??????????????
Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 173

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 174

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 175

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 176

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 177

Warning: Cannot modify header information - headers already sent by (output started at /home/mybf1/public_html/mentol.bf1.my/SS1.php:4) in /home/mybf1/public_html/mentol.bf1.my/SS1.php on line 178
 Udac@`sddlmZmZmZeZdZddlZddlZddl Z ddl Z ddl Z ddl Z ddl Z ddlZddlmZddlmZddlmZmZmZmZddlmZddlmZdd lmZmZmZdd l m!Z!dd l"m#Z#m$Z$m%Z%dd l&m'Z'm(Z(dd l)m*Z*m+Z+ddl,m-Z-ddl.m/Z/ddl0m1Z1m2Z2e/Z3ddfZ4e5a6defdYZ7e3dZ8dZ9de*fdYZ:dS(i(tabsolute_importtdivisiontprint_functionsy& connection: ssh short_description: connect via ssh client binary description: - This connection plugin allows ansible to communicate to the target machines via normal ssh command line. - Ansible does not expose a channel to allow communication between the user and the ssh process to accept a password manually to decrypt an ssh key when using this connection plugin (which is the default). The use of ``ssh-agent`` is highly recommended. author: ansible (@core) version_added: historical options: host: description: Hostname/ip to connect to. default: inventory_hostname vars: - name: ansible_host - name: ansible_ssh_host host_key_checking: description: Determines if ssh should check host keys type: boolean ini: - section: defaults key: 'host_key_checking' - section: ssh_connection key: 'host_key_checking' version_added: '2.5' env: - name: ANSIBLE_HOST_KEY_CHECKING - name: ANSIBLE_SSH_HOST_KEY_CHECKING version_added: '2.5' vars: - name: ansible_host_key_checking version_added: '2.5' - name: ansible_ssh_host_key_checking version_added: '2.5' password: description: Authentication password for the C(remote_user). Can be supplied as CLI option. vars: - name: ansible_password - name: ansible_ssh_pass - name: ansible_ssh_password ssh_args: description: Arguments to pass to all ssh cli tools default: '-C -o ControlMaster=auto -o ControlPersist=60s' ini: - section: 'ssh_connection' key: 'ssh_args' env: - name: ANSIBLE_SSH_ARGS vars: - name: ansible_ssh_args version_added: '2.7' ssh_common_args: description: Common extra args for all ssh CLI tools ini: - section: 'ssh_connection' key: 'ssh_common_args' version_added: '2.7' env: - name: ANSIBLE_SSH_COMMON_ARGS version_added: '2.7' vars: - name: ansible_ssh_common_args ssh_executable: default: ssh description: - This defines the location of the ssh binary. It defaults to ``ssh`` which will use the first ssh binary available in $PATH. - This option is usually not required, it might be useful when access to system ssh is restricted, or when using ssh wrappers to connect to remote hosts. env: [{name: ANSIBLE_SSH_EXECUTABLE}] ini: - {key: ssh_executable, section: ssh_connection} #const: ANSIBLE_SSH_EXECUTABLE version_added: "2.2" vars: - name: ansible_ssh_executable version_added: '2.7' sftp_executable: default: sftp description: - This defines the location of the sftp binary. It defaults to ``sftp`` which will use the first binary available in $PATH. env: [{name: ANSIBLE_SFTP_EXECUTABLE}] ini: - {key: sftp_executable, section: ssh_connection} version_added: "2.6" vars: - name: ansible_sftp_executable version_added: '2.7' scp_executable: default: scp description: - This defines the location of the scp binary. It defaults to `scp` which will use the first binary available in $PATH. env: [{name: ANSIBLE_SCP_EXECUTABLE}] ini: - {key: scp_executable, section: ssh_connection} version_added: "2.6" vars: - name: ansible_scp_executable version_added: '2.7' scp_extra_args: description: Extra exclusive to the ``scp`` CLI vars: - name: ansible_scp_extra_args env: - name: ANSIBLE_SCP_EXTRA_ARGS version_added: '2.7' ini: - key: scp_extra_args section: ssh_connection version_added: '2.7' sftp_extra_args: description: Extra exclusive to the ``sftp`` CLI vars: - name: ansible_sftp_extra_args env: - name: ANSIBLE_SFTP_EXTRA_ARGS version_added: '2.7' ini: - key: sftp_extra_args section: ssh_connection version_added: '2.7' ssh_extra_args: description: Extra exclusive to the 'ssh' CLI vars: - name: ansible_ssh_extra_args env: - name: ANSIBLE_SSH_EXTRA_ARGS version_added: '2.7' ini: - key: ssh_extra_args section: ssh_connection version_added: '2.7' retries: # constant: ANSIBLE_SSH_RETRIES description: Number of attempts to connect. default: 3 type: integer env: - name: ANSIBLE_SSH_RETRIES ini: - section: connection key: retries - section: ssh_connection key: retries vars: - name: ansible_ssh_retries version_added: '2.7' port: description: Remote port to connect to. type: int default: 22 ini: - section: defaults key: remote_port env: - name: ANSIBLE_REMOTE_PORT vars: - name: ansible_port - name: ansible_ssh_port remote_user: description: - User name with which to login to the remote server, normally set by the remote_user keyword. - If no user is supplied, Ansible will let the ssh client binary choose the user as it normally ini: - section: defaults key: remote_user env: - name: ANSIBLE_REMOTE_USER vars: - name: ansible_user - name: ansible_ssh_user pipelining: default: ANSIBLE_PIPELINING description: - Pipelining reduces the number of SSH operations required to execute a module on the remote server, by executing many Ansible modules without actual file transfer. - This can result in a very significant performance improvement when enabled. - However this conflicts with privilege escalation (become). For example, when using sudo operations you must first disable 'requiretty' in the sudoers file for the target hosts, which is why this feature is disabled by default. env: - name: ANSIBLE_PIPELINING #- name: ANSIBLE_SSH_PIPELINING ini: - section: defaults key: pipelining #- section: ssh_connection # key: pipelining type: boolean vars: - name: ansible_pipelining - name: ansible_ssh_pipelining private_key_file: description: - Path to private key file to use for authentication ini: - section: defaults key: private_key_file env: - name: ANSIBLE_PRIVATE_KEY_FILE vars: - name: ansible_private_key_file - name: ansible_ssh_private_key_file control_path: description: - This is the location to save ssh's ControlPath sockets, it uses ssh's variable substitution. - Since 2.3, if null, ansible will generate a unique hash. Use `%(directory)s` to indicate where to use the control dir path setting. env: - name: ANSIBLE_SSH_CONTROL_PATH ini: - key: control_path section: ssh_connection vars: - name: ansible_control_path version_added: '2.7' control_path_dir: default: ~/.ansible/cp description: - This sets the directory to use for ssh control path