mirror of https://github.com/apache/jclouds.git
Issue 636: hone ssh code config + tests to make it easier to isolate cause of stderr hang
This commit is contained in:
parent
efa574c175
commit
732491fe17
|
@ -138,6 +138,8 @@ public class RunScriptOnNodeAsInitScriptUsingSsh implements RunScriptOnNode {
|
||||||
} catch (SshException e) {
|
} catch (SshException e) {
|
||||||
// If there's a problem with the sftp configuration, we can try via ssh exec
|
// If there's a problem with the sftp configuration, we can try via ssh exec
|
||||||
logger.warn(e, "<< (%s) problem using sftp [%s], attempting via sshexec", ssh.toString(), e.getMessage());
|
logger.warn(e, "<< (%s) problem using sftp [%s], attempting via sshexec", ssh.toString(), e.getMessage());
|
||||||
|
ssh.disconnect();
|
||||||
|
ssh.connect();
|
||||||
ssh.exec("rm " + initFile);
|
ssh.exec("rm " + initFile);
|
||||||
ssh.exec(Statements.appendFile(initFile, Splitter.on('\n').split(init.render(OsFamily.UNIX)),
|
ssh.exec(Statements.appendFile(initFile, Splitter.on('\n').split(init.render(OsFamily.UNIX)),
|
||||||
AppendFile.MARKER + "_" + init.getInstanceName()).render(OsFamily.UNIX));
|
AppendFile.MARKER + "_" + init.getInstanceName()).render(OsFamily.UNIX));
|
||||||
|
|
|
@ -1,45 +0,0 @@
|
||||||
/**
|
|
||||||
*
|
|
||||||
* Copyright (C) 2011 Cloud Conscious, LLC. <info@cloudconscious.com>
|
|
||||||
*
|
|
||||||
* ====================================================================
|
|
||||||
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
* you may not use this file except in compliance with the License.
|
|
||||||
* You may obtain a copy of the License at
|
|
||||||
*
|
|
||||||
* http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
*
|
|
||||||
* Unless required by applicable law or agreed to in writing, software
|
|
||||||
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
* See the License for the specific language governing permissions and
|
|
||||||
* limitations under the License.
|
|
||||||
* ====================================================================
|
|
||||||
*/
|
|
||||||
package org.jclouds.ssh;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* @author Adrian Cole
|
|
||||||
*/
|
|
||||||
public class ChannelNotOpenException extends SshException {
|
|
||||||
|
|
||||||
/** The serialVersionUID */
|
|
||||||
private static final long serialVersionUID = 129347129837129837l;
|
|
||||||
|
|
||||||
public ChannelNotOpenException() {
|
|
||||||
super();
|
|
||||||
}
|
|
||||||
|
|
||||||
public ChannelNotOpenException(String arg0, Throwable arg1) {
|
|
||||||
super(arg0, arg1);
|
|
||||||
}
|
|
||||||
|
|
||||||
public ChannelNotOpenException(String arg0) {
|
|
||||||
super(arg0);
|
|
||||||
}
|
|
||||||
|
|
||||||
public ChannelNotOpenException(Throwable arg0) {
|
|
||||||
super(arg0);
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
|
@ -20,7 +20,6 @@ package org.jclouds.compute;
|
||||||
import static com.google.common.base.Preconditions.checkNotNull;
|
import static com.google.common.base.Preconditions.checkNotNull;
|
||||||
import static com.google.common.base.Predicates.and;
|
import static com.google.common.base.Predicates.and;
|
||||||
import static com.google.common.base.Predicates.not;
|
import static com.google.common.base.Predicates.not;
|
||||||
import static com.google.common.base.Throwables.getRootCause;
|
|
||||||
import static com.google.common.collect.Iterables.concat;
|
import static com.google.common.collect.Iterables.concat;
|
||||||
import static com.google.common.collect.Iterables.get;
|
import static com.google.common.collect.Iterables.get;
|
||||||
import static com.google.common.collect.Iterables.getOnlyElement;
|
import static com.google.common.collect.Iterables.getOnlyElement;
|
||||||
|
@ -266,7 +265,8 @@ public abstract class BaseComputeServiceLiveTest {
|
