003 File Manager
Current Path:
/usr/local/lib/python3.8/site-packages/salt/modules
usr
/
local
/
lib
/
python3.8
/
site-packages
/
salt
/
modules
/
📁
..
📄
__init__.py
(35 B)
📁
__pycache__
📄
acme.py
(12.74 KB)
📄
aix_group.py
(4.11 KB)
📄
aix_shadow.py
(1.93 KB)
📄
aixpkg.py
(10.91 KB)
📄
aliases.py
(5.07 KB)
📄
alternatives.py
(5.1 KB)
📄
ansiblegate.py
(11.38 KB)
📄
apache.py
(12.47 KB)
📄
apcups.py
(2.21 KB)
📄
apf.py
(3.09 KB)
📄
apkpkg.py
(16 KB)
📄
aptly.py
(15.28 KB)
📄
aptpkg.py
(102.35 KB)
📄
archive.py
(46.97 KB)
📄
arista_pyeapi.py
(22.06 KB)
📄
artifactory.py
(24.78 KB)
📄
at.py
(10.65 KB)
📄
at_solaris.py
(8.56 KB)
📄
augeas_cfg.py
(13.93 KB)
📄
aws_sqs.py
(6.55 KB)
📄
azurearm_compute.py
(19.55 KB)
📄
azurearm_dns.py
(14.7 KB)
📄
azurearm_network.py
(80.8 KB)
📄
azurearm_resource.py
(34.27 KB)
📄
bamboohr.py
(7.36 KB)
📄
baredoc.py
(11.13 KB)
📄
bcache.py
(28.97 KB)
📄
beacons.py
(27.89 KB)
📄
bigip.py
(69.11 KB)
📄
bluez_bluetooth.py
(6.76 KB)
📄
boto3_elasticache.py
(37.34 KB)
📄
boto3_elasticsearch.py
(53.17 KB)
📄
boto3_route53.py
(39.75 KB)
📄
boto3_sns.py
(12.93 KB)
📄
boto_apigateway.py
(61.86 KB)
📄
boto_asg.py
(35.7 KB)
📄
boto_cfn.py
(7.95 KB)
📄
boto_cloudfront.py
(12.75 KB)
📄
boto_cloudtrail.py
(14.45 KB)
📄
boto_cloudwatch.py
(10.99 KB)
📄
boto_cloudwatch_event.py
(9.48 KB)
📄
boto_cognitoidentity.py
(14.63 KB)
📄
boto_datapipeline.py
(6.94 KB)
📄
boto_dynamodb.py
(10.54 KB)
📄
boto_ec2.py
(79.29 KB)
📄
boto_efs.py
(14.05 KB)
📄
boto_elasticache.py
(23.69 KB)
📄
boto_elasticsearch_domain.py
(15.85 KB)
📄
boto_elb.py
(35.4 KB)
📄
boto_elbv2.py
(10.81 KB)
📄
boto_iam.py
(75.62 KB)
📄
boto_iot.py
(26.2 KB)
📄
boto_kinesis.py
(19.63 KB)
📄
boto_kms.py
(17.29 KB)
📄
boto_lambda.py
(35.05 KB)
📄
boto_rds.py
(34.92 KB)
📄
boto_route53.py
(32.55 KB)
📄
boto_s3.py
(4.24 KB)
📄
boto_s3_bucket.py
(31.8 KB)
📄
boto_secgroup.py
(25.22 KB)
📄
boto_sns.py
(7.22 KB)
📄
boto_sqs.py
(6.43 KB)
📄
boto_ssm.py
(3.65 KB)
📄
boto_vpc.py
(112.81 KB)
📄
bower.py
(5.89 KB)
📄
bridge.py
(10.86 KB)
📄
bsd_shadow.py
(6.92 KB)
📄
btrfs.py
(33.64 KB)
📄
cabal.py
(3.79 KB)
📄
capirca_acl.py
(40.04 KB)
📄
cassandra_cql.py
(39 KB)
📄
cassandra_mod.py
(3.97 KB)
📄
celery.py
(3.33 KB)
📄
ceph.py
(15.82 KB)
📄
chassis.py
(1.52 KB)
📄
chef.py
(4.66 KB)
📄
chocolatey.py
(39.34 KB)
📄
chronos.py
(2.89 KB)
📄
chroot.py
(11.51 KB)
📄
cimc.py
(23.02 KB)
📄
ciscoconfparse_mod.py
(14.79 KB)
📄
cisconso.py
(3.83 KB)
📄
cloud.py
(9.39 KB)
📄
cmdmod.py
(162.16 KB)
📄
composer.py
(10.31 KB)
📄
config.py
(16.85 KB)
📄
consul.py
(68.93 KB)
📄
container_resource.py
(13.36 KB)
📄
cp.py
(27.98 KB)
📄
cpan.py
(5.54 KB)
📄
cron.py
(26.8 KB)
📄
cryptdev.py
(10.08 KB)
📄
csf.py
(16.04 KB)
📄
cyg.py
(8.32 KB)
📄
daemontools.py
(5.41 KB)
📄
data.py
(3.83 KB)
📄
datadog_api.py
(7.64 KB)
📄
ddns.py
(7.04 KB)
📄
deb_apache.py
(7.41 KB)
📄
deb_postgres.py
(4.22 KB)
📄
debconfmod.py
(4.06 KB)
📄
debian_ip.py
(64.78 KB)
📄
debian_service.py
(6.6 KB)
📄
debuild_pkgbuild.py
(34.69 KB)
📄
defaults.py
(5.42 KB)
📄
devinfo.py
(9.05 KB)
📄
devmap.py
(627 B)
📄
dig.py
(7.45 KB)
📄
disk.py
(30.44 KB)
📄
djangomod.py
(7.53 KB)
📄
dnsmasq.py
(5.71 KB)
📄
dnsutil.py
(11.51 KB)
📄
dockercompose.py
(32.62 KB)
📄
dockermod.py
(224.97 KB)
📄
dpkg_lowpkg.py
(12.9 KB)
📄
drac.py
(10.97 KB)
📄
dracr.py
(38.53 KB)
📄
drbd.py
(7.19 KB)
📄
dummyproxy_pkg.py
(2.46 KB)
📄
dummyproxy_service.py
(2.91 KB)
📄
ebuildpkg.py
(38.74 KB)
📄
eix.py
(1.58 KB)
📄
elasticsearch.py
(51.44 KB)
📄
environ.py
(8.96 KB)
📄
eselect.py
(4.99 KB)
📄
esxcluster.py
(502 B)
📄
esxdatacenter.py
(514 B)
📄
esxi.py
(1.64 KB)
📄
esxvm.py
(481 B)
📄
etcd_mod.py
(7.02 KB)
📄
ethtool.py
(7.65 KB)
📄
event.py
(8.23 KB)
📄
extfs.py
(8.78 KB)
📄
file.py
(224.74 KB)
📄
firewalld.py
(20.51 KB)
📄
freebsd_sysctl.py
(4.76 KB)
📄
freebsd_update.py
(6.19 KB)
📄
freebsdjail.py
(7.16 KB)
📄
freebsdkmod.py
(6.17 KB)
📄
freebsdpkg.py
(17.04 KB)
📄
freebsdports.py
(13.13 KB)
📄
freebsdservice.py
(12.53 KB)
📄
freezer.py
(8.91 KB)
📄
gcp_addon.py
(4.07 KB)
📄
gem.py
(10.6 KB)
📄
genesis.py
(21.75 KB)
📄
gentoo_service.py
(9.18 KB)
📄
gentoolkitmod.py
(8.33 KB)
📄
git.py
(171.44 KB)
📄
github.py
(53.19 KB)
📄
glanceng.py
(4.69 KB)
📄
glassfish.py
(19.49 KB)
📄
glusterfs.py
(19.55 KB)
📄
gnomedesktop.py
(6.85 KB)
📄
google_chat.py
(1.52 KB)
📄
gpg.py
(39.99 KB)
📄
grafana4.py
(30.27 KB)
📄
grains.py
(23.67 KB)
📄
groupadd.py
(10.85 KB)
📄
grub_legacy.py
(3.08 KB)
📄
guestfs.py
(2.32 KB)
📄
hadoop.py
(3.76 KB)
📄
haproxyconn.py
(10.17 KB)
📄
hashutil.py
(6.77 KB)
📄
heat.py
(25.26 KB)
📄
helm.py
(39.27 KB)
📄
hg.py
(7.16 KB)
📄
highstate_doc.py
(22.76 KB)
📄
hosts.py
(10.47 KB)
📄
http.py
(3.75 KB)
📄
icinga2.py
(4.46 KB)
📄
idem.py
(1.75 KB)
📄
ifttt.py
(2.28 KB)
📄
ilo.py
(15.98 KB)
📄
incron.py
(7.68 KB)
📄
influxdb08mod.py
(15.07 KB)
📄
influxdbmod.py
(16.13 KB)
📄
infoblox.py
(17.53 KB)
📄
ini_manage.py
(14.63 KB)
📁
inspectlib
📄
inspector.py
(8.19 KB)
📄
introspect.py
(4.02 KB)
📄
iosconfig.py
(14.78 KB)
📄
ipmi.py
(25.45 KB)
📄
ipset.py
(17.97 KB)
📄
iptables.py
(57.33 KB)
📄
iwtools.py
(3.99 KB)
📄
jboss7.py
(20.51 KB)
📄
jboss7_cli.py
(15.23 KB)
📄
jenkinsmod.py
(11.9 KB)
📄
jinja.py
(2.66 KB)
📄
jira_mod.py
(7.07 KB)
📄
junos.py
(73.9 KB)
📄
k8s.py
(24.87 KB)
📄
kapacitor.py
(5.37 KB)
📄
kerberos.py
(5.42 KB)
📄
kernelpkg_linux_apt.py
(6.91 KB)
📄
kernelpkg_linux_yum.py
(7.46 KB)
📄
key.py
(1007 B)
📄
keyboard.py
(2.64 KB)
📄
keystone.py
(43.16 KB)
📄
keystoneng.py
(21.82 KB)
📄
keystore.py
(6.69 KB)
📄
kmod.py
(7.29 KB)
📄
kubeadm.py
(34.01 KB)
📄
kubernetesmod.py
(46.66 KB)
📄
launchctl_service.py
(9.73 KB)
📄
layman.py
(4.22 KB)
📄
ldap3.py
(18.81 KB)
📄
ldapmod.py
(5.9 KB)
📄
libcloud_compute.py
(23.51 KB)
📄
libcloud_dns.py
(9.76 KB)
📄
libcloud_loadbalancer.py
