Statistics
| Branch: | Tag: | Revision:

root / ncclient / ssh.py @ 2acc860a

History | View | Annotate | Download (5.3 kB)

1
# Copyright 2009 Shikhar Bhushan
2
#
3
# Licensed under the Apache License, Version 2.0 (the "License");
4
# you may not use this file except in compliance with the License.
5
# You may obtain a copy of the License at
6
#
7
#    http://www.apache.org/licenses/LICENSE-2.0
8
#
9
# Unless required by applicable law or agreed to in writing, software
10
# distributed under the License is distributed on an "AS IS" BASIS,
11
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12
# See the License for the specific language governing permissions and
13
# limitations under the License.
14

    
15
import logging
16
from cStringIO import StringIO
17
from os import SEEK_CUR
18
import socket
19

    
20
import paramiko
21

    
22

    
23
from session import Session, SessionError
24

    
25
logger = logging.getLogger('ncclient.ssh')
26

    
27

    
28
class SessionCloseError(SessionError):
29
    
30
    def __str__(self):
31
        return 'RECEIVED: %s | UNSENT: %s' % (self._in_buf, self._out_buf)
32
    
33
    def __init__(self, in_buf, out_buf=None):
34
        SessionError.__init__(self)
35
        self._in_buf, self._out_buf = in_buf, out_buf
36

    
37

    
38
class SSHSession(Session):
39

    
40
    BUF_SIZE = 4096
41
    MSG_DELIM = ']]>]]>'
42
    
43
    def __init__(self, load_known_hosts=True,
44
                 missing_host_key_policy=paramiko.RejectPolicy()):
45
        Session.__init__(self)
46
        self._client = paramiko.SSHClient()
47
        self._channel = None
48
        if load_known_hosts:
49
            self._client.load_system_host_keys()
50
        self._client.set_missing_host_key_policy(missing_host_key_policy)
51
        self._in_buf = StringIO()
52
        self._parsing_state = 0
53
        self._parsing_pos = 0
54
    
55
    def _close(self):
56
        self._channel.close()
57
        self._connected = False
58
    
59
    def _fresh_data(self):
60
        delim = SSHSession.MSG_DELIM
61
        n = len(delim) - 1
62
        state = self._parsing_state
63
        buf = self._in_buf
64
        buf.seek(self._parsing_pos)
65
        while True:
66
            x = buf.read(1)
67
            if not x: # done reading
68
                break
69
            elif x == delim[state]:
70
                state += 1
71
            else:
72
                continue
73
            # loop till last delim char expected, break if other char encountered
74
            for i in range(state, n):
75
                x = buf.read(1)
76
                if not x: # done reading
77
                    break
78
                if x==delim[i]: # what we expected
79
                    state += 1 # expect the next delim char
80
                else:
81
                    state = 0 # reset
82
                    break
83
            else: # if we didn't break out of above loop, full delim parsed
84
                till = buf.tell() - n
85
                buf.seek(0)
86
                msg = buf.read(till)
87
                self.dispatch('reply', msg)
88
                buf.seek(n+1, SEEK_CUR)
89
                rest = buf.read()
90
                buf = StringIO()
91
                buf.write(rest)
92
                buf.seek(0)
93
                state = 0
94
        self._in_buf = buf
95
        self._parsing_state = state
96
        self._parsing_pos = self._in_buf.tell()
97

    
98
    #def load_host_keys(self, filename):
99
    #    self._client.load_host_keys(filename)
100
    #
101
    #def set_missing_host_key_policy(self, policy):
102
    #    self._client.set_missing_host_key_policy(policy)
103
    #
104
    #def connect(self, hostname, port=830, username=None, password=None,
105
    #            key_filename=None, timeout=None, allow_agent=True,
106
    #            look_for_keys=True):
107
    #    self._client.connect(hostname, port=port, username=username,
108
    #                        password=password, key_filename=key_filename,
109
    #                        timeout=timeout, allow_agent=allow_agent,
110
    #                        look_for_keys=look_for_keys)    
111
    #    transport = self._client.get_transport()
112
    #    self._channel = transport.open_session()
113
    #    self._channel.invoke_subsystem('netconf')
114
    #    self._channel.set_name('netconf')
115
    #    self._connected = True
116
    #    self._post_connect()
117

    
118
    def connect(self, hostname, port=830, username=None, password=None,
119
                key_filename=None, timeout=None, allow_agent=True,
120
                look_for_keys=True):
121
        self._transport = paramiko.Transport()
122
    
123
    def run(self):
124
        chan = self._channel
125
        chan.setblocking(0)
126
        q = self._q
127
        try:
128
            while True:    
129
                if chan.closed:
130
                    raise SessionCloseError(self._in_buf.getvalue())         
131
                if chan.send_ready() and not q.empty():
132
                    data = q.get() + SSHSession.MSG_DELIM
133
                    while data:
134
                        n = chan.send(data)
135
                        if n <= 0:
136
                            raise SessionCloseError(self._in_buf.getvalue(), data)
137
                        data = data[n:]
138
                if chan.recv_ready():
139
                    data = chan.recv(SSHSession.BUF_SIZE)
140
                    if data:
141
                        self._in_buf.write(data)
142
                        self._fresh_data()
143
                    else:
144
                        raise SessionCloseError(self._in_buf.getvalue())
145
        except Exception as e:
146
            logger.debug('*** broke out of main loop ***')
147
            self.dispatch('error', e)
148

    
149
class MissingHostKeyPolicy(paramiko.MissingHostKeyPolicy):
150
    
151
    def __init__(self, cb):
152
        self._cb = cb
153
    
154
    def missing_host_key(self, client, hostname, key):
155
        if not self._cb(hostname, key):
156
            raise SSHError