||||||
good.identity, "romeo"));
|
good.identity, "romeo"));
|
||||||
assert responses.size() == 0 : "shouldn't pass with a bad password\n" + responses;
|
assert responses.size() == 0 : "shouldn't pass with a bad password\n" + responses;
|
||||||
} catch (RunScriptOnNodesException e) {
|
} catch (RunScriptOnNodesException e) {
|
||||||
assert getRootCause(e).getMessage().contains("Auth fail") : e;
|
assert Iterables.any(e.getNodeErrors().values(), Predicates.instanceOf(AuthorizationException.class)) : e
|
||||||
|
.getNodeErrors().values() + "not authexception!";
|
||||||
}
|
}
|
||||||
|
|
||||||
runScriptWithCreds(group, os, good);
|
runScriptWithCreds(group, os, good);
|
||||||
|
@ -401,12 +401,8 @@ public abstract class BaseComputeServiceLiveTest {
|
||||||
|
|
||||||
protected Map<? extends NodeMetadata, ExecResponse> runScriptWithCreds(final String group, OperatingSystem os,
|
protected Map<? extends NodeMetadata, ExecResponse> runScriptWithCreds(final String group, OperatingSystem os,
|
||||||
Credentials creds) throws RunScriptOnNodesException {
|
Credentials creds) throws RunScriptOnNodesException {
|
||||||
try {
|
|
||||||
return client.runScriptOnNodesMatching(runningInGroup(group), buildScript(os), overrideCredentialsWith(creds)
|
return client.runScriptOnNodesMatching(runningInGroup(group), buildScript(os), overrideCredentialsWith(creds)
|
||||||
.nameTask("runScriptWithCreds"));
|
.nameTask("runScriptWithCreds"));
|
||||||
} catch (SshException e) {
|
|
||||||
throw e;
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
protected void checkNodes(Iterable<? extends NodeMetadata> nodes, String group) throws IOException {
|
protected void checkNodes(Iterable<? extends NodeMetadata> nodes, String group) throws IOException {
|
||||||
|
|
|
@ -43,11 +43,11 @@ import org.jclouds.io.Payload;
|
||||||
import org.jclouds.net.IPSocket;
|
import org.jclouds.net.IPSocket;
|
||||||
import org.jclouds.predicates.RetryablePredicate;
|
import org.jclouds.predicates.RetryablePredicate;
|
||||||
import org.jclouds.predicates.SocketOpen;
|
import org.jclouds.predicates.SocketOpen;
|
||||||
|
import org.jclouds.rest.AuthorizationException;
|
||||||
import org.jclouds.rest.RestContext;
|
import org.jclouds.rest.RestContext;
|
||||||
import org.jclouds.scriptbuilder.statements.login.AdminAccess;
|
import org.jclouds.scriptbuilder.statements.login.AdminAccess;
|
||||||
import org.jclouds.scriptbuilder.statements.login.AdminAccess.Configuration;
|
import org.jclouds.scriptbuilder.statements.login.AdminAccess.Configuration;
|
||||||
import org.jclouds.ssh.SshClient;
|
import org.jclouds.ssh.SshClient;
|
||||||
import org.jclouds.ssh.SshException;
|
|
||||||
import org.jclouds.util.Strings2;
|
import org.jclouds.util.Strings2;
|
||||||
import org.testng.annotations.Test;
|
import org.testng.annotations.Test;
|
||||||
|
|
||||||
|
@ -154,7 +154,7 @@ public class StubComputeServiceIntegrationTest extends BaseComputeServiceLiveTes
|
||||||
expect(factory.create(new IPSocket("144.175.1.2", 22), new Credentials("foo", "privateKey"))).andReturn(
|
expect(factory.create(new IPSocket("144.175.1.2", 22), new Credentials("foo", "privateKey"))).andReturn(
|
||||||
client2Foo);
|
client2Foo);
|
||||||
expect(factory.create(new IPSocket("144.175.1.2", 22), new Credentials("root", "romeo"))).andThrow(
|
expect(factory.create(new IPSocket("144.175.1.2", 22), new Credentials("root", "romeo"))).andThrow(
|
||||||
new SshException("Auth fail"));
|
new AuthorizationException("Auth fail", null));
|
||||||
|
|
||||||
// run script without backgrounding (via predicate)
|
// run script without backgrounding (via predicate)
|
||||||
client2.connect();
|
client2.connect();
|
||||||
|
|
|
@ -44,13 +44,14 @@ import org.jclouds.io.Payload;
|
||||||
import org.jclouds.io.Payloads;
|
import org.jclouds.io.Payloads;
|
||||||
