Skip to content

Commit 2695cdc

Browse files
author
OpenShift Bot
committed
Merge pull request #4550 from smarterclayton/rsh_like_ssh
Merged by openshift-bot
2 parents 9b11c48 + 0de8255 commit 2695cdc

File tree

9 files changed

+55
-14
lines changed

9 files changed

+55
-14
lines changed

docs/generated/oc_by_example_content.adoc

+3
Original file line numberDiff line numberDiff line change
@@ -708,6 +708,9 @@ Start a shell session in a pod
708708
709709
// Open a shell session on the first container in pod 'foo'
710710
$ openshift cli rsh foo
711+
712+
// Run the command 'cat /etc/resolv.conf' inside pod 'foo'
713+
$ openshift cli rsh foo cat /etc/resolv.conf
711714
----
712715
====
713716

hack/test-cmd.sh

-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@ set -o pipefail
99

1010
OS_ROOT=$(dirname "${BASH_SOURCE}")/..
1111
source "${OS_ROOT}/hack/util.sh"
12-
1312
os::log::install_errexit
1413

1514
function cleanup()

hack/test-end-to-end-scenario.sh

+4-1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ set -o pipefail
99

1010
OS_ROOT=$(dirname "${BASH_SOURCE}")/..
1111
source "${OS_ROOT}/hack/util.sh"
12+
os::log::install_errexit
1213

1314
ROUTER_TESTS_ENABLED="${ROUTER_TESTS_ENABLED:-true}"
1415
TEST_ASSETS="${TEST_ASSETS:-false}"
@@ -149,7 +150,9 @@ echo "[INFO] Validating exec"
149150
frontend_pod=$(oc get pod -l deploymentconfig=frontend -t '{{(index .items 0).metadata.name}}')
150151
# when running as a restricted pod the registry will run with a pre-allocated
151152
# user in the neighborhood of 1000000+. Look for a substring of the pre-allocated uid range
152-
oc exec -p ${frontend_pod} id | grep 10
153+
[ "$(oc exec -p ${frontend_pod} id | grep 1000)" ]
154+
[ "$(oc rsh ${frontend_pod} id -u | grep 1000)" ]
155+
[ "$(oc rsh -T ${frontend_pod} id -u | grep 1000)" ]
153156

154157
# Port forwarding
155158
echo "[INFO] Validating port-forward"

hack/test-end-to-end.sh

+1-2
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ set -o pipefail
99

1010
OS_ROOT=$(dirname "${BASH_SOURCE}")/..
1111
source "${OS_ROOT}/hack/util.sh"
12+
os::log::install_errexit
1213

1314
ensure_iptables_or_die
1415

@@ -45,6 +46,4 @@ start_os_server
4546
# set our default KUBECONFIG location
4647
export KUBECONFIG="${ADMIN_KUBECONFIG}"
4748

48-
4949
${OS_ROOT}/hack/test-end-to-end-scenario.sh
50-

hack/test-extended.sh

+1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ set -o pipefail
77
OS_ROOT=$(dirname "${BASH_SOURCE}")/..
88
source "${OS_ROOT}/hack/common.sh"
99
source "${OS_ROOT}/hack/util.sh"
10+
os::log::install_errexit
1011

1112
# Go to the top of the tree.
1213
cd "${OS_ROOT}"

hack/test-integration.sh

+1
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,7 @@ set -o pipefail
77
OS_ROOT=$(dirname "${BASH_SOURCE}")/..
88
source "${OS_ROOT}/hack/common.sh"
99
source "${OS_ROOT}/hack/util.sh"
10+
os::log::install_errexit
1011

1112
# Go to the top of the tree.
1213
cd "${OS_ROOT}"

pkg/cmd/cli/cmd/rsh.go

+37-10
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,9 @@ import (
77
"github.com/spf13/cobra"
88

99
kubecmd "k8s.io/kubernetes/pkg/kubectl/cmd"
10-
cmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
10+
kcmdutil "k8s.io/kubernetes/pkg/kubectl/cmd/util"
1111

12+
cmdutil "github.com/openshift/origin/pkg/cmd/util"
1213
"github.com/openshift/origin/pkg/cmd/util/clientcmd"
1314
)
1415

@@ -18,12 +19,19 @@ Open a remote shell session to a container
1819
1920
This command will attempt to start a shell session in the specified pod. It will default to the
2021
first container if none is specified, and will attempt to use '/bin/bash' as the default shell.
22+
You may pass an optional command after the pod name, which will be executed instead of a login
23+
shell. A TTY will be automatically allocated if standard input is interactive - use -t and -T
24+
to override.
25+
2126
Note, some containers may not include a shell - use '%[1]s exec' if you need to run commands
2227
directly.`
2328

