mirror of
https://github.com/saltstack/salt.git
synced 2025-04-17 10:10:20 +00:00
605 lines
18 KiB
Python
605 lines
18 KiB
Python
#
|
|
# Copyright 2015 SUSE LLC
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
import logging
|
|
import os
|
|
import subprocess
|
|
import sys
|
|
|
|
import salt.utils.crypt
|
|
import salt.utils.files
|
|
import salt.utils.fsutils
|
|
import salt.utils.path
|
|
import salt.utils.stringutils
|
|
from salt.exceptions import CommandExecutionError
|
|
from salt.modules.inspectlib import EnvLoader, kiwiproc
|
|
from salt.modules.inspectlib.entities import (
|
|
AllowedDir,
|
|
IgnoredDir,
|
|
Package,
|
|
PackageCfgFile,
|
|
PayloadFile,
|
|
)
|
|
from salt.modules.inspectlib.exceptions import InspectorSnapshotException
|
|
|
|
try:
|
|
import kiwi
|
|
except ImportError:
|
|
kiwi = None
|
|
|
|
log = logging.getLogger(__name__)
|
|
|
|
|
|
class Inspector(EnvLoader):
|
|
DEFAULT_MINION_CONFIG_PATH = "/etc/salt/minion"
|
|
|
|
MODE = ["configuration", "payload", "all"]
|
|
IGNORE_MOUNTS = ["proc", "sysfs", "devtmpfs", "tmpfs", "fuse.gvfs-fuse-daemon"]
|
|
IGNORE_FS_TYPES = ["autofs", "cifs", "nfs", "nfs4"]
|
|
IGNORE_PATHS = [
|
|
"/tmp",
|
|
"/var/tmp",
|
|
"/lost+found",
|
|
"/var/run",
|
|
"/var/lib/rpm",
|
|
"/.snapshots",
|
|
"/.zfs",
|
|
"/etc/ssh",
|
|
"/root",
|
|
"/home",
|
|
]
|
|
|
|
def __init__(self, cachedir=None, piddir=None, pidfilename=None):
|
|
EnvLoader.__init__(
|
|
self, cachedir=cachedir, piddir=piddir, pidfilename=pidfilename
|
|
)
|
|
|
|
def create_snapshot(self):
|
|
"""
|
|
Open new snapshot.
|
|
|
|
:return:
|
|
"""
|
|
self.db.open(new=True)
|
|
return self
|
|
|
|
def reuse_snapshot(self):
|
|
"""
|
|
Open an existing, latest snapshot.
|
|
|
|
:return:
|
|
"""
|
|
self.db.open()
|
|
return self
|
|
|
|
def _syscall(self, command, input=None, env=None, *params):
|
|
"""
|
|
Call an external system command.
|
|
"""
|
|
return subprocess.Popen(
|
|
[command] + list(params),
|
|
stdout=subprocess.PIPE,
|
|
stdin=subprocess.PIPE,
|
|
stderr=subprocess.STDOUT,
|
|
env=env or os.environ,
|
|
).communicate(input=input)
|
|
|
|
def _get_cfg_pkgs(self):
|
|
"""
|
|
Package scanner switcher between the platforms.
|
|
|
|
:return:
|
|
"""
|
|
if self.grains_core.os_data().get("os_family") == "Debian":
|
|
return self.__get_cfg_pkgs_dpkg()
|
|
elif self.grains_core.os_data().get("os_family") in ["Suse", "redhat"]:
|
|
return self.__get_cfg_pkgs_rpm()
|
|
else:
|
|
return dict()
|
|
|
|
def __get_cfg_pkgs_dpkg(self):
|
|
"""
|
|
Get packages with configuration files on Dpkg systems.
