Mini Shell
"""
Utility functions for salt.cloud
"""
import codecs
import copy
import errno
import hashlib
import logging
import multiprocessing
import os
import re
import shlex
import shutil
import socket
import stat
import subprocess
import tempfile
import time
import traceback
import uuid
from jinja2 import Template
import salt.client
import salt.cloud
import salt.config
import salt.crypt
import salt.loader
import salt.template
import salt.utils.compat
import salt.utils.crypt
import salt.utils.data
import salt.utils.event
import salt.utils.files
import salt.utils.msgpack
import salt.utils.path
import salt.utils.platform
import salt.utils.stringutils
import salt.utils.versions
import salt.utils.vt
import salt.utils.yaml
from salt.exceptions import (
SaltCloudConfigError,
SaltCloudException,
SaltCloudExecutionFailure,
SaltCloudExecutionTimeout,
SaltCloudPasswordError,
SaltCloudSystemExit,
)
from salt.utils.nb_popen import NonBlockingPopen
from salt.utils.validate.path import is_writeable
try:
import salt.utils.smb
HAS_SMB = True
except ImportError:
HAS_SMB = False
try:
from pypsexec.client import Client as PsExecClient
from pypsexec.exceptions import SCMRException
from pypsexec.scmr import Service as ScmrService
from smbprotocol.exceptions import CannotDelete, SMBResponseException
from smbprotocol.tree import TreeConnect
logging.getLogger("smbprotocol").setLevel(logging.WARNING)
logging.getLogger("pypsexec").setLevel(logging.WARNING)
HAS_PSEXEC = True
except ImportError:
HAS_PSEXEC = False
# Set the minimum version of PyWinrm.
WINRM_MIN_VER = "0.3.0"
try:
# Verify WinRM 0.3.0 or greater
import pkg_resources # pylint: disable=3rd-party-module-not-gated
import winrm
from winrm.exceptions import WinRMTransportError
winrm_pkg = pkg_resources.get_distribution("pywinrm")
if not salt.utils.versions.compare(winrm_pkg.version, ">=", WINRM_MIN_VER):
HAS_WINRM = False
else:
HAS_WINRM = True
except ImportError:
HAS_WINRM = False
# Let's import pwd and catch the ImportError. We'll raise it if this is not
# Windows. This import has to be below where we import salt.utils.platform!
try:
import pwd
except ImportError:
if not salt.utils.platform.is_windows():
raise
try:
import getpass
HAS_GETPASS = True
except ImportError:
HAS_GETPASS = False
# This is required to support international characters in AWS EC2 tags or any
# other kind of metadata provided by particular Cloud vendor.
MSGPACK_ENCODING = "utf-8"
NSTATES = {
0: "running",
1: "rebooting",
2: "terminated",
3: "pending",
}
SSH_PASSWORD_PROMP_RE = re.compile(r"(?:.*)[Pp]assword(?: for .*)?:\ *$", re.M)
SSH_PASSWORD_PROMP_SUDO_RE = re.compile(
r"(?:.*sudo)(?:.*)[Pp]assword(?: for .*)?:", re.M
)
SERVER_ALIVE_INTERVAL = 60
SERVER_ALIVE_COUNT_MAX = 3
# Get logging started
log = logging.getLogger(__name__)
def __render_script(path, vm_=None, opts=None, minion=""):
"""
Return the rendered script
"""
log.info("Rendering deploy script: %s", path)
try:
with salt.utils.files.fopen(path, "r") as fp_:
template = Template(salt.utils.stringutils.to_unicode(fp_.read()))
return str(template.render(opts=opts, vm=vm_, minion=minion))
except AttributeError:
# Specified renderer was not found
with salt.utils.files.fopen(path, "r") as fp_:
return str(fp_.read())
def __ssh_gateway_config_dict(gateway):
"""
Return a dictionary with gateway options. The result is used
to provide arguments to __ssh_gateway_arguments method.
"""
extended_kwargs = {}
if gateway:
extended_kwargs["ssh_gateway"] = gateway["ssh_gateway"]
extended_kwargs["ssh_gateway_key"] = gateway["ssh_gateway_key"]
extended_kwargs["ssh_gateway_user"] = gateway["ssh_gateway_user"]
extended_kwargs["ssh_gateway_command"] = gateway["ssh_gateway_command"]
return extended_kwargs
def __ssh_gateway_arguments(kwargs):
"""
Return ProxyCommand configuration string for ssh/scp command.
All gateway options should not include quotes (' or "). To support
future user configuration, please make sure to update the dictionary
from __ssh_gateway_config_dict and get_ssh_gateway_config (ec2.py)
"""
extended_arguments = ""
ssh_gateway = kwargs.get("ssh_gateway", "")
ssh_gateway_port = 22
if ":" in ssh_gateway:
ssh_gateway, ssh_gateway_port = ssh_gateway.split(":")
ssh_gateway_command = kwargs.get("ssh_gateway_command", "nc -q0 %h %p")
if ssh_gateway:
ssh_gateway_port = kwargs.get("ssh_gateway_port", ssh_gateway_port)
ssh_gateway_key = (
"-i {}".format(kwargs["ssh_gateway_key"])
if "ssh_gateway_key" in kwargs
else ""
)
ssh_gateway_user = kwargs.get("ssh_gateway_user", "root")
# Setup ProxyCommand
extended_arguments = " ".join(
(
"ssh",
"-oStrictHostKeyChecking=no",
"-oServerAliveInterval={}".format(
kwargs.get("server_alive_interval", SERVER_ALIVE_INTERVAL)
),
"-oServerAliveCountMax={}".format(
kwargs.get("server_alive_count_max", SERVER_ALIVE_COUNT_MAX)
),
"-oUserKnownHostsFile=/dev/null",
"-oControlPath=none",
str(ssh_gateway_key),
f"{ssh_gateway_user}@{ssh_gateway}",
"-p",
str(ssh_gateway_port),
str(ssh_gateway_command),
)
)
log.info(
"Using SSH gateway %s@%s:%s %s",
ssh_gateway_user,
ssh_gateway,
ssh_gateway_port,
ssh_gateway_command,
)
return extended_arguments
def os_script(os_, vm_=None, opts=None, minion=""):
"""
Return the script as a string for the specific os
"""
if minion:
minion = salt_config_to_yaml(minion)
if os.path.isabs(os_):
# The user provided an absolute path to the deploy script, let's use it
return __render_script(os_, vm_, opts, minion)
if os.path.isabs(f"{os_}.sh"):
# The user provided an absolute path to the deploy script, although no
# extension was provided. Let's use it anyway.
return __render_script(f"{os_}.sh", vm_, opts, minion)
for search_path in opts["deploy_scripts_search_path"]:
if os.path.isfile(os.path.join(search_path, os_)):
return __render_script(os.path.join(search_path, os_), vm_, opts, minion)
if os.path.isfile(os.path.join(search_path, f"{os_}.sh")):
return __render_script(
os.path.join(search_path, f"{os_}.sh"), vm_, opts, minion
)
# No deploy script was found, return an empty string
return ""
def gen_keys(keysize=2048):
"""
Generate Salt minion keys and return them as PEM file strings
"""
# Mandate that keys are at least 2048 in size
if keysize < 2048:
keysize = 2048
tdir = tempfile.mkdtemp()
salt.crypt.gen_keys(tdir, "minion", keysize)
priv_path = os.path.join(tdir, "minion.pem")
pub_path = os.path.join(tdir, "minion.pub")
with salt.utils.files.fopen(priv_path) as fp_:
priv = salt.utils.stringutils.to_unicode(fp_.read())
with salt.utils.files.fopen(pub_path) as fp_:
pub = salt.utils.stringutils.to_unicode(fp_.read())
shutil.rmtree(tdir)
return priv, pub
def accept_key(pki_dir, pub, id_):
"""
If the master config was available then we will have a pki_dir key in
the opts directory, this method places the pub key in the accepted
keys dir and removes it from the unaccepted keys dir if that is the case.
"""
for key_dir in "minions", "minions_pre", "minions_rejected":
key_path = os.path.join(pki_dir, key_dir)
if not os.path.exists(key_path):
os.makedirs(key_path)
key = os.path.join(pki_dir, "minions", id_)
with salt.utils.files.fopen(key, "w+") as fp_:
fp_.write(salt.utils.stringutils.to_str(pub))
oldkey = os.path.join(pki_dir, "minions_pre", id_)
if os.path.isfile(oldkey):
with salt.utils.files.fopen(oldkey) as fp_:
if fp_.read() == pub:
os.remove(oldkey)
def remove_key(pki_dir, id_):
"""
This method removes a specified key from the accepted keys dir
"""
key = os.path.join(pki_dir, "minions", id_)
if os.path.isfile(key):
os.remove(key)
log.debug("Deleted '%s'", key)
def rename_key(pki_dir, id_, new_id):
"""
Rename a key, when an instance has also been renamed
"""
oldkey = os.path.join(pki_dir, "minions", id_)
newkey = os.path.join(pki_dir, "minions", new_id)
if os.path.isfile(oldkey):
os.rename(oldkey, newkey)
def minion_config(opts, vm_):
"""
Return a minion's configuration for the provided options and VM
"""
# Don't start with a copy of the default minion opts; they're not always
# what we need. Some default options are Null, let's set a reasonable default
minion = {
"master": "salt",
"log_level": "info",
"hash_type": "sha256",
}
# Now, let's update it to our needs
minion["id"] = vm_["name"]
master_finger = salt.config.get_cloud_config_value("master_finger", vm_, opts)
if master_finger is not None:
minion["master_finger"] = master_finger
minion.update(
# Get ANY defined minion settings, merging data, in the following order
# 1. VM config
# 2. Profile config
# 3. Global configuration
salt.config.get_cloud_config_value(
"minion", vm_, opts, default={}, search_global=True
)
)
make_master = salt.config.get_cloud_config_value("make_master", vm_, opts)
if "master" not in minion and make_master is not True:
raise SaltCloudConfigError(
"A master setting was not defined in the minion's configuration."
)
# Get ANY defined grains settings, merging data, in the following order
# 1. VM config
# 2. Profile config
# 3. Global configuration
minion.setdefault("grains", {}).update(
salt.config.get_cloud_config_value(
"grains", vm_, opts, default={}, search_global=True
)
)
return minion
def master_config(opts, vm_):
"""
Return a master's configuration for the provided options and VM
"""
# Let's get a copy of the salt master default options
master = copy.deepcopy(salt.config.DEFAULT_MASTER_OPTS)
# Some default options are Null, let's set a reasonable default
master.update(log_level="info", log_level_logfile="info", hash_type="sha256")
# Get ANY defined master setting, merging data, in the following order
# 1. VM config
# 2. Profile config
# 3. Global configuration
master.update(
salt.config.get_cloud_config_value(
"master", vm_, opts, default={}, search_global=True
)
)
return master
def salt_config_to_yaml(configuration, line_break="\n"):
"""
Return a salt configuration dictionary, master or minion, as a yaml dump
"""
return salt.utils.yaml.safe_dump(
configuration, line_break=line_break, default_flow_style=False
)
def bootstrap(vm_, opts=None):
"""
This is the primary entry point for logging into any system (POSIX or
Windows) to install Salt. It will make the decision on its own as to which
deploy function to call.
"""
if opts is None:
opts = __opts__
deploy_config = salt.config.get_cloud_config_value(
"deploy", vm_, opts, default=False
)
inline_script_config = salt.config.get_cloud_config_value(
"inline_script", vm_, opts, default=None
)
if deploy_config is False and inline_script_config is None:
return {"Error": {"No Deploy": "'deploy' is not enabled. Not deploying."}}
if vm_.get("driver") == "saltify":
saltify_driver = True
else:
saltify_driver = False
key_filename = salt.config.get_cloud_config_value(
"key_filename",
vm_,
opts,
search_global=False,
default=salt.config.get_cloud_config_value(
"ssh_keyfile", vm_, opts, search_global=False, default=None
),
)
if key_filename is not None and not os.path.isfile(key_filename):
raise SaltCloudConfigError(
f"The defined ssh_keyfile '{key_filename}' does not exist"
)
has_ssh_agent = False
if (
opts.get("ssh_agent", False)
and "SSH_AUTH_SOCK" in os.environ
and stat.S_ISSOCK(os.stat(os.environ["SSH_AUTH_SOCK"]).st_mode)
):
has_ssh_agent = True
if (
key_filename is None
and salt.config.get_cloud_config_value("password", vm_, opts, default=None)
is None
and salt.config.get_cloud_config_value("win_password", vm_, opts, default=None)
is None
and has_ssh_agent is False
):
raise SaltCloudSystemExit(
"Cannot deploy Salt in a VM if the 'key_filename' setting "
"is not set and there is no password set for the VM. "
"Check the provider docs for 'change_password' option if it "
"is supported by your provider."
