Submit
Path:
~
/
/
proc
/
thread-self
/
root
/
usr
/
lib
/
python2.7
/
site-packages
/
cloudinit
/
config
/
File Content:
cc_ssh.py
# Copyright (C) 2009-2010 Canonical Ltd. # Copyright (C) 2012, 2013 Hewlett-Packard Development Company, L.P. # # Author: Scott Moser <scott.moser@canonical.com> # Author: Juerg Haefliger <juerg.haefliger@hp.com> # # This file is part of cloud-init. See LICENSE file for license information. """ SSH --- **Summary:** configure ssh and ssh keys This module handles most configuration for ssh and ssh keys. Many images have default ssh keys, which can be removed using ``ssh_deletekeys``. Since removing default keys is usually the desired behavior this option is enabled by default. Keys can be added using the ``ssh_keys`` configuration key. The argument to this config key should be a dictionary entries for the public and private keys of each desired key type. Entries in the ``ssh_keys`` config dict should have keys in the format ``<key type>_private`` and ``<key type>_public``, e.g. ``rsa_private: <key>`` and ``rsa_public: <key>``. See below for supported key types. Not all key types have to be specified, ones left unspecified will not be used. If this config option is used, then no keys will be generated. .. note:: when specifying private keys in cloud-config, care should be taken to ensure that the communication between the data source and the instance is secure .. note:: to specify multiline private keys, use yaml multiline syntax If no keys are specified using ``ssh_keys``, then keys will be generated using ``ssh-keygen``. By default one public/private pair of each supported key type will be generated. The key types to generate can be specified using the ``ssh_genkeytypes`` config flag, which accepts a list of key types to use. For each key type for which this module has been instructed to create a keypair, if a key of the same type is already present on the system (i.e. if ``ssh_deletekeys`` was false), no key will be generated. Supported key types for the ``ssh_keys`` and the ``ssh_genkeytypes`` config flags are: - rsa - dsa - ecdsa - ed25519 Root login can be enabled/disabled using the ``disable_root`` config key. Root login options can be manually specified with ``disable_root_opts``. If ``disable_root_opts`` is specified and contains the string ``$USER``, it will be replaced with the username of the default user. By default, root login is disabled, and root login opts are set to:: no-port-forwarding,no-agent-forwarding,no-X11-forwarding Authorized keys for the default user/first user defined in ``users`` can be specified using ``ssh_authorized_keys``. Keys should be specified as a list of public keys. Importing ssh public keys for the default user (defined in ``users``)) is enabled by default. This feature may be disabled by setting ``allow_publish_ssh_keys: false``. .. note:: see the ``cc_set_passwords`` module documentation to enable/disable ssh password authentication **Internal name:** ``cc_ssh`` **Module frequency:** per instance **Supported distros:** all **Config keys**:: ssh_deletekeys: <true/false> ssh_keys: rsa_private: | -----BEGIN RSA PRIVATE KEY----- MIIBxwIBAAJhAKD0YSHy73nUgysO13XsJmd4fHiFyQ+00R7VVu2iV9Qco ... -----END RSA PRIVATE KEY----- rsa_public: ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAGEAoPRhIfLvedSDKw7Xd ... dsa_private: | -----BEGIN DSA PRIVATE KEY----- MIIBxwIBAAJhAKD0YSHy73nUgysO13XsJmd4fHiFyQ+00R7VVu2iV9Qco ... -----END DSA PRIVATE KEY----- dsa_public: ssh-dsa AAAAB3NzaC1yc2EAAAABIwAAAGEAoPRhIfLvedSDKw7Xd ... ssh_genkeytypes: <key type> disable_root: <true/false> disable_root_opts: <disable root options string> ssh_authorized_keys: - ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAGEA3FSyQwBI6Z+nCSjUU ... - ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA3I7VUf2l5gSn5uavROsc5HRDpZ ... allow_public_ssh_keys: <true/false> ssh_publish_hostkeys: enabled: <true/false> (Defaults to true) blacklist: <list of key types> (Defaults to [dsa]) """ import glob import os import sys from cloudinit.distros import ug_util from cloudinit import ssh_util from cloudinit import util GENERATE_KEY_NAMES = ['rsa', 'dsa', 'ecdsa', 'ed25519'] KEY_FILE_TPL = '/etc/ssh/ssh_host_%s_key' PUBLISH_HOST_KEYS = True # Don't publish the dsa hostkey by default since OpenSSH recommends not using # it. HOST_KEY_PUBLISH_BLACKLIST = ['dsa'] CONFIG_KEY_TO_FILE = {} PRIV_TO_PUB = {} for k in GENERATE_KEY_NAMES: CONFIG_KEY_TO_FILE.update({"%s_private" % k: (KEY_FILE_TPL % k, 0o600)}) CONFIG_KEY_TO_FILE.update( {"%s_public" % k: (KEY_FILE_TPL % k + ".pub", 0o600)}) PRIV_TO_PUB["%s_private" % k] = "%s_public" % k KEY_GEN_TPL = 'o=$(ssh-keygen -yf "%s") && echo "$o" root@localhost > "%s"' def handle(_name, cfg, cloud, log, _args): # remove the static keys from the pristine image if cfg.get("ssh_deletekeys", True): key_pth = os.path.join("/etc/ssh/", "ssh_host_*key*") for f in glob.glob(key_pth): try: util.del_file(f) except Exception: util.logexc(log, "Failed deleting key file %s", f) if "ssh_keys" in cfg: # if there are keys in cloud-config, use them for (key, val) in cfg["ssh_keys"].items(): if key in CONFIG_KEY_TO_FILE: tgt_fn = CONFIG_KEY_TO_FILE[key][0] tgt_perms = CONFIG_KEY_TO_FILE[key][1] util.write_file(tgt_fn, val, tgt_perms) for (priv, pub) in PRIV_TO_PUB.items(): if pub in cfg['ssh_keys'] or priv not in cfg['ssh_keys']: continue pair = (CONFIG_KEY_TO_FILE[priv][0], CONFIG_KEY_TO_FILE[pub][0]) cmd = ['sh', '-xc', KEY_GEN_TPL % pair] try: # TODO(harlowja): Is this guard needed? with util.SeLinuxGuard("/etc/ssh", recursive=True): util.subp(cmd, capture=False) log.debug("Generated a key for %s from %s", pair[0], pair[1]) except Exception: util.logexc(log, "Failed generated a key for %s from %s", pair[0], pair[1]) else: # if not, generate them genkeys = util.get_cfg_option_list(cfg, 'ssh_genkeytypes', GENERATE_KEY_NAMES) lang_c = os.environ.copy() lang_c['LANG'] = 'C' for keytype in genkeys: keyfile = KEY_FILE_TPL % (keytype) if os.path.exists(keyfile): continue util.ensure_dir(os.path.dirname(keyfile)) cmd = ['ssh-keygen', '-t', keytype, '-N', '', '-f', keyfile] # TODO(harlowja): Is this guard needed? with util.SeLinuxGuard("/etc/ssh", recursive=True): try: out, err = util.subp(cmd, capture=True, env=lang_c) sys.stdout.write(util.decode_binary(out)) except util.ProcessExecutionError as e: err = util.decode_binary(e.stderr).lower() if (e.exit_code == 1 and err.lower().startswith("unknown key")): log.debug("ssh-keygen: unknown key type '%s'", keytype) else: util.logexc(log, "Failed generating key type %s to " "file %s", keytype, keyfile) if "ssh_publish_hostkeys" in cfg: host_key_blacklist = util.get_cfg_option_list( cfg["ssh_publish_hostkeys"], "blacklist", HOST_KEY_PUBLISH_BLACKLIST) publish_hostkeys = util.get_cfg_option_bool( cfg["ssh_publish_hostkeys"], "enabled", PUBLISH_HOST_KEYS) else: host_key_blacklist = HOST_KEY_PUBLISH_BLACKLIST publish_hostkeys = PUBLISH_HOST_KEYS if publish_hostkeys: hostkeys = get_public_host_keys(blacklist=host_key_blacklist) try: cloud.datasource.publish_host_keys(hostkeys) except Exception: util.logexc(log, "Publishing host keys failed!") try: (users, _groups) = ug_util.normalize_users_groups(cfg, cloud.distro) (user, _user_config) = ug_util.extract_default(users) disable_root = util.get_cfg_option_bool(cfg, "disable_root", True) disable_root_opts = util.get_cfg_option_str(cfg, "disable_root_opts", ssh_util.DISABLE_USER_OPTS) keys = [] if util.get_cfg_option_bool(cfg, 'allow_public_ssh_keys', True): keys = cloud.get_public_ssh_keys() or [] else: log.debug('Skipping import of publish ssh keys per ' 'config setting: allow_public_ssh_keys=False') if "ssh_authorized_keys" in cfg: cfgkeys = cfg["ssh_authorized_keys"] keys.extend(cfgkeys) apply_credentials(keys, user, disable_root, disable_root_opts) except Exception: util.logexc(log, "Applying ssh credentials failed!") def apply_credentials(keys, user, disable_root, disable_root_opts): keys = set(keys) if user: ssh_util.setup_user_keys(keys, user) if disable_root: if not user: user = "NONE" key_prefix = disable_root_opts.replace('$USER', user) key_prefix = key_prefix.replace('$DISABLE_USER', 'root') else: key_prefix = '' ssh_util.setup_user_keys(keys, 'root', options=key_prefix) def get_public_host_keys(blacklist=None): """Read host keys from /etc/ssh/*.pub files and return them as a list. @param blacklist: List of key types to ignore. e.g. ['dsa', 'rsa'] @returns: List of keys, each formatted as a two-element tuple. e.g. [('ssh-rsa', 'AAAAB3Nz...'), ('ssh-ed25519', 'AAAAC3Nx...')] """ public_key_file_tmpl = '%s.pub' % (KEY_FILE_TPL,) key_list = [] blacklist_files = [] if blacklist: # Convert blacklist to filenames: # 'dsa' -> '/etc/ssh/ssh_host_dsa_key.pub' blacklist_files = [public_key_file_tmpl % (key_type,) for key_type in blacklist] # Get list of public key files and filter out blacklisted files. file_list = [hostfile for hostfile in glob.glob(public_key_file_tmpl % ('*',)) if hostfile not in blacklist_files] # Read host key files, retrieve first two fields as a tuple and # append that tuple to key_list. for file_name in file_list: file_contents = util.load_file(file_name) key_data = file_contents.split() if key_data and len(key_data) > 1: key_list.append(tuple(key_data[:2])) return key_list # vi: ts=4 expandtab
Submit
FILE
FOLDER
Name
Size
Permission
Action