|
|
:return:
|
|
"""
|
|
# Get list of all available packages
|
|
data = dict()
|
|
|
|
for pkg_name in salt.utils.stringutils.to_str(
|
|
self._syscall("dpkg-query", None, None, "-Wf", "${binary:Package}\\n")[0]
|
|
).split(os.linesep):
|
|
pkg_name = pkg_name.strip()
|
|
if not pkg_name:
|
|
continue
|
|
data[pkg_name] = list()
|
|
for pkg_cfg_item in salt.utils.stringutils.to_str(
|
|
self._syscall(
|
|
"dpkg-query", None, None, "-Wf", "${Conffiles}\\n", pkg_name
|
|
)[0]
|
|
).split(os.linesep):
|
|
pkg_cfg_item = pkg_cfg_item.strip()
|
|
if not pkg_cfg_item:
|
|
continue
|
|
pkg_cfg_file, pkg_cfg_sum = pkg_cfg_item.strip().split(" ", 1)
|
|
data[pkg_name].append(pkg_cfg_file)
|
|
|
|
# Dpkg meta data is unreliable. Check every package
|
|
# and remove which actually does not have config files.
|
|
if not data[pkg_name]:
|
|
data.pop(pkg_name)
|
|
|
|
return data
|
|
|
|
def __get_cfg_pkgs_rpm(self):
|
|
"""
|
|
Get packages with configuration files on RPM systems.
|
|
"""
|
|
out, err = self._syscall(
|
|
"rpm",
|
|
None,
|
|
None,
|
|
"-qa",
|
|
"--configfiles",
|
|
"--queryformat",
|
|
"%{name}-%{version}-%{release}\\n",
|
|
)
|
|
data = dict()
|
|
pkg_name = None
|
|
pkg_configs = []
|
|
|
|
out = salt.utils.stringutils.to_str(out)
|
|
for line in out.split(os.linesep):
|
|
line = line.strip()
|
|
if not line:
|
|
continue
|
|
if not line.startswith("/"):
|
|
if pkg_name and pkg_configs:
|
|
data[pkg_name] = pkg_configs
|
|
pkg_name = line
|
|
pkg_configs = []
|
|
else:
|
|
pkg_configs.append(line)
|
|
|
|
if pkg_name and pkg_configs:
|
|
data[pkg_name] = pkg_configs
|
|
|
|
return data
|
|
|
|
def _get_changed_cfg_pkgs(self, data):
|
|
"""
|
|
Filter out unchanged packages on the Debian or RPM systems.
|
|
|
|
:param data: Structure {package-name -> [ file .. file1 ]}
|
|
:return: Same structure as data, except only files that were changed.
|
|
"""
|
|
f_data = dict()
|
|
for pkg_name, pkg_files in data.items():
|
|
cfgs = list()
|
|
cfg_data = list()
|
|
if self.grains_core.os_data().get("os_family") == "Debian":
|
|
cfg_data = salt.utils.stringutils.to_str(
|
|
self._syscall("dpkg", None, None, "--verify", pkg_name)[0]
|
|
).split(os.linesep)
|
|
elif self.grains_core.os_data().get("os_family") in ["Suse", "redhat"]:
|
|
cfg_data = salt.utils.stringutils.to_str(
|
|
self._syscall(
|
|
"rpm",
|
|
None,
|
|
None,
|
|
"-V",
|
|
"--nodeps",
|
|
"--nodigest",
|
|
"--nosignature",
|
|
"--nomtime",
|
|
"--nolinkto",
|
|
pkg_name,
|
|
)[0]
|
|
).split(os.linesep)
|
|
for line in cfg_data:
|
|
line = line.strip()
|
|
if not line or line.find(" c ") < 0 or line.split(" ")[0].find("5") < 0:
|
|
continue
|
|
cfg_file = line.split(" ")[-1]
|
|
if cfg_file in pkg_files:
|
|
cfgs.append(cfg_file)
|
|
if cfgs:
|
|
f_data[pkg_name] = cfgs
|
|
|
|
return f_data
|
|
|
|
def _save_cfg_packages(self, data):
|
|
"""
|
|
Save configuration packages. (NG)
|
|
|
|
:param data:
|
|
:return:
|
|
"""
|
|
pkg_id = 0
|
|
pkg_cfg_id = 0
|
|
for pkg_name, pkg_configs in data.items():
|
|
pkg = Package()
|
|
pkg.id = pkg_id
|
|
pkg.name = pkg_name
|
|
self.db.store(pkg)
|
|
|
|
for pkg_config in pkg_configs:
|
|
cfg = PackageCfgFile()
|
|
cfg.id = pkg_cfg_id
|
|
cfg.pkgid = pkg_id
|
|
cfg.path = pkg_config
|
|
self.db.store(cfg)
|
|
pkg_cfg_id += 1
|
|
|
|
pkg_id += 1
|
|
|
|
def _save_payload(self, files, directories, links):
|
|
"""
|
|
Save payload (unmanaged files)
|
|
|
|
:param files:
|
|
:param directories:
|
|
:param links:
|
|
:return:
|
|
"""
|
|
|
|
idx = 0
|
|
for p_type, p_list in (
|
|
("f", files),
|
|
("d", directories),
|
|
(
|
|
"l",
|
|
links,
|
|
),
|
|
):
|
|
for p_obj in p_list:
|
|
stats = os.stat(p_obj)
|
|
|
|
payload = PayloadFile()
|
|
payload.id = idx
|
|
payload.path = p_obj
|
|
payload.p_type = p_type
|
|
payload.mode = stats.st_mode
|
|
payload.uid = stats.st_uid
|
|
payload.gid = stats.st_gid
|
|
payload.p_size = stats.st_size
|
|
payload.atime = stats.st_atime
|
|
payload.mtime = stats.st_mtime
|
|
payload.ctime = stats.st_ctime
|
|
|
|
idx += 1
|
|
self.db.store(payload)
|
|
|
|
def _get_managed_files(self):
|
|
"""
|
|
Build a in-memory data of all managed files.