if the control path setting is null. - Also, provides the `%(directory)s` variable for the control path setting. env: - name: ANSIBLE_SSH_CONTROL_PATH_DIR ini: - section: ssh_connection key: control_path_dir vars: - name: ansible_control_path_dir version_added: '2.7' sftp_batch_mode: default: 'yes' description: 'TODO: write it' env: [{name: ANSIBLE_SFTP_BATCH_MODE}] ini: - {key: sftp_batch_mode, section: ssh_connection} type: bool vars: - name: ansible_sftp_batch_mode version_added: '2.7' scp_if_ssh: default: smart description: - "Prefered method to use when transfering files over ssh" - When set to smart, Ansible will try them until one succeeds or they all fail - If set to True, it will force 'scp', if False it will use 'sftp' env: [{name: ANSIBLE_SCP_IF_SSH}] ini: - {key: scp_if_ssh, section: ssh_connection} vars: - name: ansible_scp_if_ssh version_added: '2.7' use_tty: version_added: '2.5' default: 'yes' description: add -tt to ssh commands to force tty allocation env: [{name: ANSIBLE_SSH_USETTY}] ini: - {key: usetty, section: ssh_connection} type: bool vars: - name: ansible_ssh_use_tty version_added: '2.7' N(twraps(t constants(tAnsibleAuthenticationFailuretAnsibleConnectionFailuret AnsibleErrortAnsibleFileNotFound(tAnsibleOptionsError(t selectors(tPY3t text_typet binary_type(t shlex_quote(tto_bytest to_nativetto_text(tBOOLEANStboolean(tConnectionBasetBUFSIZE(t _parse_clixml(tDisplay(t unfrackpatht makedirs_safes"Traceback (most recent call last):sPHP Parse error:t$AnsibleControlPersistBrokenPipeErrorcB`seZdZRS(s ControlPersist broken pipe (t__name__t __module__t__doc__(((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyR9sc C`s|dkr|ddkrdj|}|dkr@d}n|rXdj|}n"dj|t|dj}t|q|ddkrd }|rdj|}qdj|t|dj}qn|ddkrxt}x(tD] }||d krt}PqqW|rxd}|rDdj|}n"dj|t|dj}t|qxnd |dkodknrd}|rdj|}n"dj|t|dj}|j |d|ndS(Ntsshpassiis_Invalid/incorrect username/password. Skipping remaining {0} retries to prevent account lockout:sInvalid/incorrect password:s"{0} s{0} {1}iiiiissshpass error:is&Failed to connect to the host via ssh:iu&Failed to connect to the host via ssh:u"{0} u{0} {1}thost(iiiii( tformatRtrstripRtTruetb_NOT_SSH_ERRORStFalseRRtvvv( tremaining_retriestcommandt return_tupletno_logRtdisplaytmsgt SSH_ERRORt signature((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyt _handle_error>s@   "( " "c`stfd}|S(s+ Decorator to retry ssh/scp/sftp in the case of a connection failure Will retry if: * an exception is caught * ssh returns 255 Will not retry if * sshpass returns 5 (invalid password, to prevent account lockouts) * remaining_tries is < 2 * retries limit reached c `sttjd}dt|d}xut|D]g}|d}|dkr|jjrt|trt j |_ dt |j ddddd|dt ConnectioncB`seZdZdZeZdZdZee e dZ edZ edZ dZ dZd Zed Zd Zeed Zeeed ZedZdZe edZdZdZdZdZRS(s ssh based connections tsshcO`stt|j|||jj|_|jj|_|jj|_t j |_ t j |_ t|jdtrt|_t|_d|_t|_ndS(Nt _IS_WINDOWSs.ps1s.exet(s.ps1s.exeRQ(tsuperRNt__init__R7t remote_addrRtportt remote_usertuserR4tANSIBLE_SSH_CONTROL_PATHt control_pathtANSIBLE_SSH_CONTROL_PATH_DIRtcontrol_path_dirtgetattrt_shellR$R"thas_native_asynctalways_pipeline_modulest!module_implementation_preferencestallow_executable(RBRCRD((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyRSs     cC`s|S(N((RB((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyt_connectsc C`sd|||f}|r*|d|7}n|rG|dt|7}ntj}|jt||j}d|d }|S(s7Make a hash for the controlpath based