Statistics
| Branch: | Tag: | Revision:

root / lib / ssh.py @ 11e90588

History | View | Annotate | Download (10.3 kB)

1 2f31098c Iustin Pop
#
2 a8083063 Iustin Pop
#
3 a8083063 Iustin Pop
4 ebcd61bb Iustin Pop
# Copyright (C) 2006, 2007, 2010, 2011 Google Inc.
5 a8083063 Iustin Pop
#
6 a8083063 Iustin Pop
# This program is free software; you can redistribute it and/or modify
7 a8083063 Iustin Pop
# it under the terms of the GNU General Public License as published by
8 a8083063 Iustin Pop
# the Free Software Foundation; either version 2 of the License, or
9 a8083063 Iustin Pop
# (at your option) any later version.
10 a8083063 Iustin Pop
#
11 a8083063 Iustin Pop
# This program is distributed in the hope that it will be useful, but
12 a8083063 Iustin Pop
# WITHOUT ANY WARRANTY; without even the implied warranty of
13 a8083063 Iustin Pop
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14 a8083063 Iustin Pop
# General Public License for more details.
15 a8083063 Iustin Pop
#
16 a8083063 Iustin Pop
# You should have received a copy of the GNU General Public License
17 a8083063 Iustin Pop
# along with this program; if not, write to the Free Software
18 a8083063 Iustin Pop
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
19 a8083063 Iustin Pop
# 02110-1301, USA.
20 a8083063 Iustin Pop
21 a8083063 Iustin Pop
22 a8083063 Iustin Pop
"""Module encapsulating ssh functionality.
23 a8083063 Iustin Pop

24 a8083063 Iustin Pop
"""
25 a8083063 Iustin Pop
26 a8083063 Iustin Pop
27 a8083063 Iustin Pop
import os
28 9c034cbe Iustin Pop
import logging
29 a8083063 Iustin Pop
30 a8083063 Iustin Pop
from ganeti import utils
31 a8083063 Iustin Pop
from ganeti import errors
32 82122173 Iustin Pop
from ganeti import constants
33 8062638d Manuel Franceschini
from ganeti import netutils
34 8fd1bfa9 Michael Hanselmann
from ganeti import pathutils
35 cffbbae7 Michael Hanselmann
from ganeti import vcluster
36 5484cda5 Michael Hanselmann
from ganeti import compat
37 82122173 Iustin Pop
38 82122173 Iustin Pop
39 7bd70e6b Michael Hanselmann
def GetUserFiles(user, mkdir=False, dircheck=True, kind=constants.SSHK_DSA,
40 d12b9f66 Michael Hanselmann
                 _homedir_fn=None):
41 8a3c9e8a Michael Hanselmann
  """Return the paths of a user's SSH files.
42 8a3c9e8a Michael Hanselmann

43 8a3c9e8a Michael Hanselmann
  @type user: string
44 8a3c9e8a Michael Hanselmann
  @param user: Username
45 8a3c9e8a Michael Hanselmann
  @type mkdir: bool
46 8a3c9e8a Michael Hanselmann
  @param mkdir: Whether to create ".ssh" directory if it doesn't exist
47 7bd70e6b Michael Hanselmann
  @type dircheck: bool
48 7bd70e6b Michael Hanselmann
  @param dircheck: Whether to check if ".ssh" directory exists
49 8a3c9e8a Michael Hanselmann
  @type kind: string
50 8a3c9e8a Michael Hanselmann
  @param kind: One of L{constants.SSHK_ALL}
51 8a3c9e8a Michael Hanselmann
  @rtype: tuple; (string, string, string)
52 8a3c9e8a Michael Hanselmann
  @return: Tuple containing three file system paths; the private SSH key file,
53 8a3c9e8a Michael Hanselmann
    the public SSH key file and the user's C{authorized_keys} file
54 8a3c9e8a Michael Hanselmann
  @raise errors.OpExecError: When home directory of the user can not be
55 8a3c9e8a Michael Hanselmann
    determined
56 8a3c9e8a Michael Hanselmann
  @raise errors.OpExecError: Regardless of the C{mkdir} parameters, this
57 7bd70e6b Michael Hanselmann
    exception is raised if C{~$user/.ssh} is not a directory and C{dircheck}
58 7bd70e6b Michael Hanselmann
    is set to C{True}
59 70d9e3d8 Iustin Pop

60 70d9e3d8 Iustin Pop
  """
61 d12b9f66 Michael Hanselmann
  if _homedir_fn is None:
62 d12b9f66 Michael Hanselmann
    _homedir_fn = utils.GetHomeDir
63 d12b9f66 Michael Hanselmann
64 8a3c9e8a Michael Hanselmann
  user_dir = _homedir_fn(user)
65 70d9e3d8 Iustin Pop
  if not user_dir:
66 8a3c9e8a Michael Hanselmann
    raise errors.OpExecError("Cannot resolve home of user '%s'" % user)
67 8a3c9e8a Michael Hanselmann
68 8a3c9e8a Michael Hanselmann
  if kind == constants.SSHK_DSA:
69 8a3c9e8a Michael Hanselmann
    suffix = "dsa"
70 8a3c9e8a Michael Hanselmann
  elif kind == constants.SSHK_RSA:
71 8a3c9e8a Michael Hanselmann
    suffix = "rsa"
72 8a3c9e8a Michael Hanselmann
  else:
73 8a3c9e8a Michael Hanselmann
    raise errors.ProgrammerError("Unknown SSH key kind '%s'" % kind)
74 70d9e3d8 Iustin Pop
75 c4feafe8 Iustin Pop
  ssh_dir = utils.PathJoin(user_dir, ".ssh")
76 5bae14d9 Guido Trotter
  if mkdir:
77 5bae14d9 Guido Trotter
    utils.EnsureDirs([(ssh_dir, constants.SECURE_DIR_MODE)])
78 7bd70e6b Michael Hanselmann
  elif dircheck and not os.path.isdir(ssh_dir):
79 898a6d45 Michael Hanselmann
    raise errors.OpExecError("Path %s is not a directory" % ssh_dir)
80 70d9e3d8 Iustin Pop
81 c4feafe8 Iustin Pop
  return [utils.PathJoin(ssh_dir, base)
82 8a3c9e8a Michael Hanselmann
          for base in ["id_%s" % suffix, "id_%s.pub" % suffix,
83 8a3c9e8a Michael Hanselmann
                       "authorized_keys"]]
84 70d9e3d8 Iustin Pop
85 70d9e3d8 Iustin Pop
86 5484cda5 Michael Hanselmann
def GetAllUserFiles(user, mkdir=False, dircheck=True, _homedir_fn=None):
87 5484cda5 Michael Hanselmann
  """Wrapper over L{GetUserFiles} to retrieve files for all SSH key types.
88 5484cda5 Michael Hanselmann

89 5484cda5 Michael Hanselmann
  See L{GetUserFiles} for details.
90 5484cda5 Michael Hanselmann

91 5484cda5 Michael Hanselmann
  @rtype: tuple; (string, dict with string as key, tuple of (string, string) as
92 5484cda5 Michael Hanselmann
    value)
93 5484cda5 Michael Hanselmann

94 5484cda5 Michael Hanselmann
  """
95 5484cda5 Michael Hanselmann
  helper = compat.partial(GetUserFiles, user, mkdir=mkdir, dircheck=dircheck,
96 5484cda5 Michael Hanselmann
                          _homedir_fn=_homedir_fn)
97 5484cda5 Michael Hanselmann
  result = [(kind, helper(kind=kind)) for kind in constants.SSHK_ALL]
98 5484cda5 Michael Hanselmann
99 5484cda5 Michael Hanselmann
  authorized_keys = [i for (_, (_, _, i)) in result]
100 5484cda5 Michael Hanselmann
101 5484cda5 Michael Hanselmann
  assert len(frozenset(authorized_keys)) == 1, \
102 5484cda5 Michael Hanselmann
    "Different paths for authorized_keys were returned"
103 5484cda5 Michael Hanselmann
104 5484cda5 Michael Hanselmann
  return (authorized_keys[0],
105 5484cda5 Michael Hanselmann
          dict((kind, (privkey, pubkey))
106 5484cda5 Michael Hanselmann
               for (kind, (privkey, pubkey, _)) in result))
107 5484cda5 Michael Hanselmann
108 5484cda5 Michael Hanselmann
109 c92b310a Michael Hanselmann
class SshRunner:
110 c92b310a Michael Hanselmann
  """Wrapper for SSH commands.
111 a8083063 Iustin Pop

112 a8083063 Iustin Pop
  """
113 b43dcc5a Manuel Franceschini
  def __init__(self, cluster_name, ipv6=False):
114 b43dcc5a Manuel Franceschini
    """Initializes this class.
115 b43dcc5a Manuel Franceschini

116 b43dcc5a Manuel Franceschini
    @type cluster_name: str
117 b43dcc5a Manuel Franceschini
    @param cluster_name: name of the cluster
118 b43dcc5a Manuel Franceschini
    @type ipv6: bool
119 b43dcc5a Manuel Franceschini
    @param ipv6: If true, force ssh to use IPv6 addresses only
120 b43dcc5a Manuel Franceschini

121 b43dcc5a Manuel Franceschini
    """
122 56bece1f Iustin Pop
    self.cluster_name = cluster_name
123 b43dcc5a Manuel Franceschini
    self.ipv6 = ipv6
124 1ff08570 Michael Hanselmann
125 652d6694 Michael Hanselmann
  def _BuildSshOptions(self, batch, ask_key, use_cluster_key,
126 2892a4c9 Iustin Pop
                       strict_host_check, private_key=None, quiet=True):
127 bf75f132 Iustin Pop
    """Builds a list with needed SSH options.
128 bf75f132 Iustin Pop

129 bf75f132 Iustin Pop
    @param batch: same as ssh's batch option
130 bf75f132 Iustin Pop
    @param ask_key: allows ssh to ask for key confirmation; this
131 bf75f132 Iustin Pop
        parameter conflicts with the batch one
132 bf75f132 Iustin Pop
    @param use_cluster_key: if True, use the cluster name as the
133 bf75f132 Iustin Pop
        HostKeyAlias name
134 bf75f132 Iustin Pop
    @param strict_host_check: this makes the host key checking strict
135 4403ff8d René Nussbaumer
    @param private_key: use this private key instead of the default
136 2892a4c9 Iustin Pop
    @param quiet: whether to enable -q to ssh
137 bf75f132 Iustin Pop

138 bf75f132 Iustin Pop
    @rtype: list
139 a4ccecf6 Michael Hanselmann
    @return: the list of options ready to use in L{utils.process.RunCmd}
140 bf75f132 Iustin Pop

141 bf75f132 Iustin Pop
    """
142 f6d9f4c3 Michael Hanselmann
    options = [
143 f6d9f4c3 Michael Hanselmann
      "-oEscapeChar=none",
144 f6d9f4c3 Michael Hanselmann
      "-oHashKnownHosts=no",
145 8fd1bfa9 Michael Hanselmann
      "-oGlobalKnownHostsFile=%s" % pathutils.SSH_KNOWN_HOSTS_FILE,
146 f6d9f4c3 Michael Hanselmann
      "-oUserKnownHostsFile=/dev/null",
147 b427788e Iustin Pop
      "-oCheckHostIp=no",
148 f6d9f4c3 Michael Hanselmann
      ]
149 f6d9f4c3 Michael Hanselmann
150 f6d9f4c3 Michael Hanselmann
    if use_cluster_key:
151 56bece1f Iustin Pop
      options.append("-oHostKeyAlias=%s" % self.cluster_name)
152 f6d9f4c3 Michael Hanselmann
153 2892a4c9 Iustin Pop
    if quiet:
154 2892a4c9 Iustin Pop
      options.append("-q")
155 2892a4c9 Iustin Pop
156 4403ff8d René Nussbaumer
    if private_key:
157 4403ff8d René Nussbaumer
      options.append("-i%s" % private_key)
158 4403ff8d René Nussbaumer
159 652d6694 Michael Hanselmann
    # TODO: Too many boolean options, maybe convert them to more descriptive
160 652d6694 Michael Hanselmann
    # constants.
161 652d6694 Michael Hanselmann
162 f6d9f4c3 Michael Hanselmann
    # Note: ask_key conflicts with batch mode
163 f6d9f4c3 Michael Hanselmann
    if batch:
164 f6d9f4c3 Michael Hanselmann
      if ask_key:
165 f6d9f4c3 Michael Hanselmann
        raise errors.ProgrammerError("SSH call requested conflicting options")
166 f6d9f4c3 Michael Hanselmann
167 652d6694 Michael Hanselmann
      options.append("-oBatchMode=yes")
168 652d6694 Michael Hanselmann
169 652d6694 Michael Hanselmann
      if strict_host_check:
170 652d6694 Michael Hanselmann
        options.append("-oStrictHostKeyChecking=yes")
171 652d6694 Michael Hanselmann
      else:
172 652d6694 Michael Hanselmann
        options.append("-oStrictHostKeyChecking=no")
173 f6d9f4c3 Michael Hanselmann
174 e66d9f1a Iustin Pop
    else:
175 e66d9f1a Iustin Pop
      # non-batch mode
176 e66d9f1a Iustin Pop
177 e66d9f1a Iustin Pop
      if ask_key:
178 e66d9f1a Iustin Pop
        options.append("-oStrictHostKeyChecking=ask")
179 e66d9f1a Iustin Pop
      elif strict_host_check:
180 e66d9f1a Iustin Pop
        options.append("-oStrictHostKeyChecking=yes")
181 e66d9f1a Iustin Pop
      else:
182 e66d9f1a Iustin Pop
        options.append("-oStrictHostKeyChecking=no")
183 f6d9f4c3 Michael Hanselmann
184 b43dcc5a Manuel Franceschini
    if self.ipv6:
185 b43dcc5a Manuel Franceschini
      options.append("-6")
186 b6368001 Costas Drogos
    else:
187 b6368001 Costas Drogos
      options.append("-4")
188 b43dcc5a Manuel Franceschini
189 f6d9f4c3 Michael Hanselmann
    return options
190 1ff08570 Michael Hanselmann
191 8f07f831 Michael Hanselmann
  def BuildCmd(self, hostname, user, command, batch=True, ask_key=False,
192 4403ff8d René Nussbaumer
               tty=False, use_cluster_key=True, strict_host_check=True,
193 2892a4c9 Iustin Pop
               private_key=None, quiet=True):
194 c92b310a Michael Hanselmann
    """Build an ssh command to execute a command on a remote node.
195 c92b310a Michael Hanselmann

196 c41eea6e Iustin Pop
    @param hostname: the target host, string
197 c41eea6e Iustin Pop
    @param user: user to auth as
198 c41eea6e Iustin Pop
    @param command: the command
199 c41eea6e Iustin Pop
    @param batch: if true, ssh will run in batch mode with no prompting
200 c41eea6e Iustin Pop
    @param ask_key: if true, ssh will run with
201 c41eea6e Iustin Pop
        StrictHostKeyChecking=ask, so that we can connect to an
202 c41eea6e Iustin Pop
        unknown host (not valid in batch mode)
203 c41eea6e Iustin Pop
    @param use_cluster_key: whether to expect and use the
204 c41eea6e Iustin Pop
        cluster-global SSH key
205 c41eea6e Iustin Pop
    @param strict_host_check: whether to check the host's SSH key at all
206 4403ff8d René Nussbaumer
    @param private_key: use this private key instead of the default
207 2892a4c9 Iustin Pop
    @param quiet: whether to enable -q to ssh
208 c41eea6e Iustin Pop

209 c41eea6e Iustin Pop
    @return: the ssh call to run 'command' on the remote host.
210 c92b310a Michael Hanselmann

211 c92b310a Michael Hanselmann
    """
212 2892a4c9 Iustin Pop
    argv = [constants.SSH]
213 652d6694 Michael Hanselmann
    argv.extend(self._BuildSshOptions(batch, ask_key, use_cluster_key,
214 2892a4c9 Iustin Pop
                                      strict_host_check, private_key,
215 2892a4c9 Iustin Pop
                                      quiet=quiet))
216 8f07f831 Michael Hanselmann
    if tty:
217 f724a702 Balazs Lecz
      argv.extend(["-t", "-t"])
218 cffbbae7 Michael Hanselmann
219 cffbbae7 Michael Hanselmann
    argv.append("%s@%s" % (user, hostname))
220 cffbbae7 Michael Hanselmann
221 cffbbae7 Michael Hanselmann
    # Insert variables for virtual nodes
222 cffbbae7 Michael Hanselmann
    argv.extend("export %s=%s;" %
223 cffbbae7 Michael Hanselmann
                (utils.ShellQuote(name), utils.ShellQuote(value))
224 cffbbae7 Michael Hanselmann
                for (name, value) in
225 cffbbae7 Michael Hanselmann
                  vcluster.EnvironmentForHost(hostname).items())
226 cffbbae7 Michael Hanselmann
227 cffbbae7 Michael Hanselmann
    argv.append(command)
228 cffbbae7 Michael Hanselmann
229 c92b310a Michael Hanselmann
    return argv
230 c92b310a Michael Hanselmann
231 54ab6aec Michael Hanselmann
  def Run(self, *args, **kwargs):
232 c92b310a Michael Hanselmann
    """Runs a command on a remote node.
233 c92b310a Michael Hanselmann

234 c92b310a Michael Hanselmann
    This method has the same return value as `utils.RunCmd()`, which it
235 c92b310a Michael Hanselmann
    uses to launch ssh.
236 c92b310a Michael Hanselmann

237 c41eea6e Iustin Pop
    Args: see SshRunner.BuildCmd.
238 c92b310a Michael Hanselmann

239 a4ccecf6 Michael Hanselmann
    @rtype: L{utils.process.RunResult}
240 a4ccecf6 Michael Hanselmann
    @return: the result as from L{utils.process.RunCmd()}
241 c92b310a Michael Hanselmann

242 c92b310a Michael Hanselmann
    """
243 54ab6aec Michael Hanselmann
    return utils.RunCmd(self.BuildCmd(*args, **kwargs))
244 c92b310a Michael Hanselmann
245 c92b310a Michael Hanselmann
  def CopyFileToNode(self, node, filename):
246 c92b310a Michael Hanselmann
    """Copy a file to another node with scp.
247 c92b310a Michael Hanselmann

248 c41eea6e Iustin Pop
    @param node: node in the cluster
249 c41eea6e Iustin Pop
    @param filename: absolute pathname of a local file
250 c92b310a Michael Hanselmann

251 c41eea6e Iustin Pop
    @rtype: boolean
252 c41eea6e Iustin Pop
    @return: the success of the operation
253 a8083063 Iustin Pop

254 c92b310a Michael Hanselmann
    """
255 c92b310a Michael Hanselmann
    if not os.path.isabs(filename):
256 23828f1c Iustin Pop
      logging.error("File %s must be an absolute path", filename)
257 c92b310a Michael Hanselmann
      return False
258 a8083063 Iustin Pop
259 1d544ba3 Michael Hanselmann
    if not os.path.isfile(filename):
260 23828f1c Iustin Pop
      logging.error("File %s does not exist", filename)
261 1d544ba3 Michael Hanselmann
      return False
262 1d544ba3 Michael Hanselmann
263 2892a4c9 Iustin Pop
    command = [constants.SCP, "-p"]
264 652d6694 Michael Hanselmann
    command.extend(self._BuildSshOptions(True, False, True, True))
265 c92b310a Michael Hanselmann
    command.append(filename)
266 8062638d Manuel Franceschini
    if netutils.IP6Address.IsValid(node):
267 8062638d Manuel Franceschini
      node = netutils.FormatAddress((node, None))
268 8062638d Manuel Franceschini
269 cffbbae7 Michael Hanselmann
    command.append("%s:%s" % (node, vcluster.ExchangeNodeRoot(node, filename)))
270 a8083063 Iustin Pop
271 c92b310a Michael Hanselmann
    result = utils.RunCmd(command)
272 a8083063 Iustin Pop
273 c92b310a Michael Hanselmann
    if result.failed:
274 9dc45ab1 Michael Hanselmann
      logging.error("Copy to node %s failed (%s) error '%s',"
275 9dc45ab1 Michael Hanselmann
                    " command was '%s'",
276 23828f1c Iustin Pop
                    node, result.fail_reason, result.output, result.cmd)
277 a8083063 Iustin Pop
278 c92b310a Michael Hanselmann
    return not result.failed
279 a8083063 Iustin Pop
280 c92b310a Michael Hanselmann
  def VerifyNodeHostname(self, node):
281 c92b310a Michael Hanselmann
    """Verify hostname consistency via SSH.
282 a8083063 Iustin Pop

283 c92b310a Michael Hanselmann
    This functions connects via ssh to a node and compares the hostname
284 c92b310a Michael Hanselmann
    reported by the node to the name with have (the one that we
285 c92b310a Michael Hanselmann
    connected to).
286 a8083063 Iustin Pop

287 c92b310a Michael Hanselmann
    This is used to detect problems in ssh known_hosts files
288 5bbd3f7f Michael Hanselmann
    (conflicting known hosts) and inconsistencies between dns/hosts
289 c92b310a Michael Hanselmann
    entries and local machine names
290 a8083063 Iustin Pop

291 c41eea6e Iustin Pop
    @param node: nodename of a host to check; can be short or
292 c41eea6e Iustin Pop
        full qualified hostname
293 a8083063 Iustin Pop

294 c41eea6e Iustin Pop
    @return: (success, detail), where:
295 c41eea6e Iustin Pop
        - success: True/False
296 c41eea6e Iustin Pop
        - detail: string with details
297 a8083063 Iustin Pop

298 c92b310a Michael Hanselmann
    """
299 cffbbae7 Michael Hanselmann
    cmd = ("if test -z \"$GANETI_HOSTNAME\"; then"
300 cffbbae7 Michael Hanselmann
           "  hostname --fqdn;"
301 cffbbae7 Michael Hanselmann
           "else"
302 cffbbae7 Michael Hanselmann
           "  echo \"$GANETI_HOSTNAME\";"
303 cffbbae7 Michael Hanselmann
           "fi")
304 052783ff Michael Hanselmann
    retval = self.Run(node, constants.SSH_LOGIN_USER, cmd, quiet=False)
305 a8083063 Iustin Pop
306 c92b310a Michael Hanselmann
    if retval.failed:
307 c92b310a Michael Hanselmann
      msg = "ssh problem"
308 c92b310a Michael Hanselmann
      output = retval.output
309 c92b310a Michael Hanselmann
      if output:
310 c92b310a Michael Hanselmann
        msg += ": %s" % output
311 a162cf5b Iustin Pop
      else:
312 a162cf5b Iustin Pop
        msg += ": %s (no output)" % retval.fail_reason
313 099c52ad Iustin Pop
      logging.error("Command %s failed: %s", retval.cmd, msg)
314 c92b310a Michael Hanselmann
      return False, msg
315 a8083063 Iustin Pop
316 c92b310a Michael Hanselmann
    remotehostname = retval.stdout.strip()
317 a8083063 Iustin Pop
318 c92b310a Michael Hanselmann
    if not remotehostname or remotehostname != node:
319 31821208 Iustin Pop
      if node.startswith(remotehostname + "."):
320 31821208 Iustin Pop
        msg = "hostname not FQDN"
321 31821208 Iustin Pop
      else:
322 2175e25d Manuel Franceschini
        msg = "hostname mismatch"
323 31821208 Iustin Pop
      return False, ("%s: expected %s but got %s" %
324 31821208 Iustin Pop
                     (msg, node, remotehostname))
325 a8083063 Iustin Pop
326 c92b310a Michael Hanselmann
    return True, "host matches"
327 75a5f456 Michael Hanselmann
328 75a5f456 Michael Hanselmann
329 7688d0d3 Michael Hanselmann
def WriteKnownHostsFile(cfg, file_name):
330 75a5f456 Michael Hanselmann
  """Writes the cluster-wide equally known_hosts file.
331 75a5f456 Michael Hanselmann

332 75a5f456 Michael Hanselmann
  """
333 a9542a4f Thomas Thrainer
  data = ""
334 a9542a4f Thomas Thrainer
  if cfg.GetRsaHostKey():
335 a9542a4f Thomas Thrainer
    data += "%s ssh-rsa %s\n" % (cfg.GetClusterName(), cfg.GetRsaHostKey())
336 a9542a4f Thomas Thrainer
  if cfg.GetDsaHostKey():
337 a9542a4f Thomas Thrainer
    data += "%s ssh-dss %s\n" % (cfg.GetClusterName(), cfg.GetDsaHostKey())
338 a9542a4f Thomas Thrainer
339 a9542a4f Thomas Thrainer
  utils.WriteFile(file_name, mode=0600, data=data)