|
|
"""
|
|
if self.grains_core.os_data().get("os_family") == "Debian":
|
|
return self.__get_managed_files_dpkg()
|
|
elif self.grains_core.os_data().get("os_family") in ["Suse", "redhat"]:
|
|
return self.__get_managed_files_rpm()
|
|
|
|
return list(), list(), list()
|
|
|
|
def __get_managed_files_dpkg(self):
|
|
"""
|
|
Get a list of all system files, belonging to the Debian package manager.
|
|
"""
|
|
dirs = set()
|
|
links = set()
|
|
files = set()
|
|
|
|
for pkg_name in salt.utils.stringutils.to_str(
|
|
self._syscall("dpkg-query", None, None, "-Wf", "${binary:Package}\\n")[0]
|
|
).split(os.linesep):
|
|
pkg_name = pkg_name.strip()
|
|
if not pkg_name:
|
|
continue
|
|
for resource in salt.utils.stringutils.to_str(
|
|
self._syscall("dpkg", None, None, "-L", pkg_name)[0]
|
|
).split(os.linesep):
|
|
resource = resource.strip()
|
|
if not resource or resource in ["/", "./", "."]:
|
|
continue
|
|
if os.path.isdir(resource):
|
|
dirs.add(resource)
|
|
elif os.path.islink(resource):
|
|
links.add(resource)
|
|
elif os.path.isfile(resource):
|
|
files.add(resource)
|
|
|
|
return sorted(files), sorted(dirs), sorted(links)
|
|
|
|
def __get_managed_files_rpm(self):
|
|
"""
|
|
Get a list of all system files, belonging to the RedHat package manager.
|
|
"""
|
|
dirs = set()
|
|
links = set()
|
|
files = set()
|
|
|
|
for line in salt.utils.stringutils.to_str(
|
|
self._syscall("rpm", None, None, "-qlav")[0]
|
|
).split(os.linesep):
|
|
line = line.strip()
|
|
if not line:
|
|
continue
|
|
line = line.replace("\t", " ").split(" ")
|
|
if line[0][0] == "d":
|
|
dirs.add(line[-1])
|
|
elif line[0][0] == "l":
|
|
links.add(line[-1])
|
|
elif line[0][0] == "-":
|
|
files.add(line[-1])
|
|
|
|
return sorted(files), sorted(dirs), sorted(links)
|
|
|
|
def _get_all_files(self, path, *exclude):
|
|
"""
|
|
Walk implementation. Version in python 2.x and 3.x works differently.
|
|
"""
|
|
files = list()
|
|
dirs = list()
|
|
links = list()
|
|
|
|
if os.access(path, os.R_OK):
|
|
for obj in os.listdir(path):
|
|
obj = os.path.join(path, obj)
|
|
valid = True
|
|
for ex_obj in exclude:
|
|
if obj.startswith(str(ex_obj)):
|
|
valid = False
|
|
continue
|
|
if not valid or not os.path.exists(obj) or not os.access(obj, os.R_OK):
|
|
continue
|
|
if salt.utils.path.islink(obj):
|
|
links.append(obj)
|
|
elif os.path.isdir(obj):
|
|
dirs.append(obj)
|
|
f_obj, d_obj, l_obj = self._get_all_files(obj, *exclude)
|
|
files.extend(f_obj)
|
|
dirs.extend(d_obj)
|
|
links.extend(l_obj)
|
|
elif os.path.isfile(obj):
|
|
files.append(obj)
|
|
|
|
return sorted(files), sorted(dirs), sorted(links)
|
|
|
|
def _get_unmanaged_files(self, managed, system_all):
|
|
"""
|
|
Get the intersection between all files and managed files.