(13.17 KB)
📄
libcloud_storage.py
(12.19 KB)
📄
linux_acl.py
(7.7 KB)
📄
linux_ip.py
(5.44 KB)
📄
linux_lvm.py
(17.86 KB)
📄
linux_service.py
(4.64 KB)
📄
linux_shadow.py
(13.37 KB)
📄
linux_sysctl.py
(7.39 KB)
📄
localemod.py
(11.84 KB)
📄
locate.py
(2.58 KB)
📄
logadm.py
(9.57 KB)
📄
logmod.py
(1.24 KB)
📄
logrotate.py
(7.72 KB)
📄
lvs.py
(11.54 KB)
📄
lxc.py
(148.61 KB)
📄
lxd.py
(90.2 KB)
📄
mac_assistive.py
(6.36 KB)
📄
mac_brew_pkg.py
(19.82 KB)
📄
mac_desktop.py
(2.77 KB)
📄
mac_group.py
(6.34 KB)
📄
mac_keychain.py
(6.68 KB)
📄
mac_pkgutil.py
(2.84 KB)
📄
mac_portspkg.py
(11.36 KB)
📄
mac_power.py
(13.29 KB)
📄
mac_service.py
(19.64 KB)
📄
mac_shadow.py
(14.23 KB)
📄
mac_softwareupdate.py
(14.52 KB)
📄
mac_sysctl.py
(5.13 KB)
📄
mac_system.py
(15.2 KB)
📄
mac_timezone.py
(8.34 KB)
📄
mac_user.py
(16.36 KB)
📄
mac_xattr.py
(6.11 KB)
📄
macdefaults.py
(2.33 KB)
📄
macpackage.py
(6.94 KB)
📄
makeconf.py
(17.31 KB)
📄
mandrill.py
(6.31 KB)
📄
marathon.py
(5.36 KB)
📄
match.py
(10.28 KB)
📄
mattermost.py
(3.4 KB)
📄
mdadm_raid.py
(9.86 KB)
📄
mdata.py
(3.44 KB)
📄
memcached.py
(6.13 KB)
📄
mine.py
(18.79 KB)
📄
minion.py
(7.68 KB)
📄
mod_random.py
(6.72 KB)
📄
modjk.py
(12.48 KB)
📄
mongodb.py
(17.3 KB)
📄
monit.py
(5.51 KB)
📄
moosefs.py
(3.87 KB)
📄
mount.py
(56.18 KB)
📄
mssql.py
(14.64 KB)
📄
msteams.py
(2 KB)
📄
munin.py
(2.4 KB)
📄
mysql.py
(87.86 KB)
📄
nacl.py
(9.73 KB)
📄
nagios.py
(6.53 KB)
📄
nagios_rpc.py
(5.09 KB)
📄
namecheap_domains.py
(12.84 KB)
📄
namecheap_domains_dns.py
(5.93 KB)
📄
namecheap_domains_ns.py
(4.51 KB)
📄
namecheap_ssl.py
(25.72 KB)
📄
namecheap_users.py
(2.4 KB)
📄
napalm_bgp.py
(9.72 KB)
📄
napalm_formula.py
(11.33 KB)
📄
napalm_mod.py
(59.3 KB)
📄
napalm_netacl.py
(28.59 KB)
📄
napalm_network.py
(93.24 KB)
📄
napalm_ntp.py
(10.22 KB)
📄
napalm_probes.py
(13.25 KB)
📄
napalm_route.py
(5.09 KB)
📄
napalm_snmp.py
(7.05 KB)
📄
napalm_users.py
(6.49 KB)
📄
napalm_yang_mod.py
(20.28 KB)
📄
netaddress.py
(1.6 KB)
📄
netbox.py
(32.22 KB)
📄
netbsd_sysctl.py
(3.97 KB)
📄
netbsdservice.py
(6.49 KB)
📄
netmiko_mod.py
(19.63 KB)
📄
netscaler.py
(27.02 KB)
📄
network.py
(62.75 KB)
📄
neutron.py
(44.93 KB)
📄
neutronng.py
(15.02 KB)
📄
nexus.py
(22.95 KB)
📄
nfs3.py
(3.9 KB)
📄
nftables.py
(33.58 KB)
📄
nginx.py
(3.83 KB)
📄
nilrt_ip.py
(36.18 KB)
📄
nix.py
(8.03 KB)
📄
nova.py
(19.61 KB)
📄
npm.py
(10.35 KB)
📄
nspawn.py
(41.35 KB)
📄
nxos.py
(24.67 KB)
📄
nxos_api.py
(14.66 KB)
📄
nxos_upgrade.py
(14.74 KB)
📄
omapi.py
(3.6 KB)
📄
openbsd_sysctl.py
(3.74 KB)
📄
openbsdpkg.py
(11 KB)
📄
openbsdrcctl_service.py
(6.25 KB)
📄
openbsdservice.py
(8.31 KB)
📄
openscap.py
(2.81 KB)
📄
openstack_config.py
(3.5 KB)
📄
openstack_mng.py
(2.71 KB)
📄
openvswitch.py
(11.75 KB)
📄
opkg.py
(49.72 KB)
📄
opsgenie.py
(3.29 KB)
📄
oracle.py
(5.83 KB)
📄
osquery.py
(24.93 KB)
📄
out.py
(2.53 KB)
📄
pacmanpkg.py
(31.99 KB)
📄
pagerduty.py
(4.7 KB)
📄
pagerduty_util.py
(13.49 KB)
📄
pam.py
(2.01 KB)
📄
panos.py
(61.05 KB)
📄
parallels.py
(19.85 KB)
📄
parted_partition.py
(21.53 KB)
📄
pcs.py
(14.11 KB)
📄
pdbedit.py
(10.72 KB)
📄
pecl.py
(3.79 KB)
📄
peeringdb.py
(8.39 KB)
📄
pf.py
(9.51 KB)
📄
philips_hue.py
(1.55 KB)
📄
pillar.py
(21.29 KB)
📄
pip.py
(51.76 KB)
📄
pkg_resource.py
(11.89 KB)
📄
pkgin.py
(17.35 KB)
📄
pkgng.py
(61.1 KB)
📄
pkgutil.py
(9.88 KB)
📄
portage_config.py
(22.77 KB)
📄
postfix.py
(16.24 KB)
📄
postgres.py
(88.31 KB)
📄
poudriere.py
(7.85 KB)
📄
powerpath.py
(2.57 KB)
📄
proxy.py
(11.49 KB)
📄
ps.py
(19.45 KB)
📄
publish.py
(10.22 KB)
📄
puppet.py
(11.69 KB)
📄
purefa.py
(33.03 KB)
📄
purefb.py
(13.65 KB)
📄
pushbullet.py
(1.88 KB)
📄
pushover_notify.py
(3.48 KB)
📄
pw_group.py
(4.4 KB)
📄
pw_user.py
(12.47 KB)
📄
pyenv.py
(6.93 KB)
📄
qemu_img.py
(1.53 KB)
📄
qemu_nbd.py
(3.28 KB)
📄
quota.py
(6.43 KB)
📄
rabbitmq.py
(38.44 KB)
📄
rallydev.py
(6.09 KB)
📄
random_org.py
(23.76 KB)
📄
rbac_solaris.py
(16.15 KB)
📄
rbenv.py
(10.75 KB)
📄
rdp.py
(6.08 KB)
📄
rebootmgr.py
(7.66 KB)
📄
redismod.py
(16.36 KB)
📄
reg.py
(16.36 KB)
📄
rest_pkg.py
(2.26 KB)
📄
rest_sample_utils.py
(558 B)
📄
rest_service.py
(3.63 KB)
📄
restartcheck.py
(24.1 KB)
📄
ret.py
(1.27 KB)
📄
rh_ip.py
(38.01 KB)
📄
rh_service.py
(16.61 KB)
📄
riak.py
(5.19 KB)
📄
rpm_lowpkg.py
(27.61 KB)
📄
rpmbuild_pkgbuild.py
(24.53 KB)
📄
rsync.py
(8.04 KB)
📄
runit.py
(17.14 KB)
📄
rvm.py
(11.1 KB)
📄
s3.py
(9.93 KB)
📄
s6.py
(3.62 KB)
📄
salt_proxy.py
(4.48 KB)
📄
salt_version.py
(4.29 KB)
📄
saltcheck.py
(46.11 KB)
📄
saltcloudmod.py
(954 B)
📄
saltutil.py
(56.5 KB)
📄
schedule.py
(43.35 KB)
📄
scp_mod.py
(6.22 KB)
📄
scsi.py
(2.66 KB)
📄
sdb.py
(2.45 KB)
📄
seed.py
(8.87 KB)
📄
selinux.py
(23.83 KB)
📄
sensehat.py
(7.79 KB)
📄
sensors.py
(1.3 KB)
📄
serverdensity_device.py
(8.1 KB)
📄
servicenow.py
(4.38 KB)
📄
slack_notify.py
(7.83 KB)
📄
slackware_service.py
(6.89 KB)
📄
slsutil.py
(19.05 KB)
📄
smartos_imgadm.py
(12.09 KB)
📄
smartos_nictagadm.py
(6.51 KB)
📄
smartos_virt.py
(5.21 KB)
📄
smartos_vmadm.py
(26.37 KB)
📄
smbios.py
(10.06 KB)
📄
smf_service.py
(8.52 KB)
📄
smtp.py
(5.41 KB)
📄
snapper.py
(27.14 KB)
📄
solaris_fmadm.py
(11.27 KB)
📄
solaris_group.py
(2.8 KB)
📄
solaris_shadow.py
(7.98 KB)
📄
solaris_system.py
(3.72 KB)
📄
solaris_user.py
(11.06 KB)
📄
solarisipspkg.py
(18.7 KB)
📄
solarispkg.py
(15.42 KB)
📄
solr.py
(45.54 KB)
📄
solrcloud.py
(14.63 KB)
📄
splunk.py
(8.15 KB)
📄
splunk_search.py
(8.76 KB)
📄
sqlite3.py
(2.54 KB)
📄
ssh.py
(43.15 KB)
📄
ssh_pkg.py
(1.08 KB)
📄
ssh_service.py
(3.39 KB)
📄
state.py
(78.55 KB)
📄
status.py
(57.34 KB)
📄
statuspage.py
(14.67 KB)
📄
supervisord.py
(11.15 KB)
📄
suse_apache.py
(2.45 KB)
📄
svn.py
(10.75 KB)
📄
swarm.py
(13.5 KB)
📄
swift.py
(5.55 KB)
📄
sysbench.py
(6.62 KB)
📄
sysfs.py
(6.61 KB)
📄
syslog_ng.py
