225 lines
7.3 KiB
Plaintext
225 lines
7.3 KiB
Plaintext
|
The py.execnet library
|
||
|
======================
|
||
|
|
||
|
.. contents::
|
||
|
.. sectnum::
|
||
|
|
||
|
A new view on distributed execution
|
||
|
-----------------------------------
|
||
|
|
||
|
``py.execnet`` supports ad-hoc distribution of parts of
|
||
|
a program across process and network barriers. *Ad-hoc*
|
||
|
means that the client side may completely control
|
||
|
|
||
|
* which parts of a program execute remotely and
|
||
|
|
||
|
* which data protocols are used between them
|
||
|
|
||
|
without requiring any prior manual installation
|
||
|
of user program code on the remote side. In fact,
|
||
|
not even a prior installation of any server code
|
||
|
is required, provided there is a way to get
|
||
|
an input/output connection to a python interpreter
|
||
|
(for example via "ssh" and a "python" executable).
|
||
|
|
||
|
By comparison, traditional Remote Method Based (RMI)
|
||
|
require prior installation and manual rather
|
||
|
heavy processes of setup, distribution and
|
||
|
communication between program parts.
|
||
|
|
||
|
|
||
|
What about Security? Are you completely nuts?
|
||
|
---------------------------------------------
|
||
|
|
||
|
We'll talk about that later :-)
|
||
|
|
||
|
Basic Features
|
||
|
==============
|
||
|
|
||
|
With ''py.execnet'' you get the means
|
||
|
|
||
|
- to navigate through the network with Process, Thread, SSH
|
||
|
and Socket- gateways that allow you ...
|
||
|
|
||
|
- to distribute your program across a network and define
|
||
|
communication protocols from the client side, making
|
||
|
server maintenance superflous. In fact, there is no such
|
||
|
thing as a server. It's just another computer ... if it
|
||
|
doesn't run in a kernel-level jail [#]_ in which case
|
||
|
even that is virtualized.
|
||
|
|
||
|
|
||
|
Available Gateways/Connection methods
|
||
|
-----------------------------------------
|
||
|
|
||
|
You may use one of the following connection methods:
|
||
|
|
||
|
* :api:`py.execnet.PopenGateway` a subprocess on the local
|
||
|
machine. Useful for jailing certain parts of a program
|
||
|
or for making use of multiple processors.
|
||
|
|
||
|
* :api:`py.execnet.SshGateway` a way to connect to
|
||
|
a remote ssh server and distribute execution to it.
|
||
|
|
||
|
* :api:`py.execnet.SocketGateway` a way to connect to
|
||
|
a remote Socket based server. *Note* that this method
|
||
|
requires a manually started
|
||
|
:source:py/execnet/script/socketserver.py
|
||
|
script. You can run this "server script" without
|
||
|
having the py lib installed on that remote system.
|
||
|
|
||
|
Remote execution approach
|
||
|
-------------------------------------
|
||
|
|
||
|
All gateways offer one main high level function:
|
||
|
|
||
|
def remote_exec(source):
|
||
|
"""return channel object for communicating with the asynchronously
|
||
|
executing 'source' code which will have a corresponding 'channel'
|
||
|
object in its executing namespace."""
|
||
|
|
||
|
With `remote_exec` you send source code to the other
|
||
|
side and get both a local and a remote Channel_ object,
|
||
|
which you can use to have the local and remote site
|
||
|
communicate data in a structured way. Here is
|
||
|
an example:
|
||
|
|
||
|
>>> import py
|
||
|
>>> gw = py.execnet.PopenGateway()
|
||
|
>>> channel = gw.remote_exec("""
|
||
|
... import os
|
||
|
... channel.send(os.getpid())
|
||
|
... """)
|
||
|
>>> remote_pid = channel.receive()
|
||
|
>>> remote_pid != py.std.os.getpid()
|
||
|
True
|
||
|
|
||
|
`remote_exec` implements the idea to ``determine
|
||
|
protocol and remote code from the client/local side``.
|
||
|
This makes distributing a program run in an ad-hoc
|
||
|
manner (using e.g. :api:`py.execnet.SshGateway`) very easy.
|
||
|
|
||
|
You should not need to maintain software on the other sides
|
||
|
you are running your code at, other than the Python
|
||
|
executable itself.