import org.jclouds.logging.Logger;
|
import org.jclouds.logging.Logger;
|
||||||
import org.jclouds.net.IPSocket;
|
import org.jclouds.net.IPSocket;
|
||||||
import org.jclouds.ssh.ChannelNotOpenException;
|
import org.jclouds.rest.AuthorizationException;
|
||||||
import org.jclouds.ssh.SshClient;
|
import org.jclouds.ssh.SshClient;
|
||||||
import org.jclouds.ssh.SshException;
|
import org.jclouds.ssh.SshException;
|
||||||
import org.jclouds.util.Strings2;
|
import org.jclouds.util.Strings2;
|
||||||
|
|
||||||
import com.google.common.annotations.VisibleForTesting;
|
import com.google.common.annotations.VisibleForTesting;
|
||||||
import com.google.common.base.Predicate;
|
import com.google.common.base.Predicate;
|
||||||
|
import com.google.common.base.Predicates;
|
||||||
import com.google.common.base.Splitter;
|
import com.google.common.base.Splitter;
|
||||||
import com.google.common.io.Closeables;
|
import com.google.common.io.Closeables;
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
|
@ -90,18 +91,23 @@ public class JschSshClient implements SshClient {
|
||||||
private final String password;
|
private final String password;
|
||||||
|
|
||||||
@Inject(optional = true)
|
@Inject(optional = true)
|
||||||
@Named("jclouds.ssh.max_retries")
|
@Named("jclouds.ssh.max-retries")
|
||||||
@VisibleForTesting
|
@VisibleForTesting
|
||||||
int sshRetries = 5;
|
int sshRetries = 5;
|
||||||
|
|
||||||
@Inject(optional = true)
|
@Inject(optional = true)
|
||||||
@Named("jclouds.ssh.retryable_messages")
|
@Named("jclouds.ssh.retry-auth")
|
||||||
|
@VisibleForTesting
|
||||||
|
boolean retryAuth;
|
||||||
|
|
||||||
|
@Inject(optional = true)
|
||||||
|
@Named("jclouds.ssh.retryable-messages")
|
||||||
@VisibleForTesting
|
@VisibleForTesting
|
||||||
String retryableMessages = "failed to send channel request,channel is not opened,invalid data,End of IO Stream Read,Connection reset,connection is closed by foreign host,socket is not established";
|
String retryableMessages = "failed to send channel request,channel is not opened,invalid data,End of IO Stream Read,Connection reset,connection is closed by foreign host,socket is not established";
|
||||||
|
|
||||||
@Inject(optional = true)
|
@Inject(optional = true)
|
||||||
@Named("jclouds.ssh.retry_predicate")
|
@Named("jclouds.ssh.retry-predicate")
|
||||||
private Predicate<Throwable> retryPredicate = or(instanceOf(ConnectException.class), instanceOf(IOException.class));
|
Predicate<Throwable> retryPredicate = or(instanceOf(ConnectException.class), instanceOf(IOException.class));
|
||||||
|
|
||||||
@Resource
|
@Resource
|
||||||
@Named("jclouds.ssh")
|
@Named("jclouds.ssh")
|
||||||
|
@ -166,7 +172,7 @@ public class JschSshClient implements SshClient {
|
||||||
java.util.Properties config = new java.util.Properties();
|
java.util.Properties config = new java.util.Properties();
|
||||||
config.put("StrictHostKeyChecking", "no");
|
config.put("StrictHostKeyChecking", "no");
|
||||||
session.setConfig(config);
|
session.setConfig(config);
|
||||||
session.connect();
|
session.connect(timeout);
|
||||||
return session;
|
return session;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -178,7 +184,6 @@ public class JschSshClient implements SshClient {
|
||||||
|
|
||||||
protected <T, C extends Connection<T>> T acquire(C connection) {
|
protected <T, C extends Connection<T>> T acquire(C connection) {
|
||||||
connection.clear();
|
connection.clear();
|
||||||
Exception e = null;
|
|
||||||
String errorMessage = String.format("(%s) error acquiring %s", toString(), connection);
|
String errorMessage = String.format("(%s) error acquiring %s", toString(), connection);
|
||||||
for (int i = 0; i < sshRetries; i++) {
|
for (int i = 0; i < sshRetries; i++) {
|
||||||
try {
|
try {
|
||||||
|
@ -187,22 +192,18 @@ public class JschSshClient implements SshClient {