)
ret = {}
minion_conf = minion_config(opts, vm_)
deploy_script_code = os_script(
salt.config.get_cloud_config_value("os", vm_, opts, default="bootstrap-salt"),
vm_,
opts,
minion_conf,
)
ssh_username = salt.config.get_cloud_config_value(
"ssh_username", vm_, opts, default="root"
)
if "file_transport" not in opts:
opts["file_transport"] = vm_.get("file_transport", "sftp")
# If we haven't generated any keys yet, do so now.
if "pub_key" not in vm_ and "priv_key" not in vm_:
log.debug("Generating keys for '%s'", vm_["name"])
vm_["priv_key"], vm_["pub_key"] = gen_keys(
salt.config.get_cloud_config_value("keysize", vm_, opts)
)
key_id = vm_.get("name")
if "append_domain" in vm_:
key_id = ".".join([key_id, vm_["append_domain"]])
accept_key(opts["pki_dir"], vm_["pub_key"], key_id)
if "os" not in vm_:
vm_["os"] = salt.config.get_cloud_config_value("script", vm_, opts)
# NOTE: deploy_kwargs is also used to pass inline_script variable content
# to run_inline_script function
host = salt.config.get_cloud_config_value("ssh_host", vm_, opts)
deploy_kwargs = {
"opts": opts,
"host": host,
"port": salt.config.get_cloud_config_value("ssh_port", vm_, opts, default=22),
"salt_host": vm_.get("salt_host", host),
"username": ssh_username,
"script": deploy_script_code,
"inline_script": inline_script_config,
"name": vm_["name"],
"has_ssh_agent": has_ssh_agent,
"tmp_dir": salt.config.get_cloud_config_value(
"tmp_dir", vm_, opts, default="/tmp/.saltcloud"
),
"vm_": vm_,
"start_action": opts["start_action"],
"parallel": opts["parallel"],
"sock_dir": opts["sock_dir"],
"conf_file": opts["conf_file"],
"minion_pem": vm_["priv_key"],
"minion_pub": vm_["pub_key"],
"master_sign_pub_file": salt.config.get_cloud_config_value(
"master_sign_pub_file", vm_, opts, default=None
),
"keep_tmp": opts["keep_tmp"],
"sudo": salt.config.get_cloud_config_value(
"sudo", vm_, opts, default=(ssh_username != "root")
),
"sudo_password": salt.config.get_cloud_config_value(
"sudo_password", vm_, opts, default=None
),
"tty": salt.config.get_cloud_config_value("tty", vm_, opts, default=True),
"password": salt.config.get_cloud_config_value(
"password", vm_, opts, search_global=False
),
"key_filename": key_filename,
"script_args": salt.config.get_cloud_config_value("script_args", vm_, opts),
"script_env": salt.config.get_cloud_config_value("script_env", vm_, opts),
"minion_conf": minion_conf,
"force_minion_config": salt.config.get_cloud_config_value(
"force_minion_config", vm_, opts, default=False
),
"preseed_minion_keys": vm_.get("preseed_minion_keys", None),
"display_ssh_output": salt.config.get_cloud_config_value(
"display_ssh_output", vm_, opts, default=True
),
"known_hosts_file": salt.config.get_cloud_config_value(
"known_hosts_file", vm_, opts, default="/dev/null"
),
"file_map": salt.config.get_cloud_config_value(
"file_map", vm_, opts, default=None
),
"maxtries": salt.config.get_cloud_config_value(
"wait_for_passwd_maxtries", vm_, opts, default=15
),
"preflight_cmds": salt.config.get_cloud_config_value(
"preflight_cmds", vm_, opts, default=[]
),
"cloud_grains": {
"driver": vm_["driver"],
"provider": vm_["provider"],
"profile": vm_["profile"],
},
}
inline_script_kwargs = deploy_kwargs.copy() # make a copy at this point
# forward any info about possible ssh gateway to deploy script
# as some providers need also a 'gateway' configuration
if "gateway" in vm_:
deploy_kwargs.update({"gateway": vm_["gateway"]})
# Deploy salt-master files, if necessary
if salt.config.get_cloud_config_value("make_master", vm_, opts) is True:
deploy_kwargs["make_master"] = True
deploy_kwargs["master_pub"] = vm_["master_pub"]
deploy_kwargs["master_pem"] = vm_["master_pem"]
master_conf = master_config(opts, vm_)
deploy_kwargs["master_conf"] = master_conf
if master_conf.get("syndic_master", None):
deploy_kwargs["make_syndic"] = True
deploy_kwargs["make_minion"] = salt.config.get_cloud_config_value(
"make_minion", vm_, opts, default=True
)
if saltify_driver:
deploy_kwargs["wait_for_passwd_maxtries"] = (
0 # No need to wait/retry with Saltify
)
win_installer = salt.config.get_cloud_config_value("win_installer", vm_, opts)
if win_installer:
deploy_kwargs["port"] = salt.config.get_cloud_config_value(
"smb_port", vm_, opts, default=445
)
deploy_kwargs["win_installer"] = win_installer
minion = minion_config(opts, vm_)
deploy_kwargs["master"] = minion["master"]
deploy_kwargs["username"] = salt.config.get_cloud_config_value(
"win_username", vm_, opts, default="Administrator"
)
win_pass = salt.config.get_cloud_config_value(
"win_password", vm_, opts, default=""
)
if win_pass:
deploy_kwargs["password"] = win_pass
deploy_kwargs["use_winrm"] = salt.config.get_cloud_config_value(
"use_winrm", vm_, opts, default=False
)
deploy_kwargs["winrm_port"] = salt.config.get_cloud_config_value(
"winrm_port", vm_, opts, default=5986
)
deploy_kwargs["winrm_use_ssl"] = salt.config.get_cloud_config_value(
"winrm_use_ssl", vm_, opts, default=True
)
deploy_kwargs["winrm_verify_ssl"] = salt.config.get_cloud_config_value(
"winrm_verify_ssl", vm_, opts, default=True
)
if saltify_driver:
deploy_kwargs["port_timeout"] = 1 # No need to wait/retry with Saltify
# Store what was used to the deploy the VM
event_kwargs = copy.deepcopy(deploy_kwargs)
del event_kwargs["opts"]
del event_kwargs["minion_pem"]
del event_kwargs["minion_pub"]
del event_kwargs["sudo_password"]
if "password" in event_kwargs:
del event_kwargs["password"]
ret["deploy_kwargs"] = event_kwargs
fire_event(
"event",
"executing deploy script",
"salt/cloud/{}/deploying".format(vm_["name"]),
args={"kwargs": salt.utils.data.simple_types_filter(event_kwargs)},
sock_dir=opts.get("sock_dir", os.path.join(__opts__["sock_dir"], "master")),
transport=opts.get("transport", "zeromq"),
)
if inline_script_config and deploy_config is False:
inline_script_deployed = run_inline_script(**inline_script_kwargs)
if inline_script_deployed is not False:
log.info("Inline script(s) ha(s|ve) run on %s", vm_["name"])
ret["deployed"] = False
return ret
else:
if win_installer:
deployed = deploy_windows(**deploy_kwargs)
else:
deployed = deploy_script(**deploy_kwargs)
if inline_script_config:
inline_script_deployed = run_inline_script(**inline_script_kwargs)
if inline_script_deployed is not False:
log.info("Inline script(s) ha(s|ve) run on %s", vm_["name"])
if deployed is not False:
ret["deployed"] = True
if deployed is not True:
ret.update(deployed)
log.info("Salt installed on %s", vm_["name"])
return ret
log.error("Failed to start Salt on host %s", vm_["name"])
return {
"Error": {"Not Deployed": "Failed to start Salt on host {}".format(vm_["name"])}
}
def ssh_usernames(vm_, opts, default_users=None):
"""
Return the ssh_usernames. Defaults to a built-in list of users for trying.
"""
if default_users is None:
default_users = ["root"]
usernames = salt.config.get_cloud_config_value("ssh_username", vm_, opts)
if not isinstance(usernames, list):
usernames = [usernames]
# get rid of None's or empty names
usernames = [x for x in usernames if x]
# Keep a copy of the usernames the user might have provided
initial = usernames[:]
# Add common usernames to the list to be tested
for name in default_users:
if name not in usernames:
usernames.append(name)
# Add the user provided usernames to the end of the list since enough time
# might need to pass before the remote service is available for logins and
# the proper username might have passed its iteration.
# This has detected in a CentOS 5.7 EC2 image
usernames.extend(initial)
return usernames
def wait_for_fun(fun, timeout=900, **kwargs):
"""
Wait until a function finishes, or times out
"""
start = time.time()
log.debug("Attempting function %s", fun)
trycount = 0
while True:
trycount += 1
try:
response = fun(**kwargs)
if not isinstance(response, bool):
return response
except Exception as exc: # pylint: disable=broad-except
log.debug("Caught exception in wait_for_fun: %s", exc)
time.sleep(1)
log.debug("Retrying function %s on (try %s)", fun, trycount)
if time.time() - start > timeout:
log.error("Function timed out: %s", timeout)
return False
def wait_for_port(
host,
port=22,
timeout=900,
gateway=None,
server_alive_interval=SERVER_ALIVE_INTERVAL,
server_alive_count_max=SERVER_ALIVE_COUNT_MAX,
):
"""
Wait until a connection to the specified port can be made on a specified
host. This is usually port 22 (for SSH), but in the case of Windows
installations, it might be port 445 (for psexec). It may also be an
alternate port for SSH, depending on the base image.
"""
start = time.time()
# Assign test ports because if a gateway is defined
# we first want to test the gateway before the host.
test_ssh_host = host
test_ssh_port = port
if gateway:
ssh_gateway = gateway["ssh_gateway"]
ssh_gateway_port = 22
if ":" in ssh_gateway:
ssh_gateway, ssh_gateway_port = ssh_gateway.split(":")
if "ssh_gateway_port" in gateway:
ssh_gateway_port = gateway["ssh_gateway_port"]
test_ssh_host = ssh_gateway
test_ssh_port = ssh_gateway_port
log.debug(
"Attempting connection to host %s on port %s via gateway %s on port %s",
host,
port,
ssh_gateway,
ssh_gateway_port,
)
else:
log.debug("Attempting connection to host %s on port %s", host, port)
trycount = 0
while True:
trycount += 1
try:
if socket.inet_pton(socket.AF_INET6, host):
sock = socket.socket(socket.AF_INET6, socket.SOCK_STREAM)
else:
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
except OSError:
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
try:
sock.settimeout(5)
sock.connect((test_ssh_host, int(test_ssh_port)))
# Stop any remaining reads/writes on the socket
sock.shutdown(socket.SHUT_RDWR)
# Close it!
sock.close()
break
except OSError as exc:
log.debug("Caught exception in wait_for_port: %s", exc)
time.sleep(1)
if time.time() - start > timeout:
log.error("Port connection timed out: %s", timeout)
return False
log.debug(
"Retrying connection to %s %s on port %s (try %s)",
"gateway" if gateway else "host",
test_ssh_host,
test_ssh_port,
trycount,
)
if not gateway:
return True
# Let the user know that his gateway is good!
log.debug("Gateway %s on port %s is reachable.", test_ssh_host, test_ssh_port)
# Now we need to test the host via the gateway.
# We will use netcat on the gateway to test the port
ssh_args = []
ssh_args.extend(
[
# Don't add new hosts to the host key database
"-oStrictHostKeyChecking=no",
# make sure ssh can time out on connection lose
f"-oServerAliveInterval={server_alive_interval}",
f"-oServerAliveCountMax={server_alive_count_max}",
# Set hosts key database path to /dev/null, i.e., non-existing
"-oUserKnownHostsFile=/dev/null",
# Don't re-use the SSH connection. Less failures.
"-oControlPath=none",
]
)
# There should never be both a password and an ssh key passed in, so
if "ssh_gateway_key" in gateway:
ssh_args.extend(
[
# tell SSH to skip password authentication
"-oPasswordAuthentication=no",
"-oChallengeResponseAuthentication=no",
# Make sure public key authentication is enabled
"-oPubkeyAuthentication=yes",
# do only use the provided identity file
"-oIdentitiesOnly=yes",
# No Keyboard interaction!
"-oKbdInteractiveAuthentication=no",
# Also, specify the location of the key file
"-i {}".format(gateway["ssh_gateway_key"]),
]
)
# Netcat command testing remote port
command = f"nc -z -w5 -q0 {host} {port}"
# SSH command
pcmd = "ssh {} {}@{} -p {} {}".format(
" ".join(ssh_args),
gateway["ssh_gateway_user"],
ssh_gateway,
ssh_gateway_port,
shlex.quote("date"),
)
cmd = "ssh {} {}@{} -p {} {}".format(
" ".join(ssh_args),
gateway["ssh_gateway_user"],
ssh_gateway,
ssh_gateway_port,
shlex.quote(command),
)
log.debug("SSH command: '%s'", cmd)
kwargs = {
"display_ssh_output": False,
"password": gateway.get("ssh_gateway_password", None),
}
trycount = 0
usable_gateway = False
gateway_retries = 5
while True:
trycount += 1
# test gateway usage
if not usable_gateway:
pstatus = _exec_ssh_cmd(pcmd, allow_failure=True, **kwargs)
if pstatus == 0:
usable_gateway = True
else:
gateway_retries -= 1
log.error(
"Gateway usage seems to be broken, password error ? Tries left: %s",
gateway_retries,
)
if not gateway_retries:
raise SaltCloudExecutionFailure(
"SSH gateway is reachable but we can not login"
)
# then try to reach out the target
if usable_gateway:
status = _exec_ssh_cmd(cmd, allow_failure=True, **kwargs)
# Get the exit code of the SSH command.
# If 0 then the port is open.
if status == 0:
return True
time.sleep(1)
if time.time() - start > timeout:
log.error("Port connection timed out: %s", timeout)
return False
log.debug(
"Retrying connection to host %s on port %s "
"via gateway %s on port %s. (try %s)",
host,
port,
ssh_gateway,
ssh_gateway_port,
trycount,
)
class Client:
"""
Wrap pypsexec.client.Client to fix some stability issues:
- Set the service name from a keyword arg, this allows multiple service
instances to be created in a single process.
- Keep trying service and file deletes since they may not succeed on the
first try. Raises an exception if they do not succeed after a timeout
period.
"""
def __init__(
self,
server,
username=None,
password=None,
port=445,
encrypt=True,
service_name=None,
):
self.service_name = service_name
self._exe_file = f"{self.service_name}.exe"
self._client = PsExecClient(server, username, password, port, encrypt)
self._client._service = ScmrService(self.service_name, self._client.session)
def __enter__(self):
self.connect()
self.create_service()
return self
def __exit__(self, tb_type, tb_value, tb):
self.remove_service()
self.disconnect()
def connect(self):
return self._client.connect()
def disconnect(self):
try:
# This removes any lingering PAExec binaries
self._client.cleanup()
except CannotDelete as exc:
# We shouldn't hard crash here, so just log the error
log.debug("Exception cleaning up PAexec: %r", exc)
return self._client.disconnect()
def create_service(self):
return self._client.create_service()
def run_executable(self, *args, **kwargs):
return self._client.run_executable(*args, **kwargs)
def remove_service(self, wait_timeout=10, sleep_wait=1):
"""
Removes the PAExec service and executable that was created as part of
the create_service function. This does not remove any older executables
or services from previous runs, use cleanup() instead for that purpose.
"""
# Stops/remove the PAExec service and removes the executable
log.debug("Deleting PAExec service at the end of the process")
wait_start = time.time()
while True:
try:
self._client._service.delete()
except SCMRException as exc:
log.debug("Exception encountered while deleting service %s", repr(exc))
if time.time() - wait_start > wait_timeout:
raise exc
time.sleep(sleep_wait)
continue
break
# delete the PAExec executable
smb_tree = TreeConnect(
self._client.session,
rf"\\{self._client.connection.server_name}\ADMIN$",
)
log.info("Connecting to SMB Tree %s", smb_tree.share_name)
smb_tree.connect()
wait_start = time.time()
while True:
try:
log.info("Creating open to PAExec file with delete on close flags")
self._client._delete_file(smb_tree, self._exe_file)
except SMBResponseException as exc:
log.debug("Exception deleting file %s %s", self._exe_file, repr(exc))
if time.time() - wait_start > wait_timeout:
raise exc
time.sleep(sleep_wait)
continue
break
log.info("Disconnecting from SMB Tree %s", smb_tree.share_name)
smb_tree.disconnect()
def run_winexe_command(cmd, args, host, username, password, port=445):
"""
Run a command remotely via the winexe executable
"""
creds = f"-U '{username}%{password}' //{host}"
logging_creds = f"-U '{username}%XXX-REDACTED-XXX' //{host}"
cmd = f"winexe {creds} {cmd} {args}"
logging_cmd = f"winexe {logging_creds} {cmd} {args}"
return win_cmd(cmd, logging_command=logging_cmd)
def run_psexec_command(cmd, args, host, username, password, port=445):
"""
Run a command remotely using the psexec protocol
"""
service_name = f"PS-Exec-{uuid.uuid4()}"
with Client(
host, username, password, port=port, encrypt=False, service_name=service_name
) as client:
stdout, stderr, ret_code = client.run_executable(cmd, args)
return stdout, stderr, ret_code
def wait_for_winexe(host, port, username, password, timeout=900):
"""
Wait until winexe connection can be established.
"""
start = time.time()
log.debug("Attempting winexe connection to host %s on port %s", host, port)
try_count = 0
while True:
try_count += 1
try:
# Shell out to winexe to check %TEMP%
ret_code = run_winexe_command(
"sc", "query winexesvc", host, username, password, port
)
if ret_code == 0:
log.debug("winexe connected...")
return True
log.debug("Return code was %s", ret_code)
except OSError as exc:
log.debug("Caught exception in wait_for_winexesvc: %s", exc)
if time.time() - start > timeout:
return False
time.sleep(1)
def wait_for_psexecsvc(host, port, username, password, timeout=900):
"""
Wait until psexec connection can be established.
"""
start = time.time()
try_count = 0
while True:
try_count += 1
ret_code = 1
try:
stdout, stderr, ret_code = run_psexec_command(
"cmd.exe", "/c hostname", host, username, password, port=port
)
except Exception as exc: # pylint: disable=broad-except
log.exception("Unable to execute command")
if ret_code == 0:
log.debug("psexec connected...")
return True
if time.time() - start > timeout:
return False
log.debug(
"Retrying psexec connection to host %s on port %s (try %s)",
host,
port,
try_count,
)
time.sleep(1)
def wait_for_winrm(
host, port, username, password, timeout=900, use_ssl=True, verify=True
):
"""
Wait until WinRM connection can be established.
"""
# Ensure the winrm service is listening before attempting to connect
wait_for_port(host=host, port=port, timeout=timeout)
start = time.time()
log.debug("Attempting WinRM connection to host %s on port %s", host, port)
transport = "ssl"
if not use_ssl:
transport = "ntlm"
trycount = 0
while True:
trycount += 1
try:
winrm_kwargs = {
"target": host,
"auth": (username, password),
"transport": transport,
}
if not verify:
log.debug("SSL validation for WinRM disabled.")
winrm_kwargs["server_cert_validation"] = "ignore"
s = winrm.Session(**winrm_kwargs)
if hasattr(s.protocol, "set_timeout"):
s.protocol.set_timeout(15)
log.trace("WinRM endpoint url: %s", s.url)
r = s.run_cmd("sc query winrm")
if r.status_code == 0:
log.debug("WinRM session connected...")
return s
log.debug("Return code was %s", r.status_code)
except WinRMTransportError as exc:
log.debug("Caught exception in wait_for_winrm: %s", exc)
if time.time() - start > timeout:
log.error("WinRM connection timed out: %s", timeout)
return None
log.debug(
"Retrying WinRM connection to host %s on port %s (try %s)",
host,
port,
trycount,
)
time.sleep(1)
def validate_windows_cred_winexe(
host, username="Administrator", password=None, retries=10, retry_delay=1
):
"""
Check if the windows credentials are valid
"""
cmd = f"winexe -U '{username}%{password}' //{host} \"hostname\""
logging_cmd = "winexe -U '{}%XXX-REDACTED-XXX' //{} \"hostname\"".format(
username, host
)
for i in range(retries):
ret_code = win_cmd(cmd, logging_command=logging_cmd)
return ret_code == 0
def validate_windows_cred(
host, username="Administrator", password=None, retries=10, retry_delay=1
):
"""
Check if the windows credentials are valid
"""
for i in range(retries):
ret_code = 1
try:
stdout, stderr, ret_code = run_psexec_command(
"cmd.exe", "/c hostname", host, username, password, port=445
)
except Exception as exc: # pylint: disable=broad-except
log.exception("Exception while executing psexec")
if ret_code == 0:
break
time.sleep(retry_delay)
return ret_code == 0
def wait_for_passwd(
host,
port=22,
ssh_timeout=15,
username="root",
password=None,
key_filename=None,
maxtries=15,
trysleep=1,
display_ssh_output=True,
gateway=None,
known_hosts_file="/dev/null",
hard_timeout=None,
):
"""
Wait until ssh connection can be accessed via password or ssh key
"""
trycount = 0
while trycount < maxtries:
connectfail = False
try:
kwargs = {
"hostname": host,
"port": port,
"username": username,
"password_retries": maxtries,
"timeout": ssh_timeout,
"display_ssh_output": display_ssh_output,
"known_hosts_file": known_hosts_file,
"ssh_timeout": ssh_timeout,
"hard_timeout": hard_timeout,
}
kwargs.update(__ssh_gateway_config_dict(gateway))
if key_filename:
if not os.path.isfile(key_filename):
raise SaltCloudConfigError(
"The defined key_filename '{}' does not exist".format(
key_filename
)
)
kwargs["key_filename"] = key_filename
log.debug("Using %s as the key_filename", key_filename)
elif password:
kwargs["password"] = password
log.debug("Using password authentication")
trycount += 1
log.debug(
"Attempting to authenticate as %s (try %s of %s)",
username,
trycount,
maxtries,
)
status = root_cmd("date", tty=False, sudo=False, **kwargs)
if status != 0:
connectfail = True
if trycount < maxtries:
time.sleep(trysleep)
continue
log.error("Authentication failed: status code %s", status)
return False
if connectfail is False:
return True
return False
except SaltCloudPasswordError:
raise
except Exception: # pylint: disable=broad-except
if trycount >= maxtries:
return False
time.sleep(trysleep)
def _format_master_param(master):
"""
If the master is a list, we need to convert it to a comma delimited string
Otherwise, we just return master
"""
if isinstance(master, list):
return ",".join(master)
return master
def deploy_windows(
host,
port=445,
timeout=900,
username="Administrator",
password=None,
name=None,
sock_dir=None,
conf_file=None,
start_action=None,
parallel=False,
minion_pub=None,
minion_pem=None,
minion_conf=None,
keep_tmp=False,
script_args=None,
script_env=None,
port_timeout=15,
preseed_minion_keys=None,
win_installer=None,
master=None,
tmp_dir="C:\\salttmp",
opts=None,
master_sign_pub_file=None,
use_winrm=False,
winrm_port=5986,
winrm_use_ssl=True,
winrm_verify_ssl=True,
**kwargs,
):
"""
Copy the install files to a remote Windows box, and execute them
"""
if not isinstance(opts, dict):
opts = {}
if use_winrm and not HAS_WINRM:
log.error(
"WinRM requested but module winrm could not be imported. "
"Ensure you are using version %s or higher.",
WINRM_MIN_VER,
)
return False
starttime = time.mktime(time.localtime())
log.debug("Deploying %s at %s (Windows)", host, starttime)
log.trace("HAS_WINRM: %s, use_winrm: %s", HAS_WINRM, use_winrm)
port_available = wait_for_port(host=host, port=port, timeout=port_timeout * 60)
if not port_available:
return False
service_available = False
winrm_session = None
if HAS_WINRM and use_winrm:
winrm_session = wait_for_winrm(
host=host,
port=winrm_port,
username=username,
password=password,
timeout=port_timeout * 60,
use_ssl=winrm_use_ssl,
verify=winrm_verify_ssl,
)
if winrm_session is not None:
service_available = True
else:
service_available = wait_for_psexecsvc(
host=host,
port=port,
username=username,
password=password,
timeout=port_timeout * 60,
)
if port_available and service_available:
log.debug("SMB port %s on %s is available", port, host)
log.debug("Logging into %s:%s as %s", host, port, username)
smb_conn = salt.utils.smb.get_conn(host, username, password, port)
if smb_conn is False:
log.error("Please install smbprotocol to enable SMB functionality")
return False
salt.utils.smb.mkdirs("salttemp", conn=smb_conn)
root_dir = "ProgramData/Salt Project/Salt"
salt.utils.smb.mkdirs(f"{root_dir}/conf/pki/minion", conn=smb_conn)
root_dir = "ProgramData\\Salt Project\\Salt"
if minion_pub:
salt.utils.smb.put_str(
minion_pub,
f"{root_dir}\\conf\\pki\\minion\\minion.pub",
conn=smb_conn,
)
if minion_pem:
salt.utils.smb.put_str(
minion_pem,
f"{root_dir}\\conf\\pki\\minion\\minion.pem",
conn=smb_conn,
)
if master_sign_pub_file:
# Read master-sign.pub file
log.debug(
"Copying master_sign.pub file from %s to minion", master_sign_pub_file
)
try:
salt.utils.smb.put_file(
master_sign_pub_file,
f"{root_dir}\\conf\\pki\\minion\\master_sign.pub",
conn=smb_conn,
)
except Exception as e: # pylint: disable=broad-except
log.debug(
"Exception copying master_sign.pub file %s to minion",
master_sign_pub_file,
)
# Copy over win_installer
# win_installer refers to a file such as:
# /root/Salt-Minion-0.17.0-win32-Setup.exe
# ..which exists on the same machine as salt-cloud
comps = win_installer.split("/")
local_path = "/".join(comps[:-1])
installer = comps[-1]
salt.utils.smb.put_file(
win_installer,
f"salttemp\\{installer}",
"C$",
conn=smb_conn,
)
cmd = f"c:\\salttemp\\{installer}"
args = [
"/S",
f"/master={_format_master_param(master)}",
f"/minion-name={name}",
]
if use_winrm:
winrm_cmd(winrm_session, cmd, args)
else:
stdout, stderr, ret_code = run_psexec_command(
cmd, " ".join(args), host, username, password
)
if ret_code != 0:
raise Exception(f"Fail installer {ret_code}")
# Copy over minion_conf
if minion_conf:
if not isinstance(minion_conf, dict):
# Let's not just fail regarding this change, specially
# since we can handle it
raise DeprecationWarning(
"`salt.utils.cloud.deploy_windows` now only accepts "
"dictionaries for its `minion_conf` parameter. "
"Loading YAML..."