|
|
"""
|
|
m_files, m_dirs, m_links = managed
|
|
s_files, s_dirs, s_links = system_all
|
|
|
|
return (
|
|
sorted(list(set(s_files).difference(m_files))),
|
|
sorted(list(set(s_dirs).difference(m_dirs))),
|
|
sorted(list(set(s_links).difference(m_links))),
|
|
)
|
|
|
|
def _scan_payload(self):
|
|
"""
|
|
Scan the system.
|
|
"""
|
|
# Get ignored points
|
|
allowed = list()
|
|
for allowed_dir in self.db.get(AllowedDir):
|
|
if os.path.exists(allowed_dir.path):
|
|
allowed.append(allowed_dir.path)
|
|
|
|
ignored = list()
|
|
if not allowed:
|
|
for ignored_dir in self.db.get(IgnoredDir):
|
|
if os.path.exists(ignored_dir.path):
|
|
ignored.append(ignored_dir.path)
|
|
|
|
all_files = list()
|
|
all_dirs = list()
|
|
all_links = list()
|
|
for entry_path in [pth for pth in (allowed or os.listdir("/")) if pth]:
|
|
if entry_path[0] != "/":
|
|
entry_path = "/{}".format(entry_path)
|
|
if entry_path in ignored or os.path.islink(entry_path):
|
|
continue
|
|
e_files, e_dirs, e_links = self._get_all_files(entry_path, *ignored)
|
|
all_files.extend(e_files)
|
|
all_dirs.extend(e_dirs)
|
|
all_links.extend(e_links)
|
|
|
|
return self._get_unmanaged_files(
|
|
self._get_managed_files(),
|
|
(
|
|
all_files,
|
|
all_dirs,
|
|
all_links,
|
|
),
|
|
)
|
|
|
|
def _prepare_full_scan(self, **kwargs):
|
|
"""
|
|
Prepare full system scan by setting up the database etc.
|
|
"""
|
|
self.db.open(new=True)
|
|
# Add ignored filesystems
|
|
ignored_fs = set()
|
|
ignored_fs |= set(self.IGNORE_PATHS)
|
|
mounts = salt.utils.fsutils._get_mounts()
|
|
for device, data in mounts.items():
|
|
if device in self.IGNORE_MOUNTS:
|
|
for mpt in data:
|
|
ignored_fs.add(mpt["mount_point"])
|
|
continue
|
|
for mpt in data:
|
|
if mpt["type"] in self.IGNORE_FS_TYPES:
|
|
ignored_fs.add(mpt["mount_point"])
|
|
|
|
# Remove leafs of ignored filesystems
|
|
ignored_all = list()
|
|
for entry in sorted(list(ignored_fs)):
|
|
valid = True
|
|
for e_entry in ignored_all:
|
|
if entry.startswith(e_entry):
|
|
valid = False
|
|
break
|
|
if valid:
|
|
ignored_all.append(entry)
|
|
# Save to the database for further scan
|
|
for ignored_dir in ignored_all:
|
|
dir_obj = IgnoredDir()
|
|
dir_obj.path = ignored_dir
|
|
self.db.store(dir_obj)
|
|
|
|
# Add allowed filesystems (overrides all above at full scan)
|
|
allowed = [elm for elm in kwargs.get("filter", "").split(",") if elm]
|
|
for allowed_dir in allowed:
|
|
dir_obj = AllowedDir()
|
|
dir_obj.path = allowed_dir
|
|
self.db.store(dir_obj)
|
|
|
|
return ignored_all
|
|
|
|
def _init_env(self):
|
|
"""
|
|
Initialize some Salt environment.
|
|
"""
|
|
from salt.config import minion_config
|
|
from salt.grains import core as g_core
|
|
|
|
g_core.__opts__ = minion_config(self.DEFAULT_MINION_CONFIG_PATH)
|
|
self.grains_core = g_core
|
|
|
|
def snapshot(self, mode):
|
|
"""
|
|
Take a snapshot of the system.