|
||||||
logger.debug("<< (%s) acquired %s", toString(), returnVal);
|
logger.debug("<< (%s) acquired %s", toString(), returnVal);
|
||||||
return returnVal;
|
return returnVal;
|
||||||
} catch (Exception from) {
|
} catch (Exception from) {
|
||||||
e = from;
|
|
||||||
connection.clear();
|
connection.clear();
|
||||||
|
|
||||||
if (i == sshRetries)
|
if (i + 1 == sshRetries) {
|
||||||
throw propagate(from, errorMessage);
|
throw propagate(from, errorMessage);
|
||||||
|
} else if (shouldRetry(from)) {
|
||||||
if (shouldRetry(from)) {
|
logger.warn(from, "<< " + errorMessage + ": " + from.getMessage());
|
||||||
logger.warn("<< " + errorMessage + ": " + from.getMessage());
|
|
||||||
backoffForAttempt(i + 1, errorMessage + ": " + from.getMessage());
|
backoffForAttempt(i + 1, errorMessage + ": " + from.getMessage());
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
throw propagate(from, errorMessage);
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
if (e != null)
|
assert false : "should not reach here";
|
||||||
throw propagate(e, errorMessage);
|
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -226,11 +227,7 @@ public class JschSshClient implements SshClient {
|
||||||
checkConnected();
|
checkConnected();
|
||||||
String channel = "sftp";
|
String channel = "sftp";
|
||||||
sftp = (ChannelSftp) session.openChannel(channel);
|
sftp = (ChannelSftp) session.openChannel(channel);
|
||||||
try {
|
|
||||||
sftp.connect();
|
sftp.connect();
|
||||||
} catch (JSchException e) {
|
|
||||||
throwChannelNotOpenExceptionOrPropagate(channel, e);
|
|
||||||
}
|
|
||||||
return sftp;
|
return sftp;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -240,11 +237,6 @@ public class JschSshClient implements SshClient {
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
public void throwChannelNotOpenExceptionOrPropagate(String channel, JSchException e) throws JSchException {
|
|
||||||
if (e.getMessage().indexOf("channel is not opened") != -1)
|
|
||||||
throw new ChannelNotOpenException(String.format("(%s) channel %s is not open", toString(), channel), e);
|
|
||||||
}
|
|
||||||
|
|
||||||
class GetConnection implements Connection<Payload> {
|
class GetConnection implements Connection<Payload> {
|
||||||
private final String path;
|
private final String path;
|
||||||
private ChannelSftp sftp;
|
private ChannelSftp sftp;
|
||||||
|
@ -299,7 +291,6 @@ public class JschSshClient implements SshClient {
|
||||||
sftp.put(is, path);
|
sftp.put(is, path);
|
||||||
} finally {
|
} finally {
|
||||||
Closeables.closeQuietly(contents);
|
Closeables.closeQuietly(contents);
|
||||||
clear();
|
|
||||||
}
|
}
|
||||||
return null;
|
return null;
|
||||||
}
|
}
|
||||||
|
@ -317,8 +308,13 @@ public class JschSshClient implements SshClient {
|
||||||
|
|
||||||
@VisibleForTesting
|
@VisibleForTesting
|
||||||
boolean shouldRetry(Exception from) {
|
boolean shouldRetry(Exception from) {
|
||||||
return any(getCausalChain(from), retryPredicate)
|
Predicate<Throwable> predicate = retryAuth ? Predicates.<Throwable>or(retryPredicate, instanceOf(AuthorizationException.class))
|
||||||
|| any(Splitter.on(",").split(retryableMessages), causalChainHasMessageContaining(from));
|
: retryPredicate;
|
||||||
|
if (any(getCausalChain(from), predicate))
|
||||||
|
return true;
|
||||||
|
if (!retryableMessages.equals(""))
|
||||||
|
return any(Splitter.on(",").split(retryableMessages), causalChainHasMessageContaining(from));
|
||||||
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
@VisibleForTesting
|
@VisibleForTesting
|
||||||
|
@ -344,9 +340,10 @@ public class JschSshClient implements SshClient {
|
||||||
backoffLimitedRetryHandler.imposeBackoffExponentialDelay(200L, 2, retryAttempt, sshRetries, message);
|
backoffLimitedRetryHandler.imposeBackoffExponentialDelay(200L, 2, retryAttempt, sshRetries, message);
