003 File Manager
Current Path:
/usr/local/lib/python3.8/site-packages/salt/utils
usr
/
local
/
lib
/
python3.8
/
site-packages
/
salt
/
utils
/
📁
..
📄
__init__.py
(237 B)
📁
__pycache__
📄
aggregation.py
(5.17 KB)
📄
args.py
(19.86 KB)
📄
asynchronous.py
(4.07 KB)
📄
atomicfile.py
(5.33 KB)
📄
aws.py
(19.38 KB)
📄
azurearm.py
(11.38 KB)
📄
beacons.py
(517 B)
📄
boto3_elasticsearch.py
(3.73 KB)
📄
boto3mod.py
(8.36 KB)
📄
boto_elb_tag.py
(3.02 KB)
📄
botomod.py
(7.98 KB)
📄
cache.py
(9.81 KB)
📄
cloud.py
(117.04 KB)
📄
color.py
(2.72 KB)
📄
compat.py
(1.81 KB)
📄
configcomparer.py
(3.88 KB)
📄
configparser.py
(10.82 KB)
📄
context.py
(6.8 KB)
📄
crypt.py
(4.71 KB)
📄
ctx.py
(1.42 KB)
📄
data.py
(49.28 KB)
📄
dateutils.py
(2.31 KB)
📄
debug.py
(4.19 KB)
📁
decorators
📄
dictdiffer.py
(14.16 KB)
📄
dicttrim.py
(3.9 KB)
📄
dictupdate.py
(11.33 KB)
📄
dns.py
(35.17 KB)
📄
doc.py
(2.25 KB)
📁
dockermod
📄
entrypoints.py
(2.28 KB)
📄
environment.py
(2.2 KB)
📄
error.py
(1.18 KB)
📄
etcd_util.py
(14.22 KB)
📄
event.py
(52.3 KB)
📄
extend.py
(8.87 KB)
📄
extmods.py
(5.67 KB)
📄
filebuffer.py
(3.15 KB)
📄
files.py
(27.6 KB)
📄
find.py
(22.09 KB)
📄
fsutils.py
(3.29 KB)
📄
functools.py
(5.02 KB)
📄
gitfs.py
(124.49 KB)
📄
github.py
(1.52 KB)
📄
gzip_util.py
(2.86 KB)
📄
hashutils.py
(5.91 KB)
📄
http.py
(34.36 KB)
📄
iam.py
(1.22 KB)
📄
icinga2.py
(754 B)
📄
idem.py
(1.22 KB)
📄
immutabletypes.py
(2.46 KB)
📄
itertools.py
(2.36 KB)
📄
jid.py
(3 KB)
📄
jinja.py
(31.33 KB)
📄
job.py
(6.01 KB)
📄
json.py
(3.78 KB)
📄
kickstart.py
(41.04 KB)
📄
kinds.py
(493 B)
📄
lazy.py
(3.06 KB)
📄
listdiffer.py
(10.9 KB)
📄
locales.py
(2.06 KB)
📄
mac_utils.py
(14.01 KB)
📄
mako.py
(3.63 KB)
📄
master.py
(29.57 KB)
📄
mattermost.py
(1.77 KB)
📄
memcached.py
(3.56 KB)
📄
migrations.py
(1.46 KB)
📄
mine.py
(3.68 KB)
📄
minion.py
(4.13 KB)
📄
minions.py
(43.11 KB)
📄
mount.py
(1.15 KB)
📄
msazure.py
(5.36 KB)
📄
msgpack.py
(4.69 KB)
📄
nacl.py
(13.58 KB)
📄
namecheap.py
(4.32 KB)
📄
napalm.py
(23.79 KB)
📄
nb_popen.py
(7.24 KB)
📄
network.py
(71.06 KB)
📄
nxos.py
(12.94 KB)
📄
nxos_api.py
(4 KB)
📄
odict.py
(13.16 KB)
📁
openstack
📄
oset.py
(6.41 KB)
📄
pagerduty.py
(3.03 KB)
📄
parsers.py
(125.31 KB)
📄
path.py
(10.78 KB)
📄
pbm.py
(9.81 KB)
📁
pkg
📄
platform.py
(5.16 KB)
📄
powershell.py
(4.15 KB)
📄
preseed.py
(2.64 KB)
📄
process.py
(43.34 KB)
📄
profile.py
(3.21 KB)
📄
proxy.py
(331 B)
📄
psutil_compat.py
(3.65 KB)
📄
pushover.py
(4.51 KB)
📄
pycrypto.py
(5.39 KB)
📄
pydsl.py
(13.74 KB)
📄
pyobjects.py
(10.75 KB)
📄
reactor.py
(19.09 KB)
📄
reclass.py
(752 B)
📄
roster_matcher.py
(3.55 KB)
📄
rsax931.py
(8.07 KB)
📄
s3.py
(8.78 KB)
📄
saltclass.py
(14.27 KB)
📄
sanitizers.py
(2.51 KB)
📄
schedule.py
(70.67 KB)
📄
schema.py
(54.26 KB)
📄
sdb.py
(4.04 KB)
📄
slack.py
(3.57 KB)
📄
smb.py
(11.16 KB)
📄
smtp.py
(3.27 KB)
📄
ssdp.py
(14.75 KB)
📄
ssh.py
(769 B)
📄
state.py
(8.43 KB)
📄
stringio.py
(355 B)
📄
stringutils.py
(16.63 KB)
📄
systemd.py
(5.51 KB)
📄
templates.py
(23.92 KB)
📄
textformat.py
(5.03 KB)
📄
thin.py
(31.64 KB)
📄
timed_subprocess.py
(4.06 KB)
📄
timeout.py
(1.53 KB)
📄
timeutil.py
(2.4 KB)
📄
url.py
(4.96 KB)
📄
user.py
(10.92 KB)
📁
validate
📄
value.py
(247 B)
📄
vault.py
(19.23 KB)
📄
verify.py
(26.97 KB)
📄
versions.py
(16.32 KB)
📄
virt.py
(3.24 KB)
📄
virtualbox.py
(22.43 KB)
📄
vmware.py
(129.74 KB)
📄
vsan.py
(17.18 KB)
📄
vt.py
(30.25 KB)
📄
vt_helper.py
(4.4 KB)
📄
win_chcp.py
(3.7 KB)
📄
win_dacl.py
(94.69 KB)
📄
win_dotnet.py
(4.75 KB)
📄
win_functions.py
(12.69 KB)
📄
win_lgpo_auditpol.py
(8.48 KB)
📄
win_lgpo_netsh.py
(17.87 KB)
📄
win_network.py
(12.41 KB)
📄
win_osinfo.py
(2.83 KB)
📄
win_pdh.py
(13.85 KB)
📄
win_reg.py
(30.05 KB)
📄
win_runas.py
(10.55 KB)
📄
win_service.py
(5.2 KB)
📄
win_system.py
(14.47 KB)
📄
win_update.py
(40.36 KB)
📄
winapi.py
(818 B)
📄
xdg.py
(316 B)
📄
xmlutil.py
(13.91 KB)
📄
yaml.py
(348 B)
📄
yamldumper.py
(3.38 KB)
📄
yamlencoding.py
(1.55 KB)
📄
yamlloader.py
(6.21 KB)
📄
yamlloader_old.py
(8.33 KB)
📄
yast.py
(619 B)
📄
zeromq.py
(1.65 KB)
📄
zfs.py
(19.2 KB)
Editing: pycrypto.py
""" Use pycrypto to generate random passwords on the fly. """ import logging import random import re import string import salt.utils.platform import salt.utils.stringutils from salt.exceptions import CommandExecutionError, SaltInvocationError try: try: from M2Crypto.Rand import rand_bytes as get_random_bytes except ImportError: try: from Cryptodome.Random import get_random_bytes except ImportError: from Crypto.Random import get_random_bytes # nosec HAS_RANDOM = True except ImportError: HAS_RANDOM = False try: import crypt HAS_CRYPT = True except ImportError: HAS_CRYPT = False try: import passlib.context HAS_PASSLIB = True except ImportError: HAS_PASSLIB = False log = logging.getLogger(__name__) def secure_password( length=20, use_random=True, chars=None, lowercase=True, uppercase=True, digits=True, punctuation=True, whitespace=False, printable=False, ): """ Generate a secure password. """ chars = chars or "" if printable: # as printable includes all other string character classes # the other checks can be skipped chars = string.printable if not chars: if lowercase: chars += string.ascii_lowercase if uppercase: chars += string.ascii_uppercase if digits: chars += string.digits if punctuation: chars += string.punctuation if whitespace: chars += string.whitespace try: length = int(length) pw = "" while len(pw) < length: if HAS_RANDOM and use_random: encoding = None if salt.utils.platform.is_windows(): encoding = "UTF-8" while True: try: char = salt.utils.stringutils.to_str( get_random_bytes(1), encoding=encoding ) break except UnicodeDecodeError: continue pw += re.sub( salt.utils.stringutils.to_str( r"[^{}]".format(re.escape(chars)), encoding=encoding ), "", char, ) else: pw += random.SystemRandom().choice(chars) return pw except Exception as exc: # pylint: disable=broad-except log.exception("Failed to generate secure passsword") raise CommandExecutionError(str(exc)) if HAS_CRYPT: methods = {m.name.lower(): m for m in crypt.methods} else: methods = {} known_methods = ["sha512", "sha256", "blowfish", "md5", "crypt"] def _gen_hash_passlib(crypt_salt=None, password=None, algorithm=None): """ Generate a /etc/shadow-compatible hash for a non-local system """ # these are the passlib equivalents to the 'known_methods' defined in crypt schemes = ["sha512_crypt", "sha256_crypt", "bcrypt", "md5_crypt", "des_crypt"] ctx = passlib.context.CryptContext(schemes=schemes) kwargs = {"secret": password, "scheme": schemes[known_methods.index(algorithm)]} if crypt_salt and "$" in crypt_salt: # this salt has a rounds specifier. # passlib takes it as a separate parameter, split it out roundsstr, split_salt = crypt_salt.split("$") rounds = int(roundsstr.split("=")[-1]) kwargs.update({"salt": split_salt, "rounds": rounds}) else: # relaxed = allow salts that are too long kwargs.update({"salt": crypt_salt, "relaxed": True}) return ctx.hash(**kwargs) def _gen_hash_crypt(crypt_salt=None, password=None, algorithm=None): """ Generate /etc/shadow hash using the native crypt module """ if crypt_salt is None: # setting crypt_salt to the algorithm makes crypt generate # a salt compatible with the specified algorithm. crypt_salt = methods[algorithm] else: if algorithm != "crypt": # all non-crypt algorithms are specified as part of the salt crypt_salt = "${}${}".format(methods[algorithm].ident, crypt_salt) try: ret = crypt.crypt(password, crypt_salt) except OSError: ret = None return ret def gen_hash(crypt_salt=None, password=None, algorithm=None): """ Generate /etc/shadow hash """ if password is None: password = secure_password() if algorithm is None: # prefer the most secure natively supported method algorithm = crypt.methods[0].name.lower() if HAS_CRYPT else known_methods[0] if algorithm == "crypt" and crypt_salt and len(crypt_salt) != 2: log.warning("Hash salt is too long for 'crypt' hash.") if HAS_CRYPT and algorithm in methods: return _gen_hash_crypt( crypt_salt=crypt_salt, password=password, algorithm=algorithm ) elif HAS_PASSLIB and algorithm in known_methods: return _gen_hash_passlib( crypt_salt=crypt_salt, password=password, algorithm=algorithm ) else: raise SaltInvocationError( "Cannot hash using '{}' hash algorithm. Natively supported " "algorithms are: {}. If passlib is installed ({}), the supported " "algorithms are: {}.".format( algorithm, list(methods), HAS_PASSLIB, known_methods ) )
Upload File
Create Folder