context¶
-
class
invoke.context.Context(config=None)¶ Context-aware API wrapper & state-passing object.
Contextobjects are created during command-line parsing (or, if desired, by hand) and used to share parser and configuration state with executed tasks (see Aside: what exactly is this ‘context’ anyway?).Specifically, the class offers wrappers for core API calls (such as
run) which take into account CLI parser flags, configuration files, and/or changes made at runtime. It also acts as a proxy for itsconfigattribute - see that attribute’s documentation for details.Instances of
Contextmay be shared between tasks when executing sub-tasks - either the same context the caller was given, or an altered copy thereof (or, theoretically, a brand new one).-
__init__(config=None)¶ Parameters: config – Configobject to use as the base configuration.Defaults to an anonymous/default
Configinstance.
-
cd(*args, **kwds)¶ Context manager that keeps directory state when executing commands.
Any calls to
run,sudo, within the wrapped block will implicitly have a string similar to"cd <path> && "prefixed in order to give the sense that there is actually statefulness involved.Because use of
cdaffects all such invocations, any code making use of thecwdproperty will also be affected by use ofcd.Like the actual ‘cd’ shell builtin,
cdmay be called with relative paths (keep in mind that your default starting directory is your user’s$HOME) and may be nested as well.Below is a “normal” attempt at using the shell ‘cd’, which doesn’t work since all commands are executed in individual subprocesses – state is not kept between invocations of
runorsudo:ctx.run('cd /var/www') ctx.run('ls')
The above snippet will list the contents of the user’s
$HOMEinstead of/var/www. Withcd, however, it will work as expected:with ctx.cd('/var/www'): ctx.run('ls') # Turns into "cd /var/www && ls"
Finally, a demonstration (see inline comments) of nesting:
with cd('/var/www'): run('ls') # cd /var/www && ls with cd('website1'): run('ls') # cd /var/www/website1 && ls
Note
Space characters will be escaped automatically to make dealing with such directory names easier.
-
config¶ The fully merged
Configobject appropriate for this context.Configsettings (see their documentation for details) may be accessed like dictionary keys (ctx.config['foo']) or object attributes (ctx.config.foo).As a convenience shorthand, the
Contextobject proxies to itsconfigattribute in the same way - e.g.ctx['foo']orctx.fooreturns the same value asctx.config['foo'].
-
prefix(*args, **kwds)¶ Prefix all nested
run/sudocommands with given command plus&&.Most of the time, you’ll want to be using this alongside a shell script which alters shell state, such as ones which export or alter shell environment variables.
For example, one of the most common uses of this tool is with the
workoncommand from virtualenvwrapper:with ctx.prefix('workon myvenv'): ctx.run('./manage.py migrate')
In the above snippet, the actual shell command run would be this:
$ workon myvenv && ./manage.py migrate
This context manager is compatible with
cd, so if your virtualenv doesn’tcdin itspostactivatescript, you could do the following:with ctx.cd('/path/to/app'): with ctx.prefix('workon myvenv'): ctx.run('./manage.py migrate') ctx.run('./manage.py loaddata fixture')
Which would result in executions like so:
$ cd /path/to/app && workon myvenv && ./manage.py migrate $ cd /path/to/app && workon myvenv && ./manage.py loaddata fixture
Finally, as alluded to above,
prefixmay be nested if desired, e.g.:with ctx.prefix('workon myenv'): ctx.run('ls') with ctx.prefix('source /some/script'): ctx.run('touch a_file')
The result:
$ workon myenv && ls $ workon myenv && source /some/script && touch a_file
Contrived, but hopefully illustrative.
-
run(command, **kwargs)¶ Execute a local shell command, honoring config options.
Specifically, this method instantiates a
Runnersubclass (according to therunnerconfig option; default isLocal) and calls its.runmethod withcommandandkwargs.See
Runner.runfor details oncommandand the available keyword arguments.
-
sudo(command, **kwargs)¶ Execute a shell command, via
sudo.Basics
In general, this method is identical to
run, but adds a handful of convenient behaviors around invoking thesudoprogram. It doesn’t do anything users could not do themselves by wrappingrun, but the use case is too common to make users reinvent these wheels themselves.Specifically,
sudo:Places a
FailingResponderinto thewatcherskwarg (see Automatically responding to program output) which:- searches for the configured
sudopassword prompt; - responds with the configured sudo password (
sudo.passwordfrom the configuration); - can tell when that response causes an authentication failure
(e.g. if the system requires a password and one was not
configured), and raises
AuthFailureif so.
- searches for the configured
Builds a
sudocommand string using the suppliedcommandargument, prefixed by various flags (see below);Executes that command via a call to
run, returning the result.
Flags used
sudoflags used under the hood include:-Sto allow auto-responding of password via stdin;-p <prompt>to explicitly state the prompt to use, so we can be sure our auto-responder knows what to look for;-u <user>ifuseris notNone, to execute the command as a user other thanroot;- When
-uis present,-His also added, to ensure the subprocess has the requested user’s$HOMEset properly.
Configuring behavior
There are a couple of ways to change how this method behaves:
Because it wraps
run, it honors allrunconfig parameters and keyword arguments, in the same way thatrundoes.- Thus, invocations such as
c.sudo('command', echo=True)are possible, and if a config layer (such as a config file or env var) specifies that e.g.run.warn = True, that too will take effect undersudo.
- Thus, invocations such as
sudohas its own set of keyword arguments (see below) and they are also all controllable via the configuration system, under thesudo.*tree.- Thus you could, for example, pre-set a sudo user in a config
file; such as an
invoke.jsoncontaining{"sudo": {"user": "someuser"}}.
- Thus you could, for example, pre-set a sudo user in a config
file; such as an
Parameters:
-
-
class
invoke.context.MockContext(config=None, **kwargs)¶ A
Contextwhose methods’ return values can be predetermined.Primarily useful for testing Invoke-using codebases.
Note
Methods not given
Resultsto yield will raiseNotImplementedErrorif called (since the alternative is to call the real underlying method - typically undesirable when mocking.)-
__init__(config=None, **kwargs)¶ Create a
Context-like object whose methods yieldResultobjects.Parameters: - config – A Configuration object to use. Identical in behavior to
Context. - run –
A data structure of
Results, to return from calls to the instantiated object’srunmethod (instead of actually executing the requested shell command).Specifically, this kwarg accepts:
- sudo – Identical to
run, but whose values are yielded from calls tosudo.
Raises: TypeError, if the values given torunor other kwargs aren’t individualResultobjects or iterables.- config – A Configuration object to use. Identical in behavior to
-
set_result_for(attname, command, result)¶ Modify the stored mock results for given
attname(e.g.run).This is similar to how one instantiates
MockContextwith arunorsudodict kwarg. For example, this:mc = MockContext(run={'mycommand': Result("mystdout")}) assert mc.run('mycommand').stdout == "mystdout"
is functionally equivalent to this:
mc = MockContext() mc.set_result_for('run', 'mycommand', Result("mystdout")) assert mc.run('mycommand').stdout == "mystdout"
set_result_foris mostly useful for modifying an already-instantiatedMockContext, such as one created by test setup or helper methods.
-