|
||||||
}
|
}
|
||||||
|
|
||||||
private SshException propagate(Exception e, String message) {
|
SshException propagate(Exception e, String message) {
|
||||||
message += ": " + e.getMessage();
|
message += ": " + e.getMessage();
|
||||||
logger.error(e, "<< " + message);
|
if (e.getMessage() != null && e.getMessage().indexOf("Auth fail") != -1)
|
||||||
|
throw new AuthorizationException("(" + toString() + ") " + message, e);
|
||||||
throw e instanceof SshException ? SshException.class.cast(e) : new SshException(
|
throw e instanceof SshException ? SshException.class.cast(e) : new SshException(
|
||||||
"(" + toString() + ") " + message, e);
|
"(" + toString() + ") " + message, e);
|
||||||
}
|
}
|
||||||
|
@ -382,11 +379,7 @@ public class JschSshClient implements SshClient {
|
||||||
executor.setCommand(command);
|
executor.setCommand(command);
|
||||||
ByteArrayOutputStream error = new ByteArrayOutputStream();
|
ByteArrayOutputStream error = new ByteArrayOutputStream();
|
||||||
executor.setErrStream(error);
|
executor.setErrStream(error);
|
||||||
try {
|
|
||||||
executor.connect();
|
executor.connect();
|
||||||
} catch (JSchException e) {
|
|
||||||
throwChannelNotOpenExceptionOrPropagate("exec", e);
|
|
||||||
}
|
|
||||||
return executor;
|
return executor;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -414,8 +407,8 @@ public class JschSshClient implements SshClient {
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public ExecResponse create() throws Exception {
|
public ExecResponse create() throws Exception {
|
||||||
executor = acquire(execConnection(command));
|
|
||||||
try {
|
try {
|
||||||
|
executor = acquire(execConnection(command));
|
||||||
String outputString = Strings2.toStringAndClose(executor.getInputStream());
|
String outputString = Strings2.toStringAndClose(executor.getInputStream());
|
||||||
int errorStatus = executor.getExitStatus();
|
int errorStatus = executor.getExitStatus();
|
||||||
int i = 0;
|
int i = 0;
|
||||||
|
@ -434,8 +427,7 @@ public class JschSshClient implements SshClient {
|
||||||
String errorString = "";
|
String errorString = "";
|
||||||
return new ExecResponse(outputString, errorString, errorStatus);
|
return new ExecResponse(outputString, errorString, errorStatus);
|
||||||
} finally {
|
} finally {
|
||||||
if (executor != null)
|
clear();
|
||||||
executor.disconnect();
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -24,6 +24,7 @@ import java.net.UnknownHostException;
|
||||||
|
|
||||||
import org.jclouds.domain.Credentials;
|
import org.jclouds.domain.Credentials;
|
||||||
import org.jclouds.net.IPSocket;
|
import org.jclouds.net.IPSocket;
|
||||||
|
import org.jclouds.rest.AuthorizationException;
|
||||||
import org.jclouds.ssh.SshClient;
|
import org.jclouds.ssh.SshClient;
|
||||||
import org.jclouds.ssh.jsch.config.JschSshClientModule;
|
import org.jclouds.ssh.jsch.config.JschSshClientModule;
|
||||||
import org.testng.annotations.BeforeTest;
|
import org.testng.annotations.BeforeTest;
|
||||||
|
@ -62,16 +63,28 @@ public class JschSshClientTest {
|
||||||
return new JschSshClientModule();
|
return new JschSshClientModule();
|
||||||
}
|
}
|
||||||
|
|
||||||
public void testExceptionClassesRetry() {
|
@Test(expectedExceptions = AuthorizationException.class)
|
||||||
|
public void testPropateConvertsAuthException() {
|
||||||
|
ssh.propagate(new JSchException("Auth fail"), "");
|
||||||
|
}
|
||||||
|
|
||||||
|
public void testExceptionClassesRetry() {
|
||||||
assert ssh.shouldRetry(new JSchException("io error", new IOException("socket closed")));
|
assert ssh.shouldRetry(new JSchException("io error", new IOException("socket closed")));
|
||||||
assert ssh.shouldRetry(new JSchException("connect error", new ConnectException("problem")));
|
