mitogen.process.MuxProcess.start()
|
|
|
|
run = super(StrategyMixin, self).run
|
|
|
|
self._add_plugin_paths()
|
|
|
|
self._install_wrappers()
|
|
|
|
try:
|
|
|
|
return mitogen.core._profile_hook('Strategy',
|
|
|
|
lambda: run(iterator, play_context)
|
|
|
|
)
|
|
|
|
finally:
|
|
|
|
self._remove_wrappers()
|