on con attributess%s-%s-%ss-%ss%(directory)s/i (Rthashlibtsha1tupdateRt hexdigest( RRURWt connectiontpidtpstringtmtdigesttcpath((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyt_create_control_paths  cC`sntdkrjyAtjdgdtjdtjdtj}|jtaWqjtk rftaqjXntS(NRtstdintstdouttstderr( tSSHPASS_AVAILABLEtNonet subprocesstPopentPIPEt communicateR"tOSErrorR$(tp((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyt_sshpass_availables -    cC`s[t}t}xBd|DD]0}d|kr8t}qd|krt}qqW||fS(s Takes a command array and scans it for ControlPersist and ControlPath settings and returns two booleans indicating whether either was found. This could be smarter, e.g. returning false if ControlPersist is 'no', but for now we do it simple way. cs`s|]}|jVqdS(N(tlower(t.0ta((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pys stcontrolpersistt controlpath(R$R"(t b_commandR}R~tb_arg((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyt_persistence_controlss     cC`sDtjd|djd|Dfd|jj||7}dS(s Adds arguments to the ssh command and displays a caller-supplied explanation of why. :arg b_command: A list containing the command to add the new arguments to. This list will be modified by this method. :arg b_args: An iterable of new arguments to add. This iterable is used more than once so it must be persistent (ie: a list is okay but a StringIO would not) :arg explanation: A text string containing explaining why the arguments were added. It will be displayed with a high enough verbosity. .. note:: This function does its work via side-effect. The b_command list has the new arguments appended. u SSH: %s: (%s)s)(cs`s|]}t|VqdS(N(R(R{R|((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pys sRN(R*tvvvvvtjoinR7RT(RBRtb_argst explanation((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyt _add_argss 6c G`sg}|jjrl|js-tdntj|_|ddt|jdddddg7}n|d kr|t|jjddg7}n|t|ddg7}|d kr t j r |jjrd d g}|j ||d n|ddg7}n|jj dkr+|j dn|jjrg|j|jjD]}t|dd^qM}|j ||dnt jsd*}|j ||dn|jjd+k rd dt|jjddddf}|j ||dn|jj}|rJd dttjj|dddf}|j ||dn|jjsl|j |d,dn|jj}|r|j |d dt|jjddfdn|j |d d t|jjddddfd!xd"d#j|fD]o}t|j|d+} | d+k rg|j| D]}t|dd^q2}|j ||d$|qqW|j|\} } | rft|_| sft|j} t| dd} t| d%tj | tj!std&t"| n|j#s!|j$|j%|j|j&|_#nd d't|j#t'd(| ddf}|j ||d)qfn|r|g|D]}t|^qv7}n|S(-s Takes a binary (ssh, scp, sftp) and optional extra arguments and returns a command line as an array that can be passed to subprocess.Popen. sUto use the 'ssh' connection type with passwords, you must install the sshpass programRs-diR/R0R1R2ROtsftps-os BatchMode=noudisable batch mode for sshpasss-bt-is-vvvuansible.cfg set ssh_argssStrictHostKeyChecking=nou4ANSIBLE_HOST_KEY_CHECKING/host_key_checking disabledsPort=u0ANSIBLE_REMOTE_PORT/remote_port/ansible_port setsIdentityFile="t"uJANSIBLE_PRIVATE_KEY_FILE/private_key_file/ansible_ssh_private_key_file setsKbdInteractiveAuthentication=nosIPreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickeysPasswordAuthentication=nou-ansible_password/ansible_ssh_password not sets User="%s"u8ANSIBLE_REMOTE_USER/remote_user/ansible_user/user/-u setsConnectTimeout=uANSIBLE_TIMEOUT/timeout setussh_common_argsu{0}_extra_argsuPlayContext set %sisCannot write to ControlPath %ss ControlPath=t directoryu,found only ControlPersist; added ControlPath(s-osStrictHostKeyChecking=noN(s-osKbdInteractiveAuthentication=nos-osIPreferredAuthentications=gssapi-with-mic,gssapi-keyex,hostbased,publickeys-osPasswordAuthentication=no((R7R8RyRR;R<R=Rtssh_executableR4tDEFAULT_SFTP_BATCH_MODERt verbositytappendtssh_argst_split_ssh_argstHOST_KEY_CHECKINGRURrtprivate_key_filetpatht expanduserRVttimeoutR R\RR"t _persistentRR[RtaccesstW_OKRRYRmRRWtdict(RBtbinaryt other_argsRRR|tkeyRWtopttattrR}R~tcpdirtb_cpdir((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyt_build_commands  0 "    1 ( ,    % .   ,&cC`stjdy!|jt||jWnpttfk r}tjd|j t |dddkrt d|j t|fd|qnXtjdt|dS(s Writes initial data to the stdin filehandle of the subprocess and closes it. (The handle must be closed; otherwise, for example, "sftp -b -" will just hang forever waiting for more commands.) uSending initial datagMbP?t returncodes[Data could not be sent to remote host "%s". Make sure this host can be reached over ssh: %storig_excuSent initial data (%d bytes)N(R*tdebugtwriteRtcloseRwtIOErrorR@RAtpollR\RrRRRtlen(RBtfhtin_datat ssh_processRI((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyt_send_initial_datas   &cC`s,y|jWnttfk r'nXdS(s& Terminate a process, ignoring errors N(t terminateRwR(Rx((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyt_terminate_processsc C`sg}xk|jtD]Z}t|jd}t}|jjr|jj|rtj d|||ft|j dt'|j(d<| d 7} q |j(dr | d 7} q n| | dkr9|j(drOtjd"t'|j(d<| d 7} q9|j(drtjd#|j7|t'|j(dsu SSH: EXEC {0}RRnRoRptpass_fdstwbiis tawaiting_prompttawaiting_escalationt ready_to_sendt awaiting_exitRtpromptuInitial state: %s: %sRQRRRRis9Timeout (%ds) waiting for privilege escalation prompt: %su"stdout chunk (state=%s): >>>%s<<< s"stderr chunk (state=%s): >>>%s<<< u-Sending become_password in response to promptt become_passt playcontextR1R2uEscalation succeededuEscalation failedsIncorrect %s passworduEscalation requires passwordsMissing %s passworduEscalation prompt repeatedNRisUsing a SSH password instead of a key is not possible because Host Key checking is enabled and sshpass does not support this. Please add this host's fingerprint to your known_hosts file to manage this host.s(Bad configuration option: ControlPersists,unknown configuration option: ControlPersistsusing -c ssh on certain older ssh versions may not support ControlPersist, set ANSIBLE_SSH_ARGS="" (or ssh_args in [ssh_connection] section of the config file) before running agains4mux_client_hello_exchange: write packet: Broken pipeis@Data could not be sent because of ControlPersist broken pipe: %ss[Data could not be sent to remote host "%s". Make sure this host can be reached over ssh: %s(GRR*R%R RRrR9R R RR:tmaptptytopenptyR R7R8RsRtRuR=R;tfdopenRRwRRnRterrnotEPIPERtindext get_optionR\RRRRRR$RRRoRptfcntltF_SETFLtF_GETFLt O_NONBLOCKR tDefaultSelectortregistert EVENT_READRR"tselectRRRtfileobjtreadt unregisterRtflushtnametget_maptwaitR4RRRR( RBRHRRtcheckrct display_cmdRxtmastertslaveRnRItstatesRRtb_stdouttb_stderrt b_tmp_stdoutt b_tmp_stderrRtfdtselectorRteventsRteventRtb_outputt b_unprocessedRtcontrolpersisterrortcontrolpersist_broken_pipet additional((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyt _bare_runs,3' 6*  +$  !$-   0      "      $"  "                                       cC`s|j||d|d|S(s=Wrapper around _bare_run that retries the connection RR(R(RBRHRRR((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyt_runsc C`sTd|j}dddg}t|jdtrA|jdng}|jj}|dk r|d#krztdn|dkr|}q4|g}nt j }t |t s|j }|tkrt|dt}q|dkrtd qn|dkr|}n!