(31.55 KB)
📄
sysmod.py
(22.59 KB)
📄
sysrc.py
(3.38 KB)
📄
system.py
(19.28 KB)
📄
system_profiler.py
(3.54 KB)
📄
systemd_service.py
(46.19 KB)
📄
telegram.py
(3.28 KB)
📄
telemetry.py
(12.9 KB)
📄
temp.py
(831 B)
📄
test.py
(14.71 KB)
📄
test_virtual.py
(194 B)
📄
testinframod.py
(9.92 KB)
📄
textfsm_mod.py
(16.22 KB)
📄
timezone.py
(19.89 KB)
📄
tls.py
(58.68 KB)
📄
tomcat.py
(18.59 KB)
📄
trafficserver.py
(10.44 KB)
📄
transactional_update.py
(42 KB)
📄
travisci.py
(2.08 KB)
📄
tuned.py
(2.34 KB)
📄
twilio_notify.py
(2.95 KB)
📄
udev.py
(3.72 KB)
📄
upstart_service.py
(16.92 KB)
📄
uptime.py
(3.23 KB)
📄
useradd.py
(22.3 KB)
📄
uwsgi.py
(996 B)
📄
vagrant.py
(20.4 KB)
📄
varnish.py
(3.08 KB)
📄
vault.py
(13.48 KB)
📄
vbox_guest.py
(10.55 KB)
📄
vboxmanage.py
(14.72 KB)
📄
vcenter.py
(455 B)
📄
victorops.py
(6.54 KB)
📄
virt.py
(290.11 KB)
📄
virtualenv_mod.py
(15.08 KB)
📄
vmctl.py
(9.6 KB)
📄
vsphere.py
(376.7 KB)
📄
webutil.py
(3.66 KB)
📄
win_auditpol.py
(4.74 KB)
📄
win_autoruns.py
(2.29 KB)
📄
win_certutil.py
(3.27 KB)
📄
win_dacl.py
(32.27 KB)
📄
win_disk.py
(1.8 KB)
📄
win_dism.py
(18.26 KB)
📄
win_dns_client.py
(4.19 KB)
📄
win_dsc.py
(26.56 KB)
📄
win_file.py
(59.46 KB)
📄
win_firewall.py
(20.15 KB)
📄
win_groupadd.py
(11.27 KB)
📄
win_iis.py
(68.76 KB)
📄
win_ip.py
(11.43 KB)
📄
win_lgpo.py
(491.78 KB)
📄
win_license.py
(2.72 KB)
📄
win_network.py
(14.02 KB)
📄
win_ntp.py
(1.8 KB)
📄
win_path.py
(11.12 KB)
📄
win_pkg.py
(84.64 KB)
📄
win_pki.py
(15.8 KB)
📄
win_powercfg.py
(9.85 KB)
📄
win_psget.py
(8.97 KB)
📄
win_servermanager.py
(14.33 KB)
📄
win_service.py
(32.7 KB)
📄
win_shadow.py
(3.03 KB)
📄
win_smtp_server.py
(17.67 KB)
📄
win_snmp.py
(13.38 KB)
📄
win_status.py
(17.04 KB)
📄
win_system.py
(40.62 KB)
📄
win_task.py
(78.46 KB)
📄
win_timezone.py
(13.27 KB)
📄
win_useradd.py
(27.53 KB)
📄
win_wua.py
(38.29 KB)
📄
win_wusa.py
(5.88 KB)
📄
winrepo.py
(6.3 KB)
📄
wordpress.py
(4.71 KB)
📄
x509.py
(62.22 KB)
📄
xapi_virt.py
(24.08 KB)
📄
xbpspkg.py
(15.89 KB)
📄
xfs.py
(15.33 KB)
📄
xml.py
(2.14 KB)
📄
xmpp.py
(5.28 KB)
📄
yumpkg.py
(112.71 KB)
📄
zabbix.py
(94.11 KB)
📄
zcbuildout.py
(28.19 KB)
📄
zenoss.py
(5.64 KB)
📄
zfs.py
(34.49 KB)
📄
zk_concurrency.py
(11.19 KB)
📄
znc.py
(2.26 KB)
📄
zoneadm.py
(15.11 KB)
📄
zonecfg.py
(21.91 KB)
📄
zookeeper.py
(14.72 KB)
📄
zpool.py
(44.02 KB)
📄
zypperpkg.py
(90.34 KB)
Editing: nilrt_ip.py
""" The networking module for NI Linux Real-Time distro """ import configparser import logging import os import re import time import salt.exceptions import salt.utils.files import salt.utils.validate.net try: import pyconnman except ImportError: pyconnman = None try: import dbus except ImportError: dbus = None try: import pyiface from pyiface.ifreqioctls import IFF_LOOPBACK, IFF_RUNNING except ImportError: pyiface = None try: from requests.structures import CaseInsensitiveDict except ImportError: CaseInsensitiveDict = None log = logging.getLogger(__name__) # Define the module's virtual name __virtualname__ = "ip" SERVICE_PATH = "/net/connman/service/" INTERFACES_CONFIG = "/var/lib/connman/interfaces.config" NIRTCFG_PATH = "/usr/local/natinst/bin/nirtcfg" INI_FILE = "/etc/natinst/share/ni-rt.ini" _CONFIG_TRUE = ["yes", "on", "true", "1", True] NIRTCFG_ETHERCAT = "EtherCAT" def _assume_condition(condition, err): """ Raise an exception if the condition is false """ if not condition: raise RuntimeError(err) def __virtual__(): """ Confine this module to NI Linux Real-Time based distros """ try: msg = "The nilrt_ip module could not be loaded: unsupported OS family" _assume_condition(__grains__["os_family"] == "NILinuxRT", msg) _assume_condition( CaseInsensitiveDict, "The python package request is not installed" ) _assume_condition(pyiface, "The python pyiface package is not installed") if __grains__["lsb_distrib_id"] != "nilrt": _assume_condition( pyconnman, "The python package pyconnman is not installed" ) _assume_condition(dbus, "The python DBus package is not installed") _assume_condition(_get_state() != "offline", "Connman is not running") except RuntimeError as exc: return False, str(exc) return __virtualname__ def _get_state(): """ Returns the state of connman """ try: return pyconnman.ConnManager().get_property("State") except KeyError: return "offline" except dbus.DBusException as exc: raise salt.exceptions.CommandExecutionError( "Connman daemon error: {}".format(exc) ) def _get_technologies(): """ Returns the technologies of connman """ tech = "" technologies = pyconnman.ConnManager().get_technologies() for path, params in technologies: tech += ( "{}\n\tName = {}\n\tType = {}\n\tPowered = {}\n\tConnected = {}\n".format( path, params["Name"], params["Type"], params["Powered"] == 1, params["Connected"] == 1, ) ) return tech def _get_services(): """ Returns a list with all connman services """ serv = [] services = pyconnman.ConnManager().get_services() for path, _ in services: serv.append(str(path[len(SERVICE_PATH) :])) return serv def _connected(service): """ Verify if a connman service is connected """ state = pyconnman.ConnService(os.path.join(SERVICE_PATH, service)).get_property( "State" ) return state == "online" or state == "ready" def _space_delimited_list(value): """ validate that a value contains one or more space-delimited values """ if isinstance(value, str): items = value.split(" ") valid = items and all(items) else: valid = hasattr(value, "__iter__") and (value != []) if valid: return True, "space-delimited string" return False, "{} is not a valid list.