__init__.py
1437 bytes
0644
__init__.pyc
1337 bytes
0644
__init__.pyo
1337 bytes
0644
cc_apt_configure.py
33591 bytes
0644
cc_apt_configure.pyc
30924 bytes
0644
cc_apt_configure.pyo
30924 bytes
0644
cc_apt_pipelining.py
2495 bytes
0644
cc_apt_pipelining.pyc
2540 bytes
0644
cc_apt_pipelining.pyo
2540 bytes
0644
cc_bootcmd.py
3588 bytes
0644
cc_bootcmd.pyc
3088 bytes
0644
cc_bootcmd.pyo
3088 bytes
0644
cc_byobu.py
3173 bytes
0644
cc_byobu.pyc
3160 bytes
0644
cc_byobu.pyo
3160 bytes
0644
cc_ca_certs.py
4190 bytes
0644
cc_ca_certs.pyc
4199 bytes
0644
cc_ca_certs.pyo
4199 bytes
0644
cc_chef.py
13490 bytes
0644
cc_chef.pyc
11045 bytes
0644
cc_chef.pyo
11045 bytes
0644
cc_debug.py
3151 bytes
0644
cc_debug.pyc
3428 bytes
0644
cc_debug.pyo
3428 bytes
0644
cc_disable_ec2_metadata.py
1602 bytes
0644
cc_disable_ec2_metadata.pyc
1603 bytes
0644
cc_disable_ec2_metadata.pyo
1603 bytes
0644
cc_disk_setup.py
33590 bytes
0644
cc_disk_setup.pyc
29606 bytes
0644
cc_disk_setup.pyo
29606 bytes
0644
cc_emit_upstart.py
2050 bytes
0644
cc_emit_upstart.pyc
2197 bytes
0644
cc_emit_upstart.pyo
2197 bytes
0644
cc_fan.py
2893 bytes
0644
cc_fan.pyc
3167 bytes
0644
cc_fan.pyo
3167 bytes
0644
cc_final_message.py
2406 bytes
0644
cc_final_message.pyc
2449 bytes
0644
cc_final_message.pyo
2449 bytes
0644
cc_foo.py
2116 bytes
0644
cc_foo.pyc
702 bytes
0644
cc_foo.pyo
702 bytes
0644
cc_growpart.py
11788 bytes
0644
cc_growpart.pyc
11389 bytes
0644
cc_growpart.pyo
11389 bytes
0644
cc_grub_dpkg.py
2940 bytes
0644
cc_grub_dpkg.pyc
2698 bytes
0644
cc_grub_dpkg.pyo
2698 bytes
0644
cc_keys_to_console.py
2417 bytes
0644
cc_keys_to_console.pyc
2449 bytes
0644
cc_keys_to_console.pyo
2449 bytes
0644
cc_landscape.py
4028 bytes
0644
cc_landscape.pyc
4113 bytes
0644
cc_landscape.pyo
4113 bytes
0644
cc_locale.py
1187 bytes
0644
cc_locale.pyc
1189 bytes
0644
cc_locale.pyo
1189 bytes
0644
cc_lxd.py
10521 bytes
0644
cc_lxd.pyc
8531 bytes
0644
cc_lxd.pyo
8531 bytes
0644
cc_mcollective.py
5204 bytes
0644
cc_mcollective.pyc
3891 bytes
0644
cc_mcollective.pyo
3891 bytes
0644
cc_migrator.py
3148 bytes
0644
cc_migrator.pyc
3256 bytes
0644
cc_migrator.pyo
3256 bytes
0644
cc_mounts.py
17653 bytes
0644
cc_mounts.pyc
14941 bytes
0644
cc_mounts.pyo
14941 bytes
0644
cc_ntp.py
20695 bytes
0644
cc_ntp.pyc
16136 bytes
0644
cc_ntp.pyo
16136 bytes
0644
cc_package_update_upgrade_install.py
4208 bytes
0644
cc_package_update_upgrade_install.pyc
4107 bytes
0644
cc_package_update_upgrade_install.pyo
4107 bytes
0644
cc_phone_home.py
4013 bytes
0644
cc_phone_home.pyc
3360 bytes
0644
cc_phone_home.pyo
3360 bytes
0644
cc_power_state_change.py
7838 bytes
0644
cc_power_state_change.pyc
7983 bytes
0644
cc_power_state_change.pyo
7983 bytes
0644
cc_puppet.py
9070 bytes
0644
cc_puppet.pyc
7231 bytes
0644
cc_puppet.pyo
7231 bytes
0644
cc_resizefs.py
11047 bytes
0644
cc_resizefs.pyc
9368 bytes
0644
cc_resizefs.pyo
9368 bytes
0644
cc_resolv_conf.py
3509 bytes
0644
cc_resolv_conf.pyc
3522 bytes
0644
cc_resolv_conf.pyo
3522 bytes
0644
cc_rh_subscription.py
16029 bytes
0644
cc_rh_subscription.pyc
13826 bytes
0644
cc_rh_subscription.pyo
13826 bytes
0644