|
|
"""
|
|
self._init_env()
|
|
|
|
self._save_cfg_packages(self._get_changed_cfg_pkgs(self._get_cfg_pkgs()))
|
|
self._save_payload(*self._scan_payload())
|
|
|
|
def request_snapshot(self, mode, priority=19, **kwargs):
|
|
"""
|
|
Take a snapshot of the system.
|
|
"""
|
|
if mode not in self.MODE:
|
|
raise InspectorSnapshotException("Unknown mode: '{}'".format(mode))
|
|
|
|
if is_alive(self.pidfile):
|
|
raise CommandExecutionError("Inspection already in progress.")
|
|
|
|
self._prepare_full_scan(**kwargs)
|
|
|
|
subprocess.run(
|
|
[
|
|
"nice",
|
|
"-{}".format(priority),
|
|
"python",
|
|
__file__,
|
|
os.path.dirname(self.pidfile),
|
|
os.path.dirname(self.dbfile),
|
|
mode,
|
|
],
|
|
check=False,
|
|
stdout=subprocess.DEVNULL,
|
|
stderr=subprocess.DEVNULL,
|
|
)
|
|
|
|
def export(self, description, local=False, path="/tmp", format="qcow2"):
|
|
"""
|
|
Export description for Kiwi.
|
|
|
|
:param local:
|
|
:param path:
|
|
:return:
|
|
"""
|
|
kiwiproc.__salt__ = __salt__
|
|
return (
|
|
kiwiproc.KiwiExporter(grains=__grains__, format=format)
|
|
.load(**description)
|
|
.export("something")
|
|
)
|
|
|
|
def build(self, format="qcow2", path="/tmp"):
|
|
"""
|
|
Build an image using Kiwi.
|
|
|
|
:param format:
|
|
:param path:
|
|
:return:
|
|
"""
|
|
if kiwi is None:
|
|
msg = "Unable to build the image due to the missing dependencies: Kiwi module is not available."
|
|
log.error(msg)
|
|
raise CommandExecutionError(msg)
|
|
|
|
raise CommandExecutionError("Build is not yet implemented")
|
|
|
|
|
|
def is_alive(pidfile):
|
|
"""
|
|
Check if PID is still alive.
|
|
"""
|
|
try:
|
|
with salt.utils.files.fopen(pidfile) as fp_:
|
|
os.kill(int(fp_.read().strip()), 0)
|
|
return True
|
|
except Exception as ex: # pylint: disable=broad-except
|
|
if os.access(pidfile, os.W_OK) and os.path.isfile(pidfile):
|
|
os.unlink(pidfile)
|
|
return False
|
|
|
|
|
|
def main(dbfile, pidfile, mode):
|
|
"""
|
|
Main analyzer routine.
|
|
"""
|
|
Inspector(dbfile, pidfile).reuse_snapshot().snapshot(mode)
|
|
|
|
|
|
if __name__ == "__main__":
|
|
if len(sys.argv) != 4:
|
|
print("This module is not intended to use directly!", file=sys.stderr)
|
|
sys.exit(1)
|
|
|
|
pidfile, dbfile, mode = sys.argv[1:] # pylint: disable=unbalanced-tuple-unpacking
|
|
if is_alive(pidfile):
|
|
sys.exit(1)
|
|
|
|
# Double-fork stuff
|
|
try:
|
|
if os.fork() > 0:
|
|
salt.utils.crypt.reinit_crypto()
|
|
sys.exit(0)
|
|
else:
|
|
salt.utils.crypt.reinit_crypto()
|
|
except OSError as ex:
|
|
sys.exit(1)
|
|
|
|
os.setsid()
|
|
os.umask(0o000) # pylint: disable=blacklisted-function
|
|
|
|
try:
|
|
pid = os.fork()
|
|
if pid > 0:
|
|
salt.utils.crypt.reinit_crypto()
|
|
with salt.utils.files.fopen(
|
|
os.path.join(pidfile, EnvLoader.PID_FILE), "w"
|
|
) as fp_:
|
|
fp_.write("{}\n".format(pid))
|
|
sys.exit(0)
|
|
except OSError as ex:
|
|
sys.exit(1)
|
|
|
|
salt.utils.crypt.reinit_crypto()
|
|
main(dbfile, pidfile, mode)
|