\n".format(value) def _validate_ipv4(value): """ validate ipv4 values """ if len(value) == 3: if not salt.utils.validate.net.ipv4_addr(value[0].strip()): return False, "Invalid ip address: {} for ipv4 option".format(value[0]) if not salt.utils.validate.net.netmask(value[1].strip()): return False, "Invalid netmask: {} for ipv4 option".format(value[1]) if not salt.utils.validate.net.ipv4_addr(value[2].strip()): return False, "Invalid gateway: {} for ipv4 option".format(value[2]) else: return False, "Invalid value: {} for ipv4 option".format(value) return True, "" def _interface_to_service(iface): """ returns the corresponding service to given interface if exists, otherwise return None """ for _service in _get_services(): service_info = pyconnman.ConnService(os.path.join(SERVICE_PATH, _service)) if service_info.get_property("Ethernet")["Interface"] == iface: return _service return None def _get_service_info(service): """ return details about given connman service """ service_info = pyconnman.ConnService(os.path.join(SERVICE_PATH, service)) data = { "label": service, "wireless": service_info.get_property("Type") == "wifi", "connectionid": str(service_info.get_property("Ethernet")["Interface"]), "hwaddr": str(service_info.get_property("Ethernet")["Address"]), } state = service_info.get_property("State") if state == "ready" or state == "online": data["up"] = True data["ipv4"] = {"gateway": "0.0.0.0"} ipv4 = "IPv4" if service_info.get_property("IPv4")["Method"] == "manual": ipv4 += ".Configuration" ipv4_info = service_info.get_property(ipv4) for info in ["Method", "Address", "Netmask", "Gateway"]: value = ipv4_info.get(info) if value is None: log.warning("Unable to get IPv4 %s for service %s\n", info, service) continue if info == "Method": info = "requestmode" if value == "dhcp": value = "dhcp_linklocal" elif value in ("manual", "fixed"): value = "static" data["ipv4"][info.lower()] = str(value) ipv6_info = service_info.get_property("IPv6") for info in ["Address", "Prefix", "Gateway"]: value = ipv6_info.get(info) if value is None: log.warning("Unable to get IPv6 %s for service %s\n", info, service) continue data["ipv6"][info.lower()] = [str(value)] nameservers = [] for nameserver_prop in service_info.get_property("Nameservers"): nameservers.append(str(nameserver_prop)) data["ipv4"]["dns"] = nameservers else: data["up"] = False data["ipv4"] = {"requestmode": "disabled"} data["ipv4"]["supportedrequestmodes"] = ["dhcp_linklocal", "disabled", "static"] return data def _get_dns_info(): """ return dns list """ dns_list = [] try: with salt.utils.files.fopen("/etc/resolv.conf", "r+") as dns_info: lines = dns_info.readlines() for line in lines: if "nameserver" in line: dns = line.split()[1].strip() if dns not in dns_list: dns_list.append(dns) except OSError: log.warning("Could not get domain\n") return dns_list def _remove_quotes(value): """ Remove leading and trailing double quotes if they exist. """ # nirtcfg writes values with quotes if len(value) > 1 and value[0] == value[-1] == '"': value = value[1:-1] return value def _load_config(section, options, default_value="", filename=INI_FILE): """ Get values for some options and a given section from a config file. :param section: Section Name :param options: List of options :param default_value: Default value if an option doesn't have a value. Default is empty string. :param filename: config file. Default is INI_FILE. :return: """ results = {} if not options: return results with salt.utils.files.fopen(filename, "r") as config_file: config_parser = configparser.RawConfigParser( dict_type=CaseInsensitiveDict, converters={"unquoted": _remove_quotes} ) config_parser.readfp(config_file) for option in options: results[option] = config_parser.getunquoted( section, option, fallback=default_value ) return results def _get_request_mode_info(interface): """ return requestmode for given interface """ settings = _load_config(interface, ["linklocalenabled", "dhcpenabled"], -1) link_local_enabled = int(settings["linklocalenabled"]) dhcp_enabled = int(settings["dhcpenabled"]) if dhcp_enabled == 1: return "dhcp_linklocal" if link_local_enabled == 1 else "dhcp_only" else: if link_local_enabled == 1: return "linklocal_only" if link_local_enabled == 0: return "static" # some versions of nirtcfg don't set the dhcpenabled/linklocalenabled variables # when selecting "DHCP or Link Local" from MAX, so return it by default to avoid # having the requestmode "None" because none of the conditions above matched. return "dhcp_linklocal" def _get_adapter_mode_info(interface): """ return adaptermode for given interface """ mode = _load_config(interface, ["mode"])["mode"].lower() return mode if mode in ["disabled", "ethercat"] else "tcpip" def _get_possible_adapter_modes(interface, blacklist): """ Return possible adapter modes for a given interface using a blacklist. :param interface: interface name :param blacklist: given blacklist :return: list of possible adapter modes """ adapter_modes = [] protocols = _load_config("lvrt", ["AdditionalNetworkProtocols"])[ "AdditionalNetworkProtocols" ].lower() sys_interface_path = os.readlink("/sys/class/net/{}".format(interface)) with salt.utils.files.fopen( "/sys/class/net/{}/uevent".format(interface) ) as uevent_file: uevent_lines = uevent_file.readlines() uevent_devtype = "" for line in uevent_lines: if line.startswith("DEVTYPE="): uevent_devtype = line.split("=")[1].strip() break for adapter_mode in blacklist: if adapter_mode == "_": continue value = blacklist.get(adapter_mode, {}) if value.get("additional_protocol") and adapter_mode not in protocols: continue if interface not in value["name"] and not any( (blacklist["_"][iface_type] == "sys" and