)
minion_grains = minion_conf.pop("grains", {})
if minion_grains:
salt.utils.smb.put_str(
salt_config_to_yaml(minion_grains, line_break="\r\n"),
f"{root_dir}\\conf\\grains",
conn=smb_conn,
)
# Add special windows minion configuration
# that must be in the minion config file
windows_minion_conf = {
"ipc_mode": minion_conf.pop("ipc_mode", "tcp"),
"pki_dir": minion_conf.pop("pki_dir", "/conf/pki/minion"),
"multiprocessing": minion_conf.pop("multiprocessing", True),
}
if master and "master" not in minion_conf:
windows_minion_conf["master"] = master
if name and "id" not in minion_conf:
windows_minion_conf["id"] = name
minion_conf = dict(minion_conf, **windows_minion_conf)
salt.utils.smb.put_str(
salt_config_to_yaml(minion_conf, line_break="\r\n"),
f"{root_dir}\\conf\\minion",
conn=smb_conn,
)
# Delete C:\salttmp\ and installer file
# Unless keep_tmp is True
if not keep_tmp:
if use_winrm:
winrm_cmd(winrm_session, "rmdir", ["/Q", "/S", "C:\\salttemp\\"])
else:
salt.utils.smb.delete_file(
f"salttemp\\{installer}", "C$", conn=smb_conn
)
salt.utils.smb.delete_directory("salttemp", "C$", conn=smb_conn)
# Shell out to psexec to ensure salt-minion service started
if use_winrm:
winrm_cmd(winrm_session, "net", ["stop", "salt-minion"])
winrm_cmd(winrm_session, "net", ["start", "salt-minion"])
else:
stdout, stderr, ret_code = run_psexec_command(
"cmd.exe", "/c net stop salt-minion", host, username, password
)
if ret_code != 0:
return False
log.debug("Run psexec: sc start salt-minion")
stdout, stderr, ret_code = run_psexec_command(
"cmd.exe", "/c net start salt-minion", host, username, password
)
if ret_code != 0:
return False
# Fire deploy action
fire_event(
"event",
f"{name} has been deployed at {host}",
f"salt/cloud/{name}/deploy_windows",
args={"name": name},
sock_dir=opts.get("sock_dir", os.path.join(__opts__["sock_dir"], "master")),
transport=opts.get("transport", "zeromq"),
)
return True
return False
def deploy_script(
host,
port=22,
timeout=900,
username="root",
password=None,
key_filename=None,
script=None,
name=None,
sock_dir=None,
provider=None,
conf_file=None,
start_action=None,
make_master=False,
master_pub=None,
master_pem=None,
master_conf=None,
minion_pub=None,
minion_pem=None,
minion_conf=None,
keep_tmp=False,
script_args=None,
script_env=None,
ssh_timeout=15,
maxtries=15,
make_syndic=False,
make_minion=True,
display_ssh_output=True,
preseed_minion_keys=None,
parallel=False,
sudo_password=None,
sudo=False,
tty=None,
vm_=None,
opts=None,
tmp_dir="/tmp/.saltcloud",
file_map=None,
master_sign_pub_file=None,
cloud_grains=None,
force_minion_config=False,
**kwargs,
):
"""
Copy a deploy script to a remote server, execute it, and remove it
"""
if not isinstance(opts, dict):
opts = {}
vm_ = vm_ or {} # if None, default to empty dict
cloud_grains = cloud_grains or {}
tmp_dir = "{}-{}".format(tmp_dir.rstrip("/"), uuid.uuid4())
deploy_command = salt.config.get_cloud_config_value(
"deploy_command", vm_, opts, default=os.path.join(tmp_dir, "deploy.sh")
)
if key_filename is not None and not os.path.isfile(key_filename):
raise SaltCloudConfigError(
f"The defined key_filename '{key_filename}' does not exist"
)
gateway = None
if "gateway" in kwargs:
gateway = kwargs["gateway"]
starttime = time.localtime()
log.debug("Deploying %s at %s", host, time.strftime("%Y-%m-%d %H:%M:%S", starttime))
known_hosts_file = kwargs.get("known_hosts_file", "/dev/null")
hard_timeout = opts.get("hard_timeout", None)
if wait_for_port(host=host, port=port, gateway=gateway):
log.debug("SSH port %s on %s is available", port, host)
if wait_for_passwd(
host,
port=port,
username=username,
password=password,
key_filename=key_filename,
ssh_timeout=ssh_timeout,
display_ssh_output=display_ssh_output,
gateway=gateway,
known_hosts_file=known_hosts_file,
maxtries=maxtries,
hard_timeout=hard_timeout,
):
log.debug("Logging into %s:%s as %s", host, port, username)
ssh_kwargs = {
"hostname": host,
"port": port,
"username": username,
"timeout": ssh_timeout,
"ssh_timeout": ssh_timeout,
"display_ssh_output": display_ssh_output,
"sudo_password": sudo_password,
"sftp": opts.get("use_sftp", False),
}
ssh_kwargs.update(__ssh_gateway_config_dict(gateway))
if key_filename:
log.debug("Using %s as the key_filename", key_filename)
ssh_kwargs["key_filename"] = key_filename
elif password and kwargs.get("has_ssh_agent", False) is False:
ssh_kwargs["password"] = password
if root_cmd(
f"test -e '{tmp_dir}'", tty, sudo, allow_failure=True, **ssh_kwargs
):
ret = root_cmd(
f"sh -c \"( mkdir -p -m 700 '{tmp_dir}' )\"",
tty,
sudo,
**ssh_kwargs,
)
if ret:
raise SaltCloudSystemExit(
f"Can't create temporary directory in {tmp_dir} !"
)
if sudo:
comps = tmp_dir.lstrip("/").rstrip("/").split("/")
if comps:
if len(comps) > 1 or comps[0] != "tmp":
ret = root_cmd(
f'chown {username} "{tmp_dir}"', tty, sudo, **ssh_kwargs
)
if ret:
raise SaltCloudSystemExit(
f"Cant set {username} ownership on {tmp_dir}"
)
if not isinstance(file_map, dict):
file_map = {}
# Copy an arbitrary group of files to the target system
remote_dirs = []
file_map_success = []
file_map_fail = []
for map_item in file_map:
local_file = map_item
remote_file = file_map[map_item]
if not os.path.exists(map_item):
log.error(
'The local file "%s" does not exist, and will not be '
'copied to "%s" on the target system',
local_file,
remote_file,
)
file_map_fail.append({local_file: remote_file})
continue
if os.path.isdir(local_file):
dir_name = os.path.basename(local_file)
remote_dir = os.path.join(os.path.dirname(remote_file), dir_name)
else:
remote_dir = os.path.dirname(remote_file)
if remote_dir not in remote_dirs:
root_cmd(f"mkdir -p '{remote_dir}'", tty, sudo, **ssh_kwargs)
if ssh_kwargs["username"] != "root":
root_cmd(
"chown {} '{}'".format(ssh_kwargs["username"], remote_dir),
tty,
sudo,
**ssh_kwargs,
)
remote_dirs.append(remote_dir)
ssh_file(opts, remote_file, kwargs=ssh_kwargs, local_file=local_file)
file_map_success.append({local_file: remote_file})
# Minion configuration
if minion_pem:
ssh_file(opts, f"{tmp_dir}/minion.pem", minion_pem, ssh_kwargs)
ret = root_cmd(
f"chmod 600 '{tmp_dir}/minion.pem'", tty, sudo, **ssh_kwargs
)
if ret:
raise SaltCloudSystemExit(
f"Can't set perms on {tmp_dir}/minion.pem"
)
if minion_pub:
ssh_file(opts, f"{tmp_dir}/minion.pub", minion_pub, ssh_kwargs)
if master_sign_pub_file:
ssh_file(
opts,
f"{tmp_dir}/master_sign.pub",
kwargs=ssh_kwargs,
local_file=master_sign_pub_file,
)
if minion_conf:
if not isinstance(minion_conf, dict):
# Let's not just fail regarding this change, specially
# since we can handle it
raise DeprecationWarning(
"`salt.utils.cloud.deploy_script now only accepts "
"dictionaries for it's `minion_conf` parameter. "
"Loading YAML..."
)
minion_grains = minion_conf.pop("grains", {})
if minion_grains:
ssh_file(
opts,
f"{tmp_dir}/grains",
salt_config_to_yaml(minion_grains),
ssh_kwargs,
)
if cloud_grains and opts.get("enable_cloud_grains", True):
minion_conf["grains"] = {"salt-cloud": cloud_grains}
ssh_file(
opts,
f"{tmp_dir}/minion",
salt_config_to_yaml(minion_conf),
ssh_kwargs,
)
# Master configuration
if master_pem:
ssh_file(opts, f"{tmp_dir}/master.pem", master_pem, ssh_kwargs)
ret = root_cmd(
f"chmod 600 '{tmp_dir}/master.pem'", tty, sudo, **ssh_kwargs
)
if ret:
raise SaltCloudSystemExit(f"Cant set perms on {tmp_dir}/master.pem")
if master_pub:
ssh_file(opts, f"{tmp_dir}/master.pub", master_pub, ssh_kwargs)
if master_conf:
if not isinstance(master_conf, dict):
# Let's not just fail regarding this change, specially
# since we can handle it
raise DeprecationWarning(
"`salt.utils.cloud.deploy_script now only accepts "
"dictionaries for it's `master_conf` parameter. "
"Loading from YAML ..."
)
ssh_file(
opts,
f"{tmp_dir}/master",
salt_config_to_yaml(master_conf),
ssh_kwargs,
)
# XXX: We need to make these paths configurable
preseed_minion_keys_tempdir = f"{tmp_dir}/preseed-minion-keys"
if preseed_minion_keys is not None:
# Create remote temp dir
ret = root_cmd(
f"mkdir '{preseed_minion_keys_tempdir}'", tty, sudo, **ssh_kwargs
)
if ret:
raise SaltCloudSystemExit(
f"Cant create {preseed_minion_keys_tempdir}"
)
ret = root_cmd(
f"chmod 700 '{preseed_minion_keys_tempdir}'",
tty,
sudo,
**ssh_kwargs,
)
if ret:
raise SaltCloudSystemExit(
f"Can't set perms on {preseed_minion_keys_tempdir}"
)
if ssh_kwargs["username"] != "root":
root_cmd(
"chown {} '{}'".format(
ssh_kwargs["username"], preseed_minion_keys_tempdir
),
tty,
sudo,
**ssh_kwargs,
)
# Copy pre-seed minion keys
for minion_id, minion_key in preseed_minion_keys.items():
rpath = os.path.join(preseed_minion_keys_tempdir, minion_id)
ssh_file(opts, rpath, minion_key, ssh_kwargs)
if ssh_kwargs["username"] != "root":
root_cmd(
f"chown -R root '{preseed_minion_keys_tempdir}'",
tty,
sudo,
**ssh_kwargs,
)
if ret:
raise SaltCloudSystemExit(
"Can't set ownership for {}".format(
preseed_minion_keys_tempdir
)
)
# Run any pre-flight commands before running deploy scripts
preflight_cmds = kwargs.get("preflight_cmds", [])
for command in preflight_cmds:
cmd_ret = root_cmd(command, tty, sudo, **ssh_kwargs)
if cmd_ret:
raise SaltCloudSystemExit(f"Pre-flight command failed: '{command}'")
# The actual deploy script
if script:
# got strange escaping issues with sudoer, going onto a
# subshell fixes that
ssh_file(opts, f"{tmp_dir}/deploy.sh", script, ssh_kwargs)
ret = root_cmd(
f"sh -c \"( chmod +x '{tmp_dir}/deploy.sh' )\";exit $?",
tty,
sudo,
**ssh_kwargs,
)
if ret:
raise SaltCloudSystemExit(f"Can't set perms on {tmp_dir}/deploy.sh")
time_used = time.mktime(time.localtime()) - time.mktime(starttime)
newtimeout = timeout - time_used
queue = None
process = None
# Consider this code experimental. It causes Salt Cloud to wait
# for the minion to check in, and then fire a startup event.
# Disabled if parallel because it doesn't work!
if start_action and not parallel:
queue = multiprocessing.Queue()
process = multiprocessing.Process(
target=check_auth,
kwargs=dict(
name=name, sock_dir=sock_dir, timeout=newtimeout, queue=queue
),
name=f"DeployScriptCheckAuth({name})",
)
log.debug("Starting new process to wait for salt-minion")
process.start()
# Run the deploy script
if script:
if "bootstrap-salt" in script:
deploy_command += f" -c '{tmp_dir}'"
if force_minion_config:
deploy_command += " -F"
if make_syndic is True:
deploy_command += " -S"
if make_master is True:
deploy_command += " -M"
if make_minion is False:
deploy_command += " -N"
if keep_tmp is True:
deploy_command += " -K"
if preseed_minion_keys is not None:
deploy_command += f" -k '{preseed_minion_keys_tempdir}'"
if script_args:
deploy_command += f" {script_args}"
if script_env:
if not isinstance(script_env, dict):
raise SaltCloudSystemExit(
"The 'script_env' configuration setting NEEDS "
"to be a dictionary not a {}".format(type(script_env))
)
environ_script_contents = ["#!/bin/sh"]
for key, value in script_env.items():
environ_script_contents.append(
"setenv {0} '{1}' >/dev/null 2>&1 || "
"export {0}='{1}'".format(key, value)
)
environ_script_contents.append(deploy_command)
# Upload our environ setter wrapper
ssh_file(
opts,
f"{tmp_dir}/environ-deploy-wrapper.sh",
"\n".join(environ_script_contents),
ssh_kwargs,
)
root_cmd(
f"chmod +x '{tmp_dir}/environ-deploy-wrapper.sh'",
tty,
sudo,
**ssh_kwargs,
)
# The deploy command is now our wrapper
deploy_command = "'{}/environ-deploy-wrapper.sh'".format(
tmp_dir,
)
if root_cmd(deploy_command, tty, sudo, **ssh_kwargs) != 0:
raise SaltCloudSystemExit(
f"Executing the command '{deploy_command}' failed"
)
log.debug("Executed command '%s'", deploy_command)
# Remove the deploy script
if not keep_tmp:
root_cmd(f"rm -f '{tmp_dir}/deploy.sh'", tty, sudo, **ssh_kwargs)
log.debug("Removed %s/deploy.sh", tmp_dir)
if script_env:
root_cmd(
f"rm -f '{tmp_dir}/environ-deploy-wrapper.sh'",
tty,
sudo,
**ssh_kwargs,
)
log.debug("Removed %s/environ-deploy-wrapper.sh", tmp_dir)
if keep_tmp:
log.debug("Not removing deployment files from %s/", tmp_dir)
else:
# Remove minion configuration
if minion_pub:
root_cmd(f"rm -f '{tmp_dir}/minion.pub'", tty, sudo, **ssh_kwargs)
log.debug("Removed %s/minion.pub", tmp_dir)
if minion_pem:
root_cmd(f"rm -f '{tmp_dir}/minion.pem'", tty, sudo, **ssh_kwargs)
log.debug("Removed %s/minion.pem", tmp_dir)
if minion_conf:
root_cmd(f"rm -f '{tmp_dir}/grains'", tty, sudo, **ssh_kwargs)
log.debug("Removed %s/grains", tmp_dir)
root_cmd(f"rm -f '{tmp_dir}/minion'", tty, sudo, **ssh_kwargs)
log.debug("Removed %s/minion", tmp_dir)
if master_sign_pub_file:
root_cmd(
f"rm -f {tmp_dir}/master_sign.pub", tty, sudo, **ssh_kwargs
)
log.debug("Removed %s/master_sign.pub", tmp_dir)
# Remove master configuration
if master_pub:
root_cmd(f"rm -f '{tmp_dir}/master.pub'", tty, sudo, **ssh_kwargs)
log.debug("Removed %s/master.pub", tmp_dir)
if master_pem:
root_cmd(f"rm -f '{tmp_dir}/master.pem'", tty, sudo, **ssh_kwargs)
log.debug("Removed %s/master.pem", tmp_dir)
if master_conf:
root_cmd(f"rm -f '{tmp_dir}/master'", tty, sudo, **ssh_kwargs)
log.debug("Removed %s/master", tmp_dir)
# Remove pre-seed keys directory
if preseed_minion_keys is not None:
root_cmd(
f"rm -rf '{preseed_minion_keys_tempdir}'",
tty,
sudo,
**ssh_kwargs,
)
log.debug("Removed %s", preseed_minion_keys_tempdir)
if start_action and not parallel:
queuereturn = queue.get()
process.join()
if queuereturn and start_action:
# client = salt.client.LocalClient(conf_file)
# output = client.cmd_iter(
# host, 'state.highstate', timeout=timeout
# )
# for line in output:
# print(line)
log.info("Executing %s on the salt-minion", start_action)
root_cmd(f"salt-call {start_action}", tty, sudo, **ssh_kwargs)
log.info("Finished executing %s on the salt-minion", start_action)
# Fire deploy action
fire_event(
"event",
f"{name} has been deployed at {host}",
f"salt/cloud/{name}/deploy_script",
args={"name": name, "host": host},
sock_dir=opts.get(
"sock_dir", os.path.join(__opts__["sock_dir"], "master")
),
transport=opts.get("transport", "zeromq"),
)
if file_map_fail or file_map_success:
return {
"File Upload Success": file_map_success,
"File Upload Failure": file_map_fail,
}
return True
return False
def run_inline_script(
host,
name=None,
port=22,
timeout=900,
username="root",
key_filename=None,
inline_script=None,
ssh_timeout=15,
display_ssh_output=True,
parallel=False,
sudo_password=None,
sudo=False,
password=None,
tty=None,
opts=None,
tmp_dir="/tmp/.saltcloud-inline_script",
**kwargs,
):
"""
Run the inline script commands, one by one
:**kwargs: catch all other things we may get but don't actually need/use
"""
gateway = None
if "gateway" in kwargs:
gateway = kwargs["gateway"]
starttime = time.mktime(time.localtime())
log.debug("Deploying %s at %s", host, starttime)
known_hosts_file = kwargs.get("known_hosts_file", "/dev/null")
if wait_for_port(host=host, port=port, gateway=gateway):
log.debug("SSH port %s on %s is available", port, host)
newtimeout = timeout - (time.mktime(time.localtime()) - starttime)
if wait_for_passwd(
host,
port=port,
username=username,
password=password,
key_filename=key_filename,
ssh_timeout=ssh_timeout,
display_ssh_output=display_ssh_output,
gateway=gateway,
known_hosts_file=known_hosts_file,
):
log.debug("Logging into %s:%s as %s", host, port, username)
newtimeout = timeout - (time.mktime(time.localtime()) - starttime)
ssh_kwargs = {
"hostname": host,
"port": port,
"username": username,
"timeout": ssh_timeout,
"display_ssh_output": display_ssh_output,
"sudo_password": sudo_password,
"sftp": opts.get("use_sftp", False),
}
ssh_kwargs.update(__ssh_gateway_config_dict(gateway))
if key_filename:
log.debug("Using %s as the key_filename", key_filename)
ssh_kwargs["key_filename"] = key_filename
elif (
password
and "has_ssh_agent" in kwargs
and kwargs["has_ssh_agent"] is False
):
ssh_kwargs["password"] = password
# TODO: write some tests ???
# TODO: check edge cases (e.g. ssh gateways, salt deploy disabled, etc.)
if (
root_cmd(
f'test -e \\"{tmp_dir}\\"',
tty,
sudo,
allow_failure=True,
**ssh_kwargs,
)
and inline_script
):
log.debug("Found inline script to execute.")
for cmd_line in inline_script:
log.info("Executing inline command: %s", cmd_line)
ret = root_cmd(
f'sh -c "( {cmd_line} )"',
tty,
sudo,
allow_failure=True,
**ssh_kwargs,
)
if ret:
log.info("[%s] Output: %s", cmd_line, ret)
# TODO: ensure we send the correct return value
return True
def filter_event(tag, data, defaults):
"""
Accept a tag, a dict and a list of default keys to return from the dict, and
check them against the cloud configuration for that tag
"""
ret = {}
keys = []
use_defaults = True
for ktag in __opts__.get("filter_events", {}):
if tag != ktag:
continue
keys = __opts__["filter_events"][ktag]["keys"]
use_defaults = __opts__["filter_events"][ktag].get("use_defaults", True)
if use_defaults is False:
defaults = []
# For PY3, if something like ".keys()" or ".values()" is used on a dictionary,
# it returns a dict_view and not a list like in PY2. "defaults" should be passed
# in with the correct data type, but don't stack-trace in case it wasn't.
if not isinstance(defaults, list):
defaults = list(defaults)
defaults = list(set(defaults + keys))
for key in defaults:
if key in data:
ret[key] = data[key]
return ret
def fire_event(key, msg, tag, sock_dir, args=None, transport="zeromq"):
"""
Fire deploy action
"""
with salt.utils.event.get_event("master", sock_dir, listen=False) as event:
try:
event.fire_event(msg, tag)
except ValueError:
# We're using at least a 0.17.x version of salt
if isinstance(args, dict):
args[key] = msg
else:
args = {key: msg}
event.fire_event(args, tag)
# https://github.com/zeromq/pyzmq/issues/173#issuecomment-4037083
# Assertion failed: get_load () == 0 (poller_base.cpp:32)
time.sleep(0.025)
def _exec_ssh_cmd(cmd, error_msg=None, allow_failure=False, **kwargs):
if error_msg is None:
error_msg = "A wrong password has been issued while establishing ssh session."