|
||
|
|
||
|
.. _`Channel`:
|
||
|
.. _`channel-api`:
|
||
|
.. _`exchange data`:
|
||
|
|
||
|
The **Channel** interface for exchanging data across gateways
|
||
|
-------------------------------------------------------------
|
||
|
|
||
|
While executing custom strings on "the other side" is simple enough
|
||
|
it is often tricky to deal with. Therefore we want a way
|
||
|
to send data items to and fro between the distributedly running
|
||
|
program. The idea is to inject a Channel object for each
|
||
|
execution of source code. This Channel object allows two
|
||
|
program parts to send data to each other.
|
||
|
Here is the current interface::
|
||
|
|
||
|
#
|
||
|
# API for sending and receiving anonymous values
|
||
|
#
|
||
|
channel.send(item):
|
||
|
sends the given item to the other side of the channel,
|
||
|
possibly blocking if the sender queue is full.
|
||
|
Note that items need to be marshallable (all basic
|
||
|
python types are):
|
||
|
|
||
|
channel.receive():
|
||
|
receives an item that was sent from the other side,
|
||
|
possibly blocking if there is none.
|
||
|
Note that exceptions from the other side will be
|
||
|
reraised as gateway.RemoteError exceptions containing
|
||
|
a textual representation of the remote traceback.
|
||
|
|
||
|
channel.waitclose(timeout=None):
|
||
|
wait until this channel is closed. Note that a closed
|
||
|
channel may still hold items that will be received or
|
||
|
send. Note that exceptions from the other side will be
|
||
|
reraised as gateway.RemoteError exceptions containing
|
||
|
a textual representation of the remote traceback.
|
||
|
|
||
|
channel.close():
|
||
|
close this channel on both the local and the remote side.
|
||
|
A remote side blocking on receive() on this channel
|
||
|
will get woken up and see an EOFError exception.
|
||
|
|
||
|
|
||
|
The complete Fileserver example
|
||
|
........................................
|
||
|
|
||
|
problem: retrieving contents of remote files::
|
||
|
|
||
|
import py
|
||
|
contentserverbootstrap = py.code.Source(
|
||
|
"""
|
||
|
for fn in channel:
|
||
|
f = open(fn, 'rb')
|
||
|
try:
|
||
|
channel.send(f.read())
|
||
|
finally:
|
||
|
f.close()
|
||
|
""")
|
||
|
# open a gateway to a fresh child process
|
||
|
contentgateway = py.execnet.SshGateway('codespeak.net')
|
||
|
channel = contentgateway.remote_exec(contentserverbootstrap)
|
||
|
|
||
|
for fn in somefilelist:
|
||
|
channel.send(fn)
|
||
|
content = channel.receive()
|
||
|
# process content
|
||
|
|
||
|
# later you can exit / close down the gateway
|
||
|
contentgateway.exit()
|
||
|
|
||
|
|
||
|
A more complicated "nested" Gateway Example
|
||
|
...........................................
|
||
|
|
||
|
The following example opens a PopenGateway, i.e. a python
|
||
|
child process, starts a socket server within that process and
|
||
|
then opens a SocketGateway to the freshly started
|
||
|
socketserver. Thus it forms a "triangle"::
|
||
|
|
||
|
|
||
|
CLIENT < ... > PopenGateway()
|
||
|
< .
|
||
|
. .
|
||
|
. .
|
||
|
. .
|
||
|
> SocketGateway()
|
||
|
|
||
|
The below "socketserver" mentioned script is a small script that
|
||
|
basically listens and accepts socket connections, receives one
|
||
|
liners and executes them.
|
||
|
|
||
|
Here are 20 lines of code making the above triangle happen::
|
||
|
|
||
|
import py
|
||
|
port = 7770
|
||
|
socketserverbootstrap = py.code.Source(
|
||
|
mypath.dirpath().dirpath('bin', 'socketserver.py').read(),
|
||
|
"""
|
||
|
import socket
|
||
|
sock = bind_and_listen(("localhost", %r))
|
||
|
channel.send("ok")
|
||
|
startserver(sock)
|
||
|
""" % port)
|
||
|
# open a gateway to a fresh child process
|
||
|
proxygw = py.execnet.PopenGateway()
|
||
|
|
||
|
# execute asynchronously the above socketserverbootstrap on the other
|
||
|
channel = proxygw.remote_exec(socketserverbootstrap)
|
||
|
|
||
|
# the other side should start the socket server now
|
||
|
assert channel.receive() == "ok"
|
||
|
gw = py.execnet.SocketGateway('localhost', cls.port)
|
||
|
print "initialized socket gateway to port", cls.port
|
||
|
|
||
|
.. [#] There is an interesting emerging `Jail`_ linux technology
|
||
|
as well as a host of others, of course.
|
||
|
|
||
|
.. _`Jail`: http://books.rsbac.org/unstable/x2223.html
|