|tkr+dg}n dg}x|D]} d} } } | dkr|j|jd t|} d j|t|t|}t|d d }|j| |dt\} } } n| dkr|jd}|dkr*|j|dj||jj||} n-|j||dj||jj|} d}|j| |dt\} } } n| dkrz|dkr|jd|tfdt\} } } tt|ddd}|j| WdQXqztt|ddd}t|jd d }WdQX|s@d}nd}|jd|t|fd|dt\} } } n| dkr| | | fSt|dkr;tjd| |ftj dt!| tj dt!| q;q;W| d krt"d!| t#| fn4t$d"t#|t#|t#| t#| fdS($Ns[%s]RtscptpipedRPtsmarts9transfer_method needs to be one of [smart|sftp|scp|piped]tstricts0scp_if_ssh needs to be one of [smart|True|False]tsftp_executableu {0} {1} {2} R/tpassthruRtscp_executabletgetu{0}:{1}sdd if=%s bs=%sRR1R2swb+trbs count=0RQsdd of=%s bs=%s%sRiiuS%s transfer mechanism failed on %s. Use ANSIBLE_DEBUG=1 to see detailed informationu%sis(Failed to connect to the host via %s: %ss'failed to transfer file to %s %s: %s %s(RssftpsscpR(%RR\R]R$tremoveR7tssh_transfer_methodRrR R4tDEFAULT_SCP_IF_SSHR9tboolRzRRR"RRRR RRtquotet exec_commandRtopenRRRR*twarningRRRRR(RBtin_pathtout_patht sftp_actionRt smart_methodstmethodsRt scp_if_sshtmethodRRoRpRHRRtout_filetftcount((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyt_file_transport_commandsv                  !!$  0-$  ( 4   cC`s;d}tjd|r!d}nd||jddfS(sA converts a Windows path to one that's supported by SFTP and SCP RQs^\w{1}:t/s%s%ss\(tretmatchtreplace(RBRtprefix((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyt_escape_win_pathws c C`stt|j|d|d|tjdj|jjd|jjt |j dt rt }dd|j j |j j g}|j|j j|dtd t d t d j|}n|jj}|jd }| r|r|r|d |j|f}n||j|f}|j|}|j||d|\}} } t |j dt r{| jdr{t| } n|| | fS(s" run a command on the remote host RRu&ESTABLISH SSH CONNECTION FOR USER: {0}RRPschcp.comt65001tas_listt strict_modet preserve_rct tuse_ttys-tts #< CLIXML(RRRNR R*R%R R7RVRTR\R]R$t_SHELL_REDIRECT_ALLNULLt _SHELL_ANDtextendt_encode_scriptR"RRRRRRt startswithR( RBRHRRt cmd_partsRR$RCRRoRp((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyR s""(+ !$cC`stt|j||tjdj||d|jtjj t |ddswt djt |nt |jdtr|j|}n|j||dS(s& transfer a file from local to remote uPUT {0} TO {1}RR1R2s"file or module does not exist: {0}RPtput(RRRNtput_fileR*R%R RR;RtexistsRRRR\R]R$RR(RBRR((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyR,s"cC`sutt|j||tjdj||d|jt|jdt rb|j |}n|j ||dS(s# fetch a file from remote to local uFETCH {0} TO {1}RRPR( RRRNt fetch_fileR*R%R RR\R]R$RR(RBRR((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyR.s "c C`s_|j|jjdd|j}|j|\}}g|D]}|jdr=|^q=}t}|rt|dkr|djddd}t j j |rt }qn|rt }n|rQt jdt|tj|d tjd tjd tj}|j\} } |j} | dkrQt jd t| qQn|jdS( Ns-Otstops ControlPath=it=iiusending stop: %sRnRoRpuFailed to reset connection:%s(RR7RRRR)R$RtsplitR;RR-R"R*R%RRsRtRuRvRR R( RBRHR}R~R|tcp_argt run_resettcp_pathRxRoRpt status_code((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pytresets$!(  *  cC`s t|_dS(N(R$t _connected(RB((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyRs(RRRt transportR"thas_pipeliningRSRbt staticmethodRrRmRyRRRRRRRRMRRRR R,R.R6R(((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyRNs2      ."X ,  (;t __future__RRRttypet __metaclass__t DOCUMENTATIONRRRcR;RRRsR@t functoolsRtansibleRR4tansible.errorsRRRRR tansible.module_utils.compatR tansible.module_utils.sixR R R tansible.module_utils.six.movesRtansible.module_utils._textRRRt)ansible.module_utils.parsing.convert_boolRRtansible.plugins.connectionRRt ansible.plugins.shell.powershellRtansible.utils.displayRtansible.utils.pathRRR*R#RrRqRR.RMRN(((sB/usr/lib/python2.7/site-packages/ansible/plugins/connection/ssh.pyts@         "   1 M