iface_type in sys_interface_path) or (blacklist["_"][iface_type] == "uevent" and iface_type == uevent_devtype) for iface_type in value["type"] ): adapter_modes += [adapter_mode] return adapter_modes def _get_static_info(interface): """ Return information about an interface from config file. :param interface: interface label """ data = { "connectionid": interface.name, "label": interface.name, "hwaddr": interface.hwaddr[:-1], "up": False, "ipv4": { "supportedrequestmodes": ["dhcp_linklocal", "disabled", "static"], "requestmode": "dhcp_linklocal", }, "wireless": False, } hwaddr_section_number = "".join(data["hwaddr"].split(":")) if os.path.exists(INTERFACES_CONFIG): information = _load_config( "service_" + hwaddr_section_number, ["IPv4", "Nameservers", "IPv4.method"], filename=INTERFACES_CONFIG, ) if information["IPv4.method"] == "manual" and information["IPv4"] != "": ipv4_information = information["IPv4"].split("/") data["ipv4"]["address"] = ipv4_information[0] data["ipv4"]["dns"] = ( "" if information["Nameservers"] == "''" else information["Nameservers"].split(",") ) data["ipv4"]["netmask"] = ipv4_information[1] data["ipv4"]["gateway"] = ipv4_information[2] data["ipv4"]["requestmode"] = "static" elif information["IPv4"] == "off": data["ipv4"]["requestmode"] = "disabled" return data def _get_base_interface_info(interface): """ return base details about given interface """ blacklist = { "tcpip": {"name": [], "type": [], "additional_protocol": False}, "disabled": { "name": ["eth0"], "type": ["gadget"], "additional_protocol": False, }, "ethercat": { "name": ["eth0"], "type": ["gadget", "usb", "wlan"], "additional_protocol": True, }, "_": {"usb": "sys", "gadget": "uevent", "wlan": "uevent"}, } return { "label": interface.name, "connectionid": interface.name, "supported_adapter_modes": _get_possible_adapter_modes( interface.name, blacklist ), "adapter_mode": _get_adapter_mode_info(interface.name), "up": interface.flags & IFF_RUNNING != 0, "ipv4": { "supportedrequestmodes": [ "dhcp_linklocal", "dhcp_only", "linklocal_only", "static", ], "requestmode": _get_request_mode_info(interface.name), }, "hwaddr": interface.hwaddr[:-1], } def _get_ethercat_interface_info(interface): """ return details about given ethercat interface """ base_information = _get_base_interface_info(interface) base_information["ethercat"] = { "masterid": _load_config(interface.name, ["MasterID"])["MasterID"] } return base_information def _get_tcpip_interface_info(interface): """ return details about given tcpip interface """ base_information = _get_base_interface_info(interface) if base_information["ipv4"]["requestmode"] == "static": settings = _load_config( interface.name, ["IP_Address", "Subnet_Mask", "Gateway", "DNS_Address"] ) base_information["ipv4"]["address"] = settings["IP_Address"] base_information["ipv4"]["netmask"] = settings["Subnet_Mask"] base_information["ipv4"]["gateway"] = settings["Gateway"] base_information["ipv4"]["dns"] = [settings["DNS_Address"]] elif base_information["up"]: base_information["ipv4"]["address"] = interface.sockaddrToStr(interface.addr) base_information["ipv4"]["netmask"] = interface.sockaddrToStr(interface.netmask) base_information["ipv4"]["gateway"] = "0.0.0.0" base_information["ipv4"]["dns"] = _get_dns_info() with salt.utils.files.fopen("/proc/net/route", "r") as route_file: pattern = re.compile( r"^{interface}\t[0]{{8}}\t([0-9A-Z]{{8}})".format( interface=interface.name ), re.MULTILINE, ) match = pattern.search(route_file.read()) iface_gateway_hex = None if not match else match.group(1) if iface_gateway_hex is not None and len(iface_gateway_hex) == 8: base_information["ipv4"]["gateway"] = ".".join( [str(int(iface_gateway_hex[i : i + 2], 16)) for i in range(6, -1, -2)] ) return base_information def _get_interface_info(interface): """ return details about given interface """ adapter_mode = _get_adapter_mode_info(interface.name) if adapter_mode == "disabled": return _get_base_interface_info(interface) elif adapter_mode == "ethercat": return _get_ethercat_interface_info(interface) return _get_tcpip_interface_info(interface) def _dict_to_string(dictionary): """ converts a dictionary object into a list of strings """ ret = "" for key, val in sorted(dictionary.items()): if isinstance(val, dict): for line in _dict_to_string(val): ret += str(key) + "-" + line + "\n" elif isinstance(val, list): text = " ".join([str(item) for item in val]) ret += str(key) + ": " + text + "\n" else: ret += str(key) + ": " + str(val) + "\n" return ret.splitlines() def _get_info(interface): """ Return information about an interface even if it's not associated with a service. :param interface: interface label """ service = _interface_to_service(interface.name) if service is not None: return _get_service_info(service) return _get_static_info(interface) def get_interfaces_details(): """ Get details about all the interfaces on the minion :return: information about all interfaces omitting loopback :rtype: dictionary CLI Example: .. code-block:: bash salt '*' ip.get_interfaces_details """ _interfaces = [ interface for interface in pyiface.getIfaces() if interface.flags & IFF_LOOPBACK == 0 ] if __grains__["lsb_distrib_id"] == "nilrt": return {"interfaces": list(map(_get_interface_info, _interfaces))} return {"interfaces": list(map(_get_info, _interfaces))} def _change_state_legacy(interface, new_state): """ Enable or disable an interface on a legacy distro Change adapter mode to TCP/IP. If previous adapter mode was EtherCAT, the target will need reboot. :param interface: interface label :param new_state: up or down :return: True if the service was enabled, otherwise an exception will be thrown. :rtype: bool """ initial_mode = _get_adapter_mode_info(interface) _save_config(interface, "Mode", "TCPIP" if new_state == "up" else "Disabled") if initial_mode == "ethercat": __salt__["system.set_reboot_required_witnessed"]() else: out = __salt__["cmd.run_all"]("ip link set {} {}".format(interface, new_state)) if out["retcode"] != 0: msg = "Couldn't {} interface {}. Error: {}".format( "enable" if new_state == "up" else "disable", interface, out["stderr"] ) raise salt.exceptions.CommandExecutionError(msg) return True def _change_dhcp_config(interface, enable_dhcp=True, filename=INTERFACES_CONFIG): """ Enable or disable dhcp for an interface which isn't a service (in a config file) :param interface: interface label :param enable_dhcp: True to enable dhcp and False to disable dhcp. Default is True :param filename: Config file name. Default is INTERFACES_CONFIG. """ parser = configparser.ConfigParser() parser.optionxform = str if os.path.exists(filename): try: with salt.utils.files.fopen(filename, "r") as config_file: parser.readfp(config_file) except configparser.MissingSectionHeaderError: pass interface = pyiface.Interface(name=interface) hwaddr = interface.hwaddr[:-1] hwaddr_section_number = "".join(hwaddr.split(":")) if parser.has_section("service_{}".format(hwaddr_section_number)): parser.remove_section("service_{}".format(hwaddr_section_number)) parser.add_section("service_{}".format(hwaddr_section_number)) parser.set("service_{}".format(hwaddr_section_number), "MAC", hwaddr) parser.set( "service_{}".format(hwaddr_section_number), "Name", "ethernet_cable_{}".format(hwaddr_section_number), ) parser.set("service_{}".format(hwaddr_section_number), "Type", "ethernet") if enable_dhcp: parser.set("service_{}".format(hwaddr_section_number), "IPv4.Method", "dhcp") parser.set("service_{}".format(hwaddr_section_number), "AutoConnect", "true") parser.set("service_{}".format(hwaddr_section_number), "Nameservers", "''") else: parser.set("service_{}".format(hwaddr_section_number), "IPv4", "off") with salt.utils.files.fopen(filename, "w") as config_file: parser.write(config_file) return True def _change_state(interface, new_state): """ Enable or disable an interface Change adapter mode to TCP/IP. If previous adapter mode was EtherCAT, the target will need reboot. :param interface: interface label :param new_state: up or down :return: True if the service was enabled, otherwise an exception will be thrown. :rtype: bool """ if __grains__["lsb_distrib_id"] == "nilrt": return _change_state_legacy(interface, new_state) if interface in [x.name for x in pyiface.getIfaces()]: return ( _change_dhcp_config(interface) if new_state == "up" else _change_dhcp_config(interface, False) ) raise salt.exceptions.CommandExecutionError( "Invalid interface name: {}".format(interface) ) def up(interface, iface_type=None): # pylint: disable=invalid-name,unused-argument """ Enable the specified interface Change adapter mode to TCP/IP. If previous adapter mode was EtherCAT, the target will need reboot. :param str interface: interface label :return: True if the service was enabled, otherwise an exception will be thrown. :rtype: bool CLI Example: .. code-block:: bash salt '*' ip.up interface-label """ return _change_state(interface, "up") def enable(interface): """ Enable the specified interface Change adapter mode to TCP/IP. If previous adapter mode was EtherCAT, the target will need reboot. :param str interface: interface label :return: True if the service was enabled, otherwise an exception will be thrown. :rtype: bool CLI Example: .. code-block:: bash salt '*' ip.enable interface-label """ return up(interface) def down(interface, iface_type=None): # pylint: disable=unused-argument """ Disable the specified interface Change adapter mode to Disabled. If previous adapter mode was EtherCAT, the target will need reboot. :param str interface: interface label :return: True if the service was disabled, otherwise an exception will be thrown. :rtype: bool CLI Example: .. code-block:: bash salt '*' ip.down interface-label """ return _change_state(interface, "down") def disable(interface): """ Disable the specified interface Change adapter mode to Disabled. If previous adapter mode was EtherCAT, the target will need reboot. :param str interface: interface label :return: True if the service was disabled, otherwise an exception will be thrown. :rtype: bool CLI Example: .. code-block:: bash salt '*' ip.disable interface-label """ return down(interface) def _save_config(section, token, value): """ Helper function to persist a configuration in the ini file """ cmd = NIRTCFG_PATH cmd += " --set section={},token='{}',value='{}'".format(section, token, value) if __salt__["cmd.run_all"](cmd)["retcode"] != 0: exc_msg = "Error: could not set {} to {} for {}\n".format(token, value, section) raise salt.exceptions.CommandExecutionError(exc_msg) def set_ethercat(interface, master_id): """ Configure specified adapter to use EtherCAT adapter mode. If successful, the target will need reboot if it doesn't already use EtherCAT adapter mode, otherwise will return true. :param interface: interface label :param master_id: EtherCAT Master ID :return: True if the settings were applied, otherwise an exception will be thrown. CLI Example: .. code-block:: bash salt '*' ip.set_ethercat interface-label master-id """ if __grains__["lsb_distrib_id"] == "nilrt": initial_mode = _get_adapter_mode_info(interface) _save_config(interface, "Mode", NIRTCFG_ETHERCAT) _save_config(interface, "MasterID", master_id) if initial_mode != "ethercat": __salt__["system.set_reboot_required_witnessed"]() return True raise salt.exceptions.CommandExecutionError("EtherCAT is not supported") def _restart(interface): """ Disable and enable an interface """ disable(interface) enable(interface) def set_dhcp_linklocal_all(interface): """ Configure specified adapter to use DHCP with linklocal fallback Change adapter mode to TCP/IP. If previous adapter mode was EtherCAT, the target will need reboot. :param str interface: interface label :return: True if the settings were applied, otherwise an exception will be thrown. :rtype: bool CLI Example: .. code-block:: bash salt '*' ip.set_dhcp_linklocal_all interface-label """ if __grains__["lsb_distrib_id"] == "nilrt": initial_mode = _get_adapter_mode_info(interface) _save_config(interface, "Mode", "TCPIP") _save_config(interface, "dhcpenabled", "1") _save_config(interface, "linklocalenabled", "1") if initial_mode == "ethercat": __salt__["system.set_reboot_required_witnessed"]() else: _restart(interface) return True if interface in [x.name for x in pyiface.getIfaces()]: return _change_dhcp_config(interface) raise salt.exceptions.CommandExecutionError( "Invalid interface name: {}".format(interface) ) def set_dhcp_only_all(interface): """ Configure specified adapter to use DHCP only Change adapter mode to TCP/IP. If previous adapter mode was EtherCAT, the target will need reboot. :param str interface: interface label :return: True if the settings were applied, otherwise an exception will be thrown. :rtype: bool CLI Example: .. code-block:: bash salt '*' ip.dhcp_only_all interface-label """ if not __grains__["lsb_distrib_id"] == "nilrt": raise salt.exceptions.CommandExecutionError("Not supported in this version") initial_mode = _get_adapter_mode_info(interface) _save_config(interface, "Mode", "TCPIP") _save_config(interface, "dhcpenabled", "1") _save_config(interface, "linklocalenabled", "0") if initial_mode == "ethercat": __salt__["system.set_reboot_required_witnessed"]() else: _restart(interface) return True def set_linklocal_only_all(interface): """ Configure specified adapter to use linklocal only Change adapter mode to TCP/IP. If previous adapter mode was EtherCAT, the target will need reboot. :param str interface: interface label :return: True if the settings were applied, otherwise an exception will be thrown. :rtype: bool CLI Example: .. code-block:: bash salt '*' ip.linklocal_only_all interface-label """ if not __grains__["lsb_distrib_id"] == "nilrt": raise salt.exceptions.CommandExecutionError("Not supported in this version") initial_mode = _get_adapter_mode_info(interface) _save_config(interface, "Mode", "TCPIP") _save_config(interface, "dhcpenabled", "0") _save_config(interface, "linklocalenabled", "1") if initial_mode == "ethercat": __salt__["system.set_reboot_required_witnessed"]() else: _restart(interface) return True def _configure_static_interface(interface, **settings): """ Configure an interface that is not detected as a service by Connman (i.e. link is down) :param interface: interface label :param settings: - ip - netmask - gateway - dns - name :return: True if settings were applied successfully. :rtype: bool """ interface = pyiface.Interface(name=interface) parser = configparser.ConfigParser() parser.optionxform = str if os.path.exists(INTERFACES_CONFIG): try: with salt.utils.files.fopen(INTERFACES_CONFIG, "r") as config_file: parser.readfp(config_file) except configparser.MissingSectionHeaderError: pass hwaddr = interface.hwaddr[:-1] hwaddr_section_number = "".join(hwaddr.split(":")) if parser.has_section("service_{}".format(hwaddr_section_number)): parser.remove_section("service_{}".format(hwaddr_section_number)) parser.add_section("service_{}".format(hwaddr_section_number)) ip_address = settings.get("ip", "0.0.0.0") netmask = settings.get("netmask", "0.0.0.0") gateway = settings.get("gateway", "0.0.0.0") dns_servers = settings.get("dns", "''") name = settings.get("name", "ethernet_cable_{}".format(hwaddr_section_number)) parser.set( "service_{}".format(hwaddr_section_number), "IPv4", "{}/{}/{}".format(ip_address, netmask, gateway), ) parser.set("service_{}".format(hwaddr_section_number), "Nameservers", dns_servers) parser.set("service_{}".format(hwaddr_section_number), "Name", name) parser.set("service_{}".format(hwaddr_section_number), "MAC", hwaddr) parser.set("service_{}".format(hwaddr_section_number), "Type", "ethernet") parser.set("service_{}".format(hwaddr_section_number), "IPv4.method", "manual") with salt.utils.files.fopen(INTERFACES_CONFIG, "w") as config_file: parser.write(config_file) return True def set_static_all(interface, address, netmask, gateway, nameservers=None): """ Configure specified adapter to use ipv4 manual settings Change adapter mode to TCP/IP. If previous adapter mode was EtherCAT, the target will need reboot. :param str interface: interface label :param str address: ipv4 address :param str netmask: ipv4 netmask :param str gateway: ipv4 gateway :param str nameservers: list of nameservers servers separated by spaces (Optional) :return: True if the settings were applied, otherwise an exception will be thrown. :rtype: bool CLI Example: .. code-block:: bash salt '*' ip.set_static_all interface-label address netmask gateway nameservers """ validate, msg = _validate_ipv4([address, netmask, gateway]) if not validate: raise salt.exceptions.CommandExecutionError(msg) if nameservers: validate, msg = _space_delimited_list(nameservers) if not validate: raise salt.exceptions.CommandExecutionError(msg) if not isinstance(nameservers, list): nameservers = nameservers.split(" ") if __grains__["lsb_distrib_id"] == "nilrt": initial_mode = _get_adapter_mode_info(interface) _save_config(interface, "Mode", "TCPIP") _save_config(interface, "dhcpenabled", "0") _save_config(interface, "linklocalenabled", "0") _save_config(interface, "IP_Address", address) _save_config(interface, "Subnet_Mask", netmask) _save_config(interface, "Gateway", gateway) if nameservers: _save_config(interface, "DNS_Address", nameservers[0]) if initial_mode == "ethercat": __salt__["system.set_reboot_required_witnessed"]() else: _restart(interface) return True service = _interface_to_service(interface) if not service: if interface in [x.name for x in pyiface.getIfaces()]: return _configure_static_interface( interface, **{ "ip": address, "dns": ",".join(nameservers) if nameservers else "", "netmask": netmask, "gateway": gateway, } ) raise salt.exceptions.CommandExecutionError( "Invalid interface name: {}".format(interface) ) service = pyconnman.ConnService(os.path.join(SERVICE_PATH, service)) ipv4 = service.get_property("IPv4.Configuration") ipv4["Method"] = dbus.String("manual", variant_level=1) ipv4["Address"] = dbus.String("{}".format(address), variant_level=1) ipv4["Netmask"] = dbus.String("{}".format(netmask), variant_level=1) ipv4["Gateway"] = dbus.String("{}".format(gateway), variant_level=1) try: service.set_property("IPv4.Configuration", ipv4) if nameservers: service.set_property( "Nameservers.Configuration", [dbus.String("{}".format(d)) for d in nameservers], ) except Exception as exc: # pylint: disable=broad-except exc_msg = "Couldn't set manual settings for service: {}\nError: {}\n".format( service, exc ) raise salt.exceptions.CommandExecutionError(exc_msg) return True def get_interface(iface): """ Returns details about given interface. CLI Example: .. code-block:: bash salt '*' ip.get_interface eth0 """ _interfaces = get_interfaces_details() for _interface in _interfaces["interfaces"]: if _interface["connectionid"] == iface: return _dict_to_string(_interface) return None def build_interface(iface, iface_type, enabled, **settings): """ Build an interface script for a network interface. CLI Example: .. code-block:: bash salt '*' ip.build_interface eth0 eth <settings> """ if __grains__["lsb_distrib_id"] == "nilrt": raise salt.exceptions.CommandExecutionError("Not supported in this version.") if iface_type != "eth": raise salt.exceptions.CommandExecutionError( "Interface type not supported: {}:".format(iface_type) ) if ( "proto" not in settings or settings["proto"] == "dhcp" ): # default protocol type used is dhcp set_dhcp_linklocal_all(iface) elif settings["proto"] != "static": exc_msg = "Protocol type: {} is not supported".format(settings["proto"]) raise salt.exceptions.CommandExecutionError(exc_msg) else: address = settings["ipaddr"] netmask = settings["netmask"] gateway = settings["gateway"] dns = [] for key, val in settings.items(): if "dns" in key or "domain" in key: dns += val set_static_all(iface, address, netmask, gateway, dns) if enabled: up(iface) return get_interface(iface) def build_network_settings(**settings): """ Build the global network script. CLI Example: .. code-block:: bash salt '*' ip.build_network_settings <settings> """ if __grains__["lsb_distrib_id"] == "nilrt": raise salt.exceptions.CommandExecutionError("Not supported in this version.") changes = [] if "networking" in settings: if settings["networking"] in _CONFIG_TRUE: __salt__["service.enable"]("connman") else: __salt__["service.disable"]("connman") if "hostname" in settings: new_hostname = settings["hostname"].split(".", 1)[0] settings["hostname"] = new_hostname old_hostname = __salt__["network.get_hostname"] if new_hostname != old_hostname: __salt__["network.mod_hostname"](new_hostname) changes.append("hostname={}".format(new_hostname)) return changes def get_network_settings(): """ Return the contents of the global network script. CLI Example: .. code-block:: bash salt '*' ip.get_network_settings """ if __grains__["lsb_distrib_id"] == "nilrt": raise salt.exceptions.CommandExecutionError("Not supported in this version.") settings = [] networking = "no" if _get_state() == "offline" else "yes" settings.append("networking={}".format(networking)) hostname = __salt__["network.get_hostname"] settings.append("hostname={}".format(hostname)) return settings def apply_network_settings(**settings): """ Apply global network configuration. CLI Example: .. code-block:: bash salt '*' ip.apply_network_settings """ if __grains__["lsb_distrib_id"] == "nilrt": raise salt.exceptions.CommandExecutionError("Not supported in this version.") if "require_reboot" not in settings: settings["require_reboot"] = False if "apply_hostname" not in settings: settings["apply_hostname"] = False hostname_res = True if settings["apply_hostname"] in _CONFIG_TRUE: if "hostname" in settings: hostname_res = __salt__["network.mod_hostname"](settings["hostname"]) else: log.warning( "The network state sls is trying to apply hostname " "changes but no hostname is defined." ) hostname_res = False res = True if settings["require_reboot"] in _CONFIG_TRUE: log.warning( "The network state sls is requiring a reboot of the system to " "properly apply network configuration." ) res = True else: stop = __salt__["service.stop"]("connman") time.sleep(2) res = stop and __salt__["service.start"]("connman") return hostname_res and res
Upload File
Create Folder