assert ssh.shouldRetry(new JSchException("connect error", new ConnectException("problem")));
|
||||||
assert ssh.shouldRetry(new IOException("channel %s is not open", new NullPointerException()));
|
assert ssh.shouldRetry(new IOException("channel %s is not open", new NullPointerException()));
|
||||||
assert ssh.shouldRetry(new IOException("channel %s is not open", new NullPointerException(null)));
|
assert ssh.shouldRetry(new IOException("channel %s is not open", new NullPointerException(null)));
|
||||||
|
}
|
||||||
|
|
||||||
|
public void testOnlyRetryAuthWhenSet() throws UnknownHostException {
|
||||||
|
JschSshClient ssh1 = createClient();
|
||||||
|
assert !ssh1.shouldRetry(new AuthorizationException("problem", null));
|
||||||
|
ssh1.retryAuth = true;
|
||||||
|
assert ssh1.shouldRetry(new AuthorizationException("problem", null));
|
||||||
}
|
}
|
||||||
|
|
||||||
public void testExceptionMessagesRetry() {
|
public void testExceptionMessagesRetry() {
|
||||||
|
assert !ssh.shouldRetry(new NullPointerException(""));
|
||||||
|
assert !ssh.shouldRetry(new NullPointerException((String) null));
|
||||||
assert ssh.shouldRetry(new JSchException("Session.connect: java.io.IOException: End of IO Stream Read"));
|
assert ssh.shouldRetry(new JSchException("Session.connect: java.io.IOException: End of IO Stream Read"));
|
||||||
assert ssh.shouldRetry(new JSchException("Session.connect: invalid data"));
|
assert ssh.shouldRetry(new JSchException("Session.connect: invalid data"));
|
||||||
assert ssh.shouldRetry(new JSchException("Session.connect: java.net.SocketException: Connection reset"));
|
assert ssh.shouldRetry(new JSchException("Session.connect: java.net.SocketException: Connection reset"));
|
||||||
|
|
|
@ -46,11 +46,8 @@ public class AWSEC2PropertiesBuilder extends org.jclouds.ec2.EC2PropertiesBuilde
|
||||||
properties.setProperty(PROPERTY_TIMEOUT_NODE_SUSPENDED, 120 * 1000 + "");
|
properties.setProperty(PROPERTY_TIMEOUT_NODE_SUSPENDED, 120 * 1000 + "");
|
||||||
// auth fail sometimes happens in EC2, as the rc.local script that injects the
|
// auth fail sometimes happens in EC2, as the rc.local script that injects the
|
||||||
// authorized key executes after ssh has started
|
// authorized key executes after ssh has started
|
||||||
properties.setProperty("jclouds.ssh.max_retries", "7");
|
properties.setProperty("jclouds.ssh.max-retries", "7");
|
||||||
properties
|
properties.setProperty("jclouds.ssh.retry-auth", "true");
|
||||||
.setProperty(
|
|
||||||
"jclouds.ssh.retryable_messages",
|
|
||||||
"Auth fail,failed to send channel request,channel is not opened,invalid data,End of IO Stream Read,Connection reset,socket is not established,connection is closed by foreign host,socket is not established");
|
|
||||||
properties.setProperty(PROPERTY_ENDPOINT, "https://ec2.us-east-1.amazonaws.com");
|
properties.setProperty(PROPERTY_ENDPOINT, "https://ec2.us-east-1.amazonaws.com");
|
||||||
properties.putAll(Region.regionProperties());
|
properties.putAll(Region.regionProperties());
|
||||||
properties.remove(PROPERTY_EC2_AMI_OWNERS);
|
properties.remove(PROPERTY_EC2_AMI_OWNERS);
|
||||||
|
|
|
@ -38,7 +38,7 @@ public class SlicehostPropertiesBuilder extends PropertiesBuilder {
|
||||||
properties.setProperty(PROPERTY_ISO3166_CODES, "US-IL,US-TX,US-MO");
|
properties.setProperty(PROPERTY_ISO3166_CODES, "US-IL,US-TX,US-MO");
|
||||||
properties.setProperty(PROPERTY_ENDPOINT, "https://api.slicehost.com");
|
properties.setProperty(PROPERTY_ENDPOINT, "https://api.slicehost.com");
|
||||||
properties.setProperty(PROPERTY_API_VERSION, "1.4.1.1");
|
properties.setProperty(PROPERTY_API_VERSION, "1.4.1.1");
|
||||||
properties.setProperty("jclouds.ssh.max_retries", "8");
|
properties.setProperty("jclouds.ssh.max-retries", "8");
|
||||||
return properties;
|
return properties;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue