Server IP : 85.214.239.14 / Your IP : 3.22.181.178 Web Server : Apache/2.4.62 (Debian) System : Linux h2886529.stratoserver.net 4.9.0 #1 SMP Tue Jan 9 19:45:01 MSK 2024 x86_64 User : www-data ( 33) PHP Version : 7.4.18 Disable Function : pcntl_alarm,pcntl_fork,pcntl_waitpid,pcntl_wait,pcntl_wifexited,pcntl_wifstopped,pcntl_wifsignaled,pcntl_wifcontinued,pcntl_wexitstatus,pcntl_wtermsig,pcntl_wstopsig,pcntl_signal,pcntl_signal_get_handler,pcntl_signal_dispatch,pcntl_get_last_error,pcntl_strerror,pcntl_sigprocmask,pcntl_sigwaitinfo,pcntl_sigtimedwait,pcntl_exec,pcntl_getpriority,pcntl_setpriority,pcntl_async_signals,pcntl_unshare, MySQL : OFF | cURL : OFF | WGET : ON | Perl : ON | Python : ON | Sudo : ON | Pkexec : OFF Directory : /proc/2/task/2/root/proc/3/root/proc/2/root/lib/python3/dist-packages/ansible_test/_internal/ |
Upload File : |
"""High level functions for working with SSH.""" from __future__ import annotations import dataclasses import itertools import json import os import random import re import subprocess import shlex import typing as t from .encoding import ( to_bytes, to_text, ) from .util import ( ApplicationError, common_environment, display, exclude_none_values, sanitize_host_name, ) from .config import ( EnvironmentConfig, ) @dataclasses.dataclass class SshConnectionDetail: """Information needed to establish an SSH connection to a host.""" name: str host: str port: t.Optional[int] user: str identity_file: str python_interpreter: t.Optional[str] = None shell_type: t.Optional[str] = None enable_rsa_sha1: bool = False def __post_init__(self): self.name = sanitize_host_name(self.name) @property def options(self) -> dict[str, str]: """OpenSSH config options, which can be passed to the `ssh` CLI with the `-o` argument.""" options: dict[str, str] = {} if self.enable_rsa_sha1: # Newer OpenSSH clients connecting to older SSH servers must explicitly enable ssh-rsa support. # OpenSSH 8.8, released on 2021-09-26, deprecated using RSA with the SHA-1 hash algorithm (ssh-rsa). # OpenSSH 7.2, released on 2016-02-29, added support for using RSA with SHA-256/512 hash algorithms. # See: https://www.openssh.com/txt/release-8.8 algorithms = '+ssh-rsa' # append the algorithm to the default list, requires OpenSSH 7.0 or later options.update( # Host key signature algorithms that the client wants to use. # Available options can be found with `ssh -Q HostKeyAlgorithms` or `ssh -Q key` on older clients. # This option was updated in OpenSSH 7.0, released on 2015-08-11, to support the "+" prefix. # See: https://www.openssh.com/txt/release-7.0 HostKeyAlgorithms=algorithms, # Signature algorithms that will be used for public key authentication. # Available options can be found with `ssh -Q PubkeyAcceptedAlgorithms` or `ssh -Q key` on older clients. # This option was added in OpenSSH 7.0, released on 2015-08-11. # See: https://www.openssh.com/txt/release-7.0 # This option is an alias for PubkeyAcceptedAlgorithms, which was added in OpenSSH 8.5. # See: https://www.openssh.com/txt/release-8.5 PubkeyAcceptedKeyTypes=algorithms, ) return options class SshProcess: """Wrapper around an SSH process.""" def __init__(self, process: t.Optional[subprocess.Popen]) -> None: self._process = process self.pending_forwards: t.Optional[list[tuple[str, int]]] = None self.forwards: dict[tuple[str, int], int] = {} def terminate(self) -> None: """Terminate the SSH process.""" if not self._process: return # explain mode # noinspection PyBroadException try: self._process.terminate() except Exception: # pylint: disable=broad-except pass def wait(self) -> None: """Wait for the SSH process to terminate.""" if not self._process: return # explain mode self._process.wait() def collect_port_forwards(self) -> dict[tuple[str, int], int]: """Collect port assignments for dynamic SSH port forwards.""" errors: list[str] = [] display.info('Collecting %d SSH port forward(s).' % len(self.pending_forwards), verbosity=2) while self.pending_forwards: if self._process: line_bytes = self._process.stderr.readline() if not line_bytes: if errors: details = ':\n%s' % '\n'.join(errors) else: details = '.' raise ApplicationError('SSH port forwarding failed%s' % details) line = to_text(line_bytes).strip() match = re.search(r'^Allocated port (?P<src_port>[0-9]+) for remote forward to (?P<dst_host>[^:]+):(?P<dst_port>[0-9]+)$', line) if not match: if re.search(r'^Warning: Permanently added .* to the list of known hosts\.$', line): continue display.warning('Unexpected SSH port forwarding output: %s' % line, verbosity=2) errors.append(line) continue src_port = int(match.group('src_port')) dst_host = str(match.group('dst_host')) dst_port = int(match.group('dst_port')) dst = (dst_host, dst_port) else: # explain mode dst = self.pending_forwards[0] src_port = random.randint(40000, 50000) self.pending_forwards.remove(dst) self.forwards[dst] = src_port display.info('Collected %d SSH port forward(s):\n%s' % ( len(self.forwards), '\n'.join('%s -> %s:%s' % (src_port, dst[0], dst[1]) for dst, src_port in sorted(self.forwards.items()))), verbosity=2) return self.forwards def create_ssh_command( ssh: SshConnectionDetail, options: t.Optional[dict[str, t.Union[str, int]]] = None, cli_args: list[str] = None, command: t.Optional[str] = None, ) -> list[str]: """Create an SSH command using the specified options.""" cmd = [ 'ssh', '-n', # prevent reading from stdin '-i', ssh.identity_file, # file from which the identity for public key authentication is read ] # fmt: skip if not command: cmd.append('-N') # do not execute a remote command if ssh.port: cmd.extend(['-p', str(ssh.port)]) # port to connect to on the remote host if ssh.user: cmd.extend(['-l', ssh.user]) # user to log in as on the remote machine ssh_options: dict[str, t.Union[int, str]] = dict( BatchMode='yes', ExitOnForwardFailure='yes', LogLevel='ERROR', ServerAliveCountMax=4, ServerAliveInterval=15, StrictHostKeyChecking='no', UserKnownHostsFile='/dev/null', ) ssh_options.update(options or {}) cmd.extend(ssh_options_to_list(ssh_options)) cmd.extend(cli_args or []) cmd.append(ssh.host) if command: cmd.append(command) return cmd def ssh_options_to_list(options: t.Union[dict[str, t.Union[int, str]], dict[str, str]]) -> list[str]: """Format a dictionary of SSH options as a list suitable for passing to the `ssh` command.""" return list(itertools.chain.from_iterable( ('-o', f'{key}={value}') for key, value in sorted(options.items()) )) def ssh_options_to_str(options: t.Union[dict[str, t.Union[int, str]], dict[str, str]]) -> str: """Format a dictionary of SSH options as a string suitable for passing as `ansible_ssh_extra_args` in inventory.""" return shlex.join(ssh_options_to_list(options)) def run_ssh_command( args: EnvironmentConfig, ssh: SshConnectionDetail, options: t.Optional[dict[str, t.Union[str, int]]] = None, cli_args: list[str] = None, command: t.Optional[str] = None, ) -> SshProcess: """Run the specified SSH command, returning the created SshProcess instance created.""" cmd = create_ssh_command(ssh, options, cli_args, command) env = common_environment() cmd_show = shlex.join(cmd) display.info('Run background command: %s' % cmd_show, verbosity=1, truncate=True) cmd_bytes = [to_bytes(arg) for arg in cmd] env_bytes = dict((to_bytes(k), to_bytes(v)) for k, v in env.items()) if args.explain: process = SshProcess(None) else: process = SshProcess(subprocess.Popen(cmd_bytes, env=env_bytes, bufsize=-1, # pylint: disable=consider-using-with stdin=subprocess.DEVNULL, stdout=subprocess.PIPE, stderr=subprocess.PIPE)) return process def create_ssh_port_forwards( args: EnvironmentConfig, ssh: SshConnectionDetail, forwards: list[tuple[str, int]], ) -> SshProcess: """ Create SSH port forwards using the provided list of tuples (target_host, target_port). Port bindings will be automatically assigned by SSH and must be collected with a subsequent call to collect_port_forwards. """ options: dict[str, t.Union[str, int]] = dict( LogLevel='INFO', # info level required to get messages on stderr indicating the ports assigned to each forward ) cli_args = [] for forward_host, forward_port in forwards: cli_args.extend(['-R', ':'.join([str(0), forward_host, str(forward_port)])]) process = run_ssh_command(args, ssh, options, cli_args) process.pending_forwards = forwards return process def create_ssh_port_redirects( args: EnvironmentConfig, ssh: SshConnectionDetail, redirects: list[tuple[int, str, int]], ) -> SshProcess: """Create SSH port redirections using the provided list of tuples (bind_port, target_host, target_port).""" options: dict[str, t.Union[str, int]] = {} cli_args = [] for bind_port, target_host, target_port in redirects: cli_args.extend(['-R', ':'.join([str(bind_port), target_host, str(target_port)])]) process = run_ssh_command(args, ssh, options, cli_args) return process def generate_ssh_inventory(ssh_connections: list[SshConnectionDetail]) -> str: """Return an inventory file in JSON format, created from the provided SSH connection details.""" inventory = dict( all=dict( hosts=dict((ssh.name, exclude_none_values(dict( ansible_host=ssh.host, ansible_port=ssh.port, ansible_user=ssh.user, ansible_ssh_private_key_file=os.path.abspath(ssh.identity_file), ansible_connection='ssh', ansible_pipelining='yes', ansible_python_interpreter=ssh.python_interpreter, ansible_shell_type=ssh.shell_type, ansible_ssh_extra_args=ssh_options_to_str(dict(UserKnownHostsFile='/dev/null', **ssh.options)), # avoid changing the test environment ansible_ssh_host_key_checking='no', ))) for ssh in ssh_connections), ), ) inventory_text = json.dumps(inventory, indent=4, sort_keys=True) display.info('>>> SSH Inventory\n%s' % inventory_text, verbosity=3) return inventory_text