password_retries = kwargs.get("password_retries", 3)
try:
stdout, stderr = None, None
proc = salt.utils.vt.Terminal(
cmd,
shell=True,
log_stdout=True,
log_stderr=True,
stream_stdout=kwargs.get("display_ssh_output", True),
stream_stderr=kwargs.get("display_ssh_output", True),
)
sent_password = 0
while proc.has_unread_data:
stdout, stderr = proc.recv()
if stdout and SSH_PASSWORD_PROMP_RE.search(stdout):
# if authenticating with an SSH key and 'sudo' is found
# in the password prompt
if (
"key_filename" in kwargs
and kwargs["key_filename"]
and SSH_PASSWORD_PROMP_SUDO_RE.search(stdout)
):
proc.sendline(kwargs["sudo_password"])
# elif authenticating via password and haven't exhausted our
# password_retires
elif kwargs.get("password", None) and (
sent_password < password_retries
):
sent_password += 1
proc.sendline(kwargs["password"])
# else raise an error as we are not authenticating properly
# * not authenticating with an SSH key
# * not authenticating with a Password
else:
raise SaltCloudPasswordError(error_msg)
# 0.0125 is really too fast on some systems
time.sleep(0.5)
if proc.exitstatus != 0 and allow_failure is False:
raise SaltCloudSystemExit(
f"Command '{cmd}' failed. Exit code: {proc.exitstatus}"
)
return proc.exitstatus
except salt.utils.vt.TerminalException as err:
trace = traceback.format_exc()
log.error(error_msg.format(cmd, err, trace))
finally:
proc.close(terminate=True, kill=True)
# Signal an error
return 1
def scp_file(dest_path, contents=None, kwargs=None, local_file=None):
"""
Use scp or sftp to copy a file to a server
"""
file_to_upload = None
try:
if contents is not None:
try:
tmpfd, file_to_upload = tempfile.mkstemp()
os.write(tmpfd, contents)
finally:
try:
os.close(tmpfd)
except OSError as exc:
if exc.errno != errno.EBADF:
raise
log.debug("Uploading %s to %s", dest_path, kwargs["hostname"])
ssh_args = [
# Don't add new hosts to the host key database
"-oStrictHostKeyChecking=no",
# make sure ssh can time out on connection lose
"-oServerAliveInterval={}".format(
kwargs.get("server_alive_interval", SERVER_ALIVE_INTERVAL)
),
"-oServerAliveCountMax={}".format(
kwargs.get("server_alive_count_max", SERVER_ALIVE_COUNT_MAX)
),
# Set hosts key database path to /dev/null, i.e., non-existing
"-oUserKnownHostsFile=/dev/null",
# Don't re-use the SSH connection. Less failures.
"-oControlPath=none",
]
if local_file is not None:
file_to_upload = local_file
if os.path.isdir(local_file):
ssh_args.append("-r")
if "key_filename" in kwargs:
# There should never be both a password and an ssh key passed in, so
ssh_args.extend(
[
# tell SSH to skip password authentication
"-oPasswordAuthentication=no",
"-oChallengeResponseAuthentication=no",
# Make sure public key authentication is enabled
"-oPubkeyAuthentication=yes",
# do only use the provided identity file
"-oIdentitiesOnly=yes",
# No Keyboard interaction!
"-oKbdInteractiveAuthentication=no",
# Also, specify the location of the key file
"-i {}".format(kwargs["key_filename"]),
]
)
if "port" in kwargs:
ssh_args.append("-oPort={}".format(kwargs["port"]))
ssh_args.append(__ssh_gateway_arguments(kwargs))
try:
if socket.inet_pton(socket.AF_INET6, kwargs["hostname"]):
ipaddr = "[{}]".format(kwargs["hostname"])
else:
ipaddr = kwargs["hostname"]
except OSError:
ipaddr = kwargs["hostname"]
if file_to_upload is None:
log.warning(
"No source file to upload. Please make sure that either file "
"contents or the path to a local file are provided."
)
cmd = (
"scp {0} {1} {2[username]}@{4}:{3} || "
'echo "put {1} {3}" | sftp {0} {2[username]}@{4} || '
'rsync -avz -e "ssh {0}" {1} {2[username]}@{2[hostname]}:{3}'.format(
" ".join(ssh_args), file_to_upload, kwargs, dest_path, ipaddr
)
)
log.debug("SCP command: '%s'", cmd)
retcode = _exec_ssh_cmd(
cmd,
error_msg="Failed to upload file '{0}': {1}\n{2}",
password_retries=3,
**kwargs,
)
finally:
if contents is not None:
try:
os.remove(file_to_upload)
except OSError as exc:
if exc.errno != errno.ENOENT:
raise
return retcode
def ssh_file(opts, dest_path, contents=None, kwargs=None, local_file=None):
"""
Copies a file to the remote SSH target using either sftp or scp, as
configured.
"""
if opts.get("file_transport", "sftp") == "sftp":
return sftp_file(dest_path, contents, kwargs, local_file)
return scp_file(dest_path, contents, kwargs, local_file)
def sftp_file(dest_path, contents=None, kwargs=None, local_file=None):
"""
Use sftp to upload a file to a server
"""
put_args = []
if kwargs is None:
kwargs = {}
file_to_upload = None
try:
if contents is not None:
try:
tmpfd, file_to_upload = tempfile.mkstemp()
if isinstance(contents, str):
os.write(tmpfd, contents.encode(__salt_system_encoding__))
else:
os.write(tmpfd, contents)
finally:
try:
os.close(tmpfd)
except OSError as exc:
if exc.errno != errno.EBADF:
raise
if local_file is not None:
file_to_upload = local_file
if os.path.isdir(local_file):
put_args = ["-r"]
log.debug("Uploading %s to %s (sftp)", dest_path, kwargs.get("hostname"))
ssh_args = [
# Don't add new hosts to the host key database
"-oStrictHostKeyChecking=no",
# make sure ssh can time out on connection lose
"-oServerAliveInterval={}".format(
kwargs.get("server_alive_interval", SERVER_ALIVE_INTERVAL)
),
"-oServerAliveCountMax={}".format(
kwargs.get("server_alive_count_max", SERVER_ALIVE_COUNT_MAX)
),
# Set hosts key database path to /dev/null, i.e., non-existing
"-oUserKnownHostsFile=/dev/null",
# Don't re-use the SSH connection. Less failures.
"-oControlPath=none",
]
if "key_filename" in kwargs:
# There should never be both a password and an ssh key passed in, so
ssh_args.extend(
[
# tell SSH to skip password authentication
"-oPasswordAuthentication=no",
"-oChallengeResponseAuthentication=no",
# Make sure public key authentication is enabled
"-oPubkeyAuthentication=yes",
# do only use the provided identity file
"-oIdentitiesOnly=yes",
# No Keyboard interaction!
"-oKbdInteractiveAuthentication=no",
# Also, specify the location of the key file
"-oIdentityFile={}".format(kwargs["key_filename"]),
]
)
if "port" in kwargs:
ssh_args.append("-oPort={}".format(kwargs["port"]))
ssh_args.append(__ssh_gateway_arguments(kwargs))
try:
if socket.inet_pton(socket.AF_INET6, kwargs["hostname"]):
ipaddr = "[{}]".format(kwargs["hostname"])
else:
ipaddr = kwargs["hostname"]
except OSError:
ipaddr = kwargs["hostname"]
if file_to_upload is None:
log.warning(
"No source file to upload. Please make sure that either file "
"contents or the path to a local file are provided."
)
cmd = 'echo "put {0} {1} {2}" | sftp {3} {4[username]}@{5}'.format(
" ".join(put_args),
file_to_upload,
dest_path,
" ".join(ssh_args),
kwargs,
ipaddr,
)
log.debug("SFTP command: '%s'", cmd)
retcode = _exec_ssh_cmd(
cmd,
error_msg="Failed to upload file '{0}': {1}\n{2}",
password_retries=3,
**kwargs,
)
finally:
if contents is not None:
try:
os.remove(file_to_upload)
except OSError as exc:
if exc.errno != errno.ENOENT:
raise
return retcode
def win_cmd(command, **kwargs):
"""
Wrapper for commands to be run against Windows boxes
"""
logging_command = kwargs.get("logging_command", None)
try:
proc = NonBlockingPopen(
command,
shell=True,
stderr=subprocess.PIPE,
stdout=subprocess.PIPE,
stream_stds=kwargs.get("display_ssh_output", True),
logging_command=logging_command,
)
if logging_command is None:
log.debug("Executing command(PID %s): '%s'", proc.pid, command)
else:
log.debug("Executing command(PID %s): '%s'", proc.pid, logging_command)
proc.poll_and_read_until_finish()
proc.communicate()
return proc.returncode
except Exception as err: # pylint: disable=broad-except
log.exception("Failed to execute command '%s'", logging_command)
# Signal an error
return 1
def winrm_cmd(session, command, flags, **kwargs):
"""
Wrapper for commands to be run against Windows boxes using WinRM.
"""
log.debug("Executing WinRM command: %s %s", command, flags)
r = session.run_cmd(command, flags)
return r.status_code
def root_cmd(command, tty, sudo, allow_failure=False, **kwargs):
"""
Wrapper for commands to be run as root
"""
logging_command = command
sudo_password = kwargs.get("sudo_password", None)
if sudo:
if sudo_password is None:
command = f"sudo {command}"
logging_command = command
else:
logging_command = f'sudo -S "XXX-REDACTED-XXX" {command}'
command = f"sudo -S {command}"
log.debug("Using sudo to run command %s", logging_command)
ssh_args = []
if tty:
# Use double `-t` on the `ssh` command, it's necessary when `sudo` has
# `requiretty` enforced.
ssh_args.extend(["-t", "-t"])
known_hosts_file = kwargs.get("known_hosts_file", "/dev/null")
host_key_checking = "no"
if known_hosts_file != "/dev/null":
host_key_checking = "yes"
ssh_args.extend(
[
# Don't add new hosts to the host key database
f"-oStrictHostKeyChecking={host_key_checking}",
# Set hosts key database path to /dev/null, i.e., non-existing
f"-oUserKnownHostsFile={known_hosts_file}",
# Don't re-use the SSH connection. Less failures.
"-oControlPath=none",
]
)
if "key_filename" in kwargs:
# There should never be both a password and an ssh key passed in, so
ssh_args.extend(
[
# tell SSH to skip password authentication
"-oPasswordAuthentication=no",
"-oChallengeResponseAuthentication=no",
# Make sure public key authentication is enabled
"-oPubkeyAuthentication=yes",
# do only use the provided identity file
"-oIdentitiesOnly=yes",
# No Keyboard interaction!
"-oKbdInteractiveAuthentication=no",
# Also, specify the location of the key file
"-i {}".format(kwargs["key_filename"]),
]
)
if "ssh_timeout" in kwargs:
ssh_args.extend(["-oConnectTimeout={}".format(kwargs["ssh_timeout"])])
ssh_args.extend([__ssh_gateway_arguments(kwargs)])
if "port" in kwargs:
ssh_args.extend(["-p {}".format(kwargs["port"])])
cmd = "ssh {0} {1[username]}@{1[hostname]} ".format(" ".join(ssh_args), kwargs)
logging_command = cmd + logging_command
cmd = cmd + shlex.quote(command)
hard_timeout = kwargs.get("hard_timeout")
if hard_timeout is not None:
logging_command = f"timeout {hard_timeout} {logging_command}"
cmd = f"timeout {hard_timeout} {cmd}"
log.debug("SSH command: '%s'", logging_command)
retcode = _exec_ssh_cmd(cmd, allow_failure=allow_failure, **kwargs)
return retcode
def check_auth(name, sock_dir=None, queue=None, timeout=300):
"""
This function is called from a multiprocess instance, to wait for a minion
to become available to receive salt commands
"""
with salt.utils.event.SaltEvent("master", sock_dir, listen=True) as event:
starttime = time.mktime(time.localtime())
newtimeout = timeout
log.debug("In check_auth, waiting for %s to become available", name)
while newtimeout > 0:
newtimeout = timeout - (time.mktime(time.localtime()) - starttime)
ret = event.get_event(full=True)
if ret is None:
continue
if ret["tag"] == f"salt/minion/{name}/start":
queue.put(name)
newtimeout = 0
log.debug("Minion %s is ready to receive commands", name)
def ip_to_int(ip):
"""
Converts an IP address to an integer
"""
ret = 0
for octet in ip.split("."):
ret = ret * 256 + int(octet)
return ret
def is_public_ip(ip):
"""
Determines whether an IP address falls within one of the private IP ranges
"""
if ":" in ip:
# ipv6
if ip.startswith("fe80:"):
# ipv6 link local
return False
return True
addr = ip_to_int(ip)
if 167772160 < addr < 184549375:
# 10.0.0.0/8
return False
elif 3232235520 < addr < 3232301055:
# 192.168.0.0/16
return False
elif 2886729728 < addr < 2887778303:
# 172.16.0.0/12
return False
elif 2130706432 < addr < 2147483647:
# 127.0.0.0/8
return False
return True
def check_name(name, safe_chars):
"""
Check whether the specified name contains invalid characters
"""
regexp = re.compile(f"[^{safe_chars}]")
if regexp.search(name):
raise SaltCloudException(
"{} contains characters not supported by this cloud provider. "
"Valid characters are: {}".format(name, safe_chars)
)
def remove_sshkey(host, known_hosts=None):
"""
Remove a host from the known_hosts file
"""
if known_hosts is None:
if "HOME" in os.environ:
known_hosts = "{}/.ssh/known_hosts".format(os.environ["HOME"])
else:
try:
known_hosts = "{}/.ssh/known_hosts".format(
pwd.getpwuid(os.getuid()).pwd_dir
)
except Exception: # pylint: disable=broad-except
pass
if known_hosts is not None:
log.debug("Removing ssh key for %s from known hosts file %s", host, known_hosts)
else:
log.debug("Removing ssh key for %s from known hosts file", host)
subprocess.call(["ssh-keygen", "-R", host])
def wait_for_ip(
update_callback,
update_args=None,
update_kwargs=None,
timeout=5 * 60,
interval=5,
interval_multiplier=1,
max_failures=10,
):
"""
Helper function that waits for an IP address for a specific maximum amount
of time.