2429
rshExample = `
2530
// Open a shell session on the first container in pod 'foo'
26-
$ %[1]s rsh foo`
31+
$ %[1]s rsh foo
32+
33+
// Run the command 'cat /etc/resolv.conf' inside pod 'foo'
34+
$ %[1]s rsh foo cat /etc/resolv.conf`
2735
)
2836

2937
// NewCmdRsh attempts to open a shell session to the server.
@@ -39,29 +47,48 @@ func NewCmdRsh(fullName string, f *clientcmd.Factory, in io.Reader, out, err io.
3947
Executor: &kubecmd.DefaultRemoteExecutor{},
4048
}
4149
executable := "/bin/bash"
50+
forceTTY, disableTTY := false, false
4251

4352
cmd := &cobra.Command{
44-
Use: "rsh POD",
53+
Use: "rsh POD [command]",
4554
Short: "Start a shell session in a pod",
4655
Long: fmt.Sprintf(rshLong, fullName),
4756
Example: fmt.Sprintf(rshExample, fullName),
4857
Run: func(cmd *cobra.Command, args []string) {
49-
options.Command = []string{executable}
50-
cmdutil.CheckErr(RunRsh(options, f, cmd, args))
58+
switch {
59+
case forceTTY && disableTTY:
60+
kcmdutil.CheckErr(kcmdutil.UsageError(cmd, "you may not specify -t and -T together"))
61+
case forceTTY:
62+
options.TTY = true
63+
case disableTTY:
64+
options.TTY = false
65+
default:
66+
options.TTY = cmdutil.IsTerminal(in)
67+
}
68+
if len(args) < 1 {
69+
kcmdutil.CheckErr(kcmdutil.UsageError(cmd, "rsh requires a single Pod to connect to"))
70+
}
71+
options.PodName = args[0]
72+
args = args[1:]
73+
if len(args) > 0 {
74+
options.Command = args
75+
} else {
76+
options.Command = []string{executable}
77+
}
78+
79+
kcmdutil.CheckErr(RunRsh(options, f, cmd, args))
5180
},
5281
}
82+
cmd.Flags().BoolVarP(&forceTTY, "tty", "t", false, "Force a pseudo-terminal to be allocated")
83+
cmd.Flags().BoolVarP(&disableTTY, "no-tty", "T", false, "Disable pseudo-terminal allocation")
5384
cmd.Flags().StringVar(&executable, "shell", executable, "Path to shell command")
5485
cmd.Flags().StringVarP(&options.ContainerName, "container", "c", "", "Container name; defaults to first container")
86+
cmd.Flags().SetInterspersed(false)
5587
return cmd
5688
}
5789

5890
// RunRsh starts a remote shell session on the server
5991
func RunRsh(options *kubecmd.ExecOptions, f *clientcmd.Factory, cmd *cobra.Command, args []string) error {
60-
if len(args) != 1 {
61-
return cmdutil.UsageError(cmd, "rsh requires a single POD to connect to")
62-
}
63-
options.PodName = args[0]
64-
6592
_, client, err := f.Clients()
6693
if err != nil {
6794
return err

rel-eng/completions/bash/oc

+4
Original file line numberDiff line numberDiff line change
@@ -1008,7 +1008,11 @@ _oc_rsh()
10081008
two_word_flags+=("-c")
10091009
flags+=("--help")
10101010
flags+=("-h")
1011+
flags+=("--no-tty")
1012+
flags+=("-T")
10111013
flags+=("--shell=")
1014+
flags+=("--tty")
1015+
flags+=("-t")
10121016

10131017
must_have_one_flag=()
10141018
must_have_one_noun=()

rel-eng/completions/bash/openshift

+4
Original file line numberDiff line numberDiff line change
@@ -2583,7 +2583,11 @@ _openshift_cli_rsh()
25832583
two_word_flags+=("-c")
25842584
flags+=("--help")
25852585
flags+=("-h")
2586+
flags+=("--no-tty")
2587+
flags+=("-T")
25862588
flags+=("--shell=")
2589+
flags+=("--tty")
2590+
flags+=("-t")
25872591

25882592
must_have_one_flag=()
25892593
must_have_one_noun=()

0 commit comments

Comments
 (0)