cc_rightscale_userdata.py
3849 bytes
0644
cc_rightscale_userdata.pyc
2886 bytes
0644
cc_rightscale_userdata.pyo
2886 bytes
0644
cc_rsyslog.py
14435 bytes
0644
cc_rsyslog.pyc
10810 bytes
0644
cc_rsyslog.pyo
10810 bytes
0644
cc_runcmd.py
3185 bytes
0644
cc_runcmd.pyc
2797 bytes
0644
cc_runcmd.pyo
2797 bytes
0644
cc_salt_minion.py
4776 bytes
0644
cc_salt_minion.pyc
3870 bytes
0644
cc_salt_minion.pyo
3870 bytes
0644
cc_scripts_per_boot.py
1232 bytes
0644
cc_scripts_per_boot.pyc
1231 bytes
0644
cc_scripts_per_boot.pyo
1231 bytes
0644
cc_scripts_per_instance.py
1408 bytes
0644
cc_scripts_per_instance.pyc
1413 bytes
0644
cc_scripts_per_instance.pyo
1413 bytes
0644
cc_scripts_per_once.py
1337 bytes
0644
cc_scripts_per_once.pyc
1338 bytes
0644
cc_scripts_per_once.pyo
1338 bytes
0644
cc_scripts_user.py
1456 bytes
0644
cc_scripts_user.pyc
1418 bytes
0644
cc_scripts_user.pyo
1418 bytes
0644
cc_scripts_vendor.py
1418 bytes
0644
cc_scripts_vendor.pyc
1500 bytes
0644
cc_scripts_vendor.pyo
1500 bytes
0644
cc_seed_random.py
4494 bytes
0644
cc_seed_random.pyc
4642 bytes
0644
cc_seed_random.pyo
4642 bytes
0644
cc_set_hostname.py
3022 bytes
0644
cc_set_hostname.pyc
2786 bytes
0644
cc_set_hostname.pyo
2786 bytes
0644
cc_set_passwords.py
8656 bytes
0644
cc_set_passwords.pyc
7800 bytes
0644
cc_set_passwords.pyo
7800 bytes
0644
cc_snap.py
8301 bytes
0644
cc_snap.pyc
7719 bytes
0644
cc_snap.pyo
7719 bytes
0644
cc_snap_config.py
5500 bytes
0644
cc_snap_config.pyc
5150 bytes
0644
cc_snap_config.pyo
5150 bytes
0644
cc_snappy.py
9927 bytes
0644
cc_snappy.pyc
9488 bytes
0644
cc_snappy.pyo
9488 bytes
0644
cc_spacewalk.py
2957 bytes
0644
cc_spacewalk.pyc
2982 bytes
0644
cc_spacewalk.pyo
2982 bytes
0644
cc_ssh.py
10842 bytes
0644
cc_ssh.pyc
9325 bytes
0644
cc_ssh.pyo
9325 bytes
0644
cc_ssh_authkey_fingerprints.py
3513 bytes
0644
cc_ssh_authkey_fingerprints.pyc
4038 bytes
0644
cc_ssh_authkey_fingerprints.pyo
4038 bytes
0644
cc_ssh_import_id.py
2951 bytes
0644
cc_ssh_import_id.pyc
2781 bytes
0644
cc_ssh_import_id.pyo
2781 bytes
0644
cc_timezone.py
1175 bytes
0644
cc_timezone.pyc
1175 bytes
0644
cc_timezone.pyo
1175 bytes
0644
cc_ubuntu_advantage.py
6227 bytes
0644
cc_ubuntu_advantage.pyc
6263 bytes
0644
cc_ubuntu_advantage.pyo
6263 bytes
0644
cc_ubuntu_drivers.py
5800 bytes
0644
cc_ubuntu_drivers.pyc
4745 bytes
0644
cc_ubuntu_drivers.pyo
4745 bytes
0644
cc_update_etc_hosts.py
3414 bytes
0644
cc_update_etc_hosts.pyc
3063 bytes
0644
cc_update_etc_hosts.pyo
3063 bytes
0644
cc_update_hostname.py
1617 bytes
0644
cc_update_hostname.pyc
1704 bytes
0644
cc_update_hostname.pyo
1704 bytes
0644
cc_users_groups.py
7225 bytes
0644
cc_users_groups.pyc
6922 bytes
0644
cc_users_groups.pyo
6922 bytes
0644
cc_write_files.py
5069 bytes
0644
cc_write_files.pyc
5255 bytes
0644
cc_write_files.pyo
5255 bytes
0644
cc_yum_add_repo.py
4403 bytes
0644
cc_yum_add_repo.pyc
4008 bytes
0644
cc_yum_add_repo.pyo
4008 bytes
0644
cc_zypper_add_repo.py
7799 bytes
0644
cc_zypper_add_repo.pyc
7295 bytes
0644
cc_zypper_add_repo.pyo
7295 bytes
0644
schema.py
14401 bytes
0644
schema.pyc
14163 bytes
0644
schema.pyo
14163 bytes
0644
N4ST4R_ID | Naxtarrr