:param update_callback: callback function which queries the cloud provider
for the VM ip address. It must return None if the
required data, IP included, is not available yet.
:param update_args: Arguments to pass to update_callback
:param update_kwargs: Keyword arguments to pass to update_callback
:param timeout: The maximum amount of time(in seconds) to wait for the IP
address.
:param interval: The looping interval, i.e., the amount of time to sleep
before the next iteration.
:param interval_multiplier: Increase the interval by this multiplier after
each request; helps with throttling
:param max_failures: If update_callback returns ``False`` it's considered
query failure. This value is the amount of failures
accepted before giving up.
:returns: The update_callback returned data
:raises: SaltCloudExecutionTimeout
"""
if update_args is None:
update_args = ()
if update_kwargs is None:
update_kwargs = {}
duration = timeout
while True:
log.debug(
"Waiting for VM IP. Giving up in 00:%02d:%02d.",
int(timeout // 60),
int(timeout % 60),
)
data = update_callback(*update_args, **update_kwargs)
if data is False:
log.debug(
"'update_callback' has returned 'False', which is "
"considered a failure. Remaining Failures: %s.",
max_failures,
)
max_failures -= 1
if max_failures <= 0:
raise SaltCloudExecutionFailure(
"Too many failures occurred while waiting for the IP address."
)
elif data is not None:
return data
if timeout < 0:
raise SaltCloudExecutionTimeout(
"Unable to get IP for 00:{:02d}:{:02d}.".format(
int(duration // 60), int(duration % 60)
)
)
time.sleep(interval)
timeout -= interval
if interval_multiplier > 1:
interval *= interval_multiplier
if interval > timeout:
interval = timeout + 1
log.info("Interval multiplier in effect; interval is now %ss.", interval)
def list_nodes_select(nodes, selection, call=None):
"""
Return a list of the VMs that are on the provider, with select fields
"""
if call == "action":
raise SaltCloudSystemExit(
"The list_nodes_select function must be called with -f or --function."
)
if "error" in nodes:
raise SaltCloudSystemExit(
"An error occurred while listing nodes: {}".format(
nodes["error"]["Errors"]["Error"]["Message"]
)
)
ret = {}
for node in nodes:
pairs = {}
data = nodes[node]
for key in data:
if str(key) in selection:
value = data[key]
pairs[key] = value
ret[node] = pairs
return ret
def lock_file(filename, interval=0.5, timeout=15):
"""
Lock a file; if it is already locked, then wait for it to become available
before locking it.
Note that these locks are only recognized by Salt Cloud, and not other
programs or platforms.
"""
log.trace("Attempting to obtain lock for %s", filename)
lock = filename + ".lock"
start = time.time()
while True:
if os.path.exists(lock):
if time.time() - start >= timeout:
log.warning("Unable to obtain lock for %s", filename)
return False
time.sleep(interval)
else:
break
with salt.utils.files.fopen(lock, "a"):
pass
def unlock_file(filename):
"""
Unlock a locked file
Note that these locks are only recognized by Salt Cloud, and not other
programs or platforms.
"""
log.trace("Removing lock for %s", filename)
lock = filename + ".lock"
try:
os.remove(lock)
except OSError as exc:
log.trace("Unable to remove lock for %s: %s", filename, exc)
def cachedir_index_add(minion_id, profile, driver, provider, base=None):
"""
Add an entry to the cachedir index. This generally only needs to happen when
a new instance is created. This entry should contain:
.. code-block:: yaml
- minion_id
- profile used to create the instance
- provider and driver name
The intent of this function is to speed up lookups for the cloud roster for
salt-ssh. However, other code that makes use of profile information can also
make use of this function.
"""
base = init_cachedir(base)
index_file = os.path.join(base, "index.p")
lock_file(index_file)
if os.path.exists(index_file):
with salt.utils.files.fopen(index_file, "rb") as fh_:
index = salt.utils.data.decode(
salt.utils.msgpack.load(fh_, encoding=MSGPACK_ENCODING)
)
else:
index = {}
prov_comps = provider.split(":")
index.update(
{
minion_id: {
"id": minion_id,
"profile": profile,
"driver": driver,
"provider": prov_comps[0],
}
}
)
with salt.utils.files.fopen(index_file, "wb") as fh_:
salt.utils.msgpack.dump(index, fh_, encoding=MSGPACK_ENCODING)
unlock_file(index_file)
def cachedir_index_del(minion_id, base=None):
"""
Delete an entry from the cachedir index. This generally only needs to happen
when an instance is deleted.
"""
base = init_cachedir(base)
index_file = os.path.join(base, "index.p")
lock_file(index_file)
if os.path.exists(index_file):
with salt.utils.files.fopen(index_file, "rb") as fh_:
index = salt.utils.data.decode(
salt.utils.msgpack.load(fh_, encoding=MSGPACK_ENCODING)
)
else:
return
if minion_id in index:
del index[minion_id]
with salt.utils.files.fopen(index_file, "wb") as fh_:
salt.utils.msgpack.dump(index, fh_, encoding=MSGPACK_ENCODING)
unlock_file(index_file)
def init_cachedir(base=None):
"""
Initialize the cachedir needed for Salt Cloud to keep track of minions
"""
if base is None:
base = __opts__["cachedir"]
needed_dirs = (base, os.path.join(base, "requested"), os.path.join(base, "active"))
for dir_ in needed_dirs:
if not os.path.exists(dir_):
os.makedirs(dir_)
os.chmod(base, 0o755)
return base
# FIXME: This function seems used nowhere. Dead code?
def request_minion_cachedir(
minion_id,
opts=None,
fingerprint="",
pubkey=None,
provider=None,
base=None,
):
"""
Creates an entry in the requested/ cachedir. This means that Salt Cloud has
made a request to a cloud provider to create an instance, but it has not
yet verified that the instance properly exists.
If the fingerprint is unknown, a raw pubkey can be passed in, and a
fingerprint will be calculated. If both are empty, then the fingerprint
will be set to None.
"""
if base is None:
base = __opts__["cachedir"]
if not fingerprint and pubkey is not None:
fingerprint = salt.utils.crypt.pem_finger(
key=pubkey, sum_type=(opts and opts.get("hash_type") or "sha256")
)
init_cachedir(base)
data = {
"minion_id": minion_id,
"fingerprint": fingerprint,
"provider": provider,
}
fname = f"{minion_id}.p"
path = os.path.join(base, "requested", fname)
with salt.utils.files.fopen(path, "wb") as fh_:
salt.utils.msgpack.dump(data, fh_, encoding=MSGPACK_ENCODING)
def change_minion_cachedir(
minion_id,
cachedir,
data=None,
base=None,
):
"""
Changes the info inside a minion's cachedir entry. The type of cachedir
must be specified (i.e., 'requested' or 'active'). A dict is also passed in
which contains the data to be changed.
Example:
change_minion_cachedir(
'myminion',
'requested',
{'fingerprint': '26:5c:8c:de:be:fe:89:c0:02:ed:27:65:0e:bb:be:60'},
)
"""
if not isinstance(data, dict):
return False
if base is None:
base = __opts__["cachedir"]
fname = f"{minion_id}.p"
path = os.path.join(base, cachedir, fname)
with salt.utils.files.fopen(path, "r") as fh_:
cache_data = salt.utils.data.decode(
salt.utils.msgpack.load(fh_, encoding=MSGPACK_ENCODING)
)
cache_data.update(data)
with salt.utils.files.fopen(path, "w") as fh_:
salt.utils.msgpack.dump(cache_data, fh_, encoding=MSGPACK_ENCODING)
def activate_minion_cachedir(minion_id, base=None):
"""
Moves a minion from the requested/ cachedir into the active/ cachedir. This
means that Salt Cloud has verified that a requested instance properly
exists, and should be expected to exist from here on out.
"""
if base is None:
base = __opts__["cachedir"]
fname = f"{minion_id}.p"
src = os.path.join(base, "requested", fname)
dst = os.path.join(base, "active")
shutil.move(src, dst)
def delete_minion_cachedir(minion_id, provider, opts, base=None):
"""
Deletes a minion's entry from the cloud cachedir. It will search through
all cachedirs to find the minion's cache file.
Needs `update_cachedir` set to True.
"""
if isinstance(opts, dict):
__opts__.update(opts)
if __opts__.get("update_cachedir", False) is False:
return
if base is None:
base = __opts__["cachedir"]
driver = next(iter(__opts__["providers"][provider].keys()))
fname = f"{minion_id}.p"
for cachedir in "requested", "active":
path = os.path.join(base, cachedir, driver, provider, fname)
log.debug("path: %s", path)
if os.path.exists(path):
os.remove(path)
def list_cache_nodes_full(opts=None, provider=None, base=None):
"""
Return a list of minion data from the cloud cache, rather from the cloud
providers themselves. This is the cloud cache version of list_nodes_full().
"""
if opts is None:
opts = __opts__
if opts.get("update_cachedir", False) is False:
return
if base is None:
base = os.path.join(opts["cachedir"], "active")
minions = {}
# First, get a list of all drivers in use
for driver in os.listdir(base):
minions[driver] = {}
prov_dir = os.path.join(base, driver)
# Then, get a list of all providers per driver
for prov in os.listdir(prov_dir):
# If a specific provider is requested, filter out everyone else
if provider and provider != prov:
continue
minions[driver][prov] = {}
min_dir = os.path.join(prov_dir, prov)
# Get a list of all nodes per provider
for fname in os.listdir(min_dir):
# Finally, get a list of full minion data
fpath = os.path.join(min_dir, fname)
minion_id = fname[:-2] # strip '.p' from end of msgpack filename
with salt.utils.files.fopen(fpath, "rb") as fh_:
minions[driver][prov][minion_id] = salt.utils.data.decode(
salt.utils.msgpack.load(fh_, encoding=MSGPACK_ENCODING)
)
return minions
def update_bootstrap(config, url=None):
"""
Update the salt-bootstrap script
url can be one of:
- The URL to fetch the bootstrap script from
- The absolute path to the bootstrap
- The content of the bootstrap script
"""
default_url = config.get("bootstrap_script_url", "https://bootstrap.saltstack.com")
if not url:
url = default_url
if not url:
raise ValueError("Cant get any source to update")
if url.startswith("http") or "://" in url:
log.debug("Updating the bootstrap-salt.sh script to latest stable")
try:
import requests
except ImportError:
return {
"error": (
"Updating the bootstrap-salt.sh script requires the "
"Python requests library to be installed"
)
}
req = requests.get(url, timeout=120)
if req.status_code != 200:
return {
"error": (
"Failed to download the latest stable version of the "
"bootstrap-salt.sh script from {}. HTTP error: "
"{}".format(url, req.status_code)
)
}
script_content = req.text
if url == default_url:
script_name = "bootstrap-salt.sh"
else:
script_name = os.path.basename(url)
elif os.path.exists(url):
with salt.utils.files.fopen(url) as fic:
script_content = salt.utils.stringutils.to_unicode(fic.read())
script_name = os.path.basename(url)
# in last case, assuming we got a script content
else:
script_content = url
script_name = f"{hashlib.sha1(script_content).hexdigest()}.sh"
if not script_content:
raise ValueError("No content in bootstrap script !")
# Get the path to the built-in deploy scripts directory
builtin_deploy_dir = os.path.join(os.path.dirname(__file__), "deploy")
# Compute the search path from the current loaded opts conf_file
# value
deploy_d_from_conf_file = os.path.join(
os.path.dirname(config["conf_file"]), "cloud.deploy.d"
)
# Compute the search path using the install time defined
# syspaths.CONF_DIR
deploy_d_from_syspaths = os.path.join(config["config_dir"], "cloud.deploy.d")
# Get a copy of any defined search paths, flagging them not to
# create parent
deploy_scripts_search_paths = []
for entry in config.get("deploy_scripts_search_path", []):
if entry.startswith(builtin_deploy_dir):
# We won't write the updated script to the built-in deploy
# directory
continue
if entry in (deploy_d_from_conf_file, deploy_d_from_syspaths):
# Allow parent directories to be made
deploy_scripts_search_paths.append((entry, True))
else:
deploy_scripts_search_paths.append((entry, False))
# In case the user is not using defaults and the computed
# 'cloud.deploy.d' from conf_file and syspaths is not included, add
# them
if deploy_d_from_conf_file not in deploy_scripts_search_paths:
deploy_scripts_search_paths.append((deploy_d_from_conf_file, True))
if deploy_d_from_syspaths not in deploy_scripts_search_paths:
deploy_scripts_search_paths.append((deploy_d_from_syspaths, True))
finished = []
finished_full = []
for entry, makedirs in deploy_scripts_search_paths:
# This handles duplicate entries, which are likely to appear
if entry in finished:
continue
else:
finished.append(entry)
if makedirs and not os.path.isdir(entry):
try:
os.makedirs(entry)
except OSError as err:
log.info("Failed to create directory '%s'", entry)
continue
if not is_writeable(entry):
log.debug("The '%s' is not writeable. Continuing...", entry)
continue
deploy_path = os.path.join(entry, script_name)
try:
finished_full.append(deploy_path)
with salt.utils.files.fopen(deploy_path, "w") as fp_:
fp_.write(salt.utils.stringutils.to_str(script_content))
except OSError as err:
log.debug("Failed to write the updated script: %s", err)
continue
return {"Success": {"Files updated": finished_full}}
def cache_node_list(nodes, provider, opts):
"""
If configured to do so, update the cloud cachedir with the current list of
nodes. Also fires configured events pertaining to the node list.
.. versionadded:: 2014.7.0
"""
if "update_cachedir" not in opts or not opts["update_cachedir"]:
return
base = os.path.join(init_cachedir(), "active")
driver = next(iter(opts["providers"][provider].keys()))
prov_dir = os.path.join(base, driver, provider)
if not os.path.exists(prov_dir):
os.makedirs(prov_dir)
# Check to see if any nodes in the cache are not in the new list
missing_node_cache(prov_dir, nodes, provider, opts)
for node in nodes:
diff_node_cache(prov_dir, node, nodes[node], opts)
path = os.path.join(prov_dir, f"{node}.p")
with salt.utils.files.fopen(path, "wb") as fh_:
salt.utils.msgpack.dump(nodes[node], fh_, encoding=MSGPACK_ENCODING)
def cache_node(node, provider, opts):
"""
Cache node individually
.. versionadded:: 2014.7.0
"""
if isinstance(opts, dict):
__opts__.update(opts)
if "update_cachedir" not in __opts__ or not __opts__["update_cachedir"]:
return
if not os.path.exists(os.path.join(__opts__["cachedir"], "active")):
init_cachedir()
base = os.path.join(__opts__["cachedir"], "active")
provider, driver = provider.split(":")
prov_dir = os.path.join(base, driver, provider)
if not os.path.exists(prov_dir):
os.makedirs(prov_dir)
path = os.path.join(prov_dir, "{}.p".format(node["name"]))
with salt.utils.files.fopen(path, "wb") as fh_:
salt.utils.msgpack.dump(node, fh_, encoding=MSGPACK_ENCODING)
def missing_node_cache(prov_dir, node_list, provider, opts):
"""
Check list of nodes to see if any nodes which were previously known about
in the cache have been removed from the node list.
This function will only run if configured to do so in the main Salt Cloud
configuration file (normally /etc/salt/cloud).
.. code-block:: yaml
diff_cache_events: True
.. versionadded:: 2014.7.0
"""
cached_nodes = []
for node in os.listdir(prov_dir):
cached_nodes.append(os.path.splitext(node)[0])
for node in cached_nodes:
if node not in node_list:
delete_minion_cachedir(node, provider, opts)
if "diff_cache_events" in opts and opts["diff_cache_events"]:
fire_event(
"event",
"cached node missing from provider",
f"salt/cloud/{node}/cache_node_missing",
args={"missing node": node},
sock_dir=opts.get(
"sock_dir", os.path.join(__opts__["sock_dir"], "master")
),
transport=opts.get("transport", "zeromq"),
)
def diff_node_cache(prov_dir, node, new_data, opts):
"""
Check new node data against current cache. If data differ, fire an event
which consists of the new node data.
This function will only run if configured to do so in the main Salt Cloud
configuration file (normally /etc/salt/cloud).
.. code-block:: yaml
diff_cache_events: True
.. versionadded:: 2014.7.0
"""
if "diff_cache_events" not in opts or not opts["diff_cache_events"]:
return
if node is None:
return
path = f"{os.path.join(prov_dir, node)}.p"
if not os.path.exists(path):
event_data = _strip_cache_events(new_data, opts)
fire_event(
"event",
"new node found",
f"salt/cloud/{node}/cache_node_new",
args={"new_data": event_data},
sock_dir=opts.get("sock_dir", os.path.join(__opts__["sock_dir"], "master")),
transport=opts.get("transport", "zeromq"),
)
return
with salt.utils.files.fopen(path, "r") as fh_:
try:
cache_data = salt.utils.data.decode(
salt.utils.msgpack.load(fh_, encoding=MSGPACK_ENCODING)
)
except ValueError:
log.warning("Cache for %s was corrupt: Deleting", node)
cache_data = {}
# Perform a simple diff between the old and the new data, and if it differs,
# return both dicts.
# TODO: Return an actual diff
diff = salt.utils.compat.cmp(new_data, cache_data)
if diff != 0:
fire_event(
"event",
"node data differs",
f"salt/cloud/{node}/cache_node_diff",
args={
"new_data": _strip_cache_events(new_data, opts),
"cache_data": _strip_cache_events(cache_data, opts),
},
sock_dir=opts.get("sock_dir", os.path.join(__opts__["sock_dir"], "master")),
transport=opts.get("transport", "zeromq"),
)
def _strip_cache_events(data, opts):
"""
Strip out user-configured sensitive event data. The fields to be stripped
are configured in the main Salt Cloud configuration file, usually
``/etc/salt/cloud``.
.. code-block:: yaml
cache_event_strip_fields:
- password
- priv_key
.. versionadded:: 2014.7.0
"""
event_data = copy.deepcopy(data)
strip_fields = opts.get("cache_event_strip_fields", [])
for field in strip_fields:
if field in event_data:
del event_data[field]
return event_data
def _salt_cloud_force_ascii(exc):
"""
Helper method to try its best to convert any Unicode text into ASCII
without stack tracing since salt internally does not handle Unicode strings
This method is not supposed to be used directly. Once
`py:module: salt.utils.cloud` is imported this method register's with
python's codecs module for proper automatic conversion in case of encoding
errors.
"""
if not isinstance(exc, (UnicodeEncodeError, UnicodeTranslateError)):
raise TypeError(f"Can't handle {exc}")
unicode_trans = {
# Convert non-breaking space to space
"\xa0": " ",
# Convert en dash to dash
"\u2013": "-",
}
if exc.object[exc.start : exc.end] in unicode_trans:
return unicode_trans[exc.object[exc.start : exc.end]], exc.end
# There's nothing else we can do, raise the exception
raise exc
codecs.register_error("salt-cloud-force-ascii", _salt_cloud_force_ascii)
def retrieve_password_from_keyring(credential_id, username):
"""
Retrieve particular user's password for a specified credential set from system keyring.
"""
try:
import keyring # pylint: disable=import-error
return keyring.get_password(credential_id, username)
except ImportError:
log.error(
"USE_KEYRING configured as a password, but no keyring module is installed"
)
return False
def _save_password_in_keyring(credential_id, username, password):
"""
Saves provider password in system keyring
"""
try:
import keyring # pylint: disable=import-error
return keyring.set_password(credential_id, username, password)
except ImportError:
log.error(
"Tried to store password in keyring, but no keyring module is installed"
)
return False
def store_password_in_keyring(credential_id, username, password=None):
"""
Interactively prompts user for a password and stores it in system keyring
"""
try:
# pylint: disable=import-error
import keyring
import keyring.errors
# pylint: enable=import-error
if password is None:
prompt = f"Please enter password for {credential_id}: "
try:
password = getpass.getpass(prompt)
except EOFError:
password = None
if not password:
# WE should raise something else here to be able to use this
# as/from an API
raise RuntimeError("Invalid password provided.")
try:
_save_password_in_keyring(credential_id, username, password)
except keyring.errors.PasswordSetError as exc:
log.debug("Problem saving password in the keyring: %s", exc)
except ImportError:
log.error(
"Tried to store password in keyring, but no keyring module is installed"
)
return False
def _unwrap_dict(dictionary, index_string):
"""
Accepts index in form of a string
Returns final value
Example: dictionary = {'a': {'b': {'c': 'foobar'}}}
index_string = 'a,b,c'
returns 'foobar'
"""
index = index_string.split(",")
for k in index:
dictionary = dictionary[k]
return dictionary
def run_func_until_ret_arg(
fun,
kwargs,
fun_call=None,
argument_being_watched=None,
required_argument_response=None,
):
"""
Waits until the function retrieves some required argument.
NOTE: Tested with ec2 describe_volumes and describe_snapshots only.
"""
status = None
while status != required_argument_response:
f_result = fun(kwargs, call=fun_call)
r_set = {}
for d in f_result:
if isinstance(d, list):
d0 = d[0]
if isinstance(d0, dict):
for k, v in d0.items():
r_set[k] = v
status = _unwrap_dict(r_set, argument_being_watched)
log.debug(
"Function: %s, Watched arg: %s, Response: %s",
str(fun).split(" ")[1],
argument_being_watched,
status,
)
time.sleep(5)
return True
def get_salt_interface(vm_, opts):
"""
Return the salt_interface type to connect to. Either 'public_ips' (default)
or 'private_ips'.
"""
salt_host = salt.config.get_cloud_config_value(
"salt_interface", vm_, opts, default=False, search_global=False
)
if salt_host is False:
salt_host = salt.config.get_cloud_config_value(
"ssh_interface", vm_, opts, default="public_ips", search_global=False
)
return salt_host
def check_key_path_and_mode(provider, key_path):
"""
Checks that the key_path exists and the key_mode is either 0400 or 0600.
Returns True or False.
.. versionadded:: 2016.3.0
provider
The provider name that the key_path to check belongs to.
key_path
The key_path to ensure that it exists and to check adequate permissions
against.
"""
if not os.path.exists(key_path):
log.error(
"The key file '%s' used in the '%s' provider configuration "
"does not exist.\n",
key_path,
provider,
)
return False
key_mode = stat.S_IMODE(os.stat(key_path).st_mode)
if key_mode not in (0o400, 0o600):
log.error(
"The key file '%s' used in the '%s' provider configuration "
"needs to be set to mode 0400 or 0600.\n",
key_path,
provider,
)
return False
return True
def userdata_template(opts, vm_, userdata):
"""
Use the configured templating engine to template the userdata file
"""
# No userdata, no need to template anything
if userdata is None:
return userdata
userdata_template = salt.config.get_cloud_config_value(
"userdata_template", vm_, opts, search_global=False, default=None
)
if userdata_template is False:
return userdata
# Use the cloud profile's userdata_template, otherwise get it from the
# master configuration file.
renderer = (
opts.get("userdata_template")
if userdata_template is None
else userdata_template
)
if renderer is None:
return userdata
else:
render_opts = opts.copy()
render_opts.update(vm_)
rend = salt.loader.render(render_opts, {})
blacklist = opts["renderer_blacklist"]
whitelist = opts["renderer_whitelist"]
templated = salt.template.compile_template(
":string:",
rend,
renderer,
blacklist,
whitelist,
input_data=userdata,
)
if not isinstance(templated, str):
# template renderers like "jinja" should return a StringIO
try:
templated = "".join(templated.readlines())
except AttributeError:
log.warning(
"Templated userdata resulted in non-string result (%s), "
"converting to string",
templated,
)
templated = str(templated)
return templated
